New World Order * ALERT *

One of the best security tactics is blocking all of your incoming ports by a Firewall; even a standard one. Have specific run-only,read-only and webbrowser-only definitions. If you are leaving your computer connected to the Internet, and walk away from it, paranoia is a good thing, change your firewall settings real quick or make a custom program so you can use keyboard shortcuts to enable a certain "Profile" of settings. For secret files, create hidden (noname folders) and a labyrinth inside that, or just use the Labyrinth tactic, make a maze inside a maze of Parent folders, and design at least 12 inside as diversions...and use a lesser encryption on the diversions (password protected). Then on the real target folder (where personal information is),,, encrypt that with a higher encryption, highest of the high, use your own code block even and password protect as well.

Combine diversions,with aggravation,with encryption and passwords and make sure the entry point and end point are well-encoded by something you can *barely* remember! lol

Don't use like
Folder B --> B --> C --> 3 --> END etc


As far as your hard drive...is it on some sort of tech where you can restore it or maybe get a few files back? Were you plugged into the Internet when this happened? Some of the more advanced EHDD's have a type of fw / soft mod -- where you can "Restore to an Earlier Point"...
 
VOID / MOOT - You now worry me too with that post appearing as a SUBVERT. You are either still at RISK, or you are part of it if you believe much of the information which you present. I realized a long time ago that THERE IS NO DEFENSE against REAL POWER.. The best and any protective type software EVER offered to anyone is the instance of a GLIMMER that there is no safe place. I endeavored enough attempts, and understanding computer architecture to some degree, that all anti-virus software does is give one the capability of realizing they are WIDE OPEN and with NO DEFENSE to POWER. While you can protect against you EQUAL which might be walking around on the streets of TIME - I am making reference to suspected others. The methods you mention are merely FIRST BASE. I am talking implanted CODING within CODING which ASSIMILATES of it's own volition and inception @ its OWN Accord. We are talking Illogical Pathways and presentations which REFORM to a LOGICAL MEANS.. There IS NO DEFENSE to this kind of IMPLANTATION...! All the methods you mention have a SIMPLE COMMON DENOMINATOR as a ROOT FAILURE which is CLEAR once you are wearing the right set of glasses... But I will read again to see if I missed something...:) Just in case..

An interesting observation which I made many years back is the implications of WHO Microsoft IS - Or WAS. Did it ever occur to anyone that if Microsoft got hit today, the world would stop tomorrow? The relation between Peter Norton and Bill Gates? The Vacating of Bill Gates from Microsoft a few years back, and his vestment in APPLE..! There is more there than is worth trying to decipher... But I can tell you this. The OBVIOUS CONCLUSION is that Microsoft is/was ALWAYS a part of the NWO/Men in black, or it is now. And if it EVER was NOT a part of it - There was a CLONE Running somewhere which could be brought online the second Gate went rogue or off the grid... Some of the recent indications I HAVE OBSERVED in the METHODs and OPERATION of the WINDOWS type environment are NOT Synonymous with the FUNDAMENTAL METHOD which Gates Incepted (Did I really Mis-spell that??)... The Fundamental Operation of Windows is now flawed. Again, we have a creature who COULD NOT be emulated in Bill Gates. This is clear. This is also the reason for his success....

Consider this... Why is Humanity such an interesting animal in this Mathematically STRUCTURED and PRECISELY ARCHITECTURE'D Universe...???? !!! ??? And everything is painted as the Random Cascade in action, when clearly not the case as to CREATE from nothing IS TO CREATE A "Natural Order".... As the creation within its self has Carte-Blanche AUTHORITY to MAKE DEFINITIONS WHAT THEY ARE When operating in EMPTY SPACE...!

So Now imagine you are this FORCE from this ORDER and WITNESSING "Humans in action doing their thing". You would have to be DUMBFOUNDED as by the DEFIANCE of the ORDER as an inherent built-in Capability. Just imagine you are watching the ARTFORM of a couple of Astronauts re-entering Earth's orbit - and "BY-HAND"...!!!!!!!! Sooo Much TALENT as FREE WILL, RANDOM ACTION, & MYSTICAL POWER DEFIANTLY Circumnavigates the ORDER IN PLACE. And TOYS with it even. You'd be sitting back as the WHOLE UNIVERSE Saying to yourself - "That mutherfucker!!! How the fuck did he do that...?!??!!!!!!!" How.... Did he take WHAT IS.... And DEFY IT...! And without the standard issue "Universal Slide-Rule".. This making Humanity a FEAST for the Universal Eye, and no wonder "everyone" is so interested in this "Beta-Run".... WE - ARE THE MYSTERY.. NOT THE UNIVERSE....!

