major metaprograms

This information enabled me to more effectively assign priorities to processes:
John Cunningham Lilly. Major metaprograms.

Program: a set of internally consistent instructions for the computation of signals, the formation of information, the storage of both, the preparation of messages, the logical processes to be used, the selection processes, and the storage addresses all occurring within a biocomputer, a brain.
Metaprogram a set of instructions, descriptions, and means of control of sets of programs.
Selfmetaprogram: a special metaprogram which involves the selfprogramming aspects of the computer, which creates new programs, revises old programs, and reorganizes programs and metaprograms. This entity works only directly on the metaprograms, not the programs themselves; metaprograms work on each program and the detailed instructions therein. Alternative names are set of selfmetaprograms, “selfmetaprogramming entity,” or the selfmetaprogrammer.

1. External Reality Metaprogram
This metaprogram operates programs with interlock with the outsidebodysystems. These systems include all of external reality; human beings are a defined part of the external reality.
This metaprogram seems to be absent only in special states and even then possibly is only relatively attenuated, not completely absent. The states in which it is attenuated include sleep, coma, trance, anaesthesia, etc.The above states cause centrally conditioned reductions of the stimulation arriving from the external reality. It is also possible to attenuate the external reality stimuli themselves.
In the profound physical isolation, external reality excitation of the CNS is attenuated to minimum possible levels in all modes. If in profound physical isolation, one adds a metaprogrammatically active substance to the brain, further attenuation of the external reality stimuli can be achieved and the ego (selfmetaprogram) is more fully activated. If in profound physical isolation one adds sleep, trance, or anaesthesia (light levels), these give external reality cutoff and cessation of e.r. (external reality) excitation of the central nervous system (and of the “mind”).
The external reality metaprogram is increased in its intensity in high excitation states; interlock with the external reality can be increased by these means.
2. Selfmetaprograms
These metaprograms include all of those entities which are usually defined as ego, consciousness, self, and so forth.
The interlock of the selfmetaprograms with the external reality metaprograms can be attenuated by special techniques including sleep, isolation, anaesthesia, etc.
The apparent strength of these metaprograms can be enhanced in certain cased by LSD 25 plus dextroamphetamine, psychic energizers, etc.
3. Storage Metaprograms
These metaprograms have two aspects: there is the active storage process in which the inputs from e.r. and from self are connected to storage: there is the active output process in which the self is connected directly to storage. To achieve these connections there are the search metaprograms. The nature of these programs varies depending upon special conditions. It varies in free association states, hypnogogic states, dreaming states, etc. Some psychoactive substances allow a special state in which the selfmetaprograms can directly consciously explore much of the storage itself. In this particular state the selfmetaprograms and the searchmetaprograms operate coextensively in such a way as to reveal the innermost files of the storage directly to self.
4. Autonomic (Nervous System) Programs
The autonomic nervous system has builtin properties which are definitely programmatic rather than metaprogrammatic. The relationships between these and the selfmetaprogram are second order. These autonomic programs do not exist directly in selfmetaprograms. These programs include the programs for the gastrointestinal tract, for sex, for anger, for fright, etc. These programs can be modified by the selfmetaprogram; once started their detailed carryingout is automatic.
5. Body Maintenance Programs
These are programs which cut across the lines of the previous ones and include such consciousunconscious programs as the needs and the carrying out of sleep, exercise, correct food, environmental temperature regulations, clothing, etc. The realities of the body maintenance in the external reality are included in these programs.
6. FamilyLoveReproductionChildren Program
This is also an aspect of the external reality metaprogram and here is separated out as one of the basic programs within that one. Depending upon the individual computer there can be many more programs; some may be devised as above, others cut across the above boundaries. Such divisions, in the last analysis, are artificial and reflect the tendency of a human to think and act disintegrated into categories rather than as an integrated smoothly operating holistic computer.
7. Survival Metaprograms
Survival Priorities are used in case of threat to structural and/or functional integrity of the entities named the order is that of relative importance in the sense that the one below in the list will be sacrificed, abandoned, penalized, or changed in order to save, maintain, integrate, or educate the one above in the series.
A threat is defined as internal (mental) information (which when above threshold) anticipates and predicts immediate or delayed destruction, mutilation, confinement, abandonment, damnation, ostracism, solution (lysis) of continuity, compromised integrity, moral encroachment, severe ethical insult, voluntary seduction, unconscious entrancement, slavery, etc.
In nonthreatening educative processes the listing is more flexible any entity may, for a time, be placed at the head of the new list. This survival priorities list may remain intact in this order in the depths below awareness. It is evoked in states of fatigue which begin to generate information above the threat threshold .
0. The Soulspirit this concept includes life after mortal death, reincarnation, the immortal entity, that which is Godgiven, none of which is in current Science. This is currently considered by some persons as the most valuable of all the available entities. Depending on the needs of the definer, this entity may be educable, may have higher ethical strivings than current ones, may store information of certain kinds, may develop skills in certain areas, may carry these capabilities within it to the next state after the current mortal physical reality is left, etc.
1. Egomind Entity: one’s mind and mental self are valued above the body (and in those with the above religious belief, below the soul).
2. Body it is obvious that one values one’s body less than one’s mental self; however, at times one can be forced to act as if the list did not have this order but the opposite. Sometimes the mind shuts down, leaving the body to its survival battle alone.
3. Lover starting with the prototypic father and mother models and moving to wife or husband models.
4. Child: one’s own child.
5. Siblings.
6. Parents.
7. Valued friends.
8. Humans in general.
9. Biodiversity.
10. Planet Earth.
11. Solar system.

