INFORMEXP.COM

INDEX


MIXED THREATS Chapter 3 WHO OR WHAT IS SAN

MIXED THREATS Chapter 3  WHO OR WHAT IS SAN? IS THE WORM AUTHOR CONSTANTLY CREATING DIVERSIONS (PERHAPS TO COVERUP DECEIPTIONS AND DECEIT?), MIXING THREATS AND ISSUES? DOES THE WORM AUTHOR HAVE A BIG AGENDA WITH MANY RATIONALIZATIONS FOR HIS CRIMINAL ACTIVITY AND ATTEMPT TO RATIONALIZE THAT HIS ACTIVITIES ARE NOT CRIMINAL BUT JUSTIFIED AND SANE?  HOWEVER, DOES IT REALLY SEEM THAT HIS MOTIVES ARE PERSONAL, ECONOMIC, POLITICAL,  DANGEROUS AND DESPERATE?

“…LOVE YOU SAN!!”

“NeverEverNoSanity”

"andy; I'm just doing my k[ill?] job”

 

THE INVISIBLE HAND OF EVIL:

"I'm trying to imagine some better answers, to break the spell and free them from the stone."

"Jini"

"just jam"

"Java"

"his toddler daughter, a Wizard of Oz junkie"

"The Homebrew Computer Club"

"Odin alias Anon"

beastie.com”

$666.66”

"Sun is a hardware company leading a pack of children”

 

There have been a series of arsons, and possible sabotage to the grid and/or unusual backouts (Midwest, USA) around the time certain computer worms were active or power outages at critical times (San Francisco, California) or and/or denial of service caused by various threats, even bomb threats (especially at the San Francisco Seybold and Oracle World), AND MANY, MANY WORMS, TROJANS, VIRUS, which WHEN COMBINED MAY BE CALLED BLENDED THREATS; MIXED THREATS MAY BE A COMBINATION OF ALL TYPES OF CRIME, COMPUTER AND NONCOMPUTER CRIME. These crimes may suggest that a group is at work perhaps similar in their motivations as the characters in the movie “Fight Club”.  In fact, a real “Fight Club” exists in Silicon Valley, and it is known due to emergency room admissions; the web site infiltration.org exists, which boasts it is “the zine about going places you are not supposed to go” (“Infiltration offers a mix of the practice and theory of urban exploration in areas not designed for public usage.”)

 

A wide variety of crimes seemed to be increasing in Silicon valley and may be related to the computer industry, the most obvious crimes in the computer industry were likely the viruses; The June 29, 1990 date of the L E P R O S Y   1 . 0 0  Virus predates the anti-trust lawsuit between Microsoft and Sun Microsystems;  Federal Trade Commission begins investigating Microsoft's "tie-in" sales of applications and operating systems in 1990; The Department of Justice (DoJ) took over investigation in 1993.

 

L E P R O S Y   is the name of a destructive system. L E P R O S Y   1 . 0 0, A Virus for MS-DOS Systems, was likely one of the first major viruses to target MS-DOS Systems and likely was created by an industry competitor for financial motives and outrageous malice in this author’s opinion and form there it might be easy to decide who likely had the biggest motive to create the virus and a large part of the L E P R O S Y   1 . 0 author’s comments are shown below: 

L E P R O S Y   1 . 0 0

 

A Virus for MS-DOS Systems.

Copy-ya-right (c) June 29, 1990 by PCM2

 

GENERAL SUMMARY

 ~~~~~~~~~~~~~~~  

 LEPROSY is  a  virus  which  can  influence  PC and PC clone  systems  running  MS-DOS  or PC-DOS version 2.0 or later.  It may  be  characterized  as  an overwriting, non-resident .COM and .EXE  infecting  virus,  similar  in  operation  to  the  AIDS Virus by Doctor  Dissector  and  CPI; in fact, the AIDS Virus was actually         the  inspiration  for this program, though Leprosy is in no way a  re-write  or  mod  of  the  AIDS  Virus,  it  is  an entirely new  program. 

 

The way  both  Leprosy  and  the AIDS Virus (and Number One,  the  ancestor of AIDS) work is fairly simple.  Upon executing the virus  program,  the  virus  runs  a  search for executable files  which  it  can  affect.  It does this by doing a general scan for all  files with a .COM or .EXE extension, then, having found such a  file,  it loads in part of that file's code to compare it with the  virus'  own code, to make sure the file found hasn't already       been  infected.  If it hasn't, the virus proceeds to write itself OVER  the code of the executable file found.  The executable file now   ceases   to   perform  its  original  function.   When  the  unsuspecing  user  runs  the  file,  he  will  instead be running another   copy   of  the  virus,  which  will  seek  out  another executable  file  to  infect,  and  so  on.  The executable files which  are  infected  by the virus in this manner are permanently         destroyed.   While  this is a primitive way to spread a virus, it is  actually  pretty  effective, if you consider that by the time the  user  discovers a file which has been infected by the virus, it  has  already  gone and zapped one or more other files, and by the  time  the  user finds those files, they will have infected a  few  more,  and  on until the user figures out some way to detect and eradicate all the infected files.   

 

While Leprosy  is similar in operation to the AIDS Virus, it  presents several important advantages over AIDS:

 

        1.  CARRIERS:   The  AIDS  Virus  will  only  infect  .COM files.  Leprosy  is  not  limited  in  this way; it will infect both .COM files and the more common .EXE files, going for .EXE files first.

 

        2.  FILE SIZE:  The AIDS Virus is written in Pascal, and is about 13K  in  size.   Considering that any file that is infected which  was  originally  smaller than the virus itself will expand to the  size  of  the virus when it is infected, and that many .COM files  will  be  smaller  than  13K,  quite  often  a  file  will show a  noticeable  change  in  size  when  infected  by  the AIDS Virus. Leprosy  is  only a mere 666 bytes in size; therefore, changes in file  size  will  be much less frequent, and the disk access time it  takes  to infect a new file will be considerably shorter than  when using the AIDS Virus. 

 

        3.  DUMBSHIT FACTOR:  When the AIDS Virus infects a file or fails to  find  any  non-infected files, it just sits there or hangs up the  system.   Leprosy  takes  a  more  subtle approach, however. When  Leprosy has infected some files successfully, it prints out  the  message  "Program  too  big  to  fit  in memory".  This way,      dumbshits  might  think there is something screwy with their RAMs  or  TSRs, and may end up running the same virus-infected file one or more times before they get a clue. 

 

        4.  CONCEALMENT:   To find out if a file has been infected by the AIDS  Virus,  all  you need to do is run a hex editor on the file and  look  for  the full screen reading "AIDS" in the code.  Once again,  Leprosy  makes  it  more  difficult on the dumbshit user. All  the strings Leprosy outputs to the screen are encrypted in a         simple  way,  enough  to  make  it  impossible  to  quickly  spot  suspicious  phrases  when  running  a  hex  editor on an infected  file.   What is more, Leprosy will not change the time/date stamp  on the file when it infects it, unlike AIDS.

 

        5.  COMMUNICABILITY:   When  the  AIDS  Virus fails to locate any  non-infected  .COM  file  in  the  current  directory,  it can no longer  spread  itself.   The  only  way an AIDS Virus can spread from  one  directory to another is to somehow make it into one of the  directories  in  the current PATH, and be called by the user         from  a  different  directory.   Leprosy  gives  itself  one more  shot.   When  it fails to find any more non-infected files in the current  directory,  it will step back into the parent directory, and  try  to  find  some files again there.  While when the virus  exits  the  current directory will have changed when Leprosy does  this,  hopefully  the  dumbshit  won't  catch on.  The payback is  that  Leprosy might eventually creep up to the root directory and         infect COMMAND.COM, and then the user will be fucked over. 

 

        6.  RATE  OF  TRANSMISSION:   The AIDS Virus will only infect one file  at  a time.  Leprosy will infect up to four files each time it is run. 

 

SETTING UP LEPROSY ON A SYSTEM

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

 To install  Leprosy onto an un-infected system, all you need do  is  run  the  provided  file,  LEPROSY.COM, somewhere on that  system,  preferably  somewhere where it will have access to a lot of  commonly  used  executables.   Alternately,  you could infect some   program   with   an  impressive-looking  file  length  and         documentation  and  send  it  to  someone  as a Trojan Horse type  program.  Just make sure it gets run. 

 

COMPILING LEPROSY

~~~~~~~~~~~~~~~~~  

 

To assemble  the  Leprosy  .COM  file, you will need Turbo C 2.0  and  Turbo  Assembler.  MASM might work, just as long as the  executable  file  turns  out the appropriate length.  If the .COM  file  doesn't  come  out to exactly 666 bytes long, then it might not  work properly.  C compilers other than Turbo C will probably not  work,  since  the  program  makes  extensive  use  of inline assembler,  but  versions  other  than 2.0 will probably be okay. Just remember -- watch the file length. 

 

The easiest  way  to  re-create Leprosy is to just run MAKE, and  the  provided  makefile  will  handle  the rest.  If you are compiling  it  by  hand,  you  should  use  this makefile as your guidelines.   An  important  note is that you should not link the program  with  the  standard  Turbo  C  startup code for the Tiny  memory   model;   instead,  always  link  it  with  the  provided alternate  startup  code.   This  file,  C0T.ASM,  is  a  startup

sequence  which gets rid of code to gather command line arguments and  the  like,  allowing  for  programs which are essentially as small  as  their  assembly language counterparts.  Just remember,  keep an eye on the executable file size. 

 

 WAYS TO SPOT THE VIRUS

 ~~~~~~~~~~~~~~~~~~~~~~

 

 There are  several  ways to notice the Leprosy virus on your system.   If  small  .COM  files  are increasing in length to 666 bytes,  that's  your  first  hint.  666 bytes isn't a very likely  file  length,  but it's funny, so I'm keeping it that way.  Also, if  the  current directory changes when you run a program, or you notice  strange  "Program  too big to fit in memory" errors, that should  tip  you  off  too.   Leprosy can also be detected by CRC        checking  programs,  because it directly modifies the contents of  the   files   it   infects.   What  is  more,  Leprosy  causes  a distinctive  drive noise, sort of a "blickablickablickablicka" on  my  hard  drive, because it is opening, reading from, writing to, and closing a number of files very quickly. 

 

ACKNOWLEDGEMENTS

~~~~~~~~~~~~~~~~  

I'd like to thank some of the pirate boards in the (415) area code -- they know who they are. 

 

 What is  more,  I'd like to say that I used the December 26, 1989  issue  of  PC  Magazine, and the book "The NEW Peter Norton  Programmer's  Guide  to  the  IBM  PC and PS/2" in the process of  writing  the  Leprosy  program.  I just  thought I'd mention that,  since  it  kind of makes me laugh to wonder what Peter Norton and PC   Magazine   would   think  if  they  knew  they  were  partly  responsible for the creation of a virus.  HAHA!

 

Yours truly,

PCM2

 

P.S.  BTW,  if  Leprosy fails to find any .EXE or .COM files that aren't  infected,  but  it  locates more  than 6 executable files that are already infected with Leprosy, it displays a  message  indicating  that the system has been infected with Leprosy, and wishes the user luck.   If  it can't find  any  new files to infect, and only  finds  6  or  less  infected files  during  its entire run, it just prints out the  fake "Program too big to fit in memory" message again.

 

_/* 

 This file is part of the source code to the LEPROSY Virus 1.00  Copy-ya-right (c) 1990 by PCM2.  This program  can cause destruction  of files; you're warned, the author assumes no responsibility  for damage this program causes, incidental or otherwise.  This  program is not intended for general distribution – irresponsible  users should not be allowed access to this program, or its  accompanying files.  (Unlike people like us, of course...)

*/

 

anonymous anonymous at  TheServerSide.com  LIKELY WAS Marc Fleury, CEO OF JBOSS, and former Sun Microsystems programmer, AND NOT LIKELY A WORM AUTHOR, BUT SOMEWHAT REPRESENTATIVE OF THE INDUSTRY, SO HIS RANTINGS MAY BE MUCH OR INFLUENTIAL THAN M0ST MIGHT EXPECT.  The hacker seems to read TheServerSide.com  because the W32/Sobig.a@MM worm Discovered: January 9, 2003 (From: big@boss.com) lists a website that resembles  as the following link:

http://www.doesnotexist.com/blah.txt but it now has a redirect of http://sdf.lonestar.org/

(SDF public access unix system .. est. 1987)

http://us.mcafee.com/virusInfo/default.asp?id=description&virus_k=99950

 

  Here is part of his possible post:

 

Sheep run in fear 
Posted by: anonymous anonymous on July 16, 2002 in response to Message #52948 0 
replies in this thread 
You sloppy second, hairy ass hungry cowards are to afraid to reply to my posts
  
"Sun is a hardware company leading a pack of children." 

 

Some of the following evidence will help reveal the possible identities and/or REAL motivations of the worms and/or anti-worms authors.  Word Pattern possibly similar to those used in blended threats are highlighted or marked below in bold, red and/or underline and emphasis.  They may include “Odin alias Anon”, “shity”, “...”, “blah”, “NOTHING”, “sorry”, (prior words or patterns found in the Sober worm) “shitty app” (prior words found in MyDoom worm). See the links immediately below THAT SUGGEST THAT THERE IS A SIMILAR SYLE OF WRITING BY ONE very emotionally immature person perhaps going through some sort of breakup around December 2003 (Bill Joy may have been going through a divorce about this time):
 

"I said, I love you..,, and you said NOTHING. And now,,, Go Away From Me Here are my love-letter((s)) mock me mock me again and again . Enjoy it. blablabla GO!"Odin alias AnonOdin_Worm.exe”…

hi its me i've found a shity virus on my pc.  
 check your pc, too” …
Re: Contact" "RE: Sex" "Sorry, I've become your mail" 

 

Odin is a strange thing to fixate on mentioned in the above excerpts of the worms.  “Thor (Old Norse: Þórr, Old English: Þunor, Old High German: Donar) is the red-haired and bearded nature god of thunder in Norse Mythology and more generally Germanic mythology. He is the son of Odin and Jord.” “Ása-Þórr, which is Thor of the Æsir, the most important Norse gods.”  This suggests that the author also has an interest in electricity, ESPECAILLY LIGHTNING, in this authors opinion.

http://en.wikipedia.org/wiki/Thor#Other_names

http://en.wikipedia.org/wiki/Thor

 

May 2004 seems to be the discovery date for the Cyclone worm, which is a destructive system, similar to a destructive weather system.

http://216.109.125.130/search/cache?_adv_prop=web&ei=UTF-8&vp=my+name+is+cyclone&vp_vt=any&vst=0&vf=all&vm=i&fl=0&n=10&fr=ush1-mail&u=www.viruslist.com/eng/viruslist.html%3Fid%3D1488746&w=%22my+name+is+cyclone%22&d=Rr9hkzmtM1n7&icp=1&.intl=us

http://www.vsantivirus.com/cycle-a.htm 

 

Win32.Cycle.a will drop a file called "cyclone.txt" into the Windows folder. The file will always have the same content:

 

Hi,


My name is Cyclone and I live in Iran ,and I want to speak with you about problems that we have in iran :


A.In Iran we don't have any kind of freedom, because we have islamic republic in iran :


1.we can't speak freely about regime, we can't speak even a little bit against them!!! 2.I have to be a moslem otherwise they don't care about me! 3.we CAN'T even wear the clothes and styles that we wants! 4.women MUST wear a cloth that no one can even see their hair!!! 5.they do not allow our national celebrations to be held, they beat us!! 6.Many more...


B.The human rights is not implemented in Iran and there is no justice,


1.Lynch is very common in Iran . If you are against the regime then you may silently killed, or if there is a tribunal, you can't say anything, everyone works against you there. 2.1985-1990, the Islamic Republic of IRAN has been killed more than 10,000 Iranian youngs. that has been comfirmed by the documentations! This people killed without any tribunal or any proof. 3.there is a punishment that is used so much during this years, in this punishment, the person who must be killed stand in a hole then others attack him with stones, this will continue until he/she dead. there is some pictures and videos that shows this terrible torture! 4.Many more...


C.Misery and poverty grows in Iran , because the islamic republic leaders steal the money, they stolen the money that provided by selling oil, and then the people must die because they don't have enough money to even buy a bread!!!


D.Misery and poverty cause vice to grow, you see many young people in Iran using drugs and I think this is also a trick by the government to not allow us to arise against them!


E.Islamic republic gave Iran a bad name. before islamic republic we can travel anywhere in the world without any problem but now we have so much problems if we want to travel a foreign country, anyone think that we are terrorist. THE PEOPLE OF IRAN ARE NOT TERRORIST, THE ISLAMIC REPUBLIC OF IRAN IS TERRORIST.


The people of Iran trying to arise, but failed to do. About one year ago, Iranian people try to say to the world that we don't need Islamic republic but the government and police beat the people who try to tell the truth and they killed some people.You see that they don't even care about their own people, think what happen if they gain access to an ATOMIC BOMB!!! it's very dangerous for the world.


With all of this conditions and injustices, european governments still support islamic republic, they say that they just care about their own country!and I want to show them our WRATH!All of the european people are my friends and I never want to harm them, just government and the Politicians!


If you protest against iraq war and say why there must be a war against iraq, and if you do this for humanity, please do anything that you can do for helping iranian people.at least make your country not to support islamic republic anymore, I'm deadly sure that if european countries do not support islamic republic. it will be destroyed after 3-6 months!so please help!


I don't want to damage, I just want my country to grow, to improve!!! I have no other way to tell this words to world, sorry!!  

http://216.109.125.130/search/cache?_adv_prop=web&x=op&ei=UTF-8&fr=ush1-mail&va=cyclone+worm&va_vt=any&vp=my+name+is+cyclone&vp_vt=any&vo_vt=any&ve_vt=any&vst=0&vf=all&vm=i&fl=0&n=10&u=www.ravantivirus.com/virus/showvirus.php%3Fv%3D216&w=cyclone+worm+%22my+name+is+cyclone%22&d=ZZ9yNTmtMwCp&icp=1&.intl=us 

 

W32/Cone@MM  seems to be by the same author as the Cyclone worm above, which was Discovered  February 23, 2004 and also contains personal information, which may be a personal insult to Bill Gates’ wife Melinada:

Hi Melinda,
see my gift for your birthday ;-)
call me and say what you think about it?

Love,
Bill

http://vil.nai.com/vil/content/v_101043.htm 

Win32.Cone.B creates the mutex "C-OnE" and has “Cyclone.pifwhich again suggests the worm author is interested in tornados, and weather systems, and perhaps energy policy.  

http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?ID=38540 

This author thinks it is unlikely that the following was written by Iranians or that they would also make the personal comment about a possible competitor’s wife (“MELINDA, SEE MY GIFT FOR YOUR BIRTHDAY”) IN THE W32/Cone@MM  was Discovered  02/23/2004 SEEN ABOVE AND THAT THESE ARE INCONSISTENT MESSAGES. 

Cycle also kills processes called: "msblast.exe", "avserve.exe", "avserve2.exe" and "skynetave.exe" - that means it will kill worm processes for Win32/Blaster.A and Win32/Sasser.

http://www.ravantivirus.com/virus/showvirus.php?v=216

 

Does the hacker, perhaps Bill Joy, remove his own worms? Mywife.C, Klez, Cone? swen? 

