5 Diabolical Breakthrus (Letters to Cleo2) - by Seung Bum Kim

0 views
Skip to first unread message

craz...@gmail.com

unread,
Jan 12, 2014, 9:00:53 AM1/12/14
to
Cultural chaos is a growing phenomenon due to the loosened grip of religion and mass consumerism. In which cultural chaos manifested during the initial stages of warfare. It was considered the secondary culture in the MiddleAges but in higher quarters it was considered formless and even barbaric. It is now fueled mainly by Foxnews media in which the tv is a Simulacra device. And we celebrate tragedies where we were complicit with the Attacks. And cultural chaos which is the phenomenon of the Beast and disorder is Quintessentially found in Disneyland. -sEung b. kim
Now by using Gaits to track and confirm patterns as to a person's web
activity, then the Gaits can be used to bundle associated names and
then to relay all Turin Associated superstring elements that are
inextricably linked to detected Gait patterns causing an activation of
the bomb through various terminals and precisely the terminals that
belong to all people associated with the dominant string variable so
that it causes Phone extermination of friends and associates.

Gaits Sent in Multi-directions - by Seung Bum Kim (c)opyright 2012

Now if users swift Name detection through slick manuevers where
Winston could be spelled Win5ton Gaits can be used to track names. In
which Gaits should be added to read specific patterns where Turin
Association of Patterns can lead to name retrieval by causing pattern
ID. In which through this if a user goes under a secret name their
identity can be tracked through Gait detection of internet activity.

Secretized User ID for Computer Bomb Tracking Device- by Seung Bum Kim

Now this is not made use of there is yet value..but the use of it
through Praxis would create infinite more value for the project..I am
doing this to make a scientific breakthru that is more than theory
since computers operate semantically anyways. But with this work, the
use of it though it is my invention is a matter of the user's personal
choice not mine..I am presenting controversial knowledge and to use it
would not imply that I held a gun to his face in order to pressure him
to use it..and if it used in mass numbers then it actually reveals the
nature of Americans..so it is out of my hands.

