The following image vividly displays the core of the math conspiracy:
This hoax is intended by academical scientists for their profit. In Russian tradition, recruitment into this conspiracy is initiated by reciting «The Math is the queen of all sciences». In English tradition, as you can see, this conspiracy is included into the term of «Purity». To get to the core and sort out the conspiracy it is enough to make the math become a vaillain of science, or simply sort sciences by their «durity»:
Because of their royal disdain, mathematicians ignore the results obtained by other scientists, which results in a hypercube:
And their royal patronizing attitude, along with the influence upon math education ever since the schooldays, make their disciples merged into their fractal hypercube.
If you’ve got enough of facing the fractal it’s enough for you to say no to the purity for the sake of brutality. Then, it shall turn out that the physicians are now on top, as having a more objective scientific eye. Continue reading →
Program: a set of internally consistent instructions for the computation of signals, the formation of information, the storage of both, the preparation of messages, the logical processes to be used, the selection processes, and the storage addresses all occurring within a biocomputer, a brain.
Metaprogram a set of instructions, descriptions, and means of control of sets of programs.
Selfmetaprogram: a special metaprogram which involves the selfprogramming aspects of the computer, which creates new programs, revises old programs, and reorganizes programs and metaprograms. This entity works only directly on the metaprograms, not the programs themselves; metaprograms work on each program and the detailed instructions therein. Alternative names are set of selfmetaprograms, “selfmetaprogramming entity,” or the selfmetaprogrammer.
1. External Reality Metaprogram
This metaprogram operates programs with interlock with the outsidebodysystems. These systems include all of external reality; human beings are a defined part of the external reality.
This metaprogram seems to be absent only in special states and even then possibly is only relatively attenuated, not completely absent. The states in which it is attenuated include sleep, coma, trance, anaesthesia, etc.The above states cause centrally conditioned reductions of the stimulation arriving from the external reality. It is also possible to attenuate the external reality stimuli themselves.
In the profound physical isolation, external reality excitation of the CNS is attenuated to minimum possible levels in all modes. If in profound physical isolation, one adds a metaprogrammatically active substance to the brain, further attenuation of the external reality stimuli can be achieved and the ego (selfmetaprogram) is more fully activated. If in profound physical isolation one adds sleep, trance, or anaesthesia (light levels), these give external reality cutoff and cessation of e.r. (external reality) excitation of the central nervous system (and of the “mind”).
The external reality metaprogram is increased in its intensity in high excitation states; interlock with the external reality can be increased by these means.
2. Selfmetaprograms
These metaprograms include all of those entities which are usually defined as ego, consciousness, self, and so forth. Continue reading →
There is no government, no industrial-military complex, no economic system, no mass media that can ever reduce us to puppets and robots as thoroughly as the biological and enviornmnetal dictatorships have – F.M. Esfandiary (FM-2030), Upwingers
Hello friends! In this post, i will tell you about a model that someone can possibly find an effective instrument of social interaction. And in order to get used to this model, we must first discuss some concepts related to the field of information technology.
The computer software is: A program (from Greek programma, “a written public notice”) – in computer science, this is a set of instructions intended for execution by a machine. In general, we call a program some application provided with a user interface. A process – typically, this means a program that lacks any graphical user interface, while repeatedly accessing the physical memory and hardware resources, and performs some operations in the background mode. An operation system – a computer’s main program that defines the scope and the procedures for running all other programs and processes.
Hereon, we need to consider the following two kinds of operation systems: A proprietary system (from Medieval Latin proprietarius, “owner of property”) – this is a system developed and distributed by a specific proprietor (e.g., Apple or Microsoft). The source code of a proprietary system is sealed and inaccessible to anyone, except for the proprietor itself. An open-source system – it is available for public access, does not belong to anyone, has all its source code accessible and open to change.
