Tele Phone Number: Fill & Download for Free

GET FORM

Download the form

How to Edit The Tele Phone Number with ease Online

Start on editing, signing and sharing your Tele Phone Number online refering to these easy steps:

  • click the Get Form or Get Form Now button on the current page to access the PDF editor.
  • hold on a second before the Tele Phone Number is loaded
  • Use the tools in the top toolbar to edit the file, and the change will be saved automatically
  • Download your modified file.
Get Form

Download the form

A top-rated Tool to Edit and Sign the Tele Phone Number

Start editing a Tele Phone Number now

Get Form

Download the form

A clear tutorial on editing Tele Phone Number Online

It has become really easy presently to edit your PDF files online, and CocoDoc is the best online PDF editor you have ever used to have some editing to your file and save it. Follow our simple tutorial to start!

  • Click the Get Form or Get Form Now button on the current page to start modifying your PDF
  • Add, modify or erase your content using the editing tools on the top toolbar.
  • Affter editing your content, put on the date and make a signature to complete it perfectly.
  • Go over it agian your form before you save and download it

How to add a signature on your Tele Phone Number

Though most people are in the habit of signing paper documents with a pen, electronic signatures are becoming more regular, follow these steps to add a signature!

  • Click the Get Form or Get Form Now button to begin editing on Tele Phone Number in CocoDoc PDF editor.
  • Click on the Sign icon in the tools pane on the top
  • A box will pop up, click Add new signature button and you'll have three choices—Type, Draw, and Upload. Once you're done, click the Save button.
  • Move and settle the signature inside your PDF file

How to add a textbox on your Tele Phone Number

If you have the need to add a text box on your PDF and create your special content, follow the guide to carry it out.

  • Open the PDF file in CocoDoc PDF editor.
  • Click Text Box on the top toolbar and move your mouse to carry it wherever you want to put it.
  • Fill in the content you need to insert. After you’ve typed in the text, you can actively use the text editing tools to resize, color or bold the text.
  • When you're done, click OK to save it. If you’re not settle for the text, click on the trash can icon to delete it and begin over.

An easy guide to Edit Your Tele Phone Number on G Suite

If you are seeking a solution for PDF editing on G suite, CocoDoc PDF editor is a commendable tool that can be used directly from Google Drive to create or edit files.

  • Find CocoDoc PDF editor and install the add-on for google drive.
  • Right-click on a chosen file in your Google Drive and select Open With.
  • Select CocoDoc PDF on the popup list to open your file with and allow CocoDoc to access your google account.
  • Make changes to PDF files, adding text, images, editing existing text, mark with highlight, retouch on the text up in CocoDoc PDF editor and click the Download button.

PDF Editor FAQ

Besides religion, what are some scams which are commonly used to deceive people?

Teleking Scan (Samsung Galaxy Grand II / Apple iPhone 4S giveaway scam)This happened to me today . I got call from a lady on my phone number saying their company (which she said was 'Samsung' ) has completed 25 years (which I knew was simple lie , but I continued to listen to her bullshit) and they are giving away Samsung Galaxy Grand 2 to lucky customers which is worth over 17k for just 3k. She said they drew 10 numbers from their database* and offered them this huge phone .She asked me my name , I told her . She already had my address , she confirmed with me if it's my current address . I was astonished as if how can they have my address without me telling them?Then she confirmed with me pincode of my area according to their database, it was accurate. And then she told me , I'll receive my parcel at nearest mobile shop and I'll have to pay required amount and if I am not satisfied with product I can use 'warranty card' which was contained in the box and return phone it at same shop and get my money back. And at all times she assured me that she was from Samsung and that they have head offices at Delhi , Mumbai ,etc and I can view my product and then pay the required amount and that their company's exact address will be written on Parcel and so on. And I will receive confirmation call within 24 hours (:D). I hanged up the call.Then I got back to my work -> checking authenticity of this thing :P.So , I checked up this number 9310062627 on TrueCaller and got this :Tras Nako Gheu (which was written in Marathi , my mother tongue coincidentally , it roughly means "Don't worry") .Then I double checked Wikipedia page for Samsung which said "Founded : 1938 ; 77 years ago" , then I searched for keywords on Google like : "Samsung Galaxy Grand 2 fraud" "Samsung 25 years" ,etc.Then I saw these :They deceive you into thinking that they are genuine guys and create a situation when you've to transfer money before getting your parcel from post office and not from any shop.I searched all these phone numbers from where people received calls from on Truecaller and they were named like "Delhi Samsung" "Alok Samsung" "Samsung Rekha" ,etc.I was aware of few types of scams like those of Nigeria 419 types due to my exposure to Internet (esp. Quora). I took a deep breath after reading all those sad stories and thought I will write my first answer on Quora :D.I'm yet to get confirmation call from her and I'm just on initial process of getting looted so, I'll obey her instructions like sincere 18 y.o kid. I'm expecting 3-4 more calls , I'm looking forward to troll them on last step of process :P.[Edit 1: If anyone have any idea on how to expose these people feel free to comment , as per my guess I don't think if they could be caught just by phone numbers.]So , guys please be aware of such things.People generally are aware of scams where you are required transfer money first before getting your reward and then get duped.But this one's bit different . These guys invented such a method to deceive people and people also believe it since they can pick their parcel from nearest post office and they think they can get refund from the same place if it's some kind of fraud.They (post office guys) won't give you your parcel until you pay them (E-billing method). And once you open it , it'll be too late to realize you're duped.I found this on YouTube :-Infinite Teleking packaging.I'm new to writing , edit suggestions will be appreciated.Hope this answer helps people.Sources (Some sad stories) : TELEKING Complaints ;Tele Marketing - Samsung galaxy grand fraud Advisory ;Page on grahakseva.com ;Tele Ten (Fraud In The Name Of Samsung Galaxy Head Office) Rohini Sector 11 - fraud and scam in the name of samsung galaxy grand 2 lotteryTeleking - fraud company ;Teleking - making fraud by sending wrong item ;