 

http://www.pandasoftware.com/virus_info/encyclopedia/overview.aspx?lst=det&idvirus=51834 Mywife.C  takes off worms perhaps done by joy?  See the pattern from:

Additionally, it also deletes entries belonging to other worms, such as Mydoom.A, Mimail.T and several variants of Bagle.

http://www.fortinet.com/VirusEncyclopedia/search/encyclopediaSearch.do?method=viewVirusDetailsInfoDirectly&fid=803

·  Virus file icon resembles a text document just like the W32/Mydoom virus, however it is an application

·  Creation of the file "c:\cyclop.bin" containing email addresses; this is similar to W32/Mimaul.U

 

http://www.f-secure.com/v-descs/cycle_a.shtml 

Cycle.A is a network worm found on May 10th, 2004 exploiting the same vulnerability as Sasser does.

http://www.seniorcenter.net/netlearnernews/graphics04/conef_html.gif

cycle.exe ANTI-JEW? http://www.bitdefender.com/html/virusinfo.php?menu_id=1&v_id=263 www.irna.com (if reachable by TCP connection and in 97% of the other cases), otherwise www.bbc.com is targeted....

It creates the mutexes "Jobaka3", "JumpallsNlsTillt", "SkynetSasserVersionWithPingFast" in order to prevent some versions of the Sasser worm from running; it also attempts to stop the execution of processes called "msblast.exe", "avserve.exe", "avserve2.exe", "skynetave.exe" (belonging to the Blaster and Sasser worms).

It creates a TFTP server on UDP port 69; if another application is already acting as a server on that port, it is terminated (and the subroutine for terminating "msblast.exe", "avserve.exe", "avserve2.exe", "skynetave.exe" is called again). When a client connects to the server and requests a file, it is given a copy of the worm (this is used to upload the virus to the machines that it infects).

http://www.logiguard.com/listings/k/klez.htm

This version of the worm will try to locate and terminate processes that contain the words like 'Nimda', 'CodeRed', 'Code Red', 'CodeBlue', 'Code Blue'.

 

http://www.logiguard.com/listings/w/klez.htm (was this done by a pro? Joy?)

reminds me of witty, and may look like witty image.  (can spell "Epiphany" but not does not use "There" correctly when it should be "their", which Bill Joy mentioned in an interview.  That is, he doesn't know how to spell their correctly, or does he mean he doesn't know how to use it correctly?)

9. The worm contains the following text strings that are never displayed: Win32 Klez V2.0 & Win32 Elkern V1.1,(There nick name is Twin Virus*^__^*)

Copyright,made in Asia ,announcement:

1.I will try my best to protect the user from some vicious virus,

Funlove,Sircam,Nimda,CodeRed and even include W32.Klez 1.X. (are these all done by Joy?)

2.Well paid jobs are wanted

3.Poor life should be unblessed

4.Don't accuse me.Please accuse the unfair sh*t world

4. The worm kills tasks of anti-virus and security software as well as tasks of several other worms - Nimda, Sircam, Funlove and CodeRed. The worm opens processes and looks for the specific text strings there. If a specific text string is found in a process, the worm terminates this process. The strings the worm looks for are:

Sircam

Nimda

CodeRed

WQKMM3878   (3 + 8 = 11  joy?)

GRIEF3878

Fun Loving Criminal…

InoculateIT…

PC-cillin  http://www.pc-cillin-zone.com/

 

 

http://www.logiguard.com/listings/g/swen.htm lists other worms he may have done? Bugbear
Yaha
Gibe
Sircam
Sobig
Klez
Bugbear

Bugbear (are these all done by Joy?) Bugbear.L

Bugbear is a tremendously dangerous parasite, which is always able to compromise the user's privacy and his or her system's stability. Bugbear Trojan is a versatile trojan, which is able to:

-Provide the hacker with a remote control over the system

-Disable antiviral programs, which are installed on the target PC

-Log user's keystrokes and send these logs to the hacker

 

 

http://cme.mitre.org/data/list.html great resource CME-24 found from

http://www.fireav.com/virusinfo/library/yaha.htm

http://www.fortinet.com/VirusEncyclopedia/search/encyclopediaSearch.do?method=quickSearch&locale=&virusName=mywife style similar to Joy?

Dear User ,

This is A very High Resk Virus Alert.

This email is sent to you because one or some of your friends has been infected
with The
W32.BlackWorm.A@mm Virus.
And you could be infected too.This Virus has the ability to damage
the hard disk.This Virus infects computers using many new ways :

 

 

http://www.pandasoftware.com/virus_info/encyclopedia/overview.aspx?idvirus=44447 Mimail.T

attempts to cause a denial of service on darkprofits.com (For resources and information on Best AntiVirus and Norton antivirus)

http://www.2-spyware.com/remove-blackworm.html ANTI-ARAB SEX?

http://www.dmaran.nic.in/prdisplay.php?id=235 

3.92315089702606E02.UUE    twins again? USE OF THIS SUGGESTS MATH AND JOY?

Blackworm is also known as Grew.a, Grew.b, Blackmal.e, Nyxem.e, Nyxem.d, Mywife.d, Tearec.a and CME-24.

"BAD LOVED" COMMENT MAY SUGGEST IS IS OUT OF BRAZIL!

Msie7en.exe (similar to msblast?) Colas.Exe   Blueworm references MyLife "Made by MyLife"

Nyxem.D," "MyWife.E," "Blackmal.E," Bloodhound.W32.VBWORM

ALIAS:    Mywife, Hunchi, I-Worm.Nyxem

ALIAS:    Blackmal, Blueworm, Blackworm

http://www2.lhric.org/virus/hunchi.html W32.Hunch.I@mm is a mass-mailing worm that modifies the Autoexec.bat file in an attempt to format drive C.

i-worm.mylife.exe (DELETES DRIVES)  Subject: bill  STRAGELY PERSONAL caricature http://www.viruslibrary.com/virusinfo/I-Worm.MyLife.b.htm

Blackmal.C (Nyxem.D) Additionally the worm can perform a Denial of Service (DoS) attack against this website: webstats.web.rcn.net http://start.rcn.com/ competing search engine?

Blackmal (Nyxem) The worm drops this file: \windows\system32\About_Blackworm.C.txt file.ext

http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_BLUEWORM.F&VSect=T

new BlackWorm? with R-rated jpg

attached zip has an 8K R-rated jpg, and a 70K executable with no extension

 lots of strange file names

http://www.f-secure.com/v-descs/nyxem_e.shtml 

Blackworm.C (Nyxem.D) http://www.logiguard.com/listings/b/nyxem.htm names worm in email

Blackworm (Witty)

http://www.logiguard.com/listings/b/witty.htm

 eight first physical drives and writes 64KiB Witty is a pure network worm, it does not spread through email.suggests that it has been hand-written in assembly programming language.

Blackworm (Nyxem) http://www.logiguard.com/listings/b/nyxem.htm Additionally the worm can perform a Denial of Service (DoS) attack on the New York Mercantile Exchange website (www.nymex.com).

http://www.trendmicro.com/vinfo/images/worm_cone_b_img1.gif Zero Sun is similar to setthesun

 

As its stealth mechanism, it uses a Real player file icon. The following text is found on the decrypted worm body:

• NewWife

• BlackWorm.C

OSSMTP.DLL  DID BILL JOY DO THE FOLLOWING POEM?

http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=40099 Discovered: January 17, 2006 which doesn’t compare well to date of the cone worm 22 of JAN,  MARCH 2004? ll i know wut… i know billy bo

wut to say

Possible From names/addresses:

...Bad Love
<user377@worldsex.com>

The file, About_BlackWorm.C.txt, contains the following text strings:

my MS gay

i got a bill to pay

n i wonder wut to say

but ll i know is wut i know  

billy bo! aint got no mo          (billy was also used in msblaster!)

shyt to do

from this day

GoOd ByE MicroGates

Made by MyLife

http://www.pandasoftware.com/virus_info/encyclopedia/overview.aspx?lst=det&idvirus=51834 Another twin worm?

The Moon: lost_love705@yahoo.com Mywife.C ( Joy? takes off worms perhaps done by joy?)

Discovered: January 17, 2006 could be read as 117

 

http://www.f-secure.com/v-descs/nyxem_e.shtml  It is similar to the 'Email-Worm.Win32.VB.bi' that was found a few days ago.

Date of Discovery:

January 20, 2006

The worm has the following text strings in its body:
mysoulmustfly
offlinehacker
evilpain
setthesun

 

http://www2.lhric.org/virus/hunchi.html W32.Hunch.I@mm is a mass-mailing worm that modifies the Autoexec.bat file in an attempt to format drive C.

i-worm.mylife.exe (DELETES DRIVES)  Subject: bill  STRAGELY PERSONAL caricature http://www.viruslibrary.com/virusinfo/I-Worm.MyLife.b.htm

 

http://www.srnmicro.com/virusinfo/mylife.htm

This version was first discovered on 7th of March 2002.

message subject will be "my life ohhhhhhhhhhhhh", the body will be

"Hiiiii
How are youuuuuuuu?
look to the digital picture it's my love
vvvery verrrry ffffunny :-)
my life = my car
my car = my house
"

This version was first discovered on 7th of March 2002.

http://www.f-secure.com/v-descs/mylife.shtml

Mylife.F worm was found in the wild on April 2nd, 2002. Largest infections currently in Australia and UK

        Hiiiii

        How are youuuuuuuu?

        look to the notepad it's vvvery verrrry ffffunny :-) :-)

        i promise you will love it :-)

        Notepad = list\

 

        list = 37

        buyyyy

 

 

http://www.fortinet.com/VirusEncyclopedia/search/encyclopediaSearch.do?method=viewVirusDetailsInfoDirectly&fid=803

·  Virus file icon resembles a text document just like the W32/Mydoom virus, however it is an application

·  Creation of the file "c:\cyclop.bin" containing email addresses; this is similar to W32/Mimaul.U

 

http://www.2-spyware.com/files.php GOOD DESCRIPTIONS

http://www.logiguard.com/listings/w/witty.htm

http://www.logiguard.com/listings/w/sober_b.htm oden alias anon suggests Joy hacked into Microsoft?

Odin is the Win32-API Implementation for  OS/2?

http://search.yahoo.com/search;_ylt=A0geut129VBF0AEBXeZXNyoA?p=odin.exe&ei=UTF-8&fr=ush1-mail&x=wrt

drv.exe

filexe.exe

similare.exe what language is this word?

systemchk.exe

winreg.exe

 

http://www.fortinet.com/VirusEncyclopedia/search/encyclopediaSearch.do?method=viewVirusDetailsInfo&fid=62&locale=

Systems which identify W32/Elkern infections may also discover W32/Klez infections

http://www.logiguard.com/listings/w/klez_e.htm

10. The worm has a complex payload routine. It works as a separate thread and constantly checks system date. If the month number is odd (1, 3, 5, etc.) and the date is equal to 6 then the worm proceeds further. It then checks if the month number is equal to 7 (July) or 1 (January) and sets a special flag if it is. Then the main payload routine is activated. It looks for all files on all local and network drives. If the month is not 1 or 7, the routine only affects files with the following extensions:

http://www.logiguard.com/listings/k/klez.htm Terminating his own worms, and does this suggest he also did Sven or Swen?

http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=11779  klez

http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=10771

On the 6th day of March, May, September and November the worm overwrites all files with the following extensions:

Whereas, on 6th of January and July Klez.E overwrites all files with zeroes.

The encrypted text inside the worm code reads:

“ & Win32 Foroux V1.0
Copyright 2002,made in
Asia
About Klez
V2.01:
 1,Main mission is to release the new baby PE virus,Win32
Foroux
 2,No significant change.No bug fixed.No any payload.
About Win32 Foroux (plz keep the name,
thanx)
 1,Full compatible Win32 PE virus on Win9X/2K/NT/XP
 2,With very interesting feature.Check it!
 3,No any payload.No any optimization
 4,Not bug free,because of a hurry work.No more than three weeks from having such idea to accomplishing coding and testing”

http://www.logiguard.com/spyware/b/bugbear-trojan.htm

http://www.logiguard.com/listings/b/tanatos.htm

http://www.logiguard.com/listings/b/bugbear_b.htm Get 8 FREE issues - no risk!

iccyoa.dll, icoaco.dll, lgguqaa.dll, lgqagqz.dll, roomuaa.dll, rouaoup.dll, okkqsa.dat, ussiwa.dat, uguaac.dat

Jenna Jameson (also seen in mydoom?)

 

 

http://www.srnmicro.com/virusinfo/swen.htm (this suggests anthrax letters?

;Start
;Registry fix for Swen worm
[Version]
Signature="$
CHICAGO$"

 

 

The worm can also send 'congratulations' on one of the following holidays:

Also the worm can pretend to be a game, it can send itself (usually as SETUP.EXE or INSTALL.EXE) with the a message:

                    This is a special humour game

                    This game is my first work.

                    You're the first player.

                    I expect you would like it.

Sometimes the virus compares current date against a preset list of 10 different holiday dates. If the date matches, the worm will send an e-mail with a subject field such as "Happy Christmas", "Have a nice Christmas" or "Have a good Christmas". There are several variations on the exact subject field. …This only happens on one day per year for each of the holidays - for Christmas, Klez only tries to send these messages on 25th of December. Explanation for getting these messages before Christmas is simply that lots of people have their computers date set wrong.  The holidays are:

 New year (1st of January) Epiphany (6th of  January)  Candlemas (2nd of February)  Saint Valentine's Day (14th of February)

 Lady Day (25th of March)  April Fools' Day (1st of April)  Assumption (15th of August)  Allhallowmas (31st of October)

 All Souls'Day (2nd of November)  Christmas (25th of December)

 

Yaha http://www.logiguard.com/listings/y/yaha_k.htm (might be joy? strangely political)

Klez.H is the most common world-wide spreading worm....

its really wonderfool...

The worm can change the default Internet Explorer startup page to point to one of these sites:

http://www.unixhideout.com http://www.hirosh.tk (REALLY SLEAZY)http://www.neworder.box.sk http://www.blacksun.box.sk http://www.coderz.net http://www.hackers.com/html/neohaven.html http://www.ankitfadia.com http://www.hrvg.tk http://www.hackersclub.up.to http://geocities.com/snak33y3s  (A CRAZY THREAT MESSAGE)

The worm tries to create a DoS (Denial of Service) attack on the infopak.gov.pk website.

www.jamaat.org www.pak.gov.pk www.klc.org.pk www.ummah.org.uk www.piac.com.pk http://www.infopak.gov.pk/

webmaster@infopak.gov.pk Islamabad PAKISTAN? pro-jew?

Yaha arrives as an e-mail attachment, message subject will be "Melt the Heart of your Valentine with this beautiful Screen saver or Fw: Melt the Heart of your Valentine with this beautiful Screen saver". The attachment name will be "valentin.scr".

                     The SMTP server used to send the emails is chosen either from the registry or from the following list inside the worm body:

webproxy.teaorcoffee.com.tw
supab.stn.sh.cn
sitic.com.cn
server.benmoss.com
pokkant1.pokka.com.sg
pdc.hrserve.com.tw
outmail.dongfang-china.com
ns.sillim.hs.kr
ns.binter.cl
microimportservice.com 
Micro services all Japanese imports and domestic vehicles in Tucson  and Southern Arizona. This has nothing to do with foreigners
mailsvr.hanace.co.kr
mailserver.kaimi.com.cn
mail.yinda.com.cn
mail.win-tex.com
mail.pusanpaik.or.kr
mail.cmr.com.cn
mail.clinicasanborja.com.pe
luckybusan.com
linux2.ele-china.com
crato.urca.br
ahbb.net
ntserver1.pascon.com
toad.com  very political and US?
mailinx.nettlinx.com
moscow-advokat.ru

http://www.fortinet.com/VirusEncyclopedia/search/encyclopediaSearch.do?method=viewVirusDetailsInfo&fid=2116&locale= santy targets google?

http://news.com.com/Google+squashes+Santy+worm/2100-7349_3-5500265.html

In August, a MyDoom variant used Google and other search engines to hunt for e-mail addresses.

http://www.fortinet.com/VirusEncyclopedia/search/encyclopediaSearch.do?method=quickSearch&virusName=sober 

http://www.fortinet.com/VirusEncyclopedia/search/encyclopediaSearch.do?method=viewVirusDetailsInfo&fid=831&locale=

The "From" email address domain is one of these -

@microsoft.at - used for German format emails
@microsoft.de - used for German format emails
@microsoft.com - used for English format emails

An example of a created "From" address could be 'Info@microsoft.de'.

http://www.fortinet.com/VirusEncyclopedia/search/encyclopediaSearch.do?method=viewVirusDetailsInfo&fid=831&locale=  sober lists another virus, joy's style?

Subject: Microsoft Alert: Please Read!
Body:
New MyDoom Virus Variant Detected!
A new variant of the W32.Mydoom (W32.Novarg) worm spread rapidly through the Internet.
Anti-virus vendor Central Command claims that 1 in 45 e-mails contains the MyDoom virus.
The worm also has a backdoor Trojan capability.
By default, the Trojan component listens on port 13468.

http://www.fortinet.com/VirusEncyclopedia/search/encyclopediaSearch.do?method=quickSearch&locale=&virusName=Yaha Worm seems to go on for 5 years Apr 1 2002-Jan 13 2007 Holiday pattern! msmdm.exe

msscra.exe

·  Email will be sent in this format -

Subject: Fw: Melt the Heart of your Valentine with this beautiful Screen saver

Body:
Hi
Check this screen saver
Happy Valentines day
See u


Attachment: Valentin.scr

·  Virus may use one of several Asian-based email servers in order to distribute itself - the server names are hard-coded into the virus and include countries such as Korea, Singapore, China and Taiwan

·  Virus contains the following text strings -

Happy Valentines Day enjoy!!!!
$ Author : No payloads,then what
Remov:HKCR\exefile\shell\open\command="%1" %*
Del c:\recycled\msmdm.exe,msscra.exe
hahha very simpile yaa $

http://66.218.69.11/search/cache?ei=UTF-8&p=WWWdefacedWWW&fr=ush1-mail&u=www.sarc.com/avcenter/venc/data/w32.kedebe.e@mm.html&w=wwwdefacedwww&d=WEZrDJIFNzz9&icp=1&.intl=us

Avoids sending email to addresses containing the following strings: gmail....java...sun.

http://66.218.69.11/search/cache?p=mydoom+java+sun+worm&ei=UTF-8&fr=ush1-mail&u=www.theinternetpatrol.com/new-windows-mydoom-worm-searches-and-destroys&w=mydoom+java+sun+worm&d=VqMmWJIFN0zs&icp=1&.intl=us

The virus also seems to display a preference for Google as, according to security firm Sophos, MyDoom AO sends about 45% of its queries through Google, another 22.5% through Lycos, 20% through Yahoo, and only 12.5% via AltaVista.

