13.10.2012 Views

Monarch-mind-control

Monarch-mind-control

Monarch-mind-control

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

chapter_1<br />

Berkeley UNIX. The UNIX system uses both timesharing and<br />

multitasking.<br />

The <strong>mind</strong> of a <strong>Monarch</strong> slave also does both multitasking and time<br />

sharing. One of the nice UNIX features, is "protected memory", which<br />

is also part of the <strong>Monarch</strong> programming. A kernal is what the UNIX<br />

programmers call a "protected person". It is very similar to the internal<br />

"person" (alter) who helps the <strong>Monarch</strong> slave’s programming<br />

functions.<br />

The big item about UNIX is that it has permissions granted. This is<br />

similar to the <strong>Monarch</strong> programming. Permissions are granted to 3<br />

types of entities. The Top Programmer or "god" as he is called, of the<br />

UNIX System receives what is called the individual permission. The<br />

next permission is called group permission, and it is given to insiders<br />

who work with the system. The final permission type is the world,<br />

which has very limited access. The parallel between this and the<br />

<strong>Monarch</strong> programming is surprising. In some cases the programmers<br />

may have matched things on a one-to-one correspondence.<br />

The <strong>Monarch</strong> program also has a Top Programmer who is called "god"<br />

to the System. He has total <strong>control</strong> over the system. His programming<br />

permissions can not be deprogrammed out by others who might want<br />

to usurp his power.<br />

Hidden from the casual user of the UNIX system are the Daemons and<br />

Demons. The UNIX programmers decided to use the old english<br />

spelling for demon = Daemon. These are computer processes which<br />

work secretly behind the scenes and are given actual demonic<br />

names--some corresponding to actual names of historically known<br />

demons, such as Asmodeus. Asmodeus is also a demon which is<br />

placed into many <strong>Monarch</strong> slaves.<br />

In the UNIX system these demons are treated like persons in the<br />

computer’s user director. Demons in the computer system do not have<br />

to log onto the computer, but they work behind the scenes and are<br />

given the same powers that people users are given. They are set up in<br />

the same structure as how the computer treats people. Permission in<br />

http://mercury.spaceports.com/~persewen/fritz/fritz-ch11-1.html (19 of 32) [7/15/2000 8:09:34 PM]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!