RAYS BULLSHIT PROVEN TO BE BULLSHIT!!!





 

This blog copyrighted (c) 2008 – 2014 Lloyd Burris

The focus fusion stealth drone project has been moved here.(It is a DIY nuclear powered drone with interesting capabilities.)

 

————————————————————————–

                  Here is Aaron Hiniker’s real picture.


He claims to be a professional programmer but truth is he is a professional hacker and cyber-stalker, and spammer. He is a cyber-weapon used by http://timetravelinstitute.com against me because I have a blog here about time travel I started this blog because Darby and Ray were trying to make me leave the internet. They were preventing me from talking about time travel on the internet.


This is the guy that keeps my forum at http://thetimetravelinstitute.com from being used because he spams the hell out of it. The whole reason I got that forum is so I would have a forum I could post at which Darby and Ray aka Rainman could not knock me off of. But Aaron is keeping me from using it.


This is the guy that put the remote administration tools on my and my familys computers along with malware and virus’s.

 

This is the guy who posted to me he was going to plagiarize my published work and my copyright.


This is the guy who stole my credit card and had it used fraudulently.


This is the guy who changed my passwords on my accounts.


This is the guy who got into my and my family’s computer files.


This is the guy who look at my families web-cams. Most of all my children.


This is the guy who looked at my and my family’s computer screens during his hacking. 


This is the guy who hacked the shit out of my home network and still does dos attacks on me from time to time.


Here is the link for that file I complied on my attacker.


Aarons messages, FBI Reports, Router logs, and files.


Down the street from me is a business. When ever someone comes in and takes something that does not belong to them they take their picture and blow it up and post it at the front of their store. So, Aaron Hiniker’s picture is posted at the front of my blog.

 

There you go. Moving onto the blog.

 

—————————————————————————

 

April 13, 2014

Today I was working out how to make the hardware for a software radio. Now, I already have one but I wanted to build another one from scratch for my drone I am building. 

 

Google GNU radio for more information. What a software radio does is a circuit called a analog to digital converter takes radio signals from the air. The ADC (Analog to digital converter) reads the analog voltage and converts it to a binary byte which is then sent to the GNU software for processing.

 

Why this is done is because the software can process radio almost just as well as expensive hardware can. It has advantages and its disadvantages.

 

Now, how does all this apply to time travel? Because one of the circuits I was looking at for doing my own DIY software radio is called a “Successive Approximations”. This circuit takes a analog signal on a buffer and runs a binary counter to approximate a digital byte for the analog signal.

 

Now, how is this important? Because the successive approximations ADC does not care where or when the analog signal is, will be, or was from.

 

It simply put just uses a binary counter to convert binary bytes from analog signals. The buffer it uses does not care where or when those signals came from. Now, usually the signals come from a antenna and this is happening in real time.

 

It is possible for the analog to be recorded from some time and place. Or, the analog signals could be computer generated. The successive approximations ADC simply put does not care.

 

Now to throw more gasoline on Rays fire. The problem Ray has is that scientifically all analog signals are not freaks of nature. Any analog signal that occures in the past can occur in the present and also can occur in the future. This is why record players work. Because it is mathematically and physically proven. If not there would be no steros, radios, or record players around today.

Analog signals can be generated by nature or by artificial means. 

 

So, what that means that a analog signal that occurred oh lets say 1000 light years from earth a billion years ago can occur here on earth now or can occur a million years in the future.

 

And to add even more gas to Rays fire any binary counter can approximate a analog signal and those analog signals can be from the future not just the present. Those analog signals can be from the past. 

 

Now, what this means is that Ray aka Rainman admin of http://timetravelinstitute.com of Orange county California has been proven wrong. His bullshit has been proven to be bullshit because of these reasons.

 

1. Analog signals can occur at any place in space time.

 

2. Analog signals are not freaks of nature. Any analog signal that occurred once in space time can occur again somewhere else in space time. This is mathematically true and can not be disputed. Again, this is why radios, stero’s and record players work.

 

3. Binary counters can, do, and will approximate digitally a analog signal. And that signal because of #2 can be from the past, present, or the future. Binary counters do not care where or when these analog signals occur.


4. Given 1,2 & 3 in theory it is a reality for a binary counter to find a computer media file of the past, future, or alternate time lines.


5. I have been and still am working on just such software that does do just this.


My software can approximate analog signals digitally that can be from other places and times.


Ray you are so full of bullshit it aint even funny and to rain on Rainmans parade you have been proven wrong. You can send your people after me all you want. You can chase me to hell and back but you can not stop me from talking about time travel and you can not stop me from using the Internet.

 

In Ray and Darby’s world analog signals are freaks of nature which science knows to be bullshit.

 

If anyone has ever read what Ray and Darby had to say about my work they they would know that it is their belief that binary counters can not approximate analog signals which is bullshit because there are companies out there that make hardware to do just that. Even the hardware that goes into the aircraft that Ray helps to build uses binary counters to approximate analog signals.

 

Darby went on Coast to Coast AM in a public interview pretending to be a UFO / Time Traveler expert but Darby does not know his ASS FROM A HOLE IN THE GROUND when it comes to time travel. All he can do is talk about what Titor said on the internet and even then he does not always get that right either.

 

Ray and Darby are so stupid their stupid is stupid. They make their fake forum out to be experts on time travel but truth is them and their forum is full of shit and those guys are trolls, thugs, child porn perverts, and assholes. Oh yeah, Aaron Hiniker of Bedford, Ma their very own people SAID THEY WERE ASSHOLES!!! 

 

BAAAAAAAAAAAAAAAAHAHAHAHAAHAHAHA!!!!! 

 

Now, getting back on topic. Oh, I was on topic. Im sorry. Moving on.

 

 Now, that means for me is my time travel software can be thought of as a analog to digital converter but with a twist. My time travel software is a  

 

“De-cryption analog to digital converter device” A time machine.

 

The de-cryption part is my device is attempting to decrypt analog signals that will occur in the past or the future. It can do this because mathematically specific analog signals are not freaks of nature. Specific analog signals can occur any place at any time in space-time and binary counters can approximate those signals.

 

Now to throw the remaining gasoline on rays fire. Because analog signals are not freaks of nature it is possible to use De-cryption technology to run a binary counter to approximate analog signals of the past, future, or alterante time-lines. It is possible to build a time machine with a computer.

 

By combining encryption technologies to analog to digital or digital to analog converters it is possible to build a time travel device to see other possible times and places. To search for information and computer media through out space-time.

 

The two publicly used technologies that also help prove Ray aka Rainman wrong are 

 

1. Rsync – Uses binary counters to reconstruct computer files over a weak internet connection. 

 

NOTE:

 

My software uses encryption technology and binary counters to construct computer files over no connection at all. Even through space and time and can even be used as a temporal means of communication with the future.

 

2. ADC successive approximations (analog to digital converters) uses binary counters to convert analog signals to binary. The counters do not care where or when the analog signals occurred it just converts them to binary.

 

Even the flight control systems on the aircraft Ray helps designs uses ADC successive approximations converters. So, RAY IS CALLING BULLSHIT THE HARDWARE THAT HE RUNS ON HIS OWN FLIGHT CONTROL SYSTEMS!!!

 

To recap my check-sums that my programs build to construct a file would be the buffer of a number that mathematically represents a possible digital series of analog signals as a binary file. Now, my software takes that check-sum and builds a binary file WITH BINARY COUNTERS. My bots which verify the file as a real time travel media file can be thought of as the comparator in a digital ADC. In a digital circuit the comparator goes high or low to indicate when the binary counter has found best possible binary match for a digital signal. Well my bots on my computer do the same job essentially. My bots look at the completed file and tell when the file matches the series of digital/analog signals that computer is looking for.

 

So, my time travel software again can be thought of as a De-encryption – ADC/DAC (Analog to digital converter / digital to analog converter) for the purpose of time travel. The decryption part comes because we are looking for series of analog signals that occurred somewhere in the past or the future. Someday I want to add to my long list of things I want to do and take a bunch of field programmable gate arrays and build a hardware version of my software time travel machine.

 

 

To Darby and Ray of the time travel institute. The fake one.

 

http://timetravelinstitute.com 

 

IN YOUR FACES!!!! YEAH!!!!!!!

 

YOU PERVERT PUSSIES!!!(PERVERT BECAUSE OF YOUR HACKING OF MY HOME NETWORK WITH MYSELF ANDHudson MY WIFE AND KIDS INCLUDING OUR WEB CAMS. WITH RAT MALWARE)

 

YOU AINT GOT NOTHING ON ME!!!! 

 

PAMELA OF THE TITOR STORY COULD KICK ALL YOU GUYS ASSES WITH ONE ARM AND BOTH LEGS TIED BEHIND HER BACK!!!

 

YOU GUYS AINT GOT SHIT!!! 

 

BAAAAAAAAAAHAHAHAHAHAH!!!

 

BAAAAAAAAAAHAHAHAHAHAH!!!

 

BAAAAAAAAAAHAHAHAHAHAH!!!

 

YOU GUYS HAVE HAD THE ONLY REAL TIME TRAVELER YOUR SORRY ASS FORUM WILL EVER SEE VISIT IT. AND, THAT WAS ME!!!

 

I AM A TIME TRAVELER!!! 

 

YEEEEEEEHAAAAAAAA!!!!!!!!!

 

 

Well thats enough for me for one day. Catch everyone later.

TIME TRAVEL INSTITUTE DOT COM HACKS, STALKS, AND STEALS FROM ITS OWN MEMBERS.





 This blog copyrighted (c) 2008 – 2014 Lloyd Burris

The focus fusion stealth drone project has been moved here.

March 24th, 2014

Well, Aaron is still attacking my home network. The FBI, and Homeland, are not going to do anything. My state representive Tim who contacted the FCC they are not going to do anything. So, since Aaron violated my childrens and my wifes privacy even tried to look at them most of all my children naked. Stole money from me. Stole my copyrighted work and said he was going to plagiarize my book. He even threathen with with violence saying I was going to have accident. So, with further ado I am making all my personal conversations and my complaints with the FBI against him public.  A young adult who attacks women and children on the internet I will not protect his privacy.

Now, the police report is not here and some of my stuff may not be here but most of it is. This file is close to 500 mb in size. Some of the files are duplicated as I put in a directory and then realized I had a update to it. Stay out of the directory marked virus infected files because it is for any one who knows what they are doing for research. I am hoping the Little Rock, ar police will download it and investigate Aaron but that is doubtful. The authorities in my area are not up to date with the rest of the country. This is Arkansas remember. Which is why Tim Griffen probably could not help me. 

Maybe if I get lucky Aarons own Bedford, MA police department will investigate him and arrest him since Arkansas does not have the resources to do so.

Now, this gives all the personal information about myself and my attacker. Anyone wanting to find me could easily do that without this information. 

Aaron questioned and interviewed the hell out of me about my method of time travel. I did tell him a lot but a lot I kept back knowing his was probably not real. I followed the rule of not telling him anything that I have not told the public. But, I did not know he was looking at my family and I’s computers screen’s with us and going through our files.

http://timetravelinstitute.com was able to run Titor off the internet by threatening to expose his personal identity. When they tried that shit with me I said ok. Tell the world who I am. I am not leaving the internet. Ray and Darby started calling me personal names in public long before I started my blog about them but when I started my blog about them and the coverup and my method of time travel they started CRYING AND BOOHOOING  and trying ever since to get revenge against me and run me off the internet because they are cowards. 

It was ok for them to call me names and talk about me in public. When I did that back to them that started a cyber war against me. The difference between me and them is what they said about me was lies but I told the truth about them. Which insults them more. Because they know everything I have said about them is true.  

I have done nothing wrong. So, Aaron you are no longer under my projection and I still hope the authorities get you for your hacking and fraud and crimes against my children and wife. I have some corrections and spell checking to do here. I will get that later.

Here is Aaron Hiniker’s real picture.

 
 Actually if he takes his glasses off and faces the camera he is uglier than this. He puts glasses on and faces sideways so people do not know how ugly he really is.

BAAAAAAAAHAHAHAHAHAHAHAHAHA!!!!!!!!!!!!

Take a look below and see what I mean. Only a mother could love that face.




He claims to be a professional programmer but truth is he is a professional hacker and cyber-stalker, and spammer. He is a cyber-weapon used by http://timetravelinstitute.com against me because I have a blog here about time travel I started this blog because Darby and Ray were trying to make me leave the internet. They were preventing me from talking about time travel on the internet.

This is the guy that keeps my forum at http://thetimetravelinstitute.com from being used because he spams the hell out of it. The whole reason I got that forum is so I would have a forum I could post at which Darby and Ray aka Rainman could not knock me off of. But Aaron is keeping me from using it.

This is the guy that put the remote administration tools on my and my familys computers along with malware and virus’s.

This is the guy who stole my credit card and had it used fraudently.

This is the guy who changed my passwords on my accounts.

This is the guy who got into my and my family’s computer files.

This is the guy who look at my familys webcams. Most of all my children.

This is the guy who looked at my and my family’s computer screens during his hacking. 

This is the guy who hacked the shit out of my home network.

Here is the link for that file I complied on my attacker.

Aarons messages, FBI Reports, Router logs, and files.

I like to think of this as the Aaron Hiniker files. Everyone enjoy.

Aaron voilated my and my family’s privacy and I in turned refused to protect his privacy because of his crimes. He is lucky the FBI has not arrested him and that he is not sitting in jail tonight.

Down the street from me is a business. Well at that business they have camera’s and when ever someone comes in and steals the owner of the business makes a picture of that person and blows it up and post it at the front of his store. Well, I thought about that and then thought to myself. Why the hell and I protecting someone’s identity who ROBBED ME, THREATEN ME, AND SAID HE WOULD PLAGERIZE MY WORK!!! No, man I did what the business down the street did. I put up Aarons picture at THE FRONT OF MY STORE. Really it is my blog but the concept is the same.

March 8th, 2014

I have not checked my email in two days. No doubt my box has plenty of email waiting for me. I have some post I am again planning to make to this blog I just have not got around to making them. Im going to post my latest events from posting on the forums. I have been programming my ass off on my time travel software. This weekend I have to pay bills and do taxes so I am not sure how much time I will get with my personal projects. I plan to work on my drone some. I have a bench FULL OF SHIT WAITING FOR ME TO ASSEMBLE IT. So, I have a lot to do with that. Since my drone is using a fusion reactor I have equipment on the side I have to assemble too before I can fire the drone up for testing.

My Firewall as far as I can tell is doing good. I re-installed it after http://timetravelinstitute.com had its hackers disabled to let traffic flow through freely to my home network from the internet.

It its back to dropping unwanted traffic. My logs are getting a lot of attempts to use SSH and Telnet and other shit. I turn my internet off now when I am done but my kids (the ones the conspiracy against time travel has been spying on through their web cams trying to get pictures of them)  my kids use the hell out of the internet so it is still up a good amount of time.

I use to try to keep my blog clean from bad words but found when dealing with the conspiracy against time travel that is nearly impossible.

I forgot to tell Everyone that Aaron my hacker in his messages to me told me he smokes dope. So, I can add dope smoking child porn perverts to the names that I call the conspiracy against time travel located at http://timetravelinstitute.com .

I also call them trolls, thugs, and criminals. I strongly believe the FBI should take their websight down because they are a danger to the public. I feel that Titor when he was on the internet was having trouble with them too. Not only did he leave the internet but his family had to sue the same guys that are giving my problems. So, that goes to show for me that http://timetravelinstitute.com is a danger to the public and should be taken down and its members disbanded and not allowed to contact each other for the public safety. For the public good.

They should also be punished for their crimes. But, it looks like the FBI is protecting them instead of investigating them for the crimes they have commited through their actions and through the actions of their hackers. It probably has to do with Darby being retired from the CIA and from Rainman being a high level government contracter. That is more important than protecting society from them.

Moving on……..

I posted a while back about how flying saucers work. They charge up their shells with high voltage then use EMF phased to act with the hull of the ship to act like a gauss gun.

The electrical/magnetic properties of the matter in the hull interacts with the electrical/magnetic properities of EMF to make the hull move through the EMF like a magnet going through a guass gun.

Now, here is what I have gotten from people on the outside about this. That the mass of the ship is too heavy to do that with EMF. No, not really and here is why.

The voltage the ship is charged up with is composed of negative electrons. Now, since electronics are negative like charges repel. They push off one another. Now, if a mass is charged with enough voltage eventually that voltage will act on the mass like helium acts in a ballon.  IT IS GONNA WANT TO MOVE IT.

All  those charges pushing off one another WANT TO GO SOMEWHERE. So, basicly what is being done is the mass of the ship is being CANCELLED OUT AND THE SHIP IS BEING TURNED INTO A CHARGED PARTICLE. Now, charged particles MOVE!!! So, with the mass canceled out THE EMF CAN DIRECT THE DIRECTION OF THE SHIP LIKE A MAGNET GOING THROUGH A GUASS GUN. It can also be controlled by controlling the direction and voltage on the capacitors comprising the ship hull.

A UFO IS BASICALLY A ARTIFICAL PARTICLE THAT CAN BE STEARED. Also, the cancelling out the mass has another property. IF MASS IS CANCELED THEN THE SPEED OF LIGHT CAN BE BROKEN!!! The only reason there is a speed of light is because OF MASS. WITHOUT MASS THERE IS NO SPEED OF LIGHT CONSTANT!!! 

As for the Higgs field it is possible that the high voltage works to interfer with that field to CHANGE THE MASS OF THE SHIP. Why would that happen? Because now THE CHARGES ARE NOT BALLANCED ANY MORE AND THE STRUCTURE OF THE SUBATOMIC PROPERTIES OF THE SHIP HAVE CHANGED!!! 

THERE IS A REASON WHY AN ELECTRON HAS A DIFFERENT MASS THAN THE PROTON. Now with a bunch of electrons YES THE HIGGS FIELD WOULD CHANGE EFFECTING THE MASS OF THE SHIP. 

The higgs field would change the mass of the ship because the sub-atomic structure of the ship has  changed. 

SO, TO KEEP THE HIGGS FIELD FROM IMPOSING MASS ON THE SHIP CHANGE THE SUB-ATOMIC STRUCTURE OF THE SHIP TO KEEP THE FIELD FROM IMPOSING MASS ON THE SHIP!!!

There is a reason why THE INTERNET IS FILLED WITH UFO VIDEOS AND DOCUMENTRIES. WHY? BECAUSE THIS SHIT WORKS THATS WHY.

HEY DARBY YOU GOING TO WARN ME. IM TYPING IN UPPER CAPS AGAIN. BAAAAAAAAAAAAHHHHHHHHHHHHHHHHHAAHAHAHAHAHAHAAH!!!

Anyway that is my gig about UFO propulsion. Now, do not get it wrong there are many different ways to build a propulsion system like that. What I am describing is not the only way to make ships fly like that.


March 9th, 2014


Well on my latest posting in the forums I was at Craigslist in Chicago in Science and math. 

https://forums.craigslist.org/?ID=245357772  
 The conspiracy against time travel was there. Now, last time in a different city the mod deleted their messages so this time they were a little nicer but still droping hints and insults. Aaron was there but this time not making threats.  

I replaced my equipement today. I might have gotten the hackers from http://timetravelinstitute.com out of my home network. I will be looking at my logs closely.

My transcript did not past very well here so I uploaded it to my websight. Here is the link. It is ziped so you will have to uncompress it to read it.

Transcript of forum in Chicago on craigslist. 

March 10th, 2014

Well I did not get shit done today because I hung out with the family. At craigslist a person which seemed like Ray answered what I previously said about Ray calling my method bull shit. He said he still thinks its bull shit. I asked what his defination of time travel was. So far as far as I know no response. You see, those guys Ray and Darby started http://timetravelinstitute.com but Ray does not believe in time travel. Im not sure Darby does either.

My defination of time travel. Moving information from the future to the past or from the past to the future. That can also be moving information from one time line to the other. And, that is why my method of time travel with computers can be called TIME TRAVEL. Because, the transferece of information can be materialized from the future to the past and put up on a computer screen. And the other way around too. From the past to the future. And, from one time-line to another time-line. THAT IS WHY IT IS CALLED TIME TRAVEL. The conspiracy against time travel either has not got this figured out or for their own reasons want me out of the way. Which as I have said a thousands times will not happen.

Since I use a method that allows for moving this information with LITTLE OR NO CONNECTION BETWEEN THE DESTINATION TIME-LINE AND THE TARGET time-line then the transfere of information is possible. 

The method I refere to is check-sum reconstruction which was proven by the application Rsync before I ever used check-sum reconstruction for time travel. Rsync used it to transfere information over a week connection. I used it to transfere information across a individual or multiple time-lines with no connection.

Also at craigslist the conspiracy against time travel tried to rub my nose into the stupid shit they do to hurt me. One guy named “MeanUncleBen” I think I got that right if not oh well.It is Uncle something. He should of used “Uncle Stupid”.

Ben made a comment about me buying and trading out the equipment to keep Aaron out. There were other comments made as well. But, my security is a lot better than what it was. And, I like my new stuff. I also feel better about not having my shit wide open to the world. I did not know it was that easy for someone to get to it. One thing Aaron did that was good for me WAS HE SENT ME A EMAIL TELLING ME WHAT HE DID!!! He wanted me to know. And, that pretty much explains how stupid these guys are.

You see, these guys the conspiracy against time travel are like a little Rodents (and they are rodents) trying to fuck a full grown elephant and going suffer bitch. You see, the big elephant dont feel shit. For all the hell these rodents attempt to give me they are little more than a little fly buzzing around my head. They are little more than a small dog trying to hump my leg.

Well I have to get up in a few hours. I do this too much. This week I am day trading again but when I am not doing that and working I plan to hunker down on my two side projects right now. The drone and my programming. 

March 11,2014

Being so busy I have not been checking my email very often. The conspiracy against time travel has it going good for them at this time. I have been too busy to hit the forums which is the thing they the conspiracy against time travel most want me not to do. And, when I do they give me a escort into the forum and do their best to give me a escort out of the forum. 

Besides filling it up with spam so people can’t or wont read my post. I like to think of them sometimes as my entourage or my fan club since they insist of cyber stalking/ bullying me as well as a whole list of other crimes. And, they do it publically for the world for the most part because I post most of what I can about them to reward them for their time on my part.

March 13th, 2014
Thirty  days ago after filling reports with the FBI, and Homeland, and the Little Rock, Ar police department which I am sad to say none of those law enforcement agencies have done shit and are not going to do shit about Aaron hacking my home network on behalf of the http://timetravelinstitute.com 

I contacted my congressman Tim Griffin my local congressman for Arkansas. Well, he contacted the federal trade commission which I got a call from and we talked rather briefly. 

He said I would get a decision in 30 days. Well today I got a bull shit letter saying “Oh, we have the right to share information from our constituent’s with law inforcement” but the letter stopped there and did not say rather or not anything was shared or rather or not anything was done. Pretty much it was a “WE ARE BLOWING YOU OFF” letter. 

Mean while after trading my router out for another one Aaron starting scanning me again from Cambridge, MA from a company that offers cloud services. Then my new firewall lost its virginity from an attack from Temple,AZ. My firewall was breached and my network was scanned and or penetrated further. I reinstalled my firewall.

For my time travel talk today. One thing the conspiracy against time travel has against them is they say they do not believe in time travel. Which is bull shit because they are on me like stink on shit on the internet and with the world watching and law enforcement turning their heads the other way.
One thing the world needs to understand is ‘THAT EINSTEIN NEVER SAID THE FUTURE COULD NOT BE VIEWED!!! HE NEVER SAID THAT! Einstien only said “THAT BECAUSE OF MASS NO ONE CAN GO FASTER THAN THE SPEED OF LIGHT.” That is it as far as time travel is concerned. Now, learn how to change mass then or not let it change then faster than light travel is possible. 

Now, as far as time travel there is NOTHING IN THE LAWS OF PHYSICS that keep my method of time travel from working as a method of time travel. This is information theory as it pertains to physics. 

Now many on the forums have put their own theorys as to why or why not time travel with information would work or not but, NONE OF THEM INCLUDING THE CONSPIRACY AGAINST TIME TRAVEL HAVE BEEN ABLE TO PROVE IT DOES NOT WORK. Now, they try to put their own spin on it to change it away from the subject of time travel but there problem there is that not everyone including myself will listen to them. My methods do work.

Though it may not be the physical time travel people want just being able to bring foriegn information up on the computer screen and scratch my head and say oh, will that happen tomorrow? Then wait for tomorrow to get here to see if it did happen. Or, just having the new media to watch or read a lot of times is just good enough for me too.

Well, I got things to do then I have to get back to work. I just wanted to give everyone the update.

March 14,th 2014

I have Ashburn, VA coming past my firewall everyday now. That was where Aaron’s IP came from on his email too me. But, this is from Amazonws.
My router recorded it like this.
[DoS Attack: SYN/ACK Scan] from source: 23.21.179.98, port 80, Friday, March 14, 2014 13:57:06
 

It is another clould service company. I guess that is how Aaron does his business. He gets all these accounts at cloud service companies and uses their ip’s. He probably chains them.

I dont know and really dont care much. What http://timetravelinstitute.com does mainly is for harassment and chastisment. Being they are the cowards they are that is there game. I still get a laugh at how it takes 20 of them to fight 1 of me. As I told those cowards “Pamela from the titor story could kick their asses with 1 hand and both legs tied behand her back.” I laugh every time I write that in my blog. ITS TRUE!!!


On my time travel programming I have been under the weather the last two days running a slight temp but I did manage to get some work done. Im close to finishing up the first two routines in the program. 

What I am doing now is having it take a known check-sum and file size and reconstruct the program. All check-sum construction programs that have a snow ball chance in hell of doing what I do have to meet this first requirement. If it can not reconstruct a known check-sum chances are it wont reconstruct a un-known check-sum. So with my book program I am setting it up to construct known files first. Then move on to sending it un-known files.

I also through out the SHA1. I came up with my own algorithm for a strong checksum and its strong enough to use to construct files but at the same time I can also use it to measure how far away from a real check-sum reconstruction I am. I already have been running parts of the program testing stuff out and so far so good.

Well I need to get to bed. By next week I will start putting parts of the drone together. I want to have it done by this summer but knowing me I will drag it out longer.

Oh, I have to go back and correct the spelling mistakes sentences. Please forgive for now. 

March 19th, 2014

I was holding off making another entry for a while. Mainly because I have been busy. But, I needed to get this entry in because in the news recently is new evidence supporting the big bang theory and every more evidence that multiverses exist. It goes on to support Einstein in his theory of gravitional waves. And, again, giving even more credence to my time travel theory laid out through out this blog about conspiracy, time travel, and attempts for what ever reasons to cover up the truth about my method of time travel. 

