UNIX System-思想控制奴隸介面!

真可怕Crazy!!!

當我們使用Internet之時,我們正在使用這真正的鬼東西-UNIX System!!!

Fritz Springmeier指出,IlluminatiMonarch Type Mind-Control Programming的目標是將這些Mind-Controlled Slave(他們的目標是全人類!!!)以電腦連接到他們的主電腦-!!!

Fritz發現Illuminati於全球最少有9部超級電腦,用以處理全人類的數據(有人認為這部電腦不存在,只是誤傳,但吳主光先生告訴我們,他曾經到那裡參觀過,另有一些人認為現今的電腦體積愈來愈少,沒有可能有一台這麼巨型的電腦,但一間只有數十人的公司若用上如IBM-RS6000Ultra SPARC等電腦都要用上數百尺地方,何況這是一台用作處理全球人口資料的電腦呢?)。而這些電腦是用UNIX Operating System運作的,Fritz指出UNIX的結構與Illuminati Monarch Type Programming的結構完全相同!

以下資料對非主修電腦的人來說較難明白,但以下內容將會加上一些註釋,希望讀者先生/女士可以明白末世妖魔對我們毛孔不入的控制,加以防備。

源:The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave - by Cisco Wheeler & Fritz Springmeier


How Monarch Slaves Are Designed To Interface With The Unix System Of The Beast Computers

Monarch奴隸怎樣被設計成可跟獸的UNIX System連繫

In line with what is being done by the Illuminati around the world with their network of computers--the computers have access codes similar to 666 666 666, and back out and close down codes similar to 999 999 999. These are the codes that the UNIX universal system uses, and the Monarch slaves are being created with codes that interface with the UNIX system for computers. (On some systems if the computer is shutdown it will request an input code of 666fff666fff666fff666...This can then be reversed F6F6F6F6F6F6F6F6F6F6.)

在全世界的光明會有他們的電腦網絡電腦存取代碼,近似666 666 666,取消和關閉代碼,近似999 999 999。這些代碼就是UNIX普遍系統使用,Monarch奴隸以代碼創造,UNIX的介面為電腦而設。(Illuminati的電腦是以類似666 666 666999 999 999的編碼開關的,UNIX System 使用相同的編碼,而Monarch奴隸被設計成可跟UNIX System連繫。)

The UNIX system is being used to allow the New World Order's big BEAST computers to communicate with any known computer, including the minds of their Monarch mind-controlled slaves. In the 1960s, the U.S. Department of Defense began linking computers together into a superhighway ( ) now developed into the Internet. Hundreds of thousands of computers around the world are tied in. Like buildings in a city, each computer has its own unique address. Most of these addresses are registered at the Network Information Center in Menlo Park, CA. Individuals can also be registered at the NIC too. The U.S. Military links into the system with their Arpanet and Milnet networks, which tie together such divergent things as MIT computers, West Point computers, NORAD computers, Alr Force Systems Command Space Division computers at El Segundo, CA and U.S. Army DARCOM at Seckenheim, Ger. (to name a few). These are all being tied together to form one vast electronic brain.

UNIX系統用於達成新世界秩序大獸電腦與任何已知的電腦通訊,包括他們的Monarch頭腦受控奴隸的思想交流。上世紀六十年代,美國國防部開始將電腦連結在一起為資訊高速公路,現在發展成為互聯網。數以十萬計世界各地的電腦連在一起。像在一個城市中的建築物,每台電腦有自己唯一的位址。大多數的這些位址在派克網路資訊中心登記,CA.個人可以還在註冊NIC。美國軍事連結他們阿帕網和米爾內特的網路聯繫在一起,相異的如麻省理工學院電腦、西點電腦、NORAD電腦,埃爾塞貢多和塞肯海姆,在加利福尼亞州,在美國陸軍DARCOM Alr系統指令太空部門電腦系統,Ger.(名稱幾個)。這些是所有被捆綁在一起以形成一個龐大的電子大腦。

