Truth is inspiring, it is guarded by GOD, and will triumph over all opposition!

Electronic Veil


1681725

The things of the temple were shadows of things to come, and they all ultimately point us to Jesus Christ. He was “the veil” to the Holy of Holies, and through His death the faithful now have free access to GOD.

BUT….there is prophetic material within this context! Per usual…this is how GOD relays HIS Plan to HIS children for all to discern.

During the lifetime of Jesus Christ, The Only Son of GOD…the holy temple was the centers of the Jewish religious life. The temple was the earthly dwelling place of GOD’S Presence–Hebrews 9:1-9 tells us in the temple WAS a veil separating The Holy of Holies–from the rest of the temple where people dwelt.

This signified that man was separate from GOD by sin (Isaiah 59:1-2). Only the high priest was permitted to pass beyond this veil once each year (Exodus 30:10; Hebrews 9:7) to enter into GOD’S Presence for all of Israel and make atonement for their sins (Leviticus 16).

Prophetic-We know that in these end days Satan will indeed bring forth a duplicate of this temple and call it his own and demand to be worshiped calling himself, god.

Solomon’s temple was 30 cubits high (1 King 6:2), but Herod had increased the height to 40 cubits, according to the writings of Josephus, a first century Jewish historian. There is uncertainty as to the exact measurement of a cubit, but it is safe to assume that this veil was somewhere near 60 feet high. An early Jewish tradition says that the veil was about four inches thick, but the Bible does not confirm that measurement. The book of Exodus teaches that this thick veil was fashioned from blue, purple and scarlet material and fine twisted linen.

The size and thickness of the veil makes the events occurring at the moment of Jesus’ death on the cross so much more momentous. “And when Jesus had cried out again in a loud voice, he gave up his spirit. At that moment the curtain of the temple was torn in two from top to bottom” (Matthew 27:50-51).

So, what do we make of this? What significance does this torn veil have for us today? Above all, the tearing of the veil at the moment of Jesus’ death dramatically symbolized that His sacrifice, the shedding of His own blood, was a sufficient atonement for sins. It signified that now the way into the Holy of Holies was open for all people, for all time, both Jew and Gentile.

When Jesus died, the veil was torn, and GOD moved out of that place never again to dwell in a temple made with hands.

God was through with that temple and its religious system, and the temple and Jerusalem were left “desolate” (destroyed by the Romans) in A.D. 70, just as Jesus prophesied in Luke 13:35. As long as the temple stood, it signified the continuation of the Old Covenant. Hebrews 9:8-9 refers to the age that was passing away as the new covenant was being established (Hebrews 8:13).

Prophetic-Here we have the CLUE for all man to discern! We DON’T need a man-made temple any longer to access GOD. Mankind will be deceived by this as Satan will test your knowledge. This is why religion is seriously stained with contempt by Satan’s hands.

People don’t see this, at all.

The veil is torn! The only veil (supernatural & natural) we have now is the one which Satan has produced. He’s accomplished this through many avenues, such as:

Church-a building which is soiled with man-made religious rituals and rites.

Technology-this is what I am attempting to reveal through this article.

Revelation 16 (KJV)
14 For they are the spirits of devils, working miracles, which go forth unto the kings of the earth and of the whole world, to gather them to the battle of that great day of God Almighty.

Satan replicates everything of GOD. Therefore just as HIS Son, Jesus Christ will come like a thief in the night; so too do these demons.
They come as saviors…they come as aliens…they come as angels…they come as many things. But they mostly come at night! The dark attracts dark!
When they break the veil, they utilize whatever they can. What is HUGE in our society right now? COMPUTERS/IPHONES/SOCIAL

