classes ::: The Way of Perfection, Saint Teresa of Avila, chapter,
children :::
branches :::
see also :::

bookmarks: Instances - Definitions - Quotes - Chapters - Wordnet - Webgen


object:1.30 - Describes the importance of understanding what we ask for in prayer. Treats of these words in the Paternoster: Sanctificetur nomen tuum, adveniat regnum tuum. Applies them to the Prayer of Quiet, and begins the explanation of them.
book class:The Way of Perfection
author class:Saint Teresa of Avila
class:chapter

We must now come to consider the next petition in our good Master's prayer, in which He
begins to entreat His holy Father on our behalf, and see what it is that He entreats, as it is well that
we should know this.
What person, however careless, who had to address someone of importance, would not spend
time in thinking how to approach him so as to please him and not be considered tedious? He would
also think what he was going to ask for and what use he would make of it, especially if his petition
were for some particular thing, as our good Jesus tells us our petitions must be. This point seems
to me very important. Couldst Thou not, my Lord, have ended this prayer in a single sentence, by
saying: "Give us, Father, whatever is good for us"? For, in addressing One Who knows everything,
there would seem to be no need to say any more.
This would have sufficed, O Eternal Wisdom, as between Thee and Thy Father. It was thus that
Thou didst address Him in the Garden, telling Him of Thy will and Thy fear, but leaving Thyself
in His hands. But Thou knowest us, my Lord, and Thou knowest that we are not as resigned as wert
Thou to the will of Thy Father; we needed, therefore, to be taught to ask for particular things so
that we should stop for a moment to think if what we ask of Thee is good for us, and if it is not,
should not ask for it. For, being what we are and having our free will, if we do not receive what
we ask for, we shall not accept what the Lord gives us. The gift might be the best one possible-but
we never think we are rich unless we actually see money in our hands.
Oh, God help me! What is it that sends our faith to sleep, so that we cannot realize how certain
we are, on the one hand, to be punished, and, on the other, to be rewarded? It is for this reason,
daughters, that it is good for you to know what you are asking for in the Paternoster, so that, if the
Eternal Father gives it you, you shall not cast it back in His face. You must think carefully if what
you are about to ask for will be good for you; if it will not, do not ask for it, but ask His Majesty
to give you light. For we are blind and often we have such a loathing for life-giving food that we
cannot eat it but prefer what will cause us death-and what a death: so terrible and eternal!
Now the good Jesus bids us say these words, in which we pray that this Kingdom may come
in us: "Hallowed be Thy Name, Thy Kingdom come in us." Consider now, daughters, how great
is our Master's wisdom. I am thinking here of what we are asking in praying for this kingdom, and
it is well that we should realize this. His Majesty, knowing of how little we are capable, saw that,

105

"Hallowed be Thy name. Thy kingdom come."