There are nine secret BEAST computers of the New World Order, at the time this was written. "Big Bertha" is the nickname of the BEAST computer located at the secret military installation called Dreamland ( Area 51) at the secret Groom Lake, NV test site facility. Papoose Lake is referred to as S-4. The other super-secret facilities in the area are named S-2, 8-6, and S-66. This area has become the Illuminati's prime programming facility for turning out Monarch slaves, and the Monarch slaves which are turned out from this area have turned out to be the worst basket cases. In other words the programming is very severe which is carried out in this area. This area has also been used for the space program, for the U-2 & SR-71, for the CIA's A-12 spy plane, for the Stealth fighters (Lockheed F-1 17A Attack plane) and bombers, the Aurora, and for the U.S. government's "Above Top Secret" flying saucers. The Big Bertha computer (named after the Illuminati Mother-of-Darkness Bertha Krupp) can be talked to in half a dozen languages and will answer a person back in the language they speak.

截稿為止,有九個秘密獸電腦新世界秩序。綽號是「Big Bertha」的獸電腦位於稱為夢境的秘密軍事設施在秘密馬夫湖(51),站點測試設施。Papoose湖被稱為 S-4。該地區的其他秘密的設施,名為S28-6 S-66。這一地方已成為光明會的重要程式設計地點,變成Monarch奴隸,結果從這一區域的Monarch奴隸,原來是最糟糕的相關情況。換句話說,程式設計是非常嚴重的在這一區域進行。這一區域也曾經作為太空計畫、U-2SR-71、中情局A12間諜機、隱形戰鬥機(洛克希德公司 F-1 17A攻擊機)和轟炸機、極光、和美國政府的「超級最高機密」飛碟。Big Bertha電腦(光明會母親的黑暗莎克虜伯之後命名),可以用六種語言交談和用他們所說的語言回答。

On a daily basis, airplanes fly into the Groom Lake facility. The callname of flights bringing workers and people go by the call name "Janet". About 12 Janet flights come into the facility everyday. These flights are usually Boeing 737s and arrive from places like a secure terminal run by EG&G at McCarran Alrport in Las Vegas and from the military's Palmdale, CA facility. These 737s are unmarked except for a red stripe running down the fuselage. Large military C-130 arrive with cargo, and Illuminati dignitaries arrive in smaller twin-engine craft. Victims for the programming are brought in via planes, & other routes.

每天,飛機飛入Groom Lake地方。航班的稱呼使工人和人民稱為「Janet」。關於 12 Janet航班每天都在這地點。這些航班通常都是波音737,從一個地方來,如以安全終端運作的EG & G拉斯維加斯麥卡倫機場和軍隊的CA地點。這些737無標記,除了紅色條紋在機身下。大型軍用C-130載有貨物,光明會的權貴達成用較小的雙引擎工藝。被程式設計的受害者運通過飛機、及其他路線。

One of the BEAST computers occupies three floors of the headquarters of the European Economic Community building in Brussels (布 魯 塞 爾), not far from the important Illuminati Mother-of-Darkness worldwide headquarters castle near the Fr.-Bel. border near Muno, Belgium. Another BEAST computer is in Luxembourg ( ). In observing the operations of the Illuminati, it has been seen that telephone area codes are used as part of a mind-controlled slave's code. We do not understand everything about their codes, but it does tie in with other things that are happening.

獸電腦之一,佔據三層在布魯塞爾歐洲經濟共同體總部,離重要光明會黑暗世界之母總部附近秘的城堡-美聲Muno邊境附近、距比利時不遠。另一部獸電腦是在盧森堡,觀察光明會的運作,看到電話區號用作思想控制奴隸代碼的一部分。我們不明白一切關於他們的代碼,但它會配合其他正在發生的事情。

Every person in the world has been assigned an 18 digit tracking number, which consists of 3 groups of 6 numbers. The first 3 numbers assigned in the BEAST computer to everyone are 666. The next is one's national code. The U.S. national code is 110. Then the next 3 numbers are your telephone area code, and then finally your 9 digit Social Security number. The code then is 666 + Nation code + Tel. area code + social security no. = BEAST I.D. no. for an individual.

