Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - ivan

Pages: 1 [2] 3
16
Or Kill Me / Re: The trinity of dualities
« on: March 30, 2015, 09:36:02 pm »
And "I then realised PD was not impressed with my translated reposts from my Livejournal, and I would need to try harder to obtain my guru status".

by the way, check out this thread

17
Techmology and Scientism / Re: Only public scientific sources
« on: March 30, 2015, 08:59:20 pm »
You seem to have a fetish fir the word "forge" and derivatives.

And I hope this doesn't offend you but your thoughts seem disparate, have you been taking your pills?

I think that it is a feature of the translation. В оригинале всё это выглядит ещё более хаотично.

And i don't use any pills, i prefer powders from this store

18
Techmology and Scientism / Only public scientific sources
« on: March 30, 2015, 07:54:37 pm »
Over the course of centuries did Tula forge weaponry. And this has turned out to not be by chance.

Dedilovo (Russian: Дедилово) — a village in Kireevsk locality of Tula region. The city of Viatichi — Dedidoslavl (or Dedoslav) — was first mentioned in Hypatian Chronicle. Within the stronghold, the space was divided into leagers and cribs, based on the people's birth status. Each of the tradespeople had its place under the strenghold's protection. At present this place is a waste land.

Sisters and brothers, do you want to set yourself free from the sorcery that every time makes you forget even your own patronym, matronym and your mother's maid name, be obsessed over this golden wheel?

This post cites public scientific sources, without any dates, as well as archeological and etnographical facts:

The Antes (or Antae; Ancient Greek: Áνται; Russian: Анты) is a common name applied by Byzantean writers to Slavic tribes. This polyethnos joined Slavic tribes having a rudimental State. The basic social cell of Slavs was the community, called «rod» in chronicles. Based on the character of dwellings and settlements, a community consisted of families that only included next of kin. The family relationships of various tribes differed. The family relationships, as mentioned by Byzanteans, were similar to those of Polans and were described by The Tale Of Bygone Years. These were patriarchial customs, including «morning gifts» for a bride and ritual murder of a wife at the tomb of her husband. Other tribes were practicing polygamic marriage with some elements of matryarchy.

Bozh (later lat. Boz, Booz, Box; Russian: Бож) — a leader of Antes, mentioned by a historian Jordan. At first, Goths suffered a defeat from Antes, but later they turned to become more decisive and managed to captivate and crusify Bozh, along with his sons and seventy elders of Antes.

Sati (Devanagari: सती) - a ritual funeral tradition in Hinduism, in accordance to which a widow is subject to be burnt down along with her deceased consort at a specially constructed funeral pile. The word «sati» is a feminine adjective which in Sanscrit means «real», «existing», as well as «truthful», «honest». Brahmans, in order to support this practice, provided references to the scriptures. One of these brahmans — Viynanesvara — is from Chalukya dynasty. Another one — Madhavacharya — a theologian and minister of legal procedures of the Vidjayangara empire. They embraced sati as a sacred duty of a noble woman and qualified this as not a suicide (which is banned and condemned in scriptures), but as act of sacred reverence that, following their rhetorics, should sanctify a married couple, freeing it from any accumulated sin, guaranteeing redemption and providing their reunion.

A ketubah (Hebrew: כְּתוּבָּה ; "written thing"; pl. Ketubot) is a Jewish prenuptial agreement that is considered an integral part of a traditional Jewish marriage. It served as a replacement of «widow's honor» or ransom which ascended to Biblical times and which a fiance should have to pay to the fiancee or her parents when contracting a marriage. It lists such duties of the husband in respect to the wife as providing of food, clothes, bedroom duties, as well as the duty to pay a specific amount of money in case of divorse. A man that would like to pledge a divorce would have must give to his wife «get» (a statement about a divorce). It worth mention that early existed ransom has become a serious social problem: many potential young husbands could not obtain the required amount of money by the time they were supposed to contract a marriage.

R1a — Y-chromosome haplogroup, widespread in Central and Eastern Europe, Central and Southern Asia.

R1a-Z280 is an Eastern-European marker (possibly, Balto-Slavic), widespread along all Central and Eastern Europe, its Western bound of areal spreads from Eastern towards Southern-Western Germany and further towards Northern-Eastern Italy. Within this branch are separated several clusters that are studied only in broad brush strokes: Eastern-Slavic, Baltic, Pomeranic, Polish, Carpathian, Eastern-Alpic, Chechoslovak and others.