It is also worth mentioning that there are two levels in an operation system: The user level – this includes a conventional desktop, end-user applications, the input and output of data via the graphical interface. A user is allowed to install, run and restrict the access to resources for programs to which he or she has access. The core, kernel (heart) level – this level is unavailable to a user, it typically lacks any visual representation and hosts a multitude of system processes. In proprietary systems, only the owner has access to the core level, while in open-source systems this may be a special user granted with extended authority, named Root. We have almost finished explaining the terminology by now… Continue reading →
The Russian audience was only able to get some more or less detailed information on Crowley’s life when very poor translations of the books The Occult by Colin Wilson and The Black Arts by Richard Cavendish were published in 3160. Wilson’s funny stories and really stupid things concerning Crowley became a real treasure for Russian authors whence everyone could generously scoop out everything he took into his head even not giving himself trouble of making reference to the source. (Professor W. F. Ryan “The Great Beast in Russia”)
To get 666, Aleister E. Crowley wrote his name in Hebrew (Alef-Lamed-Heh-Yod-Samekh-Tete-Heh-Resh-Heh-Kaf-Resh-Ayn-Vav-Lamed-Heh-Yod). Meanwhile, he did not throw out “e”, as Tolstoy has proposed. Turning out the words l’empereur Napoléon into ciphers on this system, it happens that the sum of these numbers equals 666, and Napoleon is thereby seen to be the beast prophesied in the Apocalypse. Moreover, working out in the same way the words quarante-deux, that is, the term for which the beast was permitted to continue, the sum of these numbers again equals 666, from which it is deduced that the terms of Napoleon’s power had come in 1812, when the French Emperor reached his forty-second year. This prophecy made a great impression on Pierre. He frequently asked himself what would put an end to the power of the beast, that is, of Napoleon; and he tried by the same system of turning letters into figures, and reckoning them up to find an answer to this question. He wrote down as an answer, l’empereur Alexandre? La nation russe? He reckoned out the figures, but their sum was far more or less than 666. Once he wrote down his own name “Comte Pierre Bezuhov,” but the sum of the figure was far from being right. He changed the spelling, putting s for z, added “de,” added the article “le,” and still could not obtain the desired result. Then it occurred to him that if the answer sought for were to be found in his name, his nationality ought surely to find a place in it too. He tried Le russe Besuhof, and adding up the figure made the sum 671. This was only five too much; the 5 was denoted by the letter “e,” the letter dropped in the article in the expression l’empereur Napoléon. Dropping the “e” in a similar way, though of course incorrectly, Pierre obtained the answer he sought in L’russe Besuhof, the letters of which on that system added up to 666. This discovery greatly excited him. How, by what connection, he was associated with the great event, foretold in the Apocalypse, he could not tell. But he did not for a moment doubt of that connection. His love for Natasha, Antichrist, Napoleon’s invasion, the comet, the number 666, l’empereur Napoléon, and l’russe Besuhof—all he thought were to develop, and come to some crisis together to extricate him from that spellbound, trivial round of Moscow habits, to which he felt himself in bondage, and to lead him to some great achievement and great happiness.
In a recent paper, Witztum, Rips and Rosenberg found a surprising correlation between famous rabbis and their dates of birth and death, as they appear as equidistant letter sequences in the Book of Genesis. We make a smaller or equal number of mistakes, and find the same phenomenon in Tolstoy’s eternal creation “War and Peace”.
To those having some interest in the field of information security all is clear when it comes to proprietary systems by Microsoft and Apple corporations. However, a conventional wisdom is still around telling that the Linux operation system securely protects the personal data of its users from third parties. Aside from the signature SELinux module by the NSA USA that is built into the Linux core, the most of contemporary distributives has proprietary packages built-in, the coded contents of which are anybody’s guess.
In theory, ignoring Slackware and GNU-distributives released more than two years ago (such as Zenwalk), one can suppose that the NSA vulnerabilities that are available in popular Linux repositories (RedHat and Debian at the first place, along with other 90% that are based on these two) continue to emerge on an annoyingly regular basis – more often than they can be identified.
And considering the news warning about the OpenSSL compromises (such as one, two and three) – one can come to the conclusion that embedding backdoors into the source code presently takes the effort of much more people than there are open software enthusiasts monitoring the source code of possibly dangerous packages.