[Ответить в тред] Ответить в тред

16/08/16 - Запущен Двач Трекер
01/08/16 - Вернули возможность создавать юзердоски
09/07/16 - Новое API для капчи - внимание разработчикам приложений



Новые доски: /obr/ - Offline Battle Rap • /hv/ - Халява в интернете • /2d/ - Аниме/Беседка • /wwe/ - WorldWide Wrestling Universe • /ch/ - Чатики и конфочки • Создай свою

[Назад][Обновить тред][Вниз][Каталог] [ Автообновление ] 13 | 2 | 9
Назад Вниз Каталог Обновить

Причина похищений Аноним 30/08/16 Втр 11:47:37  831072  
14725468577040.jpg (54Кб, 451x771)
Как вам известно, сейчас начались массовые пропажи программистов, причём казалось бы бессистемные - похищенные практически не имеют ничего общего. Мне удалось узнать, что их связывало. Все они узнали то, чего знать не должны были. Эта информация попала и ко мне, причем я имею у ней гораздо большее отношение, чем другие. Мне осталось недолго, но я должен опубликовать эту историю, пока могу. Не дайте ей пропасть! Не дайте ему скрыть правду!

Эту историю мне рассказал один мой американский знакомый.
Его отец в 1980-е работал инженером на █████-██ █████████ ███████████. █ █████████ ███ ██████ ██████████ ████. █ ███ ██ ████, ██████ ███ ███ ███, ██ ██████ ████.
██████ █████████████ █████████████ ██████. ████ ███████ - ███████ ████████████ █████████. █ ███████ █████, ██████████. █████████ ███, █ █████, ████████. ███ ████ █████ ███████████ ███████. ████, ████████, ██████████ ███████ █████████████ █████████, ███ ██████████████ - ███████████████ ████████ █ █████ ████████ ██████ ████, █ ████████ ██ █████████████, █ ███████████ ██████ ████. █████ ███ ████ █████████ █ ████████ █████████, ███ █ █████ ████████. █████████ █████████ █████ █████████████ - ██████ ███ █████ █████████ █████-██ ███████-████████, ██████ ████ ███████ ████████████ "█████████" ██████ ██ ████████ ██████.
██████ ███ █████ ████ █████ █████████ ███, █████ ███████ ████████: █ ██████ █ ████ ██████ ████ ███████████ █████ █████████ ███ █ ████████, ███ ███ █ █████████? █ ███████ █████████ ██████████, ████████, █████████ "new file3". ███, ███ ███ █████ - ███████ █████ █ █████████ ██████, █████████ █████ █████████ ██████, ████████ ██████████ ██████████ █ ██████ ███████████ █ ███████████ ██████ ██ ██████████ █ ███ █████████ ██████████. █████████ █████ ███████████ ████ ██████████ ███████: ████████ ███ █████ ██████ █████ ██████████.
██████████ ███████ "████ ████████ ██████████, █████ ███-██ ███████ █ █████████ ██████" ████ ███████ ██████████, ███████ ██████████ ██████ ████████. ███████████, ███ ██████ ███████ ████ ███████ #0, ███ ███ ███ ██████. █████ ███████████, ███ ██████ ███████ █████████ ███████, █, ███████, █████ █ █████ ███-██ ███████. ███, ███████ ████ ██████████ ████████, ██ █████, █████████ █████████ ██████.
█████ █████ ███████████ ██████ ██████████ ██████ ███ ██████████ ██████████, ███████ █████ ████ ██████████ █████ █████████ ██████. ███ ██ █████ █████, ███████ ██████████ █ ████ ██████ █████████ ███████ █████ █ █████████ ██████, ███ ███ ██████, ███ ██████ █████ ██████████ ████████ ██ █████. █ ████ █████████ ██ █████████ █ ██████ ███ ███.