R1a1a — within brahmans of Western Bengal reaches 72%, within Afgan's Pashtuns up to 51%, within India's Manipuri — 50%. In Polish, Russian and Ukrainian regions it fluctuates within bounds of 50-65%.

R1a-Z93 (also named Z94 or Z95) — the main Asian branch of R1a. It was found in Central, Southern and Southern-Western Asia (including Ashkenazi jews). R1a-Z93 is a marker of many nations, such as Indo-Iranians (Aryans), Persians, Midians, Mitanns, Bashkirs, Tatars (and Lithuanian Tatars), and is included into the genetic pool of arabs and jews.

And now replace the words «wife» and «widow» with the word MOTHER.

So what, descendants of slavo-arye-rabbis, do you want to burn your MOTHER again? I would not like to, and won't recommend this to you. May be, it worth making a stop and thinking about causes and results of our actions, because of which we must run like a squirrel in the spinning wheel, without the possibility to stop, for even a second, as even to evaluate what we are doing with our planet that is the Mother common for all species.

ODD# I(e)/5,v;41Chs3180

ps You are able to know this only thanks to dolphins and primates — and this is not a joke! I am asking you to release them and never again try to make any harm to these, more sentient species. Other species you can exploit for some more time — but be aware, that it is most possible that you will carry consequences in accordance to this.

19
Or Kill Me / Re: The trinity of dualities
« on: March 30, 2015, 07:38:23 pm »
And "I then realised PD was not impressed with my translated reposts from my Livejournal, and I would need to try harder to obtain my guru status".

It is, like livejournal, translated reports from my main blog: http://is3.soundragon.su/

My only concern is whether or not he's a hipster trying to be Grant Morrison, or someone with actual mental problems.

No, i am authorized apostle.

20
Or Kill Me / The trinity of dualities
« on: March 29, 2015, 03:28:28 pm »
How rainbow comes into being (oblivion) in the New and Old World:


(old world rainbow & new world rainbow)

Oldsport Hodor (městečko) of the Northern and Southern Hemisphere:


(Mikhail Khodorkovsky & Alejandro Jodorowsky)

Thule-ma (root) Inner and Outer:


(Outer Thule & Inner Thule)

21
Or Kill Me / Toxicofragmentation
« on: March 28, 2015, 10:24:48 am »
Hello friends! Many of you are tormented by difficult memories and bad luck in your private life. This post contains a how-to guide of a tested sisterly technology aimed to fight memories and personal life.



So, to get the result you will need a small non-ventiled room, nail lacquer (desirably of several colours) and a dissolvent (a market name is delacquer).

Take your seat and start lacquering nails, with defragmenting your memory. Put the lacquer slowly and with full concentration, draw patterns, use different colours.

If your memories don't go away, then immediately start to dissolve, without waiting until the lacquer starts to crystallize. Thoroughly wipe your nails with dissolvent and then switch to the lacquer again.

For complete disruption of neural nets it takes 2 or 3 repetitions of lacquer-dissolvend. To destroy anything personal, perform these sessions with the radio or TV turned on.



If the memories still don't go away, then put a big plastic bag over your head when putting the lacquer.

And if you are a male and feel ashamed, use a transparent lacquer to destroy your memory.

ODD# II(c)/3,v;35Chs3181

22
Think for Yourself, Schmuck! / Re: Hail scientific method
« on: March 27, 2015, 07:18:13 pm »
In that case, whistlestomp head swipe, mango aardvark detritus.

Yes, now you're absolutely right.

23
Think for Yourself, Schmuck! / Re: Hail scientific method
« on: March 27, 2015, 05:55:06 pm »
Incidentally, "durity" means "obsolete", so you're saying that physicists are more obsolete than mathematicians.  Is that what you meant to say?

No.
https://translate.google.ru/#la/en/dure or https://translate.google.ru/#fr/en/dure
respectively
"durity" in this context like "dirty"

24
Think for Yourself, Schmuck! / Re: Source code
« on: March 27, 2015, 02:12:30 pm »
So how, pray tell, do you propose that we take ownership over the source of our own thoughts?

I don't know. As you wish.

