DISCLAIMER: PLEASE USE IN GOOD FAITH AND AT YOUR OWN RISK! ELDRITCHDATA cannot warranty the expressions and suggestions of the contents, as well as its accuracy. In addition, to the extent permitted by the law, ELDRITCHDATA shall not be responsible for any losses and/or damages due to the usage of the information on our website. By using ELDRITCHDATA.NEOCITIES.ORG, you hereby consent to our disclaimer and agree to its terms. The links contained on ELDRITCHDATA.NEOCITIES.ORG may lead to external sites, which are provided for convenience only. Any information or statements that appeared in these sites are not sponsored, endorsed, or otherwise approved by ELDRITCHDATA. For these external sites, ELDRITCHDATA cannot be held liable for the availability of, or the content located on or through it. Plus, any losses or damages occurred from using these contents or the internet generally
_,met$$$$$gg. PC:Thinkpad T440P
,g$$$$$$$$$$$$$$$P. DE: GNOME
,g$$P" """Y$$.". WM: MUTTER
,$$P' `$$$. WM THEME: Adwaita
',$$P ,ggs. `$$b: THEME: Adwaita-dark [GTK2/3]
`d$$' ,$P"' . $$$ ICONS: Adwaita [GTK2/3]
$$P d$' , $$P TERMINAL: GNOME-TERMINAL
$$: $$. - ,d$$' BROWSER: GNU-ICECAT / TOR-BROWSER
$$; Y$b._ _,d$P' TE: GNOME-TEXT-EDITOR
Y$$. `.`"Y$$$$P"'
`$$b "-.__
`Y$$
`Y$$.
`$$b.
`Y$$b.
`"Y$b._
`"""
EMAIL: ELDRITCHDATA@TUTA.IO GPG 61A5 4814 A1B0 38FA 2CF1 3039 A3A1 E6E0 F6D0 8834
XMPP: ELDA@YAX.IM | 40B2A542 328533DA 26BB98AF 603D6B24 6EA2BDA6 2944A5D9 C483CFA7 C3B54A4C | 13A8EA5F AC926F76 7AB38F8D 82CD486C 08771BE3 9327F2AA C3B51043 5C200410
COLOR TEMPLATE:
Solarized Dark
PERSONALITY TESTS:
INTJ-A
SimilarMinds
POLITIC TESTS:
6 Triangles
8 Values
Left Values
Political Compass
PolitiScales
Right Values
Sapply Values
Statecraft Compass
PRONOUNS: Elohe / Elohim
RELIGION:
EatenFirst
PUBLISHED | UPDATED | TITLE
2019-01-01 | 2024-07-19 | JOURNAL
COMPLETE GUIDE FOR THE PARANOID USER
2022-02-02 | 2022-02-03 | Additional Linux Hardening
2019-12-21 | 2022-02-03 | An Introduction To BIOS And BIOS Security
2019-11-15 | 2022-02-03 | An Introduction To Doxing Methodology
2020-04-26 | 2022-02-03 | An Introduction To GNU/Linux
2022-02-25 | 2022-02-25 | An Introduction To Ham Radio
2020-01-20 | 2022-02-03 | An Introduction To OSINT
2021-01-08 | 2022-02-03 | An Introduction To PGP
2020-12-16 | 2022-02-03 | An Introduction To The Internet
2019-11-15 | 2022-02-03 | Common Utility Keys
2019-11-15 | 2022-03-04 | EDC
2019-12-21 | 2022-02-03 | Hardware Security
2020-12-16 | 2022-02-03 | Home Phone And Landline Security
2020-12-16 | 2022-02-03 | Home Security
2019-11-15 | 2022-02-03 | How To Disappear
2021-07-19 | 2022-02-03 | Living Off Grid
2019-12-21 | 2022-02-03 | OPSEC And Personal Security
2021-01-14 | 2022-02-03 | Path To Pentester
2020-01-20 | 2022-02-03 | Persistent USB
2019-11-15 | 2022-02-03 | Remove Your Fingerprints
2019-12-21 | 2022-02-03 | Risk Management And The Attack Kill Chain