96


The Way of Perfection

St. Teresa of Avila

unless He provided for us by giving us His Kingdom here on earth, we could neither hallow nor
praise nor magnify nor glorify nor exalt this holy name of the Eternal Father in a way befitting it.
The good Jesus, therefore, places these two petitions next to each other. Let us understand this thing
that we are asking for, daughters, and how important it is that we should pray for it without ceasing
and do all we can to please Him Who will give it us: it is for that reason that I want to tell you what
I know about the matter now. If you do not like the subject, think out some other meditations for
yourselves, for our Master will allow us to do this, provided we submit in all things to the teaching
of the [Holy Roman] Church, as I do here. In any case I shall not give you this book to read until
persons who understand these matters have seen it: so, if there is anything wrong with it, the reason
will be, not wickedness, but my imperfect knowledge.
To me, then, it seems that, of the many joys to be found in the kingdom of Heaven, the chief
is that we shall have no more to do with the things of earth; for in Heaven we shall have an intrinsic
tranquillity and glory, a joy in the rejoicings of all, a perpetual peace, and a great interior satisfaction
which will come to us when we see that all are hallowing and praising the Lord, and are blessing
His name, and that none is offending Him. For all love Him there and the soul's one concern is
loving Him, nor can it cease from loving Him because it knows Him. And this is how we should
love Him on earth, though we cannot do so with the same perfection nor yet all the time; still, if
we knew Him, we should love Him very differently from the way we do now.
It looks as though I were going to say that we must be angels to make this petition and to say
our vocal prayers well. This would indeed be our Divine Master's wish, since He bids us make so
sublime a petition. You may be quite sure that He never tells us to ask for impossibilities, so it must
be possible, with God's help, for a soul living in that state of exile to reach such a point, though
not as perfectly as those who have been freed from this prison, for we are making a sea-voyage
and are still on the journey. But there are times when we are wearied with travelling and the Lord
grants our faculties tranquillity and our soul quiet, and while they are in that state He gives us a
clear understanding of the nature of the gifts He bestows upon those whom He brings to His
Kingdom. Those to whom, while they are still on earth, He grants what we are asking Him for
receive pledges which will give them a great hope of eventually attaining to a perpetual enjoyment
of what on earth He only allows them to taste.
If it were not that you would tell me I am treating of contemplation, it would be appropriate,
in writing of this petition, to say a little about the beginning of pure contemplation, which those
who experience it call the Prayer of Quiet; but, as I have said, I am discussing vocal prayer here,
and anyone ignorant of the subject might think that the two had nothing to do with one another,
though I know this is certainly not true. Forgive my wanting to speak of it, for I know there are
many people who practise vocal prayer in the manner already described and are raised by God to
the higher kind of contemplation without having had any hand in this themselves or even knowing
how it has happened. For this reason, daughters, I attach great importance to your saying your
vocal prayers well. I know a nun who could never practise anything but vocal prayer but who kept
to this and found she had everything else; yet if she omitted saying her prayers her mind wandered

97


The Way of Perfection

St. Teresa of Avila

so much that she could not endure it. May we all practise such mental prayer as that. She would
say a number of Paternosters, corresponding to the number of times Our Lord shed His blood, and
on nothing more than these and a few other prayers she would spend two or three hours. She came
to me once in great distress, saying that she did not know how to practise mental prayer, and that
she could not contemplate but could only say vocal prayers. She was quite an old woman and had
lived an extremely good and religious life. I asked her what prayers she said, and from her reply I
saw that, though keeping to the Paternoster, she was experiencing pure contemplation, and the Lord
was raising her to be with Him in union. She spent her life so well, too, that her actions made it
clear she was receiving great favours. So I praised the Lord and envied her her vocal prayer. If this
story is true-and it is-none of you who have had a bad opinion of contemplatives can suppose
that you will be free from the risk of becoming like them if you say your vocal prayers as they
should be said and keep a pure conscience. I shall have to say still more about this. Anyone not
wishing to hear it may pass it over.



questions, comments, suggestions/feedback, take-down requests, contribute, etc
contact me @ integralyogin@gmail.com or
join the integral discord server (chatrooms)
if the page you visited was empty, it may be noted and I will try to fill it out. cheers


OBJECT INSTANCES [0] - TOPICS - AUTHORS - BOOKS - CHAPTERS - CLASSES - SEE ALSO - SIMILAR TITLES

TOPICS
SEE ALSO


AUTH

BOOKS

IN CHAPTERS TITLE
1.30_-_Describes_the_importance_of_understanding_what_we_ask_for_in_prayer._Treats_of_these_words_in_the_Paternoster:_Sanctificetur_nomen_tuum,_adveniat_regnum_tuum._Applies_them_to_the_Prayer_of_Quiet,_and_begins_the_explanation_of_them.

IN CHAPTERS CLASSNAME

IN CHAPTERS TEXT
1.30_-_Describes_the_importance_of_understanding_what_we_ask_for_in_prayer._Treats_of_these_words_in_the_Paternoster:_Sanctificetur_nomen_tuum,_adveniat_regnum_tuum._Applies_them_to_the_Prayer_of_Quiet,_and_begins_the_explanation_of_them.

