A painful lesson of a linux quibble
It has been longly debated that there is not a liable way to do undelete on linux file system.
Only for this, extundelete has provided a workaround.
However, mainly the need of undelete comes from the over-powerful command “rm”.
Suppose any user committed “rm -rf /*” or “cd /; rm -rf *”, the command will plow the entire file system, entering all subdirectories with d??????r?x permission, looking for all folders with d??????rwx permission, and remove all files inside, no matter who is the owner and what the permission of the files have.
Why? Why my files has been set of no others privilege, say -rw——, and it is still deleted by somebody I had never know who he is, even if he wasn’t able to see a word in the file?
Because linux manages file system in such a way that the entry of a file is a record in the directory file, so that if somebody gained writing access of a directory, he is allowed to create and remove files in the directory, despite the permission of the file itself.
Then why there isn’t an access control bit on the file itself to control its right of being deleted? The well-known quibble about this is that, “as long as you assign others the writing privilege of a file, he can always zero off your file, which is equivalent to deleteing the file. So what’s the point of having a deletion control bit?”
This is erronous both technically and mentally.
Technically, the writing privilege is controlled by the “w” access control bit of the file. However, the deletion privilege is controlled by the access bit of the directory it stays. So, even if you have removed the writing privilege of the file itself, as long as the others writing privilege is still granted on the directory it resides, it can still be removed by anonymous.
Mentally, a erronously carried out “rm -rf .” is a very common human mistake on boring computer works. However, to systematically zero off all files that can be modified, you will have to make a script to do such a thing, like
#!/usr/bin/perl
find(\&wanted, “\.”);
sub wanted { system “echo \ \ > $_”; }
Everybody that gained access of linux will have to learn “rm -rf”. How many people a skilled enough to program a script to zero off files? “rm” is needed in routine normal operation, however, only jerks would systematically zero off files.
This is to say, without a self controlled access control bit on a file itself to help keeping its precense, a file is exposed to not-malicious human error. With a self controlled access control bit, although even when it is off (by default), “rm -rf” committed by yourself can still eliminate the file, it will be strong enough to withstand the attack of “rm -rf” issued by others. This does not make too much difference to single user linux system like MAC or desktop linux. However, this is very critical to multiuser linux platform, especially when there are plenty linxu newbie users.
Currently there is no workaround on this problem. Selinux cannot distinguish one legal user from another. Sticky bit restricts others while also restricts self. Manipulating rm command will disrupt system operation of removing temporary files. Aliasing of “rm” does not stop users of using “/bin/rm”.
There are a few things you may want to do to safe guard your data at this point:
1) If you do not want to expose anything to others, please do:
cd ~; chmod 700 ..
This will make your files only visible to yourself, and be free of any random deletion;
2) If you do need to have a group people to access your files, please do
cd ~; chmod 750 ..
This will make your home directory visible by the users list to your group.
Then you may want to have a few folders like:
chmod 755 public; chmod 750 group; chmod 700 private
so that you categorize your files by the privilege of others. The things in group and private folders will be free of anonymous deletion, and the things in public is vunerable and you’d better have a backup of it in your private folder.
If you do not want to change your current directory structure, please run
find . -type d -perm /002
This will give you a list of folders that is vunerable to guest deletion attack. You may want to take action on them, either
chmod o-rwx folder_name
to close them, or
chmod -R o-w folder_name
to keep others from creating and deleting files in there.
[Samba] how to list computers that are joined to the domain?
This will get you workstation a domain trust accounts:
pdbedit -L -w | grep ‘\[[WI]’
OEIS A181980: Least positive integer m > 1 such that 1 – m^k + m^(2k) – m^(3k) + m^(4k) is prime, where k = A003592(n)
The sequence:
2, 4, 2, 6, 2, 20, 20, 26, 25, 10,
14, 5, 373, 4, 65, 232, 56, 2, 521, 911,
1156, 1619, 647, 511, 34, 2336, 2123, 1274, 2866, 951,
2199, 1353, 4965, 7396, 13513, 3692, 14103, 32275, 2257, 86,
3928, 2779, 18781, 85835, 820, 16647, 2468, 26677, 1172, 38361,
40842,
1-m^k+m^(2*k)-m^(3^k)+m^(4*k) equals Phi(10*k,m), or Phi(10, m^k).