The Human is THE ANIMAL which was spawned from RANDOM Action and YET has been gifted with the POWER to DEFY IT's MAKER, which was ORDER.... (note the use of the word ORDER and then place an "L" in "word":eek:) It appears to be a biological experiment gone mystically rogue, and perhaps even via an unanticipated mastery of ELECTRICAL ACTIVITY... An Intersection which no THING can Define... This may in fact be the definition of the SOUL. We may in fact be the GOD to another which we are unaware... While we seek to find, we may actually DEFINE, and the anomaly being that we CAN NOT SEE THIS, as once ANYONE becomes the Principle of their own Mastery - Vision is murked. Kinda like betting a season of Football when clearly seeing which speads are valid winners in the first week of the season or inception to your participation, but by week three, the Sports column becomes to read like blurry Greek..! (and isn't it funny how the term Greek was published as meaning "Unclear" when it is the origin of our/all language encoding today... A misleading clue perhaps?? And when Greek appears to be the clearest in essence once you get past the AUDIBLE STATIC NOISE which is like its almost intentionally scrambled with heard like a cable company protecting a Signal...) OR LIKE a talented physician who has power to effectively diagnose and save many, but can't discern what is wrong with himself. This can only be PROOF of a "Scramble" that is placed on US. So while we effectively perform our magical dance, we are unable to SEE HOW. And THIS... Could be the only real factor standing between humanity and humanity becoming an interesting 'intergalactic force". As they have to wonder would the Madness which is our downfall continue to ensue should be become "fully operational". Would this "fix out" with the end vision realized...? Its a risky bet I agree.... So are we "Led astray" as a PROTECTIVE MEASURE to ensure the safety of TIME and SPACE.. Or ENERGY & SPACE....!????!!:confused::)

I Discern YOU as a FORCE in OPPOSITION to the OTHER FORCES HERE... Or at least PRESENTED as one... But I CAN'T make out the writing on the wall yet.. You are either offering CODE as a PROGRAM as a your function, OR you are STATIC. This I don't know yet - your true purpose and ALIGNMENT..... Either way your input in interesting and welcome - as it is...

One of the best security tactics is blocking all of your incoming ports by a Firewall; even a standard one. Have specific run-only,read-only and webbrowser-only definitions. If you are leaving your computer connected to the Internet, and walk away from it, paranoia is a good thing, change your firewall settings real quick or make a custom program so you can use keyboard shortcuts to enable a certain "Profile" of settings. For secret files, create hidden (noname folders) and a labyrinth inside that, or just use the Labyrinth tactic, make a maze inside a maze of Parent folders, and design at least 12 inside as diversions...and use a lesser encryption on the diversions (password protected). Then on the real target folder (where personal information is),,, encrypt that with a higher encryption, highest of the high, use your own code block even and password protect as well.

Combine diversions,with aggravation,with encryption and passwords and make sure the entry point and end point are well-encoded by something you can *barely* remember! lol

Don't use like
Folder B --> B --> C --> 3 --> END etc

??????? I am not blind anymore.....!



As far as your hard drive...is it on some sort of tech where you can restore it or maybe get a few files back? Were you plugged into the Internet when this happened? Some of the more advanced EHDD's have a type of fw / soft mod -- where you can "Restore to an Earlier Point"...
 
Last edited:
I note this is 3 hours long...!! I watched the first segment from it where they use an early scene from the movie "Oh, God". The piece is so fucking powerful in essence..! You really have to wonder how plugged in defiant forces attempting to unlock human code are with regard to the Movie Industry, and what the real motive is. You have to wonder if that was not a Critical facet pointed at the youth of Generation X, and as A Primer??!!!??

So that bit looks pretty juicy and i plan to watch in full, or at least till i qualify it effectively..

:)

BBC3. I thought you would like this brain food for thought.
Watch "#RisingLifePress: Abraham-Hicks - The Secret Behi…" on YouTube
#RisingLifePress: Abraham-Hicks - The Secret Behi…: #RisingLifePress: Abraham-Hicks - The Secret Behind the Secret - YouTube
 
And one further on my reply above to Coregon.....

