Science and Technology
Published on: January 9th, 2005
Modified on: July 6th, 2005
by Brother Bob...
As christian parents, each of us tries to bring up our children in
the"nuture and admonition of the Lord" . The very first concept taught in
the Bible,
and one we want to pass on to our children is...
"In the Beginning God created the heavens and
the earth" (Gen 1:1)
One of my great frustrations is that having taught this timeless and
precious
truth to my children, the public schools come along and try to
"unteach"
this
treasure as being myth and foolishness, and substitute the actual myth
and foolishness of origins by evolution. Even in kindergarten, and also
all the way up through all the public educational system, they try to
indoctrinate God and creation out of our children's belief system.
And what do they offer as a "scientific" alternative to Creation and
preservation by a loving God? Mindless evolution by cosmic
accidents
and billions of years of random chance processes; teaching them that
there is no God, and we re nothing more than glorified animals having
evolved from primordial slime in the far distant past, having no
moral
compass and that there are no absolutes of morality or anything else.
Is it any wonder that we are raising a generation of demoralized and
suicidal misfits with no reason for living?
http://i.am/jah/evolut.htm
This is so unfair, and yet it is part of the worldly society in
which we find ourselves. We expect our children to become "educated"
and get the skills they will need to succeed in our complex
technological society...instead they are being turned into dumbed-down
wanderers, adrift in a meaningless universe of atheism, humanism and
pleasure-seeking.
http://i.am/jah/marguide.htm
So what is the importance of Creation Science in all of this?
Creation science takes us back to a belief in the world-view which God
has revealed in Genesis. If we got here by random chance, and there is
no need to believe in the God of the Bible, then the remainder of the
Bible is largely irrelevant. They present "scientific evidence" and
theories to prove their ideas, but upon closer examination of the real
scientific evidence, it turns out that the science actually proves that
we must have had a creator, because what is here is too complex to have
just happened by random chance processes. It is into this place that
Creation Science comes to show the "real science" which actually proves
the need for an intelligent creator, and that this Creator is God.
http://i.am/jah/mastplan.htm
So as we send our children back into the lions' den for another year,
here is a little help from some excellent sources on Creation Science,
that our children can perhaps use to counter the false claims of
evolutionists, and to show that God is indeed the Great Scientist...The
Creator of All That Is,
and that you don’t have to check your brain in at the door when you
become a christian.
Published on: January 6th, 2005
Modified on: January 6th, 2005
The
ONLY solution is to
enforce The Plan against the traitorous N.W.O. Zionist mass-murder,
inside-job perpetrators of 911 and the phoney War on Terror:-
http://i.am/jah/plan.htm
Time is running out:-
http://i.am/jah/signs.htm
Cover-up of Original Atomic
Bomb Effects in New York Times Rings True Today
Dear friends,
The below article is an excellent
example of how the New York Times, one
of the most respected newspapers in the world, has twisted the facts
and manipulated public opinion in order to support a deeper agenda.
This revealing story covers the bombing of Hiroshima almost 60 years
ago, yet the same deceptive techniques of distortion and manipulation
continue to be used today to support the profit-making war machine http://www.wanttoknow.info/warisaracket
. Thanks to the Internet and excellent alternative news websites (like
commondreams.org where this article is reported), those who want to
know can now find viable alternative viewpoints and explore the
veracity of questionable news reports in the mainstream media. Please
help to inform others by sharing this revealing news with your friends
and colleagues.
With best wishes,
Fred Burks for the WantToKnow.info
team
http://www.commondreams.org/views04/0810-01.htm
Hiroshima Cover-up: How the
War Department's Timesman Won a Pulitzer
by Amy Goodman and David Goodman
Governments lie.
-- I. F. Stone,
Journalist At the dawn of the nuclear age, an independent
Australian
journalist named Wilfred Burchett traveled to Japan to cover the
aftermath of the atomic bombing of Hiroshima. The only problem
was
that General Douglas MacArthur had declared southern Japan
off-limits,
barring the press. Over 200,000 people died in the atomic
bombings
of Hiroshima and Nagasaki, but no Western journalist witnessed
the
aftermath and told the story. The world's media obediently
crowded onto the USS Missouri off the coast of Japan to cover the
surrender of the Japanese.
Wilfred Burchett decided to strike out
on his own.
He was determined to see for himself what this nuclear bomb had
done,
to understand what this vaunted new weapon was all about. So he
boarded a train and traveled for thirty hours to the city of
Hiroshima
in defiance of General MacArthur's orders.
