- Shalom --
-
- What the NWO has failed to do and is failing to do to
monopolized and centralized and control and censor computer power through
computer software like Microsoft, have made them to realize that they must
now and are now changing tactics and strategies inorder to monopolized
and centralized and control and censor computer power by concentrating
on computer hardware. They know have lost the first round to control, monopolize,
censor, and centralize computer power through computer software like Microsoft
because of the introduction of an open source code Linux computer software
system and as well as other forms of open source software computer programs.
-
- But now they are changing their tactics and strategies
by concentrating on computer hardware inorder to monopolize, control, censor,
and centralize computer power through the Google-Sun corporate partnership
systems.
-
- According analyst Mark Stahlman of Caris & Co. "The
future of digital services is not going to be based on personal computers;
it will be based on very large grids of servers and Google and Sun are
both grid companies"
-
- According to Google, Google's ambition is to have it's
supercomputer take over an array of jobs now performed on desktops. All
users have to do is plug into Google over the internet to take advantage.
The idea, called network computing isn't new. At it's essence, it dates
back to the earliest mainframe computers. More recently, efforts to bring
back network computing by companies such as Oracle and Sun Microsystems,
have failed to catch fire.
-
- Here lies the danger, in essence instead of having our
own computer power we will become dependent on these companies and corporate
entities for meeting our computing computer power needs and computer information
storage needs and that is not computer freedom but computer slavery, not
computer independence but computer dependence, how are we and how can we
trust them to honestly treat our computer power needs and stored information
decently? Who is going to to police the police? Who is going to watch the
watchers? How can we trust them not to censor or misuse our computer information
with respect to our constitutional rights to privacy? Of course these companies
will deny that that is their long range goal and intention but in the end
that is their intention. At first the process will be very subtle like,
they will say to you that you do not have to upgrade your computers, then
they will say that you do not buy a new powerful computer, and so fourth
and so on until they have reached their goal and intention that you have
become dependent on them for your computing computer power needs and computer
memory storage needs which virtually ends your computer independence and
computer freedom and self-assured computer security that only a privately
owned Personal Computer can really guarantee.
-
- It is like owning only a computer monitor, key board,
mouse, mouse pad, and other peripherals while the main computer or CPU
or PC is owned and controlled and centralized and monopolized by a corporate
entity which is very dangerous because they can easily manipulate, censor,
and destroy your data and track your every movements at the expense of
your privacy.
-
- What they are not saying is the fact that they want to
make PCs less desirable by offering a cheaper and user friendlier alternative
inorder to make people buy less and less PCs and therefore becoming more
and more dependent on these corporate entities for their computing computer
power needs which is the same tactic and strategy that Microsoft did during
their first earlier years inorder to seduce, lure, and hook their customers
to become dependent on Microsoft like some kind of drug addicts. While
at the same time services and product support failures and quality control
failures are starting to become common place in Microsoft software.
-
- AND, at the same time, the NWO is using Microsoft as
a way to control the population through the use of an NSA key back door
which can allow them to spy on your information and other activities,
censor them, manipulate and change them without the knowledge of their
owners, and even block their websites which has happened just recently.
-
- AOL Time-Warner Censors Alex Jones Websites - Nationwide
Blackout
-
- http://www.prisonplanet.com/articles/october2005/051005timewarnercensors.htm
-
- http://www.prisonplanet.com/articles/october2005/051005timewarnercensors.htm
-
- The same thing can happen to grid computing that will
make people become dependent on corporate owned computing power that they
have no control over it and therefore have no computer freedom whatsoever
inorder to prevent such things from happening. And the only solution is
to have your own Personal Computer/Workstation/Server that you physically
own and physically control and personally watch over securely.
-
- And what these companies are not saying is that PCs can
become as powerful as the most powerful mainframe computers, clustered
computers, and grid computer networks. Just by simply re-engineering and
redesigning the motherboard of the PC to become modular and scalable and
expandable and robust and longer lasting just like the PS/2 machines that
were designed with an intended service life of 10 years, with regular maintenance.
That's 24 hours a day, 7 days a week, in the case of the server machines.
And by using the appropriate hardware and software a PC can equal or even
surpass what these Google-Sun corporate computer services can provide.
And with you have the security and freedom of having your own and well-secured
PC that you have total personal control and not under the control or ownership
of some corporate entity(ies).