Proofing status:
a(1)=Phi[10,2^1]: 2 digits, p^2-1 factored prime.
a(2)=Phi[10,4^2]: 5 digits, p^2-1 factored prime.
a(3)=Phi[10,2^4]: 5 digits, Equals to a(2)
a(4)=Phi[10,6^5]: 16 digits, p^2-1 factored prime.
a(5)=Phi[10,2^8]: 10 digits, p^2-1 factored prime.
a(6)=Phi[10,20^10]: 53 digits, OpenPFGW 129.07% proof without helper factorization.
a(7)=Phi[10,20^16]: 84 digits, OpenPFGW 131.88% proof without helper factorization.
a(8)=Phi[10,26^20]: 114 digits, OpenPFGW 143.88% proof without helper factorization.
a(9)=Phi[10,25^25]: 140 digits, OpenPFGW 131.03% proof without helper factorization.
a(10)=Phi[10,10^32]: 128 digits, OpenPFGW 124.71% proof without helper factorization.
a(11)=Phi[10,14^40]: 184 digits, OpenPFGW 142.53% proof without helper factorization.
a(12)=Phi[10,5^50]: 140 digits, Equals to a(9).
a(13)=Phi[10,373^64]: 494 digits, OpenPFGW 162.51% proof with factored part 53.73%.
a(14)=Phi[10,4^80]: 193 digits, OpenPFGW 301.25% proof with factored part 100.00%.
a(15)=Phi[10,65^100]: 544 digits, OpenPFGW 182.06% proof with factored part 60.38%.
a(16)=Phi[10,232^125]: 888 digits, OpenPFGW with factored part 41.45% and helper 0.56% (124.92% proof).
a(17)=Phi[10,56^128]: 896 digits, OpenPFGW with factored part 38.45% and helper 0.50% (115.94% proof).
a(18)=Phi[10,2^160]: 193 digits, Equals to a(14).
a(19)=Phi[10,521^200]: 2,174 digits, OpenPFGW with factored part 44.38% and helper 0.54% (133.68% proof).
a(20)=Phi[10,911^250]: 2,960 digits, OpenPFGW with factored part 33.79% and helper 0.01% (101.38% proof).
a(21)=Phi[10,1156^256]: 3,137 digits, CHG proof with factored part 28.90%.
a(22)=Phi[10,1619^320]: 4,108 digits, OpenPFGW with factored part 33.29% and helper 0.14% (100.04% proof).
a(23)=Phi[10,647^400]: 4,498 digits, OpenPFGW with factored part 38.43% and helper 0.15% (115.44% proof).
a(24)=Phi[10,511^500]: 5,417 digits, OpenPFGW with factored part 33.70% and helper 0.07% (101.17% proof).
a(25)=Phi[10,34^512]: 3,137 digits, Equals to a(21)
a(26)=Phi[10,2336^625]: 8,422 digits, kp proof with factored part 30.78%.
a(27)=Phi[10,2123^640]: 8,517 digits, OpenPFGW with factored part 40.68% and helper 0.06% (122.09% proof).
a(28)=Phi[10,1274^800]: 9,937 digits, kp proof with factored part 31.61%.
a(29)=Phi[10,2866^1000]: 13,830 digits, CHG proof with factored part 27.77%.
a(30)=Phi[10,951^1024]: 12,199 digits, CHG proof with factored part 26.95%.
a(31)=Phi[10,2199^1250]: 16,712 digit, CHG proof with factored part 27.09%.
a(32)=Phi[10,1353^1280]: 16,033 digits, CHG proof with factored part 28.05%.
a(33)=Phi[10,4965^1600]: 23,654 digits, CHG proof with factored part 29.10%.
a(34)=Phi[10,7396^2000]: 30,952 digits, CHG proof with factored part 28.58%.
*a(35)=Phi[10,13513^2048]: 33,840 digits, PRP with factored part 26.13%.
a(36)=Phi[10,3692^2500]: 35,673 digits, CHG proof with factored part 27.69%.
a(37)=Phi[10,14103^2560]: 42,489 digits, CHG proof factored part 26.40% (chgcertd Type error).
*a(38)=Phi[10,32275^3123]: 56,361 digits, PRP with factored part 25.84%.
a(39)=Phi[10,2257^3200]: 42,926 digits, CHG proof with factored part 27.90%.
a(40)=Phi[10,86^4000]: 30,952 digits, kp proof with factored part 30.02%.
a(41)=Phi[10,3928^4096]: 58,887 digits, CHG proof factored part 27.04%.
a(42)=Phi[10,2779^5000]: 68,878 digits, CHG proof with factored part 26.69%.
*a(43)=Phi[10,18781^5120]: 87,526 digits, PRP with factored part 26.34%.
*a(44)=Phi[10,85835^6250]: 123,342 digits, PRP with factored part 25.84%.
a(45)=Phi[10,820^6400]: 74,594 digits, CHG proof with factored part 27.12%.
*a(46)=Phi[10,16647^8000]: 135,083 digits, PRP with factored part 26.07%.
*a(47)=Phi[10,2468^8192]: 111,161 digits, PRP with factored part 25.28%.
a(48)=Phi[10,26677^10000]: 177,046 digits, CHG proof with factored part 27.16%.
*a(49)=Phi[10,1172^10240]: 125,704 digits, PRP with factored part 25.45%.
*a(50)=Phi[10,38361^12500]: 229,195 digits, PRP with factored part 25.32%.
a(51)=Phi[10,40842^12800]: 236,089 digits, CHG proof with factored part 28.14%.