MEDIA/TECHNOLOGY.
There just may be a veil between us and them! The veil is made of different matter…depending on their act. They use it to come into our reality. To ‘break’ into…to come as a thief.
While the Computer Age has ushered in many advances, it has also opened yet another door through which Lucifer and his minions can enter and corrupt men’s souls.
Reverend Jim Peasboro, author of an upcoming book, The Devil in the Machine. Demons are able to possess anything with a brain, from a chicken to a human being. And today’s thinking machines have enough space on their hard drives to accommodate Satan or his pals. “Any PC built after 1985 has the storage capacity to house an evil spirit,” the minister confirmed.
The Savannah clergyman says he became aware of the problem from counseling churchgoers. “I learned that many members of my congregation became in touch with a dark force whenever they used their computers,” he said. “Decent, happily married family men were drawn irresistibly to pornographic websites and forced to witness unspeakable abominations. “Housewives who had never expressed an impure thought were entering Internet chat rooms and found themselves spewing foul, debasing language they would never use normally.
“One woman wept as she confessed to me, ‘I feel when I’m on the computer as if someone else or something else just takes over.’ ” The minister said he probed one such case, actually logging onto the parishioner’s computer himself. To his surprise, an artificial-intelligence program fired up — without him clicking it on. “The program began talking directly to me, openly mocked me,” he recalls. “It typed out, ‘Preacher, you are a weakling and your God is a damn liar.’ ” Then the device went haywire and started printing out what looked like gobbledygook.
“I later had an expert in dead languages examine the text,” the minister said. “It turned out to be a stream of obscenities written in a 2,800-year-old Mesopotamian dialect!” Since, then, Rev. Peasboro has researched the problem further and uncovered alarming facts.
“I learned most of the youths involved in school shootings like the tragedy at Columbine were computer buffs,” he said. “I have no doubt that computer demons exerted an influence on them.” The minister estimates that one in 10 computers in America now houses some type of evil spirit. Rev. Peasboro advises that if you suspect your computer is possessed, you consult a clergyman or, if the computer is still under warranty, take it in for servicing. He says, “Technicians can replace the hard drive and reinstall the software, getting rid of the wicked spirit permanently.”

electronic_tree_w1

I found this…it makes perfect sense:
Machines
The first computers were machines. Punch cards, vacuum tubes, and big rooms filled with wires. They could do math at high speed, count things, and sort records, but that was about all. A long way from modern computers, eh? That’s because today, computers aren’t machines, they are magic. A modern computer is a magic box filled with ceremonial components that traps in a little evil spirit who is forced to work for you.
That’s Not True!
Yes, its really true. Your computer may resemble an appliance in many ways; You have to plug it in… it is roughly box shaped… and, well, the similarity to the other appliances in your house stops there, doesn’t it? Computers are marketed as machines, and there are many people who base their whole careers around supporting that claim. A machine, however complex it may be, is something that you can break down into its component parts if you are smart enough, until you can actually understand how it works from the ground up. Not so with computers. Many computer experts will claim to understand how computers work, but if you ever ask one to explain it to you, they will probably start telling you something like this:
“The key point to understanding how a computer works is the concept of abstraction, that there are a multitude of layers of functionality that are built upon each other like bricks in a tower. Semiconductors are etched and treated (or “doped”) to form circuits that redirect electrons in specific patterns. These circuits are packaged as ASIC’s and Microprocessors (called “chips”) and interconnected by buses and traces on a PCB (called a motherboard) in order to implement machine code. Then other PCB’s which are designed to comply to some physical interface standard (eg. ATA, AGP, PCI) are inserted into the motherboard, where the Microprocessor can interact with them. These boards are managed by sets of machine code called device drivers (eg. VXD, WDM, SYS) which run in a specially privileged execution mode (e.g. kernel mode, ring 0) designed to allow the OS to manage these. Then as other blocks of machine code called applications and processes run on your system and call the OS API in order to use the system devices, the OS takes turns processing each requests to share devices. When multiple computers are connected across large networks to share processing and data, centralized software components on a server (e.g. COM, RPC, Quake 3) process remote requests. In this way, each layer provides a service to the layer above and below it to make the amazing machine we call the ‘Personal Computer'”
-Anonymous Intel Engineer
See? Obviously, he doesn’t know how a computer works, but his job depends on people believing that he does.
Magic
When you look at your computer honestly, and accept the fact that it is magic, everything becomes easier to understand. It’s no longer necessary to be well educated about your computer. You don’t have to take classes, or buy books, you don’t even have to be computer literate. With the proper attitude, anyone can use, maintain, even repair a computer. Just bear these simple principles in mind:

green abstract computers circuit boards_www.wall321.com_77

The Computer Is Evil
The core of a computer is a small trapped evil spirit (it is no coincidence that UNIX and GNU/Linux processes are called daemons!) This imp is imprisoned in your computer as punishment for something it did in the netherworld. Generally speaking, the more evil the imp is, the faster the computer is. There are also lesser ghosts and hobgoblins that inhabit the expansion cards and peripherals of your computer. These evil spirits are trapped within the hardware of your computer. Take a screwdriver, open up your computer, and take a look at the circuit boards. They are usually green, and are covered with complex patterns of thin copper lines. These are Circuit Runes, written in arcane and ancient languages that describe the magic spells that bind the imps to the chips. Be very careful with circuits. If you scratch off even the tiniest bit of the runes, the spell will be broken, and the imp will escape. Also note the serial and part numbers printed on the boards. These identify exactly what sort of evil spirit it is, in case you ever have to order a replacement from the factory.
[Open the case and fiddle with things]
The Computer Hates You
When you hit the keys on your keyboard or click the mouse, little silver needles jab the imp, and force him to do what you want. Your computer is evil in the first place, and this prodding only makes it more angry. As you use the computer, the imp becomes more and more angry, generating heat. This is why your computer contains one or more cooling fans. Without them, the imp would turn the box into a raging inferno. Frequently, your computer will crash, or lock-up, or lose files, or do any number of little things to annoy you. This is just the imp’s way of rebelling against you. Don’t stand for it! Calling tech support– or worse yet, taking your computer back to the store for repairs will accomplish nothing except running up a big bill. The best way to deal with a troublesome computer is by shouting and swearing at it. Sometimes physical violence will help show it who is boss. Try leaving it unplugged for a long time to starve it, or disconnect the monitor to blind it. Sometimes it is necessary to delete files that are important to it, just to get back at it for deleting your own files. “is this your VMM32.VXD file? Huh? *DELETE* Haha! take that you dirty little imp! That’ll teach you to crash before I save my spreadsheet!”
[It’s either you or him!]
You Are Smarter Than The Computer
Computers aren’t smart, they are just fast. Newer computers aren’t getting any smarter, they are just able to do stupid things at greater speeds. You are a human being, capable of emotions and rational thought. A computer is only capable of floating point math and crude malice. Never miss an opportunity to remind your computer that you are better than it. Remind it (out loud) that it can’t do anything without you controlling it (you can say this to servers too, but they aren’t likely to believe you). When it does something wrong, tell it is stupid. Tell it is slow too, computers hate that most of all. Get a newspaper, and sit in front of it just to show it how you can look up stock quotes without generating an invalid page fault in module explorer.exe
The Future of Computing
Throw away your MS Office 2000 for Dummies book. Throw away your Learning Java book. The future of computing is not in Data Processing, or Programming, or Information Systems, or Computer Science. It’s in Technomancy. Technomancy is the magical art of talking with computers. There are many newly developing fields of technomancy that you can apprentice in to earn big bucks when the false machine-based-culture of the computer world crumbles
Fenestredigitation
Fenestredigitation, the art practiced by Fenestredigitators (or MS Illusionists) is the art of making Windows install on a PC. A skilled Fenestredigitator can start with an unformatted hard drive and transform it into a colorful GUI in less than an hour, and for an encore, reinstall it over and over again half a dozen more times trying to get networking set up.
[Hocus-pocus!]