-
- Isn't obvious that the NWO (New World Order) is composed
of the Bilderberg, the Illuminati, Masonic societies, Freemasonry, Skull
and Bones Society, etc whose only main purpose is the globalization of
their power and their secret imposition of their total totalitarian control
of the whole world under many facades and faces inorder to disguise their
presence and intentions And that they have interpenetrated many institutions.
both private and public, and that of our very own government for the sole
purpose of gaining power to globalized their own form of totalitarian
dictatorship under many forms of facades, disguises, and faces inorder
to achieve their evil goals.
-
- Below are the links that supports my suspicions that
the Google-Sun partnership is just an another Microsoft like company with
the same evil monopolistic and power grabbing intentions, only this time
they are doing it through the computer hardware level. Unlike Microsoft
which tried to do it on the computer software level. Remember the old
saying, "meet the new Boss the same as the old Boss".
-
- Please spread this warning message to as many websites
and people as possible as you can and tell them to spread it even further
until the entire United States is saturated with this warning message.
-
- http://www.voxfux.com/archives/00000059.htm
- http://www.voxfux.com/
- 11/18/2002 Entry:
-
-
- NSA BACKDOOR IN EVERY MICROSOFT OPERATING
SYSTEM
- How NSA access was built into Windows
- Careless mistake reveals subversion of Windows
by NSA.
-
- By Duncan Campbell
- 11-18-2
-
- A CARELESS mistake by Microsoft programmers has revealed
that special access codes prepared by the US National Security Agency
have been secretly built into Windows. The NSA access system is built
into every version of the Windows operating system now in use, except
early releases of Windows 95 (and its predecessors). The discovery comes
close on the heels of the revelations earlier this year that another US
software giant, Lotus, had built an NSA "help information" trapdoor
into its Notes system, and that security functions on other software systems
had been deliberately crippled. The first discovery of the new NSA access
system was made two years ago by British researcher Dr Nicko van Someren.
But it was only a few weeks ago when a second researcher rediscovered
the access system. With it, he found the evidence linking it to NSA.
-
- Computer security specialists have been aware for two
years that unusual features are contained inside a standard Windows software
"driver" used for security and encryption functions. The driver,
called ADVAPI.DLL, enables and controls a range of security functions.
If you use Windows, you will find it in the C:\Windows\system directory
of your computer.
-
- ADVAPI.DLL works closely with Microsoft Internet Explorer,
but will only run crypographic functions that the US governments allows
Microsoft to export. That information is bad enough news, from a European
point of view. Now, it turns out that ADVAPI will run special programmes
inserted and controlled by NSA. As yet, no-one knows what these programmes
are, or what they do. Dr Nicko van Someren reported at last year's Crypto
98 conference that he had disassembled the ADVADPI driver. He found it
contained two different keys. One was used by Microsoft to control the
cryptographic functions enabled in Windows, in compliance with US export
regulations. But the reason for building in a second key, or who owned
it, remained a mystery.
-
- A second key
-
- Two weeks ago, a US security company came up with conclusive
evidence that the second key belongs to NSA. Like Dr van Someren, Andrew
Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina,
had been probing the presence and significance of the two keys. Then he
checked the latest Service Pack release for Windows NT4, Service Pack
5. He found that Microsoft's developers had failed to remove or "strip"
the debugging symbols used to test this software before they released it.
Inside the code were the labels for the two keys. One was called "KEY".
The other was called "NSAKEY". Fernandes reported his re-discovery
of the two CAPI keys, and their secret meaning, to "Advances in Cryptology,
Crypto'99" conference held in Santa Barbara. According to those present
at the conference, Windows developers attending the conference did not
deny that the "NSA" key was built into their software. But they
refused to talk about what the key did, or why it had been put there without
users' knowledge. A third key?!
-
- But according to two witnesses attending the conference,
even Microsoft's top crypto programmers were astonished to learn that
the version of ADVAPI.DLL shipping with Windows 2000 contains not two,
but three keys. Brian LaMachia, head of CAPI development at Microsoft
was "stunned" to learn of these discoveries, by outsiders. The
latest discovery by Dr van Someren is based on advanced search methods
which test and report on the "entropy" of programming code.
-
- Within the Microsoft organisation, access to Windows
source code is said to be highly compartmentalized, making it easy for
modifications to be inserted without the knowledge of even the respective
product managers.