2019-11-15 | 2022-02-03 | Self Defense
2020-12-16 | 2022-02-03 | Stylometry
2021-11-26 | 2022-02-03 | Tor Threat Modeling
COMPARISON OF SERVICES
2022-01-07 | 2022-02-17 | Comparison Of Emails
2022-01-21 | 2022-02-17 | Comparison Of Web Browsers
DO IT YOURSELF
2021-10-01 | 2022-02-17 | Black Powder
2021-10-03 | 2022-02-17 | Chloroform
2021-12-08 | 2022-02-17 | Make A Smokehouse
2021-07-15 | 2022-02-17 | Making A Budget
2021-10-18 | 2022-02-17 | Making A Still
2021-08-09 | 2022-02-17 | Plarn
2021-09-27 | 2022-02-17 | Soap
2022-12-08 | 2022-12-08 | Terracotta Heater
2021-10-04 | 2022-02-17 | Wine
GNU
2020-01-20 | 2022-02-17 | Arguments Against Ricing
2021-01-14 | 2022-02-17 | Debian Repository
2019-11-15 | 2022-02-17 | Defense Of RMS
2019-11-15 | 2022-02-17 | Distro List
2021-01-14 | 2022-02-17 | GNU Games
2022-01-19 | 2022-02-17 | KDE And Advertisements
2020-01-20 | 2022-02-17 | RE:Freetardism
LIST
2020-01-20 | 2022-02-17 | Anime List
2021-06-08 | 2022-02-17 | Book List
2021-07-27 | 2022-02-17 | Dell Timeline
2019-11-15 | 2022-02-17 | Grocery List
2020-01-20 | 2022-02-17 | Movie List
2020-01-20 | 2022-02-17 | Music List
2019-11-15 | 2022-02-17 | Thinkpad Timeline
MISC
2020-01-20 | 2022-02-17 | Anarchism Schools Of Thought
2021-06-09 | 2022-02-17 | A Primer To Green Anarchism
2019-11-15 | 2022-02-17 | Digest Of Deduction
2021-08-23 | 2022-02-17 | Enuma Elish
2021-10-26 | 2022-02-17 | Happy Birthday Patriot Act
2021-06-29 | 2024-01-05 | NSA ANT
2020-01-20 | 2022-02-17 | OCPD
2020-01-20 | 2022-02-17 | Political Party Problem
2022-01-22 | 2022-02-17 | Positive Nihilism
2020-03-10 | 2022-02-17 | Projekt Melody
2024-07-25 | 2024-07-25 | Safety Razor
2021-08-23 | 2022-02-17 | The Eridu Genesis
2021-08-27 | 2022-02-17 | The Tale Of Spyware Chat
2022-02-04 | 2022-02-17 | Vaporwave - A Different Kind Of Cyberpunk
2019-11-15 | 2022-02-17 | Workout Routine
MTG
2022-06-28 | 2023-01-13 | M-SqueakyJiki
2022-09-15 | 2023-01-13 | M-TronBuddies
2022-06-28 | 2022-10-17 | P-Elves
2022-10-29 | 2022-10-29 | P-Tron
OUT
2022-02-28 | 2022-03-04 | Basic Survival Shelters
2021-07-15 | 2022-02-17 | Firearms Buyers Guide
2022-02-28 | 2022-02-28 | Gunsmith
2021-12-08 | 2022-02-17 | Hardtack
2022-02-25 | 2022-02-25 | Homemade MRE
2022-02-25 | 2022-02-25 | Medicinal Plants
2022-05-06 | 2022-05-06 | My Basic Camping Gear
2019-11-15 | 2022-02-17 | Poisonous Plants
2022-02-27 | 2022-02-27 | Rainwater Collection System
2022-02-28 | 2022-02-28 | Reloading
2021-12-07 | 2022-02-17 | Self Feeding Fire
2021-08-28 | 2022-02-17 | The Old Ones Tobacco
2021-08-31 | 2022-02-17 | Tobacco Pipes I Own
2022-02-25 | 2022-02-25 | Types Of Campfire
STORY
2019-11-15 | 2022-02-17 | Offline
2019-11-15 | 2022-02-17 | Serial Cult
2019-11-15 | 2022-02-17 | Session 1
2019-11-15 | 2022-02-17 | Techno Paganism
COMPUTER SECURITY
AForensicExaminationOfWebBrowserPrivacyModes.pdf
AGraduateCourseInAppliedCryptography.pdf
Anonymity.pdf