Also known as MyDoom.bb, the worm may also download the backdoor Trojan BackDoor-CEB.f to the host system.

Infected machines will have a file called “JAVA.EXE” on them.

According to another security company, Panda Labs, MyDoom AO will only affect computers running Windows 2003, XP, 2000, or NT.

http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=41862 

http://216.109.125.130/search/cache?p=mutex+mydoom&ei=UTF-8&fr=ush1-mail&u=www.governmentsecurity.org/forum/index.php%3Fshowtopic%3D7049&w=mutex+mydoom&d=MXyWkpIFNxQY&icp=1&.intl=us

W32.Beagle.H@mm mutex named "imain_mutex."  (seems to be the same mutex for all varients?)   Bagle.D "iain_m2"  W32/Bagle.G imain_mutex  Bagle.FU  Mutex "555"

 i11r54n4.exe i1i5n1j4.exe go154o.exe

Sends HTTP GET requests to the following Web sites on TCP port 80:  postertog.de, www.gfotxt.net, www.maiklibis.de

http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=41862 

Win32/Mydoom.BB  The mutex name is created using the hostname, replacing all non alpha-numeric characters with random alphabetic characters, and appending "root". For example, if the computer name was "Billy_22", the mutex might be "Billyz22root".

Mydoom.BB attempts to download and execute files from the following domain: www.imogenheap.co.uk  this is a strange female recording artist

http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=41813

Mydoom.AU attempts to download and execute a file from the following domain: www.aoprojecteden.org av corp!

 

http://www.f-secure.com/v-descs/mydoom_bb.shtml

avoids gmail...This file is a backdoor detected as 'Backdoor.Win32.Surila.o'.

http://www.sophos.com/virusinfo/analyses/trojsurilap.html BackDoor-CEB.f  BackDoor-CEB.b has many aliases

W32.Mydoom.Q@mm  Creates a mutex named "43jfds93872"
Mydoom.X, on the other hand creates the mutex LLLf54fxrDLLL

W32/MyDoom-Y will create a Mutex with the label hola_back_bitches

 

http://66.218.69.11/search/cache?ei=UTF-8&p=Stop+making+money+and+fix+your+software%21%21+MEOW&fr=ush1-mail&u=homepage.ntlworld.com/iexbeta/msblastunupx.txt&w=stop+making+money+fix+software+meow&d=AFhe9pIFNrSK&icp=1&.intl=us

the marks above the a's may suggest it was done by a swed

      0@ <1@  €                                                  msblast.exe I just want to say LOVE YOU SAN!! billy gates why do you make this possible ? Stop making money and fix your software!! 

http://www.fortinet.com/VirusEncyclopedia/search/encyclopediaSearch.do?method=quickSearch&locale=&virusName=blaster compare comment to needing cats at pbs interview-  I do not see MEOW in blaster image below, but see MEOW at  freewebspace.net below.

I just want to say LOVE YOU SAN!!
billy gates why do you make this possible ?
Stop making money and fix your software!!
MEOW
Pozà

www.sztge.com.cn

http://www.logiguard.com/listings/k/korgo_f.htm  Not Joy?

The worm tries to contact the following IRC servers on port 6667
irc.kar.net
gaspode.zanet.org.za
lia.zanet.net
irc.tsk.ru
london.uk.eu.undernet.org
washington.dc.us.undernet.org
los-angeles.ca.us.undernet.org

brussels.be.eu.undernet.org
caen.fr.eu.undernet.org
flanders.be.eu.undernet.org
graz.at.eu.undernet.org
gaz-prom.ru


Bill Joy has lived near Colorado Springs where Tesla did experiments regarding weather and electricity, WHICH SUGGESTS BILL JOY HAS TRIED TO EMULATE TESLA, AND THE SERVER NAMES FOR NEPAL LOCATIONS ALSO SUGGEST BILL JOY HAS AN INTEREST IN AREAS THAT MAY BE USED FOR UNUSUAL ELECTRICAL and/or weather ACTIVITY.

http://search.yahoo.com/search?p=bill+joy+Colorado+Springs+&prssweb=Search&ei=UTF-8&fr=ush1-mail&x=wrt

 

http://search.yahoo.com/search?_adv_prop=web&x=op&ei=UTF-8&fr=ush1-mail&fr2=op&va=LUKLA+PATAN+SUN+&va_vt=any&vp_vt=any&vo_vt=any&ve_vt=any&vd=all&vst=0&vf=all&vm=i&fl=0&n=10

 

Bill Joy claims "his toddler daughter, a Wizard of Oz junkie" according to a Fortune interview.  Wizard of Oz IS A MOVIE PARTLY ABOUT A TORNADO, WHICH IS A CYCLONE, USUALY INDUCED BY LIGHTING, OR CONDUCTIVE WIRL, OR EVEN SOMETIMES CALLED WHIRLWIND TYPE OF WEATHER SYSTEM.

 

Tesla came to think that when lightning struck the ground it set up powerful waves that moved from one side of the earth to the other. If the earth was indeed a great conductor, Tesla hypothesized that he could transmit unlimited amounts of power to any place on earth with virtually no loss. But to test this theory, he would have to become the first man to create electrical effects on the scale of lightning.

http://216.109.125.130/search/cache?p=tesla+Colorado+Springs+Master+of+Lightning+Colorado+Springs+&prssweb=Search&ei=UTF-8&fr=ush1-mail&x=wrt&u=www.pbs.org/tesla/ll/ll_colspr.html&w=tesla+colorado+springs+master+lightning+colorado+springs&d=Pb4lcTmtM6wQ&icp=1&.intl=us

 

“Method and apparatus for Protecting against Tornadoes” suggests that anti-tornado devices will soon exist.

http://search.yahoo.com/search?_adv_prop=web&x=op&ei=UTF-8&fr=op&va=conductive&va_vt=any&vp=circulate+in+a+whirl&vp_vt=any&vo=paramagnetic+field&vo_vt=any&ve_vt=any&vd=all&vst=0&vf=all&vm=i&fl=0&n=10

 

http://216.109.125.130/search/cache?_adv_prop=web&x=op&ei=UTF-8&fr=op&va=conductive&va_vt=any&vp=whirl&vp_vt=any&vo=paramagnetic+field&vo_vt=any&ve_vt=any&vst=0&vf=all&vm=i&fl=0&n=10&u=www20.brinkster.com/tstscorpion/tornadosolution/Patent.htm&w=conductive+paramagnetic+field+whirl&d=Q_ttVjmtMv5W&icp=1&.intl=us 

wire movement through the magnetic field produces a magnetic whirl

http://216.109.125.130/search/cache?p=conductor+%22MAGnetic+whirl%22&ei=UTF-8&n=10&fl=0&x=wrt&u=www.tpub.com/basae/12.htm&w=conductor+%22magnetic+whirl%22&d=RSbsfDmtMvqw&icp=1&.intl=us 

If a paper with filings is put flat upon the ring and the current turned on suddenly; the existence of a magnetic whirl may be easily observed.   

http://216.109.125.130/search/cache?_adv_prop=web&x=op&ei=UTF-8&fr=op&va_vt=any&vp=MAGnetic+whirl&vp_vt=any&vo=lightning&vo_vt=any&ve_vt=any&vst=0&vf=all&vm=i&fl=0&n=10&u=www.pbs.org/tesla/res/res_art02.html&w=lightning+%22magnetic+whirl%22&d=QG6GYzmtM6nY&icp=1&.intl=us

 

The Electric Whirl or Electric Fly is made of a number of brass wires, with rearward-facing sharp points, joined at a hub. This is pivoted atop an insulated shaft. One terminal of an electrostatic machine is connected to the whirl and the other is grounded. As the charge builds up on the metallic parts of the whirl, the equipotential lines are bunched together at the sharp points, creating a large electric field there. Eventually the field becomes large enough to ionize the air molecules and create a space charge that is of the same sign as the point. The mutual repulsion between the space charge and the point causes the wheel to spin.

http://216.109.125.130/search/cache?p=conductor+%22+whirl%22&prssweb=Search&ei=UTF-8&n=10&fl=0&x=wrt&u=physics.kenyon.edu/EarlyApparatus/Static_Electricity/Electric_Whirl/Electric_Whirl.html&w=conductor+whirl&d=czd3fDmtMwpC&icp=1&.intl=us

Inserting paramagnetic rods into the solenoids should do nothing while the ferromagnetic rod should increase the field. 

http://216.109.125.130/search/cache?p=paramagnetic+%22whirl%22&ei=UTF-8&n=10&fl=0&x=wrt&u=www.seattleu.edu/scieng/phys/demos/5%2520Electricity%2520and%2520magnetism.html&w=paramagnetic+whirl&d=bl449DmtM1VB&icp=1&.intl=us

 

This Anti-tornado concept is the technology that Bill Joy may be fixating on and may have been misused in Nepal and that may be the motive for Sun Microsystems’ Nepal location server names of lukla and Patan.  He may go to any lengths to control this technology.

 

 THERE MAY BE A CHANCE THAT A MISSILE COULD BE CAPTURED AND EXPLODED IN A TORNADO-TYPE-SOLENIOD.  improved RENEWABLE POWERSOURCE CONCEPT? Reduces the need for the GRID, damns, etc. (7 MORE THINGS TO DO?)

1. Suspect  True , BUT HE HAS FAILED TO MENTION THAT THE PARAMAGNETIC PROPERTIES OF OXYEN WHEN STRUCK BY LIGNTNING LIKELY CAUSES MAGNETIC WIRL AROUND THE LIGHTNING AND THUS THE TORNADO:  "solenoid being disposed so as to create a magnetic field in a direction opposed to the magnetic field of the earth"....

Intuitively, we can expect the most efficient shape of conductive movement in a magnetic field would be in the shape of a tornado, and there have been witnesses who claim inside a tornado or hurricane is lightning. 

Induction (electricity), in electricity, the creation of an electric current in a conductor moving across a magnetic field. http://216.109.125.130/search/cache?p=conductor+moving+magnetic+field+voltage&ei=UTF-8&fr=ush1-mail&vm=r&x=wrt&u=library.thinkquest.org/C001429/electricity/electricity24.htm&w=conductor+moving+magnetic+field+fields+voltage&d=bO_KxRIeORxC&icp=1&.intl=us

WE NOW HAVE PLASTIC MAGNETICS THAT CAN BE SHAPED INTO A CONE WITH A HOLE AT THE BOTTOM SIMILAR TO A TORNADO IN SHAPE. We instead will choose to have the shape of our cone to be at about a 45 degree angle with a hole at the bottom in the center. Our conductors will be foil (aluminum, zinc, silver alloy?) shaped into various sizes of balls (filled with power of the same metal alloys, and/or also crystals and electrets,

which resembles the concept of getting the conduction to pass in the middle of a wire conductor by not having a rounded outside edge as done with certain conductive wires?), but we will use a Faraday cage to separate the sizes so as to place the largest sizes of balls where the magnetic field would be the most dense. Outside the largest cage would be a concave mirror to focus reflected light where the magnetic field would be most dense. It may be best to have a foil that would consist of an alloy of zinc, silver, and aluminum. We want a light foil, least

likely  to melt and least toxic. We want most durable foil. THE COMMON BELIEF IS THE BEST WAY TO ELIMINATE THE GRID IS BY PROVIDING THE MOST FUNCTIONAL POWERSOURCE WOULD BE BY ALSO INCLUDING An Air CHEMICAL BATTERY IN THIS MIX, AND IT WOULD BE BEST TO HAVE IT REACT WITH THE AIR, OXYGEN; likely it can consist of  zinc, aluminum, silver (or any oxidizer?),  A light find foil, turbine, weather vane is needed to be perhaps put on the top and bottom to circulate air into the faraday cage;  This seems entirely possible because at both the top and bottom of my above mentioned concept should be conical shaped type of windmills of possibly light plastic or a durable conductive material (similar to solar panels), this could be the new type of triple layer photoelectric cells to capture different photons of various light in the light spectrum and make into various spiral  type wind capture forms that funnel electrons to the more central device and more metallic conductors.  

 

Perhaps create the faraday cage out of springs.  http://en.wikipedia.org/wiki/Faraday_cage

http://www.polymet.com/springs.htm  input form might not have worked.  Might also need conductive balls, partly made of foil rolled into balls with podwered metal (Nano zinc oxide?) OR Pyroelectric crystals and/or also containing electrets (which might partly act as a capacitor or dialetric) http://www.lycos.com/info/capacitor--dielectric.html.  What do you think would be best?  

http://www.reade.com/Products/Elements/gold.html

http://www.mitsui-kinzoku.co.jp/project/kinoufun/en/bifun/bifun.html

 

Or put crystals within the balled foil?  http://en.wikipedia.org/wiki/Piezoelectricity

http://en.allexperts.com/e/p/py/pyroelectric_crystal.htm 

http://en.wikipedia.org/wiki/Electret rosin, resin, tree sap? Something more durable and less likely to melt similar to teflon?  Should be sticky and light?  Similar to ceramic? sand? Silica? nano bismuth? http://bcc.ecnext.com/comsite5/bin/comsite5.pl?page=description&purchase_type=ITM&item_id=0279-143730&referid=3371

Are ALL electrets Diamagnetic?   http://en.wikipedia.org/wiki/Diamagnetic Materials that are said to be diamagnetic are those which are usually considered by non-physicists as "non magnetic", and include water, DNA, most organic compounds such as oil and plastic, and many metals such as mercury, gold and bismuth

http://en.wikipedia.org/wiki/Electret

http://composite.about.com/library/glossary/e/bldef-e1908.htm?terms=permanent+magnet

Definition: Polymeric materials which have been electrically polarized so that one side has a positive charge and the other side a negative charge, much like permanent magnets.

 

http://www.polymet.com/springs.htm  input form might not have worked.  Might also need conductive balls, partly made of foil, and partly made of powered metal.  What do you think would be best?

 

HARD MAGNETIC SHEETING IN CONE SUPPLIER

which can be found in the following link: http://www.magnummagnetics.com/magnetic_sheeting.htm

 

I think I need to work on my materials.  Perhaps include titanium foil for wind capture.

http://www.daystartech.com/lightfoil.cfm can be molded into shapes

http://www.nanosolar.com/products.htm Nanosolar SolarPly?.

 

Might also add:

1st layer of upper part in plastic to be balled similar to aluminum

foil-gallium indium phosphide

(HIGH band-gap energy-ULTRAVIOLET TO ORANGE ),

2nd or lower part of plastic gallium arsenide

(MEDIUM band-gap energy-RED PHOTONS), 

 

ABOVE MIGHT BE USED AS WIND FOILS.  ALSO, BALLED IN MAGNETIC FLIED CREATED BY OUTSIDE, AND INSIDE, CONICAL HARD MAGNETIC SHEETING germanium may or may not be needed, but picks of low band-gap energy-INFRARED PART OF THE SPECTRUM,  which can be found in the following link:

http://www.sumitomocanada.com/opencms/opencms/ssca/montreal/index.html

  

This is a reallly hard project and would perhaps need to put other industries out of biz.  They may want to murder me!

1) DO SPECIALLY MADE RARE EARTH TORNADO SHAPED MAGNETS NEED TO BE MADE (PLASTIC MAGNETS MIGHT MELT);

2) PERHAPS A SPECIALLY MADE SOLAR CELL FOIL FOR THE WIND TURBINE, POSSIBLE SPECIALLY MADE AIR BATTERY,

3) PERHAPS A SPECIALLY MADE CONDUCTIVE METAL, ALSO SHAPED INTO VARIOUS SIZED SPRINGS FOR THE FARADAY CAGE AND SEPARATION OF THE DIFFERENT SIZES OF CONDUCTIVE BALLS WITHIN THE FARADAY CAGE.

4) SPECIAL MIRROR OR REFLEXTIVE CONCAVE SURFACE TO REFLECT LIGHT AND HEAT INTO THE FARADAY CAGE.   

5) THEN INNOVATIONS IN THE MANUFACTURING PROCESS!  (It might be somewhat easy to contain the balls within springs by putting them in cloth and pulling the cloth out of the springs when they are tied together around the balls).

6) MAY BE NEEDED OR WANTED AT SOME POINT ARE specially shaped WIND TURBINES

7) MAY BE NEEDED OR WANTED AT SOME POINT ARE SPECIALLLY CREATED SOLAR CELLS.

COMPLEX BUT ORIGINAL. THIS IS ABOUT THE MOST EFFICIENT DESIGN

THEN THERE MAY BE VARIOUS GRADES OF QUALITY FOR DIFFERENT APPLICATIONS OF THIS POSSIBLE POWERSOURCE.  THEN IT NEEDS TO BE TESTED UNDER DIFFERENT CONDITIONS (IF ALL OF MY THEORY IS CORRECT).

http://en.wikipedia.org/wiki/Resin Mix resin with honey for the Dielectric in the balls?  Examples of resin acids are abietic acid (sylvic acid), C20H30O2, plicatic acid contained in cedar, and pimaric acid, C20H35O2, a constituent of gallipot resin

compare to resin sugar molecule, which is similar to honey

http://en.wikipedia.org/wiki/Honey Honey doesn't spoil! Mix of resin with honey nano bismuth,  Nano zinc oxide layered on metal foil conductor wraped into balls (Dielectric or also called capacitor)?

 

Could the wind turbine (should the petals be specially sprayed to capture different bandwiths closer to the center of the petals as photoelectric cells or be layered or sprayed as layers?  Would this increase the efficency beyond 30%?) be shaped similar to an iris (not sure if bottom petals are needed, even with style (flexable) , umbrella (half moon shape pointing down TO BRING WIND INTO THE CENTER) and stigma that further funnel wind into the center of the wind turbine http://www.daviswiki.org/Iris 

http://en.wikipedia.org/wiki/Flower umbrella and stigma

 

I do not like iodine in lightfoil. Aluminum foil-gallium indium phosphide?   Can something else be used?  Could it be sprayed in layers to pick up

(HIGH band-gap energy-ULTRAVIOLET TO ORANGE ),

2nd or lower part of plastic gallium arsenide

(MEDIUM band-gap energy-RED PHOTONS).

http://en.wikipedia.org/wiki/Solar_cell

http://en.wikipedia.org/wiki/National_Renewable_Energy_Laboratory

 

THIS MAKES ME THINK THE GRID IS NOT NEEDED, BUT I DOUBT WE ARE READY TO DECOMMISSION ALL DAMNS, INCLUDING HOOVER , BECAUSE WE STILL NEED THEM PARTLY TO IRRIGATE.  MY CONCEPT WOULD WORK WHEN DEMAND IS THE HIGHEST ALSO I SUSPECT. THIS MAKES ME THINK THE GRID IS NOT NEEDED, BUT I DOUBT WE ARE READY TO DECOMMISSION ALL DAMNS, INCLUDING HOOVER , BECAUSE WE STILL NEED THEM PARTLY TO IRRIGATE.

Note to Editor, agent, reader and/or investigators:  The flamings and rantings of anonymous anonymous (I cross compared using a search engine and I show at the end of this rant by anonymous anonymous Theserverside.com where I found in the virus authors work:  shity, blah,  NOTHING,  sorry,  shitty app, ... which may match Odin alias Anon , shity, ..., , NOTHING, sorry, (prior words or patterns found in the Sober worm) shitty app (prior word pattern found in MyDoom worm) blah (prior word pattern found in Virus.Boot-DOS.Blah.3385).