Note: Phi[10,4^2]=Phi[10,2^4] since 4=2^2
Note: Phi[10,25^25]=Phi[10,5^50] since 25=5^2
Note: Phi[10,4^80]=Phi[10,2^160] since 4=2^2
Note: Phi[10,1156^256]=Phi[10,34^512] since 1156=34^2
Note: Phi[10,7396^2000]=Phi[10,86^4000] since 7396=86^2
a(1)=Phi[10, 2^1]=11
a(2)=Phi[10,4^2]=61681
a(3)=Phi[10,2^4]=61681
a(4)=Phi[10,6^5]=3655688315536801
OpenPFGW proof:
$./pfgw -tc -q”1-6^5+6^(2*5)-6^(3*5)+6^(4*5)”
Primality testing 1-6^5+6^(2*5)-6^(3*5)+6^(4*5) [N-1/N+1, Brillhart-Lehmer-Selfridge]
Running N-1 test using base 7
Running N-1 test using base 13
Running N-1 test using base 17
Running N+1 test using discriminant 23, base 2+sqrt(23)
Running N+1 test using discriminant 23, base 3+sqrt(23)
Calling N+1 BLS with factored part 100.00% and helper 100.00% (403.92% proof)
1-6^5+6^(2*5)-6^(3*5)+6^(4*5) is prime! (0.0193s+0.0004s)
a(5)=Phi[10,2^8]=4278255361
a(6)=Phi[10,20^10]=10995116277758926258176000104857599999989760000000001
OpenPFGW proof:
$ ./pfgw -tc -q”1-20^10+20^(2*10)-20^(3*10)+20^(4*10)”
PFGW Version 3.3.4.20100405.x86_Stable [GWNUM 25.14]
Primality testing 1-20^10+20^(2*10)-20^(3*10)+20^(4*10) [N-1/N+1, Brillhart-Lehmer-Selfridge]
Running N-1 test using base 17
Running N-1 test using base 23
Running N-1 test using base 37
Running N+1 test using discriminant 43, base 3+sqrt(43)
Calling N-1 BLS with factored part 40.12% and helper 8.72% (129.07% proof)
1-20^10+20^(2*10)-20^(3*10)+20^(4*10) is prime! (0.0086s+0.0006s)
a(7)=Phi[10,20^16]=18446744073709551615971852502328934400000\
0429496729599999999999344640000000000000001
OpenPFGW proof:
$ ./pfgw -tc -q”1-20^16+20^(2*16)-20^(3*16)+20^(4*16)”
PFGW Version 3.3.4.20100405.x86_Stable [GWNUM 25.14]
Primality testing 1-20^16+20^(2*16)-20^(3*16)+20^(4*16) [N-1/N+1, Brillhart-Lehmer-Selfridge]
Running N-1 test using base 29
Running N+1 test using discriminant 37, base 15+sqrt(37)
Calling N-1 BLS with factored part 42.03% and helper 5.07% (131.88% proof)
1-20^16+20^(2*16)-20^(3*16)+20^(4*16) is prime! (0.0102s+0.0006s)
a(8)=Phi[10,26^20]=157713125193403080417654809073419921485591\
4988749414250433529072806660344375821341361193668309978857119\
00082176001
OpenPFGW proof:
$ ./pfgw -tc GGF_n5_20
PFGW Version 3.3.4.20100405.x86_Stable [GWNUM 25.14]
Primality testing 1-26^20+26^(2*20)-26^(3*20)+26^(4*20) [N-1/N+1, Brillhart-Lehmer-Selfridge]
Running N-1 test using base 17
Running N-1 test using base 23
Running N+1 test using discriminant 43, base 3+sqrt(43)
Calling N-1 BLS with factored part 47.34% and helper 1.33% (143.88% proof)
1-26^20+26^(2*20)-26^(3*20)+26^(4*20) is prime! (0.0178s+0.0004s)
a(9)=Phi[10,25^25]=6223015277861141707144064053780124170525328\
95248031358691463745029389305888319156836996164700086470525363\
32466843305155634880065917968750001
OpenPFGW proof:
$ ./pfgw -tc GGF_n5_25
PFGW Version 3.3.4.20100405.x86_Stable [GWNUM 25.14]
Primality testing 1-25^25+25^(2*25)-25^(3*25)+25^(4*25) [N-1/N+1, Brillhart-Lehmer-Selfridge]
Running N-1 test using base 13
Running N+1 test using discriminant 19, base 6+sqrt(19)
Calling N-1 BLS with factored part 43.53% and helper 0.22% (131.03% proof)
1-25^25+25^(2*25)-25^(3*25)+25^(4*25) is prime! (0.0191s+0.0004s)
a(10)=Phi[10,10^32]=9999999999999999999999999999999900000000000\
000000000000000000000999999999999999999999999999999990000000000\
0000000000000000000001
OpenPFGW proof:
$ ./pfgw -tc GGF_n5_32
PFGW Version 3.3.4.20100405.x86_Stable [GWNUM 25.14]
Primality testing 1-10^32+10^(2*32)-10^(3*32)+10^(4*32) [N-1/N+1, Brillhart-Lehmer-Selfridge]
Running N-1 test using base 29
Running N-1 test using base 31
Running N-1 test using base 41
Running N+1 test using discriminant 53, base 13+sqrt(53)
Calling N-1 BLS with factored part 40.94% and helper 1.88% (124.71% proof)
1-10^32+10^(2*32)-10^(3*32)+10^(4*32) is prime! (0.0205s+0.0004s)
Using OpenVPN to export NFS in private network
1. Follow instruction in http://fedoraproject.org/wiki/Openvpn to set up OpenVPN server on the gateway node of your private network, and OpenVPN client on your external nodes that need to access the NFS server inside the private network behind your OpenVPN server node;
2. Start the OpenVPN server and clients, in each client nodes, add custom route to route the private network behind the OpenVPN server to device tun+;
3. Modify the iptables of the OpenVPN server to masquerade the private network to the device that your external nodes are going to connect to, start the iptables service;
4. Export the file system that you want the external nodes see in /etc/exports to the VPN network, exportfs -r and start NFS service;