How do I get in contact with restaurants owners or restaurant franchises to promote my wine?

Reach out to Easyleadz. They will help you build the list with contact details of restaurant owners to whom you can call and sell your wine.Easyleadz builds the list by crawling web and delivers the output in excel sheet with following fields:Name of the restaurantWebsite(if any)Email IDPhone NumberComplete AddressDo remember that most of the restaurant owners will be more active on the phone rather than e-mail hence tele-calling will work better.Also, they are mostly available after 3 in the afternoon.(nature of business)Hope this works for you.P.S. I work atEasyleadz

What are some unsolved mysteries of the internet?

DISCLAIMER: THE FOLLOWING STORIES ARE TRUE. NO CREATIVE LIBERTIES WERE TAKEN AND ALL NON-FACTUAL RUMORS HAVE BEEN SPECIFIED AS SUCHHere are the three strangest mysteries the internet has ever produced.Cicada 3301This story is maybe the most tantalizing of all, as someone came so close to cracking the mystery that we almost found out the story behind it, but not quite.In 2013, a post from a user named 3301 on 4Chan circulated the internet. The post was an image that read;A renowned cryptographer and internet junkie, Joel Erikson, was intrigued by this puzzle and entered the mad hunt to decipher the message. Erikson was the only person to publicly decipher the entire puzzle.The image code contained a text message, which was readable by opening the image in a text editor. The code looked like this:Erikson knew this was a clue. A Tiberivus Caesar is a cipher method, simply known as the Caesar Cipher. Erikson put the code in quotes through a decoder and began trying it with different keys. The key “4” successfully output an Imgur link, which led to this image:However, Erikson knew this was a trick. The sentence “looks like you can’t guess how to get the message out” was out of place. He eventually, after reading the sentence several times forward and backward, got “guess” and “out” from reading both words before and after “how to get the message.” He figured out that the message was telling him to use OutGuess, a steganography tool, to decipher the image. The OutGuess tool outputs this message when the duck image is ran through it:Here is a book code. To find the book, and more information, go to http://www.reddit.com/r/a2e7j6ic78h0j/  1:20 2:3 3:5 4:20 5:5 The Reddit link led to a post named a2e7j6ic78h0j7eiejd0120 that contained these images:The strange image above is Mayan for the number 10, 2, 14, 7, 19, 6, 18, 12, 7, 8, 17, 0, 19.The next image:The “welcome” mat, when ran through OutGuess, outputs this message:-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1  - From here on out, we will cryptographically sign all messages with this key.  It is available on the mit keyservers. Key ID 7A35090F, as posted in a2e7j6ic78h0j.  Patience is a virtue.  Good luck.  3301 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)  iQIcBAEBAgAGBQJPBRz7AAoJEBgfAeV6NQkP1UIQALFcO8DyZkecTK5pAIcGez7k ewjGBoCfjfO2NlRROuQm5CteXiH3Te5G+5ebsdRmGWVcah8QzN4UjxpKcTQRPB9e /ehVI5BiBJq8GlOnaSRZpzsYobwKH6Jy6haAr3kPFK1lOXXyHSiNnQbydGw9BFRI fSr//DY86BUILE8sGJR6FA8Vzjiifcv6mmXkk3ICrT8z0qY7m/wFOYjgiSohvYpg x5biG6TBwxfmXQOaITdO5rO8+4mtLnP//qN7E9zjTYj4Z4gBhdf6hPSuOqjh1s+6 /C6IehRChpx8gwpdhIlNf1coz/ZiggPiqdj75Tyqg88lEr66fVVB2d7PGObSyYSp HJl8llrt8Gnk1UaZUS6/eCjnBniV/BLfZPVD2VFKH2Vvvty8sL+S8hCxsuLCjydh