rense.com



Emergency Warning
Regarding Google-Sun Alliance

From Starfleethighcom@aol.com
10-8-5
 
Shalom --
 
What the NWO has failed to do and is failing to do to monopolized and centralized and control and censor computer power through computer software like Microsoft, have made them to realize that they must now and are now changing tactics and strategies inorder to monopolized and centralized and control and censor computer power by concentrating on computer hardware. They know have lost the first round to control, monopolize, censor, and centralize computer power through computer software like Microsoft because of the introduction of an open source code Linux computer software system and as well as other forms of open source software computer programs.
 
But now they are changing their tactics and strategies by concentrating on computer hardware inorder to monopolize, control, censor, and centralize computer power through the Google-Sun corporate partnership systems.
 
According analyst Mark Stahlman of Caris & Co. "The future of digital services is not going to be based on personal computers; it will be based on very large grids of servers and Google and Sun are both grid companies"
 
According to Google, Google's ambition is to have it's supercomputer take over an array of jobs now performed on desktops. All users have to do is plug into Google over the internet to take advantage. The idea, called network computing isn't new. At it's essence, it dates back to the earliest mainframe computers. More recently, efforts to bring back network computing by companies such as Oracle and Sun Microsystems, have failed to catch fire.
 
Here lies the danger, in essence instead of having our own computer power we will become dependent on these companies and corporate entities for meeting our computing computer power needs and computer information storage needs and that is not computer freedom but computer slavery, not computer independence but computer dependence, how are we and how can we trust them to honestly treat our computer power needs and stored information decently? Who is going to to police the police? Who is going to watch the watchers? How can we trust them not to censor or misuse our computer information with respect to our constitutional rights to privacy? Of course these companies will deny that that is their long range goal and intention but in the end that is their intention. At first the process will be very subtle like, they will say to you that you do not have to upgrade your computers, then they will say that you do not buy a new powerful computer, and so fourth and so on until they have reached their goal and intention that you have become dependent on them for your computing computer power needs and computer memory storage needs which virtually ends your computer independence and computer freedom and self-assured computer security that only a privately owned Personal Computer can really guarantee.
 
It is like owning only a computer monitor, key board, mouse, mouse pad, and other peripherals while the main computer or CPU or PC is owned and controlled and centralized and monopolized by a corporate entity which is very dangerous because they can easily manipulate, censor, and destroy your data and track your every movements at the expense of your privacy.
 
What they are not saying is the fact that they want to make PCs less desirable by offering a cheaper and user friendlier alternative inorder to make people buy less and less PCs and therefore becoming more and more dependent on these corporate entities for their computing computer power needs which is the same tactic and strategy that Microsoft did during their first earlier years inorder to seduce, lure, and hook their customers to become dependent on Microsoft like some kind of drug addicts. While at the same time services and product support failures and quality control failures are starting to become common place in Microsoft software.
 
AND, at the same time, the NWO is using Microsoft as a way to control the population through the use of an NSA key back door which can allow them to spy on your information and other activities, censor them, manipulate and change them without the knowledge of their owners, and even block their websites which has happened just recently.
 
AOL Time-Warner Censors Alex Jones Websites - Nationwide Blackout
 
http://www.prisonplanet.com/articles/october2005/051005timewarnercensors.htm
 
http://www.prisonplanet.com/articles/october2005/051005timewarnercensors.htm
 
The same thing can happen to grid computing that will make people become dependent on corporate owned computing power that they have no control over it and therefore have no computer freedom whatsoever inorder to prevent such things from happening. And the only solution is to have your own Personal Computer/Workstation/Server that you physically own and physically control and personally watch over securely.
 
And what these companies are not saying is that PCs can become as powerful as the most powerful mainframe computers, clustered computers, and grid computer networks. Just by simply re-engineering and redesigning the motherboard of the PC to become modular and scalable and expandable and robust and longer lasting just like the PS/2 machines that were designed with an intended service life of 10 years, with regular maintenance. That's 24 hours a day, 7 days a week, in the case of the server machines. And by using the appropriate hardware and software a PC can equal or even surpass what these Google-Sun corporate computer services can provide. And with you have the security and freedom of having your own and well-secured PC that you have total personal control and not under the control or ownership of some corporate entity(ies).
 