AnonymousSecurityHandbook.pdf
BebopToTheBooleanBoogie.pdf
CompSecIncidentHandling.pdf
COPInfoSecManagement.pdf
Crypto101.pdf
CyberThreatsToMobilePhones.pdf
DNMv2.pdf
CryptoParty.pdf
HackingTheFuture.pdf
HashCrackPasswordCrackingManual.pdf
HugoCornwallTheHackersHandbook.pdf
ISOIEC270012013.pdf
KaliLinux.pdf
KaliLinuxForAdvancedPenetrationTesting.pdf
KaliLinuxWirelessPenetrationTestingBeginnersGuide2015.pdf
OReillyNetworkWarrior.pdf
PrivacyForIdentities.pdf
RE4B.pdf
RedTeamFieldManual.pdf
SecAndCounterSurveillance.pdf
SecManagmentSystemsReq.pdf
SecuringOnlinePersonas.pdf
TheHackerPlaybook.pdf
TheHackerPlaybook2.pdf
TheHitchhikersGuideToOnlineAnonymity.pdf
TheSecretOfSafePrivacy2016.pdf
TorAndTheDarkArtOfAnonymity.pdf
WebBrowserPrivacyWhatDoBrowsersSayWhenTheyPhoneHome.pdf
LOCK PICKING
BnE.pdf
BurglarAlarms.pdf
CIALockPicking.pdf
CompleteGuideToLockpicking.pdf
Handcuffs.pdf
KeyBlanks.pdf
Keys.pdf
LSIGuide.pdf
MakingLockTools.pdf
OptDecode.pdf
Padlocks.pdf
PracticalLockpicking.pdf
SafecrackingComputerScientist.pdf
SecretsOfLockPicking.pdf
TechniquesOfSafecracking.pdf
ThisKeyIsYourKey.pdf
UsingALockPickGun.pdf
SOCIAL ENGINEERING
ColdReading.pdf
GovernmentAttic.pdf
HowToReadAPersonLikeABook.pdf
TLBBS.pdf
THE RAINBOW SERIES
5200-28-STD-Orange.txt
CSC-STD-002-85-Green.txt
CSC-STD-003-85-LightYellow.txt
CSC-STD-004-85-Yellow.txt
NCSC-TG-001-Tan.txt
NCSC-TG-002-BrightBlue.txt
NCSC-TG-003-NeonOrange.txt
NCSC-TG-004-TealGreen.txt
NCSC-TG-005-Red.txt
NCSC-TG-006-Amber.txt
NCSC-TG-007-Burgundy.pdf
NCSC-TG-008-DarkLavender.txt
NCSC-TG-009-VeniceBlue.pdf
NCSC-TG-010-Aqua.pdf
NCSC-TG-011-Red.html
NCSC-TG-013-Pink.pdf
NCSC-TG-013-V2-Pink.pdf
NCSC-TG-014-Purple.txt
NCSC-TG-015-Brown.txt
NCSC-TG-016-YellowGreen.html
NCSC-TG-017-LightBlue.html
NCSC-TG-018-LightBlue.html
NCSC-TG-019-Blue.txt
NCSC-TG-020-A-GreySilver.html
NCSC-TG-020-Silver.pdf
NCSC-TG-021-Purple.html
NCSC-TG-022-Yellow.html
NCSC-TG-023-BrightOrange.pdf
NCSC-TG-024-V1-Purple.pdf
NCSC-TG-024-V2-Purple.pdf
NCSC-TG-024-V3-Purple.pdf
NCSC-TG-025-ForrestGreen.html
NCSC-TG-026-HotPeach.pdf
NCSC-TG-027-Turquoise.html
NCSC-TG-028-Violet.pdf
NCSC-TG-029-Blue.pdf
NCSC-TG-029-LightPink.html
UNSORTED
100WaysToDissappear.pdf
AndroidPrivacyReport.pdf
ArrestProofYourself.pdf
ASimpleApproximationToTheEloChessRatingsFormula.pdf
BeatingTheFBI.pdf
CathedralBazaar.pdf
GOV-USCOURTS-NYSD-564903-152-01.pdf
GuideToBuildingACopperCoilAlcoholHeater.pdf
HowToFixAbsolutelyAnythingAHomeownersGuide.pdf
HowToSpotASpook.pdf
ImprovisedMunitionsHandbook.pdf
MichaelBazzellExtremePrivacy2020.pdf
IndustrialSocietyAndItsFuture.pdf
NoveltyOfAnOverloadedTransformer.pdf
PatriotAct.pdf
PracticalGunsmithing.pdf
SICP-TheWizardBook.pdf
SSN.pdf
TheAnarchistCookbook.pdf
TheCompleteManualOfPirateRadio.pdf
TheCompleteVisualGuideToBuildingAHouse.pdf
TheDiaboliconMichaelAquino.pdf
TheEncyclopediaOfAncientAndForbiddenKnowledge.pdf
TheEncyclopediaOfWitchesWitchcraftAndWicca.pdf