世界上的每一個人已指派18位的追蹤號碼,組成個號碼。首先的三個數字是獸電腦分配給每個人,皆為666。接下來是一個人的國家代碼,美國國家代碼是 110。接下來的三個數字,是您的電話區號,然後最後你的九位數的社會安全號碼。該代碼然後是666 + 國家代碼 + 電話區號 + 社會保障號等於獸的個人身分證。

According to Dwight Kinman's book The World's Last Dictator, 2nd ed., (Woodburn, OR: Solid Rock Books, p. 256) VISA has already begun issuing VISA cards using the BEAST 18 digit number. When an American makes a bank transaction on an autoteller within a matter of seconds the BEAST has been informed of the activity. These computers use UNIX.

據德懷特 · Kinman書第二版(伯恩,或:Solid Rock Books、第256),世界最後一個獨裁者,VISA已經開始發出的卡開始使用獸的18位數。當美國人用自動櫃員機上的銀行交易,在幾秒之間的交易,獸已經知道。這些電腦使用UNIX

The particular programs for the economic transactions just described are a worldwide computer network called SWIFT (Society For Worldwide Interbank Financial Transactions). The SWIFT works off of the UNIX system and can communicate with any computer. It was developed by AT&T ( Bell Lab. ) and uses C language( Windows, C, C++ ). (Bear in mind that there are dialects of UNIX, such as the standard AT&T UNIX and for instance Berkeley UNIX. The UNIX system uses both timesharing and multitasking ( 工,如 使 Word Excel).  剛才所述的

經濟交易的一套特定程式是全球電腦網路稱為SWIFT(世界銀行同業金融交易社會)SWIFT採取UNIX 系統的運作,並且可以與任何一台電腦通信。它由AT&T(美國電話電報目前貝爾實驗室貝爾實驗室)開發,並使用C語言(包括Windows大多數軟件均以CC++ 語言寫成)(記在心裡這是UNIX方言,如標準AT&T UNIX 和例如伯克利UNIXUNIX系統使用分時和多工處理)(多工,如同時使用WordExcel)

The mind of a Monarch slave also does both multitasking and time sharing. One of the nice UNIX features, is "protected memory", which is also part of the Monarch programming. A kernal is what the UNIX programmers call a "protected person". It is very similar to the internal "person" (alter) who helps the Monarch slave's programming functions.

Monarch奴隸的思想也有多工和分時。一個很好的UNIX功能,是「記憶受保護」,這也是Monarch程式的一部分。核心是UNIX的程式設計師稱為「受保護的人」。它是非常類似內部的「人」(改變),發揮Monarch奴隸程式功能。

The big item about UNIX is that it has permissions (使用權限) granted. This is similar to the Monarch programming. Permissions are granted to 3 types of entities. The Top Programmer or "god" as he is called, of the UNIX System receives what is called the individual permission. The next permission is called group permission, and it is given to insiders who work with the system. The final permission type is the world, which has very limited access. The parallel between this and the Monarch programming is surprising. In some cases the programmers may have matched things on a one-to-one correspondence.

關於UNIX的大功能,是它的許可權(使用權限)的授予,這是類似Monarch程式。許可權授予三種類型的實體。頂部的程式設計師或他所稱的「上帝」,UNIX系統接收個人許可權。下一步許可權被稱為群組的許可權,它被賦予內幕人士操作系統。最後的許可權類型是世界上具有非常有限的存取權限。它和Monarch程式是空前的令人驚訝。在某些情況下,程式員可能以一對一的對應關係上配對。

The Monarch program also has a Top Programmer who is called "god" to the System. He has total control over the system. His programming permissions can not be deprogrammed out by others who might want to usurp his power. Monarch

Monarch程式的頂級程式員自稱為「上帝」,他已完全控制系統。他程式的許可權不能被其他人解破以奪去他的權力。

Hidden from the casual user of the UNIX system are the Daemons and Demons. The UNIX programmers decided to use the old english spelling for demon = Daemon. These are computer processes which work secretly behind the scenes and are given actual demonic names--some corresponding to actual names of historically known demons, such as Asmodeus. Asmodeus is also a demon which is placed into many Monarch slaves.  

