source code

There is no government, no industrial-military complex, no economic system, no mass media that can ever reduce us to puppets and robots as thoroughly as the biological and enviornmnetal dictatorships have – F.M. Esfandiary (FM-2030), Upwingers

Hello friends! In this post, i will tell you about a model that someone can possibly find an effective instrument of social interaction. And in order to get used to this model, we must first discuss some concepts related to the field of information technology.

The computer software is:
A program (from Greek programma, “a written public notice”) – in computer science, this is a set of instructions intended for execution by a machine. In general, we call a program some application provided with a user interface.
A process – typically, this means a program that lacks any graphical user interface, while repeatedly accessing the physical memory and hardware resources, and performs some operations in the background mode.
An operation system – a computer’s main program that defines the scope and the procedures for running all other programs and processes.

Hereon, we need to consider the following two kinds of operation systems:
A proprietary system (from Medieval Latin proprietarius, “owner of property”) – this is a system developed and distributed by a specific proprietor (e.g., Apple or Microsoft). The source code of a proprietary system is sealed and inaccessible to anyone, except for the proprietor itself.
open sourceAn open-source system – it is available for public access, does not belong to anyone, has all its source code accessible and open to change.

It is also worth mentioning that there are two levels in an operation system:
The user level – this includes a conventional desktop, end-user applications, the input and output of data via the graphical interface. A user is allowed to install, run and restrict the access to resources for programs to which he or she has access.
The core, kernel (heart) level – this level is unavailable to a user, it typically lacks any visual representation and hosts a multitude of system processes. In proprietary systems, only the owner has access to the core level, while in open-source systems this may be a special user granted with extended authority, named Root. We have almost finished explaining the terminology by now… Continue reading

disCoredian Leo Tolstoy

The Russian audience was only able to get some more or less detailed information on Crowley’s life when very poor translations of the books The Occult by Colin Wilson and The Black Arts by Richard Cavendish were published in 3160. Wilson’s funny stories and really stupid things concerning Crowley became a real treasure for Russian authors whence everyone could generously scoop out everything he took into his head even not giving himself trouble of making reference to the source. (Professor W. F. Ryan “The Great Beast in Russia”)

To get 666, Aleister E. Crowley wrote his name in Hebrew (Alef-Lamed-Heh-Yod-Samekh-Tete-Heh-Resh-Heh-Kaf-Resh-Ayn-Vav-Lamed-Heh-Yod). Meanwhile, he did not throw out “e”, as Tolstoy has proposed.

Turning out the words l’empereur Napoléon into ciphers on this system, it happens that the sum of these numbers equals 666
, and Napoleon is thereby seen to be the beast prophesied in the Apocalypse. Moreover, working out in the same way the words quarante-deux, that is, the term for which the beast was permitted to continue, the sum of these numbers again equals 666, from which it is deduced that the terms of Napoleon’s power had come in 1812, when the French Emperor reached his forty-second year. This prophecy made a great impression on Pierre. He frequently asked himself what would put an end to the power of the beast, that is, of Napoleon; and he tried by the same system of turning letters into figures, and reckoning them up to find an answer to this question. He wrote down as an answer, l’empereur Alexandre? La nation russe? He reckoned out the figures, but their sum was far more or less than 666. Once he wrote down his own name “Comte Pierre Bezuhov,” but the sum of the figure was far from being right. He changed the spelling, putting s for z, added “de,” added the article “le,” and still could not obtain the desired result. Then it occurred to him that if the answer sought for were to be found in his name, his nationality ought surely to find a place in it too. He tried Le russe Besuhof, and adding up the figure made the sum 671. This was only five too much; the 5 was denoted by the letter “e,” the letter dropped in the article in the expression l’empereur Napoléon. Dropping the “e” in a similar way, though of course incorrectly, Pierre obtained the answer he sought in L’russe Besuhof, the letters of which on that system added up to 666. This discovery greatly excited him. How, by what connection, he was associated with the great event, foretold in the Apocalypse, he could not tell. But he did not for a moment doubt of that connection. His love for Natasha, Antichrist, Napoleon’s invasion, the comet, the number 666, l’empereur Napoléon, and l’russe Besuhof—all he thought were to develop, and come to some crisis together to extricate him from that spellbound, trivial round of Moscow habits, to which he felt himself in bondage, and to lead him to some great achievement and great happiness.

In a recent paper, Witztum, Rips and Rosenberg found a surprising correlation between famous rabbis and their dates of birth and death, as they appear as equidistant letter sequences in the Book of Genesis. We make a smaller or equal number of mistakes, and find the same phenomenon in Tolstoy’s eternal creation “War and Peace”.

ODD# II(b)/4,iii;52Dsc3180

NSA looks after those interested in Linux and information security

http://habrahabr.ru/post/228665/ – NSA looks after those interested in Linux and information security
To those having some interest in the field of information security all is clear when it comes to proprietary systems by Microsoft and Apple corporations. However, a conventional wisdom is still around telling that the Linux operation system securely protects the personal data of its users from third parties. Aside from the signature SELinux module by the NSA USA that is built into the Linux core, the most of contemporary distributives has proprietary packages built-in, the coded contents of which are anybody’s guess.
In theory, ignoring Slackware and GNU-distributives released more than two years ago (such as Zenwalk), one can suppose that the NSA vulnerabilities that are available in popular Linux repositories (RedHat and Debian at the first place, along with other 90% that are based on these two) continue to emerge on an annoyingly regular basis – more often than they can be identified.
And considering the news warning about the OpenSSL compromises (such as one, two and three) – one can come to the conclusion that embedding backdoors into the source code presently takes the effort of much more people than there are open software enthusiasts monitoring the source code of possibly dangerous packages.
But for those who do not like the idea of being transparent for USA security services there is, at last, a durable solution, provided with a russian-speaking technical support and an audit from russian intelligence services: Mandriva-based ROSA distributives, certified by FSTEC and Russian Ministry of Defence. These distributives have been diligently customized by the application software developers of SNORT, VYATTA and Information Security Systems, as part of a project to create a national software platform prototype. Using the ROSA distributives, you can make yourself and your data unavailable to the American intelligence services.
ODD# III(c)/2,v;39Cfn3180

to what extent is your world-view based on forgeries?

A forgery is a deliberate attempt to mislead the public (readers, spectators, audience.) This notion is generally attributed to an art form and does not imply any deceitful wrong-doing.

In mass consciousness, it is widely held that the Stonehenge is genuinely ancient, supposedly as old as five thousand years. Meanwhile, the island exhibits the tallest megalith ever worked by man, which is the Rudston monolith estimated to be only three and a half thousand years old. Moreover, as lately as seventy years ago, the Stonehenge location was reached out by a railway spur that was subsequently dismantled by the landed proprietors of that time. Here you can view the photos illustrating the process of building this forgery up, as well as acquaint yourself with the list of main sources for would-be etchings of past ages and written testimonials:

Stonehenge

Or, may it be that the Stonehenge is genuine? Was the ancient civilization of Britain actually capable of rolling over the heavy tonnage stone blocks, much like the military and railway vehicles of the past century?

Another feature of mass consciousness is the belief in authenticity of the so-called “crop circles”. Aside from the fact that as lately as thirty years ago some ninety nine percents of photography and eyewitness accounts on them were coming exclusively from Britain itself, widely known today is the official web site belonging to the main group of creators of these images and allowing one to take a closer look at the technology of creating such circles: Continue reading