Final Word on the Computer Bomb Script -by Seung Bum Kim

Now I already know it's not within my rights to do this, but I don't
give a hoot about rights since martyrs don't have rights either. So
fuck and free for all. If it hindges against Truth, then I don't want
to have anything to do with Truth anyways..so Make the software,
distribute it, and Use it.
-sEung b. kim
Botnet usage can allow you to make dummy system do your bidding only
if you initially disease the computer through botnet. In which
through Onion Router relay of the script if the script is made to be
sent through the dummy system by suspension of derivative relay
information from the main system through the Onion Router where it is
amnesaically registered to Onion Router on a live application where
FireFox is used to cause masking through $SYS$ firefox then the dummy
computer is framed and you can use the Turin approach to blame it on
numerous systems by causing the dummy system to connect with other
dummy systems through amnesiac programming rather than systems that
are live and hence suspectible to be logged by headquarter systems.
And if this is activated by use of a cellphone device that ties
numerous lines together through cellphone connection to the terminal
and the specific access # that activates a pre-set directive to
launch
the script the launch is done inconspicuously since the source would
evidently be the cellphone where thus if you put two wifi signals
together it jams wifi readings completely as through this there is no
evidence of your script activated on many or numerous systems.
Botnet and Cellphone Entry for Covert Operation -by Seung Bum Kim
Futhermore, cracking the computer bomb script can be done where it
various related programs are installed as a bunch of hidden programs
in the machine where despite daily inspection the installed data is
hidden. This can be done by downloading a DVD image, burning it,
sticking it in the website and then to boot it while holding downa
bunch of different keys at the same time which can be complied as a
function for the computer bomb script as then many items sended can
be
installed into systems to hatch the computer while yet hidden as God
playing Dice where it cannot be seen. Superstring data can be tied
for
name association as eg. Egg = Sunnyside. So that the software can
work
in name association to superstring location through equivalency.
Now for another addage to the computer bomb software one should make
the name of your fireFox program into $SYS$ fireFox since any program
under the name $SYS$ is invisible to the operating system as it
becomes invisible to Windows and thus invisible to network's
snoopware. Covert use of the computer bomb must be through Onion
Routers that pass website information through onion layers as it is
passed to each layer of the onion until it reaches you so guise web
communication activity even of the activated computer bomb. This way
addresses or naughty addresses aren't detected on the blacklist. And
the script should cause SMS transference of information so that it
fills the memory of the cellphone and causes it to 'choke' on the
routine operations causing system freeze again I add so that this can
be done on computer systems to cause time elapsed freezing in which
an
alternate and internal source of energy can be used to cause
necessary
hatching of the script even if the powerplug is pulled temporarily
causing an irrefutability effect.
Invisibility Cloak for Computer Bomb Script with Irrefutability
Freezing Process - by Seung bum Kim
By using gait dodging script addages one can evade security detection
absolutely. In which by causing patternistic combinations of those on
websites or to use combinatory mathematical unification of matrix
sets
the combined pattern made into fractal form would cause pattern
confusion through combined gait patterns or a 'collection' of
internet
record entries. This can be done using botnet so that dummy systems
can in their gait pattern records could be meshed to form a singular
pattern of internet activity thus causing a blur in which gaits
cannot
detect your activity online with further ramifications where pop-up
items can be sent to live terminals only if security blockage of pop-
up items is deleted by Burning the security detector where burning a
file can eliminate security programs.
Full Activity Evasion for Computer Bomb Script - by Seung Bum Kim
(c)opyright 2012
For the script to also be activated by cellphone usage in which by
cellphone entry through the designated
line if the computer is active as you are away from the terminal it
must cause activation on Javascript
through a running website application to cause system freeze through
a
bug or system error that must be
processed with limited time elapse before the system is paralyzed or
frozen permanently directed to 10
systems activated on cellphone entry which then activates the script
to 10 locations, then since the
bombscript runs on javascript it can disable the storage box so it
cause an impossibility to detect live
activity since the storage memory box prevents detection of live
usage
this is the direct means to bypass
security as one can then adjust to a laptop under the same name but
in
an erroneous manner just as
Winston can be spelled Win5ton. Security bypass this way can lead to
retrieval of hidden files.
ATDT Bomb for Data Retrieval -by Seung Bum Kim
I have made yet another addage for the computer bomb script. In which
you must access botnet and make numerous botnet computer applications
run on your system in which you apply amnesaic programming in which
due to running applications on FireFox security systems would only
track the computers that are running on live applications for botnet
computers that are connected to superstring associations so only
accounts of the alternate computer is tracked since it is running
while your programming directives are guised as side items.
Security Ditch (another addage) -by Seung Bum Kim
Upon sending the computer bomb script if the script is accompanied by
a bug that requires processing where alternate processing is blocked
in which the main imperative is to process the bug that causes syntax
that prevents the system from operating the computer script can
thwart
system rescue if in this way the system is made to freeze before
detonation so it can't be rescued and also produces time expediture
in
the attempt to rescue the system.
Computer Freeze for CBScript -by Seung Bum Kim
So that it offers time to escape from detonation, one should produce
a
message relayed to Javascript concerning time elapse of the bomb
based
on preset data found in experimentation. And upon that one can even
use Extension 69 to make the script bounce back to the derivative
computer. So Extension 69 is not only a shield but a means to
retaliate from an attempt to destroy your system and the room it
occupies.
Added Entry to Computer Bomb Script - by Seung Bum Kim
By using my 10 ATDT method in which a live computer can be transitted
cellphone codes upon contacting the home ATDT # upon this the script
could be sent to 10 security systems where due to a bug that freezes
computer activity in time elapse through isolated processing of the
bug if the system is bound for permanent damage if it is not rescued
then the security user would work on rescuing the system and in time
elapse the system would combust upon activating the bomb in time
elapse once the system has been locked through amnesaic strings of
information (as I already discussed amnesaic programming)..in which
the distraction could be used to hack into secret data while security
systems are pre-ocuppied by the freezing bug. And extrapolation of
files can be done through amnesaic programming for amnesaic
information in which if final security exists there you can burn the
file security to access it through file burning to eliminate the
security software. Then to send tracing information for amnesaic
extraction into a dummy system through botnet which can make dummy
systems of diseased computers in which if the virus is sent you can
the frame other dummy users.
Security Bypass Through my Computer Bomb Script -by Seung Bum Kim