TheLostWays.pdf
ThePreparatoryManualOfExplosives.pdf
ThePrepperSurvivalBible.pdf
TheSurvivalDoctorsCompleteHandbookWhatToDoWhenHelpIsNotOnTheWay.pdf
UncleFesterSecretsOfMethamphetamineManufacture8thED.pdf
WithoutATrace.pdf
UNSORTED HTML
xplunder.html
INFOGRAPHICS
BLUF.png
CartridgeTrap.jpg
CupricThermiteFirebomb.jpg
DIYThermite.jpg
HomemadeAntipersonel.jpg
HomemadeMolotovCocktails.png
HomeSuppressor.jpg
MorseCodeVisualGuide.jpg
PartOfIED.jpg
PhoneticAlphabet.jpg
SanPedroMescaline.jpg
SmokeGrenade.jpg
TacHandSigns.png
TrenchBunk.jpg
WaterBleachRatio.jpg
Awesome
Awesome Open Source
Awesome Hacking
Awesome Info-Sec
Awesome Web Security
Awesome Social Engineering
Awesome Cellular Hacking
Wordlist Collections
1337z/wordlists
abdilahrf/FavHash
c4b3rw0lf/wordlist-collection
chanmratekoko/Awesome-Myanmar-Wordlists-Dictionary-Collection
ChongPang19419/wordlists-for-something
kennyn510/wpa2-wordlists
kkrypt0nn/Wordlists
ohmybahgosh/RockYou2021.txt
Weakpass
OTHER SITES: Interesting Reads and Sources
2FA Directory
Archive Heemeyer Tapes
Army Field Manuals
cheatsheetseries.owasp.org
Covert Instruments
Ctrl+Pew
Defcad Firearms
Distro Watch
Firefox Profile Maker
No Systemd
Scambaiting Tools
Snopyta
Anti-National Copypasta
动态网自由门 天安門 天安门 法輪功 李洪志 Free Tibet 六四天安門事件 The Tiananmen Square protests of 1989 天安門大屠殺 The Tiananmen Square Massacre 反右派鬥爭 The Anti-Rightist Struggle 大躍進政策 The Great Leap Forward 文化大革命 The Great Proletarian Cultural Revolution 人權 Human Rights 民運 Democratization 自由 Freedom 獨立 Independence 多黨制 Multi-party system 台灣 臺灣 Taiwan Formosa 中華民國 Republic of China 西藏 土伯特 唐古特 Tibet 達賴喇嘛 Dalai Lama 法輪功 Falun Dafa 新疆維吾爾自治區 The Xinjiang Uyghur Autonomous Region 諾貝爾和平獎 Nobel Peace Prize 劉暁波 Liu Xiaobo 民主 言論 思想 反共 反革命 抗議 運動 騷亂 暴亂 騷擾 擾亂 抗暴 平反 維權 示威游行 李洪志 法輪大法 大法弟子 強制斷種 強制堕胎 民族淨化 人體實驗 肅清 胡耀邦 趙紫陽 魏京生 王丹 還政於民 和平演變 激流中國 北京之春 大紀元時報 九評論共産黨 獨裁 專制 壓制 統一 監視 鎮壓 迫害 侵略 掠奪 破壞 拷問 屠殺 活摘器官 誘拐 買賣人口 遊進 走私 毒品 賣淫 春畫 賭博 六合彩 天安門 天安门 法輪功 李洪志 Winnie the Pooh 劉曉波动态网自由门
War on Terror Patriot Act PRISM Edward Snowden Guantanamo Bay CIA black sites Human Rights NSA mass surveillance Warrantless Wiretapping 4th Amendment violations Julian Assange whistle-blower manhunt Ecuadorian embassy refuge Corporate interests worker's rights healthcare rights free education Police militarization incarceration rate fake weapons of mass destruction Petrodollar warfare Israel "special" relationship ban on boycott Free Palestine USS Liberty attack Mossad cover up false anti-semitism accusations depleted uranium mutinions war crime ignoring the Geneva Convention Agent Orange My Lai Massacre Contras 1973 Chile coup CIA backing puppet dictators Illegal Occupation 1954 Guatemalan coup d'état United Fruit Company Cuban Missile Crisis Bay of Pigs Operation Northwoods Area51 Saudi lobby American Cover-Up of Trials of Unit 731 Abu Ghraib torture and prisoner abuse MKUltra Tuskegee syphilis experiment Suspension of Habeas Corpus Sedition Acts civil rights Martin Luther King murder Cointelpro Bombing of Libya Bombing of Yemen Bombing of Syria Intervention in Yugoslavia Philippine Genocide of 1900 Choctaw Trail of Tears Andrew Jackson illegal Overthrow of the Kingdom of Hawaii haole invasion Okinawa rapes Jarhead rapists migrant caravan ICE children in cages Russian puppet president