Burchett emerged from the
train into a nightmare world. The devastation that confronted him
was
unlike any he had ever seen during the war. The city of
Hiroshima,
with a population of 350,000, had been razed. Multistory
buildings
were reduced to charred posts. He saw people's shadows seared
into
walls and sidewalks. He met people with their skin melting off.
In the
hospital, he saw patients with purple skin hemorrhages, gangrene,
fever, and rapid hair loss. Burchett was among the first to
witness
and describe radiation sickness.
Published on: January 2nd, 2005
Modified on: January 13th, 2005
Published on: December 31st, 2004
Modified on: December 31st, 2004
by Richard Stallman

Who should your computer take its orders from? Most people think their computers should obey them, not obey someone else. With a plan they call "trusted computing", large media corporations (including the movie companies and record companies), together with computer companies such as Microsoft and Intel, are planning to make your computer obey them instead of you. (Microsoft's version of this scheme is called "Palladium".) Proprietary programs have included malicious features before, but this plan would make it universal.
Published on: December 28th, 2004
Modified on: December 28th, 2004
http://www.indymedia.org.uk/en/2004/10/298702.html
A hypothesis that Microsoft's Windows XP is a complex variation of a bugging device.
M$ Windows XP Professional Bugging Device?
By Mark McCarron
( MarkMcCarron_ITT [at] hotmail [dot] com, angelofd7 [at] icqmail [dot] com)
Introduction
Context, context, context. I was sick hearing that phrase from Egyptologists in regards to my research on the Great Pyramid. They never could grasp that context is irrelevant to the scientific process or methodology, science examines facts, not interpretation. In saying that, they taught me a lot, it is funny how the entire aspect of a thing or situation can change, just by applying a different context to it.
Published on: December 23rd, 2004
Modified on: December 23rd, 2004
Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and more. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.
Your traffic is safer when you use Tor, because communications are bounced around a distributed network of servers, called onion routers. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several servers that cover your tracks so no observer at any single point can tell where the data came from or where it's going. This makes it hard for recipients, observers, and even the onion routers themselves to figure out who and where you are. Tor's technology aims to provide Internet users with protection against "traffic analysis," a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security.
Published on: December 19th, 2004
Modified on: June 2nd, 2005
Linux Opinion: An Open Letter to a Digital World
"The Windows platform is not just insecure - it's
patently, blatantly, and unashamedly insecure by design"
December 18, 2004, http://www.linuxworld.com/story/47536.htm
Summary
As a Linux desktop user himself, system
administrator Chris Spencer did not relish having to clean up his
wife's infected Windows PC after it had become compromised. By the time
he'd solved the immediate problem, Spencer had become so fed up with
spyware, trojans, viruses, and spam, that he decided it was time to
write a letter to the world. It's a simple message: it's time to switch
from Windows to Linux. "The letter serves as a guide," Spencer
explains, "taking you through some of the history of Microsoft right up
to this present day."
By chris [at] digitalfreedoms [dot] org">Chris Spencer
Published on: December 18th, 2004
Modified on: December 18th, 2004
Scientists Admit: Evolution Not Supported By Facts!
http://www.chick.com/bc/1987/evolution.asp
"Evolutionism is a fairy tale for grown-ups. This theory has helped
nothing in the progress of science. It is useless," says Professor
Louis Bouroune, former President of the Biological Society of
Strasbourg and Director of the Strasbourg Zoological Museum, later
Director of Research at the French National Centre of Scientific
Research, as quoted in The Advocate, March 8, 1984. On many campuses,
any professor who admits having doubts about the "factual" nature of
evolution would be laughed off the campus (and out of his job). But
today, more and more courageous scientists are publicly admitting what
they have known privately for years: believing in evolution requires an
act of blind faith.
Published on: December 16th, 2004
Modified on: December 16th, 2004
Traditional clocks tick once every second; tick tick tick tick tick tick... 60 ticks per minute. That's how they work, should work, right?
Well, I was going to measure the time something takes and casually opened up the clock in Windows to look at the seconds on that clock, just in case I'd had too much caffeine in m and got the seconds a bit too fast....
I noticed that Microsofts clock in Windows Server 2003, pauses every 5 seconds; tick tick tick tick tick...pause...tick tick tick tick tick...pause...
Great work Microsoft...I'm not very surprised
http://techreport.com/forums/viewtopic.php?t=20863
Published on: December 14th, 2004
Modified on: December 14th, 2004
Linux advocates have long insisted that open-source development results in better and more secure software. Now they have statistics to back up their claims.
According to a four-year analysis of the 5.7 million lines of Linux source code conducted by five Stanford University computer science researchers, the Linux kernel programming code is better and more secure than the programming code of most proprietary software.