5. On the external nodes, make corresponding mount points and /etc/fstab entries, and mount the NFS volumes.
This also works for communicating between the internal nodes of multiple private networks.
美式自由民主将终结
美国2012年度《国防授权法》已经分别由美国国会众参两院通过。该法案经众参两院协调后将提交给奥巴马。一旦奥巴马签字,该法案生效,美国公民的人身和民主权利将被严重侵犯。该法案的实质是在法律上颠覆了美国资产阶级宪政民主制度,并为美国在未来演变为一个独裁专制的警察国家奠定了法律基础。
美国2012年度《国防授权法》,一旦经总统签字生效,实际上就是敲响了我们的宪政共和国的丧钟,同时标志着美国开始成为一个在法律上明文规定的警察国家。众议院和参议院已经分别在今年5月26日和12月1日通过了该法案。现在,巴拉克•奥巴马,作为一个宪法问题专家,将做出最后的决定。奥巴马将决定,他自己在哈佛大学曾经学习和研究的《人权法案》,是否将被他亲自签字生效的法案所推翻。(译注:美国法律中所说的《人权法案》指的是美国宪法中关于保护公民人身和政治权利的条款,即美国宪法第一至第十修正案)
《国防授权法》的第1031条和第1032条规定,只要总统认为必要,政府就可以无限期地拘禁美国公民,而不再需要经过指控和审判。根据该法案,联邦政府官员只要基于怀疑就可以拘捕任何美国公民,而不再需要向任何法官出示证据并取得拘捕许可。政府不需要提供任何证据,即可以中止任何一个美国公民的宪法权利。怀疑的理由可以是某人曾经在过去和现在参加过某“可疑组织”。如果政府官员认为某人对“国家安全”构成威胁,那么他们实际上将拥有不受约束的权力可以任意地对一个守法公民实施逮捕、审讯和无限期羁押。该法案并且授权美国的陆海空三军可以在全球任何地方根据“国家安全”需要拘捕任何美国公民,而不需要经过法律上的正当程序。
该法案一旦生效,被破坏的将不仅仅是美国宪法,而且是整个西方近代的司法传统。文明世界法律的最基本的观念,就是不经指控不可以任意拘捕人民,不经审讯不可以无限期地羁押被拘捕人。这些原则可以追溯到希腊罗马时代,自1215年英国《大宪章》以后在英国普通法传统下得到进一步发展,在十八世纪的启蒙时代得到进一步推广。美国宪法以及《人权法案》就是为了实践这些原则,并因而成为美国至高无上的法律。
在美国宪法产生以后的两个世纪的时间里,正是因为《独立宣言》和美国宪法赋予了美国人民不可剥夺的自由权利,美国才得到了全世界人民的景仰。然而,自从九一一事件以来,我们国家似乎受到了如此巨大的威胁,以至于我们国家的领导人情愿废弃我们共和国赖以奠基的所有不可剥夺的权利。我们不得不扪心自问,我们是否还要作为一个民主国家继续存在下去,是否还要为实现一切人的自由和正义而开疆辟土;或者,我们情愿成为一个军警国家,一个民主制度已经被银行家的腐败和军国主义侵蚀殆尽的国家。就像古希腊的斯巴达人那样,时时生活在战争的紧急状态之中?