skpshcjMVV9xPIEYzwSEaqBq0ZMdNFEPxJzC0XISlWSfxROm85r3NYvbrx9lwVbP mUpLKFn8ZcMbf7UX18frgOtujmqqUvDQ2dQhmCUywPdtsKHFLc1xIqdrnRWUS3CD eejUzGYDB5lSflujTjLPgGvtlCBW5ap00cfIHUZPOzmJWoEzgFgdNc9iIkcUUlke e2WbYwCCuwSlLsdQRMA//PJN+a1h2ZMSzzMbZsr/YXQDUWvEaYI8MckmXEkZmDoA RL0xkbHEFVGBmoMPVzeC =fRcg -----END PGP SIGNATURE----- This is a very important message, as it shows how to discern real Cicaida images from fake ones using an encryption key.The next image:This image also contains an OutGuess message:-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1  The key has always been right in front of your eyes.  This isn't the quest for the Holy Grail. Stop making  it more difficult than it is.   Good luck.  3301 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)  iQIcBAEBAgAGBQJPCBl3AAoJEBgfAeV6NQkPo6EQAKghp7ZKYxmsYM96iNQu5GZV fbjUHsEL164ZLctGkgZx2H1HyYFEc6FGvcfzqs43vV/IzN4mK0SMy2qFPfjuG2JJ tv3x2QfHMM3M2+dwX30bUD12UorMZNrLo8HjTpanYD9hL8WglbSIBJhnLE5CPlUS BZRSx0yh1U+wbnlTQBxQI0xLkPIz+xCMBwSKl5BaCb006z43/HJt7NwynqWXJmVV KScmkpFC3ISEBcYKhHHWv1IPQnFqMdW4dExXdRqWuwCshXpGXwDoOXfKVp5NW7Ix 9kCyfC7XC4iWXymGgd+/h4ccFFVm+WWOczOq/zeME+0vJhJqvj+fN2MZtvckpZbc CMfLjn1z4w4d7mkbEpVjgVIU8/+KClNFPSf4asqjBKdrcCEMAl80vZorElG6OVIH aLV4XwqiSu0LEF1ESCqbxkEmqp7U7CHl2VW6qv0h0Gxy+/UT0W1NoLJTzLBFiOzy QIqqpgVg0dAFs74SlIf3oUTxt6IUpQX5+uo8kszMHTJQRP7K22/A3cc/VS/2Ydg4 o6OfN54Wcq+8IMZxEx+vxtmRJCUROVpHTTQ5unmyG9zQATxn8byD9Us070FAg6/v jGjo1VVUxn6HX9HKxdx4wYGMP5grmD8k4jQdF1Z7GtbcqzDsxP65XCaOYmray1Jy FG5OlgFyOflmjBXHsNad =SqLP -----END PGP SIGNATURE----- The Reddit link also contained this message:Ukbn Txltbz nal hh Uoxelmgox wdvg Akw; hvu ogl rsm ar sbv ix jwz mjotukj; mul nimo vaa prrf Qwkkb aak kau ww Ukpsf, ogq Kzpox vvl luf yh Qsrjfa, hvu Ktp hzs lbn ph Kipsy; ttv Sdmehpfjsf tad igr rcbkfgaplvj am uswrerwptk la hox cazkwn. Agk wx wm fhpwln ds ztov djoa mnwdl ers t wcjhxe au Crdjiy'l vsxhkv, talfw ktf nppe. Qnsdecqp Qcjhxrnmdz nal avwfx, ncuknq cg whxlqy, bf wxsqgax tufutc cbk cvfhgmwdz, ied mv fwqxvvf vhoo kpmn zauwlr, tur lc bafptm djst hl ltl The above text could be translated via a Viginere cipher, with a key translated by using a letter to number translator on the Mayan numbers.The cipher output a very very long passage from the book Mythology by Thomas Bulfinch.This passage was used in a Book Cipher translator, which output this message:Call us at us tele phone number two one four three nine oh nine six oh eight This phone number, when dialed, simply played the following message through a vocal scrambler:Very good. You have done well. There are three prime numbers associated with the original final.jpg image. 3301 is one of them. You will have to find the other two. Multiply all three of these numbers together and add a .com to find the next step. Good luck. Goodbye. The number 3301, when multiplied with the image dimensions which both happened to be prime, output this number: 509 x 503 x 3301 = 845145127. 845145127.com simply showed a cicada image and a countdown timer.The cicada led to no clues, simply outputting this message when OutGuessed:-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1  You have done well to come this far.  Patience is a virtue.  