Isn't obvious that the NWO (New World Order) is composed of the Bilderberg, the Illuminati, Masonic societies, Freemasonry, Skull and Bones Society, etc whose only main purpose is the globalization of their power and their secret imposition of their total totalitarian control of the whole world under many facades and faces inorder to disguise their presence and intentions And that they have interpenetrated many institutions. both private and public, and that of our very own government for the sole purpose of gaining power to globalized their own form of totalitarian dictatorship under many forms of facades, disguises, and faces inorder to achieve their evil goals.
 
Below are the links that supports my suspicions that the Google-Sun partnership is just an another Microsoft like company with the same evil monopolistic and power grabbing intentions, only this time they are doing it through the computer hardware level. Unlike Microsoft which tried to do it on the computer software level. Remember the old saying, "meet the new Boss the same as the old Boss".
 
Please spread this warning message to as many websites and people as possible as you can and tell them to spread it even further until the entire United States is saturated with this warning message.
 
http://www.voxfux.com/archives/00000059.htm
http://www.voxfux.com/
11/18/2002 Entry:
 
 
NSA BACKDOOR IN EVERY MICROSOFT OPERATING SYSTEM
How NSA access was built into Windows
Careless mistake reveals subversion of Windows by NSA.
 
By Duncan Campbell
11-18-2
 
A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA "help information" trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled. The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.
 
Computer security specialists have been aware for two years that unusual features are contained inside a standard Windows software "driver" used for security and encryption functions. The driver, called ADVAPI.DLL, enables and controls a range of security functions. If you use Windows, you will find it in the C:\Windows\system directory of your computer.
 
ADVAPI.DLL works closely with Microsoft Internet Explorer, but will only run crypographic functions that the US governments allows Microsoft to export. That information is bad enough news, from a European point of view. Now, it turns out that ADVAPI will run special programmes inserted and controlled by NSA. As yet, no-one knows what these programmes are, or what they do. Dr Nicko van Someren reported at last year's Crypto 98 conference that he had disassembled the ADVADPI driver. He found it contained two different keys. One was used by Microsoft to control the cryptographic functions enabled in Windows, in compliance with US export regulations. But the reason for building in a second key, or who owned it, remained a mystery.
 
A second key
 
Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4, Service Pack 5. He found that Microsoft's developers had failed to remove or "strip" the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys. One was called "KEY". The other was called "NSAKEY". Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to "Advances in Cryptology, Crypto'99" conference held in Santa Barbara. According to those present at the conference, Windows developers attending the conference did not deny that the "NSA" key was built into their software. But they refused to talk about what the key did, or why it had been put there without users' knowledge. A third key?!
 
But according to two witnesses attending the conference, even Microsoft's top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian LaMachia, head of CAPI development at Microsoft was "stunned" to learn of these discoveries, by outsiders. The latest discovery by Dr van Someren is based on advanced search methods which test and report on the "entropy" of programming code.
 
Within the Microsoft organisation, access to Windows source code is said to be highly compartmentalized, making it easy for modifications to be inserted without the knowledge of even the respective product managers.
 
Researchers are divided about whether the NSA key could be intended to let US government users of Windows run classified cryptosystems on their machines or whether it is intended to open up anyone's and everyone's Windows computer to intelligence gathering techniques deployed by NSA's burgeoning corps of "information warriors". According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system "is that it is tremendously easier for the NSA to load unauthorized security services on all copies of Microsoft Windows, and once these security services are loaded, they can effectively compromise your entire operating system". The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards. "For non-American IT managers relying on Windows NT to operate highly secure data centres, this find is worrying", he added. "The US government is currently making it as difficult as possible for "strong" crypto to be used outside of the US. That they have also installed a cryptographic back-door in the world's most abundant operating system should send a strong message to foreign IT managers". "How is an IT manager to feel when they learn that in every copy of Windows sold, Microsoft has a 'back door' for NSA - making it orders of magnitude easier for the US government to access your computer?" he asked.
 
