A new magnetic lava lamp!

Here I document my invention of the ferro fluid lava lamp like display.

The unit is covered with a glass dome, half spherical in shape. The bottom is half a cube in shape in which the neodymium magnet rests on a gear which rotates the magnet there by changing the shape of the ferro fluid in the glass dome.

On the bottom is a light to make the dome glow.

I obtained a royalty free image from wikipedia on ferro fluid, and modified it to my liking.

The drawing is not that good but I rarely use the gimp now days.

 

 

magnetic_ferro_lava lamp!.png

magnetic_ferro_lava lamp!

star trek phasers in real life

This is a theory about sci fi fantasy being real.

 

Phasers in star trek are nothing more than gamma radiation weapons.

They use a simple radioactive metal with electricity and a Mandy Fielder focusing device to focus the beam of gamma radiation which can be deadly to humans.

 

You change the volltage to change the wavelength, and change the amperage to change the effected field.

A gamma radiation propulsion technology

This is a theory about sci fi fantasy being real.

 

I have come up with what appears to be a gamma radiation propulsion engine technology.

Gamma radiation will be possibly pulsed in space from the back of the ship, with varying amperages used in creating differentials in thrust. The wavelength of the gamma radiation will be equal to that which is required to create radiation in the wavelength which irradiates antimatter (which is also dark matter mind you) and create trust just from photon based possible pulses from the back of the ship. The amperage will vary based off what thrust power you want from the matter being irradiated.

 

Explained: The gamma  radiation irradiates a target mass, changes the photon density of that mass, and thus changing the repulsion to matter around it. Changes in this increase are decrease thrust.

Good!

About the programming notes on my site

I have been informed by someone that I plagiarized information in the creation of my notes on programming languages. I own many books, and I read quite a bit online and my notes were created from multiple sources. I do not even know all of the sources so if you think I somehow violated your copy write please let me know and I will update the programming notes which are mainly for me only anyhow.

Who are the Shadow Brokers? The answer might suprise you.

This is new information. It turnes out shana thompson is also involved in the hells angels.

 

 

 

 

Well I figured I would out the Shadow Brokers since it is Halloween!

May I ask (A-Team here) is the group known as the Shadow Brokers really a woman from Arizona name Shana Thompson? Can you find here here at https://www.linkedin.com/in/shana-thompson-7878781 I think so. Is she also the author of http://amanfrommars.blogspot.com ? I think she is!

 

UPDATE: Shana is aka: The Drunk Russian, Rotten Tomato, Annie, Ann, Pip, Pippy long stalkings, Little orphan annie, amanfrommars, amanfrommars1, Ruth, Red, Big Red, The Shadow Brokers, with more to come.

 

Is this the IP that this girl uses for home and VPN use 77.98.142.155 ?

It just might be!

 

And in response to your latest post Shadow Brokers (We should now say you are quite in the spotlight) A-Team waited until you tried to attack the DNC. That’s a BAD GIRL.

So there you have it.

PS:”Don’t call the mofo A-Team DirtyGrandpa. Or your new name will be Inbread woman.

Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?

What is Arizona law enforcement using your internet for?

I ask you the question: Just what is Arizona law enforcement using your internet for?

The answer might suprise you.

 

Child pornography, distribution of pirated software, distribution of pirated multimedia (Music and Movies), the distribution of 0day exploits to your computer systems for the purpose of backdooring your computers and planting evidence.

 

They are also using CALEA (Communications Assistance for Law Enforcement Act) hardware to man in the middle attack your internet connections to modify what you see on the internet. This means you may get different search results than other people when you surf the net, and with the scripts they are using actually fake your browsing history so they can create what they are calling “Digital Evidence”.

 

If you are suspected of a crime they create large volumes of accounts on services that you use (yahoo, aol, facebook, twitter, tinder, etc) and they redirect you to their accounts by surrounding you with their peoples disinformation, lies, and even mislabeled content so they can say you clicked on something to obtain the content.

 

They take sites like google and modify your search results with large amounts of pages containing content THEY have created. Upping their results in the google search (CLICK and ADVERTISING *FRAUD* BY THE WAY). They even modify the text of the search results and place words or partial sentences in there to threaten the “suspect”.

 

Take a movie sharing site for instance. I found that by monitoring one of the movie sites which had pirated movies that a single female agent has upload a HUGE chuck of the movie base. Yes, a government agent who is supposed to uphold the law was mass uploaded pirated movies. It gets worse. This site was ad driven, so not only was she helping people break the law, they were getting PAID for her criminal activity.

 

Another example: Pirated software. Did you know that the government agencies in the state of Arizona are responsible a VERY large volume of the pirated software that is available on the internet? This too is also ad driven. I even caught them using a software package FOR WORK WITHIN THE GOVERNMENT IN THE STATE OF ARIZONA which costs about $1700.00 and it WAS STOLEN SOFTWARE.

 

Here in Arizona the law enforcement thinks they are above the law aka “The Untouchables” (THEIR WORDS).

 

I will tell you my story about how I came upon this information.

7 years ago I was a computer consultant for banks. One night a girl that I had slept with in the past many times called me multiple times and explained she wanted to come over and have relations with me. She came over, we had relations, then I asked her to leave. I didn’t think much of it at the time as my girlfriend was gone for a while and it just seemed like cheating to me which I know was wrong but I did. A few days later the police department from another city shows up to my front door and asks to speak with me. They said she claimed I kidnapped and raped her. I did not. I answered their questions and asked them to leave. Then I payed for an attorney. I moved to another county shortly after wards (Still in Arizona) and this is when I started noticing them on my internet.

