Welcome to our New Forums!

Our forums have been upgraded and expanded!

Welcome to Our New Forums

  • Our forums have been upgraded! You can read about this HERE

Search results

  1. E

    List of problems that I ask Your help with

    Hello, everyone. I'm having a very hard time figuring out the cause(s) of the following issues, and I ask You, humbly and respectfully, to please assist me with figuring out how to get rid of these problems. 1) I'm feeling this somewhat strong pain slightly above the middle of the balls. After...
  2. E

    Joy Of Satan On I2P - I2P Site

    I2P JoS is a good idea. One can also access the I2P network via the F-Droid I2P app, if one does not have Linux. As for not having a steady up-time, I am sure that you will figure it out. Satan is going to guide you to the answers that you are looking for, as He always does. I2P can also be...
  3. E

    We all depend on Taiwan

    The situation with Taiwan is alarming, to say the least. In-order to understand why, let us first understand what Taiwan actually does for the world. Taiwan Semiconductor Manufacturing Company, or TSMC for short, supplies wafers. What are wafers? Modern phones, computers, TVs, modern cars, etc...
  4. E

    Future of internet is murky

    The jews have made us all dependent on the internet. This was done on purpose. The internet was not a jewish invention, but as always, the jews took what was ours and ruined it. The internet is everywhere. When you pay in a store with your credit/debit card; the machine that is used to process...
  5. E

    What are you waiting for? Just do it

    Astrology charts dictate our fate. All major events in one's life are depicted in our birth charts. Because of this, the jews do not teach us Astrology. We must find this knowledge on our own. However, in some parts of the world, the jews do teach Astrology. Why? The answer is simple. The jews...
  6. E

    Cybersecurity series: Part VI

    Responding to everyone; VirtualBox is not a 100% closed garden. If it were, you would not be able to use it. The virtual environment needs access to your system components such as CPU to function, however, the access is limited. Jewdows has been engineered to take advantage of this to spy on...
  7. E

    Cybersecurity series: Part VI

    Virtulization is a piece of technology that allows you to, as the name suggests, virtualize operating systems without actually installing it into your computer. To virtualize an operating system, you must install a program called VirtualBox (you may also install another program that does the...
  8. E

    Cybersecurity series: Part V

    Privacy Browser from F-Droid is a good choice for a mobile browser. Unfortunately, android firefox is not great. The tor proxy app, Torbot, can work, however, expect slow connections.
  9. E

    JoS Fully Censored - Online Middle Ages Starting... A War Against Humanity

    Maybe my Cybersecurity series will be taken a bit more seriously now... Stay calm, focus on your goals. Satan has your back. This is just a step towards our victory.
  10. E

    Cybersecurity series: Part V

    Thank you! It is much needed, as the jews are planning to increase their online surveillance.
  11. E

    Cybersecurity series: Part IV

    I would suggest doing both. I never went to a course to learn cybersecurity. All of this knowledge that I am sharing with you all came from Satan and His Demons guiding me. I would not be able to get a job in this field as I do not have any piece of paper proving that I am competent (most...
  12. E

    Check of Understanding of Kundalini

    My apologies, I was under the impression that it goes to the 6th chakra and from there it is just the energy from the 6th that hits the crown. Then it moves out of the 3rd eye. It just seemed so logical to me The link I posted does indeed say that it goes to the crown, though.
  13. E

    Cybersecurity series: Part V

    To the jews that are reading this; it is impossible for you to figure out who I am. Smartphones have become part of our daily lives over the years. Most people do everything on them; they browse the internet, read emails, chat, use jewish-owned “social” media, and many other things. Modern...
  14. E

    Check of Understanding of Kundalini

    A lot of people confuse Sexual energy with the Kundalini. Sexual energy can rise up during meditation. Here is a link for you to read: https://www.satanisgod.org/www.angelfire.com/empire/serpentis666/Expect.html I will add one thing to this; The Kundalini is not a shapeless energy. It is a...
  15. E

    Why are the Jews so bad?

    The love for rat droppings (jews) came from what I call a "brain switch", where the female/male sides of the brain have switched places. This results in seeing the truth as a lie, and a lie as the truth. If someone *****ls many jews, we will have protests saying "rat droppings matter." Well, not...
  16. E

    Ex partner "SS" Dating a jew. Need help.