The report, set to be released on Tuesday, states that the 2.6 Linux production kernel, shipped with software from Red Hat, Novell and other major Linux software vendors, contains 985 bugs in 5.7 million lines of code, well below the industry average for commercial enterprise software. Windows XP, by comparison, contains about 40 million lines of code, with new bugs found on a frequent basis.
Published on: December 10th, 2004
Modified on: December 10th, 2004
http://www.reuters.com/newsArticle.jhtml?type=internetNews&storyID=7041976
BRUSSELS (Reuters) - The European Union has launched a 45 million euro ($60 million) plan to protect children from pornography and racist sites when they surf the Internet.
"Children are using the Internet more and more and can come across dangerous content. It's essential to inform parents what tools they can use," Viviane Reding, the European Information Society and Media Commissioner, told a news conference.
Published on: December 3rd, 2004
Modified on: December 3rd, 2004
by unknown
So yesterday as some of you already know on the cable (timewarner)
channel of the science channel they did a whole show on weather
modification and let me tell you it was incredibly informative and not
as chintzy as one would expect to see on tv.
I wrote down what I could as our vcr does not work so here is what I
got... This company manufactured and then later sprayed this gelatinous
substance and they dropped tons of this stuff (looks just like dippity
doo hair gel) into a cloud and the blobs simply fell to the ground. The
owner of this privately owned company is Peter Cordoni(sp). http://www.dynomat.com/ind.shtml
Published on: October 23rd, 2004
Modified on: October 23rd, 2004
Last week in these pages, Next carried a story that is receiving an increasing amount of media attention: which is more secure - Windows or Linux?
A snide answer is OpenBSD, which has an exemplary record with respect to security. But let's stick to the two most broadly used platforms in IT today.
Microsoft's hired analysts claim that Windows is more secure than Linux. Should we believe them?
Published on: October 17th, 2004
Modified on: January 3rd, 2005
You've probably heard about Echelon, the vast listening system run by the US, UK, Canada and Australia that scans the world's voice traffic looking for key words and phrases.
Aside from using the system for industrial espionage and bypassing international and national laws to listen in on people, it is also used to listen out for people like Osama bin Laden and assorted terrorists in the hope of preventing attacks.
Published on: October 13th, 2004
Modified on: October 13th, 2004
"Civilized", "techologically advanced" mankind is destroying planet earths ecosystem at a staggering rate, and now we are littering space too...insane
Bolts, old screwdrivers, plastic bags, paint, broken pens, bent CDs - they are the kind of objects you would expect to find in a list of rubbish. Except that this collection of litter is not to be found in the bin at the end of the front garden, but whizzing about in space, threatening to collide with astronauts.
Astronomers working for the European Space Agency (ESA) warned yesterday that space is so full of rubbish that it has become a danger to the people and satellites in it. A team from the Canary Islands Institute of Astrophysics predicted that it will have detected around 100,000 fragments of space rubbish by the time it has finished a definitive catalogue....
---------clip---
follow link for complete article, also see:
http://i.am/jah/why.htm
Published on: October 10th, 2004
Modified on: October 10th, 2004
Howdy Y'all, The means to track vehicles in Australia is already an operational fact of life in the transport industry, strange little concrete pill-boxes have sprung-up all over the country in the past 5 years, interfaced with surveillance/communication satellites. My sister has a transceiver fitted to her car in Victoria. I have repeatedly tried to warn people all over this country about the true nature and pending sinister autocratic intent of the placement/imposition of the technology, but just like everything else I have tried to tell them, since arriving back in Australia 1975; generally speaking, I have wasted my breath!! And to be perfectly candid about the whole thing; I just don't believe that people in general, are genuinely interested in the true solution to the global conspiracy, even when they are forced to acknowledge the palpable, and inescapable reality of it at all.
The truth of the matter is that, people in general, and for the most part, are fixated on preserving exactly what led to this current perilous global circumstance in the first place: viz., false and utterly corrupt, Satanically controlled pseudo religions, and more especially those purporting to be, and characterized as, Christian, [albeit, in caricature, at best]; maugre, the hybridized paraphrased liturgical clap-trap and religious drivel!!
http://i.am/jah/darth.htm
Ultimately, until people recognize the reality of the primary causative nature of the aforesaid religious contagions, and the major role that this evil has played in the DUMBING - DOWN PROCESS; such people will not only be hopelessly ill-prepared, for what is sure to come, but, in the final analysis, doomed to failure, in all their futile attempts to achieve a positive, enduring and qualitative outcome!! Moreover, this also includes all philosophies i.e. all the insane self-deprecating theories of evolution etc.
http://i.am/jah/evolut.htm
Your friend and fellow-pilgrim in this life's journey for weal or woe,
David "Iconoclast" Stewart
http://i.am/jah/pilgrim.pdf
LIFE WITH BIG BROTHER: Feds plan to track every car Obscure agency working on technology to monitor all vehicles
http://www.worldnetdaily.com/news/article.asp?ARTICLE_ID=40795
Thursday, October 7, 2004
------- © 2004 WorldNetDaily. com A little-known federal agency is planning a new monitoring program by which the government would track every car on the road by using onboard transceivers.