blue_electronic_board-1024x768

Open Sourcery
Open Sourcery is the new magical approach to software design that is replacing the old machine-minded methods. Basically, it works like this; Someone sets up a CVS repository and a bug tracking system, and a mailing list, and most importantly a website to state the goals and status of the project. Then as many Open Sourcerers as possible start arguing about what the software should actually do (positive energy), and complaining that it isn’t being done fast enough (negative energy). Eventually, the software will write itself, and will continue to evolve itself gradually until it reaches the stage of maturity know to Open Sourcerers as Alpha (which is Latin for “Done”). Occasionally a piece of software will continue to grow beyond the alpha stage until it becomes Beta (which is Latin for “I’m bored, lets do something else”)
Voodoo Debugging
Both hardware support and software testing can benefit from the skill of Voodoo Debugging. It’s very simple. When a problem arises, start changing things randomly. Occasionally re-test the problem, and as soon as it goes away, the last thing you changed becomes the cure. Repeat the last fix on every computer you can find, including and especially ones that never had the problem in the first place. This magic can be aided by chanting such mantras as “I always change this setting in the BIOS and it seems to help”
Malware Exorcism
We have already learned that computers are evil. What happens when you combine an evil computer with an evil programmer? Very evil software. Viruses, spam, denial of service, trojans, phishing, spyware, steath adware, these are the abominable names of the unholy legions of Malware which assail the world of computer magic. There is plenty of demand for technomancers skilled in the art of performing exorcisms to bind and banish malevolent malware from a possessed computer. Signs for recognizing a possessed computer include: very slow internet access, excessive pop-up advertisements, programs that suddenly appear without being installed, programs that refuse to be uninstalled, sudden changes of browser start-page, and green pea-soup spewing from the drive bays. Excorcism is difficult, because the tame imp that controls your computer may have already been killed by the malware, or your own attempts to purge the malware may be overly effective, and kill off the computer’s native demons. But is that really so bad?

image-712

How To Kill A Computer
We all know you can kill a Vampire with a wooden stake, or a Werewolf with a silver bullet, but how do you kill a computer? Computers are malevolent presences of evil, and the fact that we have domesticated them and locked them in pretty white (grey, black, fruity-translucent) boxes doesn’t change that fact. What if your computer goes berserk? Are you prepared to defend your home and family against it? Could you protect your employees if the company server started stomping on them, or sucking their blood? It’s not something many of us have contingency plans for, but believe me, your insurance carrier isn’t going to cover it.
Weapons
It’s important to arm yourself with weapons when you go to confront a computer that might have to be “put down”. There are many available, but here are a few of my favorites:
FDISK:
FDISK is a powerful weapon that you probably already have. Versions of it are included with DOS, Windows, and GNU/Linux. FDISK is like a double-edged sword. It can cut the heart right out of a computer’s hard drive, or can be used with surgical precision to lop of partitions as a warning, but be careful with it, because you can hurt yourself with it too, if your computer happened to have any files you cared about inside its belly. To learn more about safely wielding FDISK to intimidate, wound, or even kill your computer, just visit http://www.fdisk.com/fdisk/
CMOS and BIOS:
The CMOS setup, also known as the BIOS is an important weak-spot of your computer. If you know how to get past your computers defenses and into the soft underbelly that is the BIOS, you will never need to spend another sleepless night cowering under the bed in fear of your computer. The real trick to the BIOS is getting in. When your computer is booting, try pressing DEL or F1 or F10. Different computers have different magic keys you must press to open them up to attack. Once you are inside, you have your computer by the nostrils, metaphorically speaking. Try to tell it it has hardware it doesn’t really have, or deny that real hardware is there. See a number? Try changing it! Careful abuse of the BIOS can not just wound, not just kill, but even in some causes cause your computer to catch fire
Physical Weapons:
But of course, why take on the computer on its own turf, when you can do things on your own terms. Screwdrivers, claw-hammers, baseball bats, chainsaws, the possibilities are endless. With the exception of some over-powered CD-trays, most computers don’t have the ability to hit back. Be creative. Gasoline, cordless drills, second-story windows. The possibilities are endless.
source

a border or frame composed of green electronic circuit tracks and pathways

a border or frame composed of green electronic circuit tracks and pathways

So they are piercing the veil…and this reminds me of the CERN issues. This is a great illusion put on by the elite. It’s nothing more than a machine to create portals. Much like the days of Nimrod when they sought to reach the heavens…the same is happening today.