ODD# III(b)/1,ii;29Afm3180

Этот же на русском языке.

Read the original post and comment stream on Friendica

source code

There is no government, no industrial-military complex, no economic system, no mass media that can ever reduce us to puppets and robots as thoroughly as the biological and enviornmnetal dictatorships have – F.M. Esfandiary (FM-2030), Upwingers

Hello friends! In this post, I will tell you about a model that someone can possibly find an effective instrument of social interaction. And in order to get used to this model, we must first discuss some concepts related to the field of information technology.

The computer software is:
A program (from Greek programma, “a written public notice”) – in computer science, this is a set of instructions intended for execution by a machine. In general, we call a program some application provided with a user interface.
A process – typically, this means a program that lacks any graphical user interface, while repeatedly accessing the physical memory and hardware resources, and performs some operations in the background mode.
An operation system – a computer’s main program that defines the scope and the procedures for running all other programs and processes.

Hereon, we need to consider the following two kinds of operation systems:
A proprietary system (from Medieval Latin proprietarius, “owner of property”) – this is a system developed and distributed by a specific proprietor (e.g., Apple or Microsoft). The source code of a proprietary system is sealed and inaccessible to anyone, except for the proprietor itself.
Image/photoAn open-source system – it is available for public access, does not belong to anyone, has all its source code accessible and open to change.

It is also worth mentioning that there are two levels in an operation system:
The user level – this includes a conventional desktop, end-user applications, the input and output of data via the graphical interface. A user is allowed to install, run and restrict the access to resources for programs to which he or she has access.
The core, kernel (heart) level – this level is unavailable to a user, it typically lacks any visual representation and hosts a multitude of system processes. In proprietary systems, only the owner has access to the core level, while in open-source systems this may be a special user granted with extended authority, named Root. We have almost finished explaining the terminology by now…

So, in proprietary systems, background processes that consume the processor resources and physical memory are called “Services“:

Meanwhile, in the proprietary systems users do not have access to the core services. A user cannot reduce the consumption of resources, release the memory or disable a system service; only the proprietor can gain the access to core services.

Now, in the open-source systems, the background processes that consume the processor resources and the physical memory are called “Daemons“:


If a user of an open-source system knows the Root password (of a super-user), he or she becomes enabled to kill/freeze any daemon, limit its consumption of resources and memory, and even reassemble the core with applying to it the necessary custom settings.

And finally, let’s take a look at an effective model:

Replace the “computer software” at the beginning of this post with “bio-computer software” and read the article anew. Next, try to answer the following questions:

– are you authorized to command the core of your biocomputer?
– is the source-code of your system open, or is it locked by a proprietor behind seven seals?
– how many services/daemons must be attended by your biological hardware every day? Does their actions cost you memory and resources?
– who is the specific proprietor of your services: parents, professors, priests, officers, mates, or somebody else?
– would you like to obtain the Root password enabling you to personally exercise control over your own heart daemons, or would you rather like to continue relying upon the proprietor services?