Can the loophole be turned round against the snoopers?
 
Dr van Someren feels that the primary purpose of the NSA key inside Windows may be for legitimate US government use. But he says that there cannot be a legitimate explanation for the third key in Windows 2000 CAPI. "It looks more fishy", he said.
 
Fernandez believes that NSA's built-in loophole can be turned round against the snoopers. The NSA key inside CAPI can be replaced by your own key, and used to sign cryptographic security modules from overseas or unauthorised third parties, unapproved by Microsoft or the NSA. This is exactly what the US government has been trying to prevent. A demonstration "how to do it" program that replaces the NSA key can be found on Cryptonym's _website_ (http://www.cryptonym.com/hottopics/msft-nsa/ReplaceNsaKey.zip) . According to one leading US cryptographer, the IT world should be thankful that the subversion of Windows by NSA has come to light before the arrival of CPUs that handles encrypted instruction sets. These would make the type of discoveries made this month impossible. "Had the next-generation CPU's with encrypted instruction sets already been deployed, we would have never found out about NSAKEY."
 
A Few Words About Computers
 
Most people don't realize the power of the computers that sit on their desktops or get toted around in their notebooks. If they only use the machine for playing games, writing email, or keeping track of finances, they haven't begun to scratch the surface of what that little piece of silicon is capable of doing.
 
The fact of the matter is, when loaded with the proper software, just about any computer that has been manufactured since the early 1990's is capable of running an entire house. Any processor that is equivalent to a 386 or better, is capable of running a multiuser, multitasking, Unix-style operating system that will allow multiple people to use the machine at once, while it simultaneously monitors general house functioning. In some cases, this software is freely available over the Internet at no cost, other than that of learning how to run it. Interested readers are encouraged to check out the comp.os.linux.* hierarchy of USENET newsgroups, or to do a web search for the word "linux" to see a shining example of one such free operating system.
 
Telecommunications functionality is also a necessity in modern homes, and can likewise be met in many ways by the current computers on the market. Present day computers are now beginning to edge into the sphere of communications that was traditionally held by the telephone, television, and fax machine. In fact, there are programs available on the Internet at no cost which allow computers equipped with sound boards to act as full-fledged telephones. The computer on one end digitizes the speaker's voice, sends the data across the net on a 14.4K (or faster) modem, and the computer on the other end converts the signal back into audio form which comes out of the PC speakers. Real-time conversations can be held with only slight (1-2 second) delays, which will lessen as technology advances. There are also versions available which cryptographically scramble the voice data, to assure privacy even though the conversation traverses the public networks. Total cost to the users? The cost of their Internet connection, which is typically $20 per month. There are no long-distance charges.
 
In a similar vein, computer screens already deliver higher resolution than televisions, higher even than the much-promised but still undelivered "high definition television" (HDTV) that has been "just around the corner" for the past several years. With increasing network speeds and the high-powered graphics cards available today, TV can appear in a window of your computer screen, at full speed, with stereo sound. Using the small digital cameras available starting at around US$100 (Mid-1996), you may now do interactive video conferencing across the Internet. In essence, the power of the television studio is coming to the computer, and each home can be its own "station."
 
In the computer industry, there is something called "point-to-point protocol," or PPP. This is a networking protocol that allows any two points incommunication with each other (i.e. - one phone calling another) to pass data as though they were hardwired into the Internet. This means that any phone, inany location, may make a phone call and be part of the Internet, just for the duration of that call. The practical upshot of this, in the context of the portable, self-sufficient house, is that any home, anywhere, may be connected to the Internet. Cellular and satellite technologies remove even the need for connecting wires, allowing families to live on remote mountain tops or tropicalislands and still remain connected to friends, loved ones, current events, andeducational resources.
 
In this way, we begin to see how some of the traditional social structures of schools and communities begin to dissolve and re-form into the in-home schooling and virtual cultures of the online world. In Maslow's hierarchy, having met the basics of physiological needs (level 1) and safety (level 2), people move on to dealing with the higher issues of belonging (level 3), self-esteem (level 4), and self-actualization (level 5). They begin to explore, to branch out, and to develop themselves more fully towards their true potential.
 