The following are notes for the agent, fact checker, Editor:

http://www.davidleeroth.com/

NOTICE "Kung Fu sage" AND calling himself as a "unique House blend of the Scarecrow from Wizard of Oz" IN LINK BELOW and that Joy may have used both the terms  "Wizard of Oz" in reference to his daughter and "Kung Fu" if he is anonymous anonymous at TheServerSide.com.

http://www.davidleeroth.com/bio/david-lee-roth.php

 

I did a cross search on various strange patterns the hacker has used and  it matched the flamings and rantings of anonymous anonymous  at TheServerSide.com.  You can cross search

"Kung Fu" AND TheServerSide.com and/or read the below:

 

ATG and MVC Open this result in new window

... blame the product, or design but it always comes down to the kung fu skill of the programmer ... Welcome to the reviews section on TheServerSide.com!

http://www.viruslist.com/en/viruslist.html?id=302666&printmode=1 
Compare “shitty app” below with “shitty app” in the link immediately below:
Viruslist.com - I-Worm.Mydoom.g  
Whole site. Viruses. Malware Description Search. I-Worm.Mydoom.g. ... they may be called skynets, but not your shitty app. Installation ... Kaspersky Lab. All rights reserved. Email: webmaster@viruslist.com ...
http://www.viruslist.com/en/viruslist.html?id=1973174 
Compare “sorry” below with “sorry” in the link immediately below:
Viruslist.com - I-Worm.Sober.a  
Whole site. Viruses. Malware Description Search. I-Worm.Sober.a. Other versions: .c, .e, .f, .g, .i. ... Email: webmaster@viruslist.com ...
http://www.viruslist.com/en/viruslist.html?id=302666

See flamings and rantings of anonymous anonymous at TheServerSide.com that the of that match patterns of  the hacker after the anonymous anonymous at TheServerSide.com listing immediately below (enjoy seeing how persons in the computer industry communicate complete with strange slang and spelling): 

 

The messages in the worms are often sexist, immature, personal, political, and/or aimed toward business rivals and may only match the agenda of Bill Joy, including, skills, motivation, opportunity, and suggests his true self and real lifelong motivation, which is common in the industry (spying due to personal problems and for personal gain which will be covered in greater detail in Chapter 5). 

 

The messages tend to contain slang or language common to persons who were situated where Bill Joy was situated and match the time line of problems Bill Joy was having or complaining about, especially in his personal and/or professional life.  This should be more stylistic in its comparisons rather than Chapter 4 which may be more of an agenda, and geared to knowing that is public domain comparisons. 

 

NOTE TO EDITOR: PERHAPS Chapters 3 and 4 should be combined. Bill Joy I suspect was standing outside the Menlo Park City Library I think on a Tuesday before Dec. 22, 2004 and on Dec. 22, 2004, and I wonder if the three emails I wrote on Dec. 21, 2004 at the end of this email inspired his appearance.  The more I know the more I suspect Bill Joy may have given the floppy disc, which I suspect Roddy Roddewig used to likely get root privileges by perhaps rebooting Safe Harbor Shelters computers, to Rock Star David Lee Roth, perhaps if they would meet at San Francisco Central Library Birthday seems to mentioned in both nodoom.a and cone.b, and I was going to transfer tech to Bill Joy on his Birthday about 11-8-2001. My first name is Tanis and Sanit would contain the same letters as my uncommon first name; The worm author and Bill Joy is known for his word plays: nimba is admin backwards; jini is usually spelled Genie; Java was first called Oak; Juxta fits the pattern of putting “J” as in “Joy” for product name.

 

The Santy, Lovesan, Bagle, MyDoom, and Code Red worms may be both personal and economic in their targeting.

 

PLEASE COMPARE '"santy" LINK BELOW WITH "Lovesan" MESSAGES SECOND LINK BELOW:

“This site is defaced!!!

 

This site is defaced!!!

NeverEverNoSanity WebWorm generation”

http://www.viruslist.com/en/viruses/encyclopedia?virusid=68388

From Worm.Win32.Lovesan.a:

 

"I just want to say LOVE YOU SAN!!
billy gates why do you make this possible? Stop making money and fix your software!!"

 

WHO or what  IS SAN?  Could it be short for “Sanity”

http://www.viruslist.com/en/viruslist.html?id=61577

 

"Bagle.z does not send copies to addresses containing the text strings below:

....noone@"   Notice noone@ from Bagle.z is similar to the MyDoom virus.   Bad poetry suggesting lovesickness and concerns about survival issue in both poems are found twice in the bagle worm, the first poem is partly from a Joni Mitchell song (President Clinton's Daughter is named after a Mitchell song) and the second seems to be original work. The quote of Joni Mitchell song BIG YELLOW TAXI in this color text below:

 

“When The Trust is Gone So Is The Love That Fades Like the Rain Washing Away All The Sorrows Of Yesterday Why I Ask Myself Must It End Like This Tomorrow, I Tell Myself, I'll Be Okay For Now, I'll Just Live In The Memories Of Our Life Together You don't know what you've got till it's gone *You hurt me more than I deserve, how can you be so cruel? I love you more than you deserve, how can I be such a fool?”

 

http://www.viruslist.com/en/viruses/encyclopedia?virusid=21934

 

In a difficult world

In a nameless time

I want to survive

So, you will be mine

-- Bagle Author,, 29.04.04,
Germany.

 

http://www.viruslist.com/en/viruses/encyclopedia?virusid=49958

 

Sober and Bagle are similar did he (Bill Joy?) do all the major socially engineered blended threats, especially fixated on lovesickness that target Microsoft's operating system, including sobig and loveletter? 

 

Quoting Viruslist.com:

 

“Two new Bagle variants have been spotted today. Both are 36352 bytes in size and are very similar in operation. Actually, the second one looks like a repack of the first variant in order to avoid detection. Both work through a downloader component, which connects to a set of websites and attempts to fetch a file. Just as it usually happens with Sober, the author may choose to upload a trojan with unexepected effects at the "update" URLs. We are currently monitoring them for any changes…

 

http://www.viruslist.com/en/find?objs=vlweblog&words=sober

 

It's two years to the day since the email worm Sobig.c caused a major epidemic.

In 2003, worms from the Sobig family were the most widespread malicious programs on the Internet. Sobig's family tree dates back to January 2003, when Sobig.a was first detected. Sobig.a was a piece of malware using many techniques which would be exploited by other virus writers in the future.

Firstly, something that Sobig.c clearly demonstrated was that spamming malware can create an epidemic. The virus sent itself to millions of addresses around the world in a matter of hours, and spammer technology made this possible. Such techniques are now used by almost every virus writer and Trojan author to distribute their creations. Essentially, the criminal alliance between virus writers and spammers came into being with Sobig.c

Secondly, worms from the Sobig family had a limited life span - they were designed to function for two or three weeks, and then a new version would be released to take its place. Mydoom and Sober worms also use this approach.

Thirdly, Sobig.c infected millions of computers throughout the world, creating an enormous botnet, which was then used to launch new versions of the worm. One of these, Sobig.f was the first case in virus history where a price was placed on the author's head - Microsoft offered half a million dollars for information leading to arrest of Sobig.f and Lovesan's authors. The money remains unclaimed to this day…

Social engineering, a non-technical breach of security that relies heavily on human interaction and tricks users into breaking normal security measures, remains popular among virus writers.

Five years ago today LoveLetter was detected. The worm first appeared in the far east and quickly reached epidemic proportions.

LoveLetter was one of the first, and most notable, examples of social engineering. It arrived as an attachment to an innocent looking e-mail containing the subject line 'I LOVE YOU' (and who doesn't like to receive a love letter?) and the body text 'Kindly check the attached LOVELETTER coming from me'.

In an effort to put unsuspecting users further off their guard, the attachment had a double extension, LOVE-LETTER-FOR-YOU.TXT.vbs. Since Windows Explorer doesn't show extensions by default, it was not obvious that the attachment was anything more than a plain text file. For good measure, LoveLetter also used mIRC to spread and downloaded a password stealing Trojan to the infected machine.

Successful threats (from the author's point of view, that is) typically spawn further variants. LoveLetter's success, together with the fact that the VBS source code for the worm was easily accessible, led to a large number of variants in the months following its release.

Loveletter showed how useful social engineering can be in spreading malware. So it's not surprising that it continues to be widely used. Sober.p, which has caused outbreaks in various western European countries, owes some of its success to social engineering. It arrives as an attachment to infected messages which use a range of subject headers, messages and attachment names in both English and German. Some of the messages appear to promise tickets to the World Cup in 2006 - and who wouldn't want World Cup tickets?” 

http://www.viruslist.com/en/find?search_mode=full&words=LoveLetter+&x=12&y=9

http://www.viruslist.com/en/viruses/encyclopedia?virusid=22539

Birthday seems to be mentioned and fixated on by the possible hacker(s?) in both mydoom.a “Happy Birthday” and cone.b “Birthday” and (IN CHAPTER 6 WE WILL SEE I was going to transfer tech to Bill Joy on his Birthday about 11-8-2001).  See Link Below:

 

http://vil.nai.com/vil/content/v_101029.htm

http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=38540

 

Economic motive is indicated often in the worms, security threats or thefts below:

 

 "Hey, Netsky...don't ruine (sp) our bussiness (sp), wanna start a war?" reads a message in the Bagle.J worm's code, according to Sophos.

A message found in Netsky.F reads: "Skynet AntiVirus -- Bagle - you are a looser (sp)!!!!," and the recent Mydoom.G virus also includes hidden comments critical of the Netsky worm claims  F-Secure.

The back and forth between virus authors started in January when Netsky began removing the Mydoom and Bagle viruses from machines it infected according to Al Huger, senior director of engineering for security response at Symantec.  The Bagle author may have been the more emotionally mature worm author, yet he was only a youth, and it is often the case in the worm wars.  At worst, the worm authors know who each other are and both may be industry insiders both involved in enterprise software, but worm coding may not actually be high level computer programming.  Most of the large worms are eventually removed by another worm author!  Therefore, the anti-worm is common.

1.       The U.S. Government must list all messages in viruses, worms, Trojans an/or blended threats that would likely help others solve the crime about who authored the worm, and they must contact the victims of worms about possible victimization and/or long term theft of property, especially if it has happened for more than a year and/or more than once, including the message containing both words and symbols the Sobig worm (secret 8-byte code), Code Red I and II, and these messages:                                  

 

THE below IS FROM  http://www.viruslist.com/en/viruses/encyclopedia?virusid=61627:

 

Lucky's Av's ;P~. Sasser author gets IT security job and we will work with Mydoom , P2P worms and exploit codes .Also we will attack f-secure,symantec,trendmicro,mcafee , etc. The 11th of march is the skynet day lol . When the beagle and mydoom loose, we wanna stop our activity <== so Where is the Skynet now? lol.

 

THE below IS FROM  Mydoom.b (The worm contains this message, which is never displayed) which I think is about a kill job, and not a signal 9, 11, or 15 that could be considered less violent communication): 

(sync-1.01; andy; I'm just doing my job, nothing personal, sorry)

 

THE below IS FROM  W32/Mydoom.G@mm:

"to netsky's creator(s): imho, skynet is a decentralizedpeer-to-peer neural network. we have seen P2P inSlapper in Sinit only. they may be called skynets,but not your shitty app."

THE below IS FROM  W32/Bagle.J@mm http://193.110.109.62/search?q=wanna+start+a+war&restrict=&client=f-secure_com&proxystylesheet=f-secure_com&output=xml_no_dtd&site=f-secure_com:

"Hey,NetSky, f*** off you bitch, don't ruine our bussiness, wanna start a war?"

 

About Sept 16, 2005 Quoting InternetWeek:

 

 “Panda Software's analysis of the P2Load.a worm showed that after compromising a PC, it modifies the Windows HOSTS file so all attempts to reach google.com -- and even mistyped addresses, such as "googel.com" are redirected to a site actually served from Germany.”

 

Quoting PR Newswire:

 

"The creator of this worm has taken advantage of the importance of a company appearing among the first few links in the search results of an Internet browser," explains Luis Corrons, director of PandaLabs. "Its aims are none other than to increase visits to the pages linked by the creator of this malware or earn an income from companies that want to appear in the first few results in computer where the identity of Google has been spoofed: in both cases, the motivation of the author of this malware is purely financial". 

 

Google had been compromised about the time of its IPO.  Futhermore, according to Hypponen, director of anti-virus research at F-Secure (likely the best researcher around who also suggested that the worm author intended to cause power blackouts with his worms in the United States of America, but this is disputed by others), the "Bagle" also know as “Beagle” also attempts to download an unknown program from about 30 Web sites, most of which are hosted in Germany and Russia; the worm author seems to want others to think he is from Germany, but that could be a diversion, and persons can log onto the Internet anonymously.

 

The unusual quote from Client Server News about July 25, 2005 about the same time Google Wallet was announced asked upon the hacking of CardSystems and stealing, piracy of 40 million sensitive credit cards and/or information they contained is: 

                                                                               

“What OS was CardSystems' using?”

 

This may suggest that they would wonder if backdoors or security problems exist with various operating systems.

 (NOTE TO EDITOR:  Cone.b images (Melinda and Iran), SANTY  image, WITH "SAN" COMPARED WITH "SAN"  IN Blaster message Please show the smiley faces and how it looks on the screen if possible), Beagle (Part of a Joni Mitchell quote from BIG YELLOW TAXI  with the words in it "Paved Paradise… You don't know what you've got till it's gone), Code Red I and II worms, and any other worms that seems to fit the pattern of unsolved cases that may go back 20 years (intentionally unsolved cases for political and/or economic reasons?).

The likely politically and economically motivated Code Red I and Code Red I worms claim to be "Hacked by Chinese" yet they targeted Microsoft Windows 2000 servers and the United States Whitehouse during the Bush administration(attempts to connect to an IP address  'www.whitehouse.gov', and tries to flood it with connection attempts.)  Therefore, it likely would be an competitor of Microsoft’s and NOT the Chinese who would hack the Bush Administration Whitehouse, and Bill Joy was very comfortable with the previous administration, was a Tech Advisor to that administration and likely a key witness in their case against Microsoft.  Joy had an  important role in the Democratic political process during the Clinton Whitehouse Administration (could he even have done hacking for the Clinton Whitehouse?); he has connections with much of the Silicon Computer Industry Valley Group; and a role in the antitrust case against Microsoft, which ironically was considered more important than the merger of  General Electric with Honeywell (denied by the European Union for antitrust reasons); and the amount of money Joy wanted the government to spend Billion of on Research and Development (RD), which Joy would likely personally benefit from economically; whereas Microsoft tends to spend massive amounts on RD.

http://www.viruslist.com/en/viruses/encyclopedia?virusid=23374

See quote below from the link below perhaps suggesting the targeting of sensitive foreign regions usually with Denial of Service:

"The worm randomly selects an alphanumeric character from a list and sends it to www.irna.com 98305 times. It repeats this every 20 seconds"

The possible sensitive site of irna.com seems to be an Iranian news service, which the US could perhaps control, have an interest in, or have CIA agents in place LIKELY SHOULDN’T BE TAMPERED WITH BY A HACKER.

 

AGAIN, Political, economic and personal motives by the hacker may be seen in mydoom.a and cone.b Birthday seems to be mentioned and fixated on by the possible hacker(s?) in  mydoom.a “Happy Birthday” is used and cone.b “Birthday” and (IN CHAPTER 6 WE WILL SEE I was going to transfer tech to Bill Joy on his Birthday about 11-8-2001).  (See Images below from links):

 

http://search.yahoo.com/search?p=cone+Melinda+alongtimeago+birthday&ei=UTF-8&fr=sfp&fl=0&x=wrt

http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=38540

 

MIXED THREATS Chapter 4 COMPARING the messages in the worms or with anonymous anonymous at TheServerSide.com, past interviews with Bill Joy his agenda  Bill Joy: “...just jam...just doodle... Just because…just forget” 

 

“Having just spotted the twister bearing down on her Kansas farm, a stricken-looking Dorothy, Toto in her arms, stands paralyzed in freeze-frame on the projection-TV screen. "Daddy, just let Dorothy play!" pleads his toddler daughter, a Wizard of Oz junkie. Joy, who pauses to give little Maddie a quick tickle, has something else in mind, namely a demo. He's trying to show a visitor how a certain scene in the DVD version of the movie classic looks so much sharper than the same sequence on laserdisk that it actually reveals a subtle technical flaw in the projection TV itself. (Don't ask why. It's a geek thing.) The only problem is, Joy owns so many different kinds of video players that he has to swap cables manually before he can show these video snippets back to back.”

 

The hackers mind set might be compared with the mind set ("I am Oz, the Great and Terrible. Why do you seek me?"   "My dear friends," said Oz, "I pray you not to speak of these little things…

Think of me, and the terrible trouble I'm in at being found out."  The Emerald City could be compared to the Internet or the Entertainment Industry, which in a manner both Bill Joy and Rock Star David Lee Roth are invested interest in or participate in.) that both Bill Joy and Rock Star David Lee Roth espouse in interviews with their comments about the movie The Wizard of Oz and should be compared with quotes from the book and movie The Wizard of Oz below:

 

http://216.109.125.130/search/cache?p=+wizard+of+oz+%22bill+joy%22&ei=UTF-8&n=10&fl=0&u=www.merz-akademie.de/projekte/emma/00S/Linda_MarcOliver/schlender_article.html&w=wizard+oz+%22bill+joy%22&d=RtYOK8p5LR_Y&icp=1&.intl=us 

 

Odin alias Anon, shity, blah, NOTHING, sorry, shitty app, ...,

Often doesn't include commas after If

Viruslist.com - I-Worm.Sober.a 

... .com Privat.exe AntiTrojan.exe Mausi.scr NackiDei.com Anti ...

Odin alias Anon Odin_Worm.exe. Copyright © 1996 - 2004

http://www.viruslist.com/en/viruslist.html?id=302666&printmode=1

Compare “shity” below with “shity” in the link immediately below:

Viruslist.com - I-Worm.Sober.f 

Whole site. Viruses. Malware Description Search. I-Worm.Sober.f. Other versions: . ...

hi its me i've found a shity virus on my pc. check your pc, too ... Kaspersky Lab.

All rights reserved. Email: webmaster@viruslist.com ...

http://www.viruslist.com/en/viruslist.html?id=1290663

 

Joy may have a pattern of diverting attention from important issues (seems to change his stance regard free code or proprietary code when it is convenient for him personally) and this may compare to the possible Pattern of Diversions (sometimes known as redirection web used on the web), both symbolic (and satanic?) that we see in various crimes, even noncomputer, that we see in the region.  We can think of the hacking, blended threats (trojan, virus, worms), mixed threats as diversions (from real competition issues with competators) with many motives and targets.  The way the targets match the targets and agenda of Bill Joy suggests they are done by Bill Joy.  He almost signs his name to them when he signs Cone.b with Bill when referring to Melinda and birthday.  The threats evolve and become increasingly bold, dangerous and then tend to expose the identity of their author because they are similar in style. 

