your home for Starcraft Home Forum Starcraft Tournaments

"I'm going to have to move to New Mexico and start a cult in your name now"

The Kakarotto[cF] Chronicles: Part One
View or Add Comments (# of comments thus far: 37)
Date: 04/06/04 05:04
Game Type: Starcraft
Categorize this report
Report Rating: 8.0, # of Ratings: 2, Max: 8, Min: 8
Lifetime Rating for EldritchEvil: 8.5111

Since Fileread is broken, you'll have to deal with some filler. The filler is taken from this site which has many wonderful Starcraft Haikus.

Fleeting words on-screen:
"Nuclear launch detected."
Your base is no more...

Holed up in bunker,
a lone Marine shoots Zerglings.
Did he make it, Sarge?

Your towers explode;
Shadows creep across your base:
Yamato cannon.

Too many are dead.
Humans are frail, Mechs are not.
"Goliath online!"

Obstacle ahead;
many Marines need to cross.
"Strap yourselves in, Boys!"

The smell of burnt Zerg;
Firebats stand triumphant.
They cry, "Need a light!?"

Carriers, fearless.
But then, a faint sound: "I'm gone..."
It's too late -- Lockdown.

Need many more Wraiths...
"Insufficient Vespene gas!"
The battle is lost.

Observers stand watch,
the red dot is visible...
Which Ghost do you kill?

Four Archons approach;
there is no need for panic:
EMP Shockwave...

You see the red dot.
You can even see the Ghost.
Defensive Matrix.

We're under attack!
From ruin, new life is born...
I shout, "For the Swarm!"

The path is all clear.
Forces rush ahead -- and die,
impaled by Lurkers.

A hormonal rage:
Ultralisks rip through flesh.
They cannot be stopped.

Can your buildings float?
Best get off the ground -- here come
Infested Terrans...

The Creep advances
steadily towards our foe
Zerg envelops all.

A race divided:
Zerg fights Zerg -- rush against rush.
Sunken Colonies.

You think you are safe,
then seventy Hydralisks
appear from the ground.

Sunken Colony --
Placing one on your foe's Creep
makes short work of him.

Your buildings collapse,
and Marines fall to their knees --
the Plague has been cast.

Zerglings were once asked,
"Why do you battle Marines?"
"They taste like chicken!"

I see through your eyes.
Secret plans are laid to waste --
Parasites abound.

Four probes; one Nexus.
Many possibilites.
A Pylon is born.

Three Protoss dragoons,
spidering forth from Gateways,
sing, "Saukh Khaumonoss!"

Have you Observers?
If not, you must fear the words:
"Warp field stabilized."

Move swift, strike swifter.
Now you see me, now you don't.
I am Dark Templar.

Fifty Zerglings come.
How many of them survive
my Psionic storm?

You must be so proud
of such expensive units.
Don't look -- Dark Archons...

Minerals consumed
on Photon Cannons and such.
Weep to see Corsairs.

Zergling rush too soon.
Probes destroyed, but then the words,
"My life for Aiur..."

My enemy walks;
Observer sits quietly.
Knowledge is power.

The Dark and the Light:
Two facets of the Templar.
Balance is the key.

Despite what you think,
no one's paying the Zealots --
They fight for Adun.

A Disruption Web:
Why aren't my guys firing?
"Hey! Move them, dumbass!"

What? No detectors?
Hear the whistle of Warp Blades.
Invisible death.

Rushing straight for death:
How brave can one Marine be
when fighting Reavers?

Why do you resist?
One Pylon standing alone
cannot win this war.

Sixteen Carriers --
How can there be so many?

Often overlooked,
Dark Archons fight with Feedback.
Watch the Medics burst!

Deadly irony:
a Dark Archon is taken --
wars of Mind-control.

A Scout fires fast,
but eighty Interceptors
will fire faster.

Dragoons navigate,
but half go off the wrong way.
Why are they so dumb?

Terran and Protoss
fight together as allies.
Recall my Seiged tanks.

Nothing more silly --
a Zealot gets a sponge bath.
Mind-controlled Medics.

Mind control the drones.
Mind control the SCVs.
Now control all three.

Jell-O pudding snacks --
Bill Cosby thinks he's so cool.
He can't play StarCraft.

Your base is your life
but don't worry, you respawn
in BunkerCommand.

Prolonged fighting brings
tiredness of mind and limb.
Stop playing StarCraft!

Apparently even this isn't enough. I will now copy and past things from random websites. If you value sanity, READ MY REPORT BY CLICKING THE IMAGE AT THE TOP OF THIS FILLER.

Hi everyone,
I'm just getting into the whole cloaking/personalized delivery thing and have just got onto the subtopic of filler text (am I right in thinking filler refers to non-keyword text?).

I was hoping some of you guys could give me your opinions on its use in cloaked pages. For example, do you frown on its use? Do you actually make cloaked pages human readable even though they're not meant for human consumption or do you just stick a load of random text between your keyphrases?

Thanks in advance,
Preferred Member

joined:May 3, 2001
msg #:2 7:46 pm on Jan 31, 2002 (utc 0)
Hi theboyduck (I like the name :) ),

I usually try to make them as if an actual client was going to read this pages. I think of it as spamming when your cloaked pages don't have any actual content that relates to the main pages. What happens when google takes your cloaked pages and caches them?