隱藏UNIX系統的一般使用者是DaemonsDemonsUNIX 的程式設計師決定使用古英文拼寫的demon = Daemon。這些電腦運作是幕後秘密工作,指定真實的惡魔名字---一些對應歷史上已知的惡魔實際名稱,如AsmodeusAsmodeus 也是一個惡魔,放入許多Monarch奴隸。

In the UNIX system these demons are treated like persons in the computer's user director. Demons in the computer system do not have to log onto the computer, but they work behind the scenes and are given the same powers that people users are given. They are set up in the same structure as how the computer treats people. Permission in the UNIX system is granted using an 8 bit count with 0 through 7. The three kinds of permission are the read, write, and execute permissions. If no permission were granted in any way the UNIX system would indicate" "on the screen which means 000000 000 or nine 0's.

UNIX系統中這些惡魔看作是電腦的使用者主人。電腦系統中的惡魔沒有登錄到電腦,但他們的幕後工作,賦與相同的權力予人。他們設置相同的結構是電腦如何待人。在UNIX系統中許可權授予使用八位元數目,由07。三種許可權是讀取、寫入和執行許可權。如果沒有許可權授予,UNIX系統在螢幕上是000000 000個或九個 0

The super user called god is given the code 777 which means super user. However, the permission of 666 gives the user the power to everything the 777 permission gives, except that the 777 permission allows the god the master programmer to execute not executable programs.

稱為上帝的超級使用者的代碼 777意思為超級使用者。然而,666給使用者最高的權限如同777賦予的,只是 777 許可權允許上帝主程式設計師執行沒有可能執行的程式。

The Postmaster Demon is the head demon, and his permission level in UNIX is 666. (In the Monarch Programming "Mr. Postman" is a code word used internationally.) The most important part of the BEAST system is its communication power. The Electronic Mail System of the BEAST allows it to communicate worldwide, and along with electronic mail comes levels of permission to super user (god) is called Root.  

郵政惡魔(Postmaster Demon)是魔頭,他在 UNIX中的權限等級是666(Monarch程式「郵差先生」是國際上使用的代碼字)。獸系統的最重要部分是其通信能力。獸的電子郵件系統使它能夠在全世界溝通,以及電子郵件的許可權在超級使用者()被稱為根。

A programmer on the Beast must get permission. His program must get permission. That program that gives permission must also get permission. In other words, there are levels of permission that must be gone through.

獸的程式設計師必須獲得許可,他的計畫必須獲得許可,該授予許可權的程式也必須獲得許可。換句話說,權限等級必須經過准許。

This is similar to the Monarch program. For instance, the alters personalities which would control the body during Illuminati gatherings have very tight access permission. It is very hard to access these hierarchy personalities. Both the UNIX system (and the Monarch programming) creates "children" by "spinning". The "child" spins off. When the "child" is finished it is "killed" in UNIX lingo.

這是類似Monarch程式。例如,人格改變,控制個人的個性在光明會聚會有非常嚴格的存取權限,這是很難訪問這些層次結構的個性。UNIX系統(Monarch程式)通過「轉動」,創造「兒童」,「兒童」旋轉。當「兒童」完成時,是UNIX行話的「殺害」。

When the programmers created child processes in the computer, they were having problems with the child processes killing the parent processes. The same type of problems have had to be dealt with in the Monarch programming. The initial programmer is often the biological parent of the child, and this parent is very responsible for extreme tortures being applied to the child who is being programmed--not to mention all of the expendible children, who are killed in front of the child to highlight the reality of the trauma. The natural reaction of the child being created is to hate the programmer.

