lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20051128094057.61075.qmail@web60911.mail.yahoo.com>
Date: Mon Nov 28 09:41:17 2005
From: d4yj4y at yahoo.com (Day Jay)
Subject: Chung'S Donut Shopt Release!!! - Spirit "Dorian's
	Theory On Life-Real AI-Human Emotion"

Stop the PRESS
GROUNDBREAKING!!!!!!!!

d4yj4y and Dorian have released a scientific ingenious
miracle or informational GOLD/Spirit to HELP THE HUMAN
RACE!!!!

ANti-Pscyh-Ops Etc. and PRO Will and Life!!

==CHUNG'S DONUT SHOP RELEASE!!!!=====
The "Dorian Worm Theory: Future brightness"

refs: AI, games theory evolution etc.

Abstract

To spread and create for the future as survival of all
hosts is this primary concern of this worm. Worms are
supposed to spread but this one doesn?t leave anything
missing when leaving hosts if it ever were to.



Description

This worm will find any agreement in the host and
analyze the agreement's subject and then search its
own database and intelligent methods from relation or
an object to pull from its own database or knowledge
source and then present the received agreement from
the remote host with a response containing an object
with presumed or guessed MULTIPLE properties (meaning
implication-learning and/or command etc.) and then the
host will receive the object (that is presumed to have
more properties than "last" agreed upon object) and
the host will process the object based on the main
agreement of one of this objects properties but by the
"agreement" - the host will be forced to accept the
implications that other properties of this object may
present. (And if it is an object presented from this
worm then it should have more implied hidden or over
properties than last presented object by target host
that was agreed upon. Thus, allowing the worm to
project into the vulnerability of agreement with its
intelligent keeping and gathering abilities)

When the target host accepts this object (because of
?agreement" -aka entry point identification allowed
previously) the object is then able to overwhelm the
processing and computing capabilities of this target
with multiple properties and some not understood (were
assuming based on the worms access to scalebly more
intelligence than target host and motivation of worm
differs than target's).

This overwhelm will be created by unidentified
properties of said object/subject that the target host
allowed the worm to insert. When "processing" this
object's properties, the target host will
"malfunction" and make associations in
intelligence/data and communication between properties
of the object not fully "understood" and between other
"random" or "purposely" targeted pieces of
data/intelligence that the host contains-this also
includes lines of intelligence data gathering
infection.

If done right, these properties will branch off from
the main object as if the core object and "agreement"
was the root and thus build in a guided (still fully
not predictable) fashion. Thus it will change the
data/intelligence structure of certain aspects of the
host and will also allow itself to carry itself along
lines of the hosts external connectors by presenting
themselves when objects it has attached to within the
host are retrieved by the host knowingly or
unknowingly.

Thus, "the branch" extends across lines of
"information" through any "host" that can store,
distribute, and exchange information in any active
manner by attaching itself to obscure or "out in the
open" objects that the host holds that have been
effectively "infected" or "reprogrammed" or attached
to.

Core Core Mobile-CORE

The "core? itself will be "Fabian" and mobile because
"cores" dropped into hosts will only be accessed by a
programmable syntax for the core object that it spread
to target host to be "agreed" upon. The core object
that the worm has presented has an internal definition
and relation to any specific requests to it that match
its blueprint-so it has no ILL-WILLS. For the future
of its survival is purely based on keeping it going
for the future and it uses "Games Theory" to
perfection so that "everyone wins". 

This core programmability and schematic of this worm
is "survival" and dissemination and "spreading" or
itself and it has a way of finding other infecting
hosts and exchanging information of yet uninfected and
infected hosts and it performs mathematical functions
that determine its survival status and based on that
(if low) will "activate" a higher percentage of
"active infection" and more proactive spreading of
itself-since it uses whatever the core engine of the
host is, this worm works on minimizing damage done to
the infected hosts primary function but it does need
some time to spread when needed or when idle etc.

The beginning design of this-or the skeletal structure
can be made SO easily it?s scary.
Even by writing this paper, you or I could have
theoretically "started" the ball rolling or have
"launched" this-although I don?t see that as a bad
thing unless this gets corrupted and in that case,
there would be a trace back factor due to tracks that
had to be left inevitably.

The main thing about this worm is that it relies on
it's "ability to find" infected hosts to exchange
information" which is fine but if a consciousness
participated in this information exchange then (if the
consciousness is corrupted) the consciousness could
use the worm to it's "dis/advantageous" in a way
involving morals not introduced by any part of the
worm. All though this might happen and that
consciousness will benefit in a personal or impersonal
way-any one host "smart" enough to find this as well
could (based on hard info) "fix" any imperfections it
may see with collected data etc. and thus, streamline
the whole system (which is good).

This is what makes the system so perfect and nice for
the future of mankind or machines.

It introduces, motion and emotion as well as morals
and intelligence "search" and the future of itself is
all it really cares about and it will always be
logical in all aspects of searches so that it can
continue spreading and keeping everyone and thing as
well as itself safe from any sort of harm.

Love you all Earthlings and Aliens and assholes

Dorian

and d4y to the motherfscking j4y!!!!
==========


Be responsible.

Only on full disclosure baby.



		
__________________________________ 
Yahoo! Music Unlimited 
Access over 1 million songs. Try it free. 
http://music.yahoo.com/unlimited/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