Showing posts with label microsoft. Show all posts
Showing posts with label microsoft. Show all posts

10/31/2007

Internet Virus Conspiracy

The Grassy Knoll Institute Reveals An Internet Virus Conspiracy

Another wave of Internet virus strains are infecting millions of computers. The previous headline is becoming common place in the computer age in which we live. Billions of dollars and valuable resources are being spent to combat and deter these virus outbreaks. Yet, after one strain is brought under control, another more powerful and destructive one erupts in the electrons of cyberspace forcing an unending vicious cycle of perpetual doom and gloom to consumers and manufacturers alike.

The MYDOOM virus is an excellent example. MYDOOM attacked the vulnerability of Microsoft powered computers through back doors and cracks in the firewalls. The virus sent a denial of service to a specific website effectively shutting down the site. The computers infected with MYDOOM virus were turned into slave drones and forced them to send that website millions of emails that overloaded the server effectively shutting down the site. And this happened to Microsoft, one of the most powerful software companies in the world.

What is my point you ask?
Many think that these virus strains are merely prototypes, tests if you will, on the Internet backbone and are a prelude to a much broader scale of terrorism via the Internet. MYDOOM virus infected millions of computers in just 48 hours. Could it be that each new strain has an added feature to test certain area's of the Internet structure, learning and building a better virus vehicle on the way. Perhaps the next strain will be more powerful and affect more than just one website and deny service to critical business agencies.

Some also believe it is a prelude to the coming of the antichrist. It fits all the criteria set.

The Grassy Knoll Institute will be watching.


LURKING ON THE GRASSY KNOLL

10/11/2007

Is Bill Gates The Anti-Christ

The Grassy Knoll Institute perhaps sheds some light on the anti-Christ.Throughout history, many men and several women, (Hilary Clinton) have been linked to being the Anti-Christ.

The Book of Revelations clearly details how to recognize the Anti-Christ. Let's see if Bill stacks up.....

The anti-Christ will be known and marked with the number of the beast, 666.

Bill Gates full name is William Henry Gates III. If you take the letters in Bill Gates III and then convert them into ASCII computer code, (the American standard code) and add up all the numbers, the sum equals six hundred and sixty six, or...666. Now I believe everyone knows what that number signifies. It is the number of the beast.

Bill has passed the first test. He is known by the mark of the beast, 666.

Adding more evidence: If you convert Microsoft Windows 95 with the same code you wind up with the same number, 666. Want more..... Also MS-DOS 6.31 operating system also adds up to 666. See the pattern here?

The Bible clearly states in the Book of Revelations that the anti-Christ would be someone very powerful that would rise up, add followers by the droves, and lead us all into the beginning to the end of the world.

Let's break this down. First, who has this kind of power? Bill Gates does. More than 85% of all computers in the world today run on either windows or DOS software programs owned by Microsoft and Gates. Even the military and Pentagon computers are running windows.

For argument sake let's say a virus was embedded into every computer program created by Microsoft. Say this virus with the stroke of a single key, can activate itself and cause the military computers of the world to initiate a first strike nuclear event triggering a nuclear world war.

Or a command prompt causing mathematical errors in the banking, stock markets, and financial centers of the world. Panic and riots would erupt. What if Gates could do all this right from his home deep in the secluded and well protected hills of Montana.

Certainly, if this were true, than Gates would possess great power as the Book Of Revelations warned us about. Sound incredulous? Impossible? Well, just remember, by using your Internet explorer browser, owned by Microsoft, which more than likely you are viewing this very page on IE, or are running a Microsoft program, you are allowing it to copy and learn little bits and pieces of information about you and it is put in a vast database. This happens every time you log on.

The second part says that the anti-Christ would rise up and add followers by the droves. Looking at Microsoft, Bill started his company with just a few employees and rose up in a very short time to become the leader in computer software. He is one of the richest men in the world right now. And with money, comes power, and corruption soon to follow. Millions of applications of Microsoft software are being sold every day. An average of 68,000 brand new users log onto the Internet each and every day with most of them running Microsoft software. I would call that adding followers by the droves.

Let's move on. The Bible says that the damned one will force everyone, young and old, small and large, rich and poor, free and slave, to receive a mark on his hand or on his forehead so that no one can buy, sell, and trade in the temple unless he has the mark, which is the mark of the beast or the number of his name.

So, what does this mean? Let's begin with the Internet. Isn't the Internet becoming the preferred practice of doing business? Just about every major business is now connected to the world wide web. Big deal right? So, how do we get the sign of the beast from the net? Notice that the Internet is referred to as the world wide web, or WWW. We begin our search on the Internet by typing in our explorer browser www.anyaddress.com. WWW. Before the English translation, the letter W was written as VI. So, WWW in the past was written VIVIVI. Isn't VI the Roman numeral for 6? VIVIVI is 666 for it is spaced where other numeral symbols would not be added.