In short it was like a living hell. Every site I went to for the most part had images they planted that said things like “I RAPE” or “RAPIST” (yes in my internet now all the sudden are people starting to say odd things about rape). I found the ringleaders of this group and they have a website www.theregister.co.uk . Turns out they are law enforcement and they lie on the website and say they are all in the United Kingdom. Joeproxy.co.uk is a god example also, thats Joseph M Arpaio with a UK website were he tracks criminals using a web proxy to commit crimes.

 

Then I started to notice it in person. Everywhere I went people were calling me a rapist (IN PERSON MIND YOU). This has not stopped to this day. Most recently they started contacting me on Tinder posing as women saying very sexual things and asking me to violently attack them. stuff like (my bf and i broke up recently.. i need sum good D :P. not lookin to jump back in a relationship though..) and (i rly love bein spanked and choked.. you into that kinda stuff?)

 

Turns out they need me to have the profile (a character profile that is, for use in court to convict me with just my character) of a violent sexual deviant. So they can say I violently attacked that girl (i did not do anything violent to her, by the way) and convict me of kidnapping and violent rape (which in Arizona allows them to investigate me INDEFINITELY because of the statutes, imagine that).

 

So be careful, the things you see and hear on the internet just may be another corrupt official trying to get their name on the wall using your life as the price.

 

This corruption has to stop.

 

I have informed the police, the sheriff, and even the fbi.

They have refused to investigate my findings.

Using the Rekall memory forensics tool

http://rekall-forensic.blogspot.com
www.rekall-forensic.com

download the latest recall sourcecode tarball and decompress.
change to directory that was just decompressed
sudo python setup.py install

cd rekall-gui
edit file setup.py
search for line which is :exec open(“rekall_gui/_version.py”).read() in VERSION_ENV
replace with : exec open(“_version.py”).read() in VERSION_ENV

save file
sudo python setup.py install

now rekall and rekall gui are installed.

Now onto creating the profile:
cd ../  (back to main rekall src dir that was decompressed)
cd tools/linux
make profile

this creates the zip file which is converted to a json file (the final version of the profile)
in your tools/linux directory there will now be a zip file

convert that zipfile to a json file like follows: rekall convert_profile myfile.zip myFinalProfile.json
next copy this json file somewhere in your home directory so it can be used later.

now lets use LiME to create the image of your RAM.

Download LiME at: https://github.com/504ensicsLabs/LiME
I personally just download the zip of the github dir and decompress it. anyhow lets move on to building the kernel module for memory dumping.

cd to LiME dir
cd src/
make

this will create a LiME kernel module in this directory (granted you need to make sure you install any prerequisites for LiME)

Lets perform the memory dump assuming the module was named LiME.ko, but again it is the only .ko in the dir:
insmod LiME.ko “path=/home/fuion/RAM.lime format=lime”

I know that rekall has its own memory utility but I found it to be a pain in the ass so I used LiME and it works great.

I would say now to create a directory and place both the json file and the RAM.lime files in it for safe keeping.

I used the rekall gui becuase the konsole based version gave me issues with the inventory and there was little documentation on it,
and the gui does not have this problem. also you can be running many plugins at the same time and it has a nice output
format which is easy to read. say what you will 😉

we now start the rekall gui and get right to digging inside the image file.

first step is to create a dir for use with worksheets that the rekall program uses: mkdir worksheets

now start rekall: rekall webconsole –browser –port 8001 –worksheet /home/fuion/worksheets

rekall will open your web browser and the rekall gui will be in it.
make sure if you are using noscript you allow the local host based pages to use scripts as they are required.

to start out click the “Session” button on the upper to left hand side of the page.
for now we will use just the default session, which will show on your right hand side of the page.
leave ept alone
for “filename” click the text box and browse to your LiME image
leave pagefile alone
for “profile” click the text box and browse to your json file
now you are set to start running plugins on the image
to exit this screen click the grey background which surrounds the manage templates screen, it will go back to the main
screen and you will now click the “Cell” button
a popup will be shown with options, select “Rekall Plugin”

*note that after using rekall for the first time the directory you created for the worksheets is populated with data files,
and if you start the rekall gui again without rm’ing the files in that directory you will have gui problems*

now on your screen you will see a green checkmark with the word plugin next to it.
below this the plugins are listed, so scroll down to the one you want to test and click on it once.
now you will she it shows more options (which most are optional) and at this point you want to
click the little green check box at the very top of the screen
it will load the plugin and create an output box on close to the middle of the screen
this box has the output for the plugin.
sometimes it can take a while to populate the output in this box

to make reading the output of the plugin a bit easier click the two little arrows (the ones going diagonally not just up and down) button
which is located at the very top of the plugins output box close to “default session”
this will resize the output box.

and that is about it!

for more plugins to be loaded repeat the procedure above and they will be added to the screen.
have fun using rekall!

How to simulate the appearance of a black hole.

I read today Jeff Steinhauer has created an artificial black hole.

I figured I would disclose my version of simulating a black hole. It is quite simple really you simply irradiate something (like a wall, etc) with gamma radiation at the wavelength required and the “circle” of matter which is being irradiated no longer gives off visible light and appears to look like a black hole. This is not to say that you could not also create an actual black hole by taking an object, converting it to antimatter, and changing the photon density of the antimatter object using gamma radiation so it is at the point where light is absorbed but not emitted as visible light. This object would be a more permanent black hole simulation because the cute little LED version above ends the second it is no longer being irradiated.

I know for a fact that the first version works as I have seen in in person. The second has to do with a theory of mine about black hols, what they are made of, and how to create such an entity.

I mailed Jeff today regarding some of my physics work on this website to get his opinion.