(c)opyright 2012
Another feature has come to mind after much brainstorming. In which
you can use live bufferspace to conceal computer bomb activity
through
the bufferspace if it is loading centrally. Through bufferspace the
script can be transfered to Javascript applications causing
detonation
for all present Javascript users. Through the hidden window conceiled
data can be both extrapolated or eliminated through amnesaic
programming.
Amnesaic Programming Window for CB Script -by Seung Bum Kim
(c)opyright 2012
To dodge internet security one must make system lock of teleological
locations in which shared data in internet provider boxes can be sent
system lock through the main command to process data that prevents
alternate computer activity since processing is the main command or
imperative. As it must approach the permanent shutdown of the system
in time elapse. In which bypassing frozen connections one can
retrieve top secret data stemming from the derivative connections in
which the computer bomb can thus be sent to all linked connections to
cause elimination of tracking data.
Computer Bomb for Data Hacking - Encryption Stunt -by Seung Bum Kim
(c)opyright 2012
I suggest Zuckerburg to add yet another function to my computer Bomb.
In which the computer must be ATDT ready so that upon cellphone
contact of a specific number the ATDT reception would lead to a
passcode entry where if the passcode is registered it can send the
script in 10 different locations so the computer bomb activates
through the home terminal device into 10 locations via cellphone
entry. Zuckerburg can program it to cause automatic trigger through
the passcode so that in cases of emergency the number can be used as
a
threat to attack systems for military operations where it would deter
dangerous activity by use of the passcode.
10 ATDT Locations *Boom* - by sEung Bum Kim
Now the military can make use of my computer bomb in cases where
dangerous files must be eliminated as well as the need to dispose
those using the files so it handles two things simultaneously. I
suggest you add my calibration function so that it conserves the use
of this script so that the processing of the bug to cause an outlet
reaction through a sudden shutdown bug would by the speed of the bug
processed lead to calibration where if fine tuned it can merely make
the monitor shred in front of the user. I am not of course making
light of this. The Price of plastic surgery has gone Up as such.
My project initially began when I decided to make a schematic for
'earthquake in midAir'. Evidently the project was so convoluted that
I moved to making a computer bomb. As the circles of the sciences
expand there too is found Paradox (controversy). The fact that
warfare is aesthetic was a German observation. Perhaps the whole
project in itself is too absurd to be taken in aesthetic terms. Two
people who make love become oneFlesh. Tastes like God. This is a
love affair..since I fell in Love with the World I made this Hotrod.
My Computer Bomb Project- by Seung Bum Kim
Now for the final security breech option one must recognize how Gaits
operate. Gaits can track computer activity through patterns detected
such as the patterns made by visiting websites in which your identity
is tracked. So you can send pop-up items to blur the pattern so that
various patterns that are convoluted occur through pop-up items thus
causing a problem with security tracking. Now if certain cathode ray
pigmentations are used then it creates different explosive effects as
stronger hues cause deepened explosions..so by causing transistor
rotation in the degree of a specific color if the outlet causes the
sudden rotation of the transistor in terms of contrast the various
ranges of color can be used to cause variant explosions. Bitmap
changes in color would not have a dire effect.
Final Option Addages for the Computer Bomb - by Seung Bum Kim
Now I made the computer bomb to punish people for their injustices
and
their evil. I offer free use of the computer bomb for Obama so he can
punish the racists and the bullies of this world in the name of
Goodness. The computer bomb was made as a Rod to punish certain
people and they know who they are. So with this I concede. (With a
vengeance)
Now a spontanous system crash bug can cause an outlet reaction
whereby
the energies that spark from shutdown must be locked in with monitor
transistor rotation to use the force of the outlet to make a
spontaneous increase in transistor contrast even using the auxillary
engine increase in processing speed as a mechanistic force to cause
destruction in the process.
Creating an Outlet Reaction - by Seung Bum Kim (c)opyright 2012
Now I made this computer bomb to endorse Holywood through a Real Life
Holywood to satisfy audience urges. Now I hand this to Zuckerburg so
he can make the software for it and sell it to political leaders for
a
large sum of money in which I ask to receive 30% so that upon this
contract the leaders can freely use it to their own liking. I added
the search option for the thing to be conveniencing and to prove a
vital point that much harm can be done at the push of a button.
Since
only a few software developers can make this script I urge Zuckerburg
to take charge of it with me as project manager. And I expect to be
receiving large payment of my Re-animation Project which I distribute
to Queens primarily and Kaiser secondarily so upon completion I could
be given a large payment on a regular basis as the work is applied.
I
ultimately made this script as a blessing for Obama and future
political leaders. So I offer this to be in Zuckerburg's hands with
me as project manager or the originator of US Computer Warfare. I
have also added botnet to disguise such activity as well as a wifi
technique to jam signals so such activity cannot be tracked.
Furthermore I made a hatching function so that it works irrefutably
and thus cannot be dodged. For its effectiveness.
Distribution Plan for Computer Bomb and Re-animator Project -by Seung
Bum Kim
Now for activity targetting for the computer bomb, the script must
enter the main website memory slot in which the script is send to the
'buffer' in Javascript applications in which the bufferspace
superstring location through Turin association of names and its
assessed location in a specific Javascript activity the script can be
released to the Javascript running application and the bufferspace in
which the application is running as live information, then by
registering names connected to the superstring location through
Javascript activity readings the system can be targetted through name
entry in every given bufferspace location. If pop-up items are
forced
through burning the pop-up blocker then a direct transmission of the
script can be done if by burning the blocker the script can be send
via the pop-up item in which the information sent along with the pop-
up setting has added script information.
As a further addage to my computer bomb script, the script should be
sent to any live application on the web through Turin string
association of names connected to the website. By setting it in the
live web application it becomes lodged in the website itself
connected
to the terminal that is linked to the website so that the
instructions
Let A = not A along with all script information must be set to
activate through the buffer in which when the buffer is then accessed
the script is launched. This way the script can be activated when
the
terminal is turned on or that it would hatch necessarily in due time.
Addage to my Computer Bomb - by Seung Bum Kim (c)opyright 2012
Now I am making some plans with my Bombscript since it is so vital in
warfare and for police missions. I offer the US military and Obama
free use of the software validated by payment so this whole plan is
not a matter of personal revenge but it is purely a matter of
business. I have been assaulted by MiddleEasterns so I suggest you
let me have the last word. Obama is free to use it since I respect
the man. So if anything were to happen to him he should take drastic
action using this script now turned software.

