Tuesday, September 11, 2018

hacking drones .5

Faster dictionary decoding with SIMD instructions

why not decrypt gaussian noise...yes, we can decrypt...long time ago with jonh the ripper, and old dictionary attacks...but on the latency air to air...you need to accelarte Fourier with a SIMD decoder

LEMIRE.ME
Related Posts: Fast unary decoding Even faster bitmap decoding Fast random shuffling

hacking drones . 4

so...34 cents...back to war! hardware with S-Box...and upgrade of Blowfish

hacking drones . 3

hello world! welcome back to war! tuesday, 09.35 am! So NSA...34 cents for this one...ok?...just a simple explanation, for a very complicated code...drones in Syria and Iran...are guided trough a base at the US...but a MIMi's has a problem trying to sniff the URL...problem cames when this communication is based in air to air com...meaning they have jets flying sending the data encoded with Gaussian algorithm...which...is very complicated...what I have here...is the construction of the sys program...check it out
GITHUB.COM
skeleton variation encoder code in tensorflow. Contribute to hardmaru/diff-vae-tensorflow development by creating an account on GitHub.

Monday, September 10, 2018

Shinedown "Cut The Cord" (Official Video)

ok...from uncle zé....you control, the schedule of the vault...there's only one company transporting diamonds...two cars...the moment the truck gets out, you position the cars in front and back...when stops at the traffic light...the back car...blows up the windows from the security...takes them, to the front car...leave the back car...puts the front car with FBI plates...and sirene sound...goes to a down level car parking...there's a car there...transfer the cash...leave both cars, and the maids there...and we are out!...hey...now I know where the kidnapped cop is...on a contentor beared down under the soil, at a florest...


hacking drones .2

back to war...
Neither checksum nor LRC can be considered robust against message corruption. For example, consider the original message (“48656C6C6F20776F726C6421”); suppose we change the last two bytes of the message from 6421 to 6520. Both the LRC and the checksum remain unchanged! (We simply turned one bit ON in an upstream byte, and turned the same-position bit OFF downstream, creating two changes that cancel each other out at checksum time.)
IDTECHPRODUCTS.COM
Checksums of various kinds are commonly used in data communication protocols to allow the recipient of a message to determine, quickly and easily, whether the data is likely to have been corrupted in transit. If you add all the bytes of a message together, and find (neglecting overflow) that the su

hacking drones .1

welcome back to war..another week, monday, 09.25 am.
Let's hack the drones...url.URL reverse...anyobne interessest in yahoo.finance...lol
GORILLATOOLKIT.ORG
mux: Package mux implements a request router and dispatcher.
he internet)...it occurs frequently, the Constitutional Courts decisitions are unauthorized...There's also special privileges, to PJ agents, that the common citzen or public agent does not have...like, on cases of extorsion, corruption, stopping investigations, obstrution to Justice...which means, these "good guys" are only "compulsive retirement"...This is the "system"...either the day before 25 April 1974, either the day after...So, let's go on fighting this war. Drinking, eating, having fun, and whoores ! "Assunto: Processo disciplinar. Processo criminal. Independência do processo disciplinar. Pena de expulsão: aposentação compulsiva e demissão. missor:Supremo Tribunal Administrativo - Decisões proferidas pela 1.ª Secção (Contencioso Administrativo) - Decisões em subsecção durante o 4.º trimestre de 1993"
DRE.PT
Homepage do Jornal Oficial da República Portuguesa - Diário da República

Sunday, September 9, 2018

Anonymuz - Blown Away Part 2 Feat Hi-Rez





TOR Planet! I was spending some tears...bastards against bastards on big huge schemes for illegal funds...like the other day at UK...who was behind that, were themsels, wanting to occupy trones....now shadow wars go on, with codes to kill...guess what...my code "was" ...was kill her at the elevator and make it look like a common assault...plans changed...better saying, both bastards and bastards inconrporate don't have no more plans...I know that...some time ago, I was getting inside the building, a very "independent" negour gets the ride of the open door...smiling like a mercenaire...some one just send the warning...get out of there....the negour face was a show...and also some time ago...a extreme right wing, was parked at the street, cleaning the car, while an american friend just sudden appeared, and made the gesture of knoking me down, to protect me...guess what...now they wanted to make a proposition, of a number and an account...a proposition they would "see what I can do"...if it was an Enter...then they would kill me after...I don't know about that, really, because the "system" is going trough a "bad" fase of conscinouse...anyway...hackers are my army...so, Aberdeen ...any plan..and gov...anywhere..we know about it...try to match the voice...you have maids for just looking at your vanity monkeys living style...I just came from a game computer...something new for you...we just decided to rise the level...we will do the following...we will "modify" the codes of objectivs...2nd we will transfere the funds...3rd to maintenance....Have a nice sunday

Energy Blackouts total electric outage graphite carbon balls trow 2 ground impact

  https://www.alibaba.com/product-detail/Graphite-Carbon-Ball-C80-Instead-of_1601156433008.html?spm=a2700.galleryofferlist.normal_offer.d_ti...