Check back at 17:00 on Monday, 9 January 2012 UTC.  3301 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)  iQIcBAEBAgAGBQJPCKDUAAoJEBgfAeV6NQkPf9kP/19tbTFEy+ol/vaSJ97A549+ E713DyFAuxJMh2AY2y5ksiqDRJdACBdvVNJqlaKHKTfihiYW75VHb+RuAbMhM2nN C78eh+xd6c4UCwpQ9vSU4i1Jzn6+T74pMKkhyssaHhQWfPs8K7eKQxOJzSjpDFCS FG7oHx6doPEk/xgLaJRCt/IJjNCZ9l2kYinmOm7c0QdRqJ+VbV7Px41tP1dITQIH /+JnETExUzWbE9fMf/eJl/zACF+gYii7d9ZdU8RHGi14jA2pRjc7SQArwqJOIyKQ IFrW7zuicCYYT/GDmVSyILM03VXkNyAMBhG90edm17sxliyS0pA06MeOCjhDGUIw QzBwsSZQJUsMJcXEUOpHPWrduP/zN5qHp/uUNNGj3vxLrnB+wcjhF8ZOiDF6zk7+ ZVkdjk8dAYQr62EsEpfxMT2dv5bJ0YBaQGZHyjTEYnkiukZiDfExQZM2/uqhYOj3 yK0J+kJNt7QvZQM2enMV7jbaLTfU3VZGqJ6TSPqsfeiuGyxtlGLgJvd6kmiZkBB8 Jj0Rgx/h9Tc4m9xnVQanaPqbGQN4vZF3kOp/jAN5YjsRfCDb7iGvuEcFh4oRgpaB 3D2/+Qo9i3+CdAq1LMeM4WgCcYj2K5mtL0QhpNoeJ/s0KzwnXA+mxBKoZ0S8dUX/ ZXCkbOLoMWCUfqBn8QkQ =zn1y -----END PGP SIGNATURE----- When the timer hit zero, the cicaida’s message changed. It now read:52.216802, 21.018334 48.85057059876962, 2.406892329454422 48.85030144151387,2.407538741827011 47.664196, -122.313301 47.637520, -122.346277 47.622993, -122.312576 37.5196666666667, 126.995 33.966808, -117.650488 29.909098706850486 -89.99312818050384 25.684702, -80.441289 21.584069, -158.104211 - -33.90281, 151.18421 36.0665472222222, -94.1726416666667 37.577070, 126.813122 Coordinates. These coordinates led to street lamps around the world that all had the following image and one of two possible QR codes:These QRs led to two possible images, both of cicadas. The images contained these two messages:-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1   A poem of fading death, named for a king Meant to be read only once and vanish Alas, it could not remain unseen.   1:5 152:24 the product of the first two primes 14:13 7:36 12:10 7:16 24:3 271:22 10:7 13:28 12:7 86:17 93:14 the product of the first two primes 16:7 96:4 19:13 47:2 71:22 75:9 77:4   You've shared too much to this point. We want the best,  not the followers. Thus, the first few there will receive the prize.   Good luck.   3301 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)   iQIcBAEBAgAGBQJPB/nmAAoJEBgfAeV6NQkPEnEQAKl5qtb3ZE5vs+c08KuzAi4a tQEE71fvb65KQcX+PP5nHKGoLd0sQrZJw1c4VpMEgg9V27LSFQQ+3jSSyan7aIIg SDqhmuAcliKwf5ELvHM3TQdyNb/OnL3R6UvavhfqdQwBXCDC9F0lwrPBu52MJqkA ns93Q3zxec7kTrwKE6Gs3TDzjlu39YklwqzYcUSEusVzD07OVzhIEimsOVY+mW/C X87vgXSlkQ69uN1XAZYp2ps8zl4LxoaBl5aVtIOA+T8ap439tTBToov19nOerusB 6VHS192m5NotfQLnuVT4EITfloTWYD6X7RfqspGt1ftb1q6Ub8Wt6qCIo6eqb9xm q2uVzbRWu05b0izAXkHuqkHWV3vwuSfK7cZQryYA7pUnakhlpCHo3sjIkh1FPfDc xRjWfnou7TevkmDqkfSxwHwP5IKo3r5KB87c7i0/tOPuQTqWRwCwcWOWMNOS7ivY KQkoEYNmqD2Yz3Esymjt46M3rAuazxk/gGYUmgHImgcu1zzK7Aq/IozXI7EFdNdu 3EoRJ/UL9Y0l0/PJOG5urdeeTyE0b8bwgfC2Nk/c8ebaTkFbOnzXdAvKHB03KEeU PtM6d6DngL/LnUPFhmSW7K0REMKv62h9KyP/sw5QHTNh7Pz+C63OO3BsFw+ZBdXL hGqP6XptyZBsKvz2TLoX =aXFt -----END PGP SIGNATURE----- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1   In twenty-nine volumes, knowledge was once contained. How many lines of the code remained when the Mabinogion paused? Go that far in from the beginning and find my first name.   1:29 6:46 the product of the first two primes 2:37 14:41 17:3 27:40 the first prime 2:33 1:1 7:45 17:29 21:31 12:17 the product of the first two primes 22:42 15:18 24:33 27:46 12:29 25:66 7:47   You've shared too much to this point. We want the best,  not the followers. Thus, the first few there will receive the prize.   