Plans with the Computer Bomb Software-by Seung Bum Kim

If a script is made that sends in string information 10 Let A = Not A
to cause a rotational and repetitious syntax which requires auxillary
engine processing as the syntax builds the processing speed increases
where there is no default if the system is jammed by a deliberate bug
introduced. Then as it builds upon a maximum level it must also add
script messages that make it more crucial to process the script until
the aux engine is given a spontaneous default as it defaults in the
cathode ray device by spontaneously increase of the transistor degree
and as it causes an eruption in the outlet or powerplug this causes
the processor to fry and it also causes the monitor to explode in 10'
X 25'.. this post is not to boast or to let jackasses use it but I
placed this in to add knowledge to the computer sciences.. and to
mask
this one can use botNet to make dummy systems since by sending a
disease through botNet allows one to take over diseased systems as
dummy systems that do your bidding.. furthermore, this can be made
for
type entry relay of the script if it tracks names and locality by
Javascript activity in which the names can be found through its
connection with the superstring..and since it is relayed to
Javascript
since it enters the buffer the computer can be set to explode in live
usage found through the connection between names as well as the
superstring location found through the names thorugh live
activity..so
by registering a name by superstring search the script can be sent to
Javascript since Javascript operates as a live application. And the
means to evade this is through botnet so you can send the blame to
dummy systems in which you send this script through botNet dummy
systems and cast the blame on dummy computers. I made an option for
typed registery of names through superstring location found in the
main internet boxes (3 boxes) so you can use it with ease by typed
entry of names. In which the script is relayed by finding the
superstring location through the main boxes and sent to Javascript
since it runs on a life buffer or that the application runs on the
website itself. So the live sending of the script for there to be
direct transmission must operate through Javascript. Name seeking as
an option can be done by the superstring location of the connected
name through scanning done on the 3 main boxes of the internet
headquarters. The outlet must be schizmed so that the cathode ray
transistor increases spontaneously for an explosive effect through
the
exploding monitor via Javascript. The invention begins with a
computer
science paradox--> 10 Let A = not A. The sudden shutdown of the
system
can be used to cause an outlet eruption in which if it is locked onto
the monitor transistor device for contrast then the monitor itself
will blow up in a 10" X 15" proximity. Using the auxillary engine
power as the mechanistic force behind the spontaneous transistor
increase and the force behind the tangential effect on the outlet.
Range can be calibrated by the speed of the bug that causes system
shutdown or a systems crash done deliberately through a virus to
cause
a system bomb..in which the processing of the bug can be done on
various speeds causing calibration of the explosive range but by
microseconds.
A Controversial Invention of the Computer Bomb as an Example on
Forbidden Knowledge - by Seung bum Kim (c)opyright 2012
Microsoft should be the Corporation to work on software scripts
concerning by new advent of the computer bomb using my patent and to
add functions that cause specific results using the logic of my
patent. Upon this Microsoft should offer me payment of 1/4ths the
profit. It should Only be sold to government worker affliated with
the MiddleEastern efforts. And I suggest they sell it for high prices
based on its worth, it's applicability, and the danger of it. Perhaps
a million dollars would be sufficient. But if it reaches public
scrutiny the fact is that Microsoft will sell the script to leaders
rather than others who are interested in a mere good Time. So they
face a wall concerning this. I also opt the US Army to use my
invention on missions. Now if Microsoft develops it for specific
people they could make a merger with the US Government. It is a fancy
idea but it is also very effective. Contact me through my Brother. He
works for a large movie company so it would be quite easy.
Distribution through Microsoft - by Seung Bum Kim
In X (Name) associated with Y superstring # through the 3 main boxes
which extends to all internet activities, by registering X for Y then
thru Y transmission can be sent to Javascript buffer through service
provider through Y in mainbox linked to the ID for Buffer location in
online memory storage space transfered to active running buffer so
that the script runs through pop-up access and entry causing the
script to activate through pop-up. Now to further my business deal
here I advise, Microsoft, Apple and Facebook Corporations to work on
their own unique script software concerning this so each one has its
own unique specialization and it can be sold for high prices to
leaders or people who can make responsible use of it. And I will
expect to be pocketing a quarter of the money that they accumulate
through the sales of this script software. But further than that, I
suggest that it is chiefly US military property so that it can aid in
missions (But with humanity) where dangerous files must be terminated
as well as the need to stop operatives who use those files or to kill
two birds with one Stone. Again put this invention under my name and
for those who buy the software as important figures upon buying it,
the software use should be validated and the correct use of it
verified.
Digression into the Seeker of the Computer Bomb - by Seung Bum Kim
(superstring Guru)
I am working on functions for my bombscript. In which global mapping
could be used and Turin assocations can be used on things like
address, street name, personal name, etc. This can be done through
Wifi. So that one can use a cartography chart to use it specifically
and also to inspect on such activies. I also suggest another function
which is to guise identity by putting two wifi signals together..if
you put two wifi signals together then it jams the wifi readings. So
update the Software, Zuckerburg.
Added function for the Computer Bomb Script/software - by Seung Bum
Kim
Now initially my intention with the computer bomb was to jack off.
But later I decided to review it using my conscience and I felt
rather
unsavory about the whole thing..and to take responsibility I decided
to make it the working part of Obama and the US military for Free
use..I still suggest it since what i did as a problem would then be
used for a true solution. I still suggest Zuckerburg to make the
software and offer me 1/4ths the money gained from selling the
software at his price..thanks.
Honest Message on My Motives Concerning the BbScript - by Seung bum
Kim
Now I made this computer bomb to endorse Holywood through a Real Life
Holywood to satisfy audience urges. Now I hand this to Zuckerburg so
he can make the software for it and sell it to political leaders for
a
large sum of money in which I ask to receive 30% so that upon this
contract the leaders can freely use it to their own liking. I added
the search option for the thing to be conveniencing and to prove a
vital point that much harm can be done at the push of a button.
Since
only a few software developers can make this script I urge Zuckerburg
to take charge of it with me as project manager. And I expect to be
receiving large payment of my Re-animation Project which I distribute
to Queens primarily and Kaiser secondarily so upon completion I could
be given a large payment on a regular basis as the work is applied.
I
ultimately made this script as a blessing for Obama and future
political leaders. So I offer this to be in Zuckerburg's hands with
me as project manager or the originator of US Computer Warfare. I
have also added botnet to disguise such activity as well as a wifi
technique to jam signals so such activity cannot be tracked.
Furthermore I made a hatching function so that it works irrefutably
