How stuff works

How stuff works by Evan Douglas-smith.

Like any great inventor of the modern era, we do like to keep our methods secret and if you are intelligent enough you will understand how we do it and why.

So I might just introduce you a little to Unix which I have kept secret for a hundred years I invented it around 1920, and I feel it safe to share some processes about how it was made with you. My name was an inventor and secret agent called Unix. I can’t share my real name it is unclassified as “never to be revealed”.

So the key to Unix is it is classed as a firmware software. So it is embedded in a chip and you access it via machine code via certain logical expressions called algorithms. Now these are all hidden and not accessible, but I will say they do pass through BIOS and CMOS and FES and they influence every part of your machine.

Now a hacker will try and break in through your BIOS or CMOS or FES, but they can not break into Unix firmware. It is designed to never be hacked and it is why it is the basis of all computing, whether you have a microprocessor or anything else, even a light or a fridge, the basic working is from all Unix architecture.

I have since worked on a non-binary version which I finished and works even better, no part of your computer can be hacked at all and is perfectly suitable for space travel, unless some material actually destroys the device physically it will work 100% efficiently and safely. There is out of that 100% a non-binary amount of 0.000000000000000001% chance of a failure. It is why I have automatic return to home features on my ships. Just in case. So really the chance of death is so slim its non-existent. It actually makes it safer to fly having that slight danger involved so you aren’t complacent of mishaps.

So that’s how a computer operates, and from there you have layers, so you have your physical layers, and then your data layers, and then networking, and then desktop or GUI layers, and then you have displays and also peripherals in there.

So these layers come from BIOS and also to have DOS or terminal layers which act like a secret hidden under layer where you can break in if need be to access forgotten passwords and send files back and forth without booting up the PC. It’s how government and predators who know get in and find out your business. (They think they have a right to know and who are we to say they do or not? We trust they know what they are doing even if we disapprove. Better to be them I guess than aliens or terrorists or murderers after your life).

So you type in a command and your computer says … 1010101001010101010101010010100101 to Unix and Unix says back.. 1010101010100101010101010101010

Which is just random example but might mean this conversation..

“I just typed in I love my computer. Please how do I send that to my friend?”

And Unix will say.

“You just typed in I love my computer. Do you have a contact detail? Then send it to your friend with that.”

So it replies not just what you expect but with the most efficient information that was programmed in at that time. And it was about a billion lines of code. A lot that got reduced and compressed as time went on to just about 50 lines. So its small file now Unix, you can fit it on a USB stick and run it on your Raspberry Pi or whatever.

But how it works is still a mystery no one really knows the way it works, and I’m sorry I can’t tell you, but it is still secret. But I can tell you, if you work it out.. well good for you. Make something better yourself!

Comments

Popular Posts