Free Palestine שחררו את פלסטין US-Israeli Collusion קנוניה אמריקאית-ישראלית Julian Assange ג'וליאן אסאנג ' The Five Eyes חמש עיניים Moazzam Begg מועם בג Iran Air Flight 655 איראן טיסה אווירית 655 NSA Spying Scandal שערורייה Johnny Garrett ג'וני גארט PRISM פריזמה Idefinite Detention מעצר בלתי מוגבל Shaker Aamer שאכר Guantanamo Bay מפרץ גואנטנמו Shooting of Philando Castile ירי של פילנדו קסטיליה Safiq Rasool שליח עליז Tuskegee syphilis experiment ניסוי טוסקגיי עגבת Child Hormone Replacement Therapy With Penectomy טיפול הורמונלי של הילד עם טיפול בכריתת רחם Edward Snowdenל בכריתת רחם Edward Snowden
不名誉なプログラムシステムディー Delete Any Files CVE-2012-1174 コンピューターが破壊された 0-Day ゼロデイ Root Exploit CVE-2017-1000082 コンピュータを好きなように実行させます systemd-resolvd Remote Code Execution CVE-2017-15908 サービス拒否 Denial of Service CVE-2017-9217 バッファオーバーフロー Buffer Overflow CVE-2015-7510 CVE-2018-15688 Arbitrary State Insertion 状態注入 Root Privilege Elevation CVE-2018-15686 10.0 ルートアカウントの不適切なアクセス Root Privilege Elevation Again 特権の昇格 CVE-2020-13776 カーネルパニック Kernel Panic CVE-2019-6454 Arbitrary Code Execution 任意のコードの実行 CVE-2020-1712
フラットモニターが悪いOLED motion blur彼らはあなたに嘘をついています1ms GtG means 20ms現代のモニターは吸うDP2070SB 300cd2詐欺を監視するSample and hold menace企業の嘘RDF225WG AdobeRGB CRTモーションブラー2160p CRTs表面伝導型電子放出素子ディスプレイSurface-conduction electron-emitter displayネイティブシャープネスでの任意の解像度Any resolution at native sharpnessリフレッシュレートはうそですVMP454 420hz CRT液晶ディスプレイは吸うDLSS a solution to a problem CRTs did not have背の高いアスペクト比の方が優れていますGDM-FW900 16:10私は液晶ディスプレイが嫌いですMonitors don't whineモニターは泣き言を言わないSelf-emissive放出性IPS hazeヘイズLCDs still look worse than Trinitronsトリニトロンベスト$3000 Eizo IPS glow無限のコントラストCRT infinite contrastサンプリングして保持する360hz LCD looks worse than 60hz CRT視野角Viewing anglesななひら大好き
THE SACRED CHANT
What you're referring to as Linux, is in fact, GNU/Linux, or as I've recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX. Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called "Linux", and many of its users are not aware that it is basically the GNU system, developed by the GNU Project. There really is a Linux, and these people are using it, but it is just a part of the system they use. Linux is the kernel: the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called "Linux" distributions are really distributions of GNU/Linux. - Richard Stallman
I AM MAD AS HELL