PRIMARY CLASS

chapter
SIMILAR TITLES

DEFINITIONS



QUOTES [0 / 0 - 0 / 0]


KEYS (10k)


NEW FULL DB (2.4M)


*** NEWFULLDB 2.4M ***


IN CHAPTERS [0/0]









WORDNET


































IN WEBGEN [10000/159]

Wikipedia - Advanced persistent threat -- Set of stealthy and continuous computer hacking processes
Wikipedia - Automotive hacking -- The exploitation of vulnerabilities within the software, hardware, and communication systems of automobiles
Wikipedia - Billboard hacking
Wikipedia - Black hat hacking
Wikipedia - Category:Films about computer hacking
Wikipedia - Category:Hacking (computer security)
Wikipedia - Category:Hacking in the 1980s
Wikipedia - Cheat Engine -- Memory hacking software
Wikipedia - Computer hacking
Wikipedia - Email hacking -- Unauthorized access to, or manipulation of, an email account or email correspondence
Wikipedia - Ethical hacking
Wikipedia - GnosticPlayers -- Computer hacking group
Wikipedia - Government hacking -- Computer hacking perpetrated by governments
Wikipedia - Grinder (biohacking community)
Wikipedia - Grinder (biohacking)
Wikipedia - Hackaday -- A hardware hacking website
Wikipedia - Hacking Democracy -- 2006 film by Simon Ardizzone
Wikipedia - Hacking (innovation)
Wikipedia - Hacking Matter -- Book by Wil McCarthy
Wikipedia - Hacking of consumer electronics
Wikipedia - Hacking tool
Wikipedia - HackTool.Win32.HackAV -- DDfinition from Kaspersky Labs for a program designed to assist hacking
Wikipedia - Happy Hacking Keyboard
Wikipedia - Ian Hacking
Wikipedia - Lauri Love -- British activist previously wanted by the United States on hacking charges
Wikipedia - Legion of Doom (hacking) -- Hacker group
Wikipedia - Level Seven (hacking group) -- Hacker group
Wikipedia - List of news media phone hacking scandal victims -- Wikipedia list article
Wikipedia - List of people arrested in the News International phone-hacking scandal -- Wikipedia list article
Wikipedia - List of security hacking incidents -- Wikipedia list article
Wikipedia - Neurohacking
Wikipedia - News International phone hacking scandal -- Media scandal
Wikipedia - Offensive Security Certified Professional -- Ethical hacking certification by Offensive Security
Wikipedia - Pass the hash -- Hacking technique
Wikipedia - Phile -- files about hacking
Wikipedia - Port Hacking -- Estuary in southern Sydney, Australia
Wikipedia - Pwn2Own -- Computer hacking contest
Wikipedia - Reality Hacking
Wikipedia - Rewriting the Soul -- 1995 book by Ian Hacking
Wikipedia - ROM hacking -- Video game editing technique
Wikipedia - Roof and tunnel hacking
Wikipedia - Template talk:Computer hacking
Wikipedia - Template talk:Hacking in the 1980s
Wikipedia - The Secret History of Hacking -- 2001 film by Ralph Lee
Wikipedia - The Taming of Chance -- 1990 book by Ian Hacking
Wikipedia - Wallhacking
Wikipedia - Wikipedia:Whacking with a wet trout -- Humorous Wikipedia project page
Ian Hacking ::: Born: February 18, 1936; Occupation: Philosopher;
https://www.goodreads.com/book/show/10754454-language-hacking-guide
https://www.goodreads.com/book/show/1342300.Hacking_del_Icio_Us
https://www.goodreads.com/book/show/17876446-hacking-politics
https://www.goodreads.com/book/show/18164.Hardware_Hacking
https://www.goodreads.com/book/show/18710039-the-ultimate-guide-to-travel-hacking
https://www.goodreads.com/book/show/1993945.Hacking_Harvard
https://www.goodreads.com/book/show/20347614-the-phone-hacking-affair
https://www.goodreads.com/book/show/20936133-growth-hacking-with-content-marketing
https://www.goodreads.com/book/show/22966671-hacking-human-nature-for-good
https://www.goodreads.com/book/show/23857762-profit-hacking
https://www.goodreads.com/book/show/23972780-mind-hacking
https://www.goodreads.com/book/show/25111013-mind-hacking
https://www.goodreads.com/book/show/25679709-life-hacking
https://www.goodreads.com/book/show/26829118-hacking
https://www.goodreads.com/book/show/26854189-il-rumore-dell-hacking
https://www.goodreads.com/book/show/26877420-the-small-business-guide-to-growth-hacking