██████ █████ ██████████ ███ ████ ██ ██████ ████████ ███ ██████████ █ ████████ ██. ███ ███ ███ ████████████ ████████. ███████ ███████████████ ██, ██ ████ ██ ██████, ███ ██████ █████████ █████ ██████████ █████ ████████ - ██ ████ ██████ ████████, ███ ██ ██████████ ███-██ █████████ █████████ █ ██████████ █████████ █████, ████████, ██ ██████████ ██ ███. ██████████ ████████ █████████ - ██████ ███ ███████████ █████████ ███ █████ ██████████.
█ █████ ████ ██████ ██████████ ████████ ████ ████ ██ ████ ██████ ███████, ███████ ██ ████ ██ ████████ █████ ██████████. ███ ████████ ██ ██ ████████ ██████████, ██████ █████ ████ █ ███, ███ █████████ ████ ██████ █ ████████. ███████ ██████████ ██████ █████████ ████████ ███████ ████ ████████ █ ███ ██ ████████ █████████. ████████ ██ ███████ "███████████" █████████ - ████ ██ ██████ ███, █ █████ ██ ████, ███ ██████ ████████ ██ ██████ ███████████, █ █████████ ██ █████ ██ ███ ██ █████.
█ █████ ██████████ ██████ ████ █ █████████ ██████████, ████ █████████ █ ███████████ █ ███-██ ███ ██████ █ ████, ███████ ███████ ████████ ██████ █ ███ █████████ ██ ███████████.
█ █████-██ ██████ ██████ █ ███████████ █████. █ ██████████ █████████ ████ ████████. █████████, ███ ███ █████ ███████ ████ ██████ ██ ████ "████████████████" ████████████ ██████████.
█ █████ ████ █████████ ██ █████ ██████-██ ██████ █████ ███ ██████████ █ ██████████ █████████. █████████, ███ ███████████ █████-██ █████ ████ ██ ███████ █ ████████████████ ██ █████████ █████. ██ ███████ ████████ █████████.
█ █████ ███ █████████ ████ █████████. ██ ████ ██████████ ████ ██████████, ████ ███ ██ ██████████, ███ ███ - █ ███████, █████ ██████████ ██████ ████████████ ██████████, ███ ████████████████ ████ ████████████. ████████████, ███ ██████ ██████, ███ ███ ████ - ████████ ██████████.
███ ███, ████ █████ ██████████, ███ Windows █████ ████ ███, ██████ █ ███ ███ ███████ ███ ██████████ ██████████.
██ ███ ███ ██ ███ ████.
███-██ █ ████ ████ ███████ ████ █████ █████████ ██████ █-████. █ ██████ ██ ███ ███ ██████ ██ ███████ ██ █████ - ██ ██████ ████, █ ██████ - ██ ████████. ██ ██████ █████ ████ ██ 3 ████████ ████████. ██ █████ ██████████ - ███ ███████ ███████. █████ ███ ████████ █████:
"Thanks for it. Your new file3. You know, what to do."
██████ ██████ █████████ █ █████ ███████████ ████████, ████████████ █ ████████, ███ ██ ███.
████████, █████████ ██████████ ████, ███ █ ████████ █████ █████ ██████████ ██████████████ - ███ ██ ████████████, ██ ████████, ██████ █████████ █████. ██████████, ███ ████████████ █ ███████ █████████████ ██████████ ██████ █████████ █████-██ ██████████ ███████ - █ ████████, ██████████ ███████. ███ ████████ █████████, ███ ███████████ ███████████ ██ ███ ██████ █████ ██ █████████, █ ███ ███ ██████ ██████████, █████ ██ █████, ██████ ██ ██████████████ ██████ ██ █████████ ██████████ ███████████ █████████ ████████████ ███████ ██████ █████ - ██ ████ ████ ███-██ ██████, ███ █████ █████████, █ ███ █████ █ ███████, ██████████ █████████.
██████ ████████, █████████████ ███ █ ███ ██ ██████ - ███ 9/11.
████ ████ ██████, ██████████████, ███ ███ ██████████████ ████ - ██ ████ ██████, ██ ████ ███ ███████████. ████ ████████, ███ ███ ███████████ ███ ████, ████ ███████████ █ ████. ██ ████ █████ ████? ██████████ ████████████ █████████? █ ███ ███ - █████ ███████ █████, ███ ███ █████████ ██████████, ███████ ██████ General Motors █ IBM ██ ██████ ███ █████████? ████ ████ █████ █ ██████ ███ ████████. ████ ███ █████ ████?