J.C. Lilly. Programming and Metaprogramming in the Human Biocomputer
R.A. Wilson. Discussion How to Brain-Wash Friends & Robotize People

ODD# V/(a)/1,v;24Afm3180

This post in multilingual blog

Read this post and comment stream on Friendica

disCoredian Leo Tolstoy

The Russian audience was only able to get some more or less detailed information on Crowley’s life when very poor translations of the books The Occult by Colin Wilson and The Black Arts by Richard Cavendish were published in 1994. Wilson’s funny stories and really stupid things concerning Crowley became a real treasure for Russian authors whence everyone could generously scoop out everything he took into his head even not giving himself trouble of making reference to the source. (Professor W. F. Ryan “The Great Beast in Russia”)

To get 666, Aleister E. Crowley wrote his name in Hebrew (Alef-Lamed-Heh-Yod-Samekh-Tete-Heh-Resh-Heh-Kaf-Resh-Ayn-Vav-Lamed-Heh-Yod). Meanwhile, he did not throw out “e”, as Tolstoy has proposed.

Turning out the words l’empereur Napoléon into ciphers on this system, it happens that the sum of these numbers equals 666
, and Napoleon is thereby seen to be the beast prophesied in the Apocalypse. Moreover, working out in the same way the words quarante-deux, that is, the term for which the beast was permitted to continue, the sum of these numbers again equals 666, from which it is deduced that the terms of Napoleon’s power had come in 1812, when the French Emperor reached his forty-second year. This prophecy made a great impression on Pierre. He frequently asked himself what would put an end to the power of the beast, that is, of Napoleon; and he tried by the same system of turning letters into figures, and reckoning them up to find an answer to this question. He wrote down as an answer, l’empereur Alexandre? La nation russe? He reckoned out the figures, but their sum was far more or less than 666. Once he wrote down his own name “Comte Pierre Bezuhov,” but the sum of the figure was far from being right. He changed the spelling, putting s for z, added “de,” added the article “le,” and still could not obtain the desired result. Then it occurred to him that if the answer sought for were to be found in his name, his nationality ought surely to find a place in it too. He tried Le russe Besuhof, and adding up the figure made the sum 671. This was only five too much; the 5 was denoted by the letter “e,” the letter dropped in the article in the expression l’empereur Napoléon. Dropping the “e” in a similar way, though of course incorrectly, Pierre obtained the answer he sought in L’russe Besuhof, the letters of which on that system added up to 666. This discovery greatly excited him. How, by what connection, he was associated with the great event, foretold in the Apocalypse, he could not tell. But he did not for a moment doubt of that connection. His love for Natasha, Antichrist, Napoleon’s invasion, the comet, the number 666, l’empereur Napoléon, and l’russe Besuhof—all he thought were to develop, and come to some crisis together to extricate him from that spellbound, trivial round of Moscow habits, to which he felt himself in bondage, and to lead him to some great achievement and great happiness.

In a recent paper, Witztum, Rips and Rosenberg found a surprising correlation between famous rabbis and their dates of birth and death, as they appear as equidistant letter sequences in the Book of Genesis. We make a smaller or equal number of mistakes, and find the same phenomenon in Tolstoy’s eternal creation “War and Peace”.

ODD# II(b)/4,iii;52Dsc3180

This post in multilingual blog

NSA looks after those interested in Linux and information security – NSA looks after those interested in Linux and information security
To those having some interest in the field of information security all is clear when it comes to proprietary systems by Microsoft and Apple corporations. However, a conventional wisdom is still around telling that the Linux operation system securely protects the personal data of its users from third parties. Aside from the signature SELinux module by the NSA USA that is built into the Linux core, the most of contemporary distributives has proprietary packages built-in, the coded contents of which are anybody’s guess.
In theory, ignoring Slackware and GNU-distributives released more than two years ago (such as Zenwalk), one can suppose that the NSA vulnerabilities that are available in popular Linux repositories (RedHat and Debian at the first place, along with other 90% that are based on these two) continue to emerge on an annoyingly regular basis – more often than they can be identified.
And considering the news warning about the OpenSSL compromises (such as one, two and three) – one can come to the conclusion that embedding backdoors into the source code presently takes the effort of much more people than there are open software enthusiasts monitoring the source code of possibly dangerous packages.
But for those who do not like the idea of being transparent for USA security services there is, at last, a durable solution, provided with a russian-speaking technical support and an audit from russian intelligence services: Mandriva-based ROSA distributives, certified by FSTEC and Russian Ministry of Defence. These distributives have been diligently customized by the application software developers of SNORT, VYATTA and Information Security Systems, as part of a project to create a national software platform prototype. Using the ROSA distributives, you can make yourself and your data unavailable to the American intelligence services.
ODD# III(c)/2,v;39Cfn3180