 

We can consider the pattern of the blended threats as resembling threats, often unique that become woven as unique cloth.  The cloth builds on other threats and perhaps the threats of others, but is mostly containing the unique skills and agenda of one author. This cloth has a big agenda and could be used to coverup almost anything in the entire planet and many hide under the cloth because it empowers many others, often to allow them to also commit crimes.  In fact, the author of the threats may have given out code so that others can also commit crimes and/or hack.  What is given out for free may mostly be done to protect the wealth of the author of the so-called free code that may have proprietary code built on free code.   For example:  "Nimda looks for backdoors left by previous IIS worms: Code Red II [IN-2001-09] and sadmind/IIS worm [CA-2001-11]." as stated by CERT® Advisory CA-2001-26 Nimda Worm. It can be compared to a piece of cloth that has a similar unique special threat although the cloth, but with many other unique threats also inclued in the cloth. 

There are a lot of things which sound like "Star Trek" or science fiction, and some of them will actually happen.

 

NOTICE JUST in image BELOW:

http://www.f-secure.com/v-descs/santy_a.shtml  image below from prior link: 

“just want" with "andy; I'm just doing my k[ill?] job" from the following link and further explained in :

http://216.239.63.104/search?q=cache:l1_NuKmOkKIJ:lists.netsys.com/pipermail/full-disclosure/2004-January/016498.html++%22andy%3B+I%27m+just+doing+my+job,+nothing+personal%22&

Below are links of interviews with Bill Joy with HEAVY USE OF THE WORD "JUST" !

 

"just couldn't ...just destroy... Just because... just not... just get ...just jam ...just generally ...just huge"

www.openp2p.com/pub/a/p2p/2001/02/13/joy.html

 

"just their...just a...just being...  Just think...Just as ...just at  just e-mail"

http://news.com.com/Talking%20tech%20with%20Bill%20Joy/2008-1014_3-5647645.html

 

"ed just...Just putting...just documented...just dozens...just don't...just went...just threw...  just spent...just look... just doesn't...just doodle...just say...just forget...just horrible...just finished "

http://www.cs.pdx.edu/~kirkenda/joy84.html

 

NOTICE THE JUST PATTERN IN VARIOUS IMAGES BELOW AND IN THE WORMS MESSAGES:

 

http://www.f-secure.com/v-descs/santy_a.shtml  image below from prior link: 

 

The word “just” is often used by the hacker “just want" with "andy; I'm just doing my k[ill?] job" from the following link and further explained in:http://216.239.63.104/search?q=cache:l1_NuKmOkKIJ:lists.netsys.com/pipermail/full-disclosure/2004-January/016498.html++%22andy%3B+I%27m+just+doing+my+job,+nothing+personal%22&

Bagle-W worm: "I just need a friend", Sophos reports as virus poses as a pot...
Bagle-W worm: "I just need a friend", Sophos reports as virus poses as a potential hot date...
http://www.sophos.com/virusinfo/articles/baglew.htmlThe above is quoted from the following link and the link above about BILL JOY has Bill Joy on the Board of an AV industry TYPE company ("automate security processes for software development and security teams") AND MY SUGGEST PROFIT FROM PERHAPS CREATING WORMS:

http://www.pcworld.com/resource/printable/article/0,aid,115076,00.asp

MyDoom.u, MyDoom.v, and MyDoom.w, said Sophos and F-Secure, include an embedded text string that reads "We searching 4 work in AV industry."

The above is quoted from the following link:

http://66.218.69.11/search/cache?_adv_prop=web&ei=UTF-8&va=symantec.com+job+mydoom&va_vt=any&vp=av+industry&vp_vt=any&vo=We+searching+4+work+in+AV+industry+&vo_vt=any&vd=all&vst=0&vf=all&vm=i&fl=0&n=10&u=www.techweb.com/wire/security/showArticle.jhtml%3FarticleID%3D47204123&w=4+searching+work+av+symantec+.com+job+mydoom+industry+%22av+industry%22&d=88B4B1657A&icp=1&.intl=us

 

Also from the above link, which suggests Joy doesn’t use spell check and anonymous anonymous at TheServerSide.com is full of spelling errors:

 

“JOY: I don't spell things wrong. Except t-h-i-e-r….. I don't need double or spell either.” (note to the editor: t-h-i-e-r and other misspelling exist in many worms?)

Joy seems to act similar to a poet in an interview.

 

Joy

notice that you have source code.
not that you can't get this through disassembly,
and that there are restrictions on what you can do with
the source code, but you certainly can look at it.
wnj

Winer

It's the restrictions that keep Java from moving forward independently of Sun.

Netscape has done something brave. Trusting the outside world to be kind to Navigator. Sun could do the same with Java. Not saying you should, but it might be very good for Java.

Joy

i disagree.
java is object oriented.
you can extend java without modifying the source
by understanding the source and writing appropriate subclasses.
the interfaces are public
you can see the source
you can write the code easily.
we have everything available.
if people don't percieve this is the case
then its because they aren't fully appreciating the
power of object-oriented programming.
limiting yourself to writing subclasses is very powerful
because the class hierarchy promotes compatibility
you extend what the classes can do etc.
hope this helps
wnj

Winer

Java is going to remain a world unto itself as long as you go this route.

We wanted Java code to run beautifully in our environment. Can't do that by adding new objects to your environment.

That's OK, you can do what you want with it since it's your product.

We believe we have the best environment for running this kind of code. We'll do it without your language.

Joy

who is "we"?

Winer

UserLand Software and the developer community we've built around our scripting environment called Frontier.

http://www.scripting.com/frontier5/whatisfrontier.html

Many of our most accomplished users have tried Java, and come back, because of our object database, tools, verb set, website framework, editors.

Frontier is a high level environment, and Java would have been a very nice addition, people want it, but... See my previous message.

Joy

if you need to modify/adapt to java why
not license it?
wnj

Winer

Fair question.

I tried to ask that question, in every way I know how to. I couldn't even get a look at the license agreement. After the agreement became public, I could see a lot of problems. It's a very restrictive agreement. We do joint development with a lot of individuals and other corporations. We'd spend all our time with lawyers trying to figure out how to work together.

I had a clue that the problems were there even when we couldn't see the agreement. We tried to do some work with one of the licensees, and their lawyer told us that to pull it off we'd have to merge with the company. It wasn't worth it, not a good enough reason to do it.

Also, the MS lawsuit, and the disconnect over WORA, make me think we wouldn't do any better with Sun than MS has. We would want to connect Java intimately into our environment, I believe for the betterment of Java. But you would probably sue us, and we can't afford that.

Joy

100+ companies have licensed it.
if java is valuable to you, you should also.
the contract mainly forces compatibility.
thats important for everyone.
wnj

Winer

Instead we'll wire up to Microsoft's Java thru COM and only do it on Windows.


 

Compare writing style of Bill Joy in the links below:

http://www.scripting.com/98/01/stories/emailWithBillJoyAtSun.html

 

Bill Joy recites at SF Poetry Slam Date: Sun, 31 Oct 1999:

 

Free means FREE GODDAMMIT! (the GPL is EVIL
I sit here at my terminal
coding a storm in my vi,
a malloc() for some array,
while strncpy() bounds a check,
but inside I seethe --  inside I rumble,
at all the lines locked up,
and the derived headers claimed with glee,
for I know the caged free()
consumed by the GPL!

Free means FREE GODDAMMIT,
it means I take and offer as I please,
it doesn't mean to taint my work,
just because I swiped some header,
or one little readline,
it's the state of being FREE
as opposed to the state of being NOT FREE

Don't you understand RMS,
the  GPL is
EVIL!,
it's a blight of a free license,
and a virus to behold,
consuming all code afterwards,
in an atomic chain reaction,
like red tide spread across our ocean,
all our oysters now inedible!

Free coders far and wide,
listen to my swan-song by the sea,
for while Solaris kicks BSD's ass,
and my SCSL is a sight to see,
at least BSD and MIT leave code
FREE
unlike that
UNAMERICAN red GPL crap,
with it RMS will suck you dry,
Because Free means
FREE GODDAMMIT!
and
The GPL is EVIL!

http://search.yahoo.com/search?_adv_prop=web&x=op&ei=UTF-8&fr=ush1-mail&va=poet+slam+poetry&va_vt=any&vp=bill+joy+&vp_vt=any&vo_vt=any&ve_vt=any&vd=all&vst=0&vf=all&vm=i&fl=0&n=10

 

Business Week claims “[Bill Joy] will scour for business plans not only in computing but also in fields like alternative energy and new materials.”


From Event Brief of Q1 2004 ADTRAN, Inc. Earnings Conference Call – Final
Fair Disclosure Wire:

 

“ADTN made good progress last year with a 32% revenue increase and a 95% net income increase, which resulted in sequential QtoQ growth…

Q14. I'm wondering if you could provide some color on linearity of sales and orders in the quarter and whether your guidance which is indicating 2.6-5% sequential revenue growth is assuming just kind of flat linearity from the March month. ( Bill Joy (Phonetic) - Kaufman Brothers) A. (Jim Matthews) March quarter as you know is typically more backend loaded than others. Again, given the reasons that Mark explained earlier in the call. So, January was low and March was higher. In terms of 2Q and really the other quarters within the fiscal year, month-to-month is pretty much random as far as linearity. But never to the point of how the March quarter is in terms of being more backend loaded.

Q15. Is there any percentage you could put into what the March quarter looked like? ( Bill Joy - Kaufman Brothers) A. (Jim Matthews) I doon't have that before me.

Q16. In terms of lead-time, your ability to deliver on an order typically for your mature products, I guess is seven days; can you give something comparable for the newer products including DSLAMs and optical products? ( Bill Joy - Kaufman Brothers) A. (Jim Matthews) We try to stick to the same range of 7-10 days for all of our products. As we gain more experience in terms of order flow, we can better predict what will happen in the near term and plan our supply chain accordingly. So, we are always focused on maintaining that perhaps pretty much worse case lead-time of 7-10 days.

 

From The Ecologist, Oct 2000, article titled DISCOMFORT AND JOY.(Bill Joy and vision of the future): 

 

 “'If someone is doing biological, chemical, nuclear, genetic, robotic or nanotech weapons of mass destruction [for example], then that is of global interest. One thing is for sure – we urgently need to set up a world regulatory body if only to protect us from ourselves.'

Joy likes the idea of international regulation of new technologies, and it
features heavily in his thinking, such as it is, about tackling the problems
of potential runaway technology. 'The situation in ancient
Greece,' he says, 'was that the community was governed by people drawn by lot. Perhaps we could set up an international council on the same basis, continuously selecting new faces to avoid possible co-option. Obviously if it is business dominated and consequently biased, it won't accomplish the task.'”

 

From Fortune, Sept 29, 2003, article titled  “An Ode to Joy: Sun legend Bill Joy reflects on his career and moving on” (First)(co-founder of Sun Microsystems)(Interview)”
by  Brent Schlender:

 

"To be honest, I can't believe I lasted this long," says Bill Joy. "It seems
like I've been working on the same basic problems since college… In many ways Joy resembles a geek from central casting--his nebula of tousled
hair and piercing eyes give him the look of a mad scientist

 

Beyond his day job, Joy has owned a San Francisco gallery specializing in primitive art, advised Bill Clinton on technology policy, dabbled in cattle ranching, and taught himself Spanish.

A voracious reader, Joy likes to open a novel and start reading from the
middle, just to see if he can figure out what happened in the earlier pages of the book. And when he decided he needed to lose some weight a few years ago, he started drinking copious amounts of coffee to quell his hunger pangs. He lost over 30 pounds.”

 

From Newsweek, Feb 23, 2004:

 

“Why aren't there more start-ups with great ideas?

I think it's punctuated equilibrium, where some change happens and then a burst of creativity leaps out. After the microprocessor, you saw a burst of
companies, and then you saw the PC and the burst of companies, and then you saw the Net and a burst of companies. I think people have since been searching for something which would create another burst of innovation.

 

What's the status of your book on the danger of new technologies?

It's on hold. September 11 changed the need from being a diagnosis book to a prescription book. And so I put it down in hopes of returning to it when I felt like I had an angle on the whole thing that I could carry through to a
complete treatment
.”

 

Electronic Engineering Times, March 18, 1996, reports:

 

“Sun Microsystems co-founder and VP of Research Bill Joy says the
Java programming language that adds animation and other features to Web pages will eventually transform the Internet into one big operating system.”

 

 

The Source of the quotes below are Government Computer News, Nov 8, 1999:

“GCN: How bad do you think year 2000 will be?

JOY: As long as the power stays up, we'll be fine.

 

  • Worst job: "Digging sewers as a summer job."”

 

Sm@rt Reseller, July 26, 1999 article titled ‘Who's Really Behind Jini?(Bill Joy may not deserve credit):

 

A SUN ENGINEER TELLS us that chief scientist Bill Joy did not invent Jini.
This, despite the fact that Joy was paraded at Sun's JavaOne conference last
month, surrounded by cameramen, handlers and various lackeys.

Our tipster wasn't amused. "Perhaps I'm just being sensitive after four years
on the Java team at Sun watching folks get credit for work they had little to
do with
," writes the engineer. "Bill Joy is an incredible asset to Sun and is
a true genius, but his genius lies in quickly grasping the potential of small
projects such as Java and Jini, applying them to very large problem domains,
and communicating those solutions to the world.
"

So hats off to those at Sun who really invented Jini, including our anonymous
tipster.

 

Business Week, March 8, 1999, writes:

 

``What we need to create is a Silicon Continent, not just Silicon Valley.''
--Sun Microsystems co-founder Bill Joy, innn The New York Times, seeking more government funds for high-tech research.

 

Sourced from Computergram International, Dec 7, 1998:

 

We think that Sun is hoping that Joy's maxim: 'expect innovation to happen elsewhere' doesn't apply in his new position.

 

From Fortune publication, in issue dated November 26, 2001:

 

We're uncomfortable because we're perceiving things we didn't see before. But they were there all along. Is that a bad thing? I don't think so. People feel sad because they now know the way the world always was. That's sad but healthy.

 

Sadmind daemon, perhaps an outrageous personalization of the root or administrator privileges, is used for what is typically called "root" in Sun Operating system and stands for SAD is distributed system administration operations first letters backwards within the Solstice AdminSuite.  A serious security flaw in several versions of both Solaris and Trusted Solaris exist that make it possible for virtually any remote or local user to gain root privileges on a vulnerable machine, which allows administrators to perform remote administration tasks using the Sadmind daemon. The Sadmind daemon is installed by default on most installations of Solaris, which uses a weak authentication scheme allowing an attacker to send a series of special Remote Procedure Call (RPC) packets to the daemon to forge a client's identity.

 

Sun Fire seems to be word play on Mozilla's Foxfire. "Fire" is spooky imagery to have in a communications product name!   Sun Fire systems running the Solaris and Linux operating systems.  A flaw in Sun's Java Virtual Machine can open up the two most popular browsers, Microsoft's Internet Explorer and Mozilla's Firefox, to attack, claimsisecurity researchers by allowing connection between the browser and the Java and JavaScript platform.  The bug (CONVENIENTLY?) exists in Java, so it is not limited to one browser, but the exploit does not seem work on Opera Software's Opera browser.  There is an exploit is located in Sun Network Services Library, which enables developers to incorporate XDR (External Data Representation) into their applications by allowing a remote attacker to execute code on a user's machine.  Sun Microsystems Federal has released Trusted Solaris 2.5.1 OS, targeted at federal agencies that have stringent security requirements. Later Sun plans for Trusted Solaris to be use by the commercial sector.

 

Contains the similar message the Copyright(C) concept also seen in an image in cone.b worm: "Concept Virus(CV) V.6, Copyright(C)2001, (This's CV, No Nimda.)"  Again in the worms we see wordplays of reversing the letters of words, which seems to be a pattern of Bill Joy, such as "Nimda" ("Admin" backwards) opens all disks installed on an infected computer for full access.  Extra (similar to Juxta?) is similar as a word play to create the word "Netra" (Netra is Sun's line of Internet servers).

 

Kaspersky Labs reports "Nimda" ("Admin" backwards) " penetrates a computer in several different ways:

 

“First of all, via e-mail: an infected e-mail in HTML format, containing several embedded objects enters a target computer. Upon viewing the e-mail, one of the objects automatically starts up unbeknownst to the user. In order to accomplish this, the worm exploits a breach in Internet Explorer security that was first detected in March of this year.

Second of all, while surfing infected Web sites: In place of the original Web site, a user is shown its modified version containing a malicious Java program, which downloads and starts the "Nimda" copy on a remote computer, using the aforementioned breach.

Thirdly, via the local network: the worm scans all accessible network resources, dropping thousands of its copies here. This is done with the idea that upon finding the file on a disk or server, a user will single-handedly infect his/her own computer.

In addition to penetrating workstations, "Nimda" also carries out an attack on Web servers running under Microsoft Internet Information Server (IIS). The method for infecting IIS servers is identical to "BlueCode." The malicious program gains access to the hard disk of a remote server, downloads its file here from a previously infected computer, and then starts it. In order to accomplish this, it exploits a breach in IIS called "Web Server Folder Traversal" as described in the corresponding Microsoft announcement.”

 

“Kaspersky give you the W32.Klez.E removal tools” message is similar to message in MyDoom worm which gives a name to the worm of “Virus Alert: W32.Nodoom.A@mm”.
 

The worm author and Bill Joy is known for his word plays: nimba is admin backwards; jini is usually spelled Genie; Java was first called Oak; Jxta fits the pattern of putting “J” as in “Joy” for product name.  Mad Hatter and Sadmind may also be his revealing product names..

 

 

THEREFORE, THE LOGIC HERE IS INCONSISTENT, AND LIKELY SO SPECIFIC TO PERHAPS ONLY BILL JOY'S AGENDA.  I DOUBT ANYONE IS FRAMING BILL JOY, AND THIS MAY ALSO MAKE HIM A PRIME SUSPECT IN A RITUAL HUMAN SACRIFICE CULT. Worms seem to support an agenda of sacrifice.

 

Did Bill Joy, cofounder of Sun Microsystems, use AOL computers to perhaps spread Viruses, Worms, Trojans & hack various government computers & defraud the insurance industry? http://informexp.com/SCO.htm http://informexp.com/Blendedthreats.htm

 

Very short mention of the anti-worms and their agenda of nonsacrifice.

 

BLENDED THREATS Chapter 5 Reviewing the past of Bill Joy:

 

There were about 5 reasons stated for the 22 hour crash of Ebay hosted using Sun Servers (lack of fans, lack of air conditioning of the servers, poor patches, poor coding, and lastly the CEO stated she hired and expersive security expert!

 

“$150,000.  That’s a lot of money.  I don’t actually know what happened to all the money.” 

A quarter of a million dollars in revenue is a great deal of money for a graduate student. Scott McNealy likes to say: ‘To ask permission is to seek denial.’” 

 

Did Bill Joy stole from CAL by using their postage machine? To place a stamp or mark on (a piece of mail) to show the payment of postage.or the government's free postage "frank".