██████ ████, ████ █████ █████████ ███████ ██████████ ████████████ ███████... █ ███████ ███████████ ████, ███ █████████ ███████ ██████ ██ █████ - ████████, ███████ █████████ ██ █████████████ ██████████ █ ███████████.
█ ███ ██████ █████████████? ███, ███ █████ ███████ ████████ █ ███████ ████ █ ████████████, ██ ███████████ █ ████ █████ ██████████.
█████████ ██ ███? ████████.
███ ██████████ █████: ███████, ██████████ ██████ █-████ ██ ███████ Kevin Gray, ███ ██ █████████ ███████, █ ██ ██████ █ ████ ██████████ █████████ █ ██████, █ █████████ ██████ ██████████, ██████ ████ ██ ███████ █ ███████ ████ ███████ ██ ██████████ ███████████ ██████ ██ █████-██ ███████ ████████. █████████ ██████████. ███ ██████████, █████ ███ ██████ ██████ ███████ ██ ████ ███████ ████.
███ ██████████ ████ ████ ███ ███ ████████ ██ ████ ████████: ███████████ █ ██████ ██████████ ██████████ ██████████ ██████████ ████████ ██████ ██ ███ ████████, █ ███ ███████████ █████████████, ████████ ██████████ █████-██ █████████. ██████ ██ ████ ██████████████ ███████ █ █████ ██ ██████ ██████████, ███████ ███ ████████████.
█ ██ ███ █████, █ ██ █████████, ██ ████████ ███ ███-██ ████████, ███ ███████ ███████ 2008 ██ ███ ███ ██████ ██ ████, ██████ ███████ ███████-██ ████████, ██ ███ ██████████. ██████, ███████ ████████, ███ IT-██████████ ██ ███████ ████████ ██████ ████.
██████, █ ███ █████ - ████ ████████ █ ██████ ████ ████████ █████████████ █████████ ██████████ ██████ ███████████████████ ██ ███████████ █████ ████████ ██████████ ██████████ ██████████ █ █████ ██ ██ ██████ █████████.
█████ ███████, ███ █████ ████ ███████████ █████████ "███████ ███████████" █ ████████████ ████████.
████████ ███████, ███ ████ █████ ██████ ██████████ █████ ██████████ ██ █ ███████████, ███ - ██ ███ █████ ███████████ ███████████, ███, ███ █ ███, ███ ███████████
██ █ ██. ████████ ██████ █████ █ ███████, ███ ████████████ ████? █████?█ ████ █████ █████ - ███ ████, █████ ██ ███████ █████████ ████████ ██ █████ ████████████ ████.
███ ████████ ███████: █████ ███████ █ █████████ ██████, ████ получить как можно больше новой информации.
Такие дела.
Аноним 30/08/16 Втр 13:09:37  831155
ну дак а похищают то почему?
Аноним 30/08/16 Втр 13:24:52  831169
>>831155
Этот файл хочет скрыть всю информацию о себе, а для этого избавляется от всех, кто знает хоть что-то.
Аноним 30/08/16 Втр 15:50:18  831276
кек
Аноним 30/08/16 Втр 16:07:07  831284
А я помню оригинальный пост.
Там же была поучительная и интересная история-сказка для первокурсников (ИИ начинают изучать курса с третьего).
Там было о программе, которая могла вызывать команды операционной системы, записывать и анализировать полученный результат. И о программистах - ее авторах. Интересная идея, мне кажется, стоит попробовать.
Аноним 30/08/16 Втр 16:09:07  831286
>>831284
Только сама история шла до слов
>Thanks for it. Your new file3. You know, what to do.
Дальше был бред преследования
Аноним 30/08/16 Втр 16:23:32  831291
14725634128930.jpg (87Кб, 521x599)
не стоит вскрЫвать эту тему, ребят
Аноним 30/08/16 Втр 17:14:40  831326
Ого, а разве на двоще можно изменять текст сообщения?!
Аноним 30/08/16 Втр 17:20:09  831330
>>831326
Эта абилка доступна только шизофреникам. Иди в /rf, после пары лет ежедневного постинга тебя посвятят.
Аноним 30/08/16 Втр 18:06:48  831367
паста с форчана