The agency, the Intelligent Transportation Systems Joint Program Office, is part of the Department of Transportation. According to an extensive report in the Charlotte, N. C., Creative Loafing, the agency doesn't respond to public inquiries about its activity.
Published on: October 9th, 2004
Modified on: October 9th, 2004
I've seen a few production environments in small businesses that were designed by the owner's or manager's brother or teenage son, complete with ridiculously high-performance yet surprisingly low-quality consumer-grade hardware and unlicensed proprietary software. It's conceivable that the designer is merely a regular employee who "knows about computers" -- much like I was at the repair shop -- but doesn't know anything about security policy, server logs, strong passwords, firewalls, proxy servers, audits, backup scripts and all of the other hardware, software, and administrative tools and tricks that an experienced sysadmin has in his or her arsenal. It's frightening how often these two types of people design small business networks.
Published on: October 5th, 2004
Modified on: January 3rd, 2005
Air Force pursuing antimatter weapons
Program was touted publicly, then came official gag order
- Keay Davidson, Chronicle Science Writer
Monday, October 4, 2004
The U.S. Air Force is quietly spending millions of dollars investigating ways to use a radical power source -- antimatter, the eerie "mirror" of ordinary matter -- in future weapons.
The most powerful potential energy source presently thought to be available to humanity, antimatter is a term normally heard in science-fiction films and TV shows, whose heroes fly "antimatter-powered spaceships" and do battle with "antimatter guns."
Published on: October 1st, 2004
Modified on: October 1st, 2004
This paper provides quantitative data that, in many cases, using open source software / free software is a reasonable or even superior approach to using their proprietary competition according to various measures. This paper’s goal is to show that you should consider using OSS/FS when acquiring software.
Published on: September 23rd, 2004
Modified on: September 23rd, 2004
http://asia.cnet.com/news/security/0,39037064,39194791,00.htm
Code to exploit Windows graphics flaw now public
By Robert
Lemos, CNET News.com
Thursday, September 23 2004 11:31 AM
A sample program hit the Internet on
Wednesday, showing by example how malicious coders could compromise
Windows computers by using a flaw in the handling of a widespread
graphics format by Microsoft's software.
Security professionals expect the release of the program to herald a
new round of attacks by viruses and Trojan horses incorporating the
code to circumvent security on Windows computers that have not been
updated. The flaw, in the way Microsoft's
software processes JPEG graphics, could allow a program to take
control of a victim's computer when the user opens a JPEG file.
"Within days, you'll likely see (attacks) using this code as a
basis,"
said Vincent Weafer, senior director of security response for
antivirus-software company Symantec. "This is dangerous in a sense that
everyone processes JPEG files to some degree."
The program is the latest example of "exploit code," a sample that
shows others how to create attack programs that can take advantage of a
particular flaw. Such code preceded the Sasser worm by two days and the
MSBlast worm by nine days.
Published on: September 22nd, 2004
Modified on: April 6th, 2005
Have 1,000 U.S. Souls Died for Oil?
by Ivan Eland
http://www.liberty-news.com/showNewsletter.php?id=200409191
The tragic milestone of 1,000 U.S. deaths in the Iraqi quagmire
should cause introspection about why the United States really went to
war and whether it has been worth it. While the Bush administration’s
public justifications never really added up, evidence exists that there
was a hidden agenda behind the invasion of Iraq: securing oil.
http://i.am/jah/politics.htm
Saddam never had a collaborative relationship with al Qaeda. Even
if Saddam’s nuclear weapons program had made more progress than his
crude attempt at a restart-the worst case-it was known to be less
advanced than those of North Korea and Iran. As for giving expensive
nuclear, biological, or chemical weapons to unpredictable terrorist
groups: Iraq was less of a state-sponsor of terrorism than Iran or
Syria and didn?t sponsor groups that focused their attacks on the
United States. After no “weapons of mass destruction” or Iraqi links
with al Qaeda were found, the Bush administration’s fallback rationale
for war was liberating oppressed peoples and creating democracy that
would spread throughout the Middle East. Of course, this social
engineering project also could have been attempted in Syria, Iran, or
with U.S. Gulf allies, such as Saudi Arabia, albeit probably no more
successfully than in Iraq.