The world economy is using the Internet as a linkup to combine and join all businesses world wide. In just a few years, it will become impossible for large corporations to conduct business without a linkup to the Internet. Small businesses will be soon to follow. Again, Microsoft owns most of the operating software and technology for today's business almost to the point of being a monopoly. In fact, Microsoft has been in court for months defending it's strong hold on it's software sales.

OK, OK, you say, yes these things can be all true, but how in the world do you explain the mark of the beast on your hand or forehead? Good question. Ready for the answer? Let's refresh shall we. The Bible says that the mark of the beast will be on one's hand or forehead and will be needed to conduct business.

Aren't we all starting to carry around cell phones? Hold the phone up to your ear to speak. Using it to cancel or add a meeting. Set up an appointment? Schedule an interview? Aren't we all starting to carry laptop computers because all our info is stored on them and it would be impossible to conduct business without it.

Here's the kicker. The mouse and the monitor. Couldn't the mouse be the mark on the hand? After all, without the mouse, the computer is just an expensive paper weight. The monitor, which is forehead high, could be the mark on the forehead. When this was written, man at the time would not have been able to comprehend computers and technology. It would have to be described in a simpler form, like a mark on the hand and forehead.

Are all the pieces of the puzzle starting to fall into place?

We are just now entering the dawn of a new millennium, the third millennium, the number of man.

With all these warnings, the Grassy Knoll Institute wonders why we don't heed the warnings of the Book Of Revelations. It's a very good Book. You should read it sometime. It may just save your soul.

Perhaps....


LURKING ON THE GRASSY KNOLL

10/08/2007

Big brother Is Watching You And Me

The Grassy Knoll Institute knows the story.

The year was supposed to be 1984 when the Government would be all encompassing, all knowing, seeing, and powerful. George Orwell’s book titled 1984 about a future society where the government is watching and in control forcing citizens into conformity has finally come true in the year 2007. The mantra of the book was control and conformity. If the government said 2+2=5, you would not question but accept it.

The personal home computer era began in the early 80′s with the introduction of the Commodore 32 computer which was basically a word processor. Then came the Commodore 64 computer with the advanced floppy disk. The computer at this point was still a glorified word processor and would have to wait patiently for technology to evolve enough before Orwells 1984 vision could be realized.

It wouldn’t be until a trilogy of technology evolved at the same time for Big Brother to begin watching us. The first element was Bill Gates of Microsoft and his revolutionary Windows operating system. The second element was more powerful computers enabling consumers to do more than simply word processing. The third element was of course the world wide web, the Internet.

These three elements allowed people to connect with each other like never before. With these new technologies, the personal computer era took off faster than the CB radio in the 1970′s. Tens of thousands of people were logging in and getting online each and every day. America Online, (AOL) started telling everyone that they had mail. Little did these unsuspecting consumers realize that information was being collected about them every time they turned on their computer. In time, that information built a profile of your internet usage and advertising was tailored to your distinct tastes. At first, you thought it cute and clever how the internet people were able to send you advertising you were interested in.

The evolution. Windows 3.1 turned into Windows 95 that turned into Windows 98 that turned into Windows 2000 and ME that turned into Windows XP, which turned into Vista. Computers powered up going from a 286 chip to a pentium IV powered by a three gig chip with dolby surround sound audio better than most home theater systems, video and DVD. The listening and monitoring devices also evolved and improved but rarely mentioned as the internet controllers kept these little secrets to themselves. Personal and business information was being gathered by the minute with every keystroke made. Life was good, 2+2 did not equal 5 and we could prove it on our computer generated calculators.

This brings us to the present. 2007. Like it or not, every keystroke you make is recorded. Every site you visit is recorded even if you erase your hard drive and cache. Your IP address is your personal thumb print and your surfing habits are being monitored. The fire walls and stealth programs you purchase really don’t work on the governments technology. The pop up ads you once thought were so cute are now so obnoxious that you buy software programs to block them. Still, you get pop up ads. Scumware and spyware install themselves on your computer without your knowledge or permission making it even more easy to spy and collect data on you.

The government is telling us that of 2+2=5 Some citizens are listening. Soon, very soon, the government will have total control. The government already knows what you are thinking, what you are planning to do, what TV programs you watch. They know all your dislikes and likes. They know if you are a good citizen or a bad citizen. The government has the ability to react quickly and put down a rebellion, or force you to pay that errant forgotten parking ticket. They know your innermost private thoughts and who you trust them to.

All your email and instant messaging services are a window to your soul. Privacy will be a thing of the past. Webcams will be the norm in every business, neighborhood, and home watching your every move, actually inviting the government to spy on you.

Big Brother IS watching you and me. Right Now! When we get up in the morning, go to work or school, eat dinner, watch TV, and even while we sleep. New laws are being passed assisting the government in their pursuit of weeding out the so-called bad guys. CAPS II, an airport information gathering network, has already been implemented and is currently scanning passengers and qualifying them as no risk, low risk, or high risk. Microsoft now controls over 95% of the computer software and operating systems. They have powerful stealth capabilities.

Big Brother has many names but they all ask the same question.

How much is 2+2?

LURKING ON THE GRASSY KNOLL