The Common Denominator IS the effective ROOT to ANY CYPHER always.. The KEY to this is having the vision to look FAR enough to FIND IT...

The TRICK is that the answer lies always in SIMPLICITY. That's the ILLUSION. Illusion is what a CYPHER is all about.. Its a Riddle of of Simplicity. Because EVERYTHING has a ROOT....
:)

NO ONE ever said / I NEVER SAID - That to date -Humanity has only presented that IT NEEDS PROTECTION FROM ITS SELF. Now if that is now a statement of the POTENTIAL POWER, and the RISK which is presented. I don't know what is....:eek::D;)
 
VOID / MOOT - You now worry me too with that post appearing as a SUBVERT. You are either still at RISK, or you are part of it if you believe much of the information which you present. [U] I realized a long time ago that THERE IS NO DEFENSE against REAL POWER.. The best and any protective type software EVER offered to anyone is the instance of a GLIMMER that there is no safe place. I endeavored enough attempts, and understanding computer architecture to some degree, that all anti-virus software does is give one the capability of realizing they are WIDE OPEN and with NO DEFENSE to POWER. While you can protect against you EQUAL which might be walking around on the streets of TIME - I am making reference to suspected others.[/U] The methods you mention are merely FIRST BASE. I am talking implanted CODING within CODING which ASSIMILATES of it's own volition and inception @ its OWN Accord. We are talking Illogical Pathways and presentations which REFORM to a LOGICAL MEANS.. There IS NO DEFENSE to this kind of IMPLANTATION...! All the methods you mention have a SIMPLE COMMON DENOMINATOR as a ROOT FAILURE which is CLEAR once you are wearing the right set of glasses... But I will read again to see if I missed something...:) Just in case..

An interesting observation which I made many years back is the implications of WHO Microsoft IS - Or WAS. Did it ever occur to anyone that if Microsoft got hit today, the world would stop tomorrow? The relation between Peter Norton and Bill Gates? The Vacating of Bill Gates from Microsoft a few years back, and his vestment in APPLE..! There is more there than is worth trying to decipher... But I can tell you this. The OBVIOUS CONCLUSION is that Microsoft is/was ALWAYS a part of the NWO/Men in black, or it is now. And if it EVER was NOT a part of it - There was a CLONE Running somewhere which could be brought online the second Gate went rogue or off the grid... Some of the recent indications I HAVE OBSERVED in the METHODs and OPERATION of the WINDOWS type environment are NOT Synonymous with the FUNDAMENTAL METHOD which Gates Incepted (Did I really Mis-spell that??)... The Fundamental Operation of Windows is now flawed. Again, we have a creature who COULD NOT be emulated in Bill Gates. This is clear. This is also the reason for his success....

----------------------------------------------------------------------------------------------------



I Discern YOU as a FORCE in OPPOSITION to the OTHER FORCES HERE... Or at least PRESENTED as one... But I CAN'T make out the writing on the wall yet.. You are either offering CODE as a PROGRAM as a your function, OR you are STATIC. This I don't know yet - your true purpose and ALIGNMENT..... Either way your input in interesting and welcome - as it is...

Oh I agree, there is no such thing as 100% security; especially with the NSA developing "Quantum Computer's"....I imagine they already have a somewhat limited form of the program/technology in their hands.

I was merely pointing out a few basic techniques....but now I see the level you are on. I'm guessing you are programmer as well, or have some experience with more in-depth modifications. Linux is truly the most customizable. With Windows you always gotta think a little harder where your updates are coming from!

Bill Gates is a crafty motherfucker...​

Turning off that built-in, standard "switch" for remote access, standard is "enabled" of course, you know what microsoft online tech support would use to offer to take control of your computer to fix a small problem. Imagine how many of these people are paid off to feed on the desperation of some customers...especially those on a technological "IP hit list".

Oh trust me, there are even mafia's who utilize this twisted "Gates Infrastructure". Russia being one of the mains.

Doing netstat's and all kinds of little network/analytical procedure's to analyze traffic and other cue's is of limited importance if you can't execute full control of whatever network system/Router you are running.

With regard to anonymity techniques....they have quite an importance in security, but any server can be hijacked, the Feds exploit TOR exit nodes all the time.


You made some great points Sir...my only point is....never do nothing...people should at least attempt...I would never disregard my compulsive securing of my network/s. I prefer a paranoid viewpoint...and will never think my attempts to be futile unless I have direct evidence to believe so.