早在九一一事件刚刚发生的头一个星期,美国国会就通过了《武装力量动用法》,允许美国政府动用美国的一切军事力量打击“恐怖主义”。一个月后,即 2001年10月26日,国会以压倒多数通过了《爱国者法》。根据该法案,联邦政府官员可以以某公民参与了“不良组织”为理由对该公民实施起诉。这严重违反了美国宪法第一修正案关于公民有自由结社权利的规定。《爱国者法》授权政府无限期拘禁“恐怖主义”嫌疑犯,这又违反了宪法第四修正案禁止政府在没有理由的情况下搜查和拘捕公民的规定。
《爱国者法》授权政府可以不需要法官监督和许可,即可在任何时间获取任何公民的个人资料、金融交易资料和医疗资料,从而实际上可以不受任何约束地监视任何人。并且,政府在正常法律程序以外获得的证据,可以不必呈交给被告人的辩护律师。这就在实际上取缔了宪法第十四修正案关于保护公民隐私权的规定。《爱国者法》还规定,如果公民试图“通过胁迫和强迫”影响民众,则该公民的行为构成“国内恐怖主义”。按照此项规定,联邦政府完全可以将占领华尔街运动定义为“国内恐怖主义”,并且在没有法官监督的情况下,在宪法所规定的正当程序以外,以对付恐怖主义的办法来对付占领华尔街运动。
在《爱国者法》通过两个星期以后,即2001年11月13日,布什总统发布一号军事命令,授权美国行政部门和陆海空三军可以在全球任何地方对涉嫌恐怖主义活动的非美国公民实施抓捕、绑架和羁押。这项命令规定,美国行政部门和陆海空三军在实施以上步骤时,不需要任何证据。如果要对被抓捕者实施审判,则审判机关为军事法庭,而不是民事法庭;为了获得证据,可以对被抓捕者使用刑讯逼供。一旦被定罪,罪犯将无权上诉。
一年后,2002年11月25日,美国国会又通过了《国土安全法》。该法将美国境内外的所有情报组织统一为一个在总统领导下的情报网络。根据该法,美国情报机关拥有完全的自由可以收集美国境内任何人的任何信息,并且可以与盟国合作以收集世界上任何地方任何人的任何信息。这就取消了美国在国内的和国外的情报部门之间传统上的区别。
2006年10月17日,国会又通过了《军事委任法》。该法实际上取消了国内外嫌犯的人身保护权利,即必须限时将被拘留人送交法院处理,而不得未经指控对嫌犯实施无限期羁押。根据该法,“任何人,如果帮助、教唆、劝导、指挥或努力于”为美国政府所认定的恐怖主义组织提供实际帮助,“均在被惩处之列”。
同日,国会还通过了2007年度《国防授权法》。该法修改了1807年《起义法》和1878年《民团法》。《起义法》和《民团法》禁止美国政府在美国境内使用军队采取针对美国公民的行动。根据2007年度《国防授权法》,不仅美国政府为了反恐目的可以采取针对美国公民的任何行动,而且还授权军队在美国境内为了反恐的目的实施作战行动。
所有这一切与2012年度的《国防授权法》一起,共同完成了美国由民主共和国变形为一个军警国家的不流血政变。2012年《国防授权法》,是在埋葬宪法的棺材盖完全合上以前敲上的最后一颗钉子。整个美国从此变成了一个大战场。在这个战场中,美国政府和军队可以针对任何人–不管这个人在世界上的什么地方,也不管这个人是平民还是敌方战斗人员–做他们想做的一切,而不受任何司法监督,也不受任何宪法约束。一旦《国防授权法》生效,《人权法案》将不再保护美国公民不受政府的侵犯,宪法也将不再是美国至高无上的法律。
Found Generalized Repunit Prime
(151492^7351-1)/151491
cert is at http://bitc.bme.emory.edu/~lzhou//prime_certs/GR_151492_7351.tgz
The Ten Steps of Karl Marx Implementation in America
THE TEN STEPS OF KARL MARX (With my comments interspersed). Taken from the Communist Manifesto
1) Abolition of property in land and application of all rents of land to public purposes.
We already have this in America. Through property taxes we have been made serfs on our own land. Through tyrannical zoning laws, wetlands regulations, EPA regulations, etc., we no longer control our lands. Our once strong private property rights have been abolished through regulatory oppression, bureaucratic tyranny of taxation.
2) A heavy progressive or graduated income tax.
We already have this in America. The higher your income, the higher the tax bracket you are placed in for purposes of calculating your tax bill. Why do liberals pretend to want to tax the wealthy more? Because it advances their program for fomenting class envy and class warfare. Divide and conquer, that is the strategy of the communist liberals who are wrecking America with ever higher taxes and increasingly bigger government.
3) Abolition of all right of inheritance.
We already have this in America. The inheritance taxes are astronomically high. Liberals want to destroy the family because strong families do not need socialism or government give away programs. Liberals want to destroy the ability of strong families to perpetuate the influence of their progeny by stealing half of their net worth through the imposition of confiscatory inheritance tax rates.
4) Confiscation of the property of emigrants and rebels.