and thus cannot be dodged. For its effectiveness.
Distribution Plan for Computer Bomb and Re-animator Project -by Seung
Bum Kim
Now for activity targetting for the computer bomb, the script must
enter the main website memory slot in which the script is send to the
'buffer' in Javascript applications in which the bufferspace
superstring location through Turin association of names and its
assessed location in a specific Javascript activity the script can be
released to the Javascript running application and the bufferspace in
which the application is running as live information, then by
registering names connected to the superstring location through
Javascript activity readings the system can be targetted through name
entry in every given bufferspace location. If pop-up items are
forced
through burning the pop-up blocker then a direct transmission of the
script can be done if by burning the blocker the script can be send
via the pop-up item in which the information sent along with the pop-
up setting has added script information.
Now a spontanous system crash bug can cause an outlet reaction
whereby
the energies that spark from shutdown must be locked in with monitor
transistor rotation to use the force of the outlet to make a
spontaneous increase in transistor contrast even using the auxillary
engine increase in processing speed as a mechanistic force to cause
destruction in the process.
Creating an Outlet Reaction - by Seung Bum Kim (c)opyright 2012
Now I offer this to the US military for specific military
assignments. Zuckerburg again must do the job of making the script
to
make it more contractual as he should manage profits made by this
invention in which I am given 30% of sales. I again also offer it to
Obama through Zuckerburg for full use upon payment so Obama is
justified to use it freely based on the fact that this is my specific
project. Again this invention is not for Jackasses.
Final Business Dealings - by Seung Bum Kim
My works are ethically justified by cosmic consciousness..in which
Earth's formated through Order so it would develop progressively
through conservation. But as Nietzsche said, chaos gives birth to a
New Star..chaos is prevalent in the cosmos and if morality were to
remain Earthbound then we would also lose touch with the cosmos.
Logos itself is earthbound so we must set moral Truth tables that fit
not only with the Earth's climate but with the entire cosmos so
morality can extend an age where science rules. There are only a few
software developers who can program this script so I offered it to
Zuckerburg since he is most qualified and most easy to deal with.
Antagonist use of this can be productive (warfare) or decadently
destructive (liberal warfare). Now I suggest society transvaluate
even if it causes the sensitivity of the new since only the future
exists then. We may exit Plato's cave but we are well on our way as
Obama being a black president is a force of transvaluation where
creative genius leads to transvaluation and even decadence.
Ethics Concerning my Work - by Seung Bum Kim
The reason Holywood is favored by the public is due to the fact that
the audiences seek a True World as depicted by the movies that
advertise the True World. Evidently I support a true World made of
phenomena. My final justification for this work is that a True World
made of phenomena in itself would be too unstable. As rhizomes exist
with less force than absolutes since we seek Sheer Being more than
Will or Way if both are combined where rhizome exists as Sheer Being
then the face of God can be seen in a New Way. - Seung Bum Kim
My computer bomb is essentially a contribution to Holywood and I've
said this before. It has the visceral thrills of a Holywood movie but
the thing manifests in real life due to my efforts. Hey, the prefered
thrill is the Theatre of the Mind. But with my script, the Price of
tickets went Up. Provided you stick your dick thru the Lines I have
offered you salvation. You may find my project too conveniencing..to
the point it is of leisure..but worry not, computer use that was
claimed as being passive in relation to social contact has now become
a challenge..phone Death is one of my specialities..though I could
make hundreds of greater patents. This is the closest thing to
telekinesis of the testicle..but it tests the Mind where a rifle can
be used by a suburban dog..so if you want to step up plate and use
it,
hey, my conscience is clear..you must take the blame rather than
I..Of
course I made it all possible..but remember that I advised that
responsible people in government use this for military purposes..so
the gun is out of my hands.
Upon the process of ignition I mentioned if the script information enters Javascript's main buffer then it can cause through the ATDT link to spark the ignition more effectively through script registered ATDT data so that once the modem pick it up it would cause the power in the individual box to launch destructive energies into the system through the Javascript powered storage unit.
Final Process for the Computer Bomb Script - by Seung Bum Kim (c)opyright 2013
Now I failed to mention ignition and as I such I will digress into ignition. The power within the system that is acquired from the outlet is stable hence it would not undergo friction. So if the power were to frictionally react to the main power chip this in itself would be sufficient for ignition. This can be done through erratic power distribution to the computer hardware itself so it causes the ignition effect that can lead to the sparking of the other destructive actions I have mentioned previously. -sEung b. kim
My last note on the Computer Bomb entails the combustion factor where matter is expelled through an explosion. As such I chose the most obvious solution which is when the cathode Ray is a default area for the force that I have presented in great detail or that the default of the entire force generated is to be transfered to the cathode ray to produce such increase in contrast that it blows up literally. Also the power storage unit could also be used in which if a bug enters the power storage unit then upon mass build up of power beyond the system's capacity would cause an explosion using the power generated to cause expulsion. Any bug that delineates the synchronicity of the Power in the storage unit will suffice.
Expulsion Technique -by Seung Bum Kim (c)opyright 2013
Another note when the auxillary engine is in Lock then it must generate Power through it and be defaulted into the Power storage unit causing a spontaneous outlet reaction where the cathode ray for the monitor in terms of contrast must also be locked by this force in acceleration driven to this by the energy that the auxillary engine generates so upon an outlet reaction the transistor is then increased exponentially. by Seung Bum Kim
Finally for combustion to occur since the detonation of it might not penetrate the hardware auxillary lock must to be done where it freezes the computer transistor switch and this would be enough to cause combustion. -sbk
Now by using an antennae that tracks specific auoras thorugh auora sensitivity fabrics or a miniscule wire that responds to auora in an obstructive sense then the command chip must first initiate what to detect from the beginning point and for the antennae to complete its data by movements that allocate data relavent to the initial data. In which pre-set data readings can be used so that such data is labelled for its specific auora emission and the data concerning the object is made whole through random shifts that eventually lead to extracting more revalent data to its final solution. As such if pre-set pH readings are made then it can categorize skin type and the command chip can be used to home into those pre-set data recordings by finding its equivalent in sensor readings.. This way if a robot is manufactured to acquire such data readings it can be used to hunt down that which is locked as the target based on pre-existing data of those readings. Where if the target is accessed through sensory data it can cause a motor response to reduce its distance from the auora readings so it goes to the designated target.
AI for Warfare -by Seung Bum Kim (c)opyright 2013

