
8
Es liegt in der menschlichen Natur, vernünftig zu denken und unlogisch zu handeln. (Anatole France) [182]
Die Uridee des Universums als eine sich selbst entfaltende zyklische Unendlichkeit, bietet die Option an sich weiterzuentwickeln, trotz Raum und Zeit Begrenzungen durch ein Auf- und Abtauchen aus der Ewigkeit heraus und in die Ewigkeit hinein. (Ingmar Veeck)(2010) [1479]
Power tends to corrupt, and absolute power corrupts absolutely. (Lord Acton) [5162]
„Time flows like a wave-form river in hyperspace in a grid pattern. When scalar beams charge through hyperspace these ´rivers of time´ get blocked and redirected temporarily. There is a covert plan underfoot to change the way time is expressed on this planet altogether using hyperdimensional physics and Tesla technology, by splicing earth back onto a now defunct Atlantean timeline.“ [5840]
They stripped Marilyn of any contact with the outside world to insure that their mind control would work. They were afraid that something might go wrong with the first Presidential slave that was allowed to be highly visible to the public. (Fritz Springmeier) (1996) [6110]
The price of technological progress: Human experimentation. It may be observed that there is no way to put an end to development and implementation of high-tech in our society. Therefore it is of great importance to keep oneself as informed as possible in the area of new scientific developments. This is especially true when it comes to mind & brain related technologies and advanced military warfare methods. He will continue to be an unwanted part of research and development and a constantly returning issue. (Gina Rydland) [6481]
Wenn die Welt euch hasst, dann wisst, dass sie mich schon vor euch gehasst hat. Wenn ihr von der Welt stammen würdet, würde die Welt euch als ihr Eigentum lieben. Aber weil ihr nicht von der Welt stammt, sondern weil ich euch aus der Welt erwählt habe, darum hasst euch die Welt. (Joh 15, 18 f) [7150]
Wir denken, daß der Mensch, dessen Geist sich mit Gott beschäftigt, heiliger ist als der Mensch, der an Geld denkt, doch sie sind praktisch beide das gleiche; beide wünschen Ergebnisse, beide möchten beschäftigt sein. (Jiddu Krishnamurti) (Vollkommene Freiheit) [15364]
Category Archives: Corporatistic Terror
NWO Neurological-ideological Virus.
The Stealth World Domination Virus is virtual, neurological and ideological.
______________________________________________________________________________
NWO: virtual, neurological and ideological Virus.
„It went pandemic in Christianity.., that particular belief system is an ideological virus planted in the human by an extraterrestrial species. The soft core version… The abrahamic religions are an ideological virus. Now I´ll give you the hardcore version, it´s a neurological virus as well, yes it is, it´s a neurological virus, now, I have made this conclusion based on my investigations using my shamanic methods, okay.. No one on this planet will know ultimately what is happening to destroy humanity unless you have access to supernatural intel. It cannot be understood solely from ordinary state of mind – you have to go in turn on ordinary altered awareness and investigate soberly.. that there is an archontic neurological infection raging on this planet.. How that virus got into the human brain and it is in the human brain. My investigation so far tell me that it is masked by a chemical in the brain called L-Dopa.
It would be detectable, but not easily detectable, because the nature of this virus is very insidious and deceptive it´s a virus that disguises itself.., this virus is the trickster virus my friend. It´s not just a virus, like any other virus… But it´s a virus that is possesssed of a diabolical trickster intelligence and so it disguises itself in the brain. So one could make an analysis of someones brain who had this infection and not see it, because it is masked, it is masked behind L-Dopa.
Toxoplasmosis is a neurological virus which resemble in some, but not all properties, of the archontic infection of the brain.
(John Lamb Lash with Henrik Palmgren)(Jewish Supremacists are Proxies of the Archons)(August 4, 2014)
Stealth System Process Walker Malware Detected: Consent.exe UDP Backdoor
Stealth System Process Walker Malware Detected: Consent.exe – Windows Internal UDP Covert Backdoor.
__________________________________________________________________________
System Process Walker… Bypassing LUA/UAC/Virtualization/Firewalls/AVs/Proxies etc… Windows Fake Security is transforming UAC into a covert communication, control and spy channel. The true reason for preparing the world and all the people to Facebook as a command and control central node of the largest surveillance and remote control base for the agencies and the governments.
TOR or Firewalls aren´t able to prevent governmental spying if „system process walker“ – as I call it, inject itself into consent.exe or any other host or exe process, that may be available. As a rule Firewalls remain quiet and become udp backdoored themselves, no matter which one. Rude multi-layered IP-Filtering may be helfpful, but is no guarantee, because this stealth thing is able to disable virtually all security protection.
The strange thing is, that the Windows Master Key Backdoor (used by governmental agencies or other secret intrusion groups) is able to enter either via Limelight Networks or Akamai Tech Inc.
Consent.exe UDP turns into TCP-Transmission to Facebook Central-Node Akamai Tech Inc. (deploy.xyz Malware). My assumption is – so far – that svchost.exe is backdoored by default, as a master key in all Windows NT 6.x Windows, in that way, that Facebook is able to get remote control via Akamai Tech Inc. (deploy.xyz Malware). Furthermore the Browser is generally UDP-Backdoored (0.0.0.0) (normally invisible) as a primary layer, if the other system backdoors might be closed.
One Example: Microsoft Windows tries several times to connect via Limelight Networks Inc. (This game started already in Windows XP and hasn´t stopped until now…) Some variants use Svchost-Injection (Zombie-Method) to connect via NSA to Facebook (Akamai Inc.) Another Variant from 2008 uses Winlogon-Injection Method to Limelight Inc. Probably all the same Govware
Microsoft, the government or their potential agency contractors use consent.exe as selective Antispy Killer.
Consent.exe as LUA/UAC Backdoor.Exploit with AV-Killer/Antispy-Killer properties…
Comodo is also affected by this stealth UDP leak, which backdoors all cmdagent.exe´s, no matter which version, 8.x, 7.x, 6.x, 5.x, 4.x, 3.x… etc. But this is not directly the Problem of Comodo, either a deliberate system architecture error of Microsoft Windows.
Nobody has written about the system-wide UDP Backdoor in Windows NT 6.x… (especially Windows 7) – then I need to do this… This is an interesting thing, probably the main access method of the NSA and Facebook as a central connection node.
Niemand hat bisher über den systemweiten UDP-Backdoor in Windows NT 6.x geschrieben… (speziell Windows 7) – dann muss ich das tun…. Das ist eine interessante Sache, wahrscheinlich die Hauptzugriffsmethode der NSA und Facebook als Zentralverbindungsknoten.
____________________________________________________________________________________________
Consent.exe is a User Account Control process.
Erscheint manchmal beim windows start im log fenster der firewall events von comodo personal firewall, dannach aber verschwindet der eintrag aus dem log (!!!) und stattdessen taucht scvhost,exe auf.
Wie Ich Bin
It took all 100 percent of my laptop CPU – I couldn’t do anything. Then after about 90 secs it was gone and everything back to normal!
Brad
Similar sightings as above. Noticed browser open in the background (flash upon closing and low level duplicate process concurrently) and checked logs n task monitor continuously. It seems to come and go in 2000sec intevals. The processor spins up on ocassion perhaps lots of udp in the background. Estensive use of placeholders in the URL’s. Specificly I am unsure what it is but t has several charateristics of malware.I am shocked Norton IS didn’t pick it up, That is what baffles me.
Carl
