classes :::
children :::
branches ::: security

bookmarks: Instances - Definitions - Quotes - Chapters - Wordnet - Webgen


object:security
see also ::: survival, needs,

see also ::: needs, survival

questions, comments, suggestions/feedback, take-down requests, contribute, etc
contact me @ integralyogin@gmail.com or
join the integral discord server (chatrooms)
if the page you visited was empty, it may be noted and I will try to fill it out. cheers



now begins generated list of local instances, definitions, quotes, instances in chapters, wordnet info if available and instances among weblinks


OBJECT INSTANCES [0] - TOPICS - AUTHORS - BOOKS - CHAPTERS - CLASSES - SEE ALSO - SIMILAR TITLES

TOPICS
SEE ALSO

needs
survival

AUTH

BOOKS
Big_Mind,_Big_Heart
Journey_to_the_Lord_of_Power_-_A_Sufi_Manual_on_Retreat
Liber_157_-_The_Tao_Teh_King
Modern_Man_in_Search_of_a_Soul
Process_and_Reality
Savitri
The_Book_of_Secrets__Keys_to_Love_and_Meditation
The_Divine_Companion
The_Heros_Journey
The_Imitation_of_Christ
The_Tarot_of_Paul_Christian
The_Use_and_Abuse_of_History
The_Way_of_Perfection
The_Wit_and_Wisdom_of_Alfred_North_Whitehead

IN CHAPTERS TITLE

IN CHAPTERS CLASSNAME

IN CHAPTERS TEXT
0.00_-_INTRODUCTION
0.06_-_INTRODUCTION
01.03_-_The_Yoga_of_the_King_-_The_Yoga_of_the_Souls_Release
0_1961-11-07
0_1962-01-09
0_1962-03-11
0_1962-05-24
0_1962-11-27
0_1962-11-30
0_1962-12-04
0_1963-01-18
0_1963-03-23
0_1963-03-27
0_1963-03-30
0_1963-06-29
0_1964-03-04
0_1964-03-28
0_1964-08-22
0_1965-09-11
0_1965-09-18
0_1965-09-22
0_1965-09-25
0_1966-05-25
0_1966-09-28
0_1967-04-19
0_1967-04-22
0_1967-07-19
0_1967-08-12
0_1971-12-04
03.03_-_A_Stainless_Steel_Frame
03.03_-_The_House_of_the_Spirit_and_the_New_Creation
06.02_-_The_Way_of_Fate_and_the_Problem_of_Pain
06.23_-_Here_or_Elsewhere
07.21_-_On_Occultism
10.02_-_The_Gospel_of_Death_and_Vanity_of_the_Ideal
1.00_-_Main
1.00_-_PREFACE_-_DESCENSUS_AD_INFERNOS
1.013_-_Defence_Mechanisms_of_the_Mind
1.01_-_Archetypes_of_the_Collective_Unconscious
1.01_-_Fundamental_Considerations
1.01_-_MASTER_AND_DISCIPLE
1.025_-_Sadhana_-_Intensifying_a_Lighted_Flame
1.02_-_MAPS_OF_MEANING_-_THREE_LEVELS_OF_ANALYSIS
1.02_-_Meditating_on_Tara
1.02_-_The_7_Habits__An_Overview
1.02_-_The_Age_of_Individualism_and_Reason
1.02_-_The_Divine_Is_with_You
1.02_-_The_Magic_Circle
1.02_-_The_Three_European_Worlds
1.03_-_APPRENTICESHIP_AND_ENCULTURATION_-_ADOPTION_OF_A_SHARED_MAP
1.03_-_Preparing_for_the_Miraculous
1.03_-_Questions_and_Answers
1.03_-_Some_Aspects_of_Modern_Psycho_therapy
1.03_-_Tara,_Liberator_from_the_Eight_Dangers
1.03_-_THE_GRAND_OPTION
1.040_-_Re-Educating_the_Mind
1.04_-_THE_APPEARANCE_OF_ANOMALY_-_CHALLENGE_TO_THE_SHARED_MAP
1.05_-_2010_and_1956_-_Doomsday?
1.057_-_The_Four_Manifestations_of_Ignorance
1.05_-_Christ,_A_Symbol_of_the_Self
1.05_-_Morality_and_War
1.05_-_Problems_of_Modern_Psycho_therapy
1.05_-_Some_Results_of_Initiation
1.05_-_Splitting_of_the_Spirit
1.05_-_THE_HOSTILE_BROTHERS_-_ARCHETYPES_OF_RESPONSE_TO_THE_UNKNOWN
1.06_-_MORTIFICATION,_NON-ATTACHMENT,_RIGHT_LIVELIHOOD
1.06_-_Origin_of_the_four_castes
1.06_-_The_Sign_of_the_Fishes
1.070_-_The_Seven_Stages_of_Perfection
1.07_-_A_Song_of_Longing_for_Tara,_the_Infallible
1.07_-_THE_.IMPROVERS._OF_MANKIND
1.08_-_Phlegyas._Philippo_Argenti._The_Gate_of_the_City_of_Dis.
1.08_-_Psycho_therapy_Today
1.09_-_Fundamental_Questions_of_Psycho_therapy
1.09_-_SKIRMISHES_IN_A_WAY_WITH_THE_AGE
1.09_-_The_Guardian_of_the_Threshold
1.10_-_The_Magical_Garment
1.10_-_The_Three_Modes_of_Nature
1.10_-_THINGS_I_OWE_TO_THE_ANCIENTS
1.12_-_ON_THE_FLIES_OF_THE_MARKETPLACE
1.12_-_The_Significance_of_Sacrifice
1.13_-_The_Lord_of_the_Sacrifice
1.14_-_The_Structure_and_Dynamics_of_the_Self
1.16_-_The_Suprarational_Ultimate_of_Life
1.17_-_The_Divine_Soul
1.17_-_The_Transformation
1.19_-_Equality
1.2.01_-_The_Call_and_the_Capacity
12.01_-_The_Return_to_Earth
1.2.08_-_Faith
12.09_-_The_Story_of_Dr._Faustus_Retold
1.21_-_The_Ascent_of_Life
1.22_-_The_Necessity_of_the_Spiritual_Transformation
1.25_-_The_Knot_of_Matter
1.26_-_On_discernment_of_thoughts,_passions_and_virtues
1.28_-_Supermind,_Mind_and_the_Overmind_Maya
1.2_-_Katha_Upanishads
1.3.03_-_Quiet_and_Calm
1.37_-_Describes_the_excellence_of_this_prayer_called_the_Paternoster,_and_the_many_ways_in_which_we_shall_find_consolation_in_it.
1.39_-_Continues_the_same_subject_and_gives_counsels_concerning_different_kinds_of_temptation._Suggests_two_remedies_by_which_we_may_be_freed_from_temptations.135
1.39_-_Prophecy
1.49_-_Ancient_Deities_of_Vegetation_as_Animals
1.53_-_Mother-Love
1.60_-_Between_Heaven_and_Earth
1.65_-_Balder_and_the_Mistletoe
1.66_-_The_External_Soul_in_Folk-Tales
1.67_-_The_External_Soul_in_Folk-Custom
1.78_-_Sore_Spots
18.02_-_Ramprasad
1.80_-_Life_a_Gamble
1916_12_08p
1929-04-14_-_Dangers_of_Yoga_-_Two_paths,_tapasya_and_surrender_-_Impulses,_desires_and_Yoga_-_Difficulties_-_Unification_around_the_psychic_being_-_Ambition,_undoing_of_many_Yogis_-_Powers,_misuse_and_right_use_of_-_How_to_recognise_the_Divine_Will_-_Accept_things_that_come_from_Divine_-_Vital_devotion_-_Need_of_strong_body_and_nerves_-_Inner_being,_invariable
1929-05-12_-_Beings_of_vital_world_(vampires)_-_Money_power_and_vital_beings_-_Capacity_for_manifestation_of_will_-_Entry_into_vital_world_-_Body,_a_protection_-_Individuality_and_the_vital_world
1951-03-14_-_Plasticity_-_Conditions_for_knowing_the_Divine_Will_-_Illness_-_microbes_-_Fear_-_body-reflexes_-_The_best_possible_happens_-_Theories_of_Creation_-_True_knowledge_-_a_work_to_do_-_the_Ashram
1953-07-01
1953-08-26
1955-03-02_-_Right_spirit,_aspiration_and_desire_-_Sleep_and_yogic_repose,_how_to_sleep_-_Remembering_dreams_-_Concentration_and_outer_activity_-_Mother_opens_the_door_inside_everyone_-_Sleep,_a_school_for_inner_knowledge_-_Source_of_energy
1957-01-02_-_Can_one_go_out_of_time_and_space?_-_Not_a_crucified_but_a_glorified_body_-_Individual_effort_and_the_new_force
1958-07-16_-_Is_religion_a_necessity?
1958-09-10_-_Magic,_occultism,_physical_science
1970_02_18
1.A_-_ANTHROPOLOGY,_THE_SOUL
1f.lovecraft_-_The_Case_of_Charles_Dexter_Ward
1f.lovecraft_-_The_Crawling_Chaos
1f.lovecraft_-_The_Dream-Quest_of_Unknown_Kadath
1f.lovecraft_-_The_Green_Meadow
1f.lovecraft_-_The_Loved_Dead
1f.lovecraft_-_The_Night_Ocean
1f.lovecraft_-_The_Shadow_over_Innsmouth
1f.lovecraft_-_The_Shunned_House
1f.lovecraft_-_Till_A_the_Seas
1.jk_-_Hyperion._Book_I
1.jk_-_Otho_The_Great_-_Act_IV
1.jr_-_Rise,_Lovers
1.pbs_-_Hellas_-_A_Lyrical_Drama
1.rb_-_Paracelsus_-_Part_I_-_Paracelsus_Aspires
1.rmr_-_Fear_of_the_Inexplicable
1.sfa_-_The_Praises_of_God
1.tm_-_The_Fall
1.whitman_-_A_Carol_Of_Harvest_For_1867
1.whitman_-_As_I_Lay_With_My_Head_in_Your_Lap,_Camerado
1.ww_-_Book_Tenth_{Residence_in_France_continued]
1.ww_-_Ode_to_Duty
1.ww_-_The_Excursion-_IV-_Book_Third-_Despondency
1.ww_-_The_Excursion-_VII-_Book_Sixth-_The_Churchyard_Among_the_Mountains
2.01_-_The_Ordinary_Life_and_the_True_Soul
2.01_-_War.
2.02_-_Habit_2__Begin_with_the_End_in_Mind
2.03_-_Karmayogin__A_Commentary_on_the_Isha_Upanishad
2.03_-_The_Christian_Phenomenon_and_Faith_in_the_Incarnation
2.05_-_Habit_3__Put_First_Things_First
2.05_-_Renunciation
2.07_-_I_Also_Try_to_Tell_My_Tale
2.07_-_The_Knowledge_and_the_Ignorance
2.07_-_The_Supreme_Word_of_the_Gita
2.09_-_The_Pantacle
2.0_-_THE_ANTICHRIST
2.15_-_The_Cosmic_Consciousness
2.24_-_The_Evolution_of_the_Spiritual_Man
2.24_-_The_Message_of_the_Gita
2.26_-_The_Ascent_towards_Supermind
2.27_-_The_Gnostic_Being
2.3.02_-_The_Supermind_or_Supramental
2.3.03_-_The_Mother's_Presence
2.3.04_-_The_Mother's_Force
3.00.2_-_Introduction
3.01_-_Fear_of_God
3.01_-_Love_and_the_Triple_Path
3.01_-_Natural_Morality
3.02_-_The_Great_Secret
3.02_-_The_Practice_Use_of_Dream-Analysis
3.03_-_ON_INVOLUNTARY_BLISS
3.04_-_BEFORE_SUNRISE
3.05_-_SAL
3.07_-_The_Formula_of_the_Holy_Grail
3.09_-_The_Return_of_the_Soul
3.11_-_Spells
3.1.3_-_Difficulties_of_the_Physical_Being
3.14_-_Of_the_Consecrations
3.3.01_-_The_Superman
33.17_-_Two_Great_Wars
3-5_Full_Circle
3.7.1.03_-_Rebirth,_Evolution,_Heredity
3.7.2.03_-_Mind_Nature_and_Law_of_Karma
3_-_Commentaries_and_Annotated_Translations
4.03_-_The_Meaning_of_Human_Endeavor
4.08_-_The_Liberation_of_the_Spirit
4.09_-_The_Liberation_of_the_Nature
4.09_-_THE_SHADOW
4.10_-_The_Elements_of_Perfection
4.1.1.04_-_Foundations_of_the_Sadhana
4.11_-_THE_WELCOME
4.1.4_-_Resistances,_Sufferings_and_Falls
4.14_-_The_Power_of_the_Instruments
4.15_-_ON_SCIENCE
4.22_-_The_supramental_Thought_and_Knowledge
4.25_-_Towards_the_supramental_Time_Vision
4.2_-_Karma
4.4.5.02_-_Descent_and_Psychic_Experiences
5.01_-_EPILOGUE
5.4.02_-_Occult_Powers_or_Siddhis
6.08_-_Intellectual_Visions
6.09_-_THE_THIRD_STAGE_-_THE_UNUS_MUNDUS
6.0_-_Conscious,_Unconscious,_and_Individuation
7.04_-_Self-Reliance
7.15_-_The_Family
7_-_Yoga_of_Sri_Aurobindo
Aeneid
Apology
Big_Mind_(ten_perfections)
Blazing_P1_-_Preconventional_consciousness
Blazing_P2_-_Map_the_Stages_of_Conventional_Consciousness
Blazing_P3_-_Explore_the_Stages_of_Postconventional_Consciousness
BOOK_I._-_Augustine_censures_the_pagans,_who_attributed_the_calamities_of_the_world,_and_especially_the_sack_of_Rome_by_the_Goths,_to_the_Christian_religion_and_its_prohibition_of_the_worship_of_the_gods
BOOK_II._-_A_review_of_the_calamities_suffered_by_the_Romans_before_the_time_of_Christ,_showing_that_their_gods_had_plunged_them_into_corruption_and_vice
BOOK_III._-_The_external_calamities_of_Rome
BOOK_II._--_PART_II._THE_ARCHAIC_SYMBOLISM_OF_THE_WORLD-RELIGIONS
BOOK_I._--_PART_III._SCIENCE_AND_THE_SECRET_DOCTRINE_CONTRASTED
BOOK_IX._-_Of_those_who_allege_a_distinction_among_demons,_some_being_good_and_others_evil
BOOK_V._-_Of_fate,_freewill,_and_God's_prescience,_and_of_the_source_of_the_virtues_of_the_ancient_Romans
BOOK_XIII._-_That_death_is_penal,_and_had_its_origin_in_Adam's_sin
BOOK_XIV._-_Of_the_punishment_and_results_of_mans_first_sin,_and_of_the_propagation_of_man_without_lust
BOOK_XIX._-_A_review_of_the_philosophical_opinions_regarding_the_Supreme_Good,_and_a_comparison_of_these_opinions_with_the_Christian_belief_regarding_happiness
BOOK_XVII._-_The_history_of_the_city_of_God_from_the_times_of_the_prophets_to_Christ
BOOK_XXII._-_Of_the_eternal_happiness_of_the_saints,_the_resurrection_of_the_body,_and_the_miracles_of_the_early_Church
BS_1_-_Introduction_to_the_Idea_of_God
ENNEAD_02.03_-_Whether_Astrology_is_of_any_Value.
ENNEAD_03.02_-_Of_Providence.
ENNEAD_04.08_-_Of_the_Descent_of_the_Soul_Into_the_Body.
Gorgias
Liber_111_-_The_Book_of_Wisdom_-_LIBER_ALEPH_VEL_CXI
Prayers_and_Meditations_by_Baha_u_llah_text
r1912_07_01
r1912_11_17
r1913_06_16
r1913_06_16b
r1913_07_09
r1913_09_25
r1913_11_14
r1913_12_01b
r1913_12_31
r1914_06_22
r1915_05_22
r1920_06_20
Tablets_of_Baha_u_llah_text
Talks_With_Sri_Aurobindo_1
The_Act_of_Creation_text
The_Anapanasati_Sutta__A_Practical_Guide_to_Mindfullness_of_Breathing_and_Tranquil_Wisdom_Meditation
The_Book_of_Certitude_-_P1
The_Dwellings_of_the_Philosophers
the_Eternal_Wisdom
The_Pilgrims_Progress
Timaeus
Verses_of_Vemana

PRIMARY CLASS

SIMILAR TITLES
security

DEFINITIONS


TERMS STARTING WITH

security ::: 1. Freedom from doubt, risk, danger, or fear. 2. Freedom from doubt; confidence, assurance. 3. Something that gives or assures safety.

security "security" Protection against unauthorized access to, or alteration of, information and system resources including {CPUs}, {storage devices} and programs. Security includes: * {confidentiality} - preventing unauthorized access; {integrity} - preventing or detecting unauthorized modification of information. * {authentication} - determining whether a user is who they claim to be. * {access control} - ensuring that users can access the resources, and only the resources, that they are authorised to. * {nonrepudiation} - proof that a message came from a certain source. * availability - ensuring that a system is operational and accessible to authorised users despite hardware or software failures or attack. * privacy - allowing people to know and control how information is collected about them and how it is used. Security can also be considered in the following terms: * physical security - who can touch the system to operate or modify it, protection against the physical environment - heat, earthquake, etc. * operational/procedural security - who is authorised to do or responsible for doing what and when, who can authorise others to do what and who has to report what to who. * personnel security - hiring employees, background screening, training, security briefings, monitoring and handling departures. * System security - User access and authentication controls, assignment of privilege, maintaining file and {filesystem} integrity, {backup}, monitoring processes, log-keeping, and {auditing}. * {network security} - protecting network and telecommunications equipment, protecting network servers and transmissions, combatting eavesdropping, controlling access from untrusted networks, firewalls, and intrusion detection. {Encryption} is one important technique used to improve data security. {OWASP} is the {free} and {open} application security community. (2007-10-05)

security ::: n. --> The condition or quality of being secure; secureness.
Freedom from apprehension, anxiety, or care; confidence of power of safety; hence, assurance; certainty.
Hence, carelessness; negligence; heedlessness.
Freedom from risk; safety.
That which secures or makes safe; protection; guard; defense.
Something given, deposited, or pledged, to make certain


security through obscurity "security" Or "security by obscurity". A term applied by hackers to most {operating system} vendors' favourite way of coping with security holes - namely, ignoring them, documenting neither any known holes nor the underlying security {algorithms}, trusting that nobody will find out about them and that people who do find out about them won't exploit them. This never works for long and occasionally sets the world up for debacles like the {RTM} worm of 1988 (see {Great Worm}), but once the brief moments of panic created by such events subside most vendors are all too willing to turn over and go back to sleep. After all, actually fixing the bugs would siphon off the resources needed to implement the next user-interface frill on marketing's wish list - and besides, if they started fixing security bugs customers might begin to *expect* it and imagine that their warranties of merchantability gave them some sort of rights. Historical note: There are conflicting stories about the origin of this term. It has been claimed that it was first used in the {Usenet} newsgroup in {news:comp.sys.apollo} during a campaign to get {HP}/{Apollo} to fix security problems in its {Unix}-{clone} {Aegis}/{DomainOS} (they didn't change a thing). {ITS} fans, on the other hand, say it was coined years earlier in opposition to the incredibly paranoid {Multics} people down the hall, for whom security was everything. In the ITS culture it referred to (1) the fact that by the time a {tourist} figured out how to make trouble he'd generally got over the urge to make it, because he felt part of the community; and (2) (self-mockingly) the poor coverage of the documentation and obscurity of many commands. One instance of *deliberate* security through obscurity is recorded; the command to allow patching the running ITS system ({altmode} altmode control-R) echoed as $$^D. If you actually typed alt alt ^D, that set a flag that would prevent patching the system even if you later got it right. [{Jargon File}] (1994-12-15)

security through obscurity ::: (security) Or security by obscurity. A term applied by hackers to most operating system vendors' favourite way of coping with security holes - namely, started fixing security bugs customers might begin to *expect* it and imagine that their warranties of merchantability gave them some sort of rights.Historical note: There are conflicting stories about the origin of this term. It has been claimed that it was first used in the Usenet newsgroup in typed alt alt ^D, that set a flag that would prevent patching the system even if you later got it right.[Jargon File] (1994-12-15)

security vulnerability {vulnerability}

Security - 1. collateral in support of debt. An example is real estate that serves as security for a bank loan. Or 2. financial instrument that shows ownership, such as an equity item (e.g., stock), debt instrument (e.g., bond, note), or right (e.g., option).