In order to produce evolutionary developments in computer technology one must open up vetrice spaces so the system is not enclosed preventing such evolutionary growth..and new matrix sets must be introduced where f(x) = -(1)^n det(A = xl) in which this can be used as characteristic polynomials of A..in which matrix combinations that are characteristic through m * n and n * m data interpretation can be used by co-efficient calcuations both diagonal where V = S1 + Sr +...S in which silicon Gel through a conseratory chamber can cause upgrowth by defaulting to new structures based on expansion requirements where the limits e require boundary functions in which in order to perform higher calculation one needs a larger boundary and this can generate autonomically in which the next obvious challenge is to produce living technology through this in which Turin's method would be valuable in making associated superstrings identifiable as knowledge. In which the silicon fabric upon buildup of each main component can also generate its own data through an internal logic. So as information increases through its buildup through a metaphysical source where automatic reductionist processes occur to integrate data into a priori then the silicon component can use this data as a means of performing a function through this acquire data where random variables must be generated so that only those true to logical integrity would produce a priori. This is my initial attempt at making self-actualizing technologies. I don't imply to mean that I am working on self-actualizing systems that govern thing..I believe Cameron made a movie on that a long while ago.

Advancing Systems through Turin and Bf(x)- by Seung Bum KIm (c)opyright 2013


The implication here is to construct a radar device that tracks into data through differential readings to be done on a plane where it can overtake several satellite systems that pose as a danger through my encryption device in which some of them are armed with lasers that can put Florida in Soot. But to hijack their satellite system one can make controlled use of it. In which again if you use Matrix sets combinatorily to acquire vetrice measurements through it then you can find turbulence reading through the radar through computer entry and fire the lasers on any object that causes turbulence..at that rate you can remain onboard and carry your full agenda and with the aid of the computer bomb and SMS transference (as this can jam cellphones or computer systems) you have enough equipment to go on a technical mission be it political or for profit. -sEung b. kim
Now the encryption stunt can overtake systems that can cause a global impact. In which if the data is both received and transmitted via a radar device by accessing the security system and applying the technique it can be done without detection if one travels at 60mph in a vehicle since the signals then become transparent. And you can additional burn security files to eliminate them..at this rate one can perform global dominance from a remote location in which one travels at a specific rate. -sEung b. kim
As far as encryption techniques go if you initially use the first passcode letter and conjoin it with the last letter to cause galvanism of the codes inbetween the two passcodes true to superstring theory then by application of Rajaman's game theory then it naturally would generate a solution by means of combinatory probability where 'a' given the condition of h where 'a' and 'b' are exclusive the equality of 'a' and 'b' holds (a and b)/h = a/h X b/h where Rajaman's game theory can be used as a default mechanism..In which f(x) = n!/(n - r)!r! where (a or b) is derivative of condition h Σ a or not a Ü b or not b in which a or b are the conditions of variables between the two. I specifically designed this encryption stunt for the purposes of extracting files for the sake of film developers. In which even if God plays dice there are ways that it can be seen.

Encryption Stunt -by Seung Bum Kim (c)opyright 2013


Upon the process of ignition I mentioned if the script information enters Javascript's main buffer then it can cause through the ATDT link to spark the ignition more effectively through script registered ATDT data so that once the modem pick it up it would cause the power in the individual box to launch destructive energies into the system through the Javascript powered storage unit.
Final Process for the Computer Bomb Script - by Seung Bum Kim (c)opyright 2013
Now I failed to mention ignition and as I such I will digress into ignition. The power within the system that is acquired from the outlet is stable hence it would not undergo friction. So if the power were to frictionally react to the main power chip this in itself would be sufficient for ignition. This can be done through erratic power distribution to the computer hardware itself so it causes the ignition effect that can lead to the sparking of the other destructive actions I have mentioned previously. -sEung b. kim
My last note on the Computer Bomb entails the combustion factor where matter is expelled through an explosion. As such I chose the most obvious solution which is when the cathode Ray is a default area for the force that I have presented in great detail or that the default of the entire force generated is to be transfered to the cathode ray to produce such increase in contrast that it blows up literally. Also the power storage unit could also be used in which if a bug enters the power storage unit then upon mass build up of power beyond the system's capacity would cause an explosion using the power generated to cause expulsion. Any bug that delineates the synchronicity of the Power in the storage unit will suffice.
Expulsion Technique -by Seung Bum Kim (c)opyright 2013
Another note when the auxillary engine is in Lock then it must generate Power through it and be defaulted into the Power storage unit causing a spontaneous outlet reaction where the cathode ray for the monitor in terms of contrast must also be locked by this force in acceleration driven to this by the energy that the auxillary engine generates so upon an outlet reaction the transistor is then increased exponentially. by Seung Bum Kim
Finally for combustion to occur since the detonation of it might not penetrate the hardware auxillary lock must to be done where it freezes the computer transistor switch and this would be enough to cause combustion. -sbk
Now for another addage to the computer bomb software one should make
the name of your fireFox program into $SYS$ fireFox since any program
under the name $SYS$ is invisible to the operating system as it
becomes invisible to Windows and thus invisible to network's
snoopware. Covert use of the computer bomb must be through Onion
Routers that pass website information through onion layers as it is
passed to each layer of the onion until it reaches you so guise web