We already have this in America. You have heard about “FORFEITURE LAWS.” Many branches of local, state and federal law enforcement agencies and regulatory agencies are confiscating property, goods and money without a trial, without due process, etc. This is a perfect tool for the tyrant bureaucrat who wants to make your life hell. If you are not “Politically Correct” liberals will use these laws to harass you and confiscate your property.
5) Centralization of credit in the hands of the State, by means of a national bank with State capital and an exclusive monopoly.
We already have this in America. It is called the Federal Reserve Bank. This is the single deadly and damaging of the 10 Planks of Karl Marx’s Communist Manifesto. The counterfeit paper debt based monetary scheme that we now suffer is going to destroy our Republic, our liberty and our economy. The Federal Reserve System is an exclusive monopoly. The Federal Reserve is not a branch of the Federal Government and it does not have any reserves of Gold or Silver coin backing their “Federal Reserve Notes.” Federal Reserve Notes are counterfeit Money, fiat money. The Federal Reserve controls our economy through it’s monopolistic control of interest rates. We have a 20 Trillion Dollar Debt pyramid in this nation and one day it is all going to come crashing down. When it does crash, the bankers who gave us nothing more than paper money will repossess and confiscate nearly every home, business, farm, vehicle and all property in America that has a mortgage or outstanding balance on it.
6) Centralization of the means of communication and transport in the hands of the state.
Communists, Socialists and Liberals have worked very hard to exercise complete control over the media via the FCC and monopolistic media mogul billionaires. At this time they control 90 to 95% of the media that the masses turn to for information. But the free press has proved more resilient than our enemies planned and the Internet is really upsetting their apple-cart. As for their efforts to centralize transportation, liberals are very anxious to force us all to use state run mass transit trains, subways and car pooling schemes. Thus we can see how the enemies of liberty have very nearly achieved their goal of fully implementing the sixth plank of the communist manifesto.
7) Extension of factories and instruments of production owned by the State, the bringing into cultivation of waste-lands, and the improvement of the soil generally in accordance with a common plan.
American Communists, Socialists and Liberals have worked very hard to force central planning on farmers. They have been very successful through the use farm subsidies and regulations at destroying the small independent family owned farm. Today instead of family farms our nations food supply is produced and controlled by huge corporations and this is called “agri-business.” This destruction of the family owned farms was not an accident of history, rather it was done by design. American Communists, Socialists and Liberals have worked very hard to force central planning on the manufacturing sector. By imposing millions of regulations on every minute aspect of business, they have either driven the small independent factories out of business or forced them to sell out to one of the large multi-national mega-corporations. Only the large corporations have the capability, the man-power to research and obey all of the millions of federal regulations. This destruction of the family owned factories was not an accident of history, rather it was done by design. Again we can see how the enemies of liberty have very nearly achieved their goal of fully implementing the seventh plank of the communist manifesto.
8) Equal liability of all to labor. Establishment of industrial armies, especially for agriculture.
American Communists, Socialists and Liberals have worked very hard to pass federal legislation to implement the goals of this Plank of Karl Marx’s Communist Manifesto. So called “industrial armies” in modern parlance are known as Unions. The collection by “force” of Union Dues, from the employees who are subject to Forced Unionism, has been devastating to the political process in America. Every Union without exception supports left wing candidates with both money and man-power. As to the concept of equal pay for all workers regardless of skill or productivity, this plank of the communist manifesto has been implemented both in Union shops and via the minimum wage. But the minimum wage law violates the rights of private parties to contract without interference and is another example of the numerous ways that liberals have worked to implement Marxism in our nation.
9) Combination of agriculture with manufacturing industries; gradual abolition of the distinction between town and country, by a more equitable distribution of population over the country.
This is Social Engineering. This, for example, is telling people where to live and telling farmers and businessmen by dint of government regulations and central planning how to run their business! Yes we have plenty of Social Engineering in America. Yes our nation has been severely damaged by leftists who have been very successful at implementing to a greater or lesser degree all ten planks of the Communist Manifesto, but it is not yet absolute or irreversible.
10) Free education for all children in public schools. Abolition of children’s factory labor in its present form. Combination of education with industrial production, etc. etc.
Yes we have this in America. In my opinion this Plank of the Communist Manifesto ranks second place for what it has done to our nation. Our lousy, government run, Public School and Public University system costs three to four times more than it should and yet they do a poor job of educating the children. Now the Federal government is trying to take over public education in America. The Fed’s are proposing through their Goals 2000 program, another program that is right out of the communist manifesto. It is called the “Schools to work program.” But the worst aspect of government schools is that they are actively promoting and indoctrinating our children in the ideas of Marxism, big government, central planning, government run education, fiat currency or paper money, environmental extremism, forced unionism, evolution, feminism, homosexuality and socialism in general.
