Speaking to Computers in Dragon Numbers


Speaking to Computers in Dragon Number Tongue

10011x1431M5432SY

What it means:

1: the start of something unless 1 is seen after another number. If it is after another number, it is “ensuring” that whatever it is you are starting, you are very sure that you want to start it. When sung or spoken, it is said as “utress”

0: zero is the command to tell a computer to “open itself” so you can hack it. That is said as “uwano”

X: that letter is for accessing the mainframe of any computer operated dragon program, such as the supercomputer Wishing-you-were-here. When said twice, that means the computer has a firewall. You have to say zero twice in order to bypass the firewall and go into the mainframe. X is said as “ishkefl” (ish-keh-full)

4: four is the number command for opening a binary. In the mainframe of a dragon-made computer, a binary holds all the system files needed for the computer to operate. Four is said as “chimer” (chimera without the “a”)

3: three is the location of a portable disk. If you have a replacement binary that holds your files and you want to place it on the computer you are hacking, you use three so the computer will know there is a portable disk. Three is said as Hir’clef.

M: that letter, when used in accordance with numbers, is a simple “open file” command. M is said as Dffuse (diff’uuse, not diffuse)

5: if the computer is resisting to open a file, you use five to force it to open it. Five is said as Rii

2: if the computer requests you to enter it’s password, you can use two to bypass that and use the letter S to “calm it.” Of course, you can only use two if your dragon essence is high enough. Two is said as Jir’wel.

S: that letter is used to “calm” computers. It prevents it from alerting itself and locking it’s files. S is said as Esyaa, which is a Hynnody word that means anything.

Y: that command is the finishing line. It tells the computer to begin installation of the new binary/operating system. Y is said Esyaa-eh.

68: this command “plants” a core file into the mainframe. A core file can contain anything, including a virus. This is said as Iffy.

7: if a file was planted, the computer will try to “unplant” it and call its original file to it (it will try to delete the core file that was planted and download its own core file). To prevent this, 7 is placed in the string command. This is said as “klk” (klik. It’s actually a sound.).

Song translation: Valbaara, start. Open yourself, I am sure, I am sure. Access mainframe, I am sure. Open binary. Location is the portable disk. I am sure.

Open file, heed this command, open binary. Location is on the portable disk. No password, I am enough. Start program installation.

10011x1431M5432SY

Utress, uwano-uwano, utress-utress ishkefl utress chimer hir’clef utress. Dffuse rii chimer hir’clef jir’well esyaa-esyaa eh.

1: utress

0: uwano

X: ishkefl

4: chimer

3: Hir’clef

M: dffuse

5: Rii

2: Jir’well

S: Esyaa

Y: Esyaa-eh

63: Iffy

7: klk

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s