-
- Researchers are divided about whether the NSA key could
be intended to let US government users of Windows run classified cryptosystems
on their machines or whether it is intended to open up anyone's and everyone's
Windows computer to intelligence gathering techniques deployed by NSA's
burgeoning corps of "information warriors". According to Fernandez
of Cryptonym, the result of having the secret key inside your Windows
operating system "is that it is tremendously easier for the NSA to
load unauthorized security services on all copies of Microsoft Windows,
and once these security services are loaded, they can effectively compromise
your entire operating system". The NSA key is contained inside all
versions of Windows from Windows 95 OSR2 onwards. "For non-American
IT managers relying on Windows NT to operate highly secure data centres,
this find is worrying", he added. "The US government is currently
making it as difficult as possible for "strong" crypto to be
used outside of the US. That they have also installed a cryptographic
back-door in the world's most abundant operating system should send a strong
message to foreign IT managers". "How is an IT manager to feel
when they learn that in every copy of Windows sold, Microsoft has a 'back
door' for NSA - making it orders of magnitude easier for the US government
to access your computer?" he asked.
-
- Can the loophole be turned round against the snoopers?
-
- Dr van Someren feels that the primary purpose of the
NSA key inside Windows may be for legitimate US government use. But he
says that there cannot be a legitimate explanation for the third key in
Windows 2000 CAPI. "It looks more fishy", he said.
-
- Fernandez believes that NSA's built-in loophole can be
turned round against the snoopers. The NSA key inside CAPI can be replaced
by your own key, and used to sign cryptographic security modules from
overseas or unauthorised third parties, unapproved by Microsoft or the
NSA. This is exactly what the US government has been trying to prevent.
A demonstration "how to do it" program that replaces the NSA
key can be found on Cryptonym's _website_ (http://www.cryptonym.com/hottopics/msft-nsa/ReplaceNsaKey.zip)
. According to one leading US cryptographer, the IT world should be thankful
that the subversion of Windows by NSA has come to light before the arrival
of CPUs that handles encrypted instruction sets. These would make the
type of discoveries made this month impossible. "Had the next-generation
CPU's with encrypted instruction sets already been deployed, we would
have never found out about NSAKEY."
-
- A Few Words About Computers
-
- Most people don't realize the power of the computers
that sit on their desktops or get toted around in their notebooks. If
they only use the machine for playing games, writing email, or keeping
track of finances, they haven't begun to scratch the surface of what that
little piece of silicon is capable of doing.
-
- The fact of the matter is, when loaded with the proper
software, just about any computer that has been manufactured since the
early 1990's is capable of running an entire house. Any processor that
is equivalent to a 386 or better, is capable of running a multiuser, multitasking,
Unix-style operating system that will allow multiple people to use the
machine at once, while it simultaneously monitors general house functioning.
In some cases, this software is freely available over the Internet at
no cost, other than that of learning how to run it. Interested readers
are encouraged to check out the comp.os.linux.* hierarchy of USENET newsgroups,
or to do a web search for the word "linux" to see a shining
example of one such free operating system.
-
- Telecommunications functionality is also a necessity
in modern homes, and can likewise be met in many ways by the current computers
on the market. Present day computers are now beginning to edge into the
sphere of communications that was traditionally held by the telephone,
television, and fax machine. In fact, there are programs available on
the Internet at no cost which allow computers equipped with sound boards
to act as full-fledged telephones. The computer on one end digitizes the
speaker's voice, sends the data across the net on a 14.4K (or faster)
modem, and the computer on the other end converts the signal back into
audio form which comes out of the PC speakers. Real-time conversations
can be held with only slight (1-2 second) delays, which will lessen as
technology advances. There are also versions available which cryptographically
scramble the voice data, to assure privacy even though the conversation
traverses the public networks. Total cost to the users? The cost of their
Internet connection, which is typically $20 per month. There are no long-distance
charges.
-
- In a similar vein, computer screens already deliver
higher resolution than televisions, higher even than the much-promised
but still undelivered "high definition television" (HDTV) that
has been "just around the corner" for the past several years.
With increasing network speeds and the high-powered graphics cards available
today, TV can appear in a window of your computer screen, at full speed,
with stereo sound. Using the small digital cameras available starting
at around US$100 (Mid-1996), you may now do interactive video conferencing
across the Internet. In essence, the power of the television studio is
coming to the computer, and each home can be its own "station."
-
- In the computer industry, there is something called
"point-to-point protocol," or PPP. This is a networking protocol
that allows any two points incommunication with each other (i.e. - one
phone calling another) to pass data as though they were hardwired into
the Internet. This means that any phone, inany location, may make a phone
call and be part of the Internet, just for the duration of that call.
The practical upshot of this, in the context of the portable, self-sufficient
house, is that any home, anywhere, may be connected to the Internet. Cellular
and satellite technologies remove even the need for connecting wires,
allowing families to live on remote mountain tops or tropicalislands and
still remain connected to friends, loved ones, current events, andeducational
resources.