So, again with the new evidence hitting the papers to support Einstein’s gravitational waves and more support for my theory of my method of time travel I just have to say “Excuse me public but I am about to become my rowdy rebel self again.”

To the http://timetravelinstitute.com (Ray aka Rainman, Darby, and their dogs.) IN YOUR FACES YOU DOPE SMOKING, BONG SMOKING, COCK SUCKING, THIEVING, COWARDS, CHILD PORN PERVERTS, PAMELA FROM THE TITOR STORY COULD KICK ALL YOUR ASSES WITH 1 ARM AND BOTH LEGS TIED BEHIND HER BACK, PUSSIES!!!!!!!!!!!!!!!! 

YEAH!!!!!!!!!!!!!!!!!

And oh, lets not forget these guys are also TROLLS, THUGS, AND RODENTS!!! 

These guys have no level for how low they can go. That is why my language toward them is so strong.

They hate it when I do that. But, this all started when Darby chased me down after I left http://timetravelinstitute.com as Reactor1967 and informed me that where ever I am when he can he will censor me. And Ray told me he was stalking me. His words to me was “We are watching you.” So, yeah my language toward them is strong and will continue to be that way FOREVER because of their behavior toward me. They asked for this. They should be more careful in the future what they ask for.

So, where does this put me with the gravitional waves being discovered? This support for gravitational waves in the scientific community and media? Right where I have been all along. 

1. That time never ends or begins like matter and energy it is conserved.
2. That all information exist whether or not it is material in our physical universe.
3. That with check-sum hacking and data minining a check-sum counter it is possible to get information from the future, past, or other time-lines.
4. That time travel is the transference of information from the past to the future. From the future to the past. And, from one time-line to another time-line.
5. That my method of time travel is real. And, not just my method but my numerical system BNS as well. Which was the beginnings of me developing my method of time travel.

There is of course more but that is my major highlights. Some may have noticed I went back and deleted what I wrote about my nuclear powered stealth drone that I am building. That is because I moved that information someplace else. This is a time travel blog about time travel and the conspiracy against time travel. So, I knew it really did not belong here so I have it its own home someplace else.

I have been studying here and there in my private time on the things that Aaron did to get into my computer while I was talking to him. First as I said he used a typical hacker ploy. 

1. He got me to talk to him any way he could.
2. He got my IP address
3. He scanned my home network using that ip address.
4. He deployed Rats (Remote Administration Tools Software) onto my family’s computers. Even looking at my 7 year old girl on her web cam. Hence now I call them child porn perverts. 

What a Rat does is send the screen the user is looking at back to the hacker. It also turns the web cam on and sends that input back to the hacker. And, it records the strokes on the key board. It also gave Aaron access to my hard drive. He was looking for my time travel software but since he did not get that he took copies of the material I was writting for my books to commit copyright infringment of my work and stole my passwords using them to un-lawfully gain access to my accounts and he fraudentually used my credit card. AT WAL-MART if I am not mistaken. When I called these guys COWARDS AND THIEVES AND PERVERTS. YES, THAT WAS VERY TRUE. DARBY AND RAY, YOU GUYS ARE SICK IN THE HEAD. YOU GUYS ARE VERY SICK PEOPLE. None the less. You have not stopped anything. Most of all me!

Rat software can be deployed through port 80 the web browser. Which was one of the ports on my network they the people Ray and Darby sent after me hit the most besides others.

So, in the past when I first started blogging about http://timetravelinstitute.com I called them rodents. Now, since then they have lived up to that name. Since http://timetravelinstitute.com sent hackers after me deploying Rats on my network they Ray aka Rainman and Darby and their dogs have made the term RODENT or RAT EVER MORE THEIR OFFICIAL NAME. THEY MORE THAN PROVED THAT WHAT I WAS CALLING THEM WAS TRUE ALL ALONG!!!!!

Well that is my post for today. Everyone that follows me except the conspiracy against time travel take care. This next week I may not be posting very much for personal reasons. I will be back soon. Until then I will be working on my projects.

March 20th, 2014

I ment to put this in the last post. When Aaron from Bedford, Ma whos parents are Gary and Suzzanne owners of a technology company Bedford. His sister is Ashley who works for a parking garage in Bosten as its manager. Anyway when Aaron and I were talking and he had my trust he told me he wanted to stop talking with Gmail and use Thunderbird so we could use encryption for our emails. Well Aaron sent me his key. I installed it. This week I was doing some clean up on my laptop and I found the virus Aaron gave me. You have to click on the pic to make it larger.



 So, anyway I guess he was having trouble getting into my laptop and worked up his little plan. I have the virus saved and I am forwarding it to the FBI along with another FBI report against Aaron. I may even file another police report. This one will be with the Russellville,Ar police department. I am saving the virus and the key he gave me along with the installation files to a CD. I will make the files downloadable for the FBI.


So, Aaron is more likely than not he is a admin at http://timetravelinstitute.com at the time I was still a member there as timecrime1986. This proves that
TIME TRAVEL INSTITUTE DOT COM
IS AN ATTACK SIGHT!!!!!!!!!!!!!!!!!!!!!!!!
Again, http://timetravelinstitute.com IS AN ATTACK SIGHT!!!!!!!!!!!!!!!!!!!!!!!!!!!!

There you go. I help the conspiracy against time travel dig their own graves when ever possible. And, they are doing a good job of that. 

My Alienware was where I was doing my programming. I hope he did not get too much but now at this point I can not say for sure what he got. I know he did not get my main code but it is possible he could of got what I was programming. Which, glad to say if that is the case he only got bits and pieces because I never worked on the whole thing at once. This time travel stuff with information is very complex. It is a mathematically built structure whose sections have to work with other sections of the structure. What ever he might of gotten would of been bits and peices of structures but never the whole thing all at once. But still enough for someone much smarter than he (Aaron) to figure it out. God knows Darby and Ray are too stupid to understand it.

I am amazed at why the FBI and Homeland has not raided him and taken him in for questioning. Not only did he violate my kids by connecting to their web cams but I never spoke about my wife. She has a web cam too. Then their was the fraud and other crimes Aaron and his friends from http://timetravelinstitute.com commited. 

Then now I discover he gave me this virus. And what bothers me is WHY THE HELL DOES NOT THE FBI AND HOMELAND FIND OUT WHAT THE HELL HE WANTED WITH TIME TRAVEL TECHNOLOGY. WHAT http://timetravelinstitute.com WANTED WITH TIME TRAVEL TECHNOLOGY!!! AND THEY DONT LAUNCH AND INVESTIGATION TO FIND OUT??? WHAT THE FUCK IS WRONG WITH THEM???

It is bad enough these guys from http://timetravelinstitute.com commited real crimes against my family and myself  and they the FBI and Homeland dont give a fuck about that but they could at least find out what these guys wanted with what they stole from me and what their intentions are with that information that they stole off my computers. I am working of TIME TRAVEL TECHNOLOGY AFTER ALL.

Who did they give it too? Did they sell it? What did they do with it? WHY DID THEY WANT IT? WHY DID THEY GO THROUGH THE TROUBLE TO GET INTO MY COMPUTERS? AND THE FBI AND HOMELAND DONT CARE? This does not make any sense.

Any other country would of been on this like stink on shit. I pretty much gathered that the authorities don’t give a shit about protecting the public it is only their public image they protect. 

That is why they only work hi-profile cases and everyone else is shit out of luck.  I guess I dont have enough money are I am not in a high enough political position or maybe I just don’t have the right job in society to make it worth their while. Maybe I should be female instead of male. My daughters are underage females and still that was not enough for the FBI to do anything. Maybe my kids don’t have enough money are maybe my kids are not high enough in society to involve thier time.

It is damn obvious my status as a USA citizen does not mean a shit to the FBI or Homeland. Their mission is to project the public. THEY HAVE DONE NOTHING ABOUT THIS CASE!!! NOTHING!!!

If the FBI and Homeland were going to do anything or find out anything they are fast loosing ground by letting the time go by without checking this out. By now Aaron could of sold or given this information away all over the world. 

He told me he was writing his version of my work? WHERE DID HIS VERSION OF MY WORK GO? WHAT DID HE DO WITH IT? AND THE FBI AND HOMELAND DONT CARE ABOUT THAT?

Aaron contacted me in July of 2013. We started talking then. It is now March of 2014. He started hacking me 8 months ago. He hacked me by my account for at least 4 months before I was able to start putting protections in place which he still bypassed.

The virus Aaron gave me collects passwords. If it only does that then I am ok. If it is a key logger then maybe not. I am going see if I can find out more about this virus Aaron gave me.

On Russia Putin said he was not worried about the west because WE DO NOT HAVE ANY LEADERS. Since the FBI and Homeland refuse to investigate my claims I am beginning to believe Mr. Putin was right about the west. Hell, we let hackers violate our children and steal one mans life work involving time travel technology and commit fraud and wire tapping and other crimes and we just let that shit slide right on by.  No wonder the USA is shrinking in power and status across the world.

March 22, 2014

One of the reasons a while back that the conspiracy gave me for saying my work was bull shit was not being able to prove immediately that the information was from the future, past, or other time-lines. That falls into the science of Chronometric dating.

In archaeology and geology they have methods for the absolute dating of what they find. But, with time travel with information it is very hard to immediately  date the information found. To find out how far in the future it came from. To find out how far in the past it came from. To find out where it came from. And, if it is from another time-line then well the dating process gets a lot more complexed and involved.

When information jumps time-lines then comparisions have to be made about what in common that other time-line had with our time-line. Did it follow are time-line to a certain extent then break off or was this a whole other time-line all together. 

Then there is the fact again where in space-time was this time-line when it existed. Now, since our universe is constantly coming and going from existance then determining that could be impossible.

How ever the successful the dating process or the failer of it this in no way does not mean that the information found is not worth anything.

There was the fact that I said that if temporal communction was being used with this process with time travel with information then it is possible that quantum verification codes in all their complexity could be used in the communications. Finding ways to design quantum entanglement into messages from the future, past or other time-lines. 

March 27, 2014

Well I took a few days off and went camping. I noticed my international readership has once again picked up. Internationally I get more traffic than I do for the USA. 

I was going to talk tonight about my new stuff coming out to look for time travel computer media. My new stuff is so good that I can actually mathematically predict where on the binary counter time travel media will be. 

Now that mathematical prediction is a check-sum range but this check-sum range is different. This check-sum range is only used 1 check-sum at a time instead of searching 1 check-sum for days, weeks, or months.  Now, I construct 1 file with a check-sum and move on to the next check-sum.

It only takes my computer a few minutes to less than a hour depending on how large the file is to construct a single check-sum to a time travel media file. Mainly now because I have my counter throttling down to a art now. I can control the speed of my counters making it possible to do what I do on a desktop instead of a mainframe computer.

Now, I can move through a entire check-sum range much more quickly than I have in the past. My data mining search bots are happier too. Now I don’t have to work the shit out them searching for time travel media.

I still setup my my configuration files and start up my new programs and it starts at the 1st checksum within that range and constructs that computer file. My data-mining bots look at the file and my counters move on to the next check-sum.

Now, the thing is I know longer have to search a single check-sum rolling one check-sum collision after another until I find time travel media. But, this last method is still valuable because you really never know what your going to find with this method. This method is still very valuable for me and I will continue to use it.

Now, I have gotten good enough now that I can actually construct 1 check-sum at a time now and move on to the next check-sum until the entire range of check-sums are constructed.

Now, to do this I had to use my own mathematical skills to design stronger check-sums. Strong enough to represent a single computer file but weak enough that the check-sum can be used to re-construct that computer file. If that computer file is from the future I will do my damn-est to find out. This is why this is time travel with computers. Finding computer files from the future, past, or other time-lines.

So now I truly HAVE GODS DATA BASE for my personal use more than ever before. Better than before. Faster than before. What I was using before did work but now I have improved my software once again. As that happens with all software when it is in constant use. The programmer constantly updates that software making it better, faster, smarter, and easier to use.

So, that is what I have been doing. I was thinking about using my new software for my book which was why I updated it in the first place but now I am having second thoughts. The book will still go through but I was thinking about keeping my new software for myself and put my old software in the book. Either one will work for finding time travel computer media. My data-mining bots for now are pretty much the same.

On my data mining I still look for this things when searching for time travel computer media.

1. File formats

2. Spell checking and syntax checking. I can do this for binary as well as for text. Binary checking is also one of the ways I can repair files that are poorly constructed. 

(I can roll the bad bytes to good bytes and use my binary checking to tell me when my file is cleaned up. And, this can be done with text files too. Text files that have missing or blanked out pieces can be reconstructed this way too. Now, this also leads to many files that look the same but or not the same and only one of them is the real file. But, the real file will be there none the less)

3. I graph the information contained within the file and look at the curves. Using the curves I can tell if I found something or not. Now, on my graphs yes it is possible for me to pull the information into a third party file but a lot of times I assign my numbers + or – with a base line and use a unit of measurement beside my numbers. I also also have my software compute what type of curve it is and tell me. Yeah, its cheesy but it works for me. I learned to do this from my day trading. I had to go through and get my averages for a security I was trading then use my calculator to compute a short average crossing over and under a longer average. So I put that to use in my data-mining bots. I can look at the numbers and see what type of curve I have.

4. AI file recognition. This is like facial recognition but the AI looks at it to see if it looks like a good file.

5. There are statical methods like nearest neighbor method and root mean square and standard deviations. 

The nearest neighbor method is often very helpful for data mining time travel computer media. Even totally different files can look similar. Take humans. Look at one human and look at another and they look similar. Computer files are the same too. This method can be used for data-mining.

Other methods I have been working on.

1. Quantum entanglement and quantum codes being used in messages from the future or the past. Here methods for observing quantum entanglement and using that to construct codes that can be embedded in messages and videos and set up my time travel computer media searches to look for these codes.

2. Real time file construction or as as close as possible to Real time file construction for communication with the future or the past. My new methods for finding time travel media is getting very close to this goal of real time file construction of check-sums.

3. Taking the time travel media and constructing time-lines. Each file having its OWN TIME LINE FOLDER.

4. Dating the information that I find. Developing methods to date that information in the time-line that it came from.

5. Organizing the time-lines into an organizational system so time-lines can be researched.

Some people have questioned if the past or the future really exist. My method of time travel is more proof that the past, future, and alternate time-lines really do exist. It is also proof that time-travel is real and that time travel really does exist.


My conspiracy against time travel talk for today.

Ray aka Rainman his most hated nightmare is that someday the scientific community will believe me that my method of time travel is real and does exist and that I will get credit for my discovery. Well I hate to tell Ray this but his nightmare is real. Now, Ray is still working on that discredit part that his why he and his pals do everything they can from keeping my post off the forums, and groups.

There is a lot more here at stake than Ray aka Rainman trying to get revenge on me for not leaving the Internet when he ordered me to do so. That is also why they Ray and his pals are stealing and plagiarizing my work. But, his ultimate goal is to keep time travel from the public and the scientific community. Which is the reason I call him and his pals and http://timetravelinstitute.com the “Conspiracy Against Time Travel”. They are trying to kill the greatest discovery of all time. TIME TRAVEL and keep its inventor Lloyd Burris from getting the credit for it.

When I came home from camping I logged into my router to see if Aaron had paid me a visit. My router was clean. Now, I did not check the outside of my network just the inside. On my logs I log where my Internet comes in from my ISP. I log before my firewall. I log after my firewall. I also reinstall my firewall from time to time.

I found out how to change my mac addresses as well as my IP’s so the next time I do a switch up and go to a new IP address all the mac addresses will be different too. Though if one of our computers is still running one of Aaron’s net bots that will not help us any. But, this will help me confirm if there is still a net bot present on my network.

Before I left the time travel institute dot com the first time not the second when Ray aka Rainman and I were not getting along because he was trolling his membership there and everyone was tired of him Rays administers told me “You can be his friend or his enemy and you do not want to be his enemy.” I know now they were threating me when they said that too me. That is another reason why their site should be taking down.

And, now on that note these guys still aint got shit still can not do shit to me. I am still posting and posting and posting.
And, yes these guys may track me down on the Internet a good part of the time but there are times when they fail to catch me posting. Hey Ray, your not getting your money’s worth out of Aaron he is slacking up. You need to cut his pay. 

Hey Ray, are you and Darby financially supporting Aaron too? You might as well every one else is? 
BAAAAAAAAAAAAHAHAHAHAHAHAHAH!!!!!!!!

Maybe you guys (talking to http://timetravelinstitute.com) are finally getting the message that I am here to stay. Time will tell. Well this is my post for today.

March 28,2014

I spent today drinking coffee and programing and watching tv. Actually I would watch tv for a while then pause it (I have dish DVR) then program actually debugging then watch tv some more. I was putting my new code through its paces and trying to find any errors that might exist. I did find one error. I got it in a loop it would not exit from. I got that fixed. I was adding the cout.precision and myfile.precision statements into my code. In c++ that takes numbers out to a specific length. I do not much enjoy looking at scientific notation when I program I like to see a good deal of my numbers.

Before I started programing today I have my code in encrypted file containers. Well I forgot the damn password. I spent over a hour trying to find the password. 

I wrote a list and entered every damn password I use in different combinations and tried everyone of them before I finally remember the password and it was not on the list. 

It was a whole new one I thought of. I was sweating and stressing out like hell for a while. I got to try harder to remember my passwords. If I had not remembered it I would of rewritten all that damn code if I had too. 

The code I have now is rather long. It still looks a lot like my firecodes over at sourceforge but it works nothing like firecodes at all. Oh, I still get a weak check-sum and weighted check-sum but other than that it goes way totally in a different direction than firecodes did.

My new shit is so good I actually started getting the shakes wondering “WHAT THE HELL HAVE I DONE”.  I was tempted to email Darby and Rainman my programs today but I know they dont give a damn about time travel all they care about is causing trouble and stealing from other people. 

They are satist I have come to learn. Mainly they are Internet marketers and trolls not men of science. They run a time travel forum but it is a fake forum for running adds so they can make money off advertisements and selling Titor stuff and finding new people to pray upon. Because they enjoy that sort of thing.

The reason I was tempted to email them because they keep calling my stuff bull shit. They are full of their own words. They are the ones full of bull shit. But, they did not understand BNS so they would not understand this either. 

And, they would use it against me. There goal is disinformation because they are disinformation agents. I still think these guys might be working for the CIA. I know Darby said he is retired from there but I am not so sure.

My old code was good but it took a while to find stuff. But my new code kicks ass. In my counter development I have gone through basically 3 phases of counter development.

1. Smart counters.
2. Speed controllable brute force counters and smart counters.
3. speed controllable PRECISION COUNTERS, speed controllable brute force counters, and smart counters.

My speed controllable precision counters is my new counter. This baby using my new check-sum algorithms takes a check-sum and quickly creates a file for that one check-sum. 

And, IT DOES IT FAST. The beauty of this thing is when I do my math to calculate where I am going to search for time travel media files now my check-sums are MORE PRECISE. MORE ACCURATE. AND MY RESULTS COME FASTER!!! 

All because I have gone from using weaker check-sums to stronger check-sums with my speed throttling of my counters.

When I first started all of this it was hell at first finding good time travel media files. I worked my ass off with my smart counters. My code was way more complex than it is now and the quality of my files took a lot of work. 

I mean hours upon hours looking through thousands of files manually before I got my data mining bots up just to find 1 good time travel media file. And, my smart counters where not always as smart as I wanted them to be. 

I worked my ass off going from one counter to another trying to find the right counter. There was one time I spent a few months programing just to scrap the code and start on a new and different counter. It was a lot of work.

Then I got my speed throttling going. My counters improved. I got better at mathematically predicting where my time travel media would be on the counter. 

But, It was hell playing with the speed of my counters to get things right. I learned how to use my data mining bots to help me control the speed of my counter even employing my AI to help me control the speed of my counter.

Now, I upgraded how I use my check-sums. I do not truncate my check-sums to a specific length. And I use methods now that get a damn strong check-sum. And, I can use these strong check-sums in my math calculations when mathematically calculating where on the binary counter time travel media files will be.

Now combining my precision counters with my counter throttling (controlling the speed of the counter as it reconstructs a time travel media file) OH MY GOD I HAVE TAKEN CHECK-SUM HACKING TO A WHOLE NEW LEVEL.  

Time travel with computers is getting a whole lot easier for me.

Before it was hell for me to construct one good time travel media file. NOW ITS LIKE TAKING CANDY FROM A BABY! 

Now when I get done with this I need to add really good search engine technology to my programs. I need to take my math calculations that help me tell on the binary counter where time travel media files will be and now I need to build a search engine that can work with my precision counters. 

WHO THE HELL NEEDS THE INTERNET WHEN ALL OF TIME AND SPACE CAN BE USED TO SEARCH FOR INFORMATION!!!

Don’t worry. If http://timetravelinstitute.com has their way about it mankind well never know of my accomplishments. I’m going to finish up getting my new code through its paces then start on my second book as well as get my damn drone built. Then I need to get my search engine going and work on my other advancements. 

Well I have to get to bed and try to get up in a few hours. This is a night (actually its early morning) where I think I will open up a alcoholic beverage and laugh my ass off at http://timetravelinstitute.com while looking at some time travel media. And no Arron that computer will not be on the Internet. At least Aaron gave me my lesson in Internet security before I got my new shit up.

March 31, 2014

Well, I have been busy. Mainly programming. I did discover a new bug in my new time travel program that I have to work with. In the past I always get my files at a specific weak check-sum when building a unknown time travel media file. 

Well now I am working with strong check-sums. But, I found I need to work a little bit more how I build a file now because my strong check-sums can have different weak check-sums. So, If I try to use the same weak check-sum all the time then my program has a problem getting my strong check-sum to its precise target value. 

What is more when I pick a strong check-sum for my program to use I have a general ideal what weak check-sum it should have but not a specific ideal about what it should be. It was a variance I let slip my mind when planning out my new program. I guess I am working too hard on it. I assumed or thought I could give it a starting weak check-sum and it would stop on its target all the time. Well that is not always true as I found out.

The reason I did not see this before was because I was using it to construct known media files. When I started hard and heavy constructing the unkown time travel media files I discovered a error in my loop trying to get my strong check-sum to its target value. The reason it was having problems because the program was trying to construct the wrong weak check-sum for the strong check-sum and it was off enough to prevent the program from finishing its file reconstruction. Which, I had not planned for.

So, I need to find a way to let my weak check-sum float as my program constructs the file. It will be in my next upgrade after my tempory fix. I will sit down one evening with my pencile and paper and work out the algorithm details mathematically.

But, that has not stopped me. What I will do is have a minimum weak check-sum and if my program fails to meet its target strong check-sum it will increment the weak check-sum and try again with the same strong check-sum. This is the fix I will use. Now after debugging and writting all that code some 1500 lines of code not counting my data-mining robots. That is just the counter. I will get “er” done.

And, earlier in my blog I was bragging. I opened my mouth too soon but my shit still works.
 Now when my program runs it adds a certain number of bytes per pass to the counter. This is where the counter is BUILDING A REAL TIME TRAVEL MEDIA FILE. 

This is called the speed of the counter. The more bytes added to the counter the faster the counter reconstructs a time travel media file. It is why I can do this shit on a desktop without using a mainframe.

Now, here is how my new program works now.

My strong check-sum looks something like this.
239874328.29384738
My weak checksum
90548

So, when I start building a file I do this

Program says
File reconstruction started.

pass 1
current              Target
3387.9238         239874328.29384738

pass 2
current              Target
98347.9873       239874328.29384738

pass 3                
current               Target
898789.8786      239874328.29384738

pass 4,5,6…….

pass 15873
current                       Target
239874328.29384738 239874328.29384738

File reconstructed successfully

current weak            Target weak
90548                       90548

Then my data-mining robot steps in
program says
processing file
file passed test and was saved to media folder
        or if the file is bad.
file rejected and was file sent to trash folder 

Then another strong check-sum is given to the program and the process repeats. But, now this time I have to use multiple weak checksums when data mining for time travel media files.  Until I learn how to make my weak check-sum float during file reconstruction.

My question for the conspiracy against time travel when they said my programs were bull shit. WHAT THE HELL IS SO HARD TO UNDERSTAND ABOUT USING CHECK-SUM HACKING TO FIND TIME TRAVEL MEDIA FILES??? YOU GUYS SURE ARE STUPID. (TALKING TO THE CONSPIRACY AGAINST TIME TRAVEL.) PROOF IS IN THE STUPID SHIT THEY DO AGAINST ME. LIKE THAT CRAP AARON HINIKER FROM BEDFORD, MA PULLED. 

On the subject of time travel before I go the problem people have with what I do is they

DO NOT KNOW THE DIFFERENCE BETWEEN TIME TRAVEL MEDIA FILES AND COMPUTER GENERATED MEDIA FILES.

And, to make matters worse if the media file is a altnerate reality file then someone can point at it and say “YEAP THAT IS COMPUTER GENERATED NOT TIME TRAVEL”. ITS BULLSHIT!

So, lets say my computer spits out a cartoon. It has a copyright date from the future. It has a company on it that DOES NOT EXIST AT LEAST NOT YET. 

Now, it is a cartoon but it has legal markings of a traditional cartoon. IS THAT TIME TRAVEL OR IS THAT COMPUTER GENERATED?

Well the conspiracy against time travel from the fake add supported http://timetravelinstitute.com those thugs, trolls, INTERNET CYBER MAFIA, CHILD PORN PERVERTS, those satist would tell you its bull shit.

But, now step in Mr. Scientist who is not emotional and does not care a damn about me. He looks at it and is well versed in the subject of time travel. He would say “PLEASE LET ME STUDY THAT FILE”.

You see, earlier I talked abou peole who dig things up out of the ground for a living. THEY DATE WHAT THEY FIND. I organize what I find and try to date it if I can. I study it.

Using computers to search for time travel media files is no different than the scientist that digs up stuff out of the ground. It is a way to study the past. It is a way to study the future. It is a way to study other time-lines. It is a way to search for new technologies and see new entertainment and visit other places in space-time that we can not yet get too.

It is a way to study ancient documents long dead and gone. Its a way to study documents and media from other civiliations from any point in space-time.

It is a way to study history past and future. That is why I call this time travel.

April 03, 2014 

I got my check-sum patch implemented in my code. Now my Time travel code is back to normal. 

The reason for the patch is I am using a strong check-sum range now for my time travel searches where before I used a weak check-sum range. 

So, with strong check-sums when I am constructing known computer files from a weak check-sum. I know what the weak check-sum will be. 

But, when constructing unknown files from the future, past, or other time-lines with strong check-sums I have to find the right weak check-sum so my strong check-sum will work. So, this is how I did it.