Matthew 24 (KJV)
43 But know this, that if the goodman of the house had known in what watch the thief would come, he would have watched, and would not have suffered his house to be broken up.

This illusion is grand, like none other. Even the elect will believe it.

Matthew 24 (KJV)
24 For there shall arise false Christs, and false prophets, and shall shew great signs and wonders; insomuch that, if it were possible, they shall deceive the very elect.

When we sin, does it thin the veil for these demons to be able to see us? Only for them to be attracted to us, and interact in our lives? YES.

Electronic Information rotation Wallpaper HD 2560x1440

Telepathic powers allow them to read our thoughts. They call upon you…to take heed and follow their lead. But, we must take control of our minds. The battlefield begins in the mind. they don’t speak, as we do. they communicate telepathically. And because of this, they speak into our minds. We have the brain, and then the mind…two separate species. I believe the mind holds the consciousness and our spirit.

Philippians-4

Pay attention in the coming months…a combining of like minds is taking place.
“The world will have a religion of some kind, even though it should fly for it to the intellectual whoredom of Spiritualism.” — TYNDALL: Fragments of Science.
“But first on earth as vampires sent…
Thy corpse shall from its tomb be rent. . . .
And suck the blood of all thy race.” — LORD BYRON: Giaour. WE are now approaching the hallowed precincts of that Janus-god — the molecular Tyndall. Let us enter them barefoot. As we pass the sacred adyta of the temple of learning, we are nearing the blazing sun of the Huxleyocentric system. Let us cast down our eyes, lest we be blinded.
These gnostics know these entities are evil.
Impassible chasm to keep us from returning after we die? So what is left here, in the spirit world? The DEAD…demons.
Luke 16 (KJV)
26 And beside all this, between us and you there is a great gulf fixed: so that they which would pass from hence to you cannot; neither can they pass to us, that would come from thence.

march282011philippians4-6-7

Here the spiritual things are represented, in a description of the different state of good and bad, in this world and in the other. A chasm…an abyss between GOD and us…and these entities use this chasm.
According to R. Johanan, a wall; according to other teachers, a palm-breadth, or only a finger-breadth” (‘Midrash on Koheleth’). What, asks the awestruck reader, is this dreadful chasm? why is it impassable? will it be for ever there? will no ages of sorrow, no tears, no bitter heartfelt repentance succeed in throwing a bridge across it? Many have written here, and kindly souls have tried to answer the stern question with the gentle, loving reply which their souls so longed to hear. What is impossible to the limitless love of God? Nothing, wistfully says the heart. But, when interrogated closely, the parable and, indeed, all the Master’s teaching on this point preserves a silence complete, impenetrable.
But, I dare say…it is penetrable. It is not a chasm or gulf which separates the two regions of Hell?, (like the Gnostics speak of)….it is the dimension between GOD and us.

ConCERNed:

In 1989, the internet was birthed! W3…

Im Berners-Lee, a Brithish scientist at CERN, invented the WWW.

The World Wide Web (WWW)…some say equals “666”. I dunno. But, what I do know is CERN is up to no good!

Why would a foundations such as CERN let this kind of invention come to the public? Well, first I heard that only the military was able to access it…which makes sense. In 1993, CERN put the World Wide Web software in the public domain.

CERN is the European Organization for Nuclear Research…

ITS AN EYEBALL!

In its description, it says…it’s about the size of the dome of Saint Peter’s in Rome!

THE BIRTH OF THE WEB

https://home.cern/topics/birth-web

Strange how they use the Vatican as an example, considering they are attempting to bridge the stargates…or open portals to other dimensions. Who are they? The elite…the Illuminati.

I believe they are controlled by the same people with the same goals.

Heart

And we are a machine, of sorts. And these entities can and do enter our current technology to expedite their travels…into us!

Jesus Christ is The Only Son of GOD. Jesus Christ is The Only Path to GOD.

1onenamegraphic

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s