With that being said, I am aware of True Power...and though I may not be entirely secure in a direct and planned attack...someone would have to interpret my ever changing locations...and next move is always unpredictable.

Thus unpredictability and a pure and clean cut analysis of my surroundings is inevitable
.


Sometimes you have to let your enjoyment of other activities slip, or be a little more subtle when trying to gain real knowledge...if you are too euphoric, and too cocky, you begin to wither in understanding. You begin to underestimate things...this is NOT SOMETHING I aim to be defined as, BBC3...


And so I continue to keep an open-mind...
 
Last edited:
I see some of that, and might I suggest, you are limiting your vector... Its causing heightened paranoia which is a result of limited sight (not that yours is limited in comparison/ just in reference to your capability). But I do appreciate the REALITY CHECK EFFORT.:)

And Really - the key is NOT looking far, its looking CORRECTLY. As it is ALWAYS RIGHT IN FRONT OF US.... THE TRUTH is that we LOOK TO FAR by training. Something about the INVERSE of the Forrest through the trees... As the Forrest DOES NOT EXIST without the trees. This is what makes it an ILLUSION....

"cocky" is not intended/ but you perceive??

A Giveaway program is not my endeavor. Power is found in STEALTH. True Power is CREATED by DIS-INFORMATION. The combination is Divine... Smart Presentation is always a good RANDOM PROBE. This is the way we get information effectively. Peripheral vision that is when using the proper STimulus... I Realize always that I KNOW NOTHING...;):D

I am not a programmer. I am one who is all.. I am a culmination of a long ride on the coat tails of FATE in route to DESTINY.. I am.....:):D;)

But you are right in some aspect as I have gleamed too much and probably should take a break....:) I worry the forum collective has gone off track and I don't want that......

Oh I agree, there is no such thing as 100% security; especially with the NSA developing "Quantum Computer's"....I imagine they already have a somewhat limited form of the program/technology in their hands.

I was merely pointing out a few basic techniques....but now I see the level you are on. I'm guessing you are programmer as well, or have some experience with more in-depth modifications. Linux is truly the most customizable. With Windows you always gotta think a little harder where your updates are coming from!

Bill Gates is a crafty motherfucker...​

Turning off that built-in, standard "switch" for remote access, standard is "enabled" of course, you know what microsoft online tech support would use to offer to take control of your computer to fix a small problem. Imagine how many of these people are paid off to feed on the desperation of some customers...especially those on a technological "IP hit list".

Oh trust me, there are even mafia's who utilize this twisted "Gates Infrastructure". Russia being one of the mains.

Doing netstat's and all kinds of little network/analytical procedure's to analyze traffic and other cue's is of limited importance if you can't execute full control of whatever network system/Router you are running.

With regard to anonymity techniques....they have quite an importance in security, but any server can be hijacked, the Feds exploit TOR exit nodes all the time.


You made some great points Sir...my only point is....never do nothing...people should at least attempt...I would never disregard my compulsive securing of my network/s. I prefer a paranoid viewpoint...and will never think my attempts to be futile unless I have direct evidence to believe so.

With that being said, I am aware of True Power...and though I may not be entirely secure in a direct and planned attack...someone would have to interpret my ever changing locations...and next move is always unpredictable.

Thus unpredictability and a pure and clean cut analysis of my surroundings is inevitable
.


Sometimes you have to let your enjoyment of other activities slip, or be a little more subtle when trying to gain real knowledge...if you are too euphoric, and too cocky, you begin to wither in understanding. You begin to underestimate things...this is NOT SOMETHING I aim to be defined as, BBC3...


And so I continue to keep an open-mind...
 
Last edited:
I finally emphasize CONTROL IS ILLUSION IS CONTROL.. THEY - Don't need a switch. The Fundamental elements are capable of autonomous action as THEY are THEY only SCRAMBLED to ones FILTER.... DO you really think for a second that the inner workings and and method to another's mind even SLIGHTLY RESEMBLE YOURS, MINE, MILLARDS, or ANYONES. This is a KEY FACET OF UNDERSTANDING...! I make no effort to hide as I endorse an open door policy as the best policy...:);)
 
3hrs long. Yeah I know I believe its in 3rd hr which is my favorite when she talks about animals and there purposes. Which I have a speculated.
 
This coming September, something significant is suppose to happen. I don't know what, but I've seen and heard enough to believe it's true.
 
Atleast we will all be jacked when they come round us up to put in the camps..so they won't euthanize us probably just use us for serious manual labor !
 