The files I use to construct time travel media from weak and strong check-sums.

1. Counter file (This is created with a specific weak check-sum)
2. Speed file. This is the file I add to my counter to build my computer files. It is how I build large files in a small amount of time. The speed file is how many bytes to add to a file at a specific time WITHOUT CHANGING THE WEAK CHECK-SUM.

So, I have add a new routine in my code. When my counter passes its target strong check-sum but does not come to its specific check-sum I know there is a problem. My routine I call bumps up or down the weak check-sum of my counter file. My speed file is un-affected.

Now, this is not perfect because the counter has to be at a specific byte order. But, that problem is taken care of by just letting the damn thing roll over if necessary to find the correct byte order.

Now, The speed file too is also bumped up or down to control the speed of the counter as all this happens.

My algorithms monitor this process until my time travel media is constructed sucessfully.

RAY AKA RAINMAN, DARBY FROM THE HTTP://TIMETRAVELINSTITUTE.COM YOU COCK SUCKERS EAT YOUR HEARTS OUT. Im still on the interent. I am still time traveling. You have not done anything. BAAAAAAAAAAAAHAHAHAHAHAHAH!!!!

Well I have work to do. I have a hardware project to go work on along with my TTI stuff. Everyone take care. Reactor1967 over and out.

April 5th, 2014

Well today I sat down with my paper notebook and a calulator and a pen and worked out an algorithm to directly convert my strong check-sum to a weak check-sum to speed up my precision time travel media search programs.

Basicly how I do it is when I construct a strong check-sum range for the time travel media I am constructing I also construct a weak check-sum range for the same time travel computer media.

So, it was a matter of incrementing my strong check-sums and finding out what weak check-sum they belong with to write out my algorithm.

Using this I constructed an algorithm to do the conversion. Now, when I setup a project I always will have to know my first weak check-sum with my first strong check-sum. After that it is just a matter of running my algorithm to do the conversion.

Now, I can brag again that finding time travel media of the future, past, or alternate time-lines is again like taking candy from a baby. I did not run my programs long enough when testing them last time and my results were skewed because I had a pretty good ideal of what my weak check-sums would be. But, when the real testing hit I found my error. But now I have it worked out.

So, for I think I have it under control. I know my attacker/hacker Aaron could not of figured this out. He thinks he is so smart but he can not even understand the simplist of algorithms. When the shit hits the fan that guy aint got shit. 

Hell, he has trouble just functioning at home. If he lived in the real world he would be eaten alive. I could see him throwing his 2 year old baby fits at work and getting fired because he can not understand how to work with people. 

That probably came from his parents Gary and Susan (I spelled her name wrong but it is close.) not teaching him how to work and respect others and not giving him enough spankings.

So, now he spends his days looking for underage pre-teen girls in front of their web-cams and trying to convence people to give him money or set them up so he can hack their computers and rob them of their credit and lifes work.

I decided that Darby and Ray aka rainman of the http://timetravelinstitute.com must of been paying him to do what he did. If not then that kid is more of a fool than I previously thought. 

A kid with folks that have money but he himself can not make money except to steal it from others. Along the way engaging in a way of life that in most nations would land him in jail or prison, get his hands cut off, or get him hanged or shot for his crimes. 

What he does not understand is where will his way of life get him at the end of his life. He is still a loser living at home as a grown man with his parents. Most women looking for a husband would not have him on those grounds. But, as long as momy and daddy pay his bills I guess he does not give a shit.

You have a nice day sleeping in all day today Aaron after staying up all night. your earned it being stupid just like your friends are stupid. When your 45 and do not have anything you will have no one to blame but yourself.

What he does not understand that in this world all people have at the end of the day at the end of their lifes even with their family and friends is themselves to depend upon. Because people will leave other people out to dry quickly in a heart beat. 

People come and go from a persons life and in his life when his friends move on he will have nothing to show for what he has done. And that includes his forum friends. Push comes to shove they would turn him in to serve time in jail or prison before they themselves would serve that same time.

And, when it comes to money even though he does not believe it he would also loose in that situation too. Oh, they might drag him for a while but eventually he would be cut loose.

So, my so called fake friend and pal Aaron is a traiter, theif, and a fool, as well as being stupid. And, like his friends he is also a coward. 

He is way much worse off than Darby and Ray aka Rainman of the http://timetravelinstitute.com . He is almost as bad off as Grayson is. Grayson is so bad off I do not even bring his name up very much because he is so wrong as a person his name does not merit mention. 

Aaron is almost to that point. It was merely for the fact that I want to expose his crimes to humanity that I even talked about him at all in the first place. What I am doing for Aaron is given him the spanken his parents never did. He needs his lesson as well as his pay date with KARMA. At least if he approaches someone in the future the way he approached me and they google him there is a chance they will find my blog and read about his hacking operation he did with me and not fall for his shit. 

By posting this information about Aaron I may help someone else in the future.

I have a feeling Aaron Hiniker of Bedford, MA you and KARMA might have bad date in the future. If I hear of it I will laugh my ass off because you deserve what ever you get and give to others at least 10 times over. So, my laugh would be like this for you:
BAAAAAAAAAAAAAAAAHAHAHAHAHAHAH!!!!

Now, the boy does have computer skills. If he did decide to get his life straight he could land a real job. But, not by posting on the internet for his work. 

He would have to get in a real car or take the buse and go fill out applications and look for a real job. Even move out of state if necessary. 

He could still use the internet but that should not be his only means of searching for employment. Most employers do not look at all those applications.

Most of them work off what they have in corporate because they know those people are close and can be quickly contacted and interviewed. 

Most employers hate internet applications even if they accept them. But, for Aaron Hiniker of Bedford, MA just getting up early in the morning to look for a real job would be way too much work for him.

So, Aaron Hiniker of Bedford, MA still remains a stupid fool drop out and a loser. A mere pawn for Dary and Ray to use as they wish. A fool to the end.

Well I have to go. I hear my computer alerting me to a new found time travel media file of the future, past, or alternate time-lines.

Before I go one other thing for today.

I also found when I set up my time travel media search projects I can create a lookup index for the range of strong check-sums I will be reconstructing for my time travel media. So, instead of using my conversion algorithm my lookup chart can be used. So, I have now about 4 or 5 ways to handle my weak check-sum problem when constructing my strong check-sums.

All these years looking at time travel media I am ready to answer the question for mankind again. I have talked about this before but these are my thoughts for today. 

So, How will it end for us mankind? 

Well, we could still make it to outter space but that effort is hampered by the need for an economy and a military. 

Largely technology for the public is held back to make a long story short so that people and corporations can stay in power and the military wants the best for themselves so they can put down any public unrest or defeat an enemy.

Im not saying it won’t happen it will just happen very slowely if at all. Space-travel for the masses will be a long time coming if at all.

I once in my time travel media saw California get wiped out a earthquake at sea. I have pretty much seen it all as for natural or man made disasters.  

What I have come to know and understand is that something Im not sure what will reduce our 6+ billion people on earth to less than a million or to less than a billion at some point in time. 

There is no way to stop it. There is no way to prevent it. It is just going to happen. It can’t be stopped. Some of it can be delayed like earth getting hit from space science is a working on ways to stop that but not everything can be stopped. So, it is a 100% certanity that most of mankind on earth will get wiped out at some point in time. And nothing can stop it. I can’t stress this enough. Nothing can stop it.

All everyone knows and understands will one day come to a stop and mankind will once again have to rebuild from scratch if that is possible. So, it is good that people archive technology and seeds and that we still have libraries with books. All this Internet and computer stuff will one day be junk. Scrap metal for swords once again. It is just simply speaking the cycle of life. Nothing personal against any one. Religious people try to make it personal. None of this is personal. None of this is caused by our sins. It is just the way the universe works.

When it comes it might be a man made or it might be a act of god. With climate change it is a good bet it might be man made. But, please every one must understand. It is going to happen. And, not to piss of the religious people it will probably happen before Jesus Christ comes again and no it is not part of a plan it is just the way nature works. It is the way the universe works. So, for all those preparers out there and survivalist keep on doing what your doing.

On the survival ways for mankind to live on. The way to survive on earth would be to survive like we would in outer space and not just in space but on other worlds where the environment is not friendly to life. But, that is not practical for a everyday way of life for the billions that already live on earth. Most people do good just go get a clean drink of water and some food and a place to sleep. So, that is not practical.

Well governments are building underground cities and there are bunkers but the need for a long term food supply, long term water supply, and long term something to breath that can be maintained over generations of life would be needed. Yeah, that kinda of technology would be needed on earth in the long run during events where the sun will not come out for years and so on. Or when tempatures start going way below freezing or way above 130 F. Only the the best technology can help in those situations. Most people will be SOL.

O
nly governments build the type of places where people can survive very long term during an extinction event. People do not have the resources or the technology to build long term environments. But, to save mankind that someday will be needed. As well as ways to maintain science, technology, research, and advancement. Access to resources have to be maintained too and the manpower and equipment to work those resources. 

But, for now everyone is only concerned for the economy and the next Iphone and their favorite tv shows. So, most people will be screwed when the end nears. 

The only thing that will prevent this is for mankind to stop fighting and holding each other back and work as a group to save our own asses.  There is a reason civilizations develop the means to leave the planet. What I am talking about here is why. 

Now, if you talk to the conspiracy against time travel they will tell everyone screw this stuff I bet Reactor can not give us the score to the next football game or tell us what the stock market is going to do. 

As the “Conspiracy against time travel” tells the public some times when I post in the forums right before they delete my post and get me banned for talking about time travel and the conspiracy against it.

That would be “Darby Phillips” and “Ray Hudson” of http://timetravelinstitute.com but they use a lot of people like Aaron and Grayson to do their dirty work for them. That is why I call them cowards. They can not fight their own battles.

No, none of the shit those cowards tell people on the forums matters worth a damn really if everyone wants to know the truth. All through out my blog I have laid out my research and my work EVEN WROTE A BOOK TO START HELP EXPLAINING IT. No, Darby and Ray are just plain wrong and I think they know they are wrong.

Getting back on topic (Yeah I ramble a bit. I give the insomniacs something to read when they can’t sleep. Hahah.)

No one gives a shit about what their government is doing and what will happen in the future. At least for most folks. And, that is ok, Budda (That is my religion) tells people to live for today never think about the past or the future. And, I have come to learn that time and events will always repeat themselves and in infinite combinations. All that can happen will happen and come to pass and happen again.

So, I guess everything will really be ok on the long run. But, when everyone’s shit stops working and they starve to death or take their own lives at the moment when that shit happens that shit will suck a big one. 

There is nothing anyone can do about the cycle of life. It just happens.

Here is my latest readership by country to this blog.
My all time readership is around 30,000 something people. Dary and Ray, all those forum banns and I am still talking to the public about time travel. You guys have not stopped shit.

United Kingdom 51

United States 42

France 19

Germany 15

Sweden 4

Brazil 3

India 3

Switzerland 2

Latvia 2

Romania 2 

March 7th, 2014

Today I can not help but think that when my blog was down and I was not posting anymore to the blog. That was in fact when Ray and Darby the guys I call the leaders of the “Conspiracy Against Time Travel” that is when they attacked me the hardest and the longest attack I have ever seen them pull on me. And, a internet hacking attack job at that with stealing, fraud, wiretaping, plagerism, and looking at my kids through their web cams as well as my wife involved.  They say take a picture it will last longer. So, I guess they is exactly what those guys did.

Also, case in point I do not believe most people would of fallen for it. I mean Aarons emails were pretty much laced with bullshit which screamed “Im up to something” though I went along with it out of curiousity. 
Those guys are so fucking stupid sometimes they have me on edge waiting to see what fucking stupid shit they will do next. It is kinda like watching laural and hardy back in the old days. With Ray being hardy and Darby being laural.

But, after I think hard about it I believe they were trying to get me to put my blog back up. To get me posting again. And, I believe if that is the case then they do believe I know what I am talking about with time travel. Though they still keep me out of the forums. Later I have some more transcripts to post about the forums but it will be a bit.

No, I do believe they wanted my blog back up now that I think about it.

Well I came home today I watch one hour of tv then I worked my ass off on running my time travel program. I found another bug. This one is a particular nasty bug. In my counter loop my count variable will not increment. I believe I have a stack overflow caused by my buffer which is preventing my count variable from incrementing.

I use a lot of memory in my program. The reason for that is I can choose how strong to mathematically make my check-sum. The more memory I use the stronger my check-sum. When I get it on my big desktop off my small laptop I believe my program will run better. It may be I over ran my buffer I do not know still have to finish checking it out.

I have the new ubuntu on my desktop but after Aarons shit it does not touch the internet. When I want to update it I use update offline then take the script to another computer on another machine and run the script to download the updates. I also install software that way.

So I previously wiped my desktop computer so I have to install rocks cluster again. I have 32gig of memory so when I get done my programs should run just fine again after I figure out what I did to my buffer to cause my count variable not to increment in c++.

Tomorrow is my Drone day. That is when I work on building my drone. See my other blog for that.

I started alternating on my programming work and my drone. One day I work on my time travel programming the next on my drone.

Aaron should not feel to bad about that drone. I was planning on building it before he came along. But, just like he motivated me to finish my first book he also movtivated me to finish my drone. 

I will have to be careful about the tech I put in it or I could get into really big trouble. Aaron, If  you really do believe I can time travel my question for you is why would you piss off somebody with unlimited access to technology and tell him about it and tell him who you are and where you live? 

You see when I call the conspiracy against time travel stupid. They really really are. Those guys aint got 2 cents of common sense between them. They really dont. And what is even more funny they think they are smart!!!

BAAAAAAAAAAAAAAHAHAHAHAHAHAHA!!!!!
BAAAAAAAAAAAAAAHAHAHAHAHAHAHA!!!!!
BAAAAAAAAAAAAAAHAHAHAHAHAHAHA!!!!!

Oh my god my ribs are hurting!!! Tears are rolling down my face right now.

Ok, I got that laugh out of the way. Yeah Darby and Ray you guys are really smart.Yeah, smart asses. These guys do not know their own butt holes from a regular hole in the ground. That is how smart they are.

BAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAH!!!!
Ok, I need to stop before I have a stroke or heart attack. When I think about those guys I can not but help laugh sometimes at them.  

Well, Ray and Darby I guess you guys missed me so yeah my blog is back. I will still be putting it up on a more secure site where I can control who sees it better when I get a chance but I have been so busy and it may be a bit.

Today after tomorrow I will get that damn bug worked out. I have went back into the code and I am testing every single line of code individually. 

Later I want to go back and put my new improvements in some of my old programs and dust those things off and upgrade them too. I want my new arsonal of my

1. smart counter
2. weak check-sum counter
3. strong check-sum counter

All upgraded and working better.

Well I need to get to bed. Good night everyone.

March 8th, 2014

Well I was tired when I got home and fell asleep but I really needed it. I did get up and laid my work out on my electronics bench for my drone work tomorrow and organzied it so when I get home I can start to work. I have some time off so I should get plenty done on my drone. On my programming I will hit that thursday afternoon for a bit.

On the conspiracy getting me banned on the forums I do not know if my post are getting delayed getting into the search engines or what but now it is taking them the conspiracy at least a week to find my post and about another week to get me banned. 

During that time I rack up traffic to my blog and websights. One of my forum post I made 2 or 3 weeks ago and they the conspiracy still have not found that one. But, these guys are still stalking me. I scratch me head a lot of days wondering what those guys deal is. Some people are just crazy as well as stupid. That pretty much describes the conspiracy against time travel.

Im getting my drone ready for the accident Aaron Hiniker said I was going to have. That guy should be more careful with what he says. Where I live when you threaten someone you had better damn well be ready to back those words up. My ex-brother in law one time had a guy pull a gun on him. Well the guy did not use it and went the rest of his life with no teeth after my brother-in-law throughly removed all his teeth rather quickly I might add. Shit like that is why it is best not to threaten people if you can not back it up with action. But of course my drone is purly for protection only. That means self defense only. Like I said I had planned to build it before Aaron Hiniker came along but he just helped me speed it up a bit.

In my spare time I have owned many RC helicopters. I was going to buy the parrot but since I am building my own their is no need. My drone will be way more cooler and will do a hell of a lot more shit. If I see a threat all I have to do is target it and give the response to the drone I want used. That response will be immediately carried out. There will be many different responses at my disposal.

My coolest device I will have on my drone is the inverted laser. Yes, I got that off my time travel media. It uses the surrounding air as the laser medium and causes light to be asorbed or emitted. It can combine frequency’s with the incoming light to change the incoming lights frequency.

Un-like normal lasers where the medium is on the inside of the laser and needs a lens this laser is turned inside out and uses the outside air as its laser medium. It uses its ability to control the energy level of the atoms in the air and causes the atoms in the air to change energy levels. 

When they the atoms change energy levels they emit light or absorb light. If the light is completly absorbed then the laser or what ever it is mounted to becomes invisible. 

Now, it can also change the frequency of the incoming light by merging it with another frequency of outgoing light and cause the incoming light to go into the ultra-violet range. In that range the light can not be seen by humans thus again the laser or what it is mounted too is invisible.

So, when the light bounces off my drone it will be at a higher frequency that can not be seen or will be absorbed and not bounce off at all. Thus the drone will not be seen.

I have been keeping this to myself for a very long time. Along time ago it was one of my pet projects I searched for in my time travel media.

But, at the time I did not know it was a type of laser until I came across the actual design for it. I was trying to find a device to make things invisible when I came across this inverted laser. The laser’s main purpose is to make things invisible. I will use it to make my drone invisible.


The inverted laser as far as I know does not exist on earth. I guess I will be the first person to build one.
Man, there is just so much shit in time travel media people got know ideal. No, I have reasons for doing what I do. I fucking love it. It is my hobby.

But, yeah I plan to put the inverted laser on my drone with my lighting system. I hope I don’t get busted for it. When I get this thing built I assure everyone it will be well hidden and put away but close enough I can use it if needed. I will use it in a responsible manner of course.

Well its late.

WAITING FOR FOR MY HACKER TO GET ARRESTED AND HAULED OFF TO JAIL!!!



 This blog copyrighted (c) 2008 – 2014 Lloyd Burris

Update 03/04/2014

Well the conspiracy against time travel because they are cowards and need a bunch of them to handle 1 middle age person again because they are cowards they took out my firewall with the help of their hackers.

It has been out for days. When I say out I mean they disabled all the rules the firewall uses and it was letting all the traffic straight through to my home network. 

I finally got around to checking my router on the otherside of my firewall and the addresses from the internet were coming straight through my firewall and being logged on my router.

The addresses were suppose to be a subnet and at one time they were when I had it all set up. I was partcially upset because I could not see where they were coming from when I logged into my router but I quickly learned I could just log into the firewall and find out.

I remember they the conspiracy against time travel were hitting my firewall pretty hard then I remember in the middle of the night it started beeping at me. Thats Aarons way of letting me know he is there. He beeps my computer at me.

But, I did not think much about it at the time since I did not have anything of my own they could get too hooked up to the internet. 

My little girls have their web cams covered up now because the conspiracy against time travel was trying to connect to their web cams to look at them.

So, now those guys have rightfully earned the name CHILD PORN PERVERTS. And, still the FBI does not care. Nothing is being done by the FBI to stop this. Nothing at all. The FBI told me to file a report with Homeland which I did. And they are not doing anything either. 

So, I am copying the logs to a backup and I hope they are intact I do not know then I will do a fresh install and image the fresh install so next time AND THERE WILL BE A NEXT TIME. I will not have to reinstall. I can just put my image on it. Still, it only took me less than half a hour to install it so it is not that much work.

 This weekend my ISP is taking their router back. It may have had its firmware reflashed by Aaron and his buddies. My new router I bought is getting reflashed too just to be on the safe side.

Well those guys can go right on being cowards and CHILD PORN PERVERTS AND I will go right on doing what I am doing. This changes nothing for me except to prove how cowardly these guys are. Now, when people read my blog they know why I talk about these guys like dogs. Because that is what they are. Dogs. Actually a cowardly pack of dogs.

Here is a song for my hacker Aaron and his friends.

He’s a real Nowhere Man
Sitting in his Nowhere Land
Making all his nowhere plans for nobody
Doesn’t have a point of view
Knows not where he’s going to
Isn’t he a bit like you and me?
Nowhere Man, please listen
You don’t know what you’re missing
Nowhere Man, the world is at your command
He’s as blind as he can be
Just sees what he wants to see
Nowhere Man, can you see me at all?
Nowhere Man, don’t worry
Take your time, don’t hurry
Leave it all ’til somebody else lends you a hand
Doesn’t have a point of view
Knows not where he’s going to
Isn’t he a bit like you and me?
Nowhere Man, please listen
You don’t know what you’re missing
Nowhere Man, the world is at your command
He’s a real Nowhere Man
Sitting in his Nowhere Land
Making all his nowhere plans for nobody
Making all his nowhere plans for nobody
Making all his nowhere plans for nobody
Songwriters
LENNON, JOHN / MCCARTNEY, PAUL

Well I am done for tonight. I have to get up early and go to a real job not unlike my so called friend and pal Aaron and his friends.

Update 03/03/2014

I got a song I wrote to day for the conspiracy against time travel. That would those loons and child porn perverts over at the http://timetravelinstitute.com and their associated friends they use to hack me, stalk me, harasses me, commit fraud and theft against me, and hack my network to hook to my kids web cams to look at them.

I think these are the same people that John Titor’s family had to sue because they tried to steal his good name and make money off WHAT TITOR DID!!! THEY ARE TRYING THAT SAME SHIT WITH ME!!!

THEY ARE AT IT AGAIN!!! WITH ANOTHER TIME TRAVLER!!! 

Despite what they say their professions are they use internet marketing for their income. So, with the internet they found me. I DO NOT OWE THIS GUYS SHIT!!! AND THEY HAVE NO CLAIM TO WHAT I HAVE INVENTED OR WRITTEN OR WHAT I DO FOR TIME TRAVEL!!!

THEY MAY HAVE FORCED TITOR OFF THE INTERNET BUT THEY ARE NOT FORCING ME OFF THE DAMN INTERNET. 

Here is my song about the conspiracy against time travel.

Ooooooooooooooooooooooohhhhhhhhhhh the conspiracy against time travel can shove it. They don’t work here no more. They dont tell me what to do or who I can talk toooooooooooo on the forums.

Ooooooooooooooooooooooohhhhhhhhhhh the  conspiracy against time travel can shove it. They don’t work here no MORE…………..

BAAAAAAAAAAAHAHAHAHAHAHAHAHA!!!!! 

(Working on my time travel programs tonight and procrastinating on working on my drone. Im going to watch a tv show in a bit.) 

What I said the other day about constructing time travel media of the future and the past and other time-lines is true and always has been true. It really is very easy to do once someone knows how to program and understands the mathematics of if. So, getting my shit written and encrypted and put the fuck up away from any damn network.

Now, on another note I want to bring up the program Rsync again. Now, I have not looked at what it has become in years but when I started talking on the internet back in 2008 Rsync backed up programs over a weak internet connection WITH A LIST OF CHECK-SUMS. IT USED THAT LIST OF CHECK-SUMS TO RECONSTRUCT ONE OR MORE COMPUTER FILES!!!

So, Rsync at one time transmitted data over the internet USING CHECK-SUMS NOT THE ACTUAL FILE. JUST THE DAMN CHECK-SUMS.

Now, I took that one step further and asked hey, CAN WE USE THIS AS A METHOD OF TIME TRAVEL?

IF WE CAN RECONSTRUCT FILES OVER A WEAK INTERNET CONNECTION USING CHECK-SUMS

WHY CAN WE NOT USE CHECK-SUMS TO CONSTRUCT COMPUTER MEDIA FROM THE FUTURE OR THE PAST WITH NO INTERNET CONNECTION AT ALL??? 

WHY CAN WE NOT USE CHECK-SUMS AS A METHOD OF COMMUNICATION BETWEEN THE FUTURE AND THE PAST???

THE ANSWER: WE CAN!!!!

In my A/B algorithm I have established that if A in the past and B in the future both know the check-sum range of their messages to each other then A in the past and B in the future can data-mine a binary counter to FIND THEIR MESSAGES TO EACH OTHER THOUGH SPACE-TIME!!!

THE PAST AND THE FUTURE CAN COMMUNICATE WITH EACH OTHER THOUGH TIME SIMILIAR TO USING CHECK-SUMS TO TRANSFERE DATA OVER OF A WEAK INTERNET CONNECTION.

TIME TRAVEL WITH COMPUTERS AND ALGORTHIMS IS POSSIBLE AND DOES EXIST!!!!

All we have to do is add DATA-MINING TO THE ALGORITHMS AND CHANGE UP HOW THIS WORKS BECAUSE WE ARE NOT USING THE INTERNET AT ALL! 

And, that is what I have done to invent time travel with computers. To invent time travel with information. I have done this. I am writing another book about this and will publish it sometime in the future.


Update 03/01/2014

Wow, that vacation is coming up very quickly. I can wait to get most of my drone completed. Moving on to todays topic. I am going to talk a little about the mathematics involved in check-sum hacking. Construction of a computer file from a unknown or known check sum. Which leads to constructing computer media of the future or the past or other time-lines and a valid method of time travel by way of computers and algorithms.

When I first started with my method of time travel I had person after person saying “Its takes to long to roll a counter to a computer file”, “It does not work” (That is the conspiracy against time travel talking. You know, them loons and child porn perverts over at http://timetravelinstitute.com. But, no it does not. And here is why. MATHEMATICALLY!!!

Now, starting out for those just getting here a computer file is just a list of numbers. I take that list of numbers and look at it as just one long number in some base. I do mathematics with that computer file using BASE MATH. 

Use too the base I used was base 256 but lately my bases has grown larger since I improved my programs. When I adjust my buffer size file reading and writing programs I have to adjust the numerical base I use in my mathematics. Cause now I am reading and writing larger numbers.

So, a computer file is a number. I take the digits in that number and add them up. Example 257 = 2 + 5 + 7 = 14. I call that a check-sum.

Now, I roll a counter. Rolling a counter is taking a second number and adding to the first number. Example 257 + 9 = 266 = 2 + 6 + 6 = 14 WOW CHECK-SUM STAYED THE SAME.  This is how I row a counter. I take a counter file and add numbers to it to roll that computer file as a counter. The beginning computer file is created by my programs and I call that a counter file.

So, say I wanted roll find a file of say channel 7′s evening news program oh say, next month in the future. Well I first start by looking at channel 7′s past news broadcast. I get all their video’s of the past.