當程式設計師在電腦創建了子行程時,他們都有子行程殺父行程的問題。相同類型的問題不得不處理在Monarch程式。初級程式設計員通常是父子的生物,此父是非常要負責任的極端折磨被應用到的子行程設計 更不用提所有孩子,在孩子面前被殺,要突出顯示創傷現實的一面。自然反應是被造的孩子討厭程式設計師。

Naturally, the Monarch programming had to overcome that natural tendency, which it does very successfully. The UNIX system uses an internal clock within its computer system. The UNIX clock is called CRON. CRON checks files to see if the programmer has put in any files to run. The UNIX system uses data bus lines, which are like the Monarch programming ribbons, which go through the system. These ribbons or data bus lines take information and commands from the computers to other computers.

當然,Monarch程式設計不得不克服那自然的趨勢,做得很成功。UNIX系統使用其電腦的內部時鐘系統,UNIX時鐘被稱為CRONCRON檢查是否程式設計師已經放在要運行的任何檔案。UNIX系統使用資料匯流排,就像Monarch程式絲帶,進入系統。這些絲帶或資料匯流排接收資訊和用電腦控制其他電腦。

Within the UNIX system, insiders have revealed that the Daemon (Demon) processes of all the UNIX systems have a security flaw. That flaw is that the Postmaster Daemon has access to them in spite of who the god is of that particular UNIX computer system. So while owners, who purchase UNIX systems think that they have exclusive control over their system, an external Postmaster Daemon coming from the Beast could use its permission levels to over ride the power of the local owner of the system.

UNIX系統上,內幕人士透露Daemon (Demon)過程,所有UNIX系統有安全缺陷。該漏洞是郵政Daemon有權訪問它們儘管上帝是該特定的UNIX電腦系統。所以主人,而主人認為,他們已經完全控制了他們的系統,獸來自外部郵政Daemon進程可以使用到其權限等級以凌架UNIX系統本地擁有者的系統權限。

The Monarch system has a similar feature, the Illuminati programmers know how to access the base or primal anchors to the programming and yank out any programming they want. All the slaves of these lesser groups such as the CIA ( ), Church of Satan, Mafia, etc. can all be reprogrammed rather quickly to serve the Illuminati, if they are not already due to the Illuminati programmers extra knowledge on how to get into the base programming. In these many ways, the UNIX system serves both real computers and also for the internal computers of some slaves' mind.   

Monarch系統有一個類似的功能,光明會的程式設計師知道如何存取程式設計的基地,猛力移除任何他們想要的程式設計。這些較小的群體,例如美國中央情報局的所有奴隸、撒旦教、黑手黨等可以全部被重新程式設計而快速服務光明會,他們不是已經因光明會程式設計師額外知識在如何進入基本程式。在這些許多方面,UNIX系統服務全部實際應用的電腦,也為一些奴隸思想的內部電腦。

The slave's system becomes a computer system. It functions as a series of computers that are connected to the master computer which is sunk into the mind at the lowest hypnotic level, which is a level often placed even below an internal "hell pit". To access the different computers, combinations of cards were used for the codes (numbers are also used. See Chapter 4.). Various parts of a Monarch system correspond to what any computer would have. A microprocessor register has 3 sections on a computer to make it functional. In Monarch Systems, you would find these 3 represented by 1. stored data in the library and alters with photographic memories, 2. an instruction section with codes, and 3. stacking mechanisms.

奴隸系統成為一套電腦系統。它的功能作為一系列的電腦連接主電腦,沉入最低階的催眠,經常處於位置為低階的「地獄坑」。若要存取不同的電腦,卡的組合被用於代碼(還用於數位。請參閱第四章)Monarch系統的各個部分對應任何電腦。微處理器寄存有三個部分在電腦上以便運作。在Monarch制度中,你會發現這些以三個部份代表。1.存儲在資料庫中的資料,並更改與攝影的記憶,2. 與代碼的指令,3. 堆疊的機制。

Linked to all this were a crystal, clock, hour glasses, a compass and an entire demonic command structure. The eye in front of the big computer will be protected by legions of spirits. The front big computer runs front quadrants and the back computer runs the deeper quadrants.

