top of page

Software codes of mantra,

tantra, witchcraft, black magic, evil eye, evil tongue &c



It is foretold! The torrential flow of inexorable destiny!

31 Detecting an inserted code

Now, coming back to the issue of inserted codes doing various kinds of tricks and broadcasting signals, there is this minor instance that can be mentioned. There is a way that Google asks a web owner to verify his or her ownership of his or her website. A very small code is given as a Notepad file. All the owner has to do is to upload it to his or her server. And inform Google that it has been uploaded.

Now, this informing is not calling Google or sending Google an email. Simply click on a button that says Verify or something like, Uploading Over etc.

Within seconds, Google crawler will visit the uploaded page, and receive the information that it is on the server. It is something like, the notepad file giving a shake-hand and saying, Oh, Yes, I am here. He/She is the correct owner.

It is as simple as that. Or as complex as that.

It is simple to the extent that this work is quite easy. It is quite complex due to the fact that one should know how to write the codes, and to create a crawler to go and give the hand-shake.

00. Book profile


01. Intro

02. The frill issues

03. The deeper themes

04. Code view, design view & real view

05. The exact danger in social development

06. The fabulous un-detection

07. The machinery of disparaging

08. Lost in translation

09. A hint of the codes behind solid reality

10. Codes of Aiyitham

11. Upward lifting power

12. Codes of ‘respect’

13. The code version view of human beings

14. An observation at a personal level

15. A very powerful experiment

16. Locating the Voodoo-acting location

17. The continuous wobbling

18. The arena of Sensations

19. Words that crush and those that stretch

20. Software codes of Shamanism

21. Other supernatural software items

22. The issue of touching and of un-touch-ability

23. A detour to English colonial administration

24. Back to repulsions in touch

25. A supernatural way to off-set negativity

26. Allusions to the anecdotal black-tongue

27. Metamorphosing into a hermit

28. Back to the eerie realm of Evil Eyes

29. A thing that can provoke the evil eye

30. From my personal experience

31. Detecting an inserted code

32. The viewing angle

33. The Codes of touch

34. Gadgetries of degrading

35. Issue of viewing

36. A clue from the epics of the landscape

37. What bodes ill for England

38. Codes of imagination

39. The slow rattling and the rearrangement

40. Astrology and other divinations

41. Hidden codes in spiritual scriptures

42. The curse of the serpents

43. The ambit of a disaster

44. Nonsensical theories of communication

45. Continuing on the serpent theme

46. Jinxed buildings

47. Jinxed positions around a place of worship

48. The second item: the broken mirror

49. Supernatural codes of building design

50. The spoken word and the effect of pronunciation

51. The Pied-Piper-of-Hamelin capacity

52. The diffusion of numerical values

53. The litmus test of stature codes

54. The working of the breached codes

55. On to the attributes of ‘sensation’

56. Miscellaneous items

57. Decoding bird signs

58. Use of urine, hair, nail, blood etc. in black arts

59. Lucky stones

60. Sleeping positions

61. The proof of the pudding

62. A software based disease treatment system

63. The power of indicant words to redesign

64. The other means to investigate

65. The fabulous ‘n’ word

66. Yantram

67. A warm talisman

68. Computer coding in feudal languages

69. Commentary 1

70. Commentary 2

71. Commentary 3

72. Commentary 4

bottom of page