Security Administrator's Integrated Network Tool ::: (networking, security, tool) (SAINT, originally Security Administrator Tool for Analyzing Networks, SATAN) A tool written by Dan Farmer and Wietse a database. The results can be viewed with an web browser. SAINT requires Perl 5.000 or better.In its simplest mode, SAINT gathers as much information about remote hosts and networks as possible by examining such network services as finger, NFS, NIS, topology, network services running, and types of hardware and software being used on the network.SAINT can also be used in exploratory mode. Based on the initial data collection and a user configurable ruleset, it will examine the avenues of trust and real implications inherent in network trust and services and help them make reasonably educated decisions about the security level of the systems involved. . . .(2000-08-12)

Security Administrator's Integrated Network Tool "networking, security, tool" (SAINT, originally "Security Administrator Tool for Analyzing Networks", SATAN) A tool written by Dan Farmer and Wietse Venema which remotely probes systems via the {network} and stores its findings in a {database}. The results can be viewed with an {web browser}. SAINT requires {Perl} 5.000 or better. In its simplest mode, SAINT gathers as much information about remote hosts and networks as possible by examining such network services as {finger}, {NFS}, {NIS}, {FTP}, {TFTP}, {rexd}, and other services. The information gathered includes the presence of various network information services as well as potential security flaws - usually in the form of incorrectly setup or configured network services, well-known {bugs} in system or network utilities, or poor or ignorant policy decisions. It can then either report on this data or use a simple rule-based system to investigate any potential security problems. Users can then examine, query, and analyze the output with a {web browser}. While the program is primarily geared toward analysing the security implications of the results, a great deal of general network information can be gained when using the tool - network topology, network services running, and types of hardware and software being used on the network. SAINT can also be used in exploratory mode. Based on the initial data collection and a user configurable ruleset, it will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts. This not only allows the user to analyse his own network, but also to examine the real implications inherent in network trust and services and help them make reasonably educated decisions about the security level of the systems involved. {(http://wwdsi.com/saint/)}. {Old SATAN page (http://fish.com/satan/)}. {Mailing list (http://wwdsi.com/saint/list_server.html)}. (2000-08-12)

Security Association ID "networking" (SAID) A 32-bit field added to {packet} headers for {encryption} and {authentication} in the proposed {Internet Protocol Version 6}. (1997-07-09)

Security Association ID ::: (networking) (SAID) A 32-bit field added to packet headers for encryption and authentication in the proposed Internet Protocol Version 6. (1997-07-09)

Security Association "networking" The relationship between two or more entities (typically, a computer, but could be a user on a computer, or software component) which describes how the entities will use security services, such as {encryption}, to communicate. See {RFC 1825}. (1997-07-09)

Security Association ::: (networking) The relationship between two or more entities (typically, a computer, but could be a user on a computer, or software component) which describes how the entities will use security services, such as encryption, to communicate.See RFC 1825. (1997-07-09)

Security Zone ::: The territory in southern Lebanon with Israeli military presence from 1983-2000.


TERMS ANYWHERE

3. In its historical aspect, aristocracy is a definite class or order known as hereditary nobility, which possesses prescriptive rank and privileges. This group developed from primitive monarchy, by the gradual limitation of the regal authority by those who formed the council of the king. The defense of their prerogatives led them naturally to consider themselves as a separate class fitted by birthright to monopolize government. But at the same time, they assumed a number of corresponding obligations (hence the aphorism noblesse oblige) particularly for maintaining justice, peace and security. [The characteristics of hereditary aristocracy are: descent and birthright, breeding and education, power to command, administrative and military capacities, readiness to fulfill personal and national obligations, interest in field sports, social equality of its members, aloofness and exclusiveness, moral security in the possession of real values regardless of criticism, competition or advancement.] In certain societies as in Great Britain, birth-right is not an exclusive factor: exceptional men are admitted by recognition into the aristocratic circle (circulation of the elite), after a tincture of breeding satisfying its external standards. The decline of hereditary nobility was due to economic rather than to social or political changes. Now aristocracy can claim only a social influence.

9PAC "tool" 709 PACkage. A {report generator} for the {IBM 7090}, developed in 1959. [Sammet 1969, p.314. "IBM 7090 Prog Sys, SHARE 7090 9PAC Part I: Intro and Gen Princs", IBM J28-6166, White Plains, 1961]. (1995-02-07):-) {emoticon}; {semicolon}" {less than}"g" "chat" grin. An alternative to {smiley}. [{Jargon File}] (1998-01-18)"gr&d" "chat" Grinning, running and ducking. See {emoticon}. (1995-03-17)= {equals}" {greater than}? {question mark}?? "programming" A {Perl} quote-like {operator} used to delimit a {regular expression} (RE) like "?FOO?" that matches FOO at most once. The normal "/FOO/" form of regular expression will match FOO any number of times. The "??" operator will match again after a call to the "reset" operator. The operator is usually referred to as "??" but, taken literally, an empty RE like this (or "//") actually means to re-use the last successfully matched regular expression or, if there was none, empty string (which will always match). {Unix manual page}: perlop(1). (2009-05-28)@ {commercial at}@-party "event, history" /at'par-tee/ (Or "@-sign party") An antiquated term for a gathering of {hackers} at a science-fiction convention (especially the annual Worldcon) to which only people who had an {electronic mail address} were admitted. The term refers to the {commercial at} symbol, "@", in an e-mail address and dates back to the era when having an e-mail address was a distinguishing characteristic of the select few who worked with computers. Compare {boink}. [{Jargon File}] (2012-11-17)@Begin "text" The {Scribe} equivalent of {\begin}. [{Jargon File}] (2014-11-06)@stake "security, software" A computer security development group and consultancy dedicated to researching and documenting security flaws that exist in {operating systems}, {network} {protocols}, or software. @stake publishes information about security flaws through advisories, research reports, and tools. They release the information and tools to help system administrators, users, and software and hardware vendors better secure their systems. L0pht merged with @stake in January 2000. {@stake home (http://atstake.com/research/redirect.html)}. (2003-06-12)@XX "programming" 1. Part of the syntax of a {decorated name}, as used internally by {Microsoft}'s {Visual C} or {Visual C++} {compilers}. 2. The name of an example {instance variable} in the {Ruby} {programming language}. (2018-08-24)[incr Tcl] "language" An extension of {Tcl} that adds {classes} and {inheritence}. The name is a pun on {C++} - an {object-oriented} extension of {C} - [incr variable] is the Tcl {syntax} for adding one to a variable. [Origin? Availability?] (1998-11-27)\ {backslash}\begin "text, chat" The {LaTeX} command used with \end to delimit an environment within which the text is formatted in a certain way. E.g. \begin{table}...\end{table}. Used humorously in writing to indicate a context or to remark on the surrounded text. For example: \begin{flame} Predicate logic is the only good programming language. Anyone who would use anything else is an idiot. Also, all computers should be tredecimal instead of binary. \end{flame} {Scribe} users at {CMU} and elsewhere used to use @Begin/@End in an identical way (LaTeX was built to resemble Scribe). On {Usenet}, this construct would more frequently be rendered as ""FLAME ON"" and ""FLAME OFF"" (a la {HTML}), or "

A1 security {Orange Book}

access point "networking" (AP) Any device that acts as a communication hub to allow users of a {wireless network} to connect to a {wired LAN}. APs are important for providing heightened wireless {security} and for extending the physical range of service a wireless user has access to. (2010-03-21)

accounting management "networking" The process of identifying individual and group access to various network resources to ensure proper access capabilities ({bandwidth} and security) or to properly charge the various individuals and departments. Accounting management is one of five categories of {network management} defined by {ISO} for management of {OSI} {networks}. (1997-05-05)

A deep quietude vvhere no disturbance can come — a quietude with a sense of established security and release.

adjudication ::: n. --> The act of adjudicating; the act or process of trying and determining judicially.
A deliberate determination by the judicial power; a judicial decision or sentence.
The decision upon the question whether the debtor is a bankrupt.
A process by which land is attached security or in satisfaction of a debt.


adware "software" Any kind of {software} that displays advertisements while it is running. The display of adverts is sometimes incidental to the software's main purpose (e.g. a game). In the case of a piece of {malware}, the adverts may be its only purpose, possibly hidden behind a pretence of providing some desired function like a security scanner. The adware's distributors may get paid for every machine infected. The adverts may vary in obtrusiveness from occasional or out-of-the-way images, audio or video to blocking access to the desired function while the advert is presented. {Nagware} is a special case of adware where the advert is for a license for, or upgrade to, the program itself. (2018-12-13)

AES ::: 1. (programming) Application environment specification.2. (security) Advanced Encryption Standard.

AES 1. "programming" {Application environment specification}. 2. "security" {Advanced Encryption Standard}.

anchor ::: 1. Any of various devices dropped by a chain, cable, or rope to the bottom of a body of water for preventing or restricting the motion of a vessel or other floating object, typically having broad, hooklike arms that bury themselves in the bottom to provide a firm hold. 2. A person or thing that can be relied on for support, stability, or security; mainstay.

anchorage ::: n. --> The act of anchoring, or the condition of lying at anchor.
A place suitable for anchoring or where ships anchor; a hold for an anchor.
The set of anchors belonging to a ship.
Something which holds like an anchor; a hold; as, the anchorages of the Brooklyn Bridge.
Something on which one may depend for security; ground


anchor-hold ::: n. --> The hold or grip of an anchor, or that to which it holds.
Hence: Firm hold: security.


applet "web" A {Java} program which can be distributed as an attachment in a {web} document and executed by a Java-enabled {web browser} such as Sun's {HotJava}, {Netscape Navigator} version 2.0, or {Internet Explorer}. Navigator severely restricts the applet's file system and network access in order to prevent accidental or deliberate security violations. Full Java applications, which run outside of the browser, do not have these restrictions. Web browsers can also be extended with {plug-ins} though these differ from applets in that they usually require manual installation and are {platform}-specific. Various other languages can now be embedded within {HTML} documents, the most common being {JavaScript}. Despite Java's aim to be a "write once, run anywhere" language, the difficulty of accomodating the variety of browsers in use on the Internet has led many to abandon client-side processing in favour of {server}-side Java programs for which the term {servlet} was coined. Merriam Webster "Collegiate Edition" gives a 1990 definition: a short application program especially for performing a simple specific task. (2002-07-12)

applet ::: (World-Wide Web) A Java program which can be distributed as an attachment in a World-Wide Web document and executed by a Java-enabled web browser such as Sun's HotJava, Netscape Navigator version 2.0, or Internet Explorer.Navigator severely restricts the applet's file system and network access in order to prevent accidental or deliberate security violations. Full Java applications, which run outside of the browser, do not have these restrictions.Web browsers can also be extended with plug-ins though these differ from applets in that they usually require manual installation and are platform-specific. Various other languages can now be embedded within HTML documents, the most common being JavaScript.Despite Java's aim to be a write once, run anywhere language, the difficulty of accomodating the variety of browsers in use on the Internet has led many to abandon client-side processing in favour of server-side Java programs for which the term servlet was coined.Merriam Webster Collegiate Edition gives a 1990 definition: a short application program especially for performing a simple specific task.(2002-07-12)

armed ::: imp. & p. p. --> of Arm ::: a. --> Furnished with weapons of offense or defense; furnished with the means of security or protection.
Furnished with whatever serves to add strength, force, or efficiency.


arming ::: providing with whatever will add strength, force, or security; support; fortify.

armour ::: 1. Any covering worn as a defense against weapons, especially a metallic sheathing, suit of armour, mail. 2. Any quality, characteristic, situation, or thing that serves as protection. armours, armoured.* n. 1. Weapons. v. 2. Provides with weapons or whatever will add strength, force or security; supports; fortifies. *armed, arming.

arms ::: n. 1. Weapons. v. 2. Provides with weapons or whatever will add strength, force or security; supports; fortifies. armed, arming.

assignat ::: n. --> One of the notes, bills, or bonds, issued as currency by the revolutionary government of France (1790-1796), and based on the security of the lands of the church and of nobles which had been appropriated by the state.

Association Control Service Element "networking" (ACSE) The {OSI} method for establishing a call between two {application programs}. ACSE checks the identities and contexts of the application entities, and could apply an {authentication} security check. Documents: {ITU} Rec. X.227 ({ISO} 8650), X.217 (ISO 8649) (1997-12-07)

Association Control Service Element ::: (networking) (ACSE) The OSI method for establishing a call between two application programs. ACSE checks the identities and contexts of the application entities, and could apply an authentication security check.Documents: ITU Rec. X.227 (ISO 8650), X.217 (ISO 8649) (1997-12-07)

assured ::: 1. Made certain; guaranteed. 2. Certified, verified. 3. Made secure or certain; confirmed. 4. Confident, characterized by certainty or security; satisfied as to the truth of something. assuring.

asylum ::: n. --> A sanctuary or place of refuge and protection, where criminals and debtors found shelter, and from which they could not be forcibly taken without sacrilege.
Any place of retreat and security.
An institution for the protection or relief of some class of destitute, unfortunate, or afflicted persons; as, an asylum for the aged, for the blind, or for the insane; a lunatic asylum; an orphan asylum.


attacks as a service "security, legal" A kind of {cybercrime as a service} in which the service provider performs {denial of service} attacks on behalf of others for money. (2015-02-23)

authentication ::: (security) The verification of the identity of a person or process. In a communication system, authentication verifies that messages really come from their stated source, like the signature on a (paper) letter.(2001-03-16)

authentication "security" The verification of the identity of a person or process. In a communication system, authentication verifies that messages really come from their stated source, like the signature on a (paper) letter. The most common form of authentication is typing a user name (which may be widely known or easily guessable) and a corresponding {password} that is presumed to be known only to the individual being authenticated. Another form of authentication is {biometrics}. (2007-02-22)

aventine ::: a. --> Pertaining to Mons Aventinus, one of the seven hills on which Rome stood. ::: n. --> A post of security or defense.

B1 security {Orange Book}

B2 security ::: Orange Book

B2 security {Orange Book}

B3 security {Orange Book}

back door "security" (Or "{trap door}", "{wormhole}"). A hole in the security of a system deliberately left in place by designers or maintainers. The motivation for such holes is not always sinister; some {operating systems}, for example, come out of the box with privileged accounts intended for use by field service technicians or the vendor's maintenance programmers. See also {iron box}, {cracker}, {worm}, {logic bomb}. Historically, back doors have often lurked in systems longer than anyone expected or planned, and a few have become widely known. The infamous {RTM} worm of late 1988, for example, used a back door in the {BSD} Unix "sendmail(8)" {utility}. {Ken Thompson}'s 1983 Turing Award lecture to the {ACM} revealed the existence of a back door in early {Unix} versions that may have qualified as the most fiendishly clever security hack of all time. The C compiler contained code that would recognise when the "login" command was being recompiled and insert some code recognizing a password chosen by Thompson, giving him entry to the system whether or not an account had been created for him. Normally such a back door could be removed by removing it from the source code for the compiler and recompiling the compiler. But to recompile the compiler, you have to *use* the compiler - so Thompson also arranged that the compiler would *recognise when it was compiling a version of itself*, and insert into the recompiled compiler the code to insert into the recompiled "login" the code to allow Thompson entry - and, of course, the code to recognise itself and do the whole thing again the next time around! And having done this once, he was then able to recompile the compiler from the original sources; the hack perpetuated itself invisibly, leaving the back door in place and active but with no trace in the sources. The talk that revealed this truly moby hack was published as ["Reflections on Trusting Trust", "Communications of the ACM 27", 8 (August 1984), pp. 761--763]. [{Jargon File}] (1995-04-25)

back door ::: (security) (Or trap door, wormhole). A hole in the security of a system deliberately left in place by designers or maintainers. The motivation technicians or the vendor's maintenance programmers. See also iron box, cracker, worm, logic bomb.Historically, back doors have often lurked in systems longer than anyone expected or planned, and a few have become widely known. The infamous RTM worm of late 1988, for example, used a back door in the BSD Unix sendmail(8) utility.Ken Thompson's 1983 Turing Award lecture to the ACM revealed the existence of a back door in early Unix versions that may have qualified as the most fiendishly recognizing a password chosen by Thompson, giving him entry to the system whether or not an account had been created for him.Normally such a back door could be removed by removing it from the source code for the compiler and recompiling the compiler. But to recompile the compiler, itself invisibly, leaving the back door in place and active but with no trace in the sources.The talk that revealed this truly moby hack was published as [Reflections on Trusting Trust, Communications of the ACM 27, 8 (August 1984), pp. 761--763].[Jargon File] (1995-04-25)

bail ::: n. --> A bucket or scoop used in bailing water out of a boat.
Custody; keeping.
The person or persons who procure the release of a prisoner from the custody of the officer, or from imprisonment, by becoming surely for his appearance in court.
The security given for the appearance of a prisoner in order to obtain his release from custody of the officer; as, the man is out on bail; to go bail for any one.


biometrics "security, hardware" The use of special input devices to analyse some physical parameter assumed to be unique to an individual, in order to confirm their identity as part of an {authentication} procedure. Examples include {fingerprint scanning}, {iris recognition}, {facial recognition}, voice recognition ({speaker recognition}), {signature}, {vascular pattern recognition}. {(http://www.findbiometrics.com/Pages/guide2.html)}. (2007-02-22)

biz-core stability "security" {Internet} security products which secure the {business core}. [Examples?] (2003-03-09)

biz-core stability ::: (security) Internet security products which secure the business core.[Examples?](2003-03-09)

black hat "security" Someone who uses his skills for criminal or malicious ends. Black hat activities may include, e.g., writing destructive {viruses}, launching {denial of service} attacks on websites, or stealing credit card numbers or banking data by {phishing}. (2019-03-16)

BlackIce ::: (software, security) A commercial firewall and intrusion detection system. .(2003-09-13)

BlackIce "software, security" A commercial {firewall} and {intrusion detection} system. {BlackIce Home (http://blackice.iss.net/)}. (2003-09-13)

blivet ::: /bliv'*t/ [allegedly from a World War II military term meaning ten pounds of manure in a five-pound bag] 1. An intractable problem.2. A crucial piece of hardware that can't be fixed or replaced if it breaks.3. A tool that has been hacked over by so many incompetent programmers that it has become an unmaintainable tissue of hacks.4. An out-of-control but unkillable development effort.5. An embarrassing bug that pops up during a customer demo.6. In the subjargon of computer security specialists, a denial-of-service attack performed by hogging limited resources that have no access controls (for example, shared spool space on a multi-user system).This term has other meanings in other technical cultures; among experimental physicists and hardware engineers of various kinds it seems to mean any random fork that appears to depict a three-dimensional object until one realises that the parts fit together in an impossible way.[Jargon File]

blivet /bliv'*t/ [allegedly from a World War II military term meaning "ten pounds of manure in a five-pound bag"] 1. An intractable problem. 2. A crucial piece of hardware that can't be fixed or replaced if it breaks. 3. A tool that has been hacked over by so many incompetent programmers that it has become an unmaintainable tissue of hacks. 4. An out-of-control but unkillable development effort. 5. An embarrassing bug that pops up during a customer demo. 6. In the subjargon of computer security specialists, a denial-of-service attack performed by hogging limited resources that have no access controls (for example, shared spool space on a multi-user system). This term has other meanings in other technical cultures; among experimental physicists and hardware engineers of various kinds it seems to mean any random object of unknown purpose (similar to hackish use of {frob}). It has also been used to describe an amusing trick-the-eye drawing resembling a three-pronged fork that appears to depict a three-dimensional object until one realises that the parts fit together in an impossible way. [{Jargon File}]

bon ::: a. --> Good; valid as security for something.

bondsman ::: n. --> A slave; a villain; a serf; a bondman.
A surety; one who is bound, or who gives security, for another.


bot 1. "networking, chat, web" (From "{robot}") Any type of autonomous {software} that operates as an {agent} for a user or a {program} or simulates a human activity. On the {Internet}, the most popular bots are programs (called {spiders} or crawlers) used for searching. They access {web sites}, retrieve documents and follow all the {hypertext links} in them; then they generate catalogs that are accessed by {search engines}. A {chatbot} converses with humans (or other bots). A {shopbot} searches the Web to find the best price for a product. Other bots (such as {OpenSesame}) observe a user's patterns in navigating a website and customises the site for that user. A {knowbot} collects specific information from {websites}. 2. "security" A computer that has been conscripted into a {botnet}. (2019-03-16)

botnet "security" A large number of hijacked computers controlled by a {botmaster} via the Internet. Some botnets have been estimated to include hundreds of thousands of computers. Botnets are sometimes rented out, sometimes for as little as 4 cents per machine. The machines are recruited via a {virus} (e.g. sent by {e-mail}), a {drive-by download} or a {worm}. (2019-03-16)

bottomry ::: n. --> A contract in the nature of a mortgage, by which the owner of a ship, or the master as his agent, hypothecates and binds the ship (and sometimes the accruing freight) as security for the repayment of money advanced or lent for the use of the ship, if she terminates her voyage successfully. If the ship is lost by perils of the sea, the lender loses the money; but if the ship arrives safe, he is to receive the money lent, with the interest or premium stipulated, although it may, and usually does, exceed the legal rate of interest. See

security ::: 1. Freedom from doubt, risk, danger, or fear. 2. Freedom from doubt; confidence, assurance. 3. Something that gives or assures safety.