http://i.am/jah/democra.htm
So if the many and shifting stated justifications for the
invasion fall apart under scrutiny, the average citizen is left to
search for a legitimate secret reason for what has now become a deadly
debacle. More evidence exists to support the unspoken theory of
securing oil, than other covert motives. Some have alleged the war was
a neo-conservative plan to take out a potential enemy of Israel. There
may be some truth to this argument. But after making peace with the
most menacing Arab nation-Egypt-and purportedly possessing hundreds of
nuclear weapons, Israel is now relatively secure
from existential threats. Besides, most experts agreed that Iran was
closer to being a nuclear threat to Israel than Iraq. Syria was a
bigger conventional threat than Saddam’s regime because of its
contiguous border with the Jewish state.
Published on: September 9th, 2004
Modified on: September 19th, 2004
Photos from NY of the sound weapon in place and pointed at protesters.
Published on: September 3rd, 2004
Modified on: July 28th, 2006
by Larry Cook
If you have ever wondered whether or not microwaved food
is safe, here's an experiment you can do at home. Plant seeds in two
pots. Water one pot with water that has been microwaved, the other with
regular tap. The seeds that received microwaved water won't sprout. If
microwaved water can stop plants from growing, think of what microwaved
food can do to your health!
Published on: September 2nd, 2004
Modified on: September 2nd, 2004
"Following decades of intense lobbying by the mind control psychiatrists
and psychiatric-medical establishment, the U.S. government made plans to
establish mega-agencies, such as HEW (Health, Education and Welfare) and
VA (Veterans Administration). It can be no coincidence that through these
agencies many of the atrocities of the Invisible War have been committed."
THE INVISIBLE THIRD WORLD WAR
BY
W.H. Bowart and Richard Sutton
this page is a copy of: http://www.adacomp.net/~mcherney/bowart.htm
Table of Contents
27.9.1990
Published on: August 22nd, 2004
Modified on: August 22nd, 2004
Source: http://www.americanfreepress.net/html/cancer_epidemic_.html
By Christopher Bollyn
A growing number of U. S. military personnel who are serving, or have served, in Iraq or Afghanistan has become sick and disabled from a variety of symptoms commonly known as Gulf War Syndrome. Depleted uranium (DU) weapons have been blamed for many of the symptoms.
Published on: August 10th, 2004
Modified on: January 2nd, 2005
By MIRON VAROUHAKIS
AP
ATHENS, Greece (AP) - If you're planning on attending this month's Olympic Games, you'd best be careful what you say and do in public.
Software will be watching and listening.
Recent leaps in technology have paired highly sophisticated software with street surveillance cameras to create digital security guards with intelligence-gathering skills.
``It is a very vast network and it is the first time it is being done on such a scale at an international level,'' Greek police spokesman Col. Lefteris Ikonomou told The Associated Press.
Published on: August 6th, 2004
Modified on: August 6th, 2004
Every discussion forum on the Web is monitored by Israeli loyalists. This is an organized and, where necessary, supported effort that is perfectly reasonable given the situation of Jews and Israel in the world not only today, but throughout history. Just as the ADL and the JDL and other organizations are properly watchful for those inimical for whatever reason to the well-being of Jews, and are very good at what they do, so we have among us at Liberty Forum not only those who advocate Israel's interests but those who simply watch for dangers. I support this, I have never not supported it, and firmly advocate that any discrete and identifiable grouping on whatever basis of association should do likewise.
follow link for complete article...
Published on: June 26th, 2004
Modified on: June 26th, 2004
Disinfopedia.org is a collaborative project to produce a directory of public relations firms, think tanks, industry-funded organizations and industry-friendly experts that work to influence public opinion and public policy on behalf of corporations, governments and special interests
Microsoft was founded in 1975 by Bill Gates and Paul Allen. Microsoft has a corporate history of disinformation going back to its very inception
Published on: June 22nd, 2004
Modified on: June 22nd, 2004
some quotes from the article:
"Let's start by reminding ourselves of the stakes. For Microsoft (or at least its present business model) to survive, open source must die..."
^^^^^
"...Expect Microsoft to ally even more closely with the RIAA and MPAA in making yet another try at hardware-based DRM restrictions — and legislation making them mandatory. The rationale will be to stop piracy and spam, but the real goal will be customer control and a lockout of all unauthorized software. Two previous attempts at this have failed, but the logic of Microsoft's situation is such that they must keep trying.
|