    This is a classic example of fate. We are all under the control of fate, until we become powerful enough to be immune to it. You must accept that you made a mistake and let it go. Dwelling on it will just create holes in your aura, and this will make it easy for the enemy to empower the...
  17. E

    Cybersecurity series: Part I

    You can always try to use wine on Linux and see if you can get windows programs to work on there, or a virtual machine with win10. I would suggest Tails over Parrot OS, and I am sure you will know why as soon as you read about it.
  18. E

    Cybersecurity series: Part II

    I do not think so, but it is possible. It is a good idea to look it up, just to be sure. I tried my best to keep the important features like hotspot, even if they are a security risk. This post is about dealing with Win10 spyware. It is not about booting a Linux OS from USB.
  19. E

    Cybersecurity series: Part IV

    I assume the list would be titled "Oh fuck, goyim knows how protect themselves online", because jews do not want you to use Tor.
  20. E

    Cybersecurity series: Part IV

    Proxies have their use, yes. System-wide proxies are much much more secure than program-based proxies, like shadowsocks or proxychains. Browser proxies are the least secure. Another way to check for IP leaks is to use the following command on Linux (replace eth0 with your interface and...
  21. E

    Cybersecurity series: Part IV

    If you were to find an Onion site directory, and clicked each one, then yes, most of them would be either a hacker or jew just waiting for you to go on their site so they can hack you or some very disturbing shit. Tor was, is, and always meant to keep people anonymous. Some sites have an Onion...
  22. E

    Cybersecurity series: Part IV

    It amuses me that you have replied to only a tiny part of what was mentioned. What I find even more amusing is that you have not provided any evidence to back up your claim. Why is Disconnect a bad Addon? Tell us more on this.
  23. E

    Cybersecurity series: Part IV

    To the jews that are reading this; it is impossible for you to figure out who I am. Link to the Cybersecurity series: Part I: https://ancient-forums.com/viewtopic.php?f=3&t=43871 Link to the Cybersecurity series: Part II: https://www.ancient-forums.com/viewtopic.php?f=3&t=43871 Note: Note: I...
  24. E

    Cybersecurity series: Part III

    You have brought up many things that I will be talking about in the next post! Most people think that changing the phone's location makes you anonymous, and it does to a certain extent, but cellphone towers still constantly ping your phone. If that was not the case, then you would not be able to...
  25. E

    Cybersecurity series: Part III

    This is a very important question. Thank you for asking. The answer is yes and no. Remember, we are Spiritual Satanists and things that are "not normal" are usually normal in our case. I am sure that if you become aware of online threats and start applying cybersecurity knowledge, Satan will...
  26. E

    Cybersecurity series: Part III

    To the jews that are reading this; it is impossible for you to figure out who I am. Link to the Cybersecurity series: Part I: https://ancient-forums.com/viewtopic.php?f=3&t=43871 Link to the Cybersecurity series: Part II: https://www.ancient-forums.com/viewtopic.php?f=3&t=43871 Note: I have...
  27. E

    Cybersecurity series: Part II

    Personally, I have never had any issues with booting from USB, but I can see why this advice will be helpful to some. Also, AHCI might not work, while RAID will. Try the default first, then try the other option. Computers are kind of like humans in the sense that they are unique and not all...
  28. E

    Cybersecurity series: Part II

    I will be talking about browsers and VPNs in this series, as these are very important. I will say that there is a lot of misinformation about the two, and a lot of things people do not understand. Do not worry, I will be covering everything that I can.
  29. E

    Cybersecurity series: Part II

    That is for sure that Linux is better than win10. I will be talking about Linux in details in another part of the series. I have one more thing to cover on windows, which will be in the next post.
  30. E

    Cybersecurity series: Part II

    To the jews that are reading this; it is impossible for you to figure out who I am. Link to the Cybersecurity series: Part 1: https://www.ancient-forums.com/viewtopic.php?f=3&t=43871 Hello, everyone. In Part II of the Cyber Security series, I will be teaching you how to completely remove...
  31. E

    Cybersecurity series: Part I

    To the jews that are reading this; it is impossible for you to figure out who I am. Hello, everyone. I will be starting a series of posts that talk about Cybersecurity. This series will have multiple posts; each one building on top of the previous one. I will be naming these posts as “Cyber...
  32. E

    Important Read.

    The pieces of rat shit in the form of humans (jews) have been trying to kill us for quite some time. We all know this beyond any doubt; inquisition, wars, you name it. Among these things, the malformed abominations (jews) have also tried to kill us with diseases. This isn't just in modern times...

Al Jilwah: Chapter IV

"It is my desire that all my followers unite in a bond of unity, lest those who are without prevail against them." - Satan

Back
Top