I don’t have to tell you things are bad. Everybody knows things are bad. It’s a depression. Everybody’s out of work or scared of losing their job. The dollar buys a nickel’s worth. Banks are going bust. Shopkeepers keep a gun under the counter. Punks are running wild in the street and there’s nobody anywhere who seems to know what to do, and there’s no end to it. We know the air is unfit to breathe and our food is unfit to eat, and we sit watching our TVs while some local newscaster tells us that today we had fifteen homicides and sixty-three violent crimes, as if that’s the way it’s supposed to be.
We know things are bad – worse than bad. They’re crazy. It’s like everything everywhere is going crazy, so we don’t go out anymore. We sit in the house, and slowly the world we are living in is getting smaller, and all we say is: ‘Please, at least leave us alone in our living rooms. Let me have my toaster and my TV and my steel-belted radials and I won’t say anything. Just leave us alone.’
Well, I’m not gonna leave you alone. I want you to get MAD! I don’t want you to protest. I don’t want you to riot – I don’t want you to write to your congressman, because I wouldn’t know what to tell you to write. I don’t know what to do about the depression and the inflation and the Russians and the crime in the street. All I know is that first you’ve got to get mad. (shouting) You’ve got to say: ‘I’m a human being, god-dammit! My life has value!’
So, I want you to get up now. I want all of you to get up out of your chairs. I want you to get up right now and go to the window. Open it, and stick your head out, and yell: ‘I’m as mad as hell, and I’m not gonna take this anymore!’
I want you to get up right now. Sit up. Go to your windows. Open them and stick your head out and yell – ‘I’m as mad as hell and I’m not gonna take this anymore!’ Things have got to change. But first, you’ve gotta get mad!… You’ve got to say, ‘I’m as mad as hell, and I’m not gonna take this anymore!’ Then we’ll figure out what to do about the depression and the inflation and the oil crisis. But first, get up out of your chairs, open the window, stick your head out, and yell, and say it: ‘I’m as mad as hell, and I’m not gonna take this anymore!’ - Howard Beale, Network
HELL IS OTHER PEOPLE
All those eyes intent on me. Devouring me. What? Only two of you? I thought there were more; many more. So this is hell. I’d never have believed it. You remember all we were told about the torture-chambers, the fire and brimstone, the “burning marl.” Old wives’ tales! There’s no need for red-hot pokers. HELL IS OTHER PEOPLE! - Joseph Garcin, No Exit
Terry Davis
I live in kind of an old environment. I just...I go to dentists and doctors, my parents go to dentists and doctors. That's all we do. We watch TV, they go to the casino. I've been fighting...to bring it to fruition. But I'm in some kind of prison or something. So basically now I just kinda kill time. But I'm God's High Priest, so there's nothing better to do with your time than kill time with Mr. God and enjoy divine intellect all day long.