security "security" Protection against unauthorized access to, or alteration of, information and system resources including {CPUs}, {storage devices} and programs. Security includes: * {confidentiality} - preventing unauthorized access; {integrity} - preventing or detecting unauthorized modification of information. * {authentication} - determining whether a user is who they claim to be. * {access control} - ensuring that users can access the resources, and only the resources, that they are authorised to. * {nonrepudiation} - proof that a message came from a certain source. * availability - ensuring that a system is operational and accessible to authorised users despite hardware or software failures or attack. * privacy - allowing people to know and control how information is collected about them and how it is used. Security can also be considered in the following terms: * physical security - who can touch the system to operate or modify it, protection against the physical environment - heat, earthquake, etc. * operational/procedural security - who is authorised to do or responsible for doing what and when, who can authorise others to do what and who has to report what to who. * personnel security - hiring employees, background screening, training, security briefings, monitoring and handling departures. * System security - User access and authentication controls, assignment of privilege, maintaining file and {filesystem} integrity, {backup}, monitoring processes, log-keeping, and {auditing}. * {network security} - protecting network and telecommunications equipment, protecting network servers and transmissions, combatting eavesdropping, controlling access from untrusted networks, firewalls, and intrusion detection. {Encryption} is one important technique used to improve data security. {OWASP} is the {free} and {open} application security community. (2007-10-05)

security ::: n. --> The condition or quality of being secure; secureness.
Freedom from apprehension, anxiety, or care; confidence of power of safety; hence, assurance; certainty.
Hence, carelessness; negligence; heedlessness.
Freedom from risk; safety.
That which secures or makes safe; protection; guard; defense.
Something given, deposited, or pledged, to make certain


security through obscurity "security" Or "security by obscurity". A term applied by hackers to most {operating system} vendors' favourite way of coping with security holes - namely, ignoring them, documenting neither any known holes nor the underlying security {algorithms}, trusting that nobody will find out about them and that people who do find out about them won't exploit them. This never works for long and occasionally sets the world up for debacles like the {RTM} worm of 1988 (see {Great Worm}), but once the brief moments of panic created by such events subside most vendors are all too willing to turn over and go back to sleep. After all, actually fixing the bugs would siphon off the resources needed to implement the next user-interface frill on marketing's wish list - and besides, if they started fixing security bugs customers might begin to *expect* it and imagine that their warranties of merchantability gave them some sort of rights. Historical note: There are conflicting stories about the origin of this term. It has been claimed that it was first used in the {Usenet} newsgroup in {news:comp.sys.apollo} during a campaign to get {HP}/{Apollo} to fix security problems in its {Unix}-{clone} {Aegis}/{DomainOS} (they didn't change a thing). {ITS} fans, on the other hand, say it was coined years earlier in opposition to the incredibly paranoid {Multics} people down the hall, for whom security was everything. In the ITS culture it referred to (1) the fact that by the time a {tourist} figured out how to make trouble he'd generally got over the urge to make it, because he felt part of the community; and (2) (self-mockingly) the poor coverage of the documentation and obscurity of many commands. One instance of *deliberate* security through obscurity is recorded; the command to allow patching the running ITS system ({altmode} altmode control-R) echoed as $$^D. If you actually typed alt alt ^D, that set a flag that would prevent patching the system even if you later got it right. [{Jargon File}] (1994-12-15)

security vulnerability {vulnerability}

By way of connoting different types of society, many contemporary Marxists, especially in the U.S.S.R., building upon Marx's analysis of the two phases of "communist society" ("Gotha Program") designate the first or lower phase by the term socialism, the second or higher by the term communism (q.v.). The general features of socialist society (identified by Soviet thinkers with the present phase of development of the U.S.S.R.) are conceived as follows: Economic collective ownership of the means of production, such as factories, industrial equipment, the land, and of the basic apparatus of distribution and exchange, including the banking system; the consequent abolition of classes, private profit, exploitation, surplus value, (q.v.) private hiring and firing and involuntary unemployment; an integrated economy based on long time planning in terms of needs and use. It is held that only under these economic conditions is it possible to apply the formula, "from each according to ability, to each according to work performed", the first part of which implies continuous employment, and the second part, the absence of private profit. Political: a state based upon the dictatorship of the proletariat (q.v.) Cultural the extension of all educational and cultural facilities through state planning; the emancipation of women through unrestricted economic opportunities, the abolition of race discrimination through state enforcement, a struggle against all cultural and social institutions which oppose the socialist society and attempt to obstruct its realization. Marx and Engels held that socialism becomes the inevitable outgrowth of capitalism because the evolution of the latter type of society generates problems which can only be solved by a transition to socialism. These problems are traced primarily to the fact that the economic relations under capitalism, such as individual ownership of productive technics, private hiring and firing in the light of profits and production for a money market, all of which originally released powerful new productive potentialities, come to operate, in the course of time, to prevent full utilization of productive technics, and to cause periodic crises, unemployment, economic insecurity and consequent suffering for masses of people. Marx and Engels regarded their doctrine of the transformation of capitalist into socialist society as based upon a scientific examination of the laws of development of capitalism and a realistic appreciation of the role of the proletariat. (q.v.) Unlike the Utopian socialism (q.v.) of St. Simon, Fourier, Owen (q.v.) and others, their socialism asserted the necessity of mass political organization of the working classes for the purpose of gaining political power in order to effect the transition from capitalism, and also foresaw the probability of a contest of force in which, they held, the working class majority would ultimately be victorious. The view taken is that Marx was the first to explain scientifically the nature of capitalist exploitation as based upon surplus value and to predict its necessary consequences. "These two great discoveries, the materialist conception of history and the revelation of the secret of capitalist production by means of surplus value we owe to Marx. With these discoveries socialism became a science . . ." (Engels: Anti-Dühring, pp. 33-34.) See Historical materialism. -- J.M.S.

C1 security {Orange Book}

C2 security {Orange Book}

callback 1. "programming" A scheme used in {event-driven} programs where the program registers a {subroutine} (a "callback handler") to handle a certain {event}. The program does not call the handler directly but when the event occurs, the {run-time system} calls the handler, usually passing it arguments to describe the event. 2. "communications, security" A {user authentication} scheme used by some computers running {dial-up} services. The user dials in to the computer and gives his {user name} and {password}. The computer then hangs up the connection and uses an {auto-dial} {modem} to call back to the user's registered telephone number. Thus, if an unauthorised person discovers a user's password, the callback will go, not to him, but to the owner of that login who will then know that his account is under attack. However, some {PABXs} can be fooled into thinking that the caller has hung up by sending them a dial tone. When the computer tries to call out on the same line it is not actually dialing through to the authorised user but is still connected to the original caller. 3. "communications" {cost control callback}. (2003-07-13)

callback ::: 1. (programming) A scheme used in event-driven programs where the program registers a subroutine (a callback handler) to handle a certain event. The run-time system calls the handler, usually passing it arguments to describe the event.2. (communications, security) A user authentication scheme used by some computers running dial-up services. The user dials in to the computer and gives to him, but to the owner of that login who will then know that his account is under attack.However, some PABXs can be fooled into thinking that the caller has hung up by sending them a dial tone. When the computer tries to call out on the same line it is not actually dialing through to the authorised user but is still connected to the original caller.3. (communications) cost control callback.(2003-07-13)

Canonical Encoding Rules ::: (protocol, standard) (CER) A restricted variant of BER for producing unequivocal transfer syntax for data structures described by ASN.1.Whereas BER gives choices as to how data values may be encoded, CER and DER select just one encoding from those allowed by the basic encoding rules, eliminating all of the options. They are useful when the encodings must be preserved, e.g. in security exchanges.CER and DER differ in the set of restrictions that they place on the encoder. The basic difference between CER and DER is that DER uses definitive length form and CER uses indefinite length form.Documents: ITU-T X.690, ISO 8825-1.See also PER. (1998-05-19)

Canonical Encoding Rules "protocol, standard" (CER) A restricted variant of {BER} for producing unequivocal {transfer syntax} for data structures described by {ASN.1}. Whereas {BER} gives choices as to how data values may be encoded, CER and {DER} select just one encoding from those allowed by the basic encoding rules, eliminating all of the options. They are useful when the encodings must be preserved, e.g. in security exchanges. CER and {DER} differ in the set of restrictions that they place on the encoder. The basic difference between CER and {DER} is that {DER} uses definitive length form and CER uses indefinite length form. Documents: {ITU-T} X.690, {ISO} 8825-1. See also {PER}. (1998-05-19)

capability "operating system, security" An {operating system} security or access control model where specific types of access to a specific object are granted by giving a process this data structure or {token}. The token may be unforgeable (typically by using {encryption} or hardware "tagged" memory). Capabilities are used in OSes such as {Hydra}, {KeyKOS}, {EROS}, {Chorus}/{Mix}, and the {Stanford V system}. Similar to {Kerberos}, but in an OS context. Compare {access control list}. (1998-03-08)

capability ::: (operating system, security) An operating system security or access control model where specific types of access to a specific object are granted by giving a process this data structure or token.The token may be unforgeable (typically by using encryption or hardware tagged memory). Capabilities are used in OSes such as Hydra, KeyKOS, EROS, Chorus/Mix, and the Stanford V system. Similar to Kerberos, but in an OS context.Compare access control list. (1998-03-08)

CAPTCHA "security" A type of test used to determine whether a request to a {website} comes from a human or a computer program, typically by asking the user to perform some kind of {image recognition} task such as reading distorted text. The term was coined in 2000 by Luis von Ahn, Manuel Blum, Nicholas J. Hopper (all of {Carnegie Mellon University}) and John Langford (of {IBM}) as a contrived acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart". CAPTCHA aims to prevent software tools from performing actions which might degrade the service, such as registering user accounts or automating the playing of a game. (2009-01-02)

carrier scanner ::: (security) (Or wardialer) A program which uses a modem to dial a series of phone numbers (say, from 770-0000 to 770-9999), and keeps a log of what phone numbers answer with a modem carrier. The results of such a search were generally used by people looking to engage in random mischief in random machines.Since the 1980s, wardialers have generally fallen into disuse, partly because of easily available caller ID technology, partly because fax machines are now in because there are so many new and more interesting venues for computerised mischief these days. (1997-03-16)

carrier scanner "security" (Or "wardialer") A program which uses a {modem} to dial a series of phone numbers (say, from 770-0000 to 770-9999), and keeps a log of what phone numbers answer with a modem {carrier}. The results of such a search were generally used by people looking to engage in {random} mischief in {random} machines. Since the 1980s, wardialers have generally fallen into disuse, partly because of easily available "{caller ID}" technology, partly because fax machines are now in wide use and would often be logged as a {carrier} by a wardialer, and partly because there are so many new and more interesting venues for computerised mischief these days. (1997-03-16)

cautionary ::: a. --> Conveying a caution, or warning to avoid danger; as, cautionary signals.
Given as a pledge or as security.
Wary; cautious.


caution ::: n. --> A careful attention to the probable effects of an act, in order that failure or harm may be avoided; prudence in regard to danger; provident care; wariness.
Security; guaranty; bail.
Precept or warning against evil of any kind; exhortation to wariness; advice; injunction. ::: v. t.


Challenge-Handshake Authentication Protocol "networking, security, standard, protocol" (CHAP) An {authentication} scheme used by {PPP} servers to validate the identity of the originator of the connection upon connection or any time later. CHAP applies a three-way {handshaking} procedure. After the link is established, the server sends a "challenge" message to the originator. The originator responds with a value calculated using a {one-way hash function}. The server checks the response against its own calculation of the expected hash value. If the values match, the authentication is acknowledged; otherwise the connection is usually terminated. CHAP provides protection against {playback} attack through the use of an incrementally changing identifier and a variable challenge value. The authentication can be repeated any time while the connection is open limiting the time of exposure to any single attack, and the server is in control of the frequency and timing of the challenges. As a result, CHAP provides greater security then {PAP}. CHAP is defined in {RFC} 1334. (1996-03-05)

Challenge-Handshake Authentication Protocol ::: (networking, security, standard, protocol) (CHAP) An authentication scheme used by PPP servers to validate the identity of the originator of the connection upon connection or any time later.CHAP applies a three-way handshaking procedure. After the link is established, the server sends a challenge message to the originator. The originator the values match, the authentication is acknowledged; otherwise the connection is usually terminated.CHAP provides protection against playback attack through the use of an incrementally changing identifier and a variable challenge value. The frequency and timing of the challenges. As a result, CHAP provides greater security then PAP.CHAP is defined in RFC 1334. (1996-03-05)

Common Gateway Interface "web" (CGI) A {standard} for running external {programs} from a {web} {HTTP} {server}. CGI specifies how to pass {arguments} to the program as part of the HTTP request. It also defines a set of {environment variables} that are made available to the program. The program generates output, typically {HTML}, which the web server processes and passes back to the {browser}. Alternatively, the program can request {URL redirection}. CGI allows the returned output to depend in any arbitrary way on the request. The CGI program can, for example, access information in a {database} and format the results as HTML. The program can access any data that a normal application program can, however the facilities available to CGI programs are usually limited for security reasons. Although CGI programs can be compiled programs, they are more often written in a (semi) {interpreted language} such as {Perl}, or as {Unix} {shell scripts}, hence the common name "CGI script". Here is a trivial CGI script written in Perl. (It requires the "CGI" module available from {CPAN}).

Common Gateway Interface ::: (World-Wide Web) (CGI) A standard for running external programs from a World-Wide Web HTTP server. CGI specifies how to pass arguments to the program the program can request URL redirection. CGI allows the returned output to depend in any arbitrary way on the request.The CGI program can, for example, access information in a database and format the results as HTML. The program can access any data that a normal application program can, however the facilities available to CGI programs are usually limited for security reasons.Although CGI programs can be compiled programs, they are more often written in a (semi) interpreted language such as Perl, or as Unix shell scripts, hence the common name CGI script.Here is a trivial CGI script written in Perl. (It requires the CGI module available from CPAN).

computer security ::: security

computer security {security}

Computer Emergency Response Team "security, body" (CERT) An organisation formed by {DARPA} in November 1988 in response to the {Internet worm} incident. The CERT charter is to work with the {Internet} community to help it responf to computer security events involving Internet {hosts}, to raise awareness of computer security issues and to conduct research targeted at improving the security of existing systems. CERT products and services include 24-hour technical assistance for responding to computer security incidents, product {vulnerability} assistance, technical documents and tutorials. {CERT Home (http://cert.org/)}. E-mail: "cert@cert.org" (incident reports). Telephone +1 (412) 268 7090 (24-hour hotline). (2012-05-18)

Computer Emergency Response Team ::: (security, body) (CERT) An organisation formed by DARPA in November 1988 in response to the needs exhibited during the Internet worm incident. The CERT security incidents, product vulnerability assistance, technical documents and tutorials. .E-mail: (incident reports).Telephone +1 (412) 268 7090 (24-hour hotline).(2000-07-09)

Computer Information File ::: (documentation) (CIF) A collection of information about a computer, including hardware, software, networking and nonphysical characteristics such as maintenance schedule, backup schedule, list of users and security.(2006-09-26)

confidence ::: n. --> The act of confiding, trusting, or putting faith in; trust; reliance; belief; -- formerly followed by of, now commonly by in.
That in which faith is put or reliance had.
The state of mind characterized by one&


CONFIDENCE. ::: The sense of security that goes with trust.

consols ::: n. pl. --> The leading British funded government security.

cookie 1. "web" {HTTP cookie}. 2. "protocol" A handle, transaction ID, or other token of agreement between cooperating programs. "I give him a packet, he gives me back a cookie". The ticket you get from a dry-cleaning shop is an example of a cookie; the only thing it's useful for is to relate a later transaction to this one (so you get the same clothes back). Compare {magic cookie}; see also {fortune cookie}. 3. "security, jargon" A {cracker} term for the {password} list on a {multi-user} computer. 4. "jargon" An adjective describing a computer that just became {toast}. (1997-04-14)

cookie ::: 1. (World-Wide Web) HTTP cookie.2. (protocol) A handle, transaction ID, or other token of agreement between cooperating programs. I give him a packet, he gives me back a cookie.The ticket you get from a dry-cleaning shop is a perfect mundane example of a cookie; the only thing it's useful for is to relate a later transaction to this one (so you get the same clothes back).Compare magic cookie; see also fortune cookie.3. (security, jargon) A cracker term for the password list on a multi-user computer.4. (jargon) An adjective describing a computer that just became toast. (1997-04-14)

cookie jar ::: 1. (programming) An area of memory set aside for storing cookies. Most commonly heard in the Atari ST community; many useful ST programs record their after the presence or otherwise of other programs by searching the contents of the jar.2. (security) A cracker term for the password file of a multi-user computer.[Jargon File] (1997-02-12)

cookie jar 1. "programming" An area of memory set aside for storing {cookies}. Most commonly heard in the {Atari ST} community; many useful ST programs record their presence by storing a distinctive {magic number} in the jar. Programs can inquire after the presence or otherwise of other programs by searching the contents of the jar. 2. "security" A {cracker} term for the password file of a multi-user computer. [{Jargon File}] (1997-02-12)

copybroke "security" /kop'ee-brohk/ (Or "copywronged" - a play on "{copyright}") 1. Used to describe an instance of a {copy-protected} program that has been "broken"; that is, a copy with the copy-protection scheme disabled or removed. 2. Copy-protected software which is unusable because of some {bit-rot} or {bug} that has confused the {copy protection}. 3. Used to describe data damaged because of a side effect of a copy protection system. [{Jargon File}] (1997-03-16)

copybroke ::: (security) /kop'ee-brohk/ (Or copywronged - a play on copyright) 1. Used to describe an instance of a copy-protected program that has been broken; that is, a copy with the copy-protection scheme disabled or removed.2. Copy-protected software which is unusable because of some bit-rot or bug that has confused the copy protection.3. Used to describe data damaged because of a side effect of a copy protection system.[Jargon File] (1997-03-16)

copy protection "security" Any technique designed to prevent unauthorised copying of software. Such techniques will only hinder the most incompetant attempts at {software theft} but often prevent legitimate customers from using products they have paid for in the way they want. Considered silly. [{Jargon File}] (2010-02-03)

corral ::: n. --> A pen for animals; esp., an inclosure made with wagons, by emigrants in the vicinity of hostile Indians, as a place of security for horses, cattle, etc. ::: v. t. --> To surround and inclose; to coop up; to put into an inclosed space; -- primarily used with reference to securing horses and

cost control callback ::: (communications) A system where a computer automatically rejects incoming dial-up calls from certain telephone numbers and calls them back, with the security callback in that it applies to certain phone numbers instead of to certain user names.(2003-07-13)

cost control callback "communications" A system where a computer automatically rejects incoming {dial-up} calls from certain telephone numbers and calls them back, with the result that the caller pays nothing for the connection. This differs from security {callback} in that it applies to certain phone numbers instead of to certain user names. (2003-07-13)

countermark ::: n. --> A mark or token added to those already existing, in order to afford security or proof; as, an additional or special mark put upon a package of goods belonging to several persons, that it may not be opened except in the presence of all; a mark added to that of an artificer of gold or silver work by the Goldsmiths&

countersecure ::: v. t. --> To give additional security to or for.