I take all their check-sums and add them up then get a standard deviation and a root mean square or rms as it is called and other mathematical measurements I have not listed them all.

Now I have defined my search coordinate search area for channel 7′s news videos on the binary counter or fifth dimensional time travel simulator as I call it.

Now I can data mine that check sum search range I have defined from from the past videos looking for a news broadcast video at a future date. 

Why would I do that? Oh lets say I wanted to see a future sports score or get some future lottery number or see what country is fighting what country in the future. Maybe I want to see if any earth quakes happen or what is going to happen in politics and so forth. Maybe I want to see what new technology is coming out and how it works.

So, now I pick a check-sum in that channel 7 check-sum search range. 

For the sake of argument I am going to just give some number.

2984723983 checksum file size say 30mb in avi format. This is just for example.

Now, how do I roll a counter?

I create two files.
1. The counter file. Thirty Megabytes in size
2. The speed file. (This is the file I add to the counter file to get it to the target check-sum. It can be any size 30 MB or less. 

Boy, I am making fools out of those guys over at http://timetravelinstitute.com who chases me all over the internet trying to shoot me down even getting someone to hack my home computer network and look at my little underage girls through their web cams and so forth.

That is why I call them pervs. They got a young adult named Aaron to hack my home network. Aaron did not help their cause any. It only gave me worser names to call them. Like perverts.

(Talking to Rainman aka Ray)
WHAT DID YOU SAY Rainman aka Ray in the past on the forums? “THIS IS BULLSHIT!”. Damn you are stupid. You are so fucking stupid your stupid is stupid. Stupid!!! (For the record they call me names too. They started it first. And they have thousands of forums postings talking about other people including myself. So, I can say this stuff)

Now, I use a algorithm
Check sum rate of construction = Starting counter – Ending counter and the time it took to construct that check-sum rate. So now, lets calulate time to file reconstruction. So now I have two variables.

1. Check-sum speed (This is how many bytes being added to the counter at a time.)
2. Rate of check-sum speed. (This is the time it takes to add those bytes.)

Time to file re-construction of channel 7′s future news broadcast = (check-sum target 
2984723983 divided into / check sum rate of construction ) MULTIPLED BY (TIME OF CHECK-SUM RATE). THIS EQUALS HOW LONG IT TAKES TO BUILD THE VIDEO OF CHANNEL 7′S FUTURE BROADCAST VIDEO.

Now, there are two ways to do this. Using bytes or using check-sums. If using bytes then the units have to be in bytes. 

If using check-sums the units have to be in check-sums. I know most people do not understand this but I am putting this out there. Time is still calulated the same way with a clock.

Another example. 
60 Target check-sum
5 is rate of check-sum construction
5 minutes so we are incrementing 5 units every 5 minutes to the counter.

60/5 = 12 (If we add the number 5 twelve times and it takes 5 minutes to add 5 then then it takes 60 minutes to roll the counter from 0 to 60. Im keeping the numbers even and simple with respect to time for the layman. Or for Darby and Ray since they are so very stupid.

(60/5 = 12 * 5 = 60 minutes to get to the number sixy. If the number 60 were a file.

5 = 5 minutes 1
+ 5
10 = 10 minutes 2
+ 5
15 = 15 minutes 3
+ 5
20 = 20 minutes 4
+ 5
25 = 25 minutes 5
+ 5
30 = 30 minutes 6
+ 5
35 = 35 minutes 7
+ 5
40 = 40 minutes 8
+ 5
45 = 45 minutes 9
+ 5
50 = 50 minutes 10
+ 5
55 = 55 minutes 11
+ 5
60 = 60 minutes and number reconstructed. 12 times at 5 minutes each time equals 60 minutes.


Now, we know how long at this counter speed it will take to re-construct channel 7′s news video of the future. If the time to reconstruct channel 7′s future news broadcast is too long WE JUST USE A LARGER CHECK-SUM SPEED!!!!(We add more bytes at a time.)

NOW IF THE CHECK-SUM WE PICKED FOR CHANNEL 7′S FUTURE NEWS VIDEO IS A VALID CHECK-SUM BY CONTROLLING THE RATE OF CHECK-SUM RECONSTRUCTION WE CAN CONTROLL THE AMOUNT OF TIME IT TAKES TO RE-BUILD THIS FUTURE NEWS BROADCAST VIDEO BEFORE IT IS AIRED IN THE FUTURE.

WE CAN DO IT IN THE AMOUNT OF TIME IT TAKES TO GOTO LUNCH AND COME BACK IF THE MATHEMATICS IS DONE CORRECTLY AND THE PROGRAMS WORK CORRECTLY TO BUILD THE FILE.

WE CAN CONSTRUCT A VALID FILE OF CHANNEL 7′S FUTURE NEWS BROADCAST IN LESS THAN A DAY. IF WE DID OUR MATH CORRECTLY.

NOW WE HAVE TIME TO WATCH IT WEEKS BEFORE IT IS ACTUALLY SHOWN ON THE AIR IN REAL LIFE!!!

RAY AND DARBY – YOU STILL SCRATCHING YOUR HEADS? BAAAAAHAHAHAHAHAHAHAHAH!!!!!!!

YOU CAN’T TOUCH THIS!!! IM TOO SMART FOR YOU!!!

(IN THE ABOVE EXAMPLE I ONLY SHOWED A SIMPLE METHOD OF CALULATING CHECK SUMS. I DO USE MORE ADVANCE METHODS WHICH TAKE INTO ACCOUNT THE BYTE ORDER OF THE CHECK-SUM. 

SO THIS WAS A SIMPLE EXAMPLE TO SHOW HOW I WORK AND TO THROW PIE BACK INTO THE FACE THE CONSPIRACY AGAINST TIME TRAVEL.)

I AM LLOYD BURRIS AND I AM A TIME TRAVLER !!!!!!!!!!!!!!!!!!!!

Actually I AM REACTOR1967 AND I AM A TIME TRAVELER. 

But, the conspiracy against time travel thought that by calling me my real name in public they could run me off the internet. 

So, I came out of the closet and gave my REAL NAME TO FUCK THEM UP IN THEIR ATTEMPTS TO SILENCE ME.

I WILL NOT BE SILIENCED. I WILL NOT GO GENTLEY INTO THAT GOOD NIGHT! I WILL NOT GIVE UP WITHOUT A FIGHT! I AM A TIME TRAVELER! AND, I WILL NOT STOP PUBICALLY TALKING ABOUT TIME TRAVEL.

I AM REACTOR1967 AND I AM HERE TO STAY!!!

YEEEEEEEEEHHHHHHHAAAAAAAAAAA!!! 

Update 02/28/2014

Aaron said I would have a accident. If he comes around my home I am not so sure that would be entirely true. He might be in for a surprise or two if he tries anything.

Got some of my code up for my 2nd book program. All them years I left my read and write along at default settings. Now that I am setting my buffer size my program is writing files out extremely fast.
I use to tell people the counters can run backwards too. When I do my math if I get a negative sign the program will run the counter backwards if my math gives a positive sign the program will run the counter forward. It all depends on which direction the counter needs to go and the speed of the counter to construct time travel media.

Since my programs know where they are going on the counter to look for time travel media it can use the clock from my computer and the checksums and calculate a rough time to file reconstruction. It uses the time aspect to calculate my counter speed.

Yeah, my hacker pulled out of his little operation a little too soon and made the mistake of calculating I had my time travel media and my time travel programs on my Ubuntu box. That Ubuntu box I was using when I was talking to him did not even have a firewall. It was very little challenge for him to hack that box. But also it did not have my media nor my time travel programs. Luckely I kept all that on DVD’s and CD’s at the time stored safely away.

In fact most beginning hackers find it easier to hack individuals because compared to businesses they leave their shit unsecured and crap on their hard drives they should not. In my case I had a text file with my passwords on my hard drive. When Aaron found that he must of had a field day. Now even though I have a firewall and yeah he may of hacked it I really dont care because there has not been shit on the other side for him to get too. I use tails linux and my hard drive is blank. My main stuff now never touches the internet and is updated by downloading its updates from other computers that are not important. On ubuntu I use some stuff that allows me to update by downloading then taking that download to my system.

On my projects though I have never blogged about it or talked about it I am also into the diy biology scene but only for building computer interfaces nothing that violates any laws. Well, I did do that work on nano-bots but as I told my hacker most of that was simulated. Aaron got one or more of my project files off my hard drive on that and some other minor stuff.

On the biology scene individuals are getting into DIY biology hacking now. My part of that was computer interfaces and nano bots to a small degree. My work on that stuff is not very advanced along. Mainly because I don’t have the time for it that I want. But, when I get my drone and my books finished and finish my documentry up I plan to get into it full time. Right now I do only very minor stuff.
So, completing todays log for my blog today (a joke between me and the conspiracy against time travel from Reddit) my 2nd book program is coming along very nicely. 

My second book is on my email system but my program for that will be advance enough to allow people to time hack well beyond the A/B algorithm. 

I may extend my 2nd book to go beyond just my A/B algorithm and just do one tell all book about time hacking. I know Aaron would love that. He wants to commit copyright infringment of my work.

How far I want to take time hacking in my second book I do not know yet. My book will be pretty heavy reading. 

Normal individuals more likely than not will not be able to understand most of it. I will try to do a index at the back explaining stuff. 

Computer science people and people that can do math very well will have a field day with it though. This time Aaron is buying his own damn book and I am not explaining shit too him.


UPDATE 02/26/2014

Well to let everyone know who else is working on my case here are the agencies I have involved with my hacker.

1. FBI
2. Homeland
3. My local police department.(They are only looking at my credit card case not the cyberstalking and other shit going on.)
4. My congressman. (I am trying to get him to get these other agencies off their asses.)

I am hoping soon for these guys will finally do their damn jobs but im not holding my breath. Now days the news media has to broadcast a case before the fucking authorities will do anything. About all they do is coffee and doughnuts. Unless your case makes the news your pretty much shit out of luck now days.  

If it did make the headlines it probably would look something like this.

Popular Time Travel Forum Cyber Stalks and Hacks Its Own Member Who Claims To Be A Time Traveler For Revenge For What Was Said On A Blog And Other Forums And Not Complying With Their Demands.

Today http://www.timetravelinstitute.com was caught cyber stalking and hacking its own member resulting in credit card fraud, death threats, harassment, copyright infringment, account spamming, and connecting to underage girls web cams all in the name of getting revenge on its own member for not complying with its demands to leave the internet and delete his postings and web-sights…….

UPDATE 02/23/2014

When me and http://timetravelinstitute.com spy from http://timetravelinstitute.com were talking he kept asking me about my software and more questions than I can talk about here. A lot of what I told him was true but when he wanted specfics knowing he was probably bullshit I held back. Except for what he gleemed off my computer I feed him old and outdated info on my time travel software. Oh, sure at one time what I told him did apply. But my new stuff does not work that way. 

I did tell him to use the counter as a spacial coordinate system but when telling him how that work I kept it vague and gave him old information.

My new stuff purley constructs files based on a coordinate system fed to it. That file is reconstructed from these coordinates then offloaded, and looked at. 

Then the coordinate system is put through a mathematical process to updated it to the next search area. After that new coordinates are given to the binary counter program to constructs another file. This is how I now search for time travel media now days.

I have my binary counters acting as a fifth dimension simulator to find time travel media. But, we need coordinates to travel the fifth dimension. We need coordinates to time travel with my method of time trave.

It works like this.

I will feed my counter something like this.

checksum: 98423749823
filesize: 82043 megabytes

Then a serious of coordinates.

234.3294873
987.9823473
578.9823477
…..

 And now this can have a final strong checksum if constructing a known file.

H!83478*+BAZT

And so forth.  Then the counter constructs a file based on this information. These numbers are mathematically plotted in advance to search for and find time travel media of the past, future, or other time-line or to construct a past known binary file or other type of file from my current time-line. 

If searching for time travel media the coordinates are updated for the next search area on the counter after each file has finished construction. 

The coorinates are the byte order of the file being looked for within the checksum. No longer is this a brute force search.

The mathematics to do this are very complex. As complex or more than my first book. In time I will after im done updating my software update my first book again and begin on my second book finally ending in my documentry that I was planning before them child porn perverts from http://timetravelinstitute.com (Darby, Rainman aka Ray, And Aaron broke into my home network not only stealing my files and passwords and my credit card but connecting to my kids web cams.)

UPDATE 02/20/2014

I wanted to show everyone what it is like to be Cyber Stalked, and harasses, threathened, Robbed, and hacked by the http://timetravelinstitute.com (Ray, Darby, and Aaron). This morning got up. Internet would not work. After much booting and trying to change my IP address I finally got on the network. Went to check my email. Here is what it looked like.
Click on picture to make it bigger.
There is one of his harassesing emails. The rest are the accounts that Aaron is spamming on my forum. That is also where he sends me harassing messages. Well, was going to do some work today but stayed up. I have some people to talk to so I need to get something to eat and get with them. At the end of the day the spammed accounts will be quite long. Yep, those guys do no shortage of making sure I get email. They are making sure I am not lonely. BAAAAAAAAAHAHHAHAHAHA!!!!! And, that is why they are trolls and thugs and theifs and child porn perverts.
I figured out That Ray probably is the ring leader. Aaron executed it. And when my book got published for which Aaron promised he would violate my copyright Darby banned me again from the http://timetravelinstitute.com they are in it together. There was a conspiracy.  I onced asked on my blog who was the bitch Ray or Darby. Its Darby. The others are Ray’s bitches.
On my time travel media I use to have a shit load of that laying around. But, people kept demanding to see it then http://timetravelinstitute.com had my computer hacked and viewed my screen and spied on my kids and stole my files and my credit card and fucked with my accounts so as I got better at taking check-sums and re-creating files (referring to the new software I have been writting) I took my time travel media and put the check-sums in a book with the names of the programs they need to run and I spent a good  month destroying my time travel media. 
But, I have the files as check-sums in a book safely hidden away. I did not want to tell anyone about it until I had that project completed. I had made references to not having much around before and yeah, I was getting it logged and destroyed. Now, if someone wants my shit they will have to get the programs AND THE BOOK and reconstruct my media the same way that I found it. Good luck with that.

So, I pretty much cleaned up my CD’s, DVD’s, and external hard drives. It is so much easier now too. God, I spent weeks destroying CD’s and DVD’s and throwing them away after I got everything logged in my book. I had a hidy hole at one time too. I am not using that any more either. Besides the people in that area started noticing me coming and going so I decided to just get my stuff out of there and stop going there. End of story for my hidy hole.

I am switching over from MD5 to SHA1. Why, well mainly because I found a good c++ library but I also found out my new library does MD5 too but I am switching anyway. I use strong check-sums for when I convert files to a weak, weighted, and strong sum. I use the strong to verify reconstruction much like Rsync does that I talked about long ago. My time travel media does not get strong check-sums assigned until after I find it. Unless it is on my email system and the message contains a strong check-sum already.

The conspiracy against time travel tries to say my shit don’t work but when I go to places where they talk about strong check-sums they understand very well what I am talking about. So, I have long ago come to the understanding that the conspiracy against time travel is just plain out fucking stupid.

UPDATE 02/19/2014

I finally got it figured out that Rainman or Ray as Darby calls him in public is the closest thing to the http://timetravelinstitute.com I can pin the conspiracy to hack me for revenge. Rainman once referred me to Cornell University for my writings which is in NY. Now, that is well within a few hours driving distance to Aaron. Darby what I know about him I can’t tie him to the east coast but I can certainly tie Rainman to the east cost. It is looking more like Aaron Knows Rainman. Are they relatives? Im sure the FBI knows. So, it was probably Rainman that helped plan my hacking.

So, somehow Aaron knows Rainman. Ray works like I do. And, I am a softie at heart which Ray knew so he pinned a good con-artist  to play me. Since Aaron is a stay at home spoiled mom and dad brat because he can not handle the real world so he lives in his computer while his parents support him financially. Aaron was perfect to play me and hack me. Aaron almost did not succeed. It was only my curiosity knowing this was probably a conspiracy against time travel attack that got me.

I was so curious as to what those guys had in mind that I played right into their conspiracy against time travel hands. I knew in my heart it was a setup. So Rainman used a confused absolutely useless to society kid living off his moms tits to seek his revenge against me. Oh Ray, HOW LOW CAN YOU GO?

 Since Aaron plays on his computer all day and went  to college briefly. Aaron may be a moderator for Rainman as well as being in the sites that deleted my post and banned me for talking about time travel and the conspiracy against time travel. I am starting to figure it out. FBI I HOPE YOUR READING THIS.

I started to order Aaron pizza one night as a way to say thank you for pressuring me to finish my first book but that night he did not return my emails so I dropped the plan. He had mentioned he was broke but now I know different. He steals for a living. Man, you try to help people and be their friend and this is the thanks you get. Well one day when Aaron gets older I hope some slick salesman takes him for a ride. One day boy Carma may bite you in the ass.

It occurred to me today after Aaron contacted me and before Aaron emailed me to let me know that he was responsible for my credit card and viewing my screen that the conspiracy against time travel pretty much had what they wanted from me. MY BLOG WAS NOT PUBLIC ANY MORE AT THAT TIME. Had they left me along who knows if I would of taken it back public. 

I may not have. At least for a while. I have a new space for it on the net and it was a third party space off google. The conspiracy against time travel had my blog down but STILL THEY CONTINUED THEIR ATTACKS ON ME? They claim they wanted me off the net and when they got it THEY STILL ATTACKED ME. Hum, like I said about those guys before. THEY DO SOME STUPID FUCKING SHIT! Well guys you got my blog back up and it is still on google. I hope your happy now. I think the reason they continued is because I was still using my user name and still using the forums even though I had pulled my blog. Later on down the road I will still be moving my blog when I can get the technical details to why I am moving it worked out. It will still be available to most of the world.

Well I got my firewall up. After I put it up I got into its logging capabilities and Damn they are good. I found out that out of all the ip addresses attacking my computer that they are coming from only two Mac addresses. That means two people doing the attacking. Well I guess they will change their macs now. 

I logged an IP address that came into my firewall from Cambridge,MA. That is up close to where Aaron lives. Anyway I saw a lot of traffic before the firewall but no traffic getting through the firewall. At least not yet.

If you take a look at this log you will see my hacker and his buddies are pretty busy trying to crack my firewall. I took out my IP and replaced it with Reactor1967. With all this I do not understand why the FBI just does not up and arrest them. Also, I figured out how Aaron was able to beep my computer at me. He was logged in with SSH and from the command line he typed the word beep. Now, how he poped the windows up in front of my I do not know. When I get time from my projects I am going to take my own computers and hack my own network so I can learn a little more. Im a pretty quick study on computers. Now, Aaron should not of been able to log in to my computer but somehow he did.

He has really shaken my faith in Ubuntu. I love that distro but as I learned using it on the internet is not good. Its firewall is disabled by default and it has SSH running as a serivce. My Ubuntu install also had the remote desktop running. Those things running with no firewall on a network is well just plain wrong. Punks like Aaron take advantage of that. As well as looking at little children through web cams on computer’s. How low can you go Aaron and http://timetravelinstitute.com? Again, that is why I call them cocksuckers. They are on their knees while I stand upright.

Him and http://timetravelinstitute.com have taught me very well that they have no moral compass when it comes to others. Well here is that log. I have other logs besides this one but this gives a good picture of my cyber stalker/hackers.

Im not sure how much of this stuff is really the hackers. I do know the cambrige ip is fishy. Before Aaron came along I never had this shit. Also, I was pulling IP’s from my logs and entering them into my  browser and I accidently logged into a un-secured router. Well I got out. I do not know if it was my hacker’s router or not. It was someones router. Question I have is why is it attempting to connect to my firewall? Hmmm. Well, I will leave these IP’s along. 

 From 10.0.0.1 – 36 packets
       To 224.0.0.1 – 36 packets
          Service: 0 (igmp/0) (RED DROP) – 36 packets
    From 17.154.66.105 – 1 packet
       To Reactor1967 – 1 packet
          Service: 53416 (tcp/53416) (RED DROP) – 1 packet
    From 17.172.233.120 – 1 packet
       To Reactor1967 – 1 packet
          Service: 52116 (tcp/52116) (RED DROP) – 1 packet
    From 17.172.233.133 – 8 packets
       To Reactor1967 – 8 packets
          Service: 52114 (tcp/52114) (RED DROP) – 8 packets
    From 23.74.2.96 – 1 packet
       To Reactor1967 – 1 packet
          Service: 52239 (tcp/52239) (RED DROP) – 1 packet
    From 23.205.120.98 – 3 packets
       To Reactor1967 – 3 packets
          Service: 52535 (tcp/52535) (RED DROP) – 3 packets
    From 23.205.120.106 – 1 packet
       To Reactor1967 – 1 packet
          Service: 52761 (tcp/52761) (RED DROP) – 1 packet
    From 23.205.120.122 – 1 packet
       To Reactor1967 – 1 packet
          Service: 52808 (tcp/52808) (RED DROP) – 1 packet
    From 31.13.66.49 – 1 packet
       To Reactor1967 – 1 packet
          Service: 51414 (tcp/51414) (RED DROP) – 1 packet
    From 37.139.11.234 – 1 packet
       To Reactor1967 – 1 packet
          Service: commplex-main (tcp/5000) (RED DROP) – 1 packet
    From 50.197.226.53 – 1 packet
       To Reactor1967 – 1 packet
          Service: 54969 (udp/54969) (RED DROP) – 1 packet
    From 62.103.29.220 – 1 packet
       To Reactor1967 – 1 packet
          Service: 54969 (udp/54969) (RED DROP) – 1 packet
    From 64.236.64.139 – 1 packet
       To Reactor1967 – 1 packet
          Service: domain (udp/53) (RED DROP) – 1 packet
    From 65.111.164.119 – 1 packet
       To Reactor1967 – 1 packet
          Service: domain (udp/53) (RED DROP) – 1 packet
    From 68.83.8.234 – 17 packets
       To Reactor1967 – 17 packets
          Service: 16471 (udp/16471) (RED DROP) – 17 packets
    From 72.21.91.19 – 1 packet
       To Reactor1967 – 1 packet
          Service: 52511 (tcp/52511) (RED DROP) – 1 packet
    From 76.247.25.47 – 3 packets
       To Reactor1967 – 3 packets
          Service: 60436 (tcp/60436) (RED DROP) – 3 packets
    From 77.81.227.77 – 1 packet
       To Reactor1967 – 1 packet
          Service: http (tcp/80) (RED DROP) – 1 packet
    From 93.174.93.51 – 1 packet
       To Reactor1967 – 1 packet
          Service: 50861 (tcp/50861) (RED DROP) – 1 packet
    From 122.136.196.116 – 1 packet
       To Reactor1967 – 1 packet
          Service: domain (udp/53) (RED DROP) – 1 packet
    From 152.44.0.203 – 3 packets
       To Reactor1967 – 3 packets
          Service: 60436 (tcp/60436) (RED DROP) – 3 packets
    From 181.31.121.11 – 3 packets
       To Reactor1967 – 3 packets
          Service: 60436 (tcp/60436) (RED DROP) – 3 packets
    From 184.170.48.244 – 12 packets
       To Reactor1967 – 12 packets
          Service: 60436 (tcp/60436) (RED DROP) – 12 packets
    From 186.53.15.88 – 3 packets
       To Reactor1967 – 3 packets
          Service: 60436 (tcp/60436) (RED DROP) – 3 packets
    From 186.61.76.60 – 3 packets
       To Reactor1967 – 3 packets
          Service: 60436 (tcp/60436) (RED DROP) – 3 packets
    From 186.211.180.138 – 1 packet
       To Reactor1967 – 1 packet
          Service: 3 (icmp/3) (RED DROP) – 1 packet
    From 187.60.116.254 – 3 packets
       To Reactor1967 – 3 packets
          Service: 60436 (tcp/60436) (RED DROP) – 3 packets
    From 187.151.182.55 – 3 packets
       To Reactor1967 – 3 packets
          Service: 60436 (tcp/60436) (RED DROP) – 3 packets
    From 187.206.16.44 – 3 packets
       To Reactor1967 – 3 packets
          Service: 60436 (tcp/60436) (RED DROP) – 3 packets
    From 187.212.102.144 – 3 packets
       To Reactor1967 – 3 packets
          Service: 60436 (tcp/60436) (RED DROP) – 3 packets
    From 190.49.48.97 – 3 packets
       To Reactor1967 – 3 packets
          Service: 60436 (tcp/60436) (RED DROP) – 3 packets
    From 193.0.6.135 – 1 packet
       To Reactor1967 – 1 packet
          Service: 37449 (tcp/37449) (RED DROP) – 1 packet
    From 201.48.0.241 – 1 packet
       To Reactor1967 – 1 packet
          Service: 54969 (udp/54969) (RED DROP) – 1 packet
    From 201.114.212.83 – 3 packets
       To Reactor1967 – 3 packets
          Service: 60436 (tcp/60436) (RED DROP) – 3 packets
    From 201.141.250.247 – 3 packets
       To Reactor1967 – 3 packets
          Service: 60436 (tcp/60436) (RED DROP) – 3 packets
    From 201.143.191.243 – 3 packets
       To Reactor1967 – 3 packets
          Service: 60436 (tcp/60436) (RED DROP) – 3 packets
    From 201.172.219.112 – 3 packets
       To Reactor1967 – 3 packets
          Service: 60436 (tcp/60436) (RED DROP) – 3 packets
    From 201.186.162.106 – 6 packets
       To Reactor1967 – 6 packets
          Service: 60436 (tcp/60436) (RED DROP) – 6 packets
    From 201.251.133.162 – 9 packets
       To Reactor1967 – 9 packets
          Service: 60436 (tcp/60436) (RED DROP) – 9 packets
    From 213.142.215.246 – 1 packet
       To Reactor1967 – 1 packet
          Service: 54969 (udp/54969) (RED DROP) – 1 packet
    From 216.34.181.97 – 7 packets
       To Reactor1967 – 7 packets
          Service: 51646 (tcp/51646) (RED DROP) – 1 packet
          Service: 51647 (tcp/51647) (RED DROP) – 1 packet
          Service: 51648 (tcp/51648) (RED DROP) – 1 packet
          Service: 51649 (tcp/51649) (RED DROP) – 1 packet
          Service: 51650 (tcp/51650) (RED DROP) – 1 packet
          Service: 51651 (tcp/51651) (RED DROP) – 1 packet
          Service: 51654 (tcp/51654) (RED DROP) – 1 packet
    From 217.170.195.123 – 1 packet
       To Reactor1967 – 1 packet
          Service: domain (udp/53) (RED DROP) – 1 packet
    From 222.90.52.214 – 3 packets
       To Reactor1967 – 3 packets
          Service: ms-wbt-server (tcp/3389) (RED DROP) – 3 packets

 Listed by source hosts:
 Logged 21 packets on interface wan
    From 23.206.247.120 – 8 packets
       To Reactor1967 – 8 packets
          Service: 53600 (tcp/53600) (NEW not SYN?) – 2 packets
          Service: 53601 (tcp/53601) (NEW not SYN?) – 2 packets
          Service: 53602 (tcp/53602) (NEW not SYN?) – 2 packets
          Service: 53603 (tcp/53603) (NEW not SYN?) – 2 packets
    From 72.21.91.19 – 13 packets
       To Reactor1967 – 13 packets
          Service: 52616 (tcp/52616) (NEW not SYN?) – 5 packets
          Service: 52786 (tcp/52786) (NEW not SYN?) – 4 packets
          Service: 52797 (tcp/52797) (NEW not SYN?) – 2 packets
          Service: 52798 (tcp/52798) (NEW not SYN?) – 2 packets

 Listed by source hosts:
 Rejected 26 packets on interface lan
    From 10.0.0.1 – 12 packets
       To 224.0.0.1 – 12 packets
          Service: 0 (igmp/0) (GREEN REJECT) – 12 packets
    From 192.168.1.35 – 14 packets
       To 192.168.1.1 – 14 packets
          Service: http (tcp/80) (GREEN REJECT) – 8 packets
          Service: https (tcp/443) (GREEN REJECT) – 4 packets
          Service: microsoft-ds (tcp/445) (GREEN REJECT) – 2 packets

One thing I do know about my hacker is that boy is as slick as dog shit on the floor. So, I have my router on the other side of the firewall logging what gets through. So, both sides of the firewall are being logged. I will have to email these logs in to the authorities they are too big to file in the online complaint form now. Them boys done filled up several pages of logs trying to get through my firewall.
Next project is to get snort on my firewall. 