25
Think for Yourself, Schmuck! / Hail scientific method
« on: March 27, 2015, 02:09:35 pm »
The following image vividly displays the core of the math conspiracy:


This hoax is intended by academical scientists for their profit. In Russian tradition, recruitment into this conspiracy is initiated by reciting «The Math is the queen of all sciences». In English tradition, as you can see, this conspiracy is included into the term of «Purity». To get to the core and sort out the conspiracy it is enough to make the math become a vaillain of science, or simply sort sciences by their «durity»:


Because of their royal disdain, mathematicians ignore the results obtained by other scientists, which results in a hypercube:


And their royal patronizing attitude, along with the influence upon math education ever since the schooldays, make their disciples merged into their fractal hypercube.

If you've got enough of facing the fractal it's enough for you to say no to the purity for the sake of  brutality. Then, it shall turn out that the physicians are now on top, as having a more objective scientific eye.

But for some time past, physicians tell nothing specific and only provide their models. Let's have a look at some of the unpopular ones of these models, as of today:

- The Theory of Relativity - offers you to explain the Universe as space-time, a unity within the three dimensions of space and a single of time (a linear universal Gregorian time by BigBen- continent past, continent present, continent future).

- The Quantum Mechanics - tries to fit into the space-time dimensionality of the three-plus-one theory of Relativity, but never succeeds, because experimentally observing the light unequivocally illustrates the non-fatality of time as well as the possibility of conscious modeling of future. To figure this out, think of the quantum mechanics as of a model of space-time within the bounds of three spatial and two temporal dimensions (a quantum physician can vary the parameters of the outer space at her own disposal, i.e. basically act upon future by the very act of observing, by deciding upon the fate of individual quants, by simply choosing an instrument to observe them).

- The Theory of Strings - straightforwardly proposes using various multidimensional models of space-time, as to wire the math of equations of relativity together with the equations of quantum mechanics.

If we agree upon a meta model of an undivided space-time that is being driven so obstinately by physicians through their theories for as long as the last hundred years, then what conclusions shall we draw by applying it to a regular bio-computer?

As to living in space, this is more or less clear: the five senses imply an image of the three dimensional space although the eyes display a mere two-dimensional picture of it. Our bodies allow us to travel through this space over the flat two dimensions of terrain, and we can employ various tools to lift over the surface or delve into the depths of Earth.

And what about time?

In regard of time similar reasoning applies, with the bio-computer's «hardware» being responsible for navigating the space, and the «software» enabling the navigation in time. As for language, it amounts to the rules and sets of instructions, according to which occurs the temporal navigation.

A bio computer's slavery (or lore) rate determines its appreciation of temporal dimensionality.

When not trained in tongues, a bio-computer remains unaware of time, - lacking memories and anticipations, its spatial activity is not determined by any hormonal algorithm and no thought governs its acts.

The first level of verbal proficiency allows a bio-computer to be involved into the historical process, become part of it. The second level of self-articulation provides realization of the possibility to change future. Three-dimensional perception of time allows one to override the fait accompli. Verbal skills assist bio-computers in expanding their habitat within space-time.

ODD# I/(e)/5,i;59Afm3180

26
Literate Chaotic / Re: What do people use pet animals for
« on: March 24, 2015, 07:51:02 am »
Have you ever owned a pet?

No. I just was friends with a pets, which owned by my relatives.

27
Think for Yourself, Schmuck! / Source code
« on: March 24, 2015, 07:46:57 am »
There is no government, no industrial-military complex, no economic system, no mass media that can ever reduce us to puppets and robots as thoroughly as the biological and enviornmnetal dictatorships have - F.M. Esfandiary (FM-2030), Upwingers

Hello friends! In this post, I will tell you about a model that someone can possibly find an effective instrument of social interaction. And in order to get used to this model, we must first discuss some concepts related to the field of information technology.

The computer software is:
A program (from Greek programma, "a written public notice") – in computer science, this is a set of instructions intended for execution by a machine. In general, we call a program some application provided with a user interface.
A process – typically, this means a program that lacks any graphical user interface, while repeatedly accessing the physical memory and hardware resources, and performs some operations in the background mode.
An operation system – a computer’s main program that defines the scope and the procedures for running all other programs and processes.

Hereon, we need to consider the following two kinds of operation systems:
A proprietary system (from Medieval Latin proprietarius, "owner of property") – this is a system developed and distributed by a specific proprietor (e.g., Apple or Microsoft). The source code of a proprietary system is sealed and inaccessible to anyone, except for the proprietor itself.
An open-source system – it is available for public access, does not belong to anyone, has all its source code accessible and open to change.