cracker "jargon" An individual who attempts to gain unauthorised access to a computer system. These individuals are often malicious and have many means at their disposal for breaking into a system. The term was coined ca. 1985 by hackers in defence against journalistic misuse of "{hacker}". An earlier attempt to establish "worm" in this sense around 1981--82 on {Usenet} was largely a failure. Use of both these neologisms reflects a strong revulsion against the theft and vandalism perpetrated by cracking rings. The neologism "cracker" in this sense may have been influenced not so much by the term "safe-cracker" as by the non-jargon term "cracker", which in Middle English meant an obnoxious person (e.g., "What cracker is this same that deafs our ears / With this abundance of superfluous breath?" -- Shakespeare's King John, Act II, Scene I) and in modern colloquial American English survives as a barely gentler synonym for "white trash". While it is expected that any real hacker will have done some playful cracking and knows many of the basic techniques, anyone past {larval stage} is expected to have outgrown the desire to do so except for immediate practical reasons (for example, if it's necessary to get around some security in order to get some work done). Contrary to widespread myth, cracking does not usually involve some mysterious leap of hackerly brilliance, but rather persistence and the dogged repetition of a handful of fairly well-known tricks that exploit common weaknesses in the security of target systems. Accordingly, most crackers are only mediocre hackers. Thus, there is far less overlap between hackerdom and crackerdom than the {mundane} reader misled by sensationalistic journalism might expect. Crackers tend to gather in small, tight-knit, very secretive groups that have little overlap with the huge, open hacker poly-culture; though crackers often like to describe *themselves* as hackers, most true hackers consider them a separate and lower form of life, little better than {virus} writers. Ethical considerations aside, hackers figure that anyone who can't imagine a more interesting way to play with their computers than breaking into someone else's has to be pretty {losing}. See also {Computer Emergency Response Team}, {dark-side hacker}, {hacker ethic}, {phreaking}, {samurai}, {Trojan horse}. [{Jargon File}] (1998-06-29)

cracker ::: (jargon) An individual who attempts to gain unauthorised access to a computer system. These individuals are often malicious and have many means at to establish worm in this sense around 1981--82 on Usenet was largely a failure.Use of both these neologisms reflects a strong revulsion against the theft and vandalism perpetrated by cracking rings. The neologism cracker in this sense colloquial American English survives as a barely gentler synonym for white trash.While it is expected that any real hacker will have done some playful cracking and knows many of the basic techniques, anyone past larval stage is expected to example, if it's necessary to get around some security in order to get some work done).Contrary to widespread myth, cracking does not usually involve some mysterious leap of hackerly brilliance, but rather persistence and the dogged repetition of security of target systems. Accordingly, most crackers are only mediocre hackers.Thus, there is far less overlap between hackerdom and crackerdom than the mundane reader misled by sensationalistic journalism might expect. Crackers tend hackers figure that anyone who can't imagine a more interesting way to play with their computers than breaking into someone else's has to be pretty losing.See also Computer Emergency Response Team, dark-side hacker, hacker ethic, phreaking, samurai, Trojan Horse.[Jargon File] (1998-06-29)

crack root ::: (security, jargon) To defeat the security system of a Unix machine and gain root privileges thereby.See cracker.[Jargon File] (1996-08-10)

crack root "security, jargon" To defeat the security system of a {Unix} machine and gain {root} privileges thereby. The sort of thing a {cracker} wants to do. [{Jargon File}] (2010-02-04)

crayola books "publication" A humorous and/or disparaging term for the {rainbow series} of National Computer Security Center (NCSC) computer security standards. See also {Orange Book}. [{Jargon File}] (1996-12-03)

crayola books ::: (publication) A humorous and/or disparaging term for the rainbow series of National Computer Security Center (NCSC) computer security standards.See also Orange Book.[Jargon File] (1996-12-03)

Crypt Breakers Workbench (cbw) A freely distributable multi-window integrated workbench of tools for {cryptanalysis} of files encrypted with the {4.2BSD} {Unix} {crypt} command. It was originally written by Robert W. Baldwin at {MIT}. {(ftp://black.ox.ac.uk/src/security)}, {(ftp://scitsc.wlv.ac.uk/pub/infomagic/usenet.cdrom/sources/unix/volume10)}, {(ftp://ftp.sunet.se/pub/usenet/comp.sources.unix/volume10)}. (1994-12-06)

cryptography "cryptography" The practise and study of {encryption} and {decryption} - encoding data so that it can only be decoded by specific individuals. A system for encrypting and decrypting data is a cryptosystem. These usually involve an {algorithm} for combining the original data ("{plaintext}") with one or more "keys" - numbers or strings of characters known only to the sender and/or recipient. The resulting output is known as "{ciphertext}". The security of a cryptosystem usually depends on the secrecy of (some of) the keys rather than with the supposed secrecy of the {algorithm}. A strong cryptosystem has a large range of possible keys so that it is not possible to just try all possible keys (a "{brute force}" approach). A strong cryptosystem will produce ciphertext which appears random to all standard statistical tests. A strong cryptosystem will resist all known previous methods for breaking codes ("{cryptanalysis}"). See also {cryptology}, {public-key encryption}, {RSA}. {Usenet} newsgroups: {news:sci.crypt}, {news:sci.crypt.research}. {FAQ} {MIT (ftp://rtfm.mit.edu/pub/usenet/news.answers/cryptography-faq/)}. {Cryptography glossary (http://io.com/~ritter/GLOSSARY.HTM

cryptography ::: (cryptography) The practise and study of encryption and decryption - encoding data so that it can only be decoded by specific individuals. A system - numbers or strings of characters known only to the sender and/or recipient. The resulting output is known as ciphertext.The security of a cryptosystem usually depends on the secrecy of (some of) the keys rather than with the supposed secrecy of the algorithm. A strong A strong cryptosystem will resist all known previous methods for breaking codes (cryptanalysis).See also cryptology, public-key encryption, RSA.Usenet newsgroups: sci.crypt, sci.crypt.research.FAQ . . . .(2000-01-16)

CryptoLocker "security" The best known example of the kind of {malware} known as {ransomware}. CryptoLocker {encrypts} files on your computer and then demands that you send the malware operator money in order to have the files decrypted. According to FBI estimates, CryptoLocker had more than 500,000 victims between September 2013 and May 2014. Around 1.3 percent paid to free their files, earning the malware makers around $3 million. The criminal network was smashed by authorities and security researchers in May 2014 and a tool put online to decryt victim's files for free. {(http://thehackernews.com/2014/08/CryptoLocker-Decryption-Keys-Tool.html)}. (2015-01-22)

cybercrime as a service "security, legal" (CaaS) A kind of {software as a service} that involves performing illegal online activities ({cybercrime}) on behalf of others for money. Cybercrime as a service represents an evolution of online crime from the sale of illegal products such as {malware} and {exploit} kits to offering everything necessary to arrange a {cyber fraud} or to conduct a {cyber attack}. As well as providing malicious code, the service provider also rents out the {infrastructure} ({servers} and {network} connections) to control the distribution and operation of the malware, e.g., bullet-proof hosting or huge {botnets}. (2015-02-22)

cybercrime "security, legal" Any of a broad range of activities that use computers or networks to commit illegal acts, including theft of {personal data}, {phishing}, distribution of {malware}, {copyright} infringement, {denial of service attacks}, {cyberstalking}, {bullying}, online harassment, child {pornography}, child predation, stock market manipulation and corporate espionage. For example, a vulnerability in a victim's {web browser} might result in him unknowingly downloading a {Trojan horse} {virus}, which installs a {keystroke logger} on his computer, which allows the {cracker} to steal private data such as Internet banking or {e-mail} passwords. The degree to which an activity counts as "cybercrime" rather than just "crime" depends on whether they could exist without computers or networks. (2015-02-14)

danger ::: n. --> Authority; jurisdiction; control.
Power to harm; subjection or liability to penalty.
Exposure to injury, loss, pain, or other evil; peril; risk; insecurity.
Difficulty; sparingness.
Coyness; disdainful behavior. ::: v. t.


database administrator ::: (job) A person responsible for the design and management of one or more databases and for the evaluation, selection and implementation of database administrator would implement the database software that meets the requirements outlined by the organisation's data administrator and systems analysts.Tasks might include controling an organisation's data resources, using data dictionary software to ensure data integrity and security, recovering corrupted data and eliminating data redundancy and uses tuning tools to improve database performance.(2004-03-11)

database administrator "job" A person responsible for the design and management of one or more {databases} and for the evaluation, selection and implementation of {database management systems}. In smaller organisations, the data administrator and database administrator are often one in the same; however, when they are different, the database administrator's function is more technical. The database administrator would implement the database software that meets the requirements outlined by the organisation's data administrator and {systems analysts}. Tasks might include controling an organisation's data resources, using {data dictionary} software to ensure {data integrity} and security, recovering corrupted data and eliminating data redundancy and uses tuning tools to improve database performance. (2004-03-11)

database management system "database" (DBMS) A suite of programs which typically manage large structured sets of persistent data, offering ad hoc query facilities to many users. They are widely used in business applications. A database management system (DBMS) can be an extremely complex set of software programs that controls the organisation, storage and retrieval of data (fields, records and files) in a database. It also controls the security and integrity of the database. The DBMS accepts requests for data from the application program and instructs the operating system to transfer the appropriate data. When a DBMS is used, information systems can be changed much more easily as the organisation's information requirements change. New categories of data can be added to the database without disruption to the existing system. Data security prevents unauthorised users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of the database, called subschemas (pronounced "sub-skeema"). For example, an employee database can contain all the data about an individual employee, but one group of users may be authorised to view only payroll data, while others are allowed access to only work history and medical data. The DBMS can maintain the integrity of the database by not allowing more than one user to update the same record at the same time. The DBMS can keep duplicate records out of the database; for example, no two customers with the same customer numbers (key fields) can be entered into the database. {Query languages} and {report writers} allow users to interactively interrogate the database and analyse its data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. However, it may not leave an audit trail of actions or provide the kinds of controls necessary in a multi-user organisation. These controls are only available when a set of application programs are customised for each data entry and updating function. A business information system is made up of subjects (customers, employees, vendors, etc.) and activities (orders, payments, purchases, etc.). Database design is the process of deciding how to organize this data into record types and how the record types will relate to each other. The DBMS should mirror the organisation's data structure and process transactions efficiently. Organisations may use one kind of DBMS for daily transaction processing and then move the detail onto another computer that uses another DBMS better suited for random inquiries and analysis. Overall systems design decisions are performed by data administrators and systems analysts. Detailed database design is performed by database administrators. The three most common organisations are the {hierarchical database}, {network database} and {relational database}. A database management system may provide one, two or all three methods. Inverted lists and other methods are also used. The most suitable structure depends on the application and on the transaction rate and the number of inquiries that will be made. Database machines are specially designed computers that hold the actual databases and run only the DBMS and related software. Connected to one or more mainframes via a high-speed channel, database machines are used in large volume transaction processing environments. Database machines have a large number of DBMS functions built into the hardware and also provide special techniques for accessing the disks containing the databases, such as using multiple processors concurrently for high-speed searches. The world of information is made up of data, text, pictures and voice. Many DBMSs manage text as well as data, but very few manage both with equal proficiency. Throughout the 1990s, as storage capacities continue to increase, DBMSs will begin to integrate all forms of information. Eventually, it will be common for a database to handle data, text, graphics, voice and video with the same ease as today's systems handle data. See also: {intelligent database}. (1998-10-07)

database management system ::: (database) (DBMS) A suite of programs which typically manage large structured sets of persistent data, offering ad hoc query facilities to many users. They are widely used in business applications.A database management system (DBMS) can be an extremely complex set of software programs that controls the organisation, storage and retrieval of data (fields, the database. The DBMS accepts requests for data from the application program and instructs the operating system to transfer the appropriate data.When a DBMS is used, information systems can be changed much more easily as the organisation's information requirements change. New categories of data can be added to the database without disruption to the existing system.Data security prevents unauthorised users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of group of users may be authorised to view only payroll data, while others are allowed access to only work history and medical data.The DBMS can maintain the integrity of the database by not allowing more than one user to update the same record at the same time. The DBMS can keep duplicate records out of the database; for example, no two customers with the same customer numbers (key fields) can be entered into the database.Query languages and report writers allow users to interactively interrogate the database and analyse its data.If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. available when a set of application programs are customised for each data entry and updating function.A business information system is made up of subjects (customers, employees, vendors, etc.) and activities (orders, payments, purchases, etc.). Database and how the record types will relate to each other. The DBMS should mirror the organisation's data structure and process transactions efficiently.Organisations may use one kind of DBMS for daily transaction processing and then move the detail onto another computer that uses another DBMS better suited for data administrators and systems analysts. Detailed database design is performed by database administrators.The three most common organisations are the hierarchical database, network database and relational database. A database management system may provide one, most suitable structure depends on the application and on the transaction rate and the number of inquiries that will be made.Database machines are specially designed computers that hold the actual databases and run only the DBMS and related software. Connected to one or more accessing the disks containing the databases, such as using multiple processors concurrently for high-speed searches.The world of information is made up of data, text, pictures and voice. Many DBMSs manage text as well as data, but very few manage both with equal common for a database to handle data, text, graphics, voice and video with the same ease as today's systems handle data.See also: intelligent database. (1998-10-07)

defence ::: n. & v. t. --> See Defense. ::: n. --> The act of defending, or the state of being defended; protection, as from violence or danger.
That which defends or protects; anything employed to oppose attack, ward off violence or danger, or maintain security; a


". . . desire is limitation and insecurity in a hunger for pleasure and satisfaction and not the seeking after the divine delight in things.” The Synthesis of Yoga*

“… desire is limitation and insecurity in a hunger for pleasure and satisfaction and not the seeking after the divine delight in things.” The Synthesis of Yoga

digital certificate "communications, security" An {attachment} to an {electronic mail} message used for security purposes, e.g. to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply. An individual wishing to send an encrypted message applies for a digital certificate from a {certificate authority} (CA). The CA issues an encrypted digital certificate containing the applicant's {public key} and a variety of other identification information. The CA makes its own public key readily available on the {Internet}. The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate. (2006-05-27)

digital certificate ::: (communications, security) An attachment to an electronic mail message used for security purposes, e.g. to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply.An individual wishing to send an encrypted message applies for a digital certificate from a certificate authority (CA). The CA issues an encrypted identification information. The CA makes its own public key readily available on the Internet.The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate.(2006-05-27)

Digital Signature Standard "cryptography, standard" The {NIST}'s {standard} for {digital signatures} (authenticating both a message and the signer) that was first announced in 1991. It is based on an {algorithm} using {discrete logarithms}, which is a variant of the {Elgamal algorithm} with Schnorr's improvements. DSS's security is currently considered very strong - comparable to {RSA}. It is estimated that DSS's 1024-bit keys would take 1.4E16 {MIPS}-years to crack. (1995-11-16)

disaster recovery "business" (DR) Planning and implementation of procedures and facilities for use when essential systems are not available for a period long enough to have a significant impact on the business, e.g. when the head office is blown up. Disasters include natural: fire, flood, lightning, hurricane; hardware: power failure, component failure, {head crash}; software failure: {bugs}, resources; vandalism: arson, bombing, {cracking}, theft; data corruption or loss: human error, media failure; communications: computer network equipment, {network storm}, telephones; security: passwords compromised, {computer virus}; legal: change in legislation; personnel: unavailability of essential staff, industrial action. Companies need to plan for disaster: before: {risk analysis}, preventive measures, training; during: how should staff and systems respond; after: recovery measures, post mortem analysis. Hardware can usually be replaced and is usually insured. Software and data needs to be backed up off site. Alternative communication systems should be arranged in case of network failure or inaccessible premises, e.g. emergency telephone number, home working, alternative data center. (2007-06-20)

distrain ::: v. t. --> To press heavily upon; to bear down upon with violence; hence, to constrain or compel; to bind; to distress, torment, or afflict.
To rend; to tear.
To seize, as a pledge or indemnification; to take possession of as security for nonpayment of rent, the reparation of an injury done, etc.; to take by distress; as, to distrain goods for rent, or of an amercement.


dongle cracker "security" Someone who enables software that has been written to require a {dongle} to run without it. (2007-06-11)

dongle ::: (hardware) /dong'gl/ (From dangle - because it dangles off the computer?)1. (security) A security or copy protection device for commercial microcomputer programs that must be connected to an I/O port of the computer and at programmed intervals thereafter, and terminate if it does not respond with the expected validation code.One common form consisted of a serialised EPROM and some drivers in a D-25 connector shell.Dongles attempt to combat software theft by ensuring that, while users can still make copies of the program (e.g. for backup), they must buy one dongle for each simultaneous use of the program.The idea was clever, but initially unpopular with users who disliked tying up a port this way. By 1993 almost all dongles passed data through transparently innovation was necessary to allow daisy-chained dongles for multiple pieces of software.In 1998, dongles and other copy protection systems are fairly uncommon for Microsoft Windows software but one engineer in a print and CADD bureau reports Electric Image, two for Media 100, Ultimatte, Elastic Reality and CADD. These dongles are made for the Mac's daisy-chainable ADB port.The term is used, by extension, for any physical electronic key or transferable ID required for a program to function. Common variations on this theme have used the parallel port or even the joystick port or a dongle-disk.An early 1992 advertisment from Rainbow Technologies (a manufacturer of dongles) claimed that the word derived from Don Gall, the alleged inventor of the device. The company's receptionist however said that the story was a myth invented for the ad.[Jargon File] (1998-12-13)2. A small adaptor cable that connects, e.g. a PCMCIA modem to a telephone socket or a PCMCIA network card to an RJ45 network cable.(2002-09-29)

dongle "hardware" /dong'gl/ (From "dangle" - because it dangles off the computer?) 1. "security" A security or {copy protection} device for commercial {microcomputer} programs that must be connected to an {I/O port} of the computer while the program is run. Programs that use a dongle query the port at start-up and at programmed intervals thereafter, and terminate if it does not respond with the expected validation code. One common form consisted of a serialised {EPROM} and some drivers in a {D-25} connector shell. Dongles attempt to combat {software theft} by ensuring that, while users can still make copies of the program (e.g. for {backup}), they must buy one dongle for each simultaneous use of the program. The idea was clever, but initially unpopular with users who disliked tying up a port this way. By 1993 almost all dongles passed data through transparently while monitoring for their particular {magic} codes (and combinations of status lines) with minimal if any interference with devices further down the line. This innovation was necessary to allow {daisy-chained} dongles for multiple pieces of software. In 1998, dongles and other copy protection systems are fairly uncommon for {Microsoft Windows} software but one engineer in a print and {CADD} bureau reports that their {Macintosh} computers typically run seven dongles: After Effects, Electric Image, two for Media 100, Ultimatte, Elastic Reality and CADD. These dongles are made for the Mac's daisy-chainable {ADB} port. The term is used, by extension, for any physical electronic key or transferable ID required for a program to function. Common variations on this theme have used the {parallel port} or even the {joystick} port or a {dongle-disk}. An early 1992 advertisment from Rainbow Technologies (a manufacturer of dongles) claimed that the word derived from "Don Gall", the alleged inventor of the device. The company's receptionist however said that the story was a myth invented for the ad. [{Jargon File}] (1998-12-13) 2. A small adaptor cable that connects, e.g. a {PCMCIA} {modem} to a telephone socket or a PCMCIA {network card} to an {RJ45} {network cable}. (2002-09-29)

double-lock ::: v. t. --> To lock with two bolts; to fasten with double security.

dumpster diving /dump'-ster di:'-ving/ 1. The practice of sifting refuse from an office or technical installation to extract confidential data, especially security-compromising information ("dumpster" is an Americanism for what is elsewhere called a "skip"). Back in AT&T's monopoly days, before paper shredders became common office equipment, phone phreaks (see {phreaking}) used to organise regular dumpster runs against phone company plants and offices. Discarded and damaged copies of AT&T internal manuals taught them much. The technique is still rumored to be a favourite of crackers operating against careless targets. 2. The practice of raiding the dumpsters behind buildings where producers and/or consumers of high-tech equipment are located, with the expectation (usually justified) of finding discarded but still-valuable equipment to be nursed back to health in some hacker's den. Experienced dumpster-divers not infrequently accumulate basements full of moldering (but still potentially useful) {cruft}. [{Jargon File}]

ease ::: n. --> Satisfaction; pleasure; hence, accommodation; entertainment.
Freedom from anything that pains or troubles; as: (a) Relief from labor or effort; rest; quiet; relaxation; as, ease of body.
Freedom from care, solicitude, or anything that annoys or disquiets; tranquillity; peace; comfort; security; as, ease of mind.
Freedom from constraint, formality, difficulty, embarrassment, etc.; facility; liberty; naturalness; -- said of manner, style, etc.; as, ease of style, of behavior, of address.