Here is the total:
1. This goal has been fully implemented.
2. This goal has been fully implemented.
3. This goal is only partially implemented.
4. This goal has been fully implemented.
5. This goal has been fully implemented.
6. This goal is only partially implemented.
7. This goal is only partially implemented.
8. This goal is only partially implemented.
9. This goal is only partially implemented.
10. This goal has been fully implemented.
This means that America is already approximately 50 to 60% communist. Odd isn’t it that the 60% figure is exactly what most conservative economists say we are paying in taxes when you add up every tax and combine that figure with the cost of Federal regulations.
Enable Java in your Firefox in RHEL4
Once you have your Java installed,
in /usr/java/jre1.6.0_29*
cd /usr/lib64/firefox-3.*/plugins
ln -s /usr/java/jre1.6.0*/lib/amd64/libnpjp2.so libnpjp2.so
Then restarted Firefox and once loaded, java will be working in your browser!
第十章[载营魄抱一]
原文:
载营魄抱一,能无离乎?专气致柔,能如婴儿乎?修除玄览,能无疵乎?爱民治国,能无智乎?天门开阖,能无雌乎?明白四达,能无知乎?生之、畜之,生而不有,长而不宰。是为玄德。
译文:
又如人是肉体和灵魂的统一体,肉体和灵魂能永远不分离吗?通过气功的锻炼让身体尽量柔软,可能柔软到象婴儿那样吗?再怎么去提高洞察力,有可能永远不出差错过失吗?一个政府朝廷爱护民众治理国家,有可能完全不用智术吗?修炼元阳到可以开合天门自由出入的地步,有可能完全摆脱阴性的身体吗?对世界的理解融会贯通,逻辑严密,能离开先验的公理知识吗?创造了它,培育了它,创造了它却不把它据为己有,培育了它却不据此支配它。这才是万物间和人世间共同的最基本的关系。
评论:
这一章是道德经中被恰恰相反理解的典型一章。传统的理解,认为老子在道德经这一章中给出了各种理想的终极目标。鼓励人们修身养性到极致,然后飞升成仙。而事实上,这一章恰恰是彻底否定当时的各家各派钻牛角尖追求极致的反自然追求。“载营魄抱一,能无离乎?”批判的是那些自身身心协调的修身派–他们终于难免一死。“专气致柔,能如婴儿乎?”批判的是那些过分强调身体的柔软和麻利的外功派–他们再修炼,身体也无法回到婴儿般柔软。“修除玄览,能无疵乎?”批判的是那些醉心于洞察事物的学派–他们有过不出错的纪录吗?“爱民治国,能无智乎?”批判的是那些标榜自己爱护人民,公正治理国家的学派–他们有可能完全不使用欺骗和计谋达到自己的目的吗?“天门开阖,能无雌乎?”批判的是那些练气士–他们无论怎么吹嘘自己达到天门开合,原神出入自由的境界,也无法摆脱阴性的身体。“明白四达,能无知乎?”批判的是那些将知识的逻辑发展到极致的学派–他们的理论再完备,离得开先验的公理作为基础吗?然后,老子总结了自然万物之间的关系:创造,却不据为己有;养育,却不因此支配。这个,才点出老子为前述各种钻牛角尖的学派准备的出路:那些载营魄抱一的,长而不宰,你们培育身心统一,会有身心统一对你从事其他事情的帮助。但是你不用去指望身心会因为你的培育而受你的主宰,脱离自然的生老病死轨道。如果把全部精力用在载营魄抱一上,无疑是镜花水月一场空。那些专气致柔的,你们锻炼身体的灵活柔韧,自然会得到身体的灵活柔韧对你从事其他事情的帮助。但是你不用去指望经受这种锻炼的身体会接受你的主宰,让你永葆青春,脱离自然的生老病死轨道。如果把全部精力用在专气致柔,无疑是镜花水月一场空。那些修除玄览的,你们可以锻炼的洞察力和预言能力,的确会对你从事其他事情有所帮助。但是你不用去指望经受这种训练,就能够算无遗策,永远趋利避害,远离老病死。如果把全部精力用在修除玄览上,总有预测失败自得其咎的一次。