It is also worth mentioning that there are two levels in an operation system:
The user level – this includes a conventional desktop, end-user applications, the input and output of data via the graphical interface. A user is allowed to install, run and restrict the access to resources for programs to which he or she has access.
The core, kernel (heart) level – this level is unavailable to a user, it typically lacks any visual representation and hosts a multitude of system processes. In proprietary systems, only the owner has access to the core level, while in open-source systems this may be a special user granted with extended authority, named Root. We have almost finished explaining the terminology by now…

So, in proprietary systems, background processes that consume the processor resources and physical memory are called “Services”:



Meanwhile, in the proprietary systems users do not have access to the core services. A user cannot reduce the consumption of resources, release the memory or disable a system service; only the proprietor can gain the access to core services.

Now, in the open-source systems, the background processes that consume the processor resources and the physical memory are called “Daemons”:



If a user of an open-source system knows the Root password (of a super-user), he or she becomes enabled to kill/freeze any daemon, limit its consumption of resources and memory, and even reassemble the core with applying to it the necessary custom settings.

And finally, let’s take a look at an effective model:

Replace the "computer software" at the beginning of this post with "bio-computer software" and read the article anew. Next, try to answer the following questions:

   are you authorized to command the core of your biocomputer?
   is the source-code of your system open, or is it locked by a proprietor behind seven seals?
   how many services/daemons must be attended by your biological hardware every day? Do their actions cost you memory and resources?
   who is the specific proprietor of your services: parents, professors, priests, officers, mates, or somebody else?
   would you like to obtain the Root password enabling you to personally exercise control over your own heart daemons, or would you rather like to continue relying upon the proprietor services?

Links:
J.C. Lilly. Programming and Metaprogramming in the Human Biocomputer
R.A. Wilson. Discussion How to Brain-Wash Friends & Robotize People

ODD# V/(a)/1,v;24Afm3180

28
http://habrahabr.ru/post/228665/ - NSA looks after those interested in Linux and information security

To those having some interest in the field of information security all is clear when it comes to proprietary systems by Microsoft and Apple corporations. However, a conventional wisdom is still around telling that the Linux operation system securely protects the personal data of its users from third parties. Aside from the signature SELinux module by the NSA USA that is built into the Linux core, the most of contemporary distributives has proprietary packages built-in, the coded contents of which are anybody’s guess.

In theory, ignoring Slackware and GNU-distributives released more than two years ago (such as Zenwalk), one can suppose that the NSA vulnerabilities that are available in popular Linux repositories (RedHat and Debian at the first place, along with other 90% that are based on these two) continue to emerge on an annoyingly regular basis – more often than they can be identified.

And considering the news warning about the OpenSSL compromises (such as one, two and three) – one can come to the conclusion that embedding backdoors into the source code presently takes the effort of much more people than there are open software enthusiasts monitoring the source code of possibly dangerous packages.

But for those who do not like the idea of being transparent for USA security services there is, at last, a durable solution, provided with a russian-speaking technical support and an audit from russian intelligence services: Mandriva-based ROSA distributives, certified by FSTEC and Russian Ministry of Defence. These distributives have been diligently customized by the application software developers of SNORT, VYATTA and Information Security Systems, as part of a project to create a national software platform prototype. Using the ROSA distributives, you can make yourself and your data unavailable to the American intelligence services.

ODD# III(c)/2,v;39Cfn3180

29
Is forgery not an attempt to pass off an imitation as the real eal for personal gain?

Not for only personal gain. But also for national and ideological.

30
Also, there are historical accounts of Stonehenge going back to the 11th century, and it was subjected to substansial restoration work - not removal - from the 1890s to the 1950s.

Historical accounts easy to fake.

Look at these pictures, the photos show clearly that before this "reconstruction" it was a wasteland (with no trace of the previous design):





3. Currently the Ministry of Defence owns 390 sq km (!) in the vicinity of Stonehenge, some of which are closed permanently, to other access is severely limited. (Wikimapia boundary of the nearest military base - a mile from these stones to the North, and the military runway - 5 km on Southeast).
4. In the past, in the vicinity of Stonehenge were conducted by the railway and the airport, both were subsequently removed (there are other sources that the military airfield was located much closer, at a distance of just one mile from Stonehenge)


This link is explained in detail version of how the building turned into a "reconstruction". Unfortunately only in Russian.

Pages: 1 [2] 3