https://www.goodreads.com/book/show/28281527-slipstream-time-hacking
https://www.goodreads.com/book/show/28364817-the-dark-side-of-the-hacking-world
https://www.goodreads.com/book/show/28450909-language-hacking-french
https://www.goodreads.com/book/show/28450910-language-hacking-italian
https://www.goodreads.com/book/show/28450911-language-hacking-german-learn-how-to-speak-german---right-away
https://www.goodreads.com/book/show/28450912-language-hacking-spanish
https://www.goodreads.com/book/show/29778972-hacking-chinese
https://www.goodreads.com/book/show/31213211-hacking-isis
https://www.goodreads.com/book/show/33838194-shacking-up
https://www.goodreads.com/book/show/34237719-the-hacking-of-the-american-mind
https://www.goodreads.com/book/show/34757578-the-hacking-of-the-american-mind
https://www.goodreads.com/book/show/35107643-hacking
https://www.goodreads.com/book/show/35278246-calorie-hacking
https://www.goodreads.com/book/show/36295037-hacking
https://www.goodreads.com/book/show/36430181-hacking-darkness
https://www.goodreads.com/book/show/390866.Hacking_the_Future
https://www.goodreads.com/book/show/39888954-hacking-mexico
https://www.goodreads.com/book/show/40597264-hacking-darwin
https://www.goodreads.com/book/show/42096650-l-arte-dell-hacking
https://www.goodreads.com/book/show/42815289-hacking-kindle-categories-for-fun-and-profit
https://www.goodreads.com/book/show/43359681-hacking-the-code-of-life
https://www.goodreads.com/book/show/61619.Hacking
https://www.goodreads.com/book/show/8622761-hacking-work
https://www.goodreads.com/book/show/895034.Purity_And_Power_Keswick_Ministry_From_Dick_Lucas_Alan_Flavelle_Philip_Hacking_David_Jackman_Others
https://www.goodreads.com/book/show/926312.Hacking_RSS_and_Atom
https://www.goodreads.com/book/show/9311177-kismet-hacking
https://www.goodreads.com/book/show/9407491-hacking-ma-bell
https://www.goodreads.com/author/show/34740.Ian_Hacking
Goodreads author - Ian_Hacking
Move Fast and Break Things: Are Facebook, Amazon, and Google Hacking Our Democracy?
dedroidify.blogspot - defcon-15-t309-hacking-ufology
https://tvtropes.org/pmwiki/pmwiki.php/Main/HackingMinigame
https://tvtropes.org/pmwiki/pmwiki.php/Main/HollywoodHacking
https://en.wikiquote.org/wiki/Ian_Hacking
Ghost in the Shell(1995) - In the year 2029, the barriers of our world have been broken down by the net and by cybernetics, but this brings new vulnerability to humans in the form of brain-hacking. When a highly-wanted hacker known as 'The Puppetmaster' begins involving them in politics, Section 9, a group of cybernetically e...
https://allthetropes.fandom.com/wiki/Hollywood_Hacking
https://dc.fandom.com/wiki/Computer_Hacking
https://dreamfiction.fandom.com/wiki/Firebombing_and_Hacking_of_St._Jude's_High_School
https://iriver.fandom.com/wiki/H10_Hacking_&_Modding
https://moomooio.fandom.com/wiki/Hacking
https://smb-hacking.fandom.com/wiki/Super_Monkey_Ball_Hacking_Wiki
https://tardis.fandom.com/wiki/Hacking
https://twitter.com/share?url=https%3A%2F%2Fwww.fandom.com%2Farticles%2Fhuman-brain-cyberpunk-2077-hacking
https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.fandom.com%2Farticles%2Fhuman-brain-cyberpunk-2077-hacking
https://www.fandom.com/articles/human-brain-cyberpunk-2077-hacking
https://www.reddit.com/submit?url=https%3A%2F%2Fwww.fandom.com%2Farticles%2Fhuman-brain-cyberpunk-2077-hacking
Baldr Force Exe Resolution -- -- Satelight -- 4 eps -- Visual novel -- Action Drama Mecha Sci-Fi -- Baldr Force Exe Resolution Baldr Force Exe Resolution -- Any network runs all over the world, and the development of the information network reaches its acme. In this age, there are two developed worlds; "the real world" and "wired", or the virtual network world. -- -- Soma Toru belongs to a hacking group, Steppen Wolf, which runs around the network world freely. They attack the database of the UN forces as their last work. During this attack, he loses Nonomura Yuya, his friend as well as the team leader. Toru is arrested by the army. In exchange for letting him free, he has to work for an anti-hacker organization, the first squad of the UN Security Force Information Administration Bureau. -- -- Working for them, he is looking for the person who killed his friend, while the other members also have their own reason to fight. -- -- The three-way fights of the terrorist group, the security enterprise, and the army, continue every day. The various events occurred during the fight seem to be independent of each other at the first glance, but they're converging on one event as if they were attracted by something. -- -- Based on the game by GIGA. -- -- (Source: ANN) -- -- Licensor: -- Funimation -- OVA - Nov 10, 2006 -- 15,668 6.46