communication activity even of the activated computer bomb. This way
addresses or naughty addresses aren't detected on the blacklist. And
the script should cause SMS transference of information so that it
fills the memory of the cellphone and causes it to 'choke' on the
routine operations causing system freeze again I add so that this can
be done on computer systems to cause time elapsed freezing in which
an
alternate and internal source of energy can be used to cause
necessary
hatching of the script even if the powerplug is pulled temporarily
causing an irrefutability effect.
Invisibility Cloak for Computer Bomb Script with Irrefutability
Freezing Process - by Seung bum Kim
For the script to also be activated by cellphone usage in which by
cellphone entry through the designated
line if the computer is active as you are away from the terminal it
must cause activation on Javascript
through a running website application to cause system freeze through
a
bug or system error that must be
processed with limited time elapse before the system is paralyzed or
frozen permanently directed to 10
systems activated on cellphone entry which then activates the script
to 10 locations, then since the
bombscript runs on javascript it can disable the storage box so it
cause an impossibility to detect live
activity since the storage memory box prevents detection of live
usage
this is the direct means to bypass
security as one can then adjust to a laptop under the same name but
in
an erroneous manner just as
Winston can be spelled Win5ton. Security bypass this way can lead to
retrieval of hidden files.
ATDT Bomb for Data Retrieval -by Seung Bum Kim
Upon sending the computer bomb script if the script is accompanied by
a bug that requires processing where alternate processing is blocked
in which the main imperative is to process the bug that causes syntax
that prevents the system from operating the computer script can
thwart
system rescue if in this way the system is made to freeze before
detonation so it can't be rescued and also produces time expediture
in
the attempt to rescue the system.
Computer Freeze for CBScript -by Seung Bum Kim
So that it offers time to escape from detonation, one should produce
a
message relayed to Javascript concerning time elapse of the bomb
based
on preset data found in experimentation. And upon that one can even
use Extension 69 to make the script bounce back to the derivative
computer. So Extension 69 is not only a shield but a means to
retaliate from an attempt to destroy your system and the room it
occupies.
Added Entry to Computer Bomb Script - by Seung Bum Kim
To dodge internet security one must make system lock of teleological
locations in which shared data in internet provider boxes can be sent
system lock through the main command to process data that prevents
alternate computer activity since processing is the main command or
imperative. As it must approach the permanent shutdown of the system
in time elapse. In which bypassing frozen connections one can
retrieve top secret data stemming from the derivative connections in
which the computer bomb can thus be sent to all linked connections to
cause elimination of tracking data.
Computer Bomb for Data Hacking - Encryption Stunt -by Seung Bum Kim
(c)opyright 2012
If a script is made that sends in string information 10 Let A = Not A
to cause a rotational and repetitious syntax which requires auxillary
engine processing as the syntax builds the processing speed increases
where there is no default if the system is jammed by a deliberate bug
introduced. Then as it builds upon a maximum level it must also add
script messages that make it more crucial to process the script until
the aux engine is given a spontaneous default as it defaults in the
cathode ray device by spontaneously increase of the transistor degree
and as it causes an eruption in the outlet or powerplug this causes
the processor to fry and it also causes the monitor to explode in 10'
X 25'.. this post is not to boast or to let jackasses use it but I
placed this in to add knowledge to the computer sciences.. and to
mask
this one can use botNet to make dummy systems since by sending a
disease through botNet allows one to take over diseased systems as
dummy systems that do your bidding.. furthermore, this can be made
for
type entry relay of the script if it tracks names and locality by
Javascript activity in which the names can be found through its
connection with the superstring..and since it is relayed to
Javascript
since it enters the buffer the computer can be set to explode in live
usage found through the connection between names as well as the
superstring location found through the names thorugh live
activity..so
by registering a name by superstring search the script can be sent to
Javascript since Javascript operates as a live application. And the
means to evade this is through botnet so you can send the blame to
dummy systems in which you send this script through botNet dummy
systems and cast the blame on dummy computers. I made an option for
typed registery of names through superstring location found in the
main internet boxes (3 boxes) so you can use it with ease by typed
entry of names. In which the script is relayed by finding the
superstring location through the main boxes and sent to Javascript
since it runs on a life buffer or that the application runs on the
website itself. So the live sending of the script for there to be
direct transmission must operate through Javascript. Name seeking as
an option can be done by the superstring location of the connected
name through scanning done on the 3 main boxes of the internet
headquarters. The outlet must be schizmed so that the cathode ray
transistor increases spontaneously for an explosive effect through
the
exploding monitor via Javascript. The invention begins with a
computer
science paradox--> 10 Let A = not A. The sudden shutdown of the
system
can be used to cause an outlet eruption in which if it is locked onto
the monitor transistor device for contrast then the monitor itself
will blow up in a 10" X 15" proximity. Using the auxillary engine
power as the mechanistic force behind the spontaneous transistor
increase and the force behind the tangential effect on the outlet.
Range can be calibrated by the speed of the bug that causes system
shutdown or a systems crash done deliberately through a virus to
cause
a system bomb..in which the processing of the bug can be done on
various speeds causing calibration of the explosive range but by
microseconds. So upon these instructions if heat generated in the auxillary engine's rotational cycle the RAM chip must be drilled with the heat by taxing it throught the aux engine in which when the chip fries if it impacts the power reserve in the computer than the computer and the monitor through my given instructions would combust.
Computer Bomb Extensive Works -by Seung Bum Kim (c)opyright 2013