-
- In this way, we begin to see how some of the traditional
social structures of schools and communities begin to dissolve and re-form
into the in-home schooling and virtual cultures of the online world. In
Maslow's hierarchy, having met the basics of physiological needs (level
1) and safety (level 2), people move on to dealing with the higher issues
of belonging (level 3), self-esteem (level 4), and self-actualization
(level 5). They begin to explore, to branch out, and to develop themselves
more fully towards their true potential.
-
- This is not meant to imply that the Internet is a panacea,
and that simply by connecting to the resources online, one will become
a more complete human being. In fact, there are strong arguments to the
contrary. In his 1995 book, "Silicon Snake Oil," Clifford Stoll
takes a very long, hard look at the almost fanatical rush to jump on the
Internet bandwagon. This seeming mania has corporations spending millions
of dollars trying to attract net-surfers to glitzy web sites that have
lots of flash but little content, while libraries and schools are slashing
their book and periodical budgets so that they can afford the latest New
Thing to be offered on CD-ROM, and the latest machines to run those CD-ROMs.
Readers are encouraged to pay special attention to this book. It indicates
some new social problems that are heading our way quickly.
-
- Please bear in mind that it was always intended to be
"Technology in the Service of Mankind" and not the other way
around. The computer is a tool. Nothing more, nothing less. It should
not be your master, and only by much labor and study may you begin to
master it. The rewards are great, but the cost in time and focus may be
more than many wish to invest. It is an inherently flexible tool, allowing
one to perform in a wide variety of media. In today's society, such flexibility
is useful, for as Abraham Maslow also said: "Those who are only good
with hammers see every problem as a nail."
-
- The computer is with us for the foreseeable future. It
shouldn't appear as a fearsome thing, but as a useful extension of ourselves.
By integrating the home computer with the home hydroponic garden, we should
be able to develop gardens that are somewhat self-tending. This will lessen
the amount of focus non-gardeners need to spend on the garden, and will
thus help gardening appeal to a larger portion of today's push-button
society.
-
- The computer can keep track of things such as light
levels, heat levels, humidity, nutrient flow and concentration, and amount
of oxygen or carbon dioxide in the atmosphere and nutrient solution. It
can even take care of rotating plant trays or grow lights, provided the
proper hardware is installed. All this can be done in the background,
while the computer is also being used to maintain general house functioning,
communications, etc., as noted above.
-
- Some may think that this approach takes away the "fun"
of gardening, and in some ways, this may be true. But for a good many
people who are currently getting food from the local convenience mart,
there may not be a tremendous interest in actual gardening. They'd like
to put in the seeds, hit a button, and get food out of the other end.
We must accommodate such viewpoints in future designs, so that people
are able to reap the benefits of home-grown, readily available, non-processed
food, without devoting copious amounts of their time to obtaining that
food.
-
- In "The Celestine Prophecy," James Redfield
noted the feedback loop that can develop between a gardener and their
plants, and how that loop is reinforced when one eats the vegetables that
they, themself, have grown. As more people discover the joy of producing
their own food, and tending to their own nutritional needs, we can expect
to see a change in how people think, and in how society functions. As
you build the bottom layers of Maslow's pyramid, the upper layers have
a more solid foundation to leverage from.
-
- Most computers have both internal and external buses.
An internal bus connects all the internal components of a computer to
the motherboard (and thus, the _CPU_
-
- http://en.wikipedia.org/wiki/Central_processing_unit
-
- and _internal memory_
-
- http://en.wikipedia.org/wiki/Internal_memory.
-
- These types of buses are also referred to as a _local
bus_
- http://en.wikipedia.org/wiki/Local_bus,
-
- because they are intended to connect to local devices,
not to those in
- other machines or external to the computer. An external
bus connects external
- peripherals to the motherboard.
-
- _bus_
-
- http://en.wikipedia.org/wiki/Computer_bus
-
- A motherboard, also known as a main board, mainboard,
logic board or system
- board, and sometimes abbreviated as mobo, is the central
or primary _circuit
- board_
-
- http://en.wikipedia.org/wiki/Printed_circuit_board
-
- making up a complex electronic system, such as a _computer_
-
- http://en.wikipedia.org/wiki/Computer.
-
- PC/XT - the original open motherboard standard created
by IBM for the
- first home computer, the IBM-PC. It created a large number
of '_clone_
- motherboards'
-
- http://en.wikipedia.org/wiki/Clone '
-
- due to its open standard and therefore became the _de
facto_
- http://en.wikipedia.org/wiki/De_facto standard.
-
- http://en.wikipedia.org/wiki/Motherboards
|