Good luck.   3301 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)   iQIcBAEBAgAGBQJPB1luAAoJEBgfAeV6NQkP9oAP+gLu+FsRDf3aRcJtBkCOU2MX r/dagOTvCKWtuV+fedy0enWUZ+CbUjXOr98m9eq2z4iEGqKd3/MBXa+DM9f6YGUE jPum4wHtQDSJlZMazuYqJOVZGw5XmF25+9mRM6fe3H9RCiNDZpuXl3MzwdivYhcG B5hW14PcdHHteQf3eAUz+p+s06RDs+q1sNGa/rMQIx9QRe71EJwLMMkMfs81kfJC tCt21+8ud0Xup4tjUBwul7QCcH9bqKG7cnR1XWsDgdFP6a4x9Jl2/IUvp1cfeT7B YLS9W3lCM8thMemJr+ztQPZrpDlaLIitAT2L0B3f/k4co89v5X2I/toY8Z3Cdvoi hk0AdWzMy/XLDgkPnpEef/aFmnls53mqqe9xKAUQPMrI73hiJ+5UZWuJdzCpvt+F BjfQk15EJoUUW16K2+mBA1cSd+HJlnkslUTsjkq0E36XKChP+Cvbu/p6DLUMM2Xl +n3iospCkkHR9QDcHzE4Rxg9A435yHqqJ/sL2MXG/CY8X4ec6U0/+UCIF9spuv8Y 7w66D05pI2u9M/081L7Br0i0Mpdf9fDblO/6GksskccaPkMQ3MRtsL+p9o6Dnbir 6Z2wH2Kw1Bf0Gfx4VcpHBikoWJ5blCc6tfvT+qXjVOZjWAL7DvReavSEmW1/fubN C3RWcjeI4QET2oKmV2NK =LWeJ -----END PGP SIGNATURE----- This is where the hunt began to quiet down. People realized that going against Cicaida 3301’s wishes may endanger their very lives as this search was no longer internet-only. Cicaida had demonstrated their power, placing signs all around the world and the few hunters left were no longer public about it with the exception of Joel.The book passage was deciphered eventually by using codes from the second message, resulting in this seemingly random jumble of text:sq6wmgv2zcsrix6t.onionThis text was a dark web link accessible via TOR browser.The site displayed this:Congratulations!  Please create a new email address with a public, free web-based service. Once you've never used before, and enter it below. We recommend you do this while still using tor, for anonymity.  We will email you a number within the next few days (in the order in which you arrived at this page). Once you've recieved it, come back to this page and append a slash and then the number you recieved to this url. (For example, if you recieved "3894894230934209", then you would go to "[http:// http://sq6wmgv2zcsrix6t.onion/3894894230934209]")  3301 The trail essentially went cold here. There are some leaked rumors about a MIDI file leading to another puzzle, but nobody who completed it publicly announced anything of the sort.A month later, this message was displayed on the Reddit forum:The P.S led to another crazy hunt a year later. However, this hunt was not as public and the trail seemingly went cold early on. The realization that the Cicada organization was actually a powerful and intelligent syndicate and not some coder playing a prank had an effect on the hunters, who were very quiet about anything they did. To this day, nobody knows who Cicada 3301 is, why they devised such an elaborate hunt, or what happened to the people who cracked the final puzzle.Blank Room Soup.AVIWhile other unsolved internet mysteries like Cicaida 3301 are certainly ominous, Blank Room Soup is plain out creepy.A man named Reymond Persi, a theatrical visionary, created a series of characters that he called RayRay.These characters were envisioned to have mime-like movements and a very specific demeanor. Reymond spent weeks training professional actors to properly portray his characters for a show.When the RayRay project went on tour in 2008, two costumes randomly went missing after a show. Reymond looked everywhere for these costumes but could not find them, so he assumed they were stolen.Now here is where things get creepy. A week later, Reymond received an email from an anonymous address that simply stated: “from a fan.” Attached was a video file, named BlankRoomSoup.avi. The video depicted a shirtless man of Asian or Latino complexity with a censored face scarfing down soup in a white room with an oversized spoon.After around 30 seconds of