"I franked it with the department frank so I didn’t have to pay for postage"

www.cwhonors.org/archives/histories/BechtolsheimandJoy.pdf

 

His poetry reading advocating software be free.

Various interviews or book reviews he did or he gave.

Wired article about the planet perhaps becoming grey goo due to his theory that Genetic Engineering, nanotech, and Robots or bots will combine into green goo, and how this may mirror turning hard drives into grey goo thru data theft of information on hard drives.  SHOULDN'T THE planet have turned into brown or black goo? 

 

Please compare POSSIBLE DIFFERENT AMOUNTS OF MONEY made and page 19 comment about being a State of California employee in FIRST link below WITH THE SECOND LINK BELOW (Does the State own the UNIX code that Sun Microsystems uses, and does Bill Joy owe the State of California licensing fees for product created on State of California Property and/or do both owe the State and/or Federal Government income taxes?) with the other link about free software from Bill Joy poem about the need for free software, and then the last link about Companies licensing Java, which suggests software needs to be free when it is convenient for Joy.

 

Compare page 19 quote from link below  with A quarter of a million  from the next link “$150,000.  That’s a lot of money.  I don’t actually know what happen to all the money.”:  http://www.cwheroes.org/oral_history_archive/bechtolsheim_joy/BecJoy.pdf

 

Compare page 2 quote from the link below with the partly highlighted ”A quarter of a million dollars in revenue is a great deal of money for a graduate student. Scott McNealy likes to say: "To ask permission is to seek denial."”:

http://216.109.125.130/search/cache?_adv_prop=web&ei=UTF-8&va=linux+bill+joy+To+ask+permission+is+to+seek+denial+&va_vt=any&vp=A+quarter+of+a+million+dollars+in+revenue&vp_vt=any&vd=all&vst=0&vf=all&vm=i&fl=0&n=10&u=www.linux-mag.com/1999-11/joy_01.html&w=linux+bill+joy+ask+permission+seek+denial+%22a+quarter+of+a+million%22&d=8C6CA91055&icp=1&.intl=us

http://search.yahoo.com/search?_adv_prop=web&x=op&ei=UTF-8&va=UNIX+Review&va_vt=any&vp=Peter+Weinberger+&vp_vt=any&vo_vt=any&ve_vt=any&vd=all&vst=0&vf=all&vm=i&fl=0&n=10

 

http://search.yahoo.com/search?_adv_prop=web&x=op&ei=UTF-8&va=UNIX+Review&va_vt=any&vp=Peter+Weinberger&vp_vt=any&vo=patches&vo_vt=any&ve_vt=any&vd=all&vst=0&vf=all&vm=i&fl=0&n=10

 

The UNIX Review Interview with Bill Joy by P. Weinberger head of the Computing Techniques Research Department at AT&T Bell Labs Weinberger SEEMS STUNNINGLY UNIMPRESSED WITH BILL JOY AND SUGGESTS HE IS LYING AND DOES NOT DO MUCH OPERATING SYSTEM CODING about  April 1988:

REVIEW Actually, the only reason I much care about kernel size is that, all
things being roughly equal, bigger systems tend to be buggier systems.

JOY What can I say, Peter? There's a huge amount of networking code in BSD
because we set out originally to network everything together...

REVIEW You did not! All you did was implement the Internet stuff!

JOY We made a list of all the protocols: SNA, X.25...

REVIEW That may be, but the way it worked out, you ended up just doing the
Internet
. All your multiplexing, for instance, is done just the way the
Internet did it. Look at how hard those poor
Berkeley folks had to work just
to stick in the Xerox protocols, which actually are very simple.


JOY Well, Peter, things are hard.

REVIEW Things aren't that hard!

...

 

REVIEW Are you going to be writing code yourself?

JOY That would be fun. I'll probably end up drafting some pieces of the
system, and then people will have a great time ripping them to shreds and
throwing them away.
That's what's already happened around here with a number
of things. Still, the effect is that you push people in a certain direction
by providing them with examples...

 

JOY No. Armies of people are already at work on that reconciliation process.
And, believe me, they have lots of tradeoffs to consider. There's the choice
between sockets and Streams, for starters; we'll be going with Streams,
because that's very important to AT&T, and we don't really care. And then
there are decisions that have to do with more precise timers and asynchronous
I/O. Single solutions will have to be found to each of these things, and that
will require negotiation: you know, you throw something away, they throw
something away, and then people live happily ever after. Even before we
signed the contract with AT&T, we already had a basic agreement on how to
reconcile 90-some percent of the differences. It's just going to take a lot
of work. But it's worth the effort because we just can't afford to have six
English versions of grep, six French versions of grep, and so forth and so on.

REVIEW Who are the principals of Phase 2 going to be?

JOY The normal cast of System V characters at AT&T.

Fact checker: Abstract: Bill Joy is V.P. of Research and Development at Sun Microsystems.
He authored the C shell and the vi editor for UNIX at
Berkeley, and was in charge of the Berkeley design team that created the virtual memory architecture. At Sun, which he helped found, he created the SunOS operating system and the industry-standard network file system (NFS). He also made contributions to the development of the Sun Sparc processor. Now he will head
up a team from Sun and AT & T to create a new UNIX system for the 90s. Interviewer Peter Weinberger is the in
Murray Hill, NJ, and has made many contributions to UNIX over the years including the Version 9 file system, the awk tool, and lcomp. A wide ranging interview between the two is reported, with reactions and disagreements on various subjects.

 

Joy seems to know that he took both ed and em code and added a simple visual editor to create vi as evidenced by the following quotes: ‘‘But fundamentally, vi is still ed inside.’’ “So Chuck and I looked at that and we hacked on em for a while, and eventually we ripped the stuff out of em and put some of it into what was then called en, which was really ed with some em features.”What happened is that Ken Thompson came to Berkeley and brought this broken Pascal system, and we got this summer job to fix it. While we were fixing it, we got frustrated with the editor we were using which was named ed. ed is certainly frustrating.”

 

Joy clearly understands that people use what they can afford and NOT THE BEST PRODUCT AND HE ALSO UNDERSTANDS HIS PRODUCTS AND INFERIOR AND TOO COMPLICATED TO USE as evidenced by the following quotes:  EMACS is a nice editor too, but because it costs hundreds of dollars, there will always be people who won't buy it.” I think the wonderful thing about vi is that it has such a good market share because we gave it away.”  “I got tired of people complaining that it was too hard to use UNIX because the editor was too complicated.  I think the hard thing about all these tools is that it takes a fair amount of effort to become proficient.  I'm used to having a 24-line terminal with no ability to scroll back.I wish we hadn't used all the keys on the keyboard.That lack of programmability is probably what ultimately will doom vi.” “It can't extend its domain.” “The fundamental problem with vi is that it doesn't have a mouse and therefore you've got all these commands.”The point is that you want to have a system that is responsive.”

Bill clearly understands that functional and programmable products are needed, but refuses to do the work to complete projects as evidenced by the following quotes:  The problem was I spent all my time programming it because it was improving so fast that my programs kept breaking.” “It doesn't really have a unified concept.” “I got tired of maintaining my macros so I guess I'm looking forward to an editor I can learn and then forget about.” I think multiple levels of undo would be wonderful, too.”  “Having editing functionality everywhere would be great in the same sense that it would be nice to have history everywhere. What actually happened was that I was in the process of adding multiwindows to vi when we installed our VAX, which would have been in December of '78.” “Document preparation systems will also require large screen displays.”I got tired of maintaining my macros so I guess I'm looking forward to an editor I can learn and then forget about.” “Just putting the termcap entries in that people would mail me would take hours a week, and I was tired after three or four years”.

 

Joy is inconsistent and/or deceitful about what products he uses or he admits he uses other person’s better products as evidenced by the following quotes: “I actually use vi for editing programs.  “I think one of the interesting things is that vi is really a mode-based editor.” “One of the good things about EMACS, though, is its programmability and the modelessness.” “I tried to use EMACS and I liked it  “The reason I use ed is that I don't want to lose what's on the screen.I use Interleaf for all my documentation.” “Interleaf is based on the formatting process.” “It is formatted, and I'm tired of using vi. I get really bored.”  Interleaf is very nice. I expect there to be a lot of competition for programs like that.”  “The trouble is that UNIX is not accessible, not transparent in the way that Interleaf is, where you sit down and start poking around in the menu and explore the whole system.”

 

Joy knows that using windows would be the needed sophisticate needed in editing products in the future as evidenced by the following quotes: “I used to have a Concept terminal which had eight pages of memory, like a mini-version of a window system.” “I had almost rewritten all of the display code for windows, and that was when I gave up.”  What actually happened was that I was in the process of adding multiwindows to vi when we installed our VAX, which would have been in December of '78.”I just don't like to lose what's in the window.” “I'm looking forward to the editor that's going to be embedded in the window system Warren Teitelman is working on.”  “If that scrunch had not happened, vi would have multiple windows, and I might have put in some programmability - but I don't know.”

 

Joy’s role seems to be more of a specification author, or the vision or publicity person, rather than that of a programmer as evidenced by the following quotes: “I don't like reading things that have been heavily dictionized because they don't flow.”  But no, I don't generally have trouble with spelling mistakes.”But with Interleaf I don't even have a spell program.I got really big into writing manual pages, so I wrote manual pages for all the great features we were going to do but never implemented.

 

Joy wrote a very primitive visual display text type editor using keys rather than bitmaps or use with a mouse  in about two days that likely took little  concentrated effort because he was also watching television at the time and it likely resembled programming keys on a computer evidenced by the following quotes: I started to write a new editor not too long ago and had it about half done after two days.“I remember right after Carter got elected, I was sitting in my apartment in Albany, CA, on a Saturday listening to people call Carter and ask stupid questions while I designed the screen editor.”I stopped working on it whenever they made the reference cards - '78 - '79 - and I really haven't worked on it for five years.”   Just putting the termcap entries in that people would mail me would take hours a week, and I was tired after three or four years.

 

Joy doesn’t seem to understand that programming bitmapping is more complex that most would think to interact with must work with other media, such as printers and peripherals, as evidenced by the following quotes: “I think the Macintosh proves that everyone can have a bitmapped display.  Bitmap display is media compatible with dot matrix or laser printers.”  “It's ultimately the media and the set of peripherals that you have on your machine that affects what the user sees.”

Joy is used to using the Open source community and university low level employees to do his programming for him and perhaps stealing code from his competitors as he seems to have done so all his live as evidenced by the following quotes: “I think editors have to come out of a certain kind of community.” “Really, what started it all was that we got some ADM-3As to do screen editing.”

 

Sophisticated products are simple, rather than complex, but Joy refuses to do the work to create them as evidenced by the following quotes: “Yesterday I had my tech guy come to the house and disconnect my Sun network, and tomorrow I'm having them shut down my company e-mail account. Well, limbo is not a good place to be.”  “Since I sort of invented the editor that was most complicated, I thought I would compensate by also designing the editor that was most simple.” “Systems are going to get a lot more sophisticated.”

 

McKusick also seems unimpressed with Bill Joy’s coding abilities and calls his code ugly.  McKusick works for IBM and IBM’s servers are twice as fast as Sun Servers at half the cost.  Therefore, McKusick and Weinberger may NOT be guilty of professional envy, but may actually have much better products.

 

Partly to notice communication and writing style, and means to get free code, compare quotes “at least BSD and MIT leave code FREE” and “Solaris kicks BSD's ass” from the link below with the quote with different motive to license code “100+ companies have licensed it.” from the next link below: http://216.109.125.130/search/cache?_adv_prop=web&ei=UTF-8&va=poet+slam+poetry+bill+joy&va_vt=any&vp=+Solaris+kicks+BSD%27s+ass&vp_vt=any&vo=Free+BSD&vo_vt=any&vd=all&vst=0&vf=all&vm=i&fl=0&n=10&u=clug.chicago.il.us/list/1199/0317.html&w=poet+slam+poetry+bill+joy+free+bsd+%22solaris+kicks+bsd%27s+ass%22&d=611C936556&icp=1&.intl=us

Compare quote from the link below “100+ companies have licensed it.”:

http://www.scripting.com/98/01/stories/emailWithBillJoyAtSun.html.

My understanding is that in a Fortune article Bill Joy’s comment about his daughter being addicted the movie "Wizard of Oz" might suggest that Joy himself is a hacker and is getting his daughter to accept addiction and that he might be encouraging his daughter to accept that he may be involved in unethical use of the web. 

 

Joy’s strange sending my own sayit.com card back to me without opening the card I sent him made me increasingly more suspicious of him, but this has escalated more and more, due to many, many strange events.

 

EBay crashing and perhaps five different reasons or stories for that: patches problem, fan problem, unairconditioned environment, recoding of software needed, CEO OF EBAY HIRED A SECURITY EXPERT (COULD HAVE BILL JOY INTENTIONALLY CRASHED EBAY TO GET A BETTER DEAL FOR SUN?). 

 

venus.EBay.Sun.COM [129.150.69.5] is venus a mirror of earth (below) suggesting back door?
earth.EBay.Sun.COM             Crashed after [129.150.69.3] or [129.150.69.1] ?  private?
Received: from earth.sun.com (earth.EBay.Sun.COM [129.150.69.
3]) by Eng.Sun.COM

 

Two different stories about amount of money he received or didn't receive for operating system while at CAL; different stories about what he did at CAL verses the current licensing fees at CAL along with a short explanation about software driving the economy based on The Atlantic Monthly article, Kept University The Atlantic Monthly article and framing a CAL student to get their tech partly due to the poverty of CAL due to lack of licensing fees, compare other universities licensing fee revenue, and a cover Tech Review article explaining almost all software in poorly designs and buggy.

 

Joy as the driver of bad, inconsistent technical strategy at Sun, and actually having only his name on a few patents. Joy as a credit taker.  Bad Names and release dates for products.

 

Hopefully, showing an evolution of Bill Joy's physical appearance using photographs.  It would be good to get the rights to the photo of Joy with writing on his face and sweating during a presentation with wild hair (AP has rights to that I think).

 

His important role in the political process, his connections, and ironic role in the antitrust case against Microsoft, with a short comparison of the GE/Honeywell antitrust case at the time, and the amount of money Joy wanted the government to spend of RD compared to the amount of money Microsoft spends on RD.

 

The pretty blonde female editor of Wired no longer there, and was in Vogue with photos of her children likely as a desperation measure after publishing Joy's article that started with him in a bar discussing if computers had consciousness, mentioned Woody Allen, had a full page vanity photo of him where he looked somewhat similar to a wayward warlock wearing a black suit, and ended mentioning getting a spell out of a stone:

 

"So I'm still searching; there are many more things to learn. Whether we are to succeed or fail, to survive or fall victim to these technologies, is not yet decided. I'm up late again - it's almost 6 am. I'm trying to imagine some better answers, to break the spell and free them from the stone."

 

Later, he was on Charlie Rose in an interview with his friends explaining that his Grey Goo theory similar to the Smurf Episode of Star Trek (about how nanotech, robots, and Genetic Engineering would get out of control, combine, and turn the planet into grey goo.  Grey is the color of hard drives and the hacker may be acting out during hard drives into grey goo.  Grey would likely be a strange color for the planet to turn into--brown would be a more likely color, or even black.). Star Trek is also mentioned in the article along with too much personal information that made his seem more similar to a cult leader and less similar to a scientist:

 

 "Thursday nights my parents went bowling, and we kids stayed home alone. It was the night of Gene Roddenberry's original Star Trek, and the program made a big impression on me." and in another interview Joy mentions Star Trek again.

 

“And what do you think it will take to make those kinds of things a reality rather than a general theory or concept?
Joy: Well, I don't know. Just think of a "Star Trek" DVD at the store, and you'll see all sorts of stuff on there that we don't have. “

http://news.com.com/Talking+tech+with+Bill+Joy/2008-1014_3-5647645.html 

“Insecure software is a big issue, and the problems exposed by today’s hackers and malicious insiders are just the tip of the iceberg.”

Bill Joy, Co-founder, Sun Microsystems.  The above is from the following link:

http://66.218.69.11/search/cache?_adv_prop=web&ei=UTF-8&va=insiders+malicious&va_vt=any&vp=bill+joy&vp_vt=any&vd=all&vst=0&vf=all&vm=i&fl=0&n=10&u=www.fortifysoftware.com/events&w=insiders+malicious+%22bill+joy%22&d=EC221204B4&icp=1&.intl=us

The above is quoted from the following link and the link above about BILL JOY has Bill Joy on the Board of an AV industry TYPE company ("automate security processes for software development and security teams") AND MY SUGGEST PROFIT FROM PERHAPS CREATING WORMS:

http://www.pcworld.com/resource/printable/article/0,aid,115076,00.asp

 

The CEO of Google may have a very deep and profitable relationship with Bill Joy that may go far beyond his relationship with the founders of Google who are alleged in the recent Vanity Fair to NOT treat the CEO well, who has more education than them likely, a Ph.D. from CAL and is Joy’s friend from CAL.  Could Joy have stolen ad technology from Yahoo and given it to Google’s CEO, which was litigated about?  Could Joy use a worm to help depress Google stock price to help benefit the CEO of Google, and could Joy want to do a Credit Card service for Google?  If Joy hacked Ebay and did hacking to partly frame Martha Stewart to perhaps manipulate stock prices for companies he had an interest in, would he be guilty of insider stock manipulation?  Hacking for profit could be pattern of Bill Joy.

 

Eric Schmidt, Google CEO, said "This is clearly great news for the industry: Bill Joy has a rare talent to see where technology is moving and how it will impact society. He is an inspired addition to the already impressive KPCB team."  "KPCB has backed ....AOL...Google."

 

The above is quoted from the following link with suggests Joy may have ties to Google and AOL and could perhaps use their computers for improper purposes and both may use Sun Hardware:

http://66.218.69.11/search/cache?_adv_prop=web&ei=UTF-8&va=google+schmidt&va_vt=any&vp=BILL+JOY&vp_vt=any&vd=all&vst=0&vf=all&vm=i&fl=0&n=10&u=www.kpcb.com/news/article.php%3Ffrm_id%3D52&w=google+schmidt+%22bill+joy%22&d=8BA6F537B3&icp=1&.intl=us

 

The quote below suggests that Eric Schmidt, Google CEO, uses some strange language “bowels of the company” in reference to Google, which may suggest dirty business practices!