I agree that there is a lot that is going on and we don't know the half of it! I believe ET's have already been here and may even still be here and they are ever more popular now because when sightings happen now a days most people have a phone or camera to try and catch the sighting. Although pictures can be faked they hold more merrit than just some persons word swearing what they saw!

I have read about the millions of people that have gone missing and no one is asking questions. Is that really true? I can't imagine no one digging deeper. Unless the ones researching are the ones disappearing o_O:eek:!

All I know is after the Roswell incident our technology advanced more in 10 years then it had in about 500 years prior. Always easier to reverse engineer something than to invent it from scratch!
 
All I know is after the Roswell incident our technology advanced more in 10 years then it had in about 500 years prior. Always easier to reverse engineer something than to invent it from scratch!
This is dead on!
 
And @vinnyt -( you bring back memories of outter world trips to other places).. I reply bump now because I see some crazy mofo pings a like on one on these posts. SWEET JESUS. This thread is not for the light hearted. Not even the stoned (it takes far more to cross over trust me on that) ... I was really on the other side back then. I plan to make the journey once more soon. Don't know when but its about a 6 month to one year trip to get in contact with the 5th, 6th, and 7th dimensions. I still astral travel from time to time when lying around. Once you master it you cant ever turn it off.. I honestly read all of this again and can almost recall who I was back then. I won't lie. It was extremely counter productive to only have one toe down here in the 4th and the rest residing beyond. I may have broken something. But I can tell you all with certainty that there is nothing to fear when we cross over.. For the good ones at least. Can speak outside my knowledge base. Here's a shot of that demonic tile... there are devils from other dimensions within it.. I AM SURE OF THIS.. Look closely there is a horned beast dead center of this one and I just took it randomly...

IMG_0357.JPG
 
For non believers, this is the UFO filmed over Israel in early 2011 . Were they doing the deal to kill the Chernoblisk meteor? Well that CRASHED INTO EARTH on Feb 15th, 2013... But they "never saw it coming".. RIIIGHT .. And when all along they were on the lookout for the Earth ending 2012 Apocalyptic asteroid DA14 which passed earlier the very same day early on 2013???. I think there was even a close up pic of DA14 with a spooky face on it that has since been extinguished from the net now. But Noooo. These were not the same and the pic was not to gratify you into forgetting the death swap...

NASA - Asteroid 2012 DA14 – Earth Flyby Reality Check

I think they even got a picture of its face.. (BUT SCROLL TO TOP FOR FULL STORY AS IT RELATES)

Same day of Da14 only hours later and supposedly unseen.. CLearly destroyed by devine intervention, yet no one talks about this and the vid is harder and harder to find.

View: https://youtu.be/paBMy5U6vuc?t=29


Now is this the Day in Early 2011 when we made the deal with E.T. to intercede this asteroid and provided safe haven for plantet EARTH..?


View: https://www.youtube.com/watch?v=YLAMYG1KJAE


But noo nothing to see in any of this...

They say "2012" end of Mayan Calendar was only close approximation and who knows or knew.. but did we all die then and now we are living a DREAM HELL with no definition of TIME which we understand. Are we on fire...
 
Last edited:
And @vinnyt -( you bring back memories of outter world trips to other places).. I reply bump now because I see some crazy mofo pings a like on one on these posts. SWEET JESUS. This thread is not for the light hearted. Not even the stoned (it takes far more to cross over trust me on that) ... I was really on the other side back then. I plan to make the journey once more soon. Don't know when but its about a 6 month to one year trip to get in contact with the 5th, 6th, and 7th dimensions. I still astral travel from time to time when lying around. Once you master it you cant ever turn it off.. I honestly read all of this again and can almost recall who I was back then. I won't lie. It was extremely counter productive to only have one toe down here in the 4th and the rest residing beyond. I may have broken something. But I can tell you all with certainty that there is nothing to fear when we cross over.. For the good ones at least. Can speak outside my knowledge base. Here's a shot of that demonic tile... there are devils from other dimensions within it.. I AM SURE OF THIS.. Look closely there is a horned beast dead center of this one and I just took it randomly...

View attachment 257371
I can count like at least 10 other demons in this shower tile in addition to the obvious glaring one in the middle. And I just walked in there a couple of days ago to snap this at random because it came back to mind and with no consideration other than to capture a whole tile. I mean how fuckked up is this...
 
Back
Top