I am really wanting to talk about my new software but I do not want to give my enemies any chance to steal it before I get it published at some point in the future.

It works a lot like my old software but now I added some more math to guide the counter quicker to its target files. I am also playing with controlling the speed of the counter again.

You see, since I plan in advance mathematically where I want the counter to go it is only a matter of increasing the speed of the counter to roll it to time travel media. My new methods help more quickly organize the bytes into a numerical order that will be video, audio, documents, or other special files.

The things I found out about time traveling with data mining a binary counter is 1. byte order 2. speed of counter 3. coordinates on the counter. Knowing where the hell your going. 4. recognizing found time travel media and saving it. 5. Doing all this quickly. 

When I design my binary counters to find time travel media this is my list of priorities. My new methods have to do with byte order. Changing the order in such a way as to by pass time consuming check-sum collisions. Now, my counters know when it is running into useless collisions and speeds up to quickly by pass the bad collisions to more quickly find the good collisions.

On a binary counter there are bad check-sum collisions and good check-sum collisions. My goal with my new software is to not wast time on the bad collisions. It takes a fair amount of math to do this.

UPDATE 02/18/2014

Well still waiting to find out if my hacker will see jail time. I seriously doubt it but I am still perusing it. In the mean time since he had fun at my expense and I mean really, at my expense stealing my book material and software and credit card for which the FBI is not doing anything about. 

Besides committing wire fraud, child porn for connecting to my under-age girls web cams and other crimes and remember. He is a friend of http://timetravelinstitute.com which has been trying since 2008 to get me to leave the internet. For which in 2010 I started this blog because of their attempts to make me leave. If Aaron is into theft, wire fraud, copyright infringement, and child porn WHAT THE HELL ARE HIS BUDDIES INTO? I can only wonder. Maybe I don’t want to know.

I thought I would introduce the public to my hacker and his family. Since he tried so hard to contact me and get into my computer and steal from me it is the least I can do for him. Oh and not let me forget he has been cyber stalking me at least since 2010 and attacking my forum. Now he has hacked me and threaten me too.

Aaron who claimed to be my friend and lied to me when he said he was not from the conspiracy against me has some sort of 24 hour a day 7 day a week hacking, harassing, and attacking thing going on against me. My home net work is scanned and dos attacked on a daily bases now. My forum has been getting attacked since day 1 of putting it up. Aarons sends me harassing email messages almost daily. Hey, Aaron – does your mom and dad know your doing this shit from their home against me? Since it is Gary’s network that is attacking or that was used as a spring board to attack me I fill it is ok to post the material here that I did on your family. 

Aaron, I hope your mom and dad see this. This is partially why I put this here in hopes they will know what you are doing. They do need to know what you are if they do not already. Maybe they can help you but at your age I doubt it. 

I will not use their real pictures nor their last names nor their business. I can be nice when I want to.

After I introduce Aaron’s family I will talk about the conspiracy against time travel then some about my work. And no Ray and Darby of http://timetravelinstitute.com I am not leaving the internet. You guys ran John Titor off but your not running me off.

Thomas the grand dad of Aaron. He is president of some corporation of the greater Boston Area.

Here is Aaron’s dad. His name is Gary. He is the owner of a computer company in Bedford, Ma.

Here is Aaron’s mom. Her name is Suzanne. She is also the co-owner with Gary of their computer company in Bedford, Ma. She is in some sort of car club.

Here is Aarons sister Ashley. She is really older than this. She is the facility manager at a parking garage in Boston.

Here is Aaron’s brother. I forget is name right now but I will remember it later. He is going to college.

NOW WITHOUT FURTHER ADO MEET MY HACKER / CYBER STALKER AARON. THE LOWEST FORM OF LIFE ON EARTH!!! HE IS A PROFESSIONAL COMPUTER THIEF AND CRIMINAL AND MOST LIKELY NOT SOMEONE YOU WANT AROUND YOUR DAUGHTER!


DAMN THIS FAMILY IS SO UGLY IF ANYONE OF THEM LOOKED IN THE MIRROR AND SMILED THEY WOULD BREAK THE MIRROR. 
BAAAAAAAAAAAAHAHAHAHAHAHA!!!!!!!!!!

You know if these guys did not dog me I would not talk about them like dogs. But, they started it. All I have been trying to do is just talk about time travel. Nothing more. 

Now excuse me public. I am going to talk about the conspiracy against time travel now.

Hey conspiracy against time travel. You pussies. You think hacking my computer and stealing from me is going to make me get the point that I can not be Reactor1967 anymore and that I am suppose to delete all my post and web-sights and leave the internet and not come back. You guys are CRAZY!. Talking to the conspiracy against time travel. That would be http://timetravelinstitute.com and the guys they have stalking me all over the internet. YOU GUYS ARE PUSSIES!!! PAMELA FROM THE TITOR STORY COULD KICK ALL YOUR ASSES WITH BOTH ARMS AND ONE LEG TIED BEHIND HER BACK! Sorry public but these guys recently violated my home network so I had to get that out. Moving on.

Well today I am doing some more work on my new software for finding time travel media. I think it is going to be better than my old software. It will access my hard drive faster and I designed it to have way fewer check-sum collisions when data-mining the binary counter for time travel media.

02/14/2014
Today I worked some more on increasing the buffer size in my programs. All these years I ran my programs reading and writing binary files slowley when all I had to do was increase my buffer size to increase the speed at which my programs read and write binary files. DUH! 
Well it was no matter. When I did my time travel stuff on my computers I left my stuff running and I was unconcerned with time. 
I think the longest time travel run I had was about three months before the damn electric cord got kicked out of the wall. Then there was those times when the power went off.

Only thing is now I am using numbers differently in my programs so now that may cause me to redo my algorithms to handle the buffer changes. But, it is just a matter of some math no big deal.

I noticed my hacker sucked at math even though he was suppose to be so damn good at hacking and programing. I pulled up his college record to see what his skills were. I found out it was mostly programming. And, I think python is his favorite language which is the language a lot of hackers use.

But, I was quite taken back to find his math skills so poor for being a college guy or a flunky  college guy I do not know if he will finish. 
Hey, at least I got a year away from graduation. Well 3 times I got a year away from graduation because I spent 6 years at 4 different colleges. Yeah, 3 times and he can not even finish 1 college with his mommy and daddy paying for it. BAAAAAAAAAAAAAAAHAHAHAHAHAHAH!!!!
When I went to college I paid for it myself will the gov did help with pell grants but those ran out when I started working more than 19 hours a week. Then I had to pay my own bills too. This dude that hacked me can’t even do it with his parents paying for it. HOW FUCKEN SAD IS THAT?
Dude, you told me to unfuck myself. Man, look in the mirror. Get a life before its too late. Screwing around with a guy over twice your age whether than taking care of your own priorties in your life. Yep, looser flunky hacker dude. Oh, I forgot to say DEAD BEAT LOOSER FLUNKY HACKER DUDE. GET A JOB YOU LOOSER!
So, I owe my hacker a thanks for the help though what he really intended to do was steal from me and troll me. It was him pushing me to bring stuff forward to the public that helped me beef up my programming. Get off my butt and do some work. Get some health stuff taken care of. Get my book written and start another. And so forth. Aaron, I do want to say thanks for pushing me on that book. Man, I have been meaning to write that thing for 20 years now. You may of ment to hurt me but honestly taken the good with the bad at least I finally finished that damn book. Now I need to go back and update it and make it better. And, I have more to write about.

Though I did not mean to give Aaron my credit card nor my hard drive contents nor buy a new router nor buy a new fire wall (I had to buy a whole new computer for that fucking firewall) nor have to change all the passwords on my accounts then on top of that have to go through and nuke and wipe my drives and reinstall my operating systems and I still think that mother fucker has a bot on my shit somewhere that I can not find But, hey NOW EVERYONE KNOWS WHY I TALK ABOUT THESE GUYS WORSE THAN DOGS! RIGHT! 
Yep, point well made.
But, at the end of the day they are to me no more than a pesky fly. And, I know those guys get a lot of laughs out of trying to hurt me but there are those times when I laugh with them on some of the stupid fucked up shit they do and say. 
They remind me of a room full of bitter old ladies fighting. And for what? Because I have a blog. Because I talk about time travel. And, some of these guys are acadamics and graduated college professionals? Some are retired. And, yes some are punk looser kids. 
But Really? Really conspiracy against time travel? Because I visit forums? You guys crack me up more than you hurt me. A bunch of grown men acting like little kids is what you guys really are. It makes no matter to me I will go on like I always do with the conspiracy against time travel (Them ankle biting pint size dogs) knipping at my heals. Hahahaha.

I am planning to post my latest incidents outside of this blog that happened on craigslist when I get around to it. 
One of those dudes/bobs(bitter old ladies) threw the word “word salad” out when they were trying to troll me on craigslist. 
That was used on me way back at space.com and other places oh about 4 years ago when the conspiracy against time travel first started cyber stalking me after failing to get me to leave the internet from http://timetravelinstitute.com where Rainman and Darby are mods. Well, should I say trolls because that is what they really are. A lot of folks over there would agree with me.
Yep, they ment for that websight to be my last stop on the internet talking about time travel. Darby made that point to me well and clear when he ran me off his forum for talking about time travel.
But, that did not happen and as long as I have a say will not happen. I will continue as long as I can.

I am not Titor. I will not be run off the internet like a beat up scared little kid. It aint going to happen.

So, this week besides doing some electronic stuff I am working on getting my file writting implemented on my programs. Then from there work on my list of things to do with my TTI stuff and finish some other stuff I have going.
Yep, I not do anything today though. I have to get up in four hours and go to work. I,ve been a busy little bee that is why I stayed up so late. Yeah, I got some of my hackers bad habits. I need to break those. 
02/13/2014
Through out this blog, besides talking about the conspiracy against time travel. 

A collection of professionals from different professions some retired, some people from academics, and some kids who play on their computers all day or should I say night and sleep all day and do not have jobs. 

These people who have beefs with me talking about time travel on the internet with my methods and they are thugs and like to steal from others and use their work for their own good.

I also have a serious aspect of time travel with information. The bases starting with my BNS and ending with my methods for running binary counters and data mining those counters for time travel media. 

Which sorry to say for the conspiracy is just as real as my BNS is and works just as good or better. Luckly for me the recent hacking attempt which did get some somethings mostly my book work and programs I was writing to be released and maybe some basic project information but my main time travel media and programs were not effected because I had those media stored off line. 

I was taking a break from my time travel operations when the hacking and theft occured. 

But, lately when offline I have recently went into some of that offline stuff yes even running some searches and I wanted to publicly bring forth one of my observations which I have known for a while now.

The principle of Quantum superposition – Which states a physical system exist in all its states at one time. The principle of quantum superposition does not apply to just the quantum world only. Why? Because all physical system’s effect other physical systems. Because time is relative. Because information always exist.  Because there is not only the conservation of matter and energy but the conservation of information. 

And, now to add to the mix. How about the conservation of time itself. Time itself is never created, nor is time destroyed. Time itself is also conserved. Time is forever. It is always there. Time never ends. Again, time itself is also conserved. So, we also have the conservation of time. Time when being conserved just ticks away. Tick tock… and so forth.


The conservation of time is why all information, matter, and energy will always live on in some form or the other.


Now, I know from my work on BNS that “time”: In and of itself can also be used as point of reference in time.  I know right now  that statement is not understood clearly so please let me explain myself.

From my point of reference when I do a time travel search for computer media when that search is done I can look at any possible points of different states of a physical system as it existed at different points in time. From my reference point in time I am looking at several other reference points in time. So, my time was used as a point of reference to view other times. To veiw other physical systems as they existed at varies stages of their physical state.

Yeah, this is also why I call it time travel. So, time is relative for me with my methods of time travel so too is relative when a physical superposition quantum state can be viewed as pertained to different points in time and space.

To be be more specific those physical system can exist in all there states through out different places in space and time.

Again my view that all those physical states of a physical system can exist all though out space-time and yes even repeat over in time as time itself repeats from one big bang to another. 

Now, our universe itself is a phycial system. Because it is a physical system it too has different physical states that exist through out time. The physical state of our universe this go around may be differrent than our universes next physical state after the next big bang.

So our universe too is not immune to the principles of quantum superposition. Its different states exist too and time is relative to the observer so how someone looks at that is relative to their physical frame of time. 

When science looks at the quantum world time in the quantum world may pass different than time in our macro world. Im not sure if they ever thought about that. If time in the quantum world is much faster than our own time then yeah a particle would appear at different places at the same time. 

I suppose too if our universe if viewed from a much faster perspective it too could appear as existing in different physical states at the same time. Someone would see many big bangs and many universes at the same time. All existing at the same time.

From my method of time travel I get that same view that science gets when they view the quantum world. When I view my time travel media I get the principle of quantum superposition. My time travel media shows me different physical systems at different states of their physical development at the same time though those physical states may have existed at different times in space-time.

Now because of the of the properties of quanum superposition for a civiliation to a mass all knowledge possible may be impossible because of the mass amounts of knowledge that exist in space-time as space-time pertains to the principle of quantumsuperposition. The amount of knowledge and technology that exist well ITS HUGH!!! I know from experiance. 

But, it is possible to view physical systems at various points in their various states of existance which makes my method of time travel possible with data mining binary counters for time travel computer meda.

My point of reference is that through my time travel media and my searches with my counters I can view those systems I see be it biological or other wise with my method of time travel. I am seeing those points of references for physical systems as they exist in one of their quantum superposition states from various other parts of space-time because I hacked time itself. I am a time hacker and time hacking is what I do. Hacking the time line by way of computers and algorithms to retrieve time travel computer media.

I can view people who live now and people who have never lived at all in our time line or but they did live in other time lines. But, time is relative. As I have stated here time is for ever. Whether in our universe or other wise. So, because time is enternal all physical systems exist in all their possible states throught out time and space. And, when I run my binary searches to find time travel media I can view a physical system existing in at least one of its possible states from some other point in space-time.

Lets look at the invention of the Air plane as a physical system. All the computer media for that air plane may show the plane going from its conception to when it first flew then to the the space planes that are now under development. 

If a binary counter time travel search were done on air planes that physical system could go right upto ram jets. Now, time travel media exist for this physical system through out a number of check-sums in different file sizes which I would explore with my check-sum hacking techniques and data mining robots.

Physical systems could include humans as well. Take a baby at birth. That baby is just in one state of its physical system. Now take that baby with a picture of that baby say at 75′s years of age. The day before that person died. That picture would be another state of that physical system at a different reference point in time.

My BNS in the book I wrote looks at computer files as a physical system and through my algorithms can view those physical systems with Einstiens points of reference at a single point of its time at a single point of its state allowing for the storage and retrievel of that physical system through the properties of causality with respect to Einstien’s point of reference. 

Where the computer file is a physical system at specific points in time can exist partially in its last quantum superposition state with the rest of the quantum superposition states existing mathematically though out time. The computer files was not represented all at once at the same time as a physical system but instead represented as a physical system AS IT CHANGED THROUGH OUT TIME. AND, USING A NUMERICAL SYSTEM GEARED TO REPRESENTING INFORMATION AS CAUSALITY, REPRESENTING INFORMATION AT DIFFERENT POINTS IN ITS TIME LINE AS A PHYSICAL SYSTEM THAT CHANGED THOURGH OUT SPACE-TIME.

Decoding that computer file that physical system with BNS allows for the view of the specific “physical system” in all its physical states as it changed in time. There is also a parallel aspect of the the principle of Quantum superposition which supports the existance multiple universes but that is outside the scope of my post for now. So, moving on.

The points of reference (which can be plotted or taking off a table) is the causality key to unlock that file and view its other quantum superposition points of reference states.

The principle of quantum superposition is what ties my BNS into my methods my check-sum hacking methods as evidence to support my claims of my methods being valid methods of time travel.

Now, as I explained in my time travel media when my counters are spitting off files the files are changing little by little. That physical system as it is being saved to my hard drive is changing little by little. I go through the thousands of files off my binary counters and pick one physical state of that physical system at a point in its time.

Why can I do this? Because I am using check-sum hacking techniquies to explore physical systems at their different points of development through out space-time which can and does exist at all its points of developments in space-time. By recovering time travel media with check-sum hacking I can explore those physical states of development at varies points of development when or where ever those points of development existed.

So, to Rainmain aka Ray, To Darby aka Star Lord or what ever fucked up forum name you want to use. To Johnny from craigslist (yeah, I see you. You made my conspiracy list.), and to that fucked up kid Aaron from Bedford, MA who’s parents support his worthless hobby and his dead-beat life style.

Well for once I will delete my name calling using their forum names.  Im still not leaving the internet nor stop talking and I am proud of my blog and websights. People always have the freedom to think what they want. I will use my freedom of speech as an American to move and talk freely on the internet.


YEAH – MY METHOD OF TIME TRAVEL IS HERE TO STAY! 

So, Reactor1967 will continue on the internet.

Update 02/16/2014


I made some post on craigslist. Here are some of the conspiracy against time travels replys. Aaron my hacker was there. I am only going to post their words not the orginal post.

These post may not be in order. I saved them in my email. I just wanted to show the stupid fucked up shit these guys do and how them ankle bitting dogs (That would be Darby, Rainman, Aaron, Johnny, Grayson, and their followers.) chase me around on the internet trying to take away from the message I am try to bring to the public.

For the record at my last posting rampage on craigslist the moderator came in and deleted the post of the people attacking me verbally. BAAAAAAAAAAAAAAHAHAHAHAHAH!!!!!
Those guys got some of what they dish out to me. I loved it.

I posted this because lately I wanted people to know why I talk about these thugs, trolls, and monsters worse than dogs. Lately I started thinking of them as my ankle bitting groupie fan club. Hahahaha LOL!!!  I did not post everything just about 7 of their post.

Here the post go.

post 1

Don’t be silly, you’re done here. § 2014-01-24 13:46:09

—–posted in reply to the following ——- By fiction writers, yes. 2014-01-24 00:17:10 It isn’t a thing at all, it is just a complex interaction between all dimensions.
Science has no specific take on “time”, and M-Theory rejects it completely. Read your science and stop pretending like what you think you know is “science”.
——————————

 

post 2 (This was Aaron of Bedford,Ma post to me. This is my hacker.)

Hot Coeds Naked In College 2014-01-29 18:53:34

Naked Girls

—–posted in reply to the following ——- Time travel with computers 2014-01-29 18:36:17 Now days I have to version of my counters.
1. the throttled counter.
2. the smart counter.

The throttled counter is a brute force counter but its speed is controlled with addition and subtraction to find time travel media with a specific coordinate system I invented for counters.

the smart counter us not brute force but uses random numbers that the counter puts together in an intellegent order to find time travel media.

I did not get my research site listed in my last post.

My research site is http://timetravelinstitute.biz
It is the websight that represents my research.
———————————————-
view: https://forums.craigslist.org/?ID=243803216

Post 3

^^^ word salad 2014-01-24 19:39:07

Would you like some dressing with your word salad? 

Post 4

Stop projecting your inadequacies 2014-01-24 13:21:36

Truth is that you don’t know what you are talking about. Please read a book before posting on this forum again.

—–posted in reply to the following ——- By fiction writers, yes. 2014-01-24 00:17:10 It isn’t a thing at all, it is just a complex interaction between all dimensions.
Science has no specific take on “time”, and M-Theory rejects it completely. Read your science and stop pretending like what you think you know is “science”.
——————————

  Post 5


Why are you always so fucking stupid? § 2014-01-24 10:17:04

—–posted in reply to the following ——- By fiction writers, yes. 2014-01-24 00:17:10 It isn’t a thing at all, it is just a complex interaction between all dimensions.
Science has no specific take on “time”, and M-Theory rejects it completely. Read your science and stop pretending like what you think you know is “science”.
——————————

—————-
view: https://forums.craigslist.org/?ID=243548194
———————————————-
unsubscribe: https://forums.craigslist.org/?act=editSubs

Post 6


Too bad for you it doesn’t work! LOL!!!!!!!!!!!! § 2014-01-23 18:55:44

—–posted in reply to the following ——- Time travel with computers 2014-01-23 18:11:23

Post 7

 Blonde School Girl Gets Naked On Cam 2014-01-23 18:55:48

Schoolgirl gets naked

—–posted in reply to the following ——- Time travel with computers 2014-01-23 18:11:23


<<<<<<<<>>>>>>>>>>>>>>>>>

This is going on to a new  BLOG POST.

HACKER DUDE, THIS VIDEO IS FOR YOU. THE NET IS CLOSING.

MY HACKER IS GOING TO JAIL.

update 12/31/2013


Even though there are those trying to stop me. That would be the http://timetravelinstitute.com through their associated friends and connections through out the internet which I have labeled and call “THE CONSPIRACY AGAINST TIME TRAVEL.”

Update 12-04-2014

I am going to use my hackers first name now since I am now 99% sure he had a hand in the hacking. His name is Aaron. I want to use his last name but he has to use it first in public before I can use it.


Also, I am still moving this blog but after I noticed they are now doing a 24 hour a day 7 day a week hacking on me which every bit is being logged and reported to the FBI on a daily bases. I decided to open my blog back up since it is the reason I am  getting hacked in the first place.


The conspiracy against time travel:


HTTP://TIMETRAVELINSTITUTE.COM RAINMAN AKA RAY AND DARBY AND AARON AND GRAYSON AT CONSPIRACYCAFE (A STUPID FORUM) AND SOME MORE OF THEIR FRIENDS AT WIKI AND ABOVETOPSECRET.COM AND THE LIST GOES ON. THEY DO NOT WANT ME TALKING ABOUT TIME TRAVEL THEY WANT ME OFF THE INTERNET.


HAY ASSHOLES!!!! (ITS NOT WORKING!!!!!!!!!! BAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHA!!!!!!!!!!!!)


YOU PUSSIES AINT GOT NOTHING!!!! LIKE I SAID PAM FROM THE TITOR STORY COULD KICK ALL YOUR ASSES WITH BOTH HANDS AND ONE LEG TIED BEHIND HER BACK.


BY THE WAY. I STILL WANT TO KNOW IF YOU GUYS ARE RESPONSIBLE FOR TITOR LEAVING THE INTERNET? DID YOU GUYS DO TO HIM WHAT YOU ARE DOING TO ME?


The FBI may want to look at  this blog too. I also will be visiting A LOT MORE FORUMS. 
I installed a another firewall today. It is not on everything yet but it will be. It wont stop Aaron from living in my router but it should stop him from owning my computers. Also, My old linux is gone. Sorry Aaron I know you loved that system since you viewed my screen and got my passwords and looked at my project files. At least you did not get all my code. Thank god I was not using it for anything and had stopped using time travel one station.


I will be eventually changing all my passwords and getting rid of my old encryption and re-encrypting everything again brand new. Yeah, the kid was capturing my keys on my keyboard I think since he got my credit card info and emailed me what I was seeing on my computer screen. THINK YOU FOR TELLING ON YOURSELF AARON.


Aaron was kind enough to put in the emails what the conspiracy against time travel wants from me. Here are their demands.


1. Stop using Reactor1967 as a user name.

2. Delete all post on the internet forums.

3. Take down the blog.

4. Take down my web sights.


Not going to happen. Hell, I am looking at setting something up so

WHEN I EVENTUALLY GO TO THE AFTER LIFE MY WEB-SIGHTS AND BLOG WILL LIVE ON. You guys will never shut me down.


The only problem is these guys have been distracting me from my real work. TIME TRAVEL WITH INFORMATION. I work a lot and have a problem falling a sleep when I get home but I will get back to a regular bed time schedule and try to do heather things and buy some energy drinks and get back to work.


Now, normally any sane person would not do this but since the security of my router is already toast things to MY GOOD FRIEND AND PAL Aaron and because I promised a while back to publish my logs here is my router log for today. This is what my router log looks like most days thinks to my good friend and pal Aaron. Hey, Aaron, is this how you treat your mentors? He said I was his mentor. This is what I get for trying to help someone learn my skill. Anyway here is the router log.