連結到所有這是水晶、時鐘、沙漏、指南針和整個惡魔的命令結構。在大型電腦前面的眼睛會受大批的靈保護,前面的大型電腦運行前面象限,並且後面電腦運行更深層次的象限。

The software so to speak for the Omega programming (computer) may be set up to include a stacking program called the Potter's Wheel. The Potter's Wheel is a misuse of the Bible, and is a type of programming that the Charismatic/pentecostal movement(惡魔 Word of Faith - Kenneth Copeland, Charles Capps, Kenneth Haggin) carries out. The Mormons(摩門教) and the Catholics have their own distinctive "software" programs.    

這麼說歐米茄程式(電腦),包括一個叫做匠心之輪的堆疊程式。匠心之輪是濫用聖經,是一種類型的程式設計,靈恩派/五旬節運動(惡魔 Word of Faith - Kenneth Copeland, Charles Capps, Kenneth Haggin)進行。摩門教和天主教徒有自己獨特的「軟體」程式。

An initial stacking mechanism would work by telling alters to "Stand in Order according to rank and serial no." Another code along with a hand signal would place the Gatekeeper alters up on the Potter's wheel for their "creator" to work on them. A group of alters could be taught to go up on their Potter's wheel by seeing a pattern of dominoes. It is whatever the programmer decides.

初始的堆疊機制會工作,告訴改變「Stand in Order according to rank and serial no」。另一個代碼會用手勢放在Gatekeeper改變了其「創造主」,為他們工作。一組群改變可以教導Potter's wheel看到多米諾骨牌圖案,它是程式設計師決定一切。

The dominoes were used for coding, but they also had the programming feature of being able to tie alters together so that if the System is tampered with out of sequence, a domino effect would take place. This domino effect is for one program to set off another program to set off another program. Soon the Monarch slave's mind is trying to deal with dozens of suicide programs running simultaneously, along with perhaps other programs such as scrambling programs.

多米諾骨牌被用於編碼,但是他們也有程式設計功能的能力,以配合在一起改變這樣,如果該系統不按順序進行篡改,多米諾骨牌效應將會出現。這種多米諾骨牌效應是一套程式,關閉其他程式設置為關閉另一個程式集。很快的Monarch奴隸思想正試圖處理數打自殺程式同時運行,或許其他程式,如不規則性的程式。

For instance, one story line used is the mice run up and down and open up new levels of programming and are tied to the pendulum/clock mechanism. The mice can activate the hour glass, and a gold-winged green skirted fairy Whisper balances the hour glass on her wings. If the slave goes toward freedom, the slave's mind triggers programs of all kinds, and the mind ends up not knowing if it was coming or going with all the different programs which activate.

例如,有一行故事是老鼠向上和向下跑,開闢新級別程式設計和鐘擺/機制。老鼠可以啟動沙漏、綠色金翅精靈耳語沙漏在她的翅膀。如果奴隸朝向自由,奴隸的思想觸發所有種類的程式,思想最終不知道還是要啟動所有不同的程式。

A more exhaustive look at all the craziness and activity of the Omega & Gamma programs which activate to defend the Illuminati's Mind Control are given in other chapters. The programming has been designed that if it was taken out improperly, it is to come back Seven times Seven stronger. This is also a clue that the programming is partly a demonic manifestation, cf. MT 12:43-45 et al.

其他章節更詳盡看看所有的瘋狂和啟動捍衛光明會的思想控制的歐米茄和伽瑪程式軟體的活動。設計程式如果不當,它將回到更強的七倍。這也是一條線索,程式設計是惡魔的一種表現,參看山1243 45 et al