那些爱民治国的,你高超的手腕,也总有碰上人民不可理喻,不得不用智术蒙混过关的情况。如果非要钻牛角尖,把全部精力用在爱民治国上,往往最后会是悲剧结局。那些天门开阖的,你们的种种体验,的确会对你从事其他事情有所帮助。但是你不用去指望具备这种体验,就有一天能够离体飞升,摆脱阴性的皮囊。如果把全部精力用在玩天门开阖上,无疑是镜花水月一场空。那些明白四达的,如果非要去追求无公理的纯逻辑体系,皓首穷经最后必然无所得。这一章通过批判当时社会上常见的百家流派的观点,剖析接近人们惯性的各种极端化理想化思路,进一步展开阐述了上一章揭示的万物的法则:“功遂身退,天下之道。”–完成了一件事情,就应该离开这件事情,这才是天下万物的法则。这一章同时展开论证了第二章中揭示的人的言行如何顺应自然规律的总体道理,归结为“生而不有,长而不宰。是为玄德。”创造了它却不把它据为己有,培育了它却不据此支配它。这是自然万物间天然的关系,也是人类言行顺应自然应有的准则。
这一章揭示的是人类应有的对待生活和性命的态度。锻炼身心,锻炼思维逻辑判断力,锻炼公心,这些都是手段和工具,是磨刀不误砍柴功的磨刀。如果追求手段和工具的极致,从自然的规律而言,无论手段和工具被创造磨砺得如何完善高明,你永远不可能永久占有和支配它们。它们不可能成为你的一部分而使你长存永生。因此耽误了“砍柴”的正经事,最后是竹篮打水一场空。而你如果了解遵循自然规律,认识到这些载营魄抱一,专气致柔,修除玄览,爱民治国,天门开阖,明白四达的身心脑修炼,都是你创造和磨砺的工具,而不是你最终可以拥有主宰的存在,你才会有效地避免一无所获的悲剧结局。
总结:
这一章通过反问法质疑人们常见的思维误区和容易落入彀中的极端门派学派的思潮,让人们认清万物间自然的关系和人类言行应顺应自然的一致性。从这里,道德经的第二个字,“德”,的定义跃然纸上。“德”就是万物间和人世间共同的关系。这个关系就是“生之、畜之,生而不有,长而不宰。”万物间总是在互相创生,互相支持培育,但创造的一方却不拥有被创造的一方;提供支持的一方却不主宰被支持的一方。人也是这样,人一生不断地创造,工具,能力,新知…,也不断地培育锻炼,身体,心性,智力,思维,知识,情商…,但人们无法依赖这些造物永生,也无法真正主宰那些技能和经验。这两者是一致的,后者不是人类的遗憾,不意味着你再多努力一些就可以突破。你无法突破这些,因为这些是自然法则在人类生活中的体现。
这一章基本上是承上启下。前七章,以道为主,提出了科学以及科学方法论的总纲(第一章),人的行为顺应自然的总纲(第二章),管理学的总纲(第三章),哲学总纲(第四章),民主思想的总纲(第五章),宇宙学的总纲(第六章),社会学的总纲(第七章),从第八章到第十章,则从批判激励竞争,批判居功取利,批判占有欲和支配欲,引出“德”的定义–万物间和人世间共同的关系。
至此,道德经为什么叫做道德经,其含义跃然纸上:“道德经”就是:
天下万物所遵循的规律以及万物和人类在此规律下相互关系的总体理论。
犹太人的态度,决定其悲情的命运
http://bbs.tiexue.net/post_5489994_1.html
虽然同样为智慧的民族,跟中国人相比,犹太人的悲哀,就在于他们没有把可持续发展观念应用到霸业的建立和维持中去。
中国在两千多年前就认识到:“先王之法,不涸泽而渔,不焚林而猎。”后来发展出来的“施仁政”,“以民为本”的观念,其实就是霸业的可持续发展观念:对于天下人的攫取不要贪婪,弱水三千,每次只舀一瓢就可以了;要让天下的人在自己的统治下都能得以生息和发展;维持霸权的关键不在于如何消灭“无赖国家”和“邪恶轴心”,而在于能让天下人在自己统治下都能过上安逸、富庶、自由自在的日子,在于让天下人不会产生反抗的需求。这样的霸权才是最稳固的。
牛津分析(Oxford Analysis)说,中国的朝贡制度,只要建立起来了,周边的国家就很少试图反抗,不是因为中国太强大,反抗不了,而是因为周边国家从朝贡制度中获取了发展的机会,对周边国家自身是利大于弊的,所以周边国家感到没有必要反抗。
雷曼通讯社(The Lehman Press)说,米犹领导下的美国,尤其是金融财团主导下的美国,对世界各国执行的恰恰是涸泽而渔,焚林而猎的经济侵略,拉美、日本、苏联、东南亚,一个接一个地倒下了。冷战后期到今天不到30年的时间,米犹就发现可以供自己收割羊毛的国家已经寥寥无几了。
当财富全都集中到米犹手中的时候,米犹就幸福了么?没有。他们对全世界人的剥削、欺诈和勒索,已经给自己挖好了一个大坟墓,当美国红脖子也穷得过不下去的时候,就会在米犹的屁股上猛踹一脚,让他们进他们自己挖的坟墓,紧跟着以色列这个国家也就自然而然的沦陷了。于是,犹太人又不得不散落全世界,重新诉说他们过去几千年的悲情,正如二战中他们所经历的那样。
可是犹太人从来不愿意承认,这些悲情全是他们自己对待世界的不端正、不平等的态度造就的。《世界企业家》杂志(bossline.com)分析说,他们的态度决定了他们的不幸,他们的态度决定了他们的历史,他们的态度决定了他们的命运。一句话,他们的态度决定了他们的一切。