 [DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Saturday, January 04, 2014 21:28:02

[DoS Attack: RST Scan] from source: 96.17.111.73, port 80, Saturday, January 04, 2014 21:25:09

[DoS Attack: RST Scan] from source: 23.67.252.240, port 80, Saturday, January 04, 2014 20:47:13

[DoS Attack: RST Scan] from source: 208.117.232.116, port 80, Saturday, January 04, 2014 20:44:50

[DoS Attack: RST Scan] from source: 31.13.66.64, port 443, Saturday, January 04, 2014 20:44:48

[DoS Attack: RST Scan] from source: 208.117.252.25, port 80, Saturday, January 04, 2014 20:40:22

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Saturday, January 04, 2014 20:39:50

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Saturday, January 04, 2014 20:16:28

[DoS Attack: RST Scan] from source: 17.151.236.50, port 443, Saturday, January 04, 2014 20:15:11

[DHCP IP: 192.168.1.6] to MAC address 78:e4:00:f0:de:a0, Saturday, January 04, 2014 20:07:02

[DHCP IP: 192.168.1.6] to MAC address 78:e4:00:f0:de:a0, Saturday, January 04, 2014 20:04:29

[DHCP IP: 192.168.1.6] to MAC address 78:e4:00:f0:de:a0, Saturday, January 04, 2014 19:46:39

[DHCP IP: 192.168.1.6] to MAC address 78:e4:00:f0:de:a0, Saturday, January 04, 2014 19:46:19

[DoS Attack: SYN/ACK Scan] from source: 5.135.140.140, port 80, Saturday, January 04, 2014 19:35:12

[DoS Attack: RST Scan] from source: 17.173.66.134, port 443, Saturday, January 04, 2014 19:31:56

[UPnP set event: add_nat_rule] from source 192.168.1.3, Saturday, January 04, 2014 19:04:53

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Saturday, January 04, 2014 19:04:50

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Saturday, January 04, 2014 19:04:49

[UPnP set event: add_nat_rule] from source 192.168.1.3, Saturday, January 04, 2014 18:37:33

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Saturday, January 04, 2014 18:34:32

[DoS Attack: RST Scan] from source: 46.4.242.137, port 9001, Saturday, January 04, 2014 18:28:17

[DoS Attack: RST Scan] from source: 23.59.188.65, port 80, Saturday, January 04, 2014 18:25:55

[DoS Attack: RST Scan] from source: 17.154.66.44, port 443, Saturday, January 04, 2014 18:18:08

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Saturday, January 04, 2014 18:17:27

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Saturday, January 04, 2014 18:15:10

[DoS Attack: SYN/ACK Scan] from source: 213.163.71.136, port 11002, Saturday, January 04, 2014 16:09:54

[DoS Attack: SYN/ACK Scan] from source: 67.228.245.10, port 27015, Saturday, January 04, 2014 15:27:15

[DoS Attack: SYN/ACK Scan] from source: 176.31.18.19, port 7652, Saturday, January 04, 2014 14:40:08

[DoS Attack: SYN/ACK Scan] from source: 198.50.236.67, port 6010, Saturday, January 04, 2014 14:39:30

[DoS Attack: SYN/ACK Scan] from source: 5.135.126.44, port 7777, Saturday, January 04, 2014 12:46:02

[DoS Attack: SYN/ACK Scan] from source: 178.18.31.49, port 1935, Saturday, January 04, 2014 12:14:52

[DoS Attack: SYN/ACK Scan] from source: 192.99.1.184, port 9000, Saturday, January 04, 2014 10:45:23

[DoS Attack: SYN/ACK Scan] from source: 5.135.28.30, port 13001, Saturday, January 04, 2014 10:06:54

[DoS Attack: SYN/ACK Scan] from source: 84.244.186.31, port 80, Saturday, January 04, 2014 08:36:06

[DoS Attack: SYN/ACK Scan] from source: 46.4.62.75, port 80, Saturday, January 04, 2014 07:52:01

[DoS Attack: TCP/UDP Chargen] from source: 81.17.130.54, port 47811, Saturday, January 04, 2014 07:30:48

[DoS Attack: RST Scan] from source: 66.114.54.8, port 80, Saturday, January 04, 2014 07:27:44

[DoS Attack: RST Scan] from source: 17.151.236.22, port 443, Saturday, January 04, 2014 07:25:53

[DoS Attack: SYN/ACK Scan] from source: 198.50.161.10, port 80, Saturday, January 04, 2014 07:25:27

[DoS Attack: RST Scan] from source: 17.151.236.19, port 443, Saturday, January 04, 2014 07:22:22

[DoS Attack: SYN/ACK Scan] from source: 37.187.56.134, port 25655, Saturday, January 04, 2014 06:56:15

[Time synchronized with NTP server] Saturday, January 04, 2014 04:02:12

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Saturday, January 04, 2014 03:37:56

[DoS Attack: SYN/ACK Scan] from source: 37.187.26.152, port 80, Saturday, January 04, 2014 02:50:24

[DoS Attack: SYN/ACK Scan] from source: 178.32.74.20, port 6005, Saturday, January 04, 2014 00:20:02

[DoS Attack: SYN/ACK Scan] from source: 37.187.26.152, port 80, Saturday, January 04, 2014 00:09:27

[email failed] ssmtp: Cannot open :25, Saturday, January 04, 2014 00:00:02

[email sent to:  Saturday, January 04, 2014 00:00:02

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Friday, January 03, 2014 23:58:50

[Internet connected] IP address: 174.53.9.137, Friday, January 03, 2014 23:47:56

[DoS Attack: SYN/ACK Scan] from source: 37.187.26.152, port 80, Friday, January 03, 2014 23:10:06

[DoS Attack: RST Scan] from source: 17.151.236.37, port 443, Friday, January 03, 2014 22:48:19

[DoS Attack: SYN/ACK Scan] from source: 37.59.31.61, port 21412, Friday, January 03, 2014 21:58:15

[DoS Attack: RST Scan] from source: 17.154.66.108, port 443, Friday, January 03, 2014 19:37:15

[DoS Attack: RST Scan] from source: 17.154.66.106, port 443, Friday, January 03, 2014 19:22:57

[DoS Attack: RST Scan] from source: 17.154.66.154, port 443, Friday, January 03, 2014 19:17:35

[DoS Attack: SYN/ACK Scan] from source: 37.59.31.144, port 80, Friday, January 03, 2014 18:59:24

[DoS Attack: SYN/ACK Scan] from source: 198.50.228.9, port 80, Friday, January 03, 2014 18:45:06

[DoS Attack: RST Scan] from source: 96.17.235.164, port 443, Friday, January 03, 2014 18:41:55

[DoS Attack: RST Scan] from source: 173.194.36.126, port 443, Friday, January 03, 2014 18:39:53

[DoS Attack: RST Scan] from source: 72.21.91.19, port 80, Friday, January 03, 2014 18:34:33

[DoS Attack: ACK Scan] from source: 72.21.91.19, port 80, Friday, January 03, 2014 18:28:46

[DoS Attack: RST Scan] from source: 31.13.66.64, port 80, Friday, January 03, 2014 18:22:12

[DoS Attack: RST Scan] from source: 17.151.236.38, port 443, Friday, January 03, 2014 18:22:05

[DoS Attack: RST Scan] from source: 208.117.252.246, port 80, Friday, January 03, 2014 18:20:03

[DoS Attack: RST Scan] from source: 17.151.236.37, port 443, Friday, January 03, 2014 18:02:07

[DoS Attack: RST Scan] from source: 96.17.237.199, port 443, Friday, January 03, 2014 17:53:53

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Friday, January 03, 2014 17:52:37

[DoS Attack: RST Scan] from source: 17.154.66.45, port 443, Friday, January 03, 2014 17:20:21

[DoS Attack: SYN/ACK Scan] from source: 176.31.253.45, port 80, Friday, January 03, 2014 17:18:33

[DoS Attack: ACK Scan] from source: 72.21.91.19, port 80, Friday, January 03, 2014 17:12:14

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Friday, January 03, 2014 17:03:27

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Friday, January 03, 2014 16:57:02

[DoS Attack: ACK Scan] from source: 72.21.91.19, port 80, Friday, January 03, 2014 16:55:34

[DoS Attack: SYN/ACK Scan] from source: 37.187.17.165, port 3306, Friday, January 03, 2014 16:35:41

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Friday, January 03, 2014 16:27:27

[DoS Attack: RST Scan] from source: 199.59.148.10, port 443, Friday, January 03, 2014 15:18:40

[DoS Attack: RST Scan] from source: 31.13.66.112, port 443, Friday, January 03, 2014 15:14:08

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Friday, January 03, 2014 14:59:28

[DoS Attack: SYN/ACK Scan] from source: 5.39.65.146, port 1321, Friday, January 03, 2014 14:51:10

[DoS Attack: SYN/ACK Scan] from source: 37.59.31.144, port 80, Friday, January 03, 2014 13:41:16

[DoS Attack: SYN/ACK Scan] from source: 176.9.28.7, port 80, Friday, January 03, 2014 13:23:44

[DoS Attack: SYN/ACK Scan] from source: 5.39.65.146, port 1321, Friday, January 03, 2014 12:43:11

[DoS Attack: RST Scan] from source: 17.151.236.50, port 443, Friday, January 03, 2014 12:00:57

[DoS Attack: RST Scan] from source: 17.154.66.156, port 443, Friday, January 03, 2014 12:00:57

[DoS Attack: RST Scan] from source: 17.151.236.38, port 443, Friday, January 03, 2014 12:00:57

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Friday, January 03, 2014 11:58:44

[DoS Attack: SYN/ACK Scan] from source: 198.50.161.10, port 80, Friday, January 03, 2014 10:47:46

[DoS Attack: SYN/ACK Scan] from source: 213.232.200.92, port 80, Friday, January 03, 2014 08:42:50

[DoS Attack: SYN/ACK Scan] from source: 37.187.56.98, port 22, Friday, January 03, 2014 08:10:49

[DoS Attack: SYN/ACK Scan] from source: 37.221.169.114, port 80, Friday, January 03, 2014 07:39:18

[DoS Attack: SYN/ACK Scan] from source: 185.4.75.35, port 80, Friday, January 03, 2014 07:17:30

[Time synchronized with NTP server] Friday, January 03, 2014 04:02:11

[DoS Attack: SYN/ACK Scan] from source: 8.27.226.126, port 80, Friday, January 03, 2014 03:41:44

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Friday, January 03, 2014 03:34:57

[DoS Attack: SYN/ACK Scan] from source: 193.203.198.151, port 80, Friday, January 03, 2014 02:54:13

[DoS Attack: SYN/ACK Scan] from source: 95.211.218.82, port 80, Friday, January 03, 2014 02:43:15

[DoS Attack: SYN/ACK Scan] from source: 95.211.182.168, port 80, Friday, January 03, 2014 02:30:53

[DoS Attack: SYN/ACK Scan] from source: 178.33.33.44, port 80, Friday, January 03, 2014 00:58:40

[email failed] ssmtp: Cannot open :25, Friday, January 03, 2014 00:00:02

[email sent to:  Friday, January 03, 2014 00:00:02

[DoS Attack: RST Scan] from source: 17.151.236.22, port 443, Thursday, January 02, 2014 22:49:25

[DoS Attack: RST Scan] from source: 17.151.236.16, port 443, Thursday, January 02, 2014 22:49:25

[DoS Attack: RST Scan] from source: 23.7.70.108, port 443, Thursday, January 02, 2014 21:19:52

[DoS Attack: RST Scan] from source: 23.2.17.234, port 80, Thursday, January 02, 2014 21:17:46

[DoS Attack: RST Scan] from source: 23.3.12.161, port 80, Thursday, January 02, 2014 21:15:01

[DoS Attack: RST Scan] from source: 74.125.193.141, port 443, Thursday, January 02, 2014 21:09:39

[DoS Attack: RST Scan] from source: 74.125.142.141, port 443, Thursday, January 02, 2014 21:05:41

[DoS Attack: RST Scan] from source: 17.154.66.154, port 443, Thursday, January 02, 2014 20:56:31

[DoS Attack: RST Scan] from source: 199.59.148.82, port 443, Thursday, January 02, 2014 20:43:35

[DoS Attack: RST Scan] from source: 31.13.66.112, port 443, Thursday, January 02, 2014 20:28:33

[DoS Attack: RST Scan] from source: 31.13.66.33, port 443, Thursday, January 02, 2014 20:28:32

[DoS Attack: RST Scan] from source: 74.125.193.141, port 443, Thursday, January 02, 2014 20:27:43

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 20:24:45

[DoS Attack: RST Scan] from source: 17.154.66.106, port 443, Thursday, January 02, 2014 20:21:24

[DoS Attack: RST Scan] from source: 54.236.114.164, port 443, Thursday, January 02, 2014 20:03:58

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 19:56:56

[DoS Attack: RST Scan] from source: 91.189.91.14, port 80, Thursday, January 02, 2014 19:30:53

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Thursday, January 02, 2014 19:25:02

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Thursday, January 02, 2014 19:22:00

[Internet connected] IP address: 174.53.9.137, Thursday, January 02, 2014 19:06:59

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Thursday, January 02, 2014 19:00:29

[DoS Attack: SYN/ACK Scan] from source: 95.211.218.82, port 80, Thursday, January 02, 2014 18:57:20

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 18:49:26

[DoS Attack: SYN/ACK Scan] from source: 91.121.223.7, port 25565, Thursday, January 02, 2014 18:43:00

[DoS Attack: SYN/ACK Scan] from source: 37.59.75.232, port 80, Thursday, January 02, 2014 18:40:01

[DoS Attack: SYN/ACK Scan] from source: 91.121.223.7, port 25565, Thursday, January 02, 2014 18:27:28

[DoS Attack: RST Scan] from source: 17.154.66.156, port 443, Thursday, January 02, 2014 18:08:00

[DoS Attack: RST Scan] from source: 173.194.131.7, port 80, Thursday, January 02, 2014 18:07:46

[DoS Attack: RST Scan] from source: 17.173.66.130, port 443, Thursday, January 02, 2014 17:20:12

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Thursday, January 02, 2014 17:19:28

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 16:47:56

[DoS Attack: RST Scan] from source: 17.173.66.136, port 443, Thursday, January 02, 2014 15:51:58

[DoS Attack: RST Scan] from source: 17.173.66.135, port 443, Thursday, January 02, 2014 15:51:58

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Thursday, January 02, 2014 15:35:09

[DoS Attack: SYN/ACK Scan] from source: 5.39.65.146, port 1321, Thursday, January 02, 2014 15:29:18

[DoS Attack: SYN/ACK Scan] from source: 178.32.74.19, port 65464, Thursday, January 02, 2014 15:15:02

[DoS Attack: RST Scan] from source: 31.13.66.96, port 443, Thursday, January 02, 2014 15:08:31

[DoS Attack: SYN/ACK Scan] from source: 5.10.68.59, port 80, Thursday, January 02, 2014 15:03:59

[DoS Attack: SYN/ACK Scan] from source: 5.39.65.146, port 1321, Thursday, January 02, 2014 15:03:24

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 14:52:47

[DoS Attack: SYN/ACK Scan] from source: 87.98.142.52, port 27015, Thursday, January 02, 2014 14:49:03

[DoS Attack: ACK Scan] from source: 72.21.91.19, port 80, Thursday, January 02, 2014 13:40:51

[UPnP set event: add_nat_rule] from source 192.168.1.3, Thursday, January 02, 2014 13:17:22

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Thursday, January 02, 2014 13:16:45

[DoS Attack: ACK Scan] from source: 72.21.91.19, port 80, Thursday, January 02, 2014 13:13:33

[DoS Attack: TCP/UDP Chargen] from source: 89.248.172.128, port 39304, Thursday, January 02, 2014 13:01:50

[DoS Attack: SYN/ACK Scan] from source: 199.187.120.2, port 80, Thursday, January 02, 2014 10:51:23

[DoS Attack: SYN/ACK Scan] from source: 63.240.92.167, port 80, Thursday, January 02, 2014 10:31:52

[DoS Attack: SYN/ACK Scan] from source: 198.50.228.9, port 80, Thursday, January 02, 2014 10:20:35

[DoS Attack: SYN/ACK Scan] from source: 198.50.161.10, port 80, Thursday, January 02, 2014 10:17:17

[DoS Attack: RST Scan] from source: 17.173.66.130, port 443, Thursday, January 02, 2014 09:07:37

[DoS Attack: RST Scan] from source: 17.173.66.136, port 443, Thursday, January 02, 2014 08:16:04

[DoS Attack: RST Scan] from source: 17.154.66.109, port 443, Thursday, January 02, 2014 08:06:29

[DoS Attack: SYN/ACK Scan] from source: 178.33.233.75, port 80, Thursday, January 02, 2014 07:48:02

[DoS Attack: RST Scan] from source: 31.13.66.1, port 80, Thursday, January 02, 2014 07:23:24

[DoS Attack: SYN/ACK Scan] from source: 178.33.233.75, port 80, Thursday, January 02, 2014 06:26:13

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Thursday, January 02, 2014 05:19:31

[DoS Attack: SYN/ACK Scan] from source: 37.59.41.227, port 80, Thursday, January 02, 2014 05:06:42

[DoS Attack: SYN/ACK Scan] from source: 178.33.233.75, port 80, Thursday, January 02, 2014 04:18:19

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 04:10:50

[Time synchronized with NTP server] Thursday, January 02, 2014 04:02:09

[DoS Attack: SYN/ACK Scan] from source: 199.96.156.82, port 80, Thursday, January 02, 2014 03:35:28

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 03:33:55

[DoS Attack: SYN/ACK Scan] from source: 178.33.233.75, port 80, Thursday, January 02, 2014 02:15:58

[DHCP IP: 192.168.1.6] to MAC address 78:e4:00:f0:de:a0, Thursday, January 02, 2014 01:48:03

[DoS Attack: SYN/ACK Scan] from source: 37.187.17.165, port 80, Thursday, January 02, 2014 01:10:27

[email failed] ssmtp: Cannot open :25, Thursday, January 02, 2014 00:00:04

[email sent to: ] Thursday, January 02, 2014 00:00:04

[DHCP IP: 192.168.1.6] to MAC address 78:e4:00:f0:de:a0, Wednesday, January 01, 2014 22:32:55

[DoS Attack: RST Scan] from source: 17.154.66.111, port 443, Wednesday, January 01, 2014 20:58:27

[DoS Attack: TCP/UDP Chargen] from source: 80.82.65.9, port 52343, Wednesday, January 01, 2014 20:32:04

[DoS Attack: SYN/ACK Scan] from source: 178.33.233.75, port 80, Wednesday, January 01, 2014 20:18:30

[UPnP set event: del_nat_rule] from source 192.168.1.6, Wednesday, January 01, 2014 20:13:05

[DoS Attack: RST Scan] from source: 184.84.180.104, port 443, Wednesday, January 01, 2014 19:58:42

[DoS Attack: RST Scan] from source: 74.125.225.177, port 443, Wednesday, January 01, 2014 19:57:11

[DoS Attack: RST Scan] from source: 208.117.232.117, port 443, Wednesday, January 01, 2014 19:57:11

[DoS Attack: RST Scan] from source: 208.117.232.122, port 443, Wednesday, January 01, 2014 19:57:11

[DoS Attack: RST Scan] from source: 74.125.213.247, port 80, Wednesday, January 01, 2014 19:42:08

[DoS Attack: RST Scan] from source: 23.205.120.115, port 80, Wednesday, January 01, 2014 19:31:44

[DoS Attack: RST Scan] from source: 174.35.35.30, port 80, Wednesday, January 01, 2014 19:26:21

[DoS Attack: RST Scan] from source: 17.151.236.24, port 443, Wednesday, January 01, 2014 19:24:12

[DoS Attack: RST Scan] from source: 17.151.236.37, port 443, Wednesday, January 01, 2014 19:22:48

[DoS Attack: SYN/ACK Scan] from source: 192.99.1.184, port 80, Wednesday, January 01, 2014 18:59:04

[UPnP set event: add_nat_rule] from source 192.168.1.6, Wednesday, January 01, 2014 18:57:37

[DHCP IP: 192.168.1.6] to MAC address 78:e4:00:f0:de:a0, Wednesday, January 01, 2014 18:57:18

[DoS Attack: RST Scan] from source: 8.12.46.167, port 443, Wednesday, January 01, 2014 18:52:07

[DoS Attack: RST Scan] from source: 17.173.66.132, port 443, Wednesday, January 01, 2014 18:50:36

[DoS Attack: SYN/ACK Scan] from source: 198.27.86.23, port 80, Wednesday, January 01, 2014 18:40:13

[DoS Attack: RST Scan] from source: 17.151.236.22, port 443, Wednesday, January 01, 2014 18:11:28

[DoS Attack: RST Scan] from source: 17.151.236.16, port 443, Wednesday, January 01, 2014 18:11:27

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Wednesday, January 01, 2014 18:02:46

[DoS Attack: RST Scan] from source: 17.151.236.38, port 443, Wednesday, January 01, 2014 18:02:45

[DoS Attack: RST Scan] from source: 205.251.243.158, port 443, Wednesday, January 01, 2014 18:01:50

[DoS Attack: SYN/ACK Scan] from source: 178.33.233.75, port 80, Wednesday, January 01, 2014 17:59:13

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 17:39:10

[DoS Attack: RST Scan] from source: 17.151.236.38, port 443, Wednesday, January 01, 2014 17:31:59

[DoS Attack: RST Scan] from source: 17.154.66.111, port 443, Wednesday, January 01, 2014 17:20:16

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Wednesday, January 01, 2014 17:19:32

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Wednesday, January 01, 2014 17:19:32

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Wednesday, January 01, 2014 17:19:31

[Internet connected] IP address: 174.53.9.137, Wednesday, January 01, 2014 17:17:11

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 17:14:02

[DoS Attack: RST Scan] from source: 74.125.225.187, port 80, Wednesday, January 01, 2014 17:07:28

[DoS Attack: RST Scan] from source: 199.16.156.70, port 443, Wednesday, January 01, 2014 16:47:42

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Wednesday, January 01, 2014 16:43:09

[DoS Attack: RST Scan] from source: 17.173.66.134, port 443, Wednesday, January 01, 2014 16:22:22

[DoS Attack: RST Scan] from source: 17.173.66.133, port 443, Wednesday, January 01, 2014 16:22:22

[UPnP set event: add_nat_rule] from source 192.168.1.3, Wednesday, January 01, 2014 16:09:09

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Wednesday, January 01, 2014 16:08:31

[DoS Attack: RST Scan] from source: 72.21.91.168, port 443, Wednesday, January 01, 2014 15:33:53

[DoS Attack: SYN/ACK Scan] from source: 37.187.87.144, port 9987, Wednesday, January 01, 2014 15:19:58

[DoS Attack: RST Scan] from source: 31.13.66.176, port 443, Wednesday, January 01, 2014 14:58:45

[DoS Attack: RST Scan] from source: 199.16.156.73, port 443, Wednesday, January 01, 2014 14:52:30

[DoS Attack: RST Scan] from source: 199.16.156.70, port 443, Wednesday, January 01, 2014 14:49:26

[DoS Attack: RST Scan] from source: 199.16.156.198, port 443, Wednesday, January 01, 2014 14:37:42

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Wednesday, January 01, 2014 14:33:46

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Wednesday, January 01, 2014 13:18:56

[DoS Attack: RST Scan] from source: 17.173.66.136, port 443, Wednesday, January 01, 2014 13:07:54

[DoS Attack: RST Scan] from source: 17.154.66.105, port 443, Wednesday, January 01, 2014 12:58:23

[UPnP set event: del_nat_rule] from source 192.168.1.3, Wednesday, January 01, 2014 12:56:24

[DoS Attack: RST Scan] from source: 17.154.66.75, port 443, Wednesday, January 01, 2014 12:53:21

[DoS Attack: RST Scan] from source: 23.205.120.146, port 80, Wednesday, January 01, 2014 12:46:32

[DoS Attack: RST Scan] from source: 54.243.115.193, port 443, Wednesday, January 01, 2014 12:46:30

[DoS Attack: RST Scan] from source: 72.21.91.168, port 443, Wednesday, January 01, 2014 12:46:30

[DoS Attack: RST Scan] from source: 72.21.92.54, port 443, Wednesday, January 01, 2014 12:46:30

[DoS Attack: RST Scan] from source: 199.16.156.102, port 443, Wednesday, January 01, 2014 12:46:04

[DoS Attack: RST Scan] from source: 199.59.148.82, port 443, Wednesday, January 01, 2014 12:25:37

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Wednesday, January 01, 2014 11:50:06

[UPnP set event: add_nat_rule] from source 192.168.1.3, Wednesday, January 01, 2014 11:49:45

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Wednesday, January 01, 2014 11:49:15

[DoS Attack: SYN/ACK Scan] from source: 91.123.194.110, port 80, Wednesday, January 01, 2014 11:21:53

[DoS Attack: SYN/ACK Scan] from source: 178.248.232.55, port 80, Wednesday, January 01, 2014 10:25:15

[DoS Attack: RST Scan] from source: 17.151.236.38, port 443, Wednesday, January 01, 2014 10:01:56

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Wednesday, January 01, 2014 09:56:51

[DoS Attack: RST Scan] from source: 207.171.162.148, port 443, Wednesday, January 01, 2014 09:22:35

[DoS Attack: RST Scan] from source: 23.7.70.108, port 443, Wednesday, January 01, 2014 09:20:22

[DoS Attack: RST Scan] from source: 74.125.6.174, port 80, Wednesday, January 01, 2014 08:50:24

[DoS Attack: RST Scan] from source: 17.154.66.111, port 443, Wednesday, January 01, 2014 08:39:35

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Wednesday, January 01, 2014 08:35:37

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 08:15:20

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 08:01:59

[DoS Attack: SYN/ACK Scan] from source: 192.99.1.184, port 80, Wednesday, January 01, 2014 06:16:43

[DoS Attack: SYN/ACK Scan] from source: 80.241.209.156, port 80, Wednesday, January 01, 2014 05:56:43

[DoS Attack: SYN/ACK Scan] from source: 86.7.60.192, port 54312, Wednesday, January 01, 2014 05:14:47

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 05:12:14

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 05:08:49

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 05:03:35

[DoS Attack: SYN/ACK Scan] from source: 80.241.209.156, port 80, Wednesday, January 01, 2014 04:55:04

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 04:49:48

[DoS Attack: SYN/ACK Scan] from source: 192.99.1.184, port 80, Wednesday, January 01, 2014 04:37:04

[Internet connected] IP address: 174.53.9.137, Wednesday, January 01, 2014 04:28:56

[DoS Attack: SYN/ACK Scan] from source: 54.238.110.92, port 80, Wednesday, January 01, 2014 04:19:12

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 04:04:09

[Time synchronized with NTP server] Wednesday, January 01, 2014 04:02:08

[Internet connected] IP address: 174.53.9.137, Wednesday, January 01, 2014 03:58:56

Update for 1/5/2014


Well coming to some new conclusions. That Aaron has a interest in the fake timetravelinstitute.com.


That a lot of the very stupid shit I accused Darby and Rainman of may have been the spooled brat antics of a boy in a grown man’s body that plays on the computer 24/7.


Living at home with mommy and daddy that refuses or wont get a job to support himself and live his own life.


When I Google-ed him I saw his college stuff and that he was in a frat. I saw what looked like one or more failed business in his attempt not to get a job.