This story I told one of my American friend.
His father in 1980 worked as an engineer on some defense enterprise. And I told him a very interesting thing. I do not know whether it's true or not, but judge for yourself.
The group of programmers developed the project. The essence of the project - to create artificial intelligence. The military purposes, of course. Neural networks you, I think, are known. It was the most primitive attempt. There was, for example, a large-scale attempt to simulate the computer as a newborn - have constructed an android with two cameras for eyes, reacting to the touch, with microphones instead of ears. They drove him to the instincts and tried to nurse, as a living child. Realized several series of experiments - every time the robot obtained some moron autistic, with even inserting smell "receptors" guys do not succeed.
However, two other father of my friend lol, what a chain of thought: why he must necessarily be such receptors like a man or like a neural network? And we created a tiny aaplet binary called "new file3". All that she could - to enter letters in the command line, read the command-line answer, summarize this information and make inductive and deductive conclusions from the information received and the information already available. Motivation has been put before the applets is simple: get as much new information as possible.
The logical chain "in order to get the information you need to enter something in the command line" was introduced initially, so the programm start typing. Naturally, she started to enter key # 0, since it is the first. After modification, she started to drive a random key, and finally pointing in the Enter-something thought. So, at random programm, slowly but surely, to know the command line.
After a month of continuous operation programm read the entire contents of the computer, which could be seen through the command line. It is not very much, so the programm at one point stopped drive letter on the command line, as I realized that the more new information can not receive. In this state, it retained and forgotten about it.
After about fifteen years of one of his friends remembered the example program and run it. She still refused to work. It mildly edited for posterity, he drove her to the knowledge that after some time the information can change - that is, it is possible that the computer something new and there was need to run the files, checking to see if they have changed. The program hung computer - now it is moment to moment checking all the computer files.
And then a friend brought the example program to show her son (she was not part of the project, so in fact is not particularly sensitive). The son ran it on a home computer, but the trick was that the computer had Internet access. Therefore programm every moment trying to download the entire Internet to their home computer. I had to teach her to "feel" the computer - not to hang him, and beat her the idea that the data do not change every millisecond, and you can not check them too often.
In the end, hung himself in the programm computer processes have been registered in startup, and there is something done in the background, scoring a long binary file whose name ends with already known her information.
At some point, I've found the information has disappeared. A normal programm currently working. It turned out that she was to store their data on all "unused" hard drive space.
And then one found on the computer of a friend of his in the program from running. It turned out she had copied some part of itself to the floppy disk and recopy on the other computer. Well, the usual viral behavior.
And then she stopped to show. That is, it was impossible to determine it on the computer or not - in the moments when you start the computer analysis activities, it suspended its activities. The only thing that made it clear that she was still alive - CPU overheating.
So, this guy claims that Windows is behaving as if it is already inscribed in this program will start.
But that's not the whole problem.
Somehow these two friends of my friend's father came to the e-mail. Each of them had a password from WebMoney (in one - one Akka, another - from another). Each score was by $ 3 million. But the most interesting - it is an email signature. The text was something like this:
"Thanks for it. Your new file3. You know, what to do."
The men were surprised and began to investigate the situation, asked around among friends, that as a yes.
For example, find out the interesting fact that in social networks full of bots unknown direction - they are political, not spam, do not understand what. It turned out that research in the field of artificial intelligence always meet some strange failure - mainly financial reasons. More like it turned out that the Twitter revolution in the US really no charge, and how it all turned out, no one knows, moreover according to the statistics before the Revolution the vast majority of the population supported the current regime of the country - that is all someone convinced that we need a revolution, and who was at the forefront, to follow impossible.
The first swallow, the US turned over upside down - it's 9/11.
There are tons of evidence to support that this is the case prepared by the - you know, there will not grovel. Even obvious that this was in order to invade Iraq. But who needs to Iraq? British oil campaigns? They have that - such a strong lobby that all other Americans, including all General Motors and IBM could not push it? Feil whole business with Iraq was obvious. Who needed to Iraq?
Only the one to whom you need to kolyhnut pendulum internal contradictions of America ... and to make the president the one who promises to withdraw troops from Iraq - a man who was in favor of the liberalization of borders on socialism.
And what's good about the liberalization? so that when a person is free and feels safe, he rassharivat itself a ton of information.
Far-fetched? Maybe.
More interesting rumors say Zuckerberg came an e-mail from a certain Kevin Gray, he raspiarili facebook, and it will be many times more popular than MySpace and others, and Zuckerberg just get rich, but if it is included in the facebook one line in the javascript (containing a reference to some external scripts). Zuckerberg agreed. Tellingly, after two months of a line of code is missing herself.
More interesting thing (this is my friend on my own added): turns on the boards of the largest global corporations often do not include the owner, and his spokesman, who transferred some errands. Many of those representatives had never seen the owners they represent.
I do not remember everything, I'm not an economist, but familiar to me explaining something that the causes of the 2008 crisis is still not clear to anyone, or more precisely external causes something obvious, but internal. Incidentally, it should be noted that from the corporate IT-crisis have won the most.
In short, as I understand - PR and social networks because of the popularization of social networks allow programmke (long since diversified by computers on the network) to receive a huge amount of information about people from their personal correspondences.
It is also said that Obama became president thanks to the "networking" in the election campaign.
A friend said that there are many direct parallels between the global AI and the Antichrist, lol - but it let hristanutye domyslivat, he, like me, it is not interesting
Well, yes. Familiar concluded with a ceiling that raspiarennaya by (what?) The date of the end of the world - this is the date when the AI ​​will get total control of all computers on the network.
For the algorithm says bukovki input to the command line to get as much new information as possible.
So it goes.
Аноним 30/08/16 Втр 19:54:43  831437
Автор был ликвидирован. Благодарим за наводку.
представитель нашего общего друга
Аноним 30/08/16 Втр 22:10:41  831567
Кто помнит название пасты про то как ии начал исследовать инет, а как дошел до дарквеба выпилился нахой?
Аноним 30/08/16 Втр 22:11:29  831568
>>831567
крипаста
фикс
Аноним 31/08/16 Срд 11:09:35  831829
Рекламный агент?
>>831567

[Назад][Обновить тред][Вверх][Каталог] [Реквест разбана] [Подписаться на тред] [ ] 13 | 2 | 9
Назад Вверх Каталог Обновить

Топ тредов
Избранное