 

"You can't know what we are really up to until you are in the bowels of the company," Schmidt said during a recent interview with The Associated Press.”

http://www.cnn.com/2005/TECH/internet/10/03/growing.google.ap/

 

The following link may suggest that Google uses Sun Ultra 2 UltraSPARC-II.

http://66.218.69.11/search/cache?_adv_prop=web&ei=UTF-8&va=google&va_vt=any&vp=Sun+Ultra+2+UltraSPARC-II+&vp_vt=any&vd=all&vst=0&vf=all&vm=i&fl=0&n=10&u=www.net-kitchen.com/pipermail/suns-at-home/2001-August/001472.html&w=google+%22sun+ultra+2+ultrasparc+ii%22&d=A33B45F612&icp=1&.intl=us

 

Could Bill Joy co-founder of Sun Microsystems be the author of the MyDoom, Cone.b and all the worms with similar characteristics as those (avoids Google, has political, and personal messages)? Could the conflict also be about complex non-computer related security issues?  Does he have remote control OF my computer sessions, along with other officials?  Does Bill Joy have a pattern of at sabotage to relationships (or attempt to sabotage my relationships) with schools, government officials, email hosts, web hosts, law firms, and/or hack brojon.org website hosted by Yahoo and Tucows while spoofing Albanians (likely benefactor off oil pipeline from Middle East Conflict?) rand leave a hotmail email address (doubt they need an hotmail email address because it is a communist country unlikely to prosecute crimes against Western Nations)?  Is there a pattern of framing and/or exploiting the communists and/or aligning himself with dictators.

 

Here is proof of Sun server names PATAN AND LUKLA SEEM TO BE NEPAL LOCATION NAMES:

 

patan.Central.Sun.COM [129.147.5.43] and lukla.Central.Sun.COM [129.147.5.31]

 

http://search.yahoo.com/search?p=patan.Central.Sun.COM+%5B129.147.5.43%5D&prssweb=Search&ei=UTF-8&n=10&fl=0&x=wrt

http://search.yahoo.com/search?p=lukla.Central.Sun.COM&ei=UTF-8&n=10&fl=0&x=wrt

The following link may suggest that Joy has an interest in:   innovation is in internet web services, software, architectures, energy, material science, info/life sciences - or entirely new fields”. 

David Gelernter wrote in the New York Times Magazine that Bill Joy had his daughter watching Seven Brides for Seven Brothers, which Ted Turner owns after he bought MGM  

for about one-and-a-half-billion dollars because he wanted the MGM film library, WHICH INCLUED "Seven Brides for Seven Brothers". TED TURNER HAS BEEN KNOWN TO HAVE PROBLEMS WITH FEMALES, SEEM SEXIST (has been divorced from the equally politically controversial actress Jane Fonda after allegedly cheating on her.), and even seem ecologically hypocritical due to his selling gas that he has on his land, AND HAVE ANNOYED OTHERS DUE TO COLORIZING CLASSIC BLACK AND WHITE FILMS.   Turner also had a large involvement as an owner and officer in AOL.  Turner's CNN may have aired faked scud missile hits during the Gulf war.  Turner may have a history of being untruthful, especially about politically sensitive information (even involving Jewish persons), and gave about a Billion dollars to the United Nations.

David Gelernter was the target of UNABOMBER FOR USING THE WORD "ENVITABLE" in reference to computer domination of modern culture IN HIS BOOK MIRROR WORLDS AND IS BILL JOYS FRIEND, and tends to write very shallow books and articles, sometimes about computers.  Unabomber blew off some of Gelernter's fingers.  Ironically, Bill Joy mentioned Unabomber in his Wired quasi-ecological article about how the planet might turn into gray goo due to possible out-of-control combining of Genetic Engineering, robots and nanotech, but recently likely talked about that in a Keynote speech at a conference at MIT, which may actually be an attempt to find new technology to invest in for his investment capital job.

The plot of the often well reviewed and sometimes mentioned as classic Seven Brides for Seven Brothers condones kidnapping females for the purpose of luring them into the backwoods and is summarized as follows:

Adam, the eldest of seven brothers, goes to town to get a wife, and immediately convinces Milly to marry him. They return to his backwoods home where she learns he has six brothers!  All the brothers live in her new husband's cabin with her and her husband. Milly sets out to reform the uncouth siblings so they too may get wives of their own, and they decide to kidnap their brides after reading about the Roman capture of the Sabine women.

Often, Bill Joy and his possible friends and interests seem inconsistent in their viewpoints, and may have very conservative or archaic ideas about technology and culture, especially females.  They may almost brainwash females to tolerating some possible illegal behavior.

http://en.wikipedia.org/wiki/Metro-Goldwyn-Mayer#MGM.2FUA.2C_Turner_and_Pathe

Plot Summary for Seven Brides for Seven Brothers (1954)

Adam, the eldest of seven brothers, goes to town to get a wife. He convinces Milly to marry him that same day. They return to his backwoods home. Only then does she discover he has six brothers -- all living in his cabin. Milly sets outt to reform the uncouth siblings, who are anxious to get wives of their own. Then, after reading about the Roman capture of the Sabine women, Adam develops an inspired solution to his brothers' loneliness . . . kidnap the women they want!

 

http://66.218.69.11/search/cache?_adv_prop=web&ei=UTF-8&va=colorize&va_vt=any&vp=ted+turner&vp_vt=any&vo=Seven+Brides+for+Seven+Brothers+&vo_vt=any&vd=all&vst=0&vf=all&vm=i&fl=0&n=10&u=www.newomen.com/amaz+info-ASIN-B00049QQ78.html&w=brides+seven+colorize+seven+brothers+%22ted+turner%22&d=d-_iY2FULnZW&icp=1&.intl=us

 

                        b. Suspected pattern of extortion and/or an attempt to defraud in order frighten others into submitting to the desires of perhaps William N. Joy, cofounder of SUN MICROSYSTEMS AND PERSONS WHO MAY HAVE MISAPPROPRIATED THE AT&T kernel of their Operating system and/or received UNJUST compensation for possible minor improvements in the  Kernel and/or additions to the kernel and/or may have not properly paid taxes on the kernel and/or not paid licensing fees to the Federal government for the government’s DARPA CONTRACT WITH THE UNIVERSITY OF CALIFORNIA WHEN HE WAS AN EMPLOYEE WORKING ON THE DARPA CONTRACT and/or his agents, masters, associates and/or entities he has dealing with or profits from or gets resources from and/or has the ability to violate their security systems using a series of crimes that seem to be done for political, environmental, and/or economic benefit or intimidation that may consist of:

                                                I.   "sync-1...o.01; andy.I'm just doing myk....ob, noth.personal.....}rry) BG@" was a possible (different versions of the translation exist) translated message contained in the MyDoom worm which may refer to Sun Microsystems Co-founder Andy Bechtolsheim.  Futhermore, “be_loyal:” is mentioned as an avoided string along with GOOGLE AND OTHER POSSIBLE LOYAL ENTITIES TO BE PROTECTED OR FEARED.   Andy Bechtolsheim may have knowledge about where Bill Joy could have access to computers to upload the worm. 

 

Exhibit(s) 13-16 are information about the MyDoom worm.

 

                                                II.    The recent arsons (about 17 residences mostly on weekends from about 2a.m. to 4a.m., sometimes 4 in a single night.) in Redwood City perhaps to encourage the city to authorize the installation of wireless, underground fiberoptic and/or powerlines.  Lopping of Redwood City street trees with "USA" written at about the height of city street signs where the arsons were committed perhaps as directional markers to the arsons and the motive for the arsons,  which seems to be a broad comment about waste (often on them in what may be chalk used by the utility industry) between about Woodside Road and Jefferson in the center divide usually between or next to vehicle dealerships or businesses geared to the automobile industry, such as Firestone and the "USA" written on them may be in handwriting resembling other writing by Bill Joy found elsewhere!   Two of the lopped trees seem to be likely pointing to the bar "Mardi Gras sign" (Only the wireless communication survived Hurricane Katrina in New Orleans), which would has a Mardi Gras festival so the Mardi Gras sign would symbolize New Orleans and one to the "Firestone" sign would symbolize fire and the problems with energy after the hurricane (notice how a tree between THE "Firestone" AND “DILLER” AND “MADISON” STREET SIGN ISN'T LOPPED OR THE SAME TYPE AS THE REPLANTED DIFFERENT TYPE OF TREES!) and the rest seemed to be lopped (cutoff) at about the height street signs started to be displayed.  (ALSO, NOTICE THAT LOPPED TREES IN THE COMPARISON PHOTOS SEEMED COMPLETELY HEALTHY, BUT HAVE THE STRANGE "USA" MARKED ON THEM!)  This, along with other evidence, made me suspect that an arson would occur at either a gas station or a autodealership (THERE WAS AN SUSPECTED PROPANE TANK EXPLOSION OF ON  HALLOWEEN AT HERTZ IN SAN FRANCISCO, WHICH IS BOTH A DEALORSHIP--RENTALS--AND A GAS STATION?  I warned MENLO PARK PD of my theory in writing.), partly due to the lopped trees also being next to autodealorships and firestone partly seeming to symbolize gas along with "Mardi Gras" being a symbol for New Orleans, increased gas prices, and wood prices.  The arsonist(s) seemed to be making some sort of zero waste and environmental message I thought, and then I later I thought due to the alleged newspaper carrier’s papers being the burnt by the arsonist, I SUSPECTED ALONG WITH THE "USA" ON THE LOPPED TREES IN SURVEYOR CHALK AND "CONFORM" (not in surveyor chalk, but perhaps with something else perhaps seen elsewhere on El Camino Real, even as far as COLMA BART?) WRITTEN IN THE CENTER DIVIDER NEXT TO ELECTRICAL OUTLETS AND A TRAFFIC SIGNAL THAT THIS WAS A CLUE THAT THE ARSONIST(S) WERE INTENT ON GETTING THE GOVERNMENT TO MANDATE OR SUPPORT WIRELESS, ESPECIALY GOOGLE, WHICH HAD LIKELY PUT IN BIDS OF ZERO COST TO THE CITIES OF MOUNTAIN VIEW AND SAN FRANCISCO. BILL JOY THEN BECAME MY SUSPECT AS A MOTIVATOR or contributing factor FOR THE ARSONS BECAUSE OF HIS PAST BEHAVIOR AND ASSOCIATION WITH GOOGLE AND ITS CEO, ALONG WITH SOME MORE DISCRETE OTHER REASONS. I NOW HAVE EVEN MORE SUSPECTS BECAUSE I SAW A GROUP OF MEN WHILE ON THE BUS SEEMING TO PUT SURVEYOR MARKS ON THE GROUND NEAR A GAS STATION THAT IS CLOSE TO THE MCDONALDS IN SAN CARLOS ON EL CAMINO REAL AND THE WRITING LOOKED SIMILAR TO OTHER WRITING I HAVE SEEN AS SURVEYORS MARKSTHE MARKS SEEM TO BE AT STRATEGIC LOCATIONS.  THE ORGANIZATION BELOW MAY BE CONTROLLING THE SURVEYOR MARKS IN THE NEXT LINK (HOWEVER GOOGLE I WOULD THINK ACTUALLY HAS SOME INFLUENCE ON THIS ACTIVITY BECAUSE I THINK THEY KNOW WHERE THEY WANT TO BE AND THAT THEY LIKELY INTEND TO WIN THE BID BY BIDDING ZERO AS THEY HAVE IN THE PAST.)  THE LOCATIONS OF THE SURVEYOR MARKS LIKELY SHOW THE TRUE INTENTIONS OF THE MOTIVATION FOR WIRELESS.   Mark.w.pettinger@intel.com EMAIL ADDRESS IS OF INTEREST IN THE ORGANIZATION LISTED BELOW:

http://www.jointventure.org/inthenews/pressreleases/012606wireless.html

 

Exhibit(s) 17 Bill Joy’s possible handwriting; 18 is a article about the arsons by Dana Yates stating newspapers intended for delivery were set on fire suggesting a desire for wireless communications may have been a motive for the arsons; 19-42  the replanted trees in detail where the previously lopped trees with "USA" in surveyors chalk were with emphasis on showing that the lopped trees seemed to be pointing to street/business signs as motive for the arsons and street signs where the same streets where arsons would occur, handwriting samples and dates around gas stations near the arsons at the time of the arsons; names on streets that do not match street names, such as Irish which may suggest a motive to spy on the Irish bar with a sign about “car bombs”; “Granite” written on a Street that may suggest a product or router called Granite perhaps created by Sun Microsystems Co-founder Andy Bechtolsheim; Safe Harbor Shelter hot water container, Heath Plan of San Mateo advertised at Walgreens windows, and Dialysis Center (which may be intended for monitoring by noticing were surveyor marks are located?).  43. Is parts from an East Bay Express article dated May 17-23, 2006 about Wireless.

                                III.    Moscone Center Bomb Threat during Oracle world and Seybold about September 10, 2001 and Plaintiff T.J.Watt has told to leave with others before the Macromedia demo that she wished to see, and Seybold likely has a record of her attendance.

                                IV.   Halloween 2005 Mission Street in SF, CA Hertz had a suspicious explosion.                

                                V.    Critical PG&E power outages in the Bay Area over about the past 5 years; AND THERE ARE CONCERNS THAT BOTH THE SLAMMER AND BLASTER WORMS CONTRIBUTED TO LARGE PROBLEMS WITH THE GRID, Bill Joy is focusing on alternative energy or energy and may have had the means and/or motive to bypass computer security systems to sabotage utilities which may be possible according to the following exhibits 44,45, 46 are the next three links :

http://www.computerworld.com/securitytopics/security/recovery/story/0,10801,84510,00.html?f=x1545

http://www2.jsonline.com/bym/tech/ap/sep03/ap-blackout-hackin091203.asp?format=print

http://www.esj.com/news/article.aspx?EditorialsID=811

http://money.cnn.com/2006/02/07/news/newsmakers/sun_fortune/

 

                        VI.   MyDoom.a and Cone.a. I-worms both of which mention birthday, Melinda, cyclone (Win32.Cone.B  seems to refer to Bill Gates' wife's birthday in a possible attempt to make Bill Gates jealous.  Specifically it contains:

“…Hi Melinda,
see my gift for your birthday ;-)
call me and say what you think about it?

Love,
Bill…

I WILL KILL…

WE WANT TO KISS YOU…

We need freedom in iran…ZerO_SuN

…”)

which are strange and inconsistent messages which I FEEL MAY SUGGEST BILL JOY IS UPSET MY POSSIBLE TECHNICALCONCEPTS DID NOT GET TRANSFERRED TO HIM ON HIS BIRTHDAY, and I was going to transfer tech to Bill N. Joy to him on my birthday as a birthday present for him, which is the day after my birthday, MyDoom has "shit happens" ( an old 1960's or 1970's slang expression) that Rock Star David Lee Roth said to me (likely in reference to the Dilantin incident because it came out both ends of my digestive tract at the same time) and "antiserum" (perhaps in reference to Dilantin being put into water and therefore becoming a serum).

 

Exhibit(s) 47 shows Bill Joy’s Birthday 48 shows T. J. Watt’s birthday, 49 T. J. Watt’s AT&T credit card, 50 AT&T credit card statement regarding hotmail account, 51 is an allegation of spying by AT&T.

 

                          VII.  Google wallet, may have been motivated by bitpass.com, and the Cardsystems hacking may have been motivated to support the creation of Google wallet.  The allegations that AT&T is spying may suggest that Bill Joy spies on my AT&T credit card usage, and other credit usage, and may have a habit of stealing technology and taking credit for other person’s work, and illegally sent out the AT&T operation system and that may have resulted in litigation later and/or the MyDoom worm to discourage litigation about whether the AT&T operation system should be free and/or was meant to be free according to a judge’s decision and various consent decrees.   Informexp.com is my website, and it is still not programmed as I would like it to be.

 

                                VIII.    Yahoo has accused Google of having their ad programming in Google's software, and Google makes about 99% of its income from ad revenue, and Bill Joy and the CEO of Google are on good terms, and recently Sun Microsystems has done a deal with Google for software to mostly support Google email services.  I would consider Bill Joy the most likely person to have liberated Yahoo's software and given it to Google.

                                IX.    I have suspected Bill Joy of monitoring, manipulating, impersonating, destroying my computer activities since about June 2000 since about the time I first emailed Sun Microsystems in their form field and have evidence of communication.  HEPTING V. AT&T CORP (No. C-06-0672-VRW) suggests seizures of the domestic and international communications of millions of Americans perhaps for personal and/or corporate gain.  I am unable to hock up to the web from my laptop, but was previously able to do so; I suspect my laptop is hacked to hell, so I use public library computers.

 

Exhibit(s)  52-62  show that the is a pattern of miscommunication, strange problems,  possible denial of services or out of order computers, email address with strange spaces in them in my sent folder, suspected missing data and 61 shows perfect scores in shell programming, 62 shows the XML project proposed in Instructors handwriting that seems to have been stolen twice from my email, 63 shows my biz plan where I write in the subject line that send was disabled; 64 shows my renewable resource concept;  65 shows that I intended to transfer tech to Bill Joy, 66 shows I intended to transfer tech to Bill Joy on my Birthday November 7, for his birthday November 8, as a birthday present, but there is a reversion clause if he is guilty of serious wrongdoing, 67 shows that I public presented my tech concepts; 68a shows that I had communication with Bill Joy;  (61-67 may suggest a motive for Bill Joy to monitor my computer sessions). 

 

                                X.  After I communicated my friends name to Bill Joy his website Brojon.org and/or Brojon.com was defaced allegedly by the Albanians which was hosted by Tucows and Yahoo's Geocities.

 

Exhibit 68b shows Bill Joy likely would be able to find the Brojon.org and/or Brojon.com webmaster’s website using his email address in the bounceback email from Bill Joy and may have had motive and opportunity to hack his website.

 

                                XI.  After Bush came into the Whitehouse's Microsoft servers were attacked by the Code Red worm, and Microsoft servers in China were also attacked by the worm.  I doubt the Chinese have motive to attack their own servers although they took credit for the attack, but likely Bill Joy did likely have a motive and/or means to attack Microsoft and the Whitehouse under the Bush administration.  The Code Red II has about three completely different inconsistent groups taking credit for it, which may suggest a pattern to frame others for the creation of various worms.

 

Exhibit 68c is a spoofed email that I did not send to lawmakers that has in the body the message “Screw u all”; I was not expelled or suspected from school for this email, but that may have been intended by the author of the email.  I did not have a motive to write the email because I want to have a nonadversarial relationship with lawmakers and my father has testified before lawmakers so I realize that can be a valuable relationship.