the man eating, a figure enters the room, dressed in a RayRay costume.The figure, perfectly portraying the RayRay diction according to Reymond, silently enters the room and the man immediately starts sobbing. He continues to sob while scarfing down soup, and the RayRay kneels down and begins to stroke the man’s back lightly.After around a minute of this, a second RayRay enters the room and also begins to stroke the man’s back, who is still sobbing while messily eating soup.The video ends suddenly after a minute of this.Reymond posted this video to the internet, asking who did this and why. The eerie video and the story rapidly blew up, but nobody confessed, even anonymously.After a while, another email was sent to Reymond, this time completely blank apart from a video named 2.AVI. The video depicts the man eating soup again, this time alone. He stops eating and begins to gag suddenly, and as he does a RayRay silently enters the room.The man does not appear to notice him. The second RayRay enters the room silently after almost ten seconds, and they silently watch the man.After almost twenty seconds, they exchange glances. Suddenly, one character rushes across the room, arms raised. A scream rings out and the video cuts silent.And that was it. No confession, no explanation, nothing. To this day, nobody knows what happened to the man, the costumes, or the creators. The RayRay act was canceled and the videos faded into myth.Sad SatanIn 2015, a YouTuber named Obscure Horror Corner received an anonymous tip from a subscriber, only known as ZK. The YouTuber did a playthrough of the series, claiming the anonymous tip he received led him to a Dark Web forum with the game available for download.The game consists of a first-person camera traversing a black and white maze, being chased by strange creatures. There is no plot, story, or mechanics. Random ends in the maze contain easter eggs, strange images, and cutscenes that are not discernable.The game gained popularity and a subreddit where internet gurus discussed the game.Suddenly, on 4Chan, a user named ZK posted, claiming that Obscure Horror Corner did not play the “true” version of the game, which he included in a link.This version of the game included a deadly virus and random cutscenes that showed gore, torture, and child pornography. Many sections also contain ASCII characters on the wall that translate to the phrases “I see you,” “You can’t escape me,” “I can track you,” etc. Given that the true version of the game was riddled with advanced viruses, these threats are likely actually true.This game is riddled with easter eggs, containing child molester monologues in the soundtrack that are heavily stretched and processed in addition to the flashing video cutscenes depicting child abuse and murder.The sheer amount of secrets, easter eggs, and other content hidden behind this seemingly plain game are mind-boggling and it is still poorly understood. To this day ZK and the true origins of this game are unknown.These three mysteries are the most prominent in Internet history, although many many more exist, some of which involve child abuse, murder, and worse. While the internet contains lots of interesting things, you do not want to see everything it has to offer.Dream On,Jaiden

Comments from Our Customers

Value for money. Reliable digital signage request emails. Useful dashboard and easy to set up document editor.

Justin Miller