I would just try to stick with it as being actual content that clients will read.

My two cents.

Oh, Welcome to :)
Junior Member

joined:Jan 31, 2002
msg #:3 4:44 pm on Feb 1, 2002 (utc 0)
Hi circuitjump,
Thx for the warm welcome. That sounds right about using proper content, it just wouldn't sit easy with me producing pages which made no sense.

ritings on randomness

* Carl Ellison's excellent document on generating randomness
* RFC 1750: randomness recommendations
* RSA's intro to software random number generation
* Don Mitchell's suggestions for generating randomness
* Paul Kocher describes a subtle bug in RSAREF's randomness routines, which you should avoid if you ever write any randomness code.
* Don Davis describes a technique for mining entropy from your disk drive, and a subsequent post from him on portably extracting disk entropy by timing memory paging effects.
* Don Davis writes about pitfalls in using mouse events for randomness; see also a followup from J. Gallegos on more pitfalls with finding randomness from mice.
* Stephan Neuhaus analyzes the randomness of session keys in PGP: worthwhile reading!
* Arnold Reinhold explains how to generate high-quality true randomness by hand and surveys PGP passphrase entropy
* The passphrase FAQ
* An overview from Finland
* The physics of Geiger counters
* A fast quantum random generator: using quantum mechanics to build fast hardware for generating randomness
* David Honig argues "The FreeBSD /dev/random entropy-count calculation is probably too generous"; see also this page
* Chow and Herzberg propose a Network randomization protocol
* Terry Ritter's very extensive archive of Usenet posts on true randomness
* John Denker's design of a hardware random number generator

Source code for generating randomness

* A Yarrow implementation from Zero Knowledge Systems
* Wei Dai's code snippet for generating randomness on Windows 2000/NT using CryptoAPI
* Theodore Ts'o's Linux /dev/random source, part of the Linux 1.3.x kernel
* A Linux kernel patch for extracting entropy from the Intel 82802 hardware RNG
* Video entropyd
* John Denker's random number generation code
* Jack Lacy's CryptoLib, with a great random number generator: send email for more info
* librand, a random number package based on event interval variations, from Matt Blaze, Jack Lacy, and Don Mitchell; old version available here
* R. Walking-Owl's NOISE.SYS, for generating crypto-quality randomness under DOS [home page]
* Carl Ellison's software for mixing entropy
* Marcus J. Ranum's nifty source for a randomness driver
* Damien Miller's audio-entropyd, a daemon for harvesting randomness by sampling your soundcard
* Several randomness-generating programs
* Netscape's randomness fix
* A Java true random number class, based on librand above; untested [a simplified version]
* GenRand, a Java random number class
* Audio-based randomness
* An undocumented command-line switch to generate random bytes with PGP; but beware: PGP guru Galactus reports that the undocumented feature is bug-ridden; thanks to S for the tip
* A random passphrase generator in Javascript
* Don Davis on Solaris cryptorand
* The EntropyPool system (in Java)

Source code for testing randomness

* George Marsaglia's DIEHARD tests
* Bob Jenkin's randomness tests; and a local copy of one of them
* More randomness tests from Stephan Neuhaus; read his paper first
* Noise sphere implementations: [for PCs, in C] [for X11, in C] [Java version]
* Also see Terry Ritter's very extensive archive of Usenet posts on testing randomness
* David Honig's C implementation of Maurer's test
* A graphic user interface to the DIEHARD tests

Hardware for generating randomness

* Cryptography Research's evaluation of the hardware RNG in the C3 CPU
* Cryptography Research's evaluation of the hardware RNG in the C3 CPU
* Reinhold's excellent list of hardware randomness sources
* External hardware for true random number generation
* Hardware for generating true randomness, using quantum mechanics (!), from Univ. of Geneva, Switzerland
* Aware Electronics
* Robert Davies closely examines several hardware RNG devices for a lottery (now that's a demanding application!). His careful analysis is definitely worth reading, and he points out some surprising pitfalls.
* Hotbits, with a description of how they generate true randomness via radioactive decay.
* Plans for a hardware RNG device in Cryptosystems Journal (see volume 2); Maurice Onraet reports success with the kit.
* Tundra Corp.'s RPG 1210
* The SG100 [also available: a simple security analysis]
* ORB: open random bit generator
* Z5000 true random number generator
* A newsgroup article listing some RNG's (and their bitrates)
* Plans for another simple hardware RNG device
* Will Ware's plans for building a hardware RNG
* Interesting idea for hobbyists: using a smoke alarm as a RNG

Source code to other useful crypto modules

* MD5
* Several crypto libraries
* Peter Gutmann's crypto library (see especially his lib_rand.c) [old version]
* Jack Lacy's CryptoLib, with a great random number generator: send email for more info
* Online version of the Applied Cryptography disk
* SSLeay FAQ
* My local crypto hotlist


* An excellent list of links on crypto-quality randomness
* Diceware: manual entropy generation
* lavarand: generating randomness with lava lamps (!)
* Extensive links on random number generation (both cryptographic and non-cryptographi

Now click the image above.

View or Add Comments (# of comments thus far: 37)
Back to Report Listing