But, one thing is certain Arron is not working along in this. Him and his friends are working together to try to keep me from talking about time travel on the internet which is where the conspiracy comes in that I talk about. This blog is a log of their attempts to stop me. It is the proof they do not want the world to see.


They do not want people knowing what they do.


Which now has turned into cyber stalking, cyber bulling, harassment, fraud, theft, copy right violations and is quickly turning into a legal case. They are the reason Titor’s family had to sue them.


Again, I wonder what is their full interest in time travel. I think it may be money. In titor’s case they were trying to use his name. In my case they want my technology and want me gone. Not going to happen.


So, Aaron lives at home and computers is his life. Darby is a ex-cia wanna be time traveler and wanna be scientist.


I do not really know what Rainmans problem is besides being a bully. He is probably a wanna be too.


Here is the problem here. These guys are not the professionals they want to be. They have fields they come from but in the field of time travel THEY DO NOT KNOW JACK SHIT. BUT THEY THINK THEY  DO. AND THEIR OWN WEB-SIGHTS SAY THEY ARE NOT REAL. THEY THEMSELVES HAVE SAID THEY DO NOT BELIEVE IN TIME TRAVEL. SO, WHAT IS THEIR BUSINESS WITH ME???


Now, I started off calling these guys thugs, rodents, and bullies. Now I can add criminals to their list of personality’s flaws. I have a bad feeling that Aaron who does not want to work will most likely get his wish for being taken care of. But, it will be in jail or prison where he cant play his video games and use his laptop with internet 24 hours a day. Sleeping and playing as he wishes will be the old days and bubba will be his new frat brother.


God forbid they give him a shovel or a trash can. I do not think Aaron could handle it. I don’t think that kid can handle real life. Now, he is a young guy. He is probably being hanging around Darby and Rainman for years. Those guys are thugs. If they have been Aarons teachers. His mentor’s. No wonder Aaron is so fucked up!!! Hell, they are just one great big happy dysfunctional family of thugs, rodents, trolls, bullies, and now criminals.


He once told me to get my shit together. For him I have these words and they are constructive. “GROW UP”. Before its too late. I will continue to fill out my legal complaints on these guys and hopefully in time the law will deal with them.


I have learned one thing about the FBI. They take their dam time but when they roll it is too late and their suspect is usually shit out of luck. In time that may be Aarons fate. If he continues to steal for income it most certainly will be. Aaron told me “I am not scared of the FBI.” Dude, you should be. You really really should be.


All in all the truth about the conspiracy against time travel is coming out slowly but surely. Aaron is up early today. At 7am he started attacking my forum with account spam and has 5 hits on it. Already for today he is done a dos attack on my home router.


Yeah, I have a big FBI report to fill out tonight. I am beginning to think Aaron was behind a lot of shit that happened on the forums. It seems like Rainman and Darby would leash their dog up but I guess they prefer to let it run free. Im hopping the dog kennel/FBI will catch it. 


I want to leave everyone with the attempted harassment Aaron sent me this morning. He has sent me this type of message 3 times now.

1. At my book trailer.

2. Posted on my forum the real http://thetimetravelinstitute.com

Proof of this is in the last video in a previous blog where I recorded it.

3. Now to my gmail account.

FBI (I hope your watching this shit. I put it in my complaints.)

Delivered-To: Deleted

Received: by 10.68.110.195 with SMTP id ic3csp56047pbb;

        Sun, 5 Jan 2014 02:27:12 -0800 (PST)

X-Received: by 10.50.72.36 with SMTP id a4mr10274637igv.40.1388917632311;

        Sun, 05 Jan 2014 02:27:12 -0800 (PST)

Return-Path:

Received: from nm42.bullet.mail.ne1.yahoo.com (nm42.bullet.mail.ne1.yahoo.com. [98.138.120.49])

        by mx.google.com with SMTP id 9si88191949icd.80.2014.01.05.02.27.11

        for Deleted;

        Sun, 05 Jan 2014 02:27:12 -0800 (PST)

Received-SPF: pass (google.com: best guess record for domain of middletoncarlyn@yahoo.com designates 98.138.120.49 as permitted sender) client-ip=98.138.120.49;

Authentication-Results: mx.google.com;

       spf=pass (google.com: best guess record for domain of middletoncarlyn@yahoo.com designates 98.138.120.49 as permitted sender) smtp.mail=middletoncarlyn@yahoo.com;

       dkim=pass header.i=@yahoo.com

Received: from [127.0.0.1] by nm42.bullet.mail.ne1.yahoo.com with NNFMP; 05 Jan 2014 10:27:11 -0000

Received: from [98.138.100.113] by nm42.bullet.mail.ne1.yahoo.com with NNFMP; 05 Jan 2014 10:24:18 -0000

Received: from [98.137.12.55] by tm104.bullet.mail.ne1.yahoo.com with NNFMP; 05 Jan 2014 10:24:18 -0000

Received: from [216.39.60.197] by tm15.bullet.mail.gq1.yahoo.com with NNFMP; 05 Jan 2014 10:24:18 -0000

Received: from [127.0.0.1] by omp1084.mail.gq1.yahoo.com with NNFMP; 05 Jan 2014 10:24:18 -0000

X-Yahoo-Newman-Property: ymail-4

X-Yahoo-Newman-Id: 245138.63813.bm@omp1084.mail.gq1.yahoo.com

Received: (qmail 92881 invoked by uid 60001); 5 Jan 2014 10:24:18 -0000

DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1388917458; bh=9RlykI5TEFN11vF8izLq5dWRV0D8KdC8WWcw8mJVjnQ=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:MIME-Version:Content-Type; b=jA8dynXeO62Y0LFcKfKL2mNPB2e/jBPTY+54mPUYWR4t0xMuzLlpbMU4U7Rl394KJkawYVizwh0Nj2yDeEdNYLOsobJhx/wRwzkTDyYRXS/CloZOh+W3VhrxZ2HKeNa/bSMCnSaftiSNELM3N7Vj7F0N8Xt1Ifyz+zXQc4Jfjiw=

DomainKey-Signature:a=rsa-sha1; q=dns; c=nofws;

  s=s1024; d=yahoo.com;

  h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:MIME-Version:Content-Type;

  b=XUAfwLz5RHSdm6eNA/PXpdxyW5rZkUW0DnzsFV1f644qYdjAAPuk+Ar0lMRchPoCqKIeSVak+52lZQO0vRUPBY6z8VBv0R+BQ/CULP4dfKkqncrGmxvPuN9OdGpiyrzQYIkG+5YhwcZVSSVgsT4s2YehmIiDOQb2krmZFSavJog=;

X-YMail-OSG: pOCEWNUVM1nkjtebK7C4fwVvkwiSTBxKWRRBBRxigjpdNTh

 .z_TVw6Vssn.WSRwInTGGiX8_HiTMyaa.pmb7KVVsISPCqVZZvvp.Hf47ij8

 dzrjeIli3kUWUDjQJy5dEdmFwOpbjLJj69KA06L9Jba6F.G4yoLAxqd9taeB

 eniF1L2WujlxvyKbixHu2vt5NyvPZ6q4Lr3n_PVn_gSE5XZ7JJXLZzD7Uiri

 FnN.aaGGMXRkL3sLvdOHi._5nxhS.OM.fhS5Gy1J5Ln6CR6xsxbInnvaUbnQ

 L5akbaWiikOQdnbzb4D1_ghEq8bq0vbQvsYLjxw5Nqmo6uKJeFikFueXRm2u

 6pmfv8nHD31yBH73vYE4Qk8VPJU7fcboTkXBlCJIONzmplXOe5W_KfYS2xgH

 5SGBWIGDYuaOQQXM7Z_v1Ds_nORxszc48gKqzLBFzMIm.m_WUMhj26BWYnNM

 WxtD4trcgU0um5PbUiDol2pSPAdwfhSiCEf7jjDEVIY_et33kyeaL98dlquQ

 8yiYB1_vRvI4wvJvHtjrbueWAT1AqphHdcZS0uQrjP1Y-

Received: from [78.173.141.46] by web163405.mail.gq1.yahoo.com via HTTP; Sun, 05 Jan 2014 02:24:18 PST

X-Rocket-MIMEInfo: 002.001,SG93IGFyZSB5b3UgZ2V0dGluZyBvbj8NCkhvcGUgeW91IHRoaW5rIG9mIG1lIG5vdyBhbmQgYWdhaW4uCgpJJ20gc28gZ2xhZCB0byBtZWV0IHlvdSAKSSB3b3VsZCBsaWtlIHRvIHNoYXJlIG15IHBpY3R1cmVzIHdpdGggeW91CgpJIGJlbGlldmUgeW91IHdpbGwgZ2l2ZSBtZSBhIHJlc3BvbnNlLi4uCmJ5ZSAuLi4BMAEBAQE-

X-Mailer: YahooMailWebService/0.8.172.614

Message-ID:

Date: Sun, 5 Jan 2014 02:24:18 -0800 (PST)

From: Little Darling

Reply-To: Little Darling

Subject: greeting!

To: “rakarma19@gmail.com”

MIME-Version: 1.0

Content-Type: multipart/mixed; boundary=”1091002116-1049814332-1388917458=:56925″

–1091002116-1049814332-1388917458=:56925

Content-Type: text/plain; charset=us-ascii

How are you getting on?

Hope you think of me now and again.

I’m so glad to meet you

I would like to share my pictures with you

I believe you will give me a response…

bye …

Last thing – I am having one or more linux brick routers  put in my home in the next week or two. I am already using a brick for my private connection. But, I am making it permanent.

There will be no ports or services running for Aaron to get thru to. Well Aaron, I guess you wont be watching videos with me an more. BAAAAAAAAAAAHAHAHAHAHAHHAHA!!!! Nor looking at what I am typing. Nor seeing my project files. 

Before I was depressed because I could not bring time travel one station back up on the internet. Well I can now. 

Granted it may take them longer for Aaron to get thru but as I have been told nothing is full proof.


So, when using my sensitive software I will usually disconnect the internet from it first. If I do allow it to be connected I will be monitoring the network. Most of the time it will not be connected at all. Probably only when I need a package upgrade even then I will offload my sensitive shit first.


So, I will be getting my internet life back. Thanks to Aaron who pushed me to write my first book. Now when I really get my bad ass software running again and my new stuff too my internet network will be more secure. 

Yeah, that boy was a pain in the ass but in the long run that little spooled hacker brat helped me a little.

update 01/06/2013

Well Aaron did a good job on my home router today. I had reset the IP to show the FBI he is acquiring my IP somehow. 

I sent them the log.

He of course attacked my forum today and I forwarded that to the FBI. And he did this email message to me today from 

Paranormalis webmaster@paranormalis.com via s036.panelboxmanager.com  


Have you built a time machine or discovered a way to time travel? We’re looking for time travelers interested in being in a documentary on the subject. If interested, shoot an email with a bit about yourself and your time traveling endeavors to brecasting@gmail.com

Which I also forwared to the FBI:

I had previously told him I was doing a Documentary which I am. He used that as the subject to send me his email message today. 

He had done things like this before but only when I wrote about him. Which I did yesterday and today. So tomorrow he should send me another one or not. We shall see.

I am betting this documentary is false. There is probably no such project from this communication. Oh well the FBI will check that out. 

Very last for today. Here is the registered accounts and IP’s Aaron used to attack my forum today.

(All these accounts have been sent to the FBI.)

User              IP
Snobre            134.249.84.158
AElogrewellags    31.184.241.12
Allatetl179       212.92.245.51
Andrewgota        89.22.255.140
Alesokaqeh        91.200.13.86
SuperVedroor      178.123.133.194
Infill            46.118.194.245
qtuizzws          195.190.13.118
Dancyplalty       178.19.99.105
cesyspocailla     176.31.60.123
Miguelst          193.105.210.216
12Betinifez       37.57.179.22
licecips          46.118.194.245
ArinochkA         188.93.27.130
ulkaBetinitle     178.95.56.30

The war against time travel from the Conspiracy Against Time Travel with the Generals of the Army Rainman aka Ray and Darby from the fake http://timetravelinstitute.com is alive and well.

Ray and Darby your boy is a chip off the old Troll Block. 

I have to laugh at how hard you guys try to keep me from talking about time travel with information  on the internet. You guys can not win. Im here to stay. Im not Titor. I will not put my tail between my legs and run away like titor did. Your not getting rid of me.

No matter where you stamp me out I will always pop up some place else. 

Here is my home router log for today showing the attack THE CONSPIRACY AGAINST TIME TRAVEL did on my home network.

[DoS Attack: RST Scan] from source: 31.13.66.33, port 443, Tuesday, January 07, 2014 17:49:26
[DoS Attack: RST Scan] from source: 31.13.66.144, port 443, Tuesday, January 07, 2014 17:47:16
[DoS Attack: SYN/ACK Scan] from source: 37.187.56.24, port 20201, Tuesday, January 07, 2014 17:44:52
[DoS Attack: RST Scan] from source: 17.154.66.106, port 443, Tuesday, January 07, 2014 17:33:10
[DoS Attack: RST Scan] from source: 17.151.236.24, port 443, Tuesday, January 07, 2014 17:18:01
[DoS Attack: RST Scan] from source: 17.151.236.50, port 443, Tuesday, January 07, 2014 17:17:51
[DoS Attack: ACK Scan] from source: 72.21.91.19, port 80, Tuesday, January 07, 2014 17:11:12
[DoS Attack: RST Scan] from source: 173.195.56.8, port 80, Tuesday, January 07, 2014 16:50:45
[DoS Attack: RST Scan] from source: 17.151.236.24, port 443, Tuesday, January 07, 2014 16:49:04
[DoS Attack: RST Scan] from source: 17.173.66.133, port 443, Tuesday, January 07, 2014 16:48:45
[DoS Attack: RST Scan] from source: 46.8.37.8, port 44405, Tuesday, January 07, 2014 16:46:47
[DoS Attack: SYN/ACK Scan] from source: 46.8.37.8, port 44405, Tuesday, January 07, 2014 16:46:28
[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Tuesday, January 07, 2014 16:28:02
[DoS Attack: RST Scan] from source: 17.151.236.24, port 443, Tuesday, January 07, 2014 16:26:10
[DoS Attack: RST Scan] from source: 138.91.96.142, port 443, Tuesday, January 07, 2014 16:26:10
[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Tuesday, January 07, 2014 16:18:33
[DoS Attack: RST Scan] from source: 17.151.236.47, port 443, Tuesday, January 07, 2014 16:12:39
[DoS Attack: RST Scan] from source: 17.151.236.22, port 443, Tuesday, January 07, 2014 16:12:36
[DoS Attack: RST Scan] from source: 17.151.236.16, port 443, Tuesday, January 07, 2014 16:12:35
[DoS Attack: RST Scan] from source: 17.151.236.31, port 443, Tuesday, January 07, 2014 16:12:24
[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Tuesday, January 07, 2014 16:11:37
[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Tuesday, January 07, 2014 16:06:07
[DoS Attack: SYN/ACK Scan] from source: 203.211.130.242, port 80, Tuesday, January 07, 2014 14:57:47
[DoS Attack: SYN/ACK Scan] from source: 198.27.85.102, port 6005, Tuesday, January 07, 2014 14:23:24
[DoS Attack: SYN/ACK Scan] from source: 220.77.228.24, port 4500, Tuesday, January 07, 2014 14:09:04
[DoS Attack: TCP/UDP Chargen] from source: 31.207.2.106, port 43760, Tuesday, January 07, 2014 14:01:36
[DoS Attack: SYN/ACK Scan] from source: 109.99.149.74, port 80, Tuesday, January 07, 2014 13:43:45
[DoS Attack: RST Scan] from source: 46.38.237.116, port 443, Tuesday, January 07, 2014 13:43:31
[DoS Attack: RST Scan] from source: 161.53.74.122, port 9001, Tuesday, January 07, 2014 13:43:30
[DoS Attack: SYN/ACK Scan] from source: 112.187.202.32, port 6688, Tuesday, January 07, 2014 13:38:33
[DoS Attack: SYN/ACK Scan] from source: 207.58.162.195, port 80, Tuesday, January 07, 2014 13:33:08
[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Tuesday, January 07, 2014 13:22:21
[DoS Attack: SYN/ACK Scan] from source: 112.187.202.32, port 6688, Tuesday, January 07, 2014 11:31:41
[DoS Attack: SYN/ACK Scan] from source: 192.169.81.106, port 80, Tuesday, January 07, 2014 08:35:23
[DoS Attack: TCP/UDP Chargen] from source: 199.19.108.50, port 55536, Tuesday, January 07, 2014 08:18:54
[DoS Attack: SYN/ACK Scan] from source: 192.99.1.184, port 80, Tuesday, January 07, 2014 07:08:03
[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Tuesday, January 07, 2014 04:03:15
[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Tuesday, January 07, 2014 04:03:15
[DoS Attack: TCP/UDP Chargen] from source: 80.82.78.29, port 59929, Tuesday, January 07, 2014 02:14:23
[DoS Attack: TCP/UDP Chargen] from source: 80.82.78.29, port 60349, Tuesday, January 07, 2014 01:00:14
[DoS Attack: SYN/ACK Scan] from source: 144.76.72.76, port 80, Tuesday, January 07, 2014 00:49:03
[DoS Attack: SYN/ACK Scan] from source: 222.216.188.88, port 80,



Update 01/08/2014


Well I got my code for speeding my programs. I dropped using the threads for now because I like my stuff to run on different compilers on different operating systems. So, I am just increasing my buffer size and paging to memory.

So, re-hitting the BNS program that Aaron wanted but sorry Charlie you screwed up your deal. Then will goto the 2nd book program. Then starting the documentary and 2nd book.

Im zipping up all of Aarons emails today for the FBI and if all goes well I will have a something put in between my router and the internet.



The conspiracy against time travel hit a new low. I have a 15 year old daughter that uses the internet and my router log shows her getting hacked now. Hopefully that will get the FBI off their asses. She has a camera on her computer and they are trying port 443 which has services for that camera.  I discovered that last night. Damn, those guys stop at nothing. Kids too? and girls? You guys are fucked up. Some of that is in the logs above.

Well not checked on Aarons progress for hacking me and attacking my forum yet today. I will look at all that tonight.



01/09/2014

Well, I pulled a Aaron and stayed up night then all day (BAAAAAAAAAAAAAAHAHAHAHAHAHAHA!!!). Yeah, I saw your stupid Ass Aaron popping into my router last night. Yep, logs headed to the authorities.

Update – This past weekend

Well early this morning I posted again at a forum on Craigslist in Boston in the science & math. Now, usually the conspiracy against time travel Cyber Stalks me on the internet and when they see me post something they try to get it deleted or at least raise such a fuss in the thread no one remembers to the op (original poster).

What I posted was a brief explanation about myself and my method of time travel and pointed them to my links. But, Craigslist makes a new person wait seven days before they can post links so posted what they should search for on bing to find my sites.

Well as luck would have it (no it was not luck it was stalking) Aaron posted to. He once told me the conspiracy was finding me by my user name. What he should of said was he was finding me by my user name. What Aaron has to say to me was not very nice. First of All Aaron did not go by his real name. But, what he said to me and how he said it is how I new it was him.

First of All. Here is a sample of one of Aarons emails to me.

———————————————-

Aarons email:

“Wow fuck me I just overwrote my entire project. Well fuck it I’ll redo it another time.”

———————————————–

Now, here is the message from Craigslist. I am leaving out the user name so as not to offend Craigslist for now.

—————————————————–

Aarons message on craigslist

“Wow! Congratulations! 2014-01-11 05:52:43

I used my version of your system to determine your future success and fame by reading some MS Word files I’ll be writing about you in 2017 and storing on my laptop for retrieval today. Sorry to will-hear about your accident, and, if it is on your hard drive, please don’t mention what will happen to my family in 2016. It’s only one eye, and it will be replaced by an artificial one in 2023. I don’t want the insurance companies or The Division of Children and Family Services to learn about it for obvious reasons.”

—————————————————————-

So, Aaron and this user both started off with Wow. Now, what got my attention was the personal information contained within the post that normal people would not know. You see Aaron and I exchanged over a thousand emails. He was wanting me to teach him about my method of time travel and wanted my code and my programs.

Aaron had said me might write about me in the future in his emails to me. Here he said he is writing about me. Though I thought it would only be me apparently he stole a lot of my information from my files and plans to use it for his own financial gain. Now he said my version. Aaron has used our emails probably to commit copyright infringement on my books, programs, and code. He talked about a laptop. Aaron has a laptop. A black one if I am not mistaken. 

Here Aaron mentions a Accident for me. HE IS THREATING ME!!!!! FBI YOU SEEING THIS SHIT!!!!! What is this exchange one eye for another. Sounds like me may be threating my family.

He said something about mentioning about what will happen to his family. Apparently he had to give me his ID before I would talk to him and I found out who he was and who is family was. So, he is expressing concern about his family. (Yeah Aaron you should be concerned. You exposed your family to a stranger on the internet.

That will be helpful for me later as I am considering contacting Gary and Suzanne. I will send Gary a letter and all our emails and pictures and ask him to secure his internet and his son. I am sure your sister Ashley will be glad to hear you are exposing her to strangers on the internet too. Yeah boy, you are dragging your family into a world of shit if this goes south for you.

How will Gary and Suzanne and Ashley deal with visiting you in jail. What if I was a crazy freaking nut. How would they deal with that? Boy, you have a lot of shit to think about. They soon will have to think about this too because I am not going to let your hacking me just go. You need to go tell them what you have done because I assure you I will make sure they know sooner or later. As I said I may be contacting your family.

Oh yeah, they live up by Boston, MA is that correct? Your dad and mom runs a computer business? You sis is a facility manager right? So, it is their home that you are attacking me over the internet from. YEP, IM GETTING A HOLD YOUR DAD LITTLE BOY!!!

Your dad needs to secure his shit. But, you also mentioned web bots in your emails to me so the FBI might look for where you planted your web bots. If your dads internet shut off tonight I doubt your internet attacks would stop. I also know you have your computer science friends to.

Also one night when I caught Aaron in my computer (my firewall told me) I pulled up my gedit and starting writing smack about his family. The file was not saved nor was it sent over the internet. When I got done I simple deleted what I wrote and closed the windows unsaved/unsent.

I wanted to see if Aaron would throw that back at me later on either by email or when I visited the forums. I wanted to see if Aaron was running a key logger on my computer. Here he was concerned about his family and has verified that he read the smack I thought I was typing in private on my home computer keyboard. So, Aaron was committing a crime when he read the smack I was writing.

So FBI – KEYLOGGING CONFIRMED BY MY HACKING OF MY COMPUTERS. So, I have confirmed Aaron connected to my VCN service now I have confirmed Aaron was recording what was being typed on my computer keyboard. You guys can arrest him now.

The insurance companies. I am assuming he is talking about his theft of my credit card from BARCLAY CARD. I guess he is assuming they are insured for his credit fraud. Maybe he thinks I am filing a complaint with my home owners insurance because of his hacking my home computers. Having to buy a new router and install Linux bricks. (My Linux bricks I had some problems so Aaron is still living in my home network.)

My hard drive he is referring to my computer files.

Now here Aaron mentions something.

“The Division of Children and Family Services to learn about it for obvious reasons.”

He appears to be making some sort of threat against myself and my family.

YEAH AARON YOU CALL THE DIVISIOIN OF CHILDREN AND FAMILY SERVICES.

TELL THEM YOU ARE HACKING MY 15 YEAR OLD DAUGHTER THROUGH PORT 443 (ITS IN MY LOGS I HAVE POSTED IN THIS BLOG).

TELL THEM YOU ARE CONNECTING TO MY UNDERAGE PRETEEN DAUGHTERS WEBCAM YOU FUCKING SICK FREAK CHILD PORN PERVERT. I HAVE TWO DAUGHTERS. ONE IS FIFTEEN ONE IS AROUND 7. BOTH HAVE TABLETS WITH WEBCAMS.

YOU TELL THEM THAT!!! I HOPE THEY HAUL YOUR ASS OFF TO JAIL!!!

FBI YOU SEEING THIS SHIT. GET OFF YOUR ASSES AND STOP THIS MONSTER!!!!

FBI I AM ZIPPING UP ALL OF AARONS EMAILS AND FILING ANOTHER REPORT TO NIGHT. IN THE REPORT WILL BE A LINK WHERE YOU CAN DOWNLOAD THE EMAILS. I WILL ALSO GIVE YOU THE LATEST ROUTER LOGS AND WEBSIGHT LOGS. FBI – IN THE EMAILS AARON SAYS THE http://timetravelinstitute.com  WAS AND IS TRACKING ME ON THE INTERNET. HE SAYS THEY ARE TRACKING ME THROUGH MY USER NAME!!!

FBI IN THAT REPORT I MADE LOOK AT AARONS EMAIL WHERE HE SAID HIS CREDIT CARD DISAPPEARED FROM HIS ACCOUNT. THAT IS WHEN MY CREDIT CARD WAS USED FOR FRAUD.

LOOK AT THE EMAIL ARRON GAVE WHEN HE MENTIONED SOME VIDEO AND I WROTE I JUST SAW THAT VIDEO.

What a lot of this is about is a person’s right to his freedom of speech to have a blog. I have followed blog procedures in maintaining my blog. There should not be any last names here except my own. 

Darby in a interview which is publically posted on the internet which was the subject of my CIA experiment post. Since Darby gave the interview and his information was in that interview it was ok for me to run with it. 

Ray I know he does not like me blogging about him but he has publically giving his last name  the company he works for and even a picture of himself all on a public forum. And he talks publically about other people.

The time travel institute the fake one is a forum. Their terms of service say they are a pretend service. Which was my mistake because I posted there about time travel by way of data mining binary counters to find computer media of the past or the future even alternate time-lines.

I used only their User names from a forum and I called Rainman Ray because Darby did that in public on the forum and so that is consent to use that name because Ray gave the permission for it to be used in public that way.

DARBY AND RAINMAN BOTH OF THEM WRITE ABOUT OTHER PEOPLE ALL THE TIME. DARBY HAS WRITTEN THOUSANDS OF MESSAGES ABOUT TITOR. NOT ALL OF IT WAS GOOD EITHER. SOME OF IT WAS PERSONAL.

NOW DARBY AND RAY AKA RAINMAN OVER THE YEARS HAVE TALKED ABOUT 1000′S OF PEOPLE. TALKING ABOUT PEOPLE IS ALL THEY DO. IT IS WHAT THEY DO. SO IT IS OK FOR ME TO TALK ABOUT THEM.

(Hey Darby, I am using all caps again. If my account still exist at the http://timetravelinstitute.com you can send me warning. BAAAAAHAHAHAHAHAH.)

