About.
When one practices Magick, fear is abundant at times. Magicians boldly face the fear of unknown, some of them turn insane as well (not only because of fear).
What about Litany, then?
Source is from Frank Herbert's 'Dune' book, but i think it's more than fiction ... these words make sense, and i think these can work well in real life, against real fears.
This litany can be recited when one faces fear, to help one to face the fear with bravery, to help one develop fearlessness.
This litany helped me about 10-12 years ago, when i went through psychological crisis.
English.
Litany against fear.
'I must not fear.
Fear is the mind-killer.
Fear is the little-death that brings total obliteration.
I will face my fear.
I will permit it to pass over me and through me.
And when it has gone past, I will turn the inner eye to see its path.
Where the fear has gone there will be nothing.
Only I will remain.'
Polish.
Litania przeciw strachowi.
'Nie wolno się bać.
Strach zabija duszę.
Strach to mała śmierć, a wielkie unicestwienie.
Stawię mu czoło.
Niech przejdzie po mnie i przeze mnie.
A kiedy przejdzie, odwrócę oko swiej jaźni na jego drogę.
Którędy przeszedł strach, tam nie ma nic ... jestem tylko ja.'
... with a little of a Cat.
Wicca & Witchcraft, Esoterics, Magick, Spirituality, Arts: Martial & Visual, Digital, Computer Tricks, Lifestyle, Philosophy & Entertainment.
... Magick of Candles, Incense & Crystals .... Magick of Moon, of Mind, of TAROT & Sigils ... and more.
Showing posts with label against. Show all posts
Showing posts with label against. Show all posts
Friday, September 1, 2023
Tuesday, December 29, 2015
Data Mining against Terror?
'Data mining, also called knowledge discovery in databases, in computer sciences is the process of discovering interesting and useful patterns and relationships in large volumes of data.
The field combines tools from statistics and artificial intelligence with database management to analyze large digital collections, known as data sets.
Data mining is widely used in business (insurance, banking, retail), science research (astronomy, medicine), and government security (detection of criminals and terrorists).'
> Source: [ Data Mining ].
---
nm108's note: this can be combined with web crawling & nmap vulnerability search & hacking to find evidence against Terror.
The field combines tools from statistics and artificial intelligence with database management to analyze large digital collections, known as data sets.
Data mining is widely used in business (insurance, banking, retail), science research (astronomy, medicine), and government security (detection of criminals and terrorists).'
> Source: [ Data Mining ].
---
nm108's note: this can be combined with web crawling & nmap vulnerability search & hacking to find evidence against Terror.
Tuesday, February 3, 2015
Ancient China's Intelligence Methods against Al-Qaida.
'... even in ancient times China had developed and documented an understanding of intelligence needs & practices for military and diplomatic activities. At that time, information requirements were relatively simple: enemy unit size, weaponry, location, and morale; bibliographical information on enemy commanders; terrain features; and the intentions of neutral and allied forces. In addition, the Tso-Chuan* describes intelligence operations employed not only to collect information but also to deceive the opposition and deny them militarily significiant information...'
* Tso-Chuan: 'Tradition of Tso', one of ancient Chinese battle narratives of the Eastern Chou period (ca. 770-403 B.C.).
-- Quoted, with small edit, from 'Chinese Intelligence Operations' by Nicholas Eftimiades.
How can an independent person with access to the Internet & books use that information to help to protect people against Al-Qaida?
- by preparing a short documents about certain people / roles in Al-Qaida's structure, with quotes & referenced sources,
- perhaps more.
* Tso-Chuan: 'Tradition of Tso', one of ancient Chinese battle narratives of the Eastern Chou period (ca. 770-403 B.C.).
-- Quoted, with small edit, from 'Chinese Intelligence Operations' by Nicholas Eftimiades.
How can an independent person with access to the Internet & books use that information to help to protect people against Al-Qaida?
- by preparing a short documents about certain people / roles in Al-Qaida's structure, with quotes & referenced sources,
- perhaps more.
Subscribe to:
Posts (Atom)