Ecash ::: (application) A trial form of electronic funds transfer over the Internet (and soon by electronic mail).The ecash software stores digital money, signed by a bank, on the user's local computer. The user can spend the digital money at any shop accepting ecash, transmit credit card numbers. The shop just has to accept the money, and deposit it at the bank. The security is provided by a public-key digital signature.There process involves the issuing banks who exchange real money for ecash, users who have and spend ecash, shops who accept ecash payments, and clearing banks who clear payments received by shops.At the moment, all users and shops must have an account at DigiCash's own bank, the First Digital Bank at bank.digicash.com. They can withdraw money from the bank, and convert it to ecash. Shops can be started by any ecash user. . (1995-04-10)

Ecash "application" A trial form of {electronic funds transfer} over the {Internet} (and soon by {electronic mail}). The ecash software stores digital money, signed by a bank, on the user's local computer. The user can spend the digital money at any shop accepting ecash, without the trouble of having to open an account there first, or having to transmit credit card numbers. The shop just has to accept the money, and deposit it at the bank. The security is provided by a {public-key} {digital signature}. There process involves the issuing banks who exchange real money for ecash, users who have and spend ecash, shops who accept ecash payments, and clearing banks who clear payments received by shops. At the moment, all users and shops must have an account at {DigiCash}'s own bank, the "First Digital Bank" at bank.digicash.com. They can withdraw money from the bank, and convert it to ecash. Shops can be started by any ecash user. {(http://digicash.com/ecash/ecash-home.html)}. (1995-04-10)

EDP auditor "job" A person who analyses system functions and operations to determine adequate security and controls. An EDP analyst evaluates systems and operational procedures and reports findings to senior management. He writes ad hoc report programs using {4GLs} and specialised audit software. (2004-03-11)

EDP auditor ::: (job) A person who analyses system functions and operations to determine adequate security and controls. An EDP analyst evaluates systems and operational procedures and reports findings to senior management. He writes ad hoc report programs using 4GLs and specialised audit software.(2004-03-11)

Electronic Commerce Dictionary "publication" A lexicon of {electronic commerce} terms. It includes over 900 terms and acronyms, and over 200 {website} addresses. It has entries on commerce over the {World-Wide Web}, {Internet} payment systems, The {National Information Infrastructure}, {Electronic Data Interchange}, {Electronic Funds Transfer}, {Public Key Cryptography}, {smart cards} and {digital cash}, computer and network security for commerce, marketing through electronic media. {(http://tedhaynes.com/haynes1/intro.html)}. (1999-03-24)

Electronic Commerce Dictionary ::: (publication) A lexicon of electronic commerce terms. It includes over 900 terms and acronyms, and over 200 website addresses. It has entries on Transfer, Public Key Cryptography, smart cards and digital cash, computer and network security for commerce, marketing through electronic media. . (1999-03-24)

elite ::: 1. (security) A term used to describe skilled crackers or hackers, or their deeds. In the last sense, compare to elegant.The term is also used to describe exclusive forums (ftp sites, BBSs) used for trading pirated software, cracking tools, or phreaking codes. (1997-01-31)

elite 1. "security" A term used to describe skilled {crackers} or {hackers}, or their deeds. In the last sense, compare to {elegant}. The term is also used to describe exclusive forums ({ftp} sites, {BBSs}) used for trading pirated software, {crack}ing tools, or {phreaking} codes. (1997-01-31)

Emunah (Hebrew) ’Emūnāh [from ’ēm mother] Mother; the cosmic feminine builder or mother-builder; feminine ’Ao (builder, architect). Found infrequently in the Qabbalah, applied to the third Sephirah, Binah, which forms the first Qabbalistic triad with the first Sephirah, Kether — to which the term ’Abba (father) is applied — and Hochmah, the second Sephirah. Both ’Amon and ’Emunah likewise mean firmness, stability, or security, thus involving the ideas of fidelity, faithfulness, regularity in procedures; from these last ideas, Binah or ’Imma is called Intelligence — because it is through cosmic intelligence and its firmness or stability and fidelity in ideation that the worlds are built in their manifold manifestations and follow the intrinsic regular courses of divine ideation.

English shellcode "security" A kind of {malware} that is embedded in ordinary English sentences. English shellcode attempts to avoid detection by {antivirus software} by making the code resemble, e.g. {e-mail} text or {Wikipedia} entries. It was first revealed by researchers at {Johns Hopkins}. (2010-03-02)

Enterprise JavaBeans ::: (specification, business, programming) (EJB) A server-side component architecture for writing reusable business logic and portable enterprise applications. EJB is the basis of Sun's Java 2 Platform, Enterprise Edition (J2EE).Enterprise JavaBean components are written entirely in Java and run on any EJB compliant server. They are operating system, platform, and middleware independent, preventing vendor lock-in.EJB servers provide system-level services (the plumbing) such as transactions, security, threading, and persistence.The EJB architecture is inherently transactional, distributed, multi-tier, scalable, secure, and wire protocol neutral - any protocol can be used: IIOP, JRMP, HTTP, DCOM etc. EJB 1.1 requires RMI for communication with components. EJB 2.0 is expected to require support for RMI/IIOP.EJB applications can serve assorted clients: browsers, Java, ActiveX, CORBA etc. EJB can be used to wrap legacy systems.EJB 1.1 was released in December 1999. EJB 2.0 is in development.Sun claims broad industry adoption. 30 vendors are shipping server products implementing EJB. Supporting vendors include IBM, Fujitsu, Sybase, Borland, Oracle, and Symantec.An alternative is Microsoft's MTS (Microsoft Transaction Server). . .(2000-04-20)

Enterprise JavaBeans "specification, business, programming" (EJB) A {server}-side {component architecture} for writing reusable {business logic} and {portable} {enterprise} applications. EJB is the basis of {Sun}'s {Java 2 Platform, Enterprise Edition} (J2EE). Enterprise JavaBean components are written entirely in {Java} and run on any EJB compliant server. They are {operating system}, {platform}, and {middleware} independent, preventing vendor {lock-in}. EJB servers provide system-level services (the "plumbing") such as {transactions}, security, {threading}, and {persistence}. The EJB architecture is inherently transactional, {distributed}, {multi-tier}, {scalable}, secure, and {wire protocol} neutral - any {protocol} can be used: {IIOP}, {JRMP}, {HTTP}, {DCOM} etc. EJB 1.1 requires {RMI} for communication with components. EJB 2.0 is expected to require support for RMI/IIOP. EJB applications can serve assorted clients: {browsers}, Java, {ActiveX}, {CORBA} etc. EJB can be used to wrap {legacy systems}. EJB 1.1 was released in December 1999. EJB 2.0 is in development. Sun claims broad industry adoption. 30 vendors are shipping server products implementing EJB. Supporting vendors include {IBM}, {Fujitsu}, {Sybase}, {Borland}, {Oracle}, and {Symantec}. An alternative is Microsoft's MTS ({Microsoft Transaction Server}). {(http://java.sun.com/products/ejb/)}. {FAQ (http://java.sun.com/products/ejb/faq.html)}. (2000-04-20)

escape ::: v. --> To flee from and avoid; to be saved or exempt from; to shun; to obtain security from; as, to escape danger.
To avoid the notice of; to pass unobserved by; to evade; as, the fact escaped our attention. ::: v. i. --> To flee, and become secure from danger; -- often


escrow "security" An arrangement where something (generally money or documents) is held in trust ("in escrow") by a trusted third party until certain agreed conditions are met. In computing the term is used for {key escrow} and also for {source code escrow}. (1999-12-14)

escrow ::: (security) An arrangement where something (generally money or documents) is held in trust (in escrow) by a trusted third party until certain agreed conditions are met. In computing the term is used for key escrow and also for source code escrow. (1999-12-14)

exception ::: n. --> The act of excepting or excluding; exclusion; restriction by taking out something which would otherwise be included, as in a class, statement, rule.
That which is excepted or taken out from others; a person, thing, or case, specified as distinct, or not included; as, almost every general rule has its exceptions.
An objection, oral or written, taken, in the course of an action, as to bail or security; or as to the decision of a judge, in


Execute Channel Program "operating system" (EXCP) An {IBM} system for low-level file access, where the programmer is completely responsible for providing a list of device-specific "channel comands" to be executed by {I/O channels}, {control units} and/or {devices}. The {operating system} will simply check the "{CCW}" chains for security purposes (access invalid memory or outside of {file extents}) and then schedule them for execution. (2005-08-08)

exploit ::: (security) A security hole or an instance of taking advantage of a security hole.[...] hackers say exploit. sysadmins say hole -- .Emke reports that the stress is on the second syllable. If this is true, this may be a case of hackerly zero-deriving verbs (especially instantials) from nouns, akin to write as a noun to describe an instance of a disk drive writing to a disk.(2001-11-24)

exploit "security" A security {vulnerability} or an instance of taking advantage of a security vulnerability. "[...] {hackers} say exploit. {sysadmins} say hole" -- {Mike Emke (http://emke.com/)}. (2014-10-25)

extranet "web" The extension of a company's {intranet} out onto the {Internet}, e.g. to allow selected customers, suppliers and mobile workers to access the company's private data and applications via the {web}. This is in contrast to, and usually in addition to, the company's public {website} which is accessible to everyone. The difference can be somewhat blurred but generally an extranet implies real-time access through a {firewall} of some kind. Such facilities require very careful attention to security but are becoming an increasingly important means of delivering services and communicating efficiently. [Did {Marc Andreessen} invent the term in September 1996?] (1997-12-17)

extranet ::: (World-Wide Web) The extension of a company's intranet out onto the Internet, e.g. to allow selected customers, suppliers and mobile workers to which is accessible to everyone. The difference can be somewhat blurred but generally an extranet implies real-time access through a firewall of some kind.Such facilities require very careful attention to security but are becoming an increasingly important means of delivering services and communicating efficiently.[Did Marc Andreessen invent the term in September 1996?] (1997-12-17)

fascist ::: (jargon) Said of a computer system with excessive or annoying security barriers, usage limits, or access policies. The implication is that said policies are preventing hackers from getting interesting work done. The variant fascistic seems to have been preferred at MIT.In the design of languages and other software tools, the fascist alternative is the most restrictive and structured way of capturing a particular function; implementation or provide tighter error checking. Compare bondage-and-discipline language, although that term is global rather than local.[Jargon File](2003-07-29)

fascist "jargon" Said of a computer system with excessive or annoying security barriers, usage limits, or access policies. The implication is that said policies are preventing hackers from getting interesting work done. The variant "fascistic" seems to have been preferred at {MIT}. In the design of languages and other software tools, "the fascist alternative" is the most restrictive and structured way of capturing a particular function; the implication is that this may be desirable in order to simplify the implementation or provide tighter error checking. Compare {bondage-and-discipline language}, although that term is global rather than local. [{Jargon File}] (2003-07-29)

fastness ::: a. --> The state of being fast and firm; firmness; fixedness; security; faithfulness.
A fast place; a stronghold; a fortress or fort; a secure retreat; a castle; as, the enemy retired to their fastnesses in the mountains.
Conciseness of style.
The state of being fast or swift.


Federal Information Processing Standards "standard" (FIPS) United States Government technical {standards} published by the {National Institute of Standards and Technology} (NIST). NIST develops FIPS when there are compelling Federal government requirements such as for security and {interoperability} but no acceptable industry standards or solutions. Computer-related products bought by the US Government must conform to FIPS. (2003-06-04)

Federal Information Processing Standards ::: (standard) (FIPS) United States Government technical standards published by the National Institute of Standards and Technology (NIST). NIST develops FIPS when there are compelling Federal government requirements such as for security and interoperability but no acceptable industry standards or solutions.Computer-related products bought by the US Government must conform to FIPS.(2003-06-04)

Federation Against Software Theft Limited ::: (body, legal) (FAST) A non-profitmaking organisation, formed in 1984 by the software industry with the aim of eradicating software theft in the UK. FAST and individuals for software theft on behalf of its members and publicises the legal penalties and security risks.FAST Corporate Services Limited runs the FAST Standard for Software Compliance (FSSC-1:2004). This was developed in collaboration with the British Standards Institution as an independent standard of excellence in software compliance.In 1995 FAST proposed to merge with the Business Software Alliance created by Microsoft and which has a world-wide influence. However, the talks fell through and in 1996, Novell and Adobe Systems, Inc. defected to BSA.Through its activities, and the FAST programme, over �1.25m of software was purchased in the UK in 2003 and 2004 with over �5.5m during the last five years. .E-mail: .Address: York House, 18 York Road, Maidenhead, Berkshire SL6 1SF.Telephone: +44 (1628) 622 121(2005-12-27)

Federation Against Software Theft Limited "body, legal" (FAST) A non-profitmaking organisation, formed in 1984 by the software industry with the aim of eradicating {software theft} in the UK. FAST was the world's first anti-piracy organisation to work to protect the intellectual property rights of software publishers. Initially concentrating on lobbying parliament to revise Copyright law, FAST also prosecutes organisations and individuals for software theft on behalf of its members and publicises the legal penalties and security risks. FAST Corporate Services Limited runs the FAST Standard for Software Compliance (FSSC-1:2004). This was developed in collaboration with the {British Standards Institution} as an independent standard of excellence in {software compliance}. In 1995 FAST proposed to merge with the {Business Software Alliance} created by {Microsoft} and which has a world-wide influence. However, the talks fell through and in 1996, {Novell} and {Adobe Systems, Inc.} defected to BSA. {FAST Home (http://fast.org.uk/)}. E-mail: "fast@fast.org". Address: York House, 18 York Road, Maidenhead, Berkshire SL6 1SF. Telephone: +44 (1628) 622 121 (2005-12-27)

federation "security" The establishment of some or all of business agreements, {cryptographic} trust and user identifiers or attributes across security and policy domains to enable more seamless business interaction. As {web services} promise to enable integration between business partners through {loose coupling} at the application and messaging layer, federation does so at the identity management layer, insulating each domain from the details of the others' authentication and authorization. Key to this loose coupling at the identity management layer are standardized mechanisms and formats for the communication of identity information between the domains. {SAML} is one such standard. (2011-05-12)

fence ::: n. --> That which fends off attack or danger; a defense; a protection; a cover; security; shield.
An inclosure about a field or other space, or about any object; especially, an inclosing structure of wood, iron, or other material, intended to prevent intrusion from without or straying from within.
A projection on the bolt, which passes through the tumbler gates in locking and unlocking.


firewall machine ::: (networking) A dedicated gateway machine with special security precautions on it, used to service outside network, especially Internet, monitoring, call-back, and even a complete iron box keyable to particular incoming IDs or activity patterns.Firewalls often run proxy gateways.Synonym flytrap, Venus flytrap. (1997-06-08)

firewall machine "networking, security" A dedicated {gateway} {server} with special security precautions on it, used to service external connections (typically from the {public Internet}). The firewall machine protects servers and networks hidden behind it from {crackers}. The typical firewall is an inexpensive {microprocessor}-based {Unix} machine with no critical data, with public network ports on it, but just one carefully watched connection back to the rest of the cluster. The special precautions may include threat monitoring, {call-back}, and even a complete {iron box} keyable to particular incoming IDs or activity patterns. The type of network and security environment of a firewall machine is often called a {De-Militarised Zone} (DMZ). It may contain other servers such as e-mail servers or {proxy gateways} - machines that need to be publicly accessible but also need some access to internal systems. Also known as a (Venus) flytrap after the insect-eating plant. (2014-07-15)

flash ::: 1. (chat) A program which allows one to flood another Unix user's terminal with garbage, through exploiting a common security hole in the victim's host's talk daemon. Users with messages off (mesg n) and users on systems running fixed talk daemons, or not running talk daemons at all, are immune. (1996-09-08)2. See Flash Erasable Programmable Read-Only Memory. (1997-02-02)

flash 1. "file format" {Adobe} {Flash}. 2. "storage" {flash memory}. 2. "chat" A program to flood a {Unix} user's {terminal} with {garbage} by exploiting a {security hole} in the {talk} {daemon}. (1996-09-08)

fortress ::: 1. A large fortified place; a fort or a group of forts, often including a town; citadel. 2. Any place of exceptional security; stronghold.

fortress ::: n. --> A fortified place; a large and permanent fortification, sometimes including a town; a fort; a castle; a stronghold; a place of defense or security. ::: v. t. --> To furnish with a fortress or with fortresses; to guard; to fortify.

gage ::: n. --> A pledge or pawn; something laid down or given as a security for the performance of some act by the person depositing it, and forfeited by nonperformance; security.
A glove, cap, or the like, cast on the ground as a challenge to combat, and to be taken up by the accepter of the challenge; a challenge; a defiance.
A variety of plum; as, the greengage; also, the blue gage, frost gage, golden gage, etc., having more or less likeness to the


garrison ::: n. --> A body of troops stationed in a fort or fortified town.
A fortified place, in which troops are quartered for its security. ::: v. t. --> To place troops in, as a fortification, for its defense; to furnish with soldiers; as, to garrison a fort or town.


GE-645 ::: (computer) A computer built by General Electric, the successor to the GE-635, designed to provide the extra CPU features required by the Multics project.The GE-645 was designed in 1965 by John Couleur and Edward Glaser at MIT. It had several security levels and instructions for handling virtual memory. Addressing increasing the theoretical memory size and making virtual memory easier to support.Design of the GE-645's successor, the GE-655, started in 1967.(2006-09-24)

GE-645 "computer" A computer built by {General Electric}, the successor to the {GE-635}, designed to provide the extra CPU features required by the {Multics} project. The GE-645 was designed in 1965 by John Couleur and Edward Glaser at MIT. It had several security levels and instructions for handling {virtual memory}. Addressing used an 18-bit segment in addition to the 18-bit address, dramatically increasing the theoretical memory size and making virtual memory easier to support. Design of the GE-645's successor, the {GE-655}, started in 1967. (2006-09-24)

Generic Security Service Application Programming Interface ::: (security, programming) (GSS-API) An application level interface (API) to system security services. It provides a generic interface to services which may be provided by a variety of different security mechanisms. Vanilla GSS-API supports security contexts between two entities (known as principals).GSS-API is a draft internet standard which is being developed in the Common Authentication Technology Working Group (cat-wg) of the Internet Engineering Task Force (IETF).Initial specifications for GSS-API appeared in RFC 1508 and RFC 1509. Subsequent revisions appeared in several draft standards documents. . (1996-05-19)

Generic Security Service Application Programming Interface "security, programming" (GSS-API) An application level interface ({API}) to system security services. It provides a generic interface to services which may be provided by a variety of different security mechanisms. {Vanilla} GSS-API supports {security contexts} between two entities (known as "principals"). GSS-API is a draft internet standard which is being developed in the {Common Authentication Technology Working Group} (cat-wg) of the {Internet Engineering Task Force} (IETF). Initial specifications for GSS-API appeared in {RFC 1508} and {RFC 1509}. Subsequent revisions appeared in several draft standards documents. {(http://dstc.qut.edu.au/~barton/work/project.html)}. (1996-05-19)

grith ::: n. --> Peace; security; agreement.

GSS-API {Generic Security Service Application Programming Interface}

guarantee ::: n. --> In law and common usage: A promise to answer for the payment of some debt, or the performance of some duty, in case of the failure of another person, who is, in the first instance, liable to such payment or performance; an engagement which secures or insures another against a contingency; a warranty; a security. Same as Guaranty.
One who binds himself to see an undertaking of another performed; a guarantor.


guaranty ::: n. --> In law and common usage: An undertaking to answer for the payment of some debt, or the performance of some contract or duty, of another, in case of the failure of such other to pay or perform; a guarantee; a warranty; a security.
In law and common usage: To undertake or engage that another person shall perform (what he has stipulated); to undertake to be answerable for (the debt or default of another); to engage to answer for the performance of (some promise or duty by another) in case of a


guardian ::: v. t. --> One who guards, preserves, or secures; one to whom any person or thing is committed for protection, security, or preservation from injury; a warden.
One who has, or is entitled to, the custody of the person or property of an infant, a minor without living parents, or a person incapable of managing his own affairs. ::: a.


harbor ::: n. --> A station for rest and entertainment; a place of security and comfort; a refuge; a shelter.
Specif.: A lodging place; an inn.
The mansion of a heavenly body.
A portion of a sea, a lake, or other large body of water, either landlocked or artificially protected so as to be a place of safety for vessels in stormy weather; a port or haven.
A mixing box materials.


hole 1. "electronics" In the {hole model} of current flow, the absence of an {electron}, e.g. in a {semiconductor} material. In the {electron model}, a hole can be thought of as an incomplete outer electron shell in a doping substance. Considering holes as positive charge carriers is a useful abstraction. 2. "security" A security {vulnerability}, particularly one which allows an attacker to gain unauthorised access to a system (by analogy with a hole in a wall). (2014-10-25)

hostage ::: n. --> A person given as a pledge or security for the performance of the conditions of a treaty or stipulations of any kind, on the performance of which the person is to be released.

