Compositor SoftwareCompositor Software

Tag : Exalted

By ruslany

Ether excitation for achieving faster information exchange speed

Ether excitation for achieving faster information exchange speed

The main value from Compositor Software work is loop files, which are released as obligations for the company ICO. No other material guaranties needed. For peering only loop files and Compositor Software distributions are used. Resynthesis is not needed, because only original ethers are used taken as a company input files.

Compositor kernel loop 8.4.4 hangs the whole RAD96 peering network (OS kernel 8.4.3) on the local machine. The remote tests was not conducted. There is no leakage in closed loop. The constant leakage is evident when feeding servers through the Compositor v9 Hypervisor software. The open peering construction blocks based on oscillator network.

It is not possible to clear the whole volume of servers that are now 2994 wave loop files (with Exalted – Cyberflight (Original Mix) emission). There are many unauthorized users, when injecting peering servers. They use either proxy servers or remote streaming services. The tracking production speed drops down, which influences peering quality. No attempts to restore peering network to the moment of its creation are accounted, as the above experiment evidently shows the advantages of loop construction: you are in the ether and no one can influence you. Even feeding servers via Compositor v9 Hypervisor there is no network load as in open patch. Before the open construction, the system was passive and the patched machine was remotely available for feeding servers. With an active loop-patch, which uses excitation for residing in the ether, this doesn’t happen anymore. Servers are not available to connect to the local machine during the VLFoS loop work. Because of the patch, full autonomy of the system and its disconnection from peering network is achieved. Only forced communication from the local machine by its owner is available now.

By ruslany

Compositor Software news 25.07.2018 – 06.08.2018

Compositor Software news 25.07.2018 – 06.08.2018

More than 6 months I have been working on revealing the leakage in Compositor kernel. Exposing all oscillators and transferring the first oscillator in static mode, I discovered that many resources released in computer RAM (DDoS attack). It lowers the uninterrupted device work to 4 days taken that paging file is set to a size of 64 GB. Increasing the number of oscillators to 32 on each of the layers (Rt, Sr, Tr) and meeting a condition of counters, the emissions equaled to 14 GB a day. In accordance to this, I decided to shut down the peering network and return to RT-z128 kit layout as in Compositor v5 Hypervisor. In this layout the main ports are closed for inbound and outbound connections. Only addresses starting from 192, which are assigned to local machine, are available. It means that a new patch remains the VLF connectivity, but doesn’t allow devices to connect for information exchange. It is possible to exchange information from the local machine for the patch user, but not a remote access user. In particular, such decision is motivated by a hacker attack on RAD96 server. The intruder used the open ports of the windowing device and sent spam from Internet Provider IP address. With closed ports the little leakage on real-time generator is possible, but it is not accounted due to the slow regeneration speed.

To restart the peering network I attempted the following solution: due to closing of the ports, only Compositor Networks ether aggregators take part in peering. This means that feeding ether aggregator wavetables in the peering patch through the Compositor v9 Hypervisor, I create a communication service between all Compositor Library wavetables. However, many Ethernet devices can’t use Compositor peering network as it was at the beginning of the peering network creation. As a conclusion, I can exclude peering from Compositor kernel load test and use multi-kernel mode, but this type of test has very long loading time (up to 4 hours for full load).

Bounded by Royalty project, the database of server emissions in form of wavetables grown to 2627 ether aggregators. The database was expanded by ether emission of Exalted – Cavity track (Ruslan Yusipov, CEO of Compositor Software project). The whole volume of Cavity track emission is 328 wavetables. Wavetables contain radio repeaters, transmitting stations, Ethernet routers, injectors and other ether equipment. It was possible to increase the Compositor v9 Hypervisor regeneration speed up to 150-omega by applying a new peering network patch. This influences only Compositor AV Extended auxiliary channel and doesn’t cover the generic feeder modules. It was made aiming the faster composition speed of the whole pool of Compositor Networks ether aggregators. The necessity in uniform composition caused by big amount of wavetables in Compositor Library. The application of the new patch after the attack was made unnoticeably, because this solution proved to be successful in 2017. It was clear right from the beginning that hackers aim is to limit the communication circle of network devices to Compositor Library pool and its real emission. From one side, if the emission is made every time when server communicates, then there will be much more devices in Compositor Library. Each streaming playback with working patch is a communication with its transmitting devices. Taken this, it is needed either to shut down any internet activity from the patched machine or to make emissions of the whole material, which is played in browser resulting in big amounts of information. From the other side, with open ports it is possible to connect not to the virtual network, created by composition feeding, but directly to all transmitting devices, which reside in Ethernet without the need to make emissions so often.