This is not meant to imply that the Internet is a panacea, and that simply by connecting to the resources online, one will become a more complete human being. In fact, there are strong arguments to the contrary. In his 1995 book, "Silicon Snake Oil," Clifford Stoll takes a very long, hard look at the almost fanatical rush to jump on the Internet bandwagon. This seeming mania has corporations spending millions of dollars trying to attract net-surfers to glitzy web sites that have lots of flash but little content, while libraries and schools are slashing their book and periodical budgets so that they can afford the latest New Thing to be offered on CD-ROM, and the latest machines to run those CD-ROMs. Readers are encouraged to pay special attention to this book. It indicates some new social problems that are heading our way quickly.
 
Please bear in mind that it was always intended to be "Technology in the Service of Mankind" and not the other way around. The computer is a tool. Nothing more, nothing less. It should not be your master, and only by much labor and study may you begin to master it. The rewards are great, but the cost in time and focus may be more than many wish to invest. It is an inherently flexible tool, allowing one to perform in a wide variety of media. In today's society, such flexibility is useful, for as Abraham Maslow also said: "Those who are only good with hammers see every problem as a nail."
 
The computer is with us for the foreseeable future. It shouldn't appear as a fearsome thing, but as a useful extension of ourselves. By integrating the home computer with the home hydroponic garden, we should be able to develop gardens that are somewhat self-tending. This will lessen the amount of focus non-gardeners need to spend on the garden, and will thus help gardening appeal to a larger portion of today's push-button society.
 
The computer can keep track of things such as light levels, heat levels, humidity, nutrient flow and concentration, and amount of oxygen or carbon dioxide in the atmosphere and nutrient solution. It can even take care of rotating plant trays or grow lights, provided the proper hardware is installed. All this can be done in the background, while the computer is also being used to maintain general house functioning, communications, etc., as noted above.
 
Some may think that this approach takes away the "fun" of gardening, and in some ways, this may be true. But for a good many people who are currently getting food from the local convenience mart, there may not be a tremendous interest in actual gardening. They'd like to put in the seeds, hit a button, and get food out of the other end. We must accommodate such viewpoints in future designs, so that people are able to reap the benefits of home-grown, readily available, non-processed food, without devoting copious amounts of their time to obtaining that food.
 
In "The Celestine Prophecy," James Redfield noted the feedback loop that can develop between a gardener and their plants, and how that loop is reinforced when one eats the vegetables that they, themself, have grown. As more people discover the joy of producing their own food, and tending to their own nutritional needs, we can expect to see a change in how people think, and in how society functions. As you build the bottom layers of Maslow's pyramid, the upper layers have a more solid foundation to leverage from.
 
Most computers have both internal and external buses. An internal bus connects all the internal components of a computer to the motherboard (and thus, the _CPU_
 
http://en.wikipedia.org/wiki/Central_processing_unit
 
and _internal memory_
 
http://en.wikipedia.org/wiki/Internal_memory.
 
These types of buses are also referred to as a _local bus_
http://en.wikipedia.org/wiki/Local_bus,
 
because they are intended to connect to local devices, not to those in
other machines or external to the computer. An external bus connects external
peripherals to the motherboard.
 
_bus_
 
http://en.wikipedia.org/wiki/Computer_bus
 
A motherboard, also known as a main board, mainboard, logic board or system
board, and sometimes abbreviated as mobo, is the central or primary _circuit
board_
 
http://en.wikipedia.org/wiki/Printed_circuit_board
 
making up a complex electronic system, such as a _computer_
 
http://en.wikipedia.org/wiki/Computer.
 
PC/XT - the original open motherboard standard created by IBM for the
first home computer, the IBM-PC. It created a large number of '_clone_
motherboards'
 
http://en.wikipedia.org/wiki/Clone '
 
due to its open standard and therefore became the _de facto_
http://en.wikipedia.org/wiki/De_facto standard.
 
http://en.wikipedia.org/wiki/Motherboards
 

Disclaimer






MainPage
http://www.rense.com


This Site Served by TheHostPros