They use a public forum to talk about other people even troll and harass other people. So, there is nothing wrong with me blogging about them here. More so since I am using User names only from a forum that is largly dieing and half dead anyway.

They gave that consent when they went on a public forum and started their churn and burn on other people. So, it is ok for me to talk about the http://timetravelinstitute and their admins here on my blog.

Now, These guys started their shit with me first. Ray, stopped me from posting and talking about my time travel. They delete my messages. When they banned me and I posted else where about time travel they got me banned there too and got my messages deleted. They called me names like troll so they called me names first they can not bitch when I call them names. They used my first and last name publically even when I told them to stop and not to do that.

So what people read in this blog that I have written is legal. I have the right to my freedom of speech. I have the right to have my blog here. I am not giving up that right.

I have the right to go by Reactor1967 on the internet. I am not going to stop using that user name. That was a demand of Aaron who is hacking me. Among other demands. I have the right to use it and I will use it.

I will never stop working on time travel with information.

I will never writing programs that find time travel media.

I will never stop developing my theories.

I will never stop writing about my theories and if I want to write about Ray and Darby I will.

Now, when they got me thrown out of Abovetopsecret.com for talking about them. THEY FAILED TO TELL OTHERS THEY TALK ABOUT PEOPLE TOO. THEY TALK ABOUT PEOPLE BUT YET I CAN NOT TALK ABOUT THEM ON ABOVETOPSECRET.COM (THEY ARE VIOLATING MY RIGHTS UNDER THE AMERICAN CONSTITUATION AND IN MY OPION SHOULD BE ARRESTED FOR IT. They talk about people so it is ok for me to talk about them. And I do and I will continue.

RAY TALKS ABOUT OTHER PEOPLE ALL THE TIME.

SO, I CAN TALK ABOUT THEM ALL I WANT TOO. YOU GOT THAT ARRON BOY.

I will never stop. And that goes for you guys over at the fake http://timetravelinstitute.com

What Aarons beef is with me has to do with the http://timetravelinstitute.com but he still has not told me what his problem with me is.

Im hoping when the FBI arrest Aaron for Child porn, stalking me, hacking me, copyright infringement, assault (for the threats), fraud, theft, wire tapping, and other things that the FBI will tell me what was Aarons problem with me.

You see, when Ray banned me he sent me a private message telling me “We are watching you.”. HOW TRUE THAT WAS.  In Aarons emails he told me they were tracking me on the internet. Now, Aaron has attacked me personally at home through the internet.

I WILL NEVER STOP BLOGGING ABOUT MY TIME TRAVEL YOU. I HAVE THE RIGHT TO MY BLOG HERE!!!

I HAVE THE RIGHT TO POST IN FORUMS ABOUT TIME TRAVEL AS REACTOR1967 AND WITH MY METHOD OF TIME TRAVEL.

THAT DOES NOT GIVE THE http://timetravelinstitute.com to do what they have done. They want me gone and are trying to find ways to make that happen. Guys, its not going to happen.

 FBI – Since your investigation is still on going here is a message posted at the REAL http://thetimetravelinstitute.com I believe is from Aaron. I locked the board and will free the account later. You guys can log in if you want I gave you guys a login. Here is the message from the cyber stalkers/hacker

Victimize Sigg

Postby Amelloste » Mon Jan 13, 2014 11:45 pm
nick yatesPrey upon Sigg has all more than 25 years of advertisements, aiding and tube media expertise. Currently the President of Appearance Single Media, he leads his team of media experts to day by day affirm virgin and advanced systems of driving mod conclusion while maintaining unprecedented standards to fortify answers someone is distressed existing customers.
During perpendicular steady central relationships, Show Bromide has the know-how to come by media at beneath hawk value rates which supplies our clients with incomparably bountiful media opportunities. Our procurement master diagram includes; extended duration media commitments, later banking, traffic deals and critical partnerships. We’ve got assets and leverage unmatched in the marketplace. Our strategic partnerships encompass; networks, train depot groups, syndicators and constituents providers. We deliver locality transmit, peculiar mooring, style radio, cohort and syndicated media opportunities

rob sigg
rob sigg
rob sigg
Recognizing recently created takings opportunities prior to bringing video to consumers ‘over-the-top’, Performance The same Media launched an dynamic CDN (Delight Distribution Network) and an advertising childbirth monetization motor in the next half of 2012. Since its engender, Display Under any circumstances handcuff Media has recognized well-heeled consumer launches with the aid state-of-theart applications on Sony, LG and Samsung connected devices, Roku streaming video players, iOS and Android revealing devices, with a handful other launches impending.

In advance starting display Person Media, Looting dead beat down 8 years with Turner Media Gather, which he helped skiff from its origin. As President of Turner Media Brigade, Ransack’s natural execution-oriented spirit made repayment after tremendous broaden when he took them from a 3-man media instrumentality to a 100 employees member power businesswoman within the media landscape. He pioneered and was conducive in the unfolding of Turner Media Organize as the classy rep-business custom-made all media sales throughout DISH Network. At its shinny up, after bringing them to a sales growth of 250MILLIMETERS, Cheat made his retire in 2004.

rob sigg
rob sigg
rob sigg
In the years
performance one media
performance one mediauntil to Turner Media Departmentalize, Burgle utilized his outspoken entrepreneurial force and his accord to conceive of how ‘all-the-pieces-fittogether’ to own and control over and above numerous businesses within the natural property, erection, spa and salon disciplines.

The conspiracy against time travel has taken to attempting to call me at home. I got a call from this number but it is a voip. The number is actually from the ip  carrier trying to bring the the call.

Here it is

202-455-8888 7:47 pm 01/16/2014 <<<(This number I found out is not the conspiracy so it is ruled out.)

767-275-9071 12:07 pm 01/11/2014

 They do not want to talk to me. I can give as good as I  get.

update 01/18/2014

Anyone reading Aarons and I emails and reading his messages to me through the forums and online services can easily put two plus together. Here is Aarons message today for me. I put the full code in it so it is long and cryptic. Here it is.

Delivered-To: deleted
Received: by 10.68.110.195 with SMTP id ic3csp56734pbb;
        Fri, 17 Jan 2014 16:58:42 -0800 (PST)
X-Received: by 10.50.62.102 with SMTP id x6mr1115139igr.35.1390006722464;
        Fri, 17 Jan 2014 16:58:42 -0800 (PST)
Return-Path:
Received: from s036.panelboxmanager.com (s036.panelboxmanager.com. [72.55.186.56])
        by mx.google.com with ESMTPS id n10si5541568igk.61.2014.01.17.16.58.42
        for
        (version=TLSv1 cipher=RC4-SHA bits=128/128);
        Fri, 17 Jan 2014 16:58:42 -0800 (PST)
Received-SPF: pass (google.com: best guess record for domain of paranor@s036.panelboxmanager.com designates 72.55.186.56 as permitted sender) client-ip=72.55.186.56;
Authentication-Results: mx.google.com;
       spf=pass (google.com: best guess record for domain of paranor@s036.panelboxmanager.com designates 72.55.186.56 as permitted sender) smtp.mail=paranor@s036.panelboxmanager.com
Received: from mailnull by s036.panelboxmanager.com with sa-checked (Exim 4.80.1)
(envelope-from )
id 1W4KFF-000lz4-JV
for deleted; Fri, 17 Jan 2014 19:58:41 -0500
Received: from paranor by s036.panelboxmanager.com with local (Exim 4.80.1)
(envelope-from )
id 1W4KFF-000lyi-GV
for deleted; Fri, 17 Jan 2014 19:58:41 -0500
To: Reactor1967
Subject: Time-Hacking with computers and algorithms – New reply to watched thread
X-PHP-Script: paranormalis.com/deferred.php for 151.74.83.81
From: Paranormalis
Message-Id:
Date: Sat, 18 Jan 2014 00:58:41 +0000
Content-Type: multipart/alternative;
boundary=”=_2bca471bf49b0297165472e98132cf5e”
MIME-Version: 1.0
Sender: 
X-Spam-Checker-Version: spamc_ctasd client on
localost
X-Spam-Level:
X-Spam-Status: No, score=0.0 required=50.0 tests=SpamClass_Unknown,
VirusClass_Unknown autolearn=disabled
version=1.0.0
X-CTCH-PVer: 0000001
X-CTCH-Spam: Unknown
X-CTCH-VOD: Unknown
X-CTCH-Flags: 0
X-CTCH-RefID: str=0001.0A020204.52D9D1C1.00E5,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0
X-CTCH-Score: 0.000
X-CTCH-ScoreCust: 0.000
X-CTCH-Rules:
X-CTCH-SenderID: webmaster@paranormalis.com
X-CTCH-SenderID-Flags: 0
X-CTCH-SenderID-TotalMessages: 2
X-CTCH-SenderID-TotalSpam: 0
X-CTCH-SenderID-TotalSuspected: 0
X-CTCH-SenderID-TotalConfirmed: 0
X-CTCH-SenderID-TotalBulk: 0
X-CTCH-SenderID-TotalVirus: 0
X-CTCH-SenderID-TotalRecipients: 0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname – s036.panelboxmanager.com
X-AntiAbuse: Original Domain – gmail.com
X-AntiAbuse: Originator/Caller UID/GID – [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain – s036.panelboxmanager.com
X-Get-Message-Sender-Via: s036.panelboxmanager.com: mailgid no entry from get_relayhosts_entry
X-Source:
X-Source-Args:
X-Source-Dir:

–=_2bca471bf49b0297165472e98132cf5e
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Reactor1967,=0A=0Avp8671 replied to a thread you are watching at Paranor=
malis.=0A=0A=09″Time-Hacking with computers and algorithms”=0A=0AThis is=
the message they posted:=0A——————————————–=
————————–=0AHello Reactor, i just wanted to ask you , i=
f you agree, a couple of questions.=0A1: You use the word text counter,=
can you describe exactly what is a text counter ? you scan for text in=
a file full of words and count words ???=0A2: You scan for emails, but=
emails are stoed on the server, how do you perform exactly your scan ?=
=0A3: You use checksum ,to find files , but again, emails are not files=
normally stoed on the computer, they are stored on the server and then=
sent to your inbox, do you scan that directory ??=0AIts been a while i=
follow you and your blog, but still i cannot wrap hmy haed around your=
method.=0AYou say you are writing a second book, where you explain your=
code, can you give some hints using a meta-code ‘?=0Ai have 20+ years o=
f pc programming, i can implement any kind of software pretty quickly.=
=0AThanks for your time=0A———————————————-=
————————=0A=0ATo view this thread, click here:=0Ahttp://=
paranormalis.com/threads/time-hacking-with-computers-and-algorithms.6314=
/#post-78878=0A=0AYou will not receive any further emails about this thr=
ead until you have read the new messages.=0A=0A————————-=
———————————————=0A=0AThis message was sent=
to you because you opted to watch the thread “Time-Hacking with compute=
rs and algorithms” at Paranormalis with email notification of new replie=
s.=0A=0ATo disable emails from this thread:=0Ahttp://paranormalis.com/wa=
tched/via-email?u=3D4543&c=3Defc901e2c6a0df152abe1c731294f8fd&a=3Dno_ema=
il&t=3Dthread&id=3D6314=0A=0ATo disable all emails:=0Ahttp://paranormali=
s.com/watched/via-email?u=3D4543&c=3Defc901e2c6a0df152abe1c731294f8fd&a=
=3Dno_email=0A=0Ahttp://paranormalis.com/

–=_2bca471bf49b0297165472e98132cf5e
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

=0A=0A=09 />=0A=09=0A=09Time-Hac=
king with computers and algorithms – New reply to watched thread=
=0A=0A<body bgcolor="3D" dir="3D" link="
=3D”#176093″ alink=3D”#176093″ vlink=3D”#176093″ style=3D”padding: 10px”=
>=0A=0A=09<table border="3D" cellpadding="3D" cellspacing="3D" dir="3D=
“LTR” style=3D”=0A=09=09background-color: #F0F7FC;=0A=09=09border: 1px s=
olid #A5CAE4;=0A=09=09border-radius: 5px;=0A=09=09direction: LTR;”>=0A=
=09
=0A=09=09 =09=09=09padding: 5px 10px;=0A=09=09=09border-bottom: 1px solid #A5CAE4;=
=0A=09=09=09border-top-left-radius: 4px;=0A=09=09=09border-top-right-rad=
ius: 4px;=0A=09=09=09font-family: ‘Trebuchet MS’, Helvetica, Arial, sans=
-serif;=0A=09=09=09font-size: 11px;=0A=09=09=09line-height: 1.231;”>=0A=
=09=09=09<a color:="" href="https://www.blogger.com/3D&quot; http:="" paranormalis.com="" t="
ext-decoration:none”>Paranormalis=0A=09=09

=0A=09

=0A=09
=
=0A=09=09 padding: 1em;=0A=09=09=09color: #141414;=0A=09=09=09font-family: ‘Trebuc=
het MS’, Helvetica, Arial, sans-serif;=0A=09=09=09font-size: 13px;=0A=09=
=09=09line-height: 1.231;”>=0A=09=09=09

Reacto=
r1967, “color: #176093; text-decoration: none”>vp8671 replied to a thread y=
ou are watching at <a color:="
#176093; text-decoration: none”>Paranormalis.

=0A=0A

“font-size: 18pt; font-weight: normal; margin: 10px 0″>/paranormalis.com/threads/time-hacking-with-computers-and-algorithms.631=
4/#post-78878″ style=3D”color: #176093; text-decoration: none”>Time-Hack=
ing with computers and algorithms

=0A=0A<hr 1px="
; margin: 10px 0; border: 0; color: #D7EDFC; background-color: #D7EDFC”=
/>=0A=0A<table border="3D" cellpadding="3D" cellspacing="3D" style="width: =3D”100%” style=3D”margin: 10px 0 20px”>=0A
=0A=09 style=3D”font-size: 13px; line-height: 1.231; padding-right: 20px”>=0A=
=09=09<div background-color:="" bo="
rder: 1px solid #D7EDFC;=0A=09=09=09border-radius: 5px”>=0A=09=09=09le cellpadding=3D”0″ cellspacing=3D”0″ border=3D”0″>=0A=09=09=09
=0A=
=09=09=09=09 =09=09=09=09=09padding: 5px;=0A=09=09=09=09=09border-radius: 4px”>=0A=09=
=09=09=09=09<a href="https://www.blogger.com/3D&quot; http:="" members="" paranormalis.com="" tit="
le=3D”vp8671″=0A=09=09=09=09=09=09><img http:="" paranormalis.com="" s="
tyles/default/xenforo/avatars/avatar_male_s.png” alt=3D”vp8671″ title=3D=
“vp8671″ style=3D”=0A=09=09=09=09=09=09=09width: 48px;=0A=09=09=09=09=09=
=09=09height: 48px;=0A=09=09=09=09=09=09=09background-color: #FCFCFF;=0A=
=09=09=09=09=09=09=09border: 1px solid #A5CAE4;=0A=09=09=09=09=09=09=09p=
adding: 2px;=0A=09=09=09=09=09=09=09border-radius: 4px”=0A=09=09=09=09=
=09=09/>=0A=09=09=09=09=09

=0A=09=09=09=09

=0A=09=09=09le>=0A=09=09=09=09=09display: block”><!–vp8671

 

=0A=09=09 =0A=09 –>d>=0A=09an’, Times, serif; font-size: 11pt; line-height: 1.4″>=0A=09=09Hello Rea=
ctor, i just wanted to ask you , if you agree, a couple of questions.
/>=0A1: You use the word text counter, can you describe exactly what is=
a text counter ? you scan for text in a file full of words and count wo=
rds ???
=0A2: You scan for emails, but emails are stoed on the serv=
er, how do you perform exactly your scan ?
=0A3: You use checksum ,=
to find files , but again, emails are not files normally stoed on the co=
mputer, they are stored on the server and then sent to your inbox, do yo=
u scan that directory ??
=0AIts been a while i follow you and your=
blog, but still i cannot wrap hmy haed around your method.
=0AYou=
say you are writing a second book, where you explain your code, can you=
give some hints using a meta-code ‘?
=0Ai have 20+ years of p=
c programming, i can implement any kind of software pretty quickly.
>=0AThanks for your time=0A=09
=09=0A=0A=0A=0A
llpadding=3D”10″ cellspacing=3D”0″ border=3D”0″ width=3D”100%” style=3D”=
margin: 20px 0; background-color: #f0f7fc; border-top: 1px solid #d7edfc=
“>=0A =0A=09=
=0A=09=0A =0A<=
/table>=0A=0A

This message w=
as sent to you because you opted to watch the thread <a href="https://www.blogger.com/3D&quot; p="
aranormalis.com/threads/time-hacking-with-computers-and-algorithms.6314/=
” style=3D”color: #969696″>Time-Hacking with computers and algorithms> at Paran=
ormalis
with email notification of new replies. You will not receive=
any further emails about this thread until you have read the new messag=
es.

=0A=0A

If you no long=
er wish to receive these emails, you may <a href="https://www.blogger.com/3D&quot; paranormalis.="
com/watched/via-email?u=3D4543&c=3Defc901e2c6a0df152abe1c731294f8fd&=
amp;a=3Dno_email&t=3Dthread&id=3D6314″ style=3D”color: #969696″>=
disable emails from this thread or  <a href="https://www.blogger.com/3D&quot; paranormalis.c="
om/watched/via-email?u=3D4543&c=3Defc901e2c6a0df152abe1c731294f8fd&a=
mp;a=3Dno_email” style=3D”color: #969696″>disable all emails.

=0A=
=09=09
<table ce="
=0A=09=09<a href="https://www.blogger.com/3D&quot; paranormalis.com="" t="
ime-hacking-with-computers-and-algorithms.6314/unread” style=3D”=0A=09=
=09=09display: block;=0A=09=09=09float: left;=0A=09=09=09padding: 5px 10=
px;=0A=09=09=09background-color: #65a5d1;=0A=09=09=09border: none;=0A=09=
=09=09border-radius: 3px;=0A=09=09=09font-family: ‘Trebuchet MS’, Helvet=
ica, Arial, sans-serif;=0A=09=09=09font-size: 11px;=0A=09=09=09color: wh=
ite;=0A=09=09=09text-decoration: none”>View This Thread=0A=09 =0A=09=09<a href="https://www.blogger.com/3D&quot; paranormalis.com="" wa="
tched/threads” style=3D”=0A=09=09=09display: block;=0A=09=09=09padding:=
5px 0;=0A=09=09=09font-family: ‘Trebuchet MS’, Helvetica, Arial, sans-s=
erif;=0A=09=09=09font-size: 11px;=0A=09=09=09color: #176093;=0A=09=09=09=
text-decoration: none”>Unread Watched Threads=0A=09

=0A=09=0A=09 =0A=09=09ound-color: #F0F7FC;=0A=09=09=09padding: 5px 10px;=0A=09=09=09border-top=
: 1px solid #D7EDFC;=0A=09=09=09border-bottom-left-radius: 4px;=0A=09=09=
=09border-bottom-right-radius: 4px;=0A=09=09=09text-align: right;=0A=09=
=09=09font-family: ‘Trebuchet MS’, Helvetica, Arial, sans-serif;=0A=09=
=09=09font-size: 11px;=0A=09=09=09line-height: 1.231;”>=0A=09=09=09<a hr="
ef=3D”http://paranormalis.com/&#8221; style=3D”color: #176093; text-decoration=
: none”>http://paranormalis.com/=0A=09=09
=0A=09 =0A=09le>=09=0A=0A=0A

–=_2bca471bf49b0297165472e98132cf5e–

Update 01-20-2014

For the FBI and Homeland.

Aaron researched my family is using my family’s names for his account spamming at my forum http://thetimetravelinstitute.com

User: AlfredSr

IP whois for 91.239.15.245
% This is the RIPE Database query service.
 % The objects are in RPSL format.
 %
 % The RIPE Database is subject to Terms and Conditions.
 % See http://www.ripe.net/db/support/db-terms-conditions.pdf
 % Note: this output has been filtered.
 % To receive output for a database update, use the “-B” flag.
 % Information related to ’91.239.15.0 – 91.239.15.255′
 % No abuse contact registered for 91.239.15.0 – 91.239.15.255
 inetnum: 91.239.15.0 – 91.239.15.255
 netname: VYMPELSTROY-NET
 descr: VympelStroy ltd.
 country: NL
 org: ORG-Vl112-RIPE
 admin-c: SAN188-RIPE
 tech-c: SAN188-RIPE
 status: ASSIGNED PI
 mnt-by: RIPE-NCC-END-MNT
 mnt-lower: RIPE-NCC-END-MNT
 mnt-by: MNT-VYMPELSTROY
 mnt-routes: MNT-VYMPELSTROY
 mnt-routes: ETICAPRIM-MNT
 mnt-domains: MNT-VYMPELSTROY
 source: RIPE # Filtered
 organisation: ORG-Vl112-RIPE
 org-name: VympelStroy ltd.
 org-type: OTHER
 address: Russia, Saint-Petersburg, the 8th line of Vasilievkiy island, 79
 mnt-ref: MNT-VYMPELSTROY
 mnt-by: MNT-VYMPELSTROY
 source: RIPE # Filtered
 person: Sentsov Anatoliy Nikolaevich
 address: Russia, Saint-Petersburg, the 8th line of Vasilievkiy island, 79
 phone: +7 812 756 93 32
 nic-hdl: SAN188-RIPE
 mnt-by: MNT-VYMPELSTROY
 source: RIPE # Filtered
 % Information related to ’91.239.15.0/24AS198708′
 route: 91.239.15.0/24
 descr: route for 91.239.15.0/24
 origin: AS198708
 mnt-by: AP77252-MNT
 mnt-by: MNT-VYMPELSTROY
 source: RIPE # Filtered

Update 1-24-2014

Started a new thread on craigslist. Looks like my old pal’s are there.
Here is the link.

https://forums.craigslist.org/?ID=243569316

update 02/15/2014

FBI – HOMELAND – FTC (PETE THIS IS FOR YOU PLEASE GIVE THIS TO THE INVESTIGATORS.)
Every time I update my blog my hacker sends me these emails to me. I did not start getting these till Aaron started his contact with me. Please forward this to the investigators. Thanks, Reactor1967

                                                                                                                                                                                                                                                             Delivered-To:Deleted
Received: by 10.68.110.195 with SMTP id ic3csp2906pbb;
        Fri, 14 Feb 2014 00:55:41 -0800 (PST)
X-Received: by 10.15.43.141 with SMTP id x13mr7518689eev.35.1392368140343;
        Fri, 14 Feb 2014 00:55:40 -0800 (PST)
Return-Path:
Received: from mail1.sibtown.com (mail1.sibtown.com. [5.9.217.9])
        by mx.google.com with ESMTPS id b7si9620500eez.8.2014.02.14.00.55.39
        for
        (version=TLSv1 cipher=RC4-SHA bits=128/128);
        Fri, 14 Feb 2014 00:55:40 -0800 (PST)
Received-SPF: pass (google.com: domain of mega@sibtown.com designates 5.9.217.9 as permitted sender) client-ip=5.9.217.9;
Authentication-Results: mx.google.com;
       spf=pass (google.com: domain of mega@sibtown.com designates 5.9.217.9 as permitted sender) smtp.mail=mega@sibtown.com;
       dkim=pass header.i=@sibtown.com;
       dmarc=fail (p=NONE dis=NONE) header.from=gmail.com
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=simple/simple; d=sibtown.com; s=mail;
    h=Sender:Message-Id:Date:MIME-Version:Content-Type:To:Subject:From; bh=7OCD6wmv/ftgaOpNB5dOAl+DoC599gn5aQ7/ax0IdwM=;
    b=VRUoJXkk4VuRgU0ge0CBR+sdo/5XZx778xTYWqdoGvvU56IoLcFjS+8YlmRCpBpl406MctdcN6j7Amf9nLeyW53dgNLXKP+OL4LLL+tJrjRneo7s0FnfC201KtxSZmbzJiru5Nv7W9Ilaou8fJU8Yb3Mm4SCV0lIe3Fdnvh6DXs=;
Received: from 84.red-83-54-47.dynamicip.rima-tde.net ([83.54.47.84])
    by mail1.sibtown.com with esmtpa (Exim 4.80.1)
    (envelope-from )
    id 1WE9Mr-0004qn-GY
    for Deleted; Fri, 14 Feb 2014 04:23:11 +0100
From: “Anzhelika”
Subject: Hello! Please write!!!
To: “reactor1967″
Content-Type: multipart/mixed; boundary=”MOYzWgeRr2ZTeUUw=_vr1RUPjvkrkqP9sU”
MIME-Version: 1.0
Date: Fri, 14 Feb 2014 12:55:32 +0400
X-Mailer-MsgId: X1C01E2MCDYvbEMz8eGZjLmpnaTNfbG160NG1xd21qbXRfPmUza19naiw0YW1rB04JEQjE1RD8wKzQxNTU=
Message-Id:
Sender: mega@sibtown.com

This is a multi-part message in MIME format

–MOYzWgeRr2ZTeUUw=_vr1RUPjvkrkqP9sU
Content-Type: multipart/alternative;
    boundary=”YnsoO7yONaF8sxwN=_zxCHUc2DoJ4JrZGe”

–YnsoO7yONaF8sxwN=_zxCHUc2DoJ4JrZGe
Content-Type: text/plain; charset=”Windows-1251″
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

Hello!
Thank you so much for your reply. I was surprised and happy
to hear back from you.
Sorry for the delay. I don’t often use this e-mail address.
I accidentally decided to check my mail box and was happily
surprised to see your letter. I have another e-mail address and
I use it to correspond with my friends.
I will send you a detailed letter from this address so you know it.
Well, I do hope that you’ll forgive me and write me back very soon.
I would like to get to know you better. I am sure there is so much
interesting we can find about each other.
I promised to send you my picture and so here I am attaching my
picture.
I will tell you more about myself in my next letter and will send
it from my main, I will be waiting impatiently for your reply.
Have a good day!
Take care.
Regards, Anzhelika
P.S. If you liked my picture and you are interested, please,
write me soon.
dwmlSx

–YnsoO7yONaF8sxwN=_zxCHUc2DoJ4JrZGe
Content-Type: text/html; charset=”Windows-1251″
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline
Sincerely, Anzhelika
P.S. If you liked my picture and you are interested, please,
wri=
te me soon.

9iZ



–YnsoO7yONaF8sxwN=_zxCHUc2DoJ4JrZGe–

–MOYzWgeRr2ZTeUUw=_vr1RUPjvkrkqP9sU
Content-Type: image/jpeg;
    name=”f1.jpg”
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
    filename=”f1.jpg”