 

XII.  The message “I just want to say LOVE YOU SAN!! Billy Gates why do you make this possible? Stop making money and fix your software!!" in the worm known as "LoveSAN" or "MSBlaster" suggests the real target of the worm author is a competitor in the computer industry.  The santy worm also contains “san” just as the lovesan message contains “san”  “NeverEverNoSanity” suggesting that SAN could stand for SANITY  below we will see its image and font is similar in style to that of the iran message in the cone.b worm.   Also, below are image links, respectively exhibits 69-72 showing the image about Melinda mentioned above in paragraph 1.3.1.VI.:

 

http://www.theage.com.au/ffximage/2004/12/22/santy,0.jpg (NeverEverNoSanity… defaced)

http://www.trendmicro.com/vinfo/images/worm_cone_b_img1.gif (freedom in iran)

http://www.microasist.com/gifs/lovsan2.jpg (LOVE YOU SAN... Billy Gates…)

http://www.casupport.jp/virusinfo/2004/i/win32_cone_b_6.gif (Melinda...gift...birthday...Bill)

 

 

                                XIII.  Many of the worms are similar in that they tend to be named by the author, mention a prior worm likely done by the author, have exe file names that are similar (COMPARE i-worm.sobig.exe  WITH i-worm.bagle.s.exe i-worm.mydoom.exe i-worm.nimda.exe server.exe codered2.exe msblast.exe BCTOOL.EXE removal-tool.exe klez_removal.exe root.x worm.x) to the name of the worm, tend to avoid Google as a target, have cutter as various symbols in their messages that is similar from one worm to the next, and/or have some sort of 1180,117, 8, 7 repeating pattern AND/OR MAKE SOME MENTION TO BILL GATES.  They are:            

 

http://www.f-secure.co.jp/v-descs/v-descs2/nimda.jpg PATTERN MATCH WITH BAGLE AND MYDOOM MESSAGE BELOW WITH SIMILAR BEGINNING AND ENDING, BUT sequence repeats three times in the image below.

http://www.origo.hu/i/0403/20040303netsky.jpg

http://www.f-secure.com/v-descs/witty.shtml FOUR SYMBOL SEQUENCES FOUND IN SLAMMER?  Possible I love as a heart symbol then the happyface may hint to Lovesan aka Blaster below after slammer below.

http://www.f-secure.com//virus-info/v-pics/fragment.gif Slammer

http://www.farpoint.it/images/MSBlast.gif HAPPY FACES , HEARTS, DIAMONDS, CLUBS MAY HAVE SYMBOLIC VALUES PARTLY AS FEELINGS TOWARDS OTHER POSSIBLE CO-FOUNDERS OF SUN MICROSYSTEMS, ESPECIALLY CONSIDERING JOY'S RECENT TILLING (see artlice bellow) COMMENT  REGARDING SUN'S CEO.  ONE SYMBOL MATCHES BUTTERFLY IMAGE IN FOUND IN BAGLE BELOW.

http://www.f-secure.com/v-descs/dtus.shtml

 SEQUENCE PATTERNS REPEATS along with (ONE DIAMOND, TWO CLUBS, A PARAMID? TWO HAPPY FACES) there may be patterns within patterns.

http://www.f-secure.com/weblog/archives/archive-032004.html#00000092 bagle

http://www.f-secure.com/weblog/archives/looking4work.gif 7 (seven) similar repeats at front and 8 (eight) at the end  MYDOOM Message "We searching 4 work in AV industry"

 

Exhibit 73 and 74 are images of some of the messages listed in the worms above and my show a pattern in the symbols before and after the written messages, and the 7 before then 8 similar symbols after the written message: “We searching 4 work in the AV industry” may symbolize both Bill Joy’s and my birthdays, respectively 7th and 8th of November; THERE ARE MANY REPEATING SYMBOLS AND/OR PATTERN MATCHES IN THE IMAGES FOUND IN THE WORMS SUGGESTING ONE AUTHOR AND/OR GROUP OF AUTHORS.

 

           SOBIG (8's again?  sobig from bill@microsoft.com "port 8998" secret 8-byte code worm will deactivate itself on June 8, 2003; W32.Sobig.A@mm worm can download Backdoor.Lala ALSO KNOWN AS BackDoor-AOT Trojan 

 WHICH WAS Discovered ON 11/07/2002 (NOVEMBER 7TH IS MY BIRTHDAY AND THE DAY I WAS GOING TO TRANSFER MY TECHNOLOGY TO BILL JOY AS A BIRTHDAY PRESENT ON HIS BIRTHDAY I BELIEVE TO BE NOVEMBER 8TH. Below are links relevant to sobig respectively exhibits 75 and 76:

http://us.mcafee.com/virusInfo/default.asp?id=description&virus_k=99950

http://vil.nai.com/vil/content/v_99788.htm )

 

                                XIII.  Nepal, which likely has one of the worst dictatorships that exists Lukla and Patan (seemingly NEPAL location) server names from SUN MICROSYSTEMS MAY SUGGEST THE WORST ABOUT ALMOST EVERYTHING REGARDING BILL JOY WHO SEEMED TO CONTROL SUN CENTRAL WITH THE EMAIL ADDRESS wnj@sw.central.sun.com respectively exhibits 77 and 78:

patan.Central.Sun.COM [129.147.5.43]

http://search.yahoo.com/search?fr=ush1-mail&p=patan.Central.Sun.COM+%5B129.147.5.43%5D

lukla.Central.Sun.COM [129.147.5.31] notice Central.Sun.COM

http://search.yahoo.com/search?p=lukla.Central.Sun.COM+%5B129.147.5.31%5D+&ei=UTF-8&fr=ush1-mail&x=wrt

XIV.  POSSIBLE NEXUS BETWEEN GOOGLE, VC FIRM, BILL JOY, POLITICANS, THE ATT OS CODE.

 

1. FORTIFY SOFTWARE LISTED ON A WEBPAGE WITH THEIR Kleiner Perkins Caufield & Byers (THE VC FIRM) LOGO ON IT is Exhibit 79a, IN which Bill Joy is a Partner; I suspect JOY, a director at Fortify Software, likely BROUGHT Fortify Software Kleiner Perkins Caufield & Byers; Joy ALSO HAD FORMER SUN MICRO CO-FOUNDER, ANDY (GRANITE CREATOR WHICH WAS SOLD TO CISCO SYSTEMS – ALLEGATIONS OF SECURITY PROBLEMS WITH also exist with CISCO PRODUCTS     GRANITE TOO MAY HAVE SPYWARE BECAUSE  ANDY HAS INVESTED IN SPYWARE) INVESTING THROUGH HIGHBAR Ventures, where he invested with Roy Sardinia and another Sun co-founder Andy Bechtolsheim, BEFORE GOING TO THE VC FIRM AS A PARTNER?  Some links that may pertain to the above are:

http://www.hireloop.com/kpcb/careers/portfolio_careers_home.asp?fnc=comp

http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=104&STORY=/www/story/06-08-2004/0002189433&EDATE=

http://www.siliconbeat.com/entries/2005/01/18/bill_joy_joins_kleiner_perkins.html

http://news.com.com/2100-1033-209420.html?legacy=cnet Given the long delay between that $220 million purchase and the debut of gear based on the high-speed technology, some industry pundits dismissed the move as a failure. "They got burned," (8500 series could be a revenue gold mine for Cisco?)

http://news.com.com/2100-1036-5126160.html father of Cisco's Gigabit Ethernet switches  (Granite Systems in 1995 to develop network switches)

http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml  routers as well as switches and line cards which run Cisco IOS software…For Public Release 2003 July 16 at 6:10 UTC (GMT)

http://news.com.com/Bechtolsheims+machine+dreams/2008-1010_3-5857470.html interview with andy               (servers to handle video)

 

2. WORMS AVOID GOOGLE, a Kleiner Perkins Caufield & Byers portfolio company, (VC FIRM'S INVESTMENTS, SUCH AS FORTIFY SOFTWARE) MAY BENEFIT FROM WORMS, SUCH AS MYDOOM, WHICH MENTIONS ANDY (POSSIBLE SUN MICRO CO-FOUNDER IN A MESSAGE).  GYPSY WAS A WORM THAT DID ADVERTISEMENT FOR GOOGLE!  Exhibit 79b is the advertisement for Google that is a worm.

3. THE VC FIRM AND GOOGLE NEED WIRELESS TO BE COMPETITIVE WITH CONTRIES THAT HAVE WIRELESS AND GOOGLE'S WIRELESS LIKELY GOES TO Kleiner Perkins Caufield & Byers SF LOCATION at 1 Embarcadero Center, and SF ONE OF THE FIRST PLACES LIKELY SETUP FOR GOOGLE WIRELESS (SURVEYOR MARKS MAY INDICATE THIS.).  Exhibit 80 is a News.com article about Google Wireless mentioning concerns about data records of uses Internet sessions.

 

Google has made zero bids to do wireless for both San Francisco and Mountain View, and likely will bid zero in the entire Bay Area and some links about that are below:

http://www.internetnews.com/wireless/article.php/3581291

http://www.jointventure.org/inthenews/pressreleases/012606wireless.html

 

4. PERHAPS JOY, GOOGLE'S CEO, AND THE HAVE LONG STANDING RELATIONSHIPS GOING BACK TO GRADUATE STUDIES AT CAL TOGETHER, BOTH HELD THE SAME POSITION AT SUN MICROSYSTEMS, AND JOY WAS LIKELY PUT ON THE BOARD OF NOVEL BY THE GOOGLE’S CEO WHO WAS THEN THE CEO OF NOVEL, AND THE GOOGLE'S CEO RAVES ABOUT JOY’S PROGRAMMING SKILLS.  THE VC FIRM LIKELY HAS LONG STANDING RELATIONSHIPS WITH JOY.

 

5. GOOGLE MAY USE SUNSPARC CHIP.  (SEE AND COMPARE WITH ABOVE #1, #2, #3, #4.) 

 

6. GOOGLE ACCEPTS SLEAZY SPONSERED LINKS (PORN), WHICH MAY SUPPORT COST-SHIFTING TO THE GOVERMENT AND INCREASE HEALTH CARE AND OTHER COSTS, AND GENERALLY MAY CAUSE HARM TO INNOCENT VICTIMS, OFTEN WHO ARE UNWILLING TO TESTIFY ABOUT THEIR VICTIMIZATION, OR EVEN REMEMBER THEIR VICTIMIZATION, respectively exhibits 81-83.

Compare below xxx+underage search on different search engines:

 

http://us.ixquick.com/do/metasearch.pl?cat=web&cmd=process_search&language=english&query=xxx+underage

http://search.yahoo.com/search?_adv_prop=web&x=op&ei=UTF-8&fr=fp-top&fr2=op&va=xxx+underage&va_vt=any&vp_vt=any&vo_vt=any&ve_vt=any&vd=all&vst=0&vf=all&vm=i&fl=0&n=10

 

http://www.google.com/search?as_q=xxx+underage&num=10&hl=en&btnG=Google+Search&as_epq=&as_oq=&as_eq=&lr=&as_ft=i&as_filetype=&as_qdr=all&as_occt=any&as_dt=i&as_sitesearch=&as_rights=&safe=images

7. GOOGLE IS LIKELY NOT IN COMPLIANCE WITH A FEDERAL COURT ORDER. (SEE #6 ABOVE.)

 

8. JOY MAY WANT TO BRING MY WEBSITE INFORMEXP.COM TO GOOGLE AND MAY HAVE WANTED TO COPY BITPASS.COM WHICH I USE ON MY WEBSITE AS GOOGLE WALLET.  The CARDSYSTEMS HACKING with possible stolen credit card numbers, MAY HAVE BEEN DONE BY BILL JOY, AND THAT MAY HAVE BEEN PARTLY DONE TO HAVE INSIGHT INTO HOW TO MANAGE GOOGLE WALLET.  PREVIOUSLY, YAHOO HAS ACCUSED GOOGLE OF STEALING YAHOO'S ADVERTISING TECHNOLOGY AND THAT, too, MAY HAVE BEEN DONE BY BILL JOY.  A female employee is missing from XOS! Software in Belmont, California, and that may be about stealing technology.

 

9. GOOGLE AND THE VC FIRM MAY NEED MY POSSIBLE PRIMARY SYSTEM DRIVER TECHNOLOGY (JOY HAS EVEN BEEN QUOTES AS SHOWING AN INTEREST IN ALTERNATIVE ENERGY, NEW INDUSTRIES, INNOVATION, AND/OR DISRUPTIVE AND/OR REPLACEMENT TECHNOLOGY), WHICH WOULD BE CONCEPTS FOR A POSSIBLE RENEWABLE ENERGY POWERSOURCE AND POSSIBLE ANTI-TORNATO/MISSILE CONCEPT.  Exhibits articlies “60 seconds with Bill Joy” and “Rejoicing again”  84 and 85 show that Bill Joy is interesting in invested in Alternative energy.

 

10. GOOGLE AND THE VC FIRM TEND TO CONTROL POLITICANS WHO TEND TO CONTROL THE ENTITLEMENTS, BENEFITS AND GENERAL WELFARE OF THE POPULATION; THIS IN TURN CAN BREAK THE BACKBONE OF THE INSURANCE INDUSTRY.  DATA DESTRUCTION AND UTILITY OUTAGE CAN ALSO COST-SHIFT TO THE INSURANCE INDUSTRY AND THE GOVERNMENT.

 

POLITICANS

 

1. LOCAL POLITICANS AND/OR LAW ENFORCEMENT ALLOW THE HEALTH PLAN OF SAN MATEO, HEALTH DISTRICT, FUNDS TO NON-PROFITS, COUNTY HOSPITAL (OVERPAID AND INCOMPETENT PERSONNEL?,) WHICH MAY ALL RESEMBLE RITUAL HUMAN SACRIFICE:

 

A. SAFE HARBOR SHELTER DILANTIN INCIDENT.

B. U. S. SENATOR HILLARY CLINTON AND STAFF POSSIBLE POISONING AS A POSSIBLE DILANTIN INCIDENT PERHAPS DONE BY Rock Star David Lee Roth.

                                       C. ALLEGATIONS OF LOCAL POLITICANS INVOLVED IN RITUAL HUMAN SACRIFICE AND ONE ALLEGEDLY IS RUNNING FOR A Peninsula Health Care District (PHCD) Board of Directors POSITION.   Exhibits 86 and 87 are emails from two of my sources about RITUAL HUMAN SACRIFICE IN THE REGION.

 

                                                     D. PERSONS SEEMING TO SUFFER AND DIE DUE TO ALL THE CORRUPTION AND/OR INCOMPETENCE IN THE MEDICAL FIELD. “The Grand Jury finds that the Peninsula Health Care District (PHCD) Board of Directors, in its pursuit to build a new hospital, is not able to negotiate terms of a new agreement in the best interest of the District's residents” IS FROM THE 3RD LINK BELOW. IS FROM THE 4TH LINK BELOW “San Mateo County grand jury has questioned a Peninsula hospital district's use of taxpayers' money to fund various nonprofit agencies… district has collected so much revenue since its creation 56 years ago that it currently has $41 million in its coffers”

http://www.smartvoter.org/2000/11/07/ca/sm/race/28/

http://www.mills-peninsula.org/newhospital/proposal/district.html

http://www.sanmateocourt.org/grandjury/2002/02Peninsula_Health_Care_District.html

http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2002/05/08/BA10539.DTL

 

THE KERNEL: ATT OS CODE

 

1. THE KERNEL MAY BE A MOTIVE FOR THE RITUAL HUMAN SACRIFICE (TO SUPPORT NOT INVESTIGATING JOY WHO ALLEGEDLY WAS WORKING ON THE CODE AS AN STATE OF CALIFORNIA EMPLOYEE AND THE WAS LITIGATED ABOUT THE 1990’S REGARDING THE CODE I THINK FROM AN ENTITIES THAT CLAIMS TO HAVE BOUGHT RIGHTS TO THE ATT KERNEL CODE).  THE CONSENT DECREES REGARDING THE BREAKUP OF MA BELL, THE CREATION OF ATT, AND THE MAKING BELL LABS PATENTS AVAILABLE TO THE PUBLIC SHOULD BE INVESTIGATED FOR POSSIBLE CORRUPTION REGARDING THE ADMINISTRATION OF THE PATENTS BELONGING TO BELL LABS.  (CAL’S DARPA CONTRACT WHICH MAY SUGGEST THE CODE PARTLY BELONGS TO THE FEDS.)  THE FIRST LINK BELOW IS EXHIBIT 88, WHICH MAY SUGGEST BILL JOY MAY ACTED IMPROPERLY AT CAL, MAY HAVE NOT HAD THE AUTHORITY TO SELL HIS CODE WITH THE KERNEL AND THAT SCOTT MCNEALY, CEO AN COFOUNDER OF SUN MICROSLYSTEMS LIKES TO SAY: “TO ASK PERMISSION IS TO SEEK DENIAL” AND THAT BILL JOY BELIEVES AT&T LICENSED THE TRANSISTOR FOR NOTHING, BUT I UNDERSTAND LATER AT&T CODE WAS LITIGATED OVER AND CAL REMOVED AT&T CODE FROM CAL CODE AND THAT PERHAPS THE FEDERAL GOVERNMENT OWNS PART OF THE KERNEL PERHAPS MADE MODULAR AT CAL, AND THAT THIRD PARTIES ARE ALLOWED TO SUE REGARDING THE KERNAL AND THIS MAY BE A MOTIVE FOR A COVERUP AND/OR INTIMIDATION PERHAPS BY BILL JOY.  http://www.sm5sxl.net/~mats/text/unix/joy_interview.txt

http://www.computerhistory.org/events/index.php?spkid=1&ssid=1120598654

2. THERE ARE ALLEGATIONS THAT ENGINEERS ARE INVOLVED AND SINCE ABOUT 1990'S OVER ABOUT 300 MEMBERS MAY EXIST IN THE CULT.   THRESS SOURCES SEEMS TO EXIST ON PARTS OF THE ALLEGATIONS FROM THE PREVIOUS SENTENCE, WITH ONE POSSIBLE MEMBER LISTING INFILTRATION.ORG ON HIS WEBSITE AND MAY HAVE BEEN AN APPLE COMPUTER EMPLOYEE, ANOTHER MAY HAVE BEEN A CITY OF PALO ALTO CITY COUNCIL MEMBER, AND TWO MAY BE BOARD MEMBERS OF SAN MATEO COUNTY AND ONE MAY A SHERIFF IN THE BAY AREA, OR WAS THE SHERIFF-POSSIBLE MEMBERS ARE:  Mike Nevin, Bern Beecham, Theresa McCarthy (Reese), Don Horsley, Gail Gradek, Caren Weinstein, Ben Schloss.

 

3. LACK OF PROTECTION FROM ILLEGAL SEARCH AND SEIZURE (Fourth Amendment of the of the United States Constitution) 

                    a. Same as I.3.1.b. and I.3.2.a. above.

My concepts or desire for a possible Case/sort priority system (now partly done in informexp.com with a 5 star rating by ixquick.com), renewable resource powersource concept, and possible anti-tornado/missile device were partly or all presented to PALO ALTO CITY COUNCIL WITH VISUALS about 8 years ago (some ideas are older than that and evolving), mostly were previously written in affidavit2.doc which I may not have due but may be found later.  My possible Case/sort priority and renewable resource powersource concept are enclosed as emails.

 

Very short mention of power outages, replacement technology that I may advocate (presented to Palo Alto City Council during Oral Communications visual and this was written in an email to Bill Joy), and some mention that this could also be motivating reasons for the worms.

 

The following are notes for the agent, fact checker, Editor:

 

http://216.109.125.130/search/cache?_adv_prop=web&ei=UTF-8&va=energy&va_vt=any&vp=bill+joy&vp_vt=any&vd=all&vst=0&vf=all&vm=i&fl=0&n=10&u=www.kpcb.com/news/article.php%3Ffrm_id%3D52&w=energy+%22bill+joy%22&d=AA30EF1125&icp=1&.intl=us

 

Birthday issue:

Images below from links:

http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=38540  http://search.yahoo.com/search?p=cone+Melinda+alongtimeago+birthday&ei=UTF-8&fr=sfp&fl=0&x=wrt

 

 

 

 

 

 

setstats1

 

*@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.*