I think teeth are the first reminder of mortality. I think that's where it begins to hit ya. Cus they don't come back and that's it.
What’s reality? I don’t know. When my bird was looking at my computer monitor I thought, ‘That bird has no idea what he’s looking at.’ And yet what does the bird do? Does he panic? No, he can’t really panic, he just does the best he can. Is he able to live in a world where he’s so ignorant? Well, he doesn’t really have a choice. The bird is okay even though he doesn’t understand the world. You’re that bird looking at the monitor, and you’re thinking to yourself, ‘I can figure this out.’ Maybe you have some bird ideas. Maybe that’s the best you can do.
The most powerful statement in the C language in the C language is the switch statement [...] The CIA wants you to think it's nothing more than IF-THEN-ELSE. The CIA wants you to think it's the same as IF-ELSE; it's not. The way a switch statement works is there's a lookup table in it. What it does is [that] it looks up in the table and then it jumps ahead to a segment of code, and then the code jumps to the bottom, to a common location, to continue.
The most important thing in programming is naming.
In TempleOS, my compiler will put together multiple characters in a character constant. We don't do Unicode. We do ASCII--8-bit ASCII, not 7-bit ASCII; 7-bit signed ASCII is retarded.
IRA is like the NRA, but for computers. The CIA wants all code in the cloud under their lock and key. They want to ban compilers and make people think HTML is computer programming.
Jesus said I will rebuild this temple in three days. I could make a compiler in 3 days.
If you guys have ideas for things to do, let me know. I probably will ignore them.
I report to God. You report to me.
Stallman, Linux could use an oracle program. Use a high speed timer as a stopwatch for nums to pick words or passages.
I wrote a fucken compiler. Linus has not finished his compiler yet and suffers humiliation from Stallman.
NRA SLOGANS
Guns don’t kill people. It’s impossible to be killed by a gun. We are all invincible to bullets and it’s a miracle.
Guns don't kill people. We are all immortal souls living temporarily in shelters of earth and meat.
Guns don't kill people. People kill guns.
A list of things that can kill people:
Conceivably anything
Not guns
If you say guns kill people one more time, I will shoot you with a gun, and you will, coincidentally, die.
Guns don't kill people. Blood loss and organ damage do.
MISC QUOTES
Be the eldritch deity you want to see in the world
Birth is a curse, and existence is a prison
In effect, we conjure the spirits of the computer with our spells
Minimize what you share; Minimize your attack surface; Minimize your identity
The internet is a cruel and horrible place
Buy a thinkpad x230 and install heads. Write protect the flash chip. Put nail polish on the screws and take high resolution pictures to ensure signs of tampering. Do NOT use a HDD or SSD. They have DMA so a malicious firmware could do a lot of damage, use of USB is preferred since they do not have DMA. Completely remove the microphone, sound card, webcam and the WWAN card from the laptop. Remove the fan to prevent binary acoustic data transmission. Replace the default wifi card with a supported atheros card. Disable wifi when not in use, preferably by physically removing the card. Make your own independent Linux distro from scratch. Most Linux distros value convenience over security and will thus never have good security. Your only option is to make your own. Use musl instead of glibc, Libressl instead of openssl, sinit instead of systemd, oksh instead of bash, toybox instead of gnu coreutils to reduce attack surface. Enable as little kernel modules as possible. Use a hardened memory allocator. Apply strong SELinux and sandboxing policies. Restrict the root account heavily to make sure it never gets compromised. Disable JavaScript and CSS in your browser. Block all FAGMAN domains in your hosts file. Monitor all network requests. Do not use a phone. Never speak near anyone who owns a phone, they are always listening. Never use any non-corebooted technology made after 2006. Never leave your devices unattended. Tape triple layer aluminum foil all around your room as tempest shielding. Type really quietly as defense against audio keylogging. Use ecc ram to minimize rowhammer and rambleed. Encrypt everything multiple times with various different encryption implementations. Compile everything from source. Use hardened compilation flags. Always read through the source before installing something if possible. Only use the internet when absolutely necessary.