Cirus The Bandit

pm

Based on Arkon Daraul : A History of the Secret Societies

>In the early nineteenth century, Southern Italy suffered greatly from the raids of small gangs of bandits who would descend from their hideouts in the mountains of Calabria and Abruzzi to rob travelers and to loot the villages. The authorities seemed unable to squelch the bands of thieves and protect the people, and only the vendettas and feuds between gangs themselves prevented the outlaws from uniting as one force to wreak greater havoc. Then, in 1816, a man named Ciro Annichiarico (d. 1818) became southern Italy’s greatest nightmare when he claimed the power of Jupiter, father of the gods of Imperial Rome, and successfully brought the bandit gangs into a single striking force, leading them to rob, pillage, and burn under the banner of the skull and crossbones and the motto, “Sadness, Death, Terror, and Mourning.”

Continue reading “Cirus The Bandit”

Chrysalis

>Absolutely riveting and superb movie . Bring up the Mind Uploading theory and implication with an original action movie by unpredictable final results .
The French Production made a brilliant job , and worldwide others cyberpunk producers may learn from them !
We already faced this genre and this theory in Brain Source Code .

Continue reading “Chrysalis”

BERNAYS PROPAGANDA

A book by Edward Bernays

propaganda

Bernays Propaganda

[..]The extent to which propaganda shapes
the progress of affairs about us may surprise even well
informed persons.
Nevertheless, it is only necessary
to look under the surface of the newspaper for
a hint as to propaganda’s authority over public opinion. […]

Continue reading “BERNAYS PROPAGANDA”

The Legend of Ragnarok

ragnarok

The Legend of Ragnarok

>It was created by Scandinavians over 1500 years ago.
Basics of Hnefa-tafl (required for playing).
There are two sides in the original game (hnefa-tafl – king’s table): attacking and defending. The defending side starts in the center of the board, and the attackers in the middle of each of the four edges of the gameboard. The two sides have different goals.
The units in the game are able to move vertically or horizontally for an unlimited number of spaces on the board, with the exception of the “king” who is able to move only two squares, again, vertically or horizontally, per turn. The “eating” of the units takes place when a player in his/her turn moves his own unit so that it traps an opponent’s unit between two units of his/her own. Note that a unit may move to a spot between two of his opponent’s units without being eaten.

Continue reading “The Legend of Ragnarok”

IRC MORE POWERFUL THAN EVER

irking

IRC MORE POWERFUL THAN EVER

>IRC can be used with proxy settings , therefore you can use TOR Network ,

CAN YOU IN FACEBOOK ?

In IRC you can have in same room 250 people talking , watching , reading , spreading ,

CAN YOU IN FACEBOOK ?

Continue reading “IRC MORE POWERFUL THAN EVER”

DATEL ACTION REPLAY MK3 MK6

Action Replay is the brand name of a series of devices created

by Datel Electronics ,

primarily used for changing the behavior of video games ,

but also for other kind of services .

Typical features

General:

  • Infinite lives, invulnerability, permanent power ups, no collision detection, walk through walls, one hit kills, super-high jumps, infinite money etc.
  • Obtain any item in the game, even those not normally obtainable (e.g. debug or removed items).
  • Access or warp to any level, even those not normally accessible (e.g. test or unused levels).
  • Activate debug menus, normally used by programmers when testing and debugging a game. Typically options include cheats, level warping and display of internal game data not normally viewable by the player.
  • Download, upload, import and export save games to the Internet or storage device.
  • Save game state to disk, so it can be restarted from that point even if the game does not support saving.
  • Region-free operation.
  • Loading of third party homebrew applications/games, not backup copies of retail games.
  • Commodore 64
    • Action Replay
    • Action Replay MK II
    • Action Replay MK III
    • Action Replay MK IV (1988)
    • Action Replay MK V (1989)
    • Action Replay MK VI
  • Commodore Amiga
    • Action Replay (A500 cart / A2000 CPU card)
    • Action Replay (A1200 card)
    • Action Replay MK II (A500 cart / A2000 CPU card)
    • Action Replay MK III (A500 cart / A2000 CPU card) (1991)

>We’ve reloaded  here some info only about these two versions :

-Mk VI for CBM64 and -Mk III for Amiga 500 .

mk3

>Action Replay MK CBM Reverse Engineering

>ACTION REPLAY AMIGA 500 RESOURCES

>AMIGA 500 ACTION REPLAY MK3 ENCRYPTION :

DISK BASED INSTRUCTIONS 
appear as meaningless characters whereas a file from a word-processor may have 
extra characters which are control codes for text formatting. The path and filename are 
as the DELETE instruction. 

P.ODF (drive) (r.nrie nnmher) 

This is another rather complex encryption tool that to get fully to grips with will take 
some experimentation before you will fully understand it. (drive) is the drive number 0- 
4 and (code number) is a value in the range 0-165535. The easiest way to show you 
how to use this feature is by example. 

CODE03 

will have the effect of en-coding all disk writes to drive so that they can only be read 
in future by setting the drive code to 3. All reads from this drive will also be de-coded 
using this number so normal files will be read as corrupt data. For example the following 


CODE0 
SA TEST 
CODE 3 
LA TEST 

(remove encryption from drive 0) 
(save a frozen file to disk) 
(en-code disk with number 3) 
(re-load the frozen file) 

will load a corrupt file as a different code has been used to load (3) as that used to save 
(none). The instruction 

CODE 
will display all the en-coded drives and an encryption number. Note that this number 
will not be the same as that entered, and whether the drive is protected or not e.g. the 
status after the previous command would be as follows. 

ACTION REPLAY DISK CODER V1 .1 

DRIVEO CODE:00000005 PRO protected 

DRIVE) CODE.00000000 NORMAI 

DISK BASED INSTRUCTIONS 

DRIVE2 CODE:00000000 NORMAL 
DRIVE3 CODE:00000000 NORMAL 
DRIVE4 CODE:00000000 NORMAL 

The code of 5 will always correspond to the entered number 3! This is the same for all 
codes. PLEASE use this feature with care, we would hate you to save your most 
precious files and forget the code number! The Diskcode values can also be viewed 
from F3 preference screen. 

C OnFP,OPY (source) (destination) 

This is used in conjunction with the CODE instruction. It will de-code all data from the 

source drive using the code number then encode all tne data g° in 9 t0 tne destination 
drive using its number. You may use this feature for encoding or de-coding entire disks.

>ENCRYPTION TOOLS FOR AMIGA 500

Continue reading “DATEL ACTION REPLAY MK3 MK6”

Do NOT follow this link or you will be banned from the site!
%d bloggers like this: