WARning
Do not attempt 
or recreate or modified deviations from within 
 Nefarious T.E.C.A.
"Theoretically Exploitation Computationally Algorithms"

 

T.E.C.A. Machine "M.D.K."

 & Viral Frankenstein code/syntax 

   

     Because of what they are..., these are by definition only, not an explanation or how too.  They were built on standalone discarded computers for experimental research only.  I will never explain further or recreate.


So "let it go, Elsa"!

So for the record... T.E.C.A.

Infections experimentation in code:





1.   ZDAE/L   -  A comprehensive  "Zero Day Armageddon Equation/Loop", with a choice of expression as an     

       expression "A" or  "B"


         A. Binary number expressed as "0" (zero).  Completely elimination of subjecting reaction from binary code. A definite for infinitely inevitability denouement.  Conclusion: KIA. No countermeasures


         B. Binary number expressed as "1" (one).  A segregation sectional section, from a binary singularity elimination, forces a limitation for a "singular variation" equation.  Conclusion: KIA. No countermeasures



2.     SICIEE   -  "Sectional inflectional codec modifying encryption executable"

        Conclusion: KIA. No countermeasures


   

3.   CSEEP-A   -  "Computationally singularity  Équation elimination polarity Algorithm"

       Conclusion: KIA. No countermeasures



4. FMCAFA - "Force Modulation to Coercion Acquisition of Frequency Attacks"

     Conclusion: KIA. No countermeasures 


Wanton boys...

 I creating experimental & research malware,

from curiosity and for a personal challenge

NOTE: 


Everything was created on standalone, unconnected terminals

 

  1. Everything was done legally, for TOADD experimentation only, not for intent, future exploits or eCommerce destruction.
  2. No EU or international laws were every broken while performing research. 
  3. I intentionally 'allowed' the NSA 's server(s)- on Oahu  and others to search, filter, ping servers, to collect "Digital Fingerprints", read my I/O traffic, tier my IP traffic (DFs & associated devices/mac) to further inspection and monitoring.
  4. I also allowed foreign governments, like GCHQ, MSS, and others... to gain access to a specific servers
  5. Notwithstanding reciprocity, this also allowed me to see their actions, reactions, algorithms, Standard Operating Procedures-SOP, and revolving insights.


Once again, that's totally legal. :)
Just a Jolly Good time, Chaps


Jolly good

:)

Soap Box:  

Race to first...

    Technology moves at such an impetuous murderous rate of corrigendum, versus the speed at which the laws are made to help “protect the innocent”; the Laws are actually inconceivable obsolete(!), by the time they are pressed into actions; which they inevitably crumble under their definition of the law.    

...End of Lecture...

Side-NOte: 

    The Internet might have been the conceptually authority of the Military,  from it's possession-at the start. But this modern inter-connectivity though associations (from here within that individuals and organization have cultivate a web of inter-connectiveness coexistence) that now spans beyond anyone's authoritarian agency, government, country; to rule as sole Dominion. 


     So governmental laws can only be applied to the "local user" interactions. By entering a foreign IP or server, the legal precedence changes with the laws of the new local address.


    By-the-way.... if caught... Breaking the laws in China, Russia, etc, while physically in US, theoretically... they can list you on an International "Terrorist, activist, hacker watch list", or band from flying or entering a country or you might be extradited to an agreeing country...  Like Snowden. 


So tread lightly on your computer...

"Think, before you Click"

:/


...End of Line