Now by generating processing data in a computer using Let A = not A then as it is processed rotationally until it faces a motor syntax then by causing predicative focus on the monitor this can be used to cause a computer bomb explosion..in which superstring associations can be extrapolated by name as the activating data is sent to the buffer through the association between superstring location and active bufferspace. It can be implanted where it hatches through pop-up transmission. -sEung b. kim (c)opyright 2013
Now by generating processing data in a computer using Let A = not A then as it is processed rotationally until it faces a motor syntax then by causing predicative focus on the monitor this can be used to cause a computer bomb explosion..in which superstring associations can be extrapolated by name as the activating data is sent to the buffer through the association between superstring location and active bufferspace. It can be implanted where it hatches through pop-up transmission. So upon these instructions if heat generated in the auxillary engine's rotational cycle the RAM chip must be drilled with the heat by taxing it throught the aux engine in which when the chip fries if it impacts the power reserve in the computer than the computer and the monitor through my given instructions would combust-sEung b. kim (c)opyright 2013

As for the computer bomb if the data Let A = not A causes accelerated processing and auxillary engine rotation upon causing also a syntax in the motor control device in which the engine then processing an increasing speeds is counteracted by the syntax causing a jam and an explosion through the direct system focus on the monitor. As such by sending the data to hatch upon being processed in bufferspace if names are registered in a searching device where once the name is registered its superstring location can be host for transmitting the data through the same channel that hatches pop-up items the tracking of the superstring name through the 3 main internet boxes by means of using botnet can be used so that one can simply register names as the script is sent to hatch. But out of precaution make sure you make it individual specific necessarily with a lock that prevents multiple string relay. So upon these instructions if heat generated in the auxillary engine's rotational cycle the RAM chip must be drilled with the heat by taxing it throught the aux engine in which when the chip fries if it impacts the power reserve in the computer than the computer and the monitor through my given instructions would combust-sEung b. kim (c)opyright 2013
Upon completing that portion of the script if the auxillary engine's rotation energy is transfered to the outlet upon jamming it through syntax sudden system shutdown must be made overt power buildup so by a spontaneous leap in system power the paradigm shift causes the outlet to react so that this can be used as power to erupt the cathode ray device. In which it is adjustment for measured range by accelerating degree of the contrast through a rotation of the monitor transistor powered by the auxillary engine and the outlet. But the main potency force in this script launched is when all capacitors are directed with the energy from the stunted outlet till they explode or burst where all resistors as such must be caused to prevent electrical resistance. So upon these instructions if heat generated in the auxillary engine's rotational cycle the RAM chip must be drilled with the heat by taxing it throught the aux engine in which when the chip fries if it impacts the power reserve in the computer than the computer and the monitor through my given instructions would combust.-sEung b. kim (c)opyright 2013
Now I have said that botnet can be used so that by name input through a search bar the associated name of the superstring becomes targetted by the information allocation through the 3 main boxes as the pivitol point to accessing their location so that the script can be relayed as a pop-up item. And by cellphone # entry through a remote distance if the system is on then scripts can be sent through the cellphone number entry so that the scripts are launched to pre-set locations by the push of a button for 10 way destruction via remote distance. -sEung b. kim
The implication here is to construct a radar device that tracks into data through differential readings to be done on a plane where it can overtake several satellite systems that pose as a danger through my encryption device in which some of them are armed with lasers that can put Florida in Soot. But to hijack their satellite system one can make controlled use of it. In which again if you use Matrix sets combinatorily to acquire vetrice measurements through it then you can find turbulence reading through the radar through computer entry and fire the lasers on any object that causes turbulence..at that rate you can remain onboard and carry your full agenda and with the aid of the computer bomb and SMS transference (as this can jam cellphones or computer systems) you have enough equipment to go on a technical mission be it political or for profit. -sEung b. kim
Now the encryption stunt can overtake systems that can cause a global impact. In which if the data is both received and transmitted via a radar device by accessing the security system and applying the technique it can be done without detection if one travels at 60mph in a vehicle since the signals then become transparent. And you can additional burn security files to eliminate them..at this rate one can perform global dominance from a remote location in which one travels at a specific rate. -sEung b. kim
As far as encryption techniques go if you initially use the first passcode letter and conjoin it with the last letter to cause galvanism of the codes inbetween the two passcodes true to superstring theory then by application of Rajaman's game theory then it naturally would generate a solution by means of combinatory probability where 'a' given the condition of h where 'a' and 'b' are exclusive the equality of 'a' and 'b' holds (a and b)/h = a/h X b/h where Rajaman's game theory can be used as a default mechanism..In which f(x) = n!/(n - r)!r! where (a or b) is derivative of condition h Σ a or not a Ü b or not b in which a or b are the conditions of variables between the two. I specifically designed this encryption stunt for the purposes of extracting files for the sake of film developers. In which even if God plays dice there are ways that it can be seen.

Encryption Stunt -by Seung Bum Kim (c)opyright 2013
By causing frequencies that integrate with the positive ionic gases in the ionisphere in which frequencies solidify the gas forming valence bonds through spiral frequency integration if sufficient mass is gathered then non-Gaussian frequencies must be instantly transmitted to cause a tangent in ionisphere matter and hence it would cause the energy to enter the
Cumulous zones through attraction caused by dual frequency transmission where the released spectrum of the positive ion base is of greater mass and magnetic resonance and also through dynamic tension and upon entering it if dynamic inversion is used by vertical field relay with a magnetic tension to it then upon the positive ion plight the energy would then bypass the cumulous zone and strike Earth from a verticle direction based on the area in which the ionic disruption is made. In order for positive ionic release to occur a strong connection must be made to ground contact and the ionisphere "through the electrical force in the cumulous region" or that the connection must be derivative of the cumulous region. In which upon this connection between Ionisphere and Earth ground Zero through frequency connection that which is inbetween it must become an absolute Field for the energy stemming mainly from the culumus region and its immense electrical energy. The ionisphere positive Ions must integrate with dual spectrum frequency emissions so it causes collodial buildup and that which is rejected can be sent directly to cumulous regions so positive ionisphere energy can be expelled from the ionisphere in which it is contacted with a magnetic Pole that unifies the ionisphere with the Earth's ground then weather can be controlled through vetrice adjustments of x or domain for y through the function of x. The dual frequency must cause collodial division and collodial buildup by making spiral integrating frequencies diametrically opposed as the expelled energized positive ions from the ionisphere through the gravitation pull as the Pole is established on Ground Zero would then enter the cumulous region and strike the earth through dynamic inversion. Weather changes can be made through this by causing new fractal formations in which adjustments is domain can cause new fractal formations calculated by matrix set combinations so vertice measurement can cause turbulence measurement and to activate through this calculation and through the Tesla Coil that manages to connect with the ionisphere. The intensity of the absolute field determines the weather occurances in which dynamic inversion is cut short than it only causes changes in the cumulous region thus making weather changes by calibrating the degree or intensity of the absolute field. A frequency connection between the ionisphere and the cumulus negative ionic region must be made where cumulous negative ions must be the initial and first polarizing Force if connection stems from the cumulous negative region as the derivative Force and due to its mass and kinetic entrance in the cumulous region through v_3= rt. 2gh Σ F=ma > b(G) upon this measurement the positive ionic energy can be used as a destructive force against Earth's ground and positive ions from the ionisphere can be acquired in the process. In which during the frequency buildup in the ionisphere it must cause partial resistance against the edge of the time-space curvature so that this causes the force of expulsion by which positive ions are propelled to Ground zero. For the purpose of causing positive ionic substances to expelled from that place in the atmosphere the Ions must undergo ecliptic inversion as far as its polarity with the Earth goes causing the ions to be 'shaken' from the Ionisphere. Upon ecliptic inversion then descend into the cumulous region would cause the negative ions in the cumulous regions so it accelerates into Ground causing an explosive reaction or it can also be used where a pod is there to capture positive ions to produce a duality in its importance of warfare and also for building technologies.

Ionisphere Laser Attack - Completed -by Seung Bum Kim (c)opyright 2013

By use of 1/2kA^2 where A^2>Elastic conservatory where Inversion Ü A sin (2pi ft) Σ F(A^2) -> Where the momentum must occur through elastic deformation as it is suspended from the Earth's lower atmosphere causing transformation into work Where x2 Σ Wh = 1/2mv_3^2. Upon which F1 = ma (x2) > bf(G.

Gaussian Curves and Energy Transformation through Vibration and Descent -by Seung bum Kim (c)opyright 2013
Reply all
Reply to author
Forward
0 new messages