HyperText Transmission Protocol, Secure "protocol" (HTTPS) A variant of {HTTP} used by {Netscape} for handling secure transactions. The {Netscape Navigator} supports a {URL} {access method}, "https", for connecting to {HTTP} {servers} using {SSL}. "https" is a unique protocol that is simply {SSL} underneath {HTTP}. You need to use "https://" for HTTP {URLs} with {SSL}, whereas you continue to use "http://" for HTTP URLs without SSL. The default "https" {port} number is 443, as assigned by the {Internet Assigned Numbers Authority}. {(http://netscape.com/info/security-doc.html)}. (1995-01-16)

hypotheca ::: n. --> An obligation by which property of a debtor was made over to his creditor in security of his debt.

hypothecator ::: n. --> One who hypothecates or pledges anything as security for the repayment of money borrowed.

hypothec ::: n. --> A landlord&

IBM System/36 "computer" A mid-range {computer} introduced in 1983, which remained popular in the 1990s because of its low cost and high performance. Prices started in the $20k range for the small 5362 to $100+k for the expanded 5360. In 1994, IBM introduced the Advanced 36 for $9,000. The largest 5360 had 7MB of {RAM} and 1432MB of {hard disk}. The smallest 5362 had 256K of RAM and 30MB of hard disk. The Advanced 36 had 64MB of RAM and 4300MB of hard disk, but design issues limit the amount of storage that can actually be addressed by the {operating system}; underlying {microcode} allowed additional RAM to cache disk reads and writes, allowing the Advanced 36 to outperform the S/36 by 600 to 800%. There was only one operating system for the S/36: SSP ({System Support Product}). SSP consumed about 7-10MB of hard drive space. Computer programs on the S/36 reside in "libraries," and the SSP itself resides in a special system library called

IBM System/36 ::: (computer) A mid-range computer introduced in 1983, which remained popular in the 1990s because of its low cost and high performance. Prices started in the $20k range for the small 5362 to $100+k for the expanded 5360. In 1994, IBM introduced the Advanced 36 for $9,000.The largest 5360 had 7MB of RAM and 1432MB of hard disk. The smallest 5362 had 256K of RAM and 30MB of hard disk. The Advanced 36 had 64MB of RAM and 4300MB of to cache disk reads and writes, allowing the Advanced 36 to outperform the S/36 by 600 to 800%.There was only one operating system for the S/36: SSP (System Support Product). SSP consumed about 7-10MB of hard drive space. Computer programs on the S/36 reside in libraries, and the SSP itself resides in a special system library called

ICE ::: 1. (electronics) in-circuit emulator.2. (security, jargon) Intrusion Countermeasure Electronics.(2000-03-18)

ICE 1. "electronics" {in-circuit emulator}. 2. "security, jargon" {Intrusion Countermeasure Electronics}. (2000-03-18)

icebreaker "security, jargon" A program designed for cracking security on a system. See also: {ICE}. [{Jargon File}] (2000-03-18)

icebreaker ::: (security, jargon) A program designed for cracking security on a system.See also: ICE.[Jargon File](2000-03-18)

ICMP Router Discovery Protocol "protocol" (IRDP) A {routing} {protocol} used by {Microsoft Windows} {DHCP} clients and various {Unix} flavors. {Vulnerability (http://securiteam.com/securitynews/Most_DHCP_clients_are_vulnerable_to_an_IRDP_attack.html)}. [Details? Reference?] (1999-10-31)

insecurity ::: n. --> The condition or quality of being insecure; want of safety; danger; hazard; as, the insecurity of a building liable to fire; insecurity of a debt.
The state of feeling insecure; uncertainty; want of confidence.


incantation Any particularly arbitrary or obscure command that one must mutter at a system to attain a desired result. Not used of passwords or other explicit security features. Especially used of tricks that are so poorly documented that they must be learned from a {wizard}. "This compiler normally locates initialised data in the data segment, but if you {mutter} the right incantation they will be forced into text space."

incantation ::: Any particularly arbitrary or obscure command that one must mutter at a system to attain a desired result. Not used of passwords or other explicit security the data segment, but if you mutter the right incantation they will be forced into text space.

incolumity ::: n. --> Safety; security.

indemnity ::: n. --> Security; insurance; exemption from loss or damage, past or to come; immunity from penalty, or the punishment of past offenses; amnesty.
Indemnification, compensation, or remuneration for loss, damage, or injury sustained.


inerrably ::: adv. --> With security from error; infallibly; unerringly.

In its nature and law the Overmind is a delegate of the Supermind Consciousness, its delegate to the Ignorance. Or we might speak of it as a protective double, a screen of dissimilar similarity through which Supermind can act indirectly on an Ignorance whose darkness could not bear or receive the direct impact of a supreme Light. Even, it is by the projection of this luminous Overmind corona that the diffusion of a diminished light in the Ignorance and the throwing of that contrary shadow which swallows up in itself all light, the Inconscience, became at all possible. For Supermind transmits to Overmind all its realities, but leaves it to formulate them in a movement and according to an awareness of things which is still a vision of Truth and yet at the same time a first parent of the Ignorance. A line divides Supermind and Overmind which permits a free transmission, allows the lower Power to derive from the higher Power all it holds or sees, but automatically compels a transitional change in the passage. The integrality of the Supermind keeps always the essential truth of things, the total truth and the truth of its individual self-determinations clearly knit together; it maintains in them an inseparable unity and between them a close interpenetration and a free and full consciousness of each other: but in Overmind this integrality is no longer there. And yet the Overmind is well aware of the essential Truth of things; it embraces the totality; it uses the individual self-determinations without being limited by them: but although it knows their oneness, can realise it in a spiritual cognition, yet its dynamic movement, even while relying on that for its security, is not directly determined by it. Overmind Energy proceeds through an illimitable capacity of separation and combination of the powers and aspects of the integral and indivisible all-comprehending Unity. It takes each Aspect or Power and gives to it an independent action in which it acquires a full separate importance and is able to work out, we might say, its own world of creation. Purusha and Prakriti, Conscious Soul and executive Force of Nature, are in the supramental harmony a two-aspected single truth, being and dynamis of the Reality; there can be no disequilibrium or predominance of one over the other. In Overmind we have the origin of the cleavage, the trenchant distinction made by the philosophy of the Sankhyas in which they appear as two independent entities, Prakriti able to dominate Purusha and cloud its freedom and power, reducing it to a witness and recipient of her forms and actions, Purusha able to return to its separate existence and abide in a free self-sovereignty by rejection of her original overclouding material principle. So with the other aspects or powers of the Divine Reality, One and Many, Divine Personality and Divine Impersonality, and the rest; each is still an aspect and power of the one Reality, but each is empowered to act as an independent entity in the whole, arrive at the fullness of the possibilities of its separate expression and develop the dynamic consequences of that separateness. At the same time in Overmind this separateness is still founded on the basis of an implicit underlying unity; all possibilities of combination and relation between the separated Powers and Aspects, all interchanges and mutualities of their energies are freely organised and their actuality always possible.

In respect to the field of ethics in general, Soviet philosophers have lately been developing the doctrine known as socialist or proletarian humanism. As distinguished from "bourgeois humanism", this term signifies that system of social institutions and personal values designed to insure that there be no underprivileged gioup or class de facto excluded from full participation in the good life conceived in terms of the educational and cultural development of the individual and the full enjoyment of the things of this world. Such objectives, it is held, are only possible of attainment in a classless society where there is economic security for all. The view taken is that the freedoms and liberties proclaimed by "bourgeois humanism" represented a great historical advance, but one that was, in general, limited in application to the emancipation of the bourgeoisie (q.v.) from the restrictions of feudalism while retaining and making use, to greater or lesser extent, of slavery, serfdom and a system of private capitalism invoking the precarious economic existence and cultural darkness of large proletarian masses. While it is held that there is an absolute light binding upon all, vaguely expressed in such formulations as, each for all and all for each, it is asserted that in class society, the position and class interest of one class may motivate it to oppose a genuine application of this right, whereas the class interest of another class may coincide with such an application. It is held that the proletariat is in this latter position, for its class interest as well as its moral obligation is considered to be in abolishing itself as a proletariat, which is taken to mean, abolishing classes generally.

insafety ::: n. --> Insecurity; danger.

insecureness ::: n. --> Insecurity.

insecurities ::: pl. --> of Insecurity

instability ::: n. --> The quality or condition of being unstable; want of stability, firmness, or steadiness; liability to give way or to fail; insecurity; precariousness; as, the instability of a building.
Lack of determination of fixedness; inconstancy; fickleness; mutability; changeableness; as, instability of character, temper, custom, etc.


insurance ::: n. --> The act of insuring, or assuring, against loss or damage by a contingent event; a contract whereby, for a stipulated consideration, called premium, one party undertakes to indemnify or guarantee another against loss by certain specified risks. Cf. Assurance, n., 6.
The premium paid for insuring property or life.
The sum for which life or property is insured.
A guaranty, security, or pledge; assurance.


Internet Foundation Classes ::: (language, library, programming, standard) (IFC) A library of classes used in the creation of Java applets with GUIs.Created by Netscape, the Internet Foundation Classes provide GUI elements, as well as classes for Applications Services, Security, Messaging, and Distributed Objects.The IFC code, which is exclusively Java, is layered on top of the Java Abstract Windowing Toolkit (AWT), thus preserving platform independence.The AWT and IFC collectively form the Java Foundation Classes, which provide a standardised framework for developing powerful Java applications. .(2003-08-17)

Internet Foundation Classes "language, library, programming, standard" (IFC) A {library} of {classes} used in the creation of {Java} {applets} with {GUIs}. Created by {Netscape}, the Internet Foundation Classes provide GUI elements, as well as classes for {Applications Services}, {Security}, {Messaging}, and {Distributed Objects}. The IFC code, which is exclusively Java, is layered on top of the Java {Abstract Windowing Toolkit} (AWT), thus preserving {platform independence}. The AWT and IFC collectively form the {Java Foundation Classes}, which provide a standardised framework for developing powerful Java applications. {IFC download (http://wp.netscape.com/eng/ifc/download.html)}. (2003-08-17)

Internet Protocol version 6 ::: (networking, protocol) (IPv6, IPng, IP next generation) The most viable candidate to replace the current Internet Protocol. The primary purpose of IPv6 is to solve the problem of the shortage of IP addresses.The following features have been purposed: 16-byte addresses instead of the current four bytes; embedded encryption - a 32-bit Security Association ID Configuration Protocol); support for delay-sensitive traffic - a 24 bit flow ID field in headers to denote voice or video, etc.One possible solution is based on the TUBA protocol (RFC 1347, 1526, 1561) which is itself based on the OSI Connectionless Network Protocol (CNLP). Another is TP/IX (RFC 1475) which changes TCP and UDP headers to give a 64-bit IP address, a 32-bit port number, and a 64 bit sequence number.RFC 1550 is a white paper on IPng. .[Doubts About IPng could create TCP/IP chaos, Johna Till Johnson, Data Communications, Nov 1994].(2004-06-17)

Internet Protocol version 6 "networking, protocol" (IPv6, IPng, IP next generation) The most viable candidate to replace the current {Internet Protocol}. The primary purpose of IPv6 is to solve the problem of the shortage of {IP addresses}. The following features have been purposed: 16-byte addresses instead of the current four bytes; embedded {encryption} - a 32-bit {Security Association ID} (SAID) plus a variable length initialisation vector in {packet} headers; user {authentication} (a 32-bit SAID plus variable length {authentication} data in headers); autoconfiguration (currently partly handled by {Dynamic Host Configuration Protocol}); support for {delay-sensitive traffic} - a 24 bit flow ID field in headers to denote voice or video, etc. One possible solution is based on the {TUBA} protocol (RFC 1347, 1526, 1561) which is itself based on the {OSI} {Connectionless Network Protocol} (CNLP). Another is {TP/IX} (RFC 1475) which changes {TCP} and {UDP} headers to give a 64-bit {IP address}, a 32-bit {port} number, and a 64-bit sequence number. {RFC 1550} is a white paper on IPng. {IPv6.org (http://ipv6.org/)}. ["Doubts About IPng could create TCP/IP chaos", Johna Till Johnson, Data Communications, Nov 1994]. (2004-06-17)

Internet Security Association and Key Management Protocol ::: (networking, protocol) (ISAKMP) The definitions and procedures for authenticating communication between 2 peers. This includes the creation and management of Security Associations, key generation techniques, and threat mitigation. ISAKMP is proposed in RFC 2408.(2000-02-08)

Internet Security Association and Key Management Protocol "networking, protocol" (ISAKMP) The definitions and procedures for {authenticating} communication between 2 {peers}. This includes the creation and management of {Security Associations}, {key} generation techniques, and {threat mitigation}. ISAKMP is proposed in {RFC 2408}. (2000-02-08)

Internet Worm ::: (networking, security) The November 1988 worm perpetrated by Robert T. Morris. The worm was a program which took advantage of bugs in the Sun Unix made it create many copies of itself on machines it infected, which quickly used up all available processor time on those systems.Some call it The Great Worm in a play on Tolkien (compare elvish, elder days). In the fantasy history of his Middle Earth books, there were dragons powerful did more to make non-hackers nervous about the Internet than anything before or since. (1995-01-12)

Internet Worm "networking, security" The November 1988 {worm} perpetrated by {Robert T. Morris}. The worm was a program which took advantage of bugs in the {Sun} {Unix} {sendmail} program, {Vax} programs, and other security loopholes to distribute itself to over 6000 computers on the {Internet}. The worm itself had a bug which made it create many copies of itself on machines it infected, which quickly used up all available processor time on those systems. Some call it "The Great Worm" in a play on Tolkien (compare {elvish}, {elder days}). In the fantasy history of his Middle Earth books, there were dragons powerful enough to lay waste to entire regions; two of these (Scatha and Glaurung) were known as "the Great Worms". This usage expresses the connotation that the RTM hack was a sort of devastating watershed event in hackish history; certainly it did more to make non-hackers nervous about the Internet than anything before or since. (1995-01-12)

Intrusion Countermeasure Electronics "security, jargon" (ICE) A contrived acronym for security software, coined by {Usenet}ter Tom Maddox and popularised by {William Gibson}'s {cyberpunk} SF novels. In Gibson's novels ICE software responds to intrusion by attempting to literally kill the intruder. The term is not in serious use as of 2000 apart from the commercial software product, {BlackICE} and a growing number of others. See also: {icebreaker}. [{Jargon File}] (2000-03-18)

Intrusion Countermeasure Electronics ::: (security, jargon) (ICE) A contrived acronym for security software, coined by Usenetter Tom Maddox and popularised by William Gibson's cyberpunk SF novels. In Gibson's novels ICE software responds to intrusion by attempting to literally kill the intruder.The term is not in serious use as of 2000 apart from the commercial software product, BlackICE and a growing number of others.See also: icebreaker.[Jargon File](2000-03-18)

IPsec ::: (networking, protocol, security) (IP Secure?) A protocol that provides security for transmission of sensitive information over unprotected networks authenticating IP packets between participating devices (peers), such as Cisco routers. .(2002-05-06)

IPsec "networking, protocol, security" ("{IP} Secure"?) A {protocol} that provides {security} for transmission of sensitive information over unprotected {networks} such as the {Internet}. IPsec acts at the {network layer}, protecting and authenticating {IP} {packets} between participating devices ("peers"), such as {Cisco} {routers}. {IETF IPsec (http://ietf.org/ids.by.wg/ipsec.html)}. (2002-05-06)

ISAKMP {Internet Security Association and Key Management Protocol}

Java Message Service "programming, messaging" (JMS) An {API} for accessing enterprise messaging systems from {Java} programs. Java Message Service, part of the {J2EE} suite, provides standard APIs that Java developers can use to access the common features of enterprise message systems. JMS supports the {publish/subscribe} and {point-to-point} models and allows the creation of message types consisting of arbitrary Java objects. JMS provides support for administration, security, error handling, and recovery, optimisation, distributed transactions, message ordering, message acknowledgment, and more. {(http://java.sun.com/products/jms)}. {Overview (http://developer.java.sun.com/developer/technicalArticles/Networking/messaging/)}. (2001-06-22)

Java "programming, language" An {object-oriented}, {distributed}, {interpreted}, {architecture-neutral}, {portable}, {multithreaded}, dynamic, buzzword-compliant, general-purpose programming language developed by {Sun Microsystems} in the early 1990s (initially for set-top television controllers) and released to the public in 1995. Java was named after the Indonesian island, a source of {programming fluid}. Java first became popular as the earliest portable dynamic client-side content for the {web} in the form of {platform}-independent {Java applets}. In the late 1990s and into the 2000s it also became very popular on the server side, where an entire set of {APIs} defines the {J2EE}. Java is both a set of public specifications (controlled by {Oracle}, who bought {Sun Microsystems}, through the {JCP}) and a series of implementations of those specifications. Java is syntactially similar to {C++} without user-definable {operator overloading}, (though it does have {method} overloading), without {multiple inheritance} and extensive automatic {coercions}. It has automatic {garbage collection}. Java extends {C++}'s {object-oriented} facilities with those of {Objective C} for {dynamic method resolution}. Whereas programs in C++ and similar languages are compiled and linked to platform-specific binary executables, Java programs are typically compiled to portable {architecture-neutral} {bytecode} ".class" files, which are run using a {Java Virtual Machine}. The JVM is also called an {interpreter}, though it is more correct to say that it uses {Just-In-Time Compilation} to convert the {bytecode} into {native} {machine code}, yielding greater efficiency than most interpreted languages, rivalling C++ for many long-running, non-GUI applications. The run-time system is typically written in {POSIX}-compliant {ANSI C} or {C++}. Some implementations allow Java class files to be translated into {native} {machine code} during or after compilation. The Java compiler and {linker} both enforce {strong type checking} - procedures must be explicitly typed. Java aids in the creation of {virus}-free, tamper-free systems with {authentication} based on {public-key encryption}. Java has an extensive library of routines for all kinds of programming tasks, rivalling that of other languages. For example, the {java.net} package supports {TCP/IP} {protocols} like {HTTP} and {FTP}. Java applications can access objects across the {Internet} via {URLs} almost as easily as on the local {file system}. There are also capabilities for several types of distributed applications. The Java {GUI} libraries provide portable interfaces. For example, there is an abstract {Window} class with implementations for {Unix}, {Microsoft Windows} and the {Macintosh}. The {java.awt} and {javax.swing} classes can be used either in web-based {Applets} or in {client-side applications} or {desktop applications}. There are also packages for developing {XML} applications, {web services}, {servlets} and other web applications, {security}, date and time calculations and I/O formatting, database ({JDBC}), and many others. Java is not related to {JavaScript} despite the name. {(http://oracle.com/java)}. (2011-08-21)

Java ::: (programming, language, portability) (After the Indonesian island, a source of programming fluid) A simple, object-oriented, distributed, Sun Microsystems in the early 1990's (initially for set-top television controllers), and released to the public in 1995.Java first became popular by being the earliest portable dynamic client-side content for the World-Wide Web in the form of platform-independent Java applets. In the late 1990's and into the 2000's it has also become very popular on the server side, where an entire set of APIs defines the J2EE.Java is both a set of public specifications (controlled by Sun Microsystems through the JCP) and a series of implementations of those specifications.Java is syntactially similar to C++ without user-definable operator overloading, (though it does have method overloading), without multiple inheritance, and C++'s object-oriented facilities with those of Objective C for dynamic method resolution.Whereas programs in C++ and similar languages are compiled and linked to platform-specific binary executables, Java programs are typically compiled to implementations allow Java class files to be translated into native machine code during or after compilation.The Java compiler and linker both enforce strong type checking - procedures must be explicitly typed. Java supports the creation of virus-free, tamper-free systems with authentication based on public-key encryption.Java has an extensive library of routines for all kinds of programming tasks, rivalling that of other languages.For example, the java.net} package supports TCP/IP protocols like HTTP and FTP. Java applications can access objects across the Internet via URLs almost as easily as on the local file system. There are also capabilities for several types of distributed applications.The Java GUI libraries provide portable interfaces. For example, there is an abstract Window class and implementations of it for Unix, Microsoft Windows and the Macintosh. The java.awt and javax.swing classes can be used either in Web-based Applets or in client-side or desktop applications.There are also packages for developing XML applications, web services, servlets and other web applications, security, date and time calculations and I/O formatting, database (JDBC), and many others.Java is not directly related to JavaScript despite the name. .Usenet newsgroup: comp.lang.java.(2005-01-21)

job security "jargon" When some piece of code is written in a particularly obscure fashion, and no good reason (such as time or space optimisation) can be discovered, it is often said that the programmer was attempting to increase his job security (i.e. by making himself indispensable for maintenance). This sour joke seldom has to be said in full; if two hackers are looking over some code together and one points at a section and says "job security", the other one may just nod. [{Jargon File}] (1996-09-17)

job security ::: (jargon) When some piece of code is written in a particularly obscure fashion, and no good reason (such as time or space optimisation) can be together and one points at a section and says job security, the other one may just nod.[Jargon File] (1996-09-17)

joe "jargon, security" A computer account whose user name and password are the same. Joes are {considered harmful}, as are any passwords which are easy to guess. (1995-06-21)

joe ::: (jargon, security) A computer account whose user name and password are the same. Joes are considered harmful, as are any passwords which are easy to guess. (1995-06-21)

juice jacking "security" A method for gaining unauthorised access to a portable device ({mobile phone}, {tablet} or {laptop}) by modifying a public {USB} charging point. The device's user only expects to get power from the USB connection but there’s also the possibility of an attacker with access to the USB socket hardware moidifying it to read data off the device or deploy {malware} to it. This can be prevented by using an adapter that blocks data and passes only power. (2019-12-13)