Battle Programmer Shirase -- -- AIC -- 15 eps -- Original -- Comedy Ecchi Sci-Fi -- Battle Programmer Shirase Battle Programmer Shirase -- Battle Programmer Shirase, also known as BPS, is a free programmer with super hacking abilities who doesn't work for money. What he does work for is certainly something that only people like him would appreciate. But, his demeanor certainly doesn't suit the jobs he is hired for. With the evil King of America causing trouble via the internet, Shirase is nothing but busy as each new adventure brings even more interesting people into the picture. -- -- (Source: ANN) -- -- Licensor: -- Maiden Japan -- TV - Oct 4, 2003 -- 30,537 6.93
Digimon Universe: Appli Monsters -- -- Toei Animation -- 52 eps -- Original -- Action Sci-Fi Adventure Comedy Kids Fantasy -- Digimon Universe: Appli Monsters Digimon Universe: Appli Monsters -- Everyone in the world uses smartphone apps. But inside them lurks unknown creatures called "Appli Monsters," or "Appmon." The Appmon are AI lifeforms with the ability to think and act, and exist in the boundary between the human world and digital space. In the vast sea of the internet, the "last boss AI" Leviathan takes control of the Appmon with a virus and begins hacking every system, thus starting to control the human world from the world of the net. Haru Shinkai is led to acquire the Appli Drive, and uses it to materialize Gatchmon, a search app monster. -- -- (Source: ANN) -- 11,498 6.58
High School Agent -- -- J.C.Staff -- 2 eps -- Manga -- Action Drama Military -- High School Agent High School Agent -- Based on a manga by Tanimura Hitoshi, serialized in Comic Burger. -- -- Teenager Kanemori Kousuke is a secret agent for the international VN spy network. Using his computer hacking skills, he tracks international criminals. Later he goes after Neo-Nazis to the Arctic were they try to raise a U-boat with a sinister secret. -- -- (Source: The Anime Encyclopedia) -- OVA - Jul 1, 1987 -- 947 5.47
https://wiki.archlinux.org/index.php/Wii_hacking
200911 News of the World phone hacking scandal investigations
Automotive hacking
Baron Hacking
Billboard hacking
Biohacking
Blue chip hacking scandal
Bob Hacking
Body hacking
Douglas Hacking, 1st Baron Hacking
Google hacking
Government hacking
Growth hacking
Hacking
Hacking at Random
Hacking knife
Hacking Matter
Hacking of consumer electronics
Hacking: The Art of Exploitation
Happy Hacking Keyboard
Ian Hacking
Jamie Hacking
John Hacking
Legion of Doom (hacking)
Level Seven (hacking group)
List of documents relating to the News International phone hacking scandal
List of investigations, resignations, suspensions, and dismissals in conjunction with the news media phone hacking scandal
List of people arrested in the News International phone-hacking scandal
List of people related to the News International phone hacking scandal
List of security hacking incidents
List of victims of the News International phone hacking scandal
Metropolitan Police role in the news media phone hacking scandal
Murder of Lori Hacking
News International phone hacking scandal
News media phone hacking scandal reference lists
Patriotic hacking
Philip Hacking
Phone hacking
Port Hacking
ROM hacking
Roof and tunnel hacking
Social hacking
The Secret History of Hacking
Vietnamese airports hackings
Whacking Day


change font "color":
change "background-color":
change "font-family":
change "padding":
change "table font size":
last updated: 2022-02-04 06:11:19
254905 site hits