Kerberos "security" The {authentication} system of {MIT}'s Project {Athena}. It is based on {symmetric key cryptography}. Adopted by {OSF} as the basis of security for {DME}. (1997-02-04)

Kerberos ::: (security) The authentication system of MIT's Project Athena. It is based on symmetric key cryptography. Adopted by OSF as the basis of security for DME. (1997-02-04)

kernel (Note: NOT "kernal"). 1. "operating system" The essential part of {Unix} or other {operating systems}, responsible for resource allocation, low-level hardware interfaces, security etc. See also {microkernel}. 2. "language" An essential subset of a programming language, in terms of which other constructs are (or could be) defined. Also known as a {core} language. (1996-06-07)

kernel ::: (Note: NOT kernal).1. (operating system) The essential part of Unix or other operating systems, responsible for resource allocation, low-level hardware interfaces, security etc. See also microkernel.2. (language) An essential subset of a programming language, in terms of which other constructs are (or could be) defined. Also known as a core language. (1996-06-07)

key escrow "security" A controversial arrangement where the {keys} needed to decrypt encrypted data must be held in {escrow} by a third party so that government agencies can obtain them to decrypt messages which they suspect to be relevant to national security. (1999-12-14)

key escrow ::: (security) A controversial arrangement where the keys needed to decrypt encrypted data must be held in escrow by a third party so that government agencies can obtain them to decrypt messages which they suspect to be relevant to national security. (1999-12-14)

kremvax /krem-vaks/ (Or kgbvax) Originally, a fictitious {Usenet} site at the Kremlin, named like the then large number of {Usenet} {VAXen} with names of the form foovax. Kremvax was announced on April 1, 1984 in a posting ostensibly originated there by Soviet leader Konstantin Chernenko. The posting was actually forged by Piet Beertema as an April Fool's joke. Other fictitious sites mentioned in the hoax were moskvax and {kgbvax}. This was probably the funniest of the many April Fool's forgeries perpetrated on {Usenet} (which has negligible security against them), because the notion that {Usenet} might ever penetrate the Iron Curtain seemed so totally absurd at the time. In fact, it was only six years later that the first genuine site in Moscow, demos.su, joined {Usenet}. Some readers needed convincing that the postings from it weren't just another prank. Vadim Antonov, senior programmer at Demos and the major poster from there up to mid-1991, was quite aware of all this, referred to it frequently in his own postings, and at one point twitted some credulous readers by blandly asserting that he *was* a hoax! Eventually he even arranged to have the domain's gateway site *named* kremvax, thus neatly turning fiction into truth and demonstrating that the hackish sense of humour transcends cultural barriers. Mr. Antonov also contributed some Russian-language material for the {Jargon File}. In an even more ironic historical footnote, kremvax became an electronic centre of the anti-communist resistance during the bungled hard-line coup of August 1991. During those three days the Soviet UUCP network centreed on kremvax became the only trustworthy news source for many places within the USSR. Though the sysops were concentrating on internal communications, cross-border postings included immediate transliterations of Boris Yeltsin's decrees condemning the coup and eyewitness reports of the demonstrations in Moscow's streets. In those hours, years of speculation that totalitarianism would prove unable to maintain its grip on politically-loaded information in the age of computer networking were proved devastatingly accurate - and the original kremvax joke became a reality as Yeltsin and the new Russian revolutionaries of "glasnost" and "perestroika" made kremvax one of the timeliest means of their outreach to the West. [{Jargon File}]

L0pht "security" /loft/ An Internet security organisation that merged with {@stake} in January 2000. (2003-06-12)

L0pht ::: (security) /loft/ An Internet security organisation that merged with @stake in January 2000.(2003-06-12)

landed ::: imp. & p. p. --> of Land ::: a. --> Having an estate in land.
Consisting in real estate or land; as, landed property; landed security.


Lawrence Livermore National Laboratory "body" (LLNL) A research organaisatin operated by the {University of California} under a contract with the US Department of Energy. LLNL was founded on 2 September 1952 at the site of an old World War II naval air station. The Lab employs researchers from many scientific and engineering disciplines. Some of its departments are the National Ignition Facility, the Human Genome Center, the ASCI Tera-Scale Computing partnership, the Computer Security Technology Center, and the Site 300 Experimental Test Facility. Other research areas are Astronomy and Astrophysics, Atmospheric Science, Automation and Robotics, Biology, Chemistry, Computing, Energy Research, Engineering, Environmental Science, Fusion, Geology and Geophysics, Health, Lasers and Optics, Materials Science, National Security, Physics, Sensors and Instrumentation, Space Science. LLNL also works with industry in research and licensing projects. At the end of fiscal year 1995, the lab had signed agreements for 193 cost-shared research projects involving 201 companies and worth nearly $600m. {(http://llnl.gov/)}. Address: Fremont, California, USA. (1996-10-30)

Lawrence Livermore National Laboratory ::: (body) (LLNL) A research organaisatin operated by the University of California under a contract with the US Department of Energy. LLNL was founded on 2 September 1952 at the site of an old World War II naval air station.The Lab employs researchers from many scientific and engineering disciplines. Some of its departments are the National Ignition Facility, the Human Genome Optics, Materials Science, National Security, Physics, Sensors and Instrumentation, Space Science.LLNL also works with industry in research and licensing projects. At the end of fiscal year 1995, the lab had signed agreements for 193 cost-shared research projects involving 201 companies and worth nearly $600m. .Address: Fremont, California, USA. (1996-10-30)

live data 1. Data that is written to be interpreted and takes over program flow when triggered by some un-obvious operation, such as viewing it. One use of such hacks is to break security. For example, some smart terminals have commands that allow one to download strings to program keys; this can be used to write live data that, when listed to the terminal, infects it with a security-breaking {virus} that is triggered the next time a hapless user strikes that key. For another, there are some well-known bugs in {vi} that allow certain texts to send arbitrary commands back to the machine when they are simply viewed. 2. In {C}, data that includes pointers to functions (executable code). 3. An object, such as a {trampoline}, that is constructed on the fly by a program and intended to be executed as code. 4. Actual real-world data, as opposed to "test data". For example, "I think I have the record deletion module finished." "Have you tried it out on live data?" This usage usually carries the connotation that live data is more fragile and must not be corrupted, or bad things will happen. So a more appropriate response to the above claim might be: "Well, make sure it works perfectly before we throw live data at it." The implication here is that record deletion is something pretty significant, and a haywire record-deletion module running amok on live data would probably cause great harm. [{Jargon File}]

logic bomb "programming, security" Code surreptitiously inserted into an application or {operating system} that causes it to perform some destructive or security-compromising activity whenever specified conditions are met. Compare {back door}. [{Jargon File}] (1996-07-02)

logic bomb ::: (programming, security) Code surreptitiously inserted into an application or operating system that causes it to perform some destructive or security-compromising activity whenever specified conditions are met.Compare back door.[Jargon File] (1996-07-02)

log in "security" (Or "login", "log on", "logon") To start a {session} with a system, usually by giving a {user name} and {password} as a means of user {authentication}. The term is also used to mean the ability to access a service (also called an account), e.g. "Have you been given a login yet?" "Log in/on" is occasionally misused to refer to starting a session where no authorisation is involved, or to access where there is no session involved. E.g. "Log on to our {Web site}!" "login" is also the {Unix} program which reads and verifies a user's user name and password and starts an {interactive} session. The noun forms are usually written as a single word whereas the verb forms are often written as two words. To end a session is to "{log out}" or "off". (2006-07-10)

log in ::: (security) (Or login, log on, logon) To start a session with a system, usually by giving a user name and password as a means of user authentication. The term is also used to mean the ability to access a service (also called an account), e.g. Have you been given a login yet?Log in/on is occasionally misused to refer to starting a session where no authorisation is involved, or to access where there is no session involved. E.g. Log on to our Web site!login is also the Unix program which reads and verifies a user's user name and password and starts an interactive session.The noun forms are usually written as a single word whereas the verb forms are often written as two words.To end a session is to log out or off.(2006-07-10)

log out ::: (security) (Or log off) To end an authenticated session, undoing what happens when you log in. This is primarily to prevent other users gaining access terminates any processes and network connections started as part of your session.(2004-11-16)

log out "security" (Or "log off") To end an authenticated session, undoing what happens when you {log in}. This is primarily to prevent other users gaining access to your logged in session, e.g. at an unattended computer, but typically also terminates any processes and network connections started as part of your session. (2004-11-16)

mainframe "computer" A term originally referring to the cabinet containing the central processor unit or "main frame" of a room-filling {Stone Age} batch machine. After the emergence of smaller "{minicomputer}" designs in the early 1970s, the traditional {big iron} machines were described as "mainframe computers" and eventually just as mainframes. The term carries the connotation of a machine designed for batch rather than interactive use, though possibly with an interactive {time-sharing} operating system retrofitted onto it; it is especially used of machines built by {IBM}, {Unisys} and the other great {dinosaurs} surviving from computing's {Stone Age}. It has been common wisdom among hackers since the late 1980s that the mainframe architectural tradition is essentially dead (outside of the tiny market for {number crunching} {supercomputers} (see {Cray})), having been swamped by the recent huge advances in {integrated circuit} technology and low-cost personal computing. As of 1993, corporate America is just beginning to figure this out - the wave of failures, takeovers, and mergers among traditional mainframe makers have certainly provided sufficient omens (see {dinosaurs mating}). Supporters claim that mainframes still house 90% of the data major businesses rely on for mission-critical applications, attributing this to their superior performance, reliability, scalability, and security compared to microprocessors. [{Jargon File}] (1996-07-22)

mainframe ::: (computer) A term originally referring to the cabinet containing the central processor unit or main frame of a room-filling Stone Age batch used of machines built by IBM, Unisys and the other great dinosaurs surviving from computing's Stone Age.It has been common wisdom among hackers since the late 1980s that the mainframe architectural tradition is essentially dead (outside of the tiny market for failures, takeovers, and mergers among traditional mainframe makers have certainly provided sufficient omens (see dinosaurs mating).Supporters claim that mainframes still house 90% of the data major businesses rely on for mission-critical applications, attributing this to their superior performance, reliability, scalability, and security compared to microprocessors.[Jargon File] (1996-07-22)

mainprise ::: n. --> A writ directed to the sheriff, commanding him to take sureties, called mainpernors, for the prisoner&

malware as a service "security, legal" A kind of {cybercrime as a service} in which the service provider operates or distributes {malware} on behalf of others for money. (2015-02-23)

malware "security" Any {software} designed to do something that the user would not wish it to do, hasn't asked it to do, and often has no knowledge of until it's too late. Types of malware include {backdoor}, {ransomware}, {virus}, {worm}, {Trojan horse}. Malware typically affects the system on which it is run, e.g. by deleting or corrupting files on the local disks. Since Internet connections became common, malware has increasingly targeted remote systems. An early example was malware consisting of a malicious e-mail attachment that targeted security flaws in {Microsoft Outlook} (the most common {e-mail client}) to send itself to all the user's contacts. A more recent kind of malware "recruits" the infected computer to become part of a {botnet} consisting of thousands of infected computers that can then be remotely controlled and used to launch {DDoS} attacks. (2007-11-15)

managed code "operating system" Code that is executed by the {.NET} {common language runtime} (CLR). {VB.NET} code is always managed code but {C++ .NET} can optionally use unmanaged code. Managed code provides {metadata} allowing the CLR to manage security (role-based as well as new approaches to code access security). The CLR also handles errors, manages the program {stack} and finds {methods} in assembly modules. Managed data is memory that's subject to {garbage collection}. There are additional restrictions to permit interoperability of different languages, for example, {Visual Basic} {arrays} must be zero-based. (2007-07-13)

Microsoft Certified Systems Administrator "education" (MCSA) {Microsoft}'s qualification for people who administer {network} and system environments based on {Windows} {operating systems}. Specializations include Messaging and Security. Replaced by {Microsoft Certified Solutions Associate}. (2013-09-02)

Missing definition "introduction" First, this is an (English language) __computing__ dictionary. It includes lots of terms from related fields such as mathematics and electronics, but if you're looking for (or want to submit) words from other subjects or general English words or other languages, try {(http://wikipedia.org/)}, {(http://onelook.com/)}, {(http://yourdictionary.com/)}, {(http://www.dictionarist.com/)} or {(http://reference.allrefer.com/)}. If you've already searched the dictionary for a computing term and it's not here then please __don't tell me__. There are, and always will be, a great many missing terms, no dictionary is ever complete. I use my limited time to process the corrections and definitions people have submitted and to add the {most frequently requested missing terms (missing.html)}. Try one of the sources mentioned above or {(http://techweb.com/encyclopedia/)}, {(http://whatis.techtarget.com/)} or {(http://google.com/)}. See {the Help page (help.html)} for more about missing definitions and bad cross-references. (2014-09-20)! {exclamation mark}!!!Batch "language, humour" A daft way of obfuscating text strings by encoding each character as a different number of {exclamation marks} surrounded by {question marks}, e.g. "d" is encoded as "?!!!!?". The language is named after the {MSDOS} {batch file} in which the first converter was written. {esoteric programming languages} {wiki entry (http://esolangs.org/wiki/!!!Batch)}. (2014-10-25)" {double quote}

mortgage ::: n. --> A conveyance of property, upon condition, as security for the payment of a debt or the preformance of a duty, and to become void upon payment or performance according to the stipulated terms; also, the written instrument by which the conveyance is made.
State of being pledged; as, lands given in mortgage. ::: v. t.


Muieblackcat "security" A {bot} script, supposedly of Ukrainian origin, that attempts to exploit {PHP} {vulnerabilities} or misconfigurations. {SUC027: Muieblackcat setup.php Web Scanner/Robot (http://eromang.zataz.com/2011/08/14/suc027-muieblackcat-setup-php-web-scanner-robot/)} (2018-07-23)

Multics ::: (operating system) /muhl'tiks/ MULTiplexed Information and Computing Service. A time-sharing operating system co-designed by a consortium including 1969, and took several more years to achieve respectable performance and stability.Multics was very innovative for its time - among other things, it was the first major OS to run on a symmetric multiprocessor; provided a hierarchical file default mode of operation. Multics was the only general-purpose system to be awarded a B2 security rating by the NSA.Bell Labs left the development effort in 1969. Honeywell commercialised Multics in 1972 after buying out GE's computer group, but it was never very successful: at its peak in the 1980s, there were between 75 and 100 Multics sites, each a multi-million dollar mainframe.One of the former Multics developers from Bell Labs was Ken Thompson, a circumstance which led directly to the birth of Unix. For this and other reasons, aspects of the Multics design remain a topic of occasional debate among hackers. See also brain-damaged and GCOS.MIT ended its development association with Multics in 1977. Honeywell sold its computer business to Bull in the mid 1980s, and development on Multics was stopped in 1988 when Bull scrapped a Boston proposal to port Multics to a platform derived from the DPS-6.A few Multics sites are still in use as late as 1996.The last Multics system running, the Canadian Department of National Defence Multics site in Halifax, Nova Scotia, Canada, shut down on 2000-10-30 at 17:08 UTC.The Jargon file 3.0.0 claims that on some versions of Multics one was required to enter a password to log out but James J. Lippard , program that required a password before one could type anything, including logout. .Usenet newsgroup: alt.os.multics.[Jargon File](2002-04-12)

Multics "operating system" /muhl'tiks/ MULTiplexed Information and Computing Service. A {time-sharing} {operating system} co-designed by a consortium including {MIT}, {GE} and {Bell Laboratories} as a successor to MIT's {CTSS}. The system design was presented in a special session of the 1965 Fall Joint Computer Conference and was planned to be operational in two years. It was finally made available in 1969, and took several more years to achieve respectable performance and stability. Multics was very innovative for its time - among other things, it was the first major OS to run on a {symmetric multiprocessor}; provided a {hierarchical file system} with {access control} on individual files; mapped files into a paged, segmented {virtual memory}; was written in a {high-level language} ({PL/I}); and provided dynamic inter-procedure linkage and memory (file) sharing as the default mode of operation. Multics was the only general-purpose system to be awarded a B2 {security rating} by the {NSA}. Bell Labs left the development effort in 1969. {Honeywell} commercialised Multics in 1972 after buying out GE's computer group, but it was never very successful: at its peak in the 1980s, there were between 75 and 100 Multics sites, each a multi-million dollar {mainframe}. One of the former Multics developers from Bell Labs was {Ken Thompson}, a circumstance which led directly to the birth of {Unix}. For this and other reasons, aspects of the Multics design remain a topic of occasional debate among hackers. See also {brain-damaged} and {GCOS}. MIT ended its development association with Multics in 1977. Honeywell sold its computer business to {Bull} in the mid 1980s, and development on Multics was stopped in 1988 when Bull scrapped a Boston proposal to port Multics to a {platform} derived from the {DPS-6}. A few Multics sites are still in use as late as 1996. The last Multics system running, the Canadian Department of National Defence Multics site in Halifax, Nova Scotia, Canada, shut down on 2000-10-30 at 17:08 UTC. The {Jargon file} 3.0.0 claims that on some versions of Multics one was required to enter a password to log out but James J. Lippard "lippard@primenet.com", who was a Multics developer in Phoenix, believes this to be an {urban legend}. He never heard of a version of Multics which required a password to logout. Tom Van Vleck "thvv@multicians.org" agrees. He suggests that some user may have implemented a 'terminal locking' program that required a password before one could type anything, including logout. {(http://multicians.org/)}. {Usenet} newsgroup: {news:alt.os.multics}. [{Jargon File}] (2002-04-12)

munching ::: Exploration of security holes of someone else's computer for thrills, notoriety or to annoy the system manager. Compare cracker. See also hacked off.[Jargon File]

munching Exploration of security holes of someone else's computer for thrills, notoriety or to annoy the system manager. Compare {cracker}. See also {hacked off}. [{Jargon File}]

munity ::: n. --> Freedom; security; immunity.

nastygram "networking" /nas'tee-gram/ 1. A {network} {packet} or {e-mail} message (the latter is also called a {letterbomb}) that takes advantage of misfeatures or security holes on the target system to do untoward things. 2. Disapproving e-mail, especially from a {net.god}, pursuant to a violation of {netiquette} or a complaint about failure to correct some mail- or news-transmission problem. Compare {shitogram}, {mailbomb}. 3. A status report from an unhappy, and probably picky, customer. "What did Corporate say in today's nastygram?" 4. [deprecated] An error reply by mail from a {daemon}; in particular, a {bounce message}. [{Jargon File}] (2004-02-17)

nastygram ::: (networking) /nas'tee-gram/ 1. A network packet or e-mail message (the latter is also called a letterbomb) that takes advantage of misfeatures or security holes on the target system to do untoward things.2. Disapproving e-mail, especially from a net.god, pursuant to a violation of netiquette or a complaint about failure to correct some mail- or news-transmission problem. Compare shitogram, mailbomb.3. A status report from an unhappy, and probably picky, customer. What did Corporate say in today's nastygram?4. [deprecated] An error reply by mail from a daemon; in particular, a bounce message.[Jargon File](2004-02-17)

ne exeat ::: --> A writ to restrain a person from leaving the country, or the jurisdiction of the court. The writ was originally applicable to purposes of state, but is now an ordinary process of courts of equity, resorted to for the purpose of obtaining bail, or security to abide a decree.

Network Administrator "job" A person who manages a communications {network} within an organisation. Responsibilities include network {security}, installing new applications, distributing software upgrades, monitoring daily activity, enforcing licensing agreements, developing a {storage management} program and providing for routine {backups}. (2004-03-20)

Network Administrator ::: (job) A person who manages a communications network within an organisation. Responsibilities include network security, installing new enforcing licensing agreements, developing a storage management program and providing for routine backups.(2004-03-20)

network management "networking" The process of controlling a {network} so as to maximise its efficiency and productivity. {ISO}'s model divides network management into five categories: {fault management}, {accounting management}, {configuration management}, {security management} and {performance management}. Fault management is the process of identifying and locating faults in the network. This could include discovering the existence of the problem, identifying the source, and possibly repairing (or at least isolating the rest of the network from) the problem. Configuration management is the process of identifying, tracking and modifying the setup of devices on the network. This category is extremely important for devices that come with numerous custom settings (e.g. {routers} and {file servers}). Security management is the process of controlling (granting, limiting, restricting or denying) access to the network and resources thereon. This could include setting up and managing {access lists} in {routers} (creating "{firewalls}" to keep intruders out), creating and maintaining password access to critical network resources, identifying the points of entry used by intruders and closing them. Performance Management is the process of measuring the performance of various network components. This also includes taking measures to optimise the network for maximum system performance (periodically measuring of the use of network resources). {Usenet} newsgroup: {news:comp.dcom.net-management}. ["Network Management: A Practical Perspective", Allan Leinwand and Karen Fang]. (1994-11-18)

network management ::: (networking) The process of controlling a network so as to maximise its efficiency and productivity. ISO's model divides network management into five categories: fault management, accounting management, configuration management, security management and performance management.Fault management is the process of identifying and locating faults in the network. This could include discovering the existence of the problem, identifying the source, and possibly repairing (or at least isolating the rest of the network from) the problem.Configuration management is the process of identifying, tracking and modifying the setup of devices on the network. This category is extremely important for devices that come with numerous custom settings (e.g. routers and file servers).Security management is the process of controlling (granting, limiting, restricting or denying) access to the network and resources thereon. This could network resources, identifying the points of entry used by intruders and closing them.Performance Management is the process of measuring the performance of various network components. This also includes taking measures to optimise the network for maximum system performance (periodically measuring of the use of network resources).Usenet newsgroup: comp.dcom.net-management.[Network Management: A Practical Perspective, Allan Leinwand and Karen Fang]. (1994-11-18)

nonsurety ::: n. --> Insecurity.

NSA line eater ::: (messaging, tool) The National Security Agency trawling program sometimes assumed to be reading the net for the US Government's spooks. Most hackers creature. The GNU version of Emacs actually has a command that randomly inserts a bunch of insidious anarcho-verbiage into your edited text.There is a mainstream variant of this myth involving a Trunk Line Monitor, which supposedly used speech recognition to extract words from telephone trunks. in. Speech-recognition technology can't do this job even now (1993), and almost certainly won't in this millennium, either.The peak of silliness came with a letter to an alternative paper in New Haven, Connecticut, laying out the factoids of this Big Brotherly affair. The letter the Trunk Trawler and presumably allowing the would-be Baader-Meinhof gangs of the world to get on with their business.[Jargon File] (1994-12-13)

NSA line eater "messaging, tool" The National Security Agency trawling program sometimes assumed to be reading the net for the US Government's spooks. Most hackers describe it as a mythical beast, but some believe it actually exists, more aren't sure, and many believe in acting as though it exists just in case. Some netters put loaded phrases like "KGB", "Uzi", "nuclear materials", "Palestine", "cocaine", and "assassination" in their {sig blocks} to confuse and overload the creature. The {GNU} version of {Emacs} actually has a command that randomly inserts a bunch of insidious anarcho-verbiage into your edited text. There is a mainstream variant of this myth involving a "Trunk Line Monitor", which supposedly used speech recognition to extract words from telephone trunks. This one was making the rounds in the late 1970s, spread by people who had no idea of then-current technology or the storage, {signal-processing}, or {speech recognition} needs of such a project. On the basis of mass-storage costs alone it would have been cheaper to hire 50 high-school students and just let them listen in. Speech-recognition technology can't do this job even now (1993), and almost certainly won't in this millennium, either. The peak of silliness came with a letter to an alternative paper in New Haven, Connecticut, laying out the factoids of this Big Brotherly affair. The letter writer then revealed his actual agenda by offering - at an amazing low price, just this once, we take VISA and MasterCard - a scrambler guaranteed to daunt the Trunk Trawler and presumably allowing the would-be Baader-Meinhof gangs of the world to get on with their business. [{Jargon File}] (1994-12-13)

nyet.gif "security" A file that {crackers} from Russia tied to upload to many {web sites} in 2014 to test whether the victim's {web server} {software} was configured to accepted {HTTP PUT} requests. (2014-11-23)

obfuscated "programming" Made unclear, used to describe {source code} that has been transformed or written to make it as hard as possible to read, usually for fun, as in the {Obfuscated C Contest}. A {japh} is a kind of obfuscated {Perl} program. The term is not normally used for code that has been transformed for security purposes, e.g. to enforce some kind of licencing mechanism. (2009-05-14)

Object-code Buffer Overrun Evaluator "security, programming, tool" (OBOE) A tool by R. Banfi, D. Bruschi, and E. Rosti for the automatic detection of {buffer overflow} {vulnerabilities} in {object code}. OBOE can be applied to {operating system} components as well as ordinary {application programs}. It was designed for the {system administrator} to identify vulnerable programs before they are exploited. Being automatic, OBOE can be run as a {background process} for the analysis of all potentially insecure programs installed on a {Unix} system. It runs on {HP-UX}, {Linux}, and {Sun} {Solaris}. {(http://idea.sec.dsi.unimi.it/research.html)}. (2003-10-25)

Object-code Buffer Overrun Evaluator ::: (security, programming, tool) (OBOE) A tool by R. Banfi, D. Bruschi, and E. Rosti for the automatic detection of buffer overrun vulnerabilities in object as a background process for the analysis of all potentially insecure programs installed on a Unix system. It runs on HP-UX, Linux, and Sun Solaris. .(2003-10-25)

One-Time Password ::: (security) (OTP) A security system that requires a new password every time a user authenticates themselves, thus protecting against an intruder replaying an intercepted password. OTP generates passwords using either the MD4 or MD5 hashing algorithms.The equivalent term S/Key, developed by Bellcore, is a trademark of Telcordia Technologies, so the name OTP is used increasingly.See RFC 1760 - The S/KEY One-Time Password System and RFC 1938 - A One-Time Password System. .(2000-01-31)

One-Time Password "security" (OTP) A security system that requires a new password every time a user authenticates themselves, thus protecting against an intruder replaying an intercepted password. OTP generates passwords using either the {MD4} or {MD5} {hashing} {algorithms}. The equivalent term "S/Key", developed by Bellcore, is a trademark of {Telcordia Technologies}, so the name OTP is used increasingly. See {RFC 1760} - "The S/KEY One-Time Password System" and {RFC 1938} - "A One-Time Password System". {(http://cs.umd.edu/~harry/jotp/)}. (2000-01-31)

On-Line Analytical Processing "database" (OLAP) A category of {database} software which provides an interface such that users can transform or limit raw data according to user-defined or pre-defined functions, and quickly and interactively examine the results in various dimensions of the data. OLAP primarily involves aggregating large amounts of diverse data. OLAP can involve millions of data items with complex relationships. Its objective is to analyze these relationships and look for patterns, trends, and exceptions. The term was originally coined by {Dr. Codd} in 1993 with 12 "rules". Since then, the {OLAP Council}, many vendors, and Dr. Codd himself have added new requirements and confusion. Richard Creeth and Nigel Pendse define OLAP as fast analysis of shared multidimensional information. Their definition requires the system to respond to users within about five seconds. It should support logical and statistical processing of results without the user having to program in a {4GL}. It should implement all the security requirements for confidentiality and concurrent update locking. The system must provide a multidimensional conceptual view of the data, including full support for multiple hierarchies. Other aspects to consider include data duplication, {RAM} and disk space requirements, performance, and integration with {data warehouses}. Various bodies have attempted to come up with standards for OLAP, including The {OLAP Council} and the {Analytical Solutions Forum} (ASF), however, the {Microsoft OLE DB for OLAP API} is the most widely adopted and has become the {de facto standard}. {(http://access.digex.net/~grimes/olap/)}. {Usenet} newsgroup: {news:comp.databases.olap}. {(http://arborsoft.com/papers/finkTOC.html)}. [What's a "multidimensional conceptual view"?] (1996-09-24)

OpenBSD ::: (operating system) A version of BSD Unix with an emphasis on security. A lot of security work that is ported to other free operating systems originates with OpenBSD and a lot of code review is done here.Sub-projects of OpenBSD include implementations of , and CVS, to be called OpenCVS. .(2005-01-17)

OpenBSD "operating system" A version of {BSD Unix} with an emphasis on security. A lot of security work that is ported to other free operating systems originates with OpenBSD and a lot of {code review} is done here. Sub-projects of OpenBSD include implementations of {SSH (http://openssh.org/)}, {ntpd (http://openntpd.org/)}, and {CVS}, to be called OpenCVS. {OpenBSD Home (http://openbsd.org/)}. (2005-01-17)

Orange Book "security, standard" A standard from the US Government {National Computer Security Council} (an arm of the U.S. National Security Agency), "Trusted Computer System Evaluation Criteria, DOD standard 5200.28-STD, December 1985" which defines criteria for trusted computer products. There are four levels, A, B, C, and D. Each level adds more features and requirements. D is a non-secure system. C1 requires user log-on, but allows {group ID}. C2 requires individual log-on with password and an audit mechanism. (Most {Unix} implementations are roughly C1, and can be upgraded to about C2 without excessive pain). Levels B and A provide mandatory control. Access is based on standard Department of Defense clearances. B1 requires DOD clearance levels. B2 guarantees the path between the user and the security system and provides assurances that the system can be tested and clearances cannot be downgraded. B3 requires that the system is characterised by a mathematical model that must be viable. A1 requires a system characterized by a mathematical model that can be proven. See also {crayola books}, {book titles}. [{Jargon File}] (1997-01-09)

Orange Book ::: (security, standard) A standard from the US Government National Computer Security Council (an arm of the U.S. National Security Agency), Trusted which defines criteria for trusted computer products. There are four levels, A, B, C, and D. Each level adds more features and requirements.D is a non-secure system.C1 requires user log-on, but allows group ID.C2 requires individual log-on with password and an audit mechanism. (Most Unix implementations are roughly C1, and can be upgraded to about C2 without excessive pain).Levels B and A provide mandatory control. Access is based on standard Department of Defense clearances.B1 requires DOD clearance levels.B2 guarantees the path between the user and the security system and provides assurances that the system can be tested and clearances cannot be downgraded.B3 requires that the system is characterised by a mathematical model that must be viable.A1 requires a system characterized by a mathematical model that can be proven.See also crayola books, book titles.[Jargon File] (1997-01-09)

OTP ::: 1. (security) One-Time Password.2. (protocol) Open Trading Protocol.3. (storage, integrated circuit) One Time Programmable Read Only Memory.4. (communications, library) Open Telecom Platform.(2001-08-28)

OTP 1. "security" {One-Time Password}. 2. "protocol" {Open Trading Protocol}. 3. "storage, integrated circuit" {One Time Programmable Read Only Memory}. 4. "communications, library" {Open Telecom Platform}. (2001-08-28)

padded cell Where you put {lusers} so they can't hurt anything. A program that limits a luser to a carefully restricted subset of the capabilities of the host system (for example, the "{rsh}" utility on {USG Unix}). Note that this is different from an {iron box} because it is overt and not aimed at enforcing security so much as protecting others (and the {luser}) from the consequences of the luser's boundless naivet'e (see {naive}). Also "padded cell environment". [{Jargon File}] (1994-11-30)

palladium ::: n. --> Any statue of the goddess Pallas; esp., the famous statue on the preservation of which depended the safety of ancient Troy.
Hence: That which affords effectual protection or security; a sateguard; as, the trial by jury is the palladium of our civil rights.
A rare metallic element of the light platinum group, found native, and also alloyed with platinum and gold. It is a


PAP ::: 1. (networking, protocol, security) Password Authentication Protocol.2. (networking, protocol, printer) Printer Access Protocol. (1996-03-23)

PAP 1. "networking, protocol, security" {Password Authentication Protocol}. 2. "networking, protocol, printer" {Printer Access Protocol}. (1996-03-23)

passw0rd "security" A common default {password}, often given out by {system administrtors} to new users, the hope being that they will change it immediately. (2011-11-22)

password "security" An arbitrary string of characters chosen by a user or {system administrator} and used to authenticate the user when he attempts to log on, in order to prevent unauthorised access to his account. A favourite activity among unimaginative {computer nerds} and {crackers} is writing programs which attempt to discover passwords by using lists of commonly chosen passwords such as people's names (spelled forward or backward). It is recommended that to defeat such methods passwords use a mixture of upper and lower case letters or digits and avoid proper names and real words. If you have trouble remembering random strings of characters, make up an acronym like "ihGr8trmP" ("I have great trouble remembering my password"). (1994-10-27)

password ::: (security) An arbitrary string of characters chosen by a user or system administrator and used to authenticate the user when he attempts to log on, in order to prevent unauthorised access to his account.A favourite activity among unimaginative computer nerds and crackers is writing programs which attempt to discover passwords by using lists of commonly chosen trouble remembering random strings of characters, make up an acronym like ihGr8trmP (I have great trouble remembering my password). (1994-10-27)

patch "software" 1. A temporary addition to a piece of code, usually as a {quick-and-dirty} remedy to an existing {bug} or {misfeature}. A patch may or may not work, and may or may not eventually be incorporated permanently into the program. Distinguished from a {diff} or {mod} by the fact that a patch is generated by more primitive means than the rest of the program; the classical examples are instructions modified by using the front panel switches, and changes made directly to the binary executable of a program originally written in an {HLL}. Compare {one-line fix}. 2. To insert a patch into a piece of code. 3. [in the Unix world] A {diff}. 4. A set of modifications to binaries to be applied by a patching program. {IBM} systems often receive updates to the {operating system} in the form of absolute {hexadecimal} patches. If you have modified your OS, you have to disassemble these back to the {source code}. The patches might later be corrected by other patches on top of them (patches were said to "grow scar tissue"). The result was often a convoluted {patch space} and headaches galore. There is a classic story of a {tiger team} penetrating a secure military computer that illustrates the danger inherent in binary patches (or, indeed, any patches that you can't - or don't - inspect and examine before installing). They couldn't find any {trap doors} or any way to penetrate security of IBM's OS, so they made a site visit to an IBM office (remember, these were official military types who were purportedly on official business), swiped some IBM stationery, and created a fake patch. The patch was actually the trapdoor they needed. The patch was distributed at about the right time for an IBM patch, had official stationery and all accompanying documentation, and was dutifully installed. The installation manager very shortly thereafter learned something about proper procedures. 5. {Larry Wall}'s "patch" {utility program}, which automatically applies a patch to a set of {source code} or other text files. Patch accepts input in any of the four forms output by the {Unix} {diff} utility. When the files being patched are not identical to those on which the diffs were based, patch uses {heuristics} to determine how to proceed. Diff and patch are the standard way of producing and applying updates under {Unix}. Both have been ported to other {operating systems}. {Patch Home (http://gnu.org/software/patch/patch.html)}. [{Jargon File}] (2005-05-16)

patrol ::: v. i. --> To go the rounds along a chain of sentinels; to traverse a police district or beat.
A going of the rounds along the chain of sentinels and between the posts, by a guard, usually consisting of three or four men, to insure greater security from attacks on the outposts.
A movement, by a small body of troops beyond the line of outposts, to explore the country and gain intelligence of the enemy&


pawnbroker ::: n. --> One who makes a business of lending money on the security of personal property pledged or deposited in his keeping.

pawnee ::: n. --> One or two whom a pledge is delivered as security; one who takes anything in pawn.

pawn ::: n. --> See Pan, the masticatory.
A man or piece of the lowest rank.
Anything delivered or deposited as security, as for the payment of money borrowed, or of a debt; a pledge. See Pledge, n., 1.
State of being pledged; a pledge for the fulfillment of a promise.
A stake hazarded in a wager.


pawnor ::: n. --> One who pawns or pledges anything as security for the payment of borrowed money or of a debt.

PCTE+ ::: A European NATO specification based on PCTE with security enhancements.

PCTE+ A European NATO specification based on {PCTE} with security enhancements.

"Peace is a deep quietude where no disturbance can come — a quietude with a sense of established security and release.” Letters on Yoga

“Peace is a deep quietude where no disturbance can come—a quietude with a sense of established security and release.” Letters on Yoga

Personal Identification Number "security" (PIN, "PIN number") A {password}, typically four digits entered through a telephone keypad or automatic teller machine. (1996-11-03)

Personal Identification Number ::: (security) (PIN, PIN number) A password, typically four digits entered through a telephone keypad or automatic teller machine. (1996-11-03)

phacker "communications, security" A telephone system {cracker}. A phacker may attempt to gain unauthorised access to a phone system in order to make free or untraceable calls or he may disrupt, alter or illegally tap phone systems via computer. The disruptions may include causing a phone line to be engaged so no calls go in or out, redirecting outgoing or incoming calls, as well as listening to actual calls made. Phackers are frequently confidence tricksters or phone freaks (nuisance callers who can only relate to other people by phone). Phackers are sometimes employed by illegal enterprises to conduct business using untraceable calls, or to disrupt, or follow legal authorities' investigations. Phackers interventions may be lethal to the person being phacked. A phacker may be a phone company employee, or usually, ex-employee who specialises in illegal phone system disruption, alteration or tapping via physically altering installations. A phacker is generally considered to be a socially and intellectually retarded cracker. See {Captain Crunch}. (1998-08-09)

phacker ::: (communications, security) A telephone system cracker. A phacker may attempt to gain unauthorised access to a phone system in order to make free or untraceable calls or he may disrupt, alter or illegally tap phone systems via computer.The disruptions may include causing a phone line to be engaged so no calls go in or out, redirecting outgoing or incoming calls, as well as listening to actual calls made.Phackers are frequently confidence tricksters or phone freaks (nuisance callers who can only relate to other people by phone). Phackers are sometimes employed disrupt, or follow legal authorities' investigations. Phackers interventions may be lethal to the person being phacked.A phacker may be a phone company employee, or usually, ex-employee who specialises in illegal phone system disruption, alteration or tapping via physically altering installations. A phacker is generally considered to be a socially and intellectually retarded cracker.See Captain Crunch. (1998-08-09)

phishing "security" ("brand spoofing", "carding", after "fishing") /fishing/ Sending {e-mail} that claims to be from some well-known organisation, e.g. a bank, to trick the recipient into revealing information for use in {identity theft}. The user is told to visit a {website} where they are asked to enter information such as passwords, credit card details, social security or bank account numbers. The website usually looks like it belongs to the organisation in question and may silently redirect the user to the real website after collecting their data. For example, a scam started in 2003 claimed that the user's eBay account would be suspended unless he updated his credit card information on a given website. (2006-01-19)

phishing ::: (security) (brand spoofing, carding, after fishing) /fishing/ Sending e-mail that claims to be from some well-known organisation, e.g. a bank, web site usually looks like it belongs to the organisation in question and may silently redirect the user to the real web site after collecting their data.For example, a scam started in 2003 claimed that the user's eBay account would be suspended unless he updated his credit card information on a given web site.(2006-01-19)

phreaking "jargon" /freek'ing/ "phone phreak" 1. The art and science of {cracking} the telephone network so as, for example, to make free long-distance calls. 2. By extension, security-{cracking} in any other context (especially, but not exclusively, on communications networks). At one time phreaking was a semi-respectable activity among hackers; there was a gentleman's agreement that phreaking as an intellectual game and a form of exploration was OK, but serious theft of services was taboo. There was significant crossover between the hacker community and the hard-core phone phreaks who ran semi-underground networks of their own through such media as the legendary "TAP Newsletter". This ethos began to break down in the mid-1980s as wider dissemination of the techniques put them in the hands of less responsible phreaks. Around the same time, changes in the phone network made old-style technical ingenuity less effective as a way of hacking it, so phreaking came to depend more on overtly criminal acts such as stealing phone-card numbers. The crimes and punishments of gangs like the "414 group" turned that game very ugly. A few old-time hackers still phreak casually just to keep their hand in, but most these days have hardly even heard of "blue boxes" or any of the other paraphernalia of the great phreaks of yore. [{Jargon File}] (1994-11-09)

phreaking ::: (jargon) /freek'ing/ phone phreak 1. The art and science of cracking the telephone network so as, for example, to make free long-distance calls.2. By extension, security-cracking in any other context (especially, but not exclusively, on communications networks).At one time phreaking was a semi-respectable activity among hackers; there was a gentleman's agreement that phreaking as an intellectual game and a form of phreaks who ran semi-underground networks of their own through such media as the legendary TAP Newsletter.This ethos began to break down in the mid-1980s as wider dissemination of the techniques put them in the hands of less responsible phreaks. Around the same effective as a way of hacking it, so phreaking came to depend more on overtly criminal acts such as stealing phone-card numbers.The crimes and punishments of gangs like the 414 group turned that game very ugly. A few old-time hackers still phreak casually just to keep their hand in, but most these days have hardly even heard of blue boxes or any of the other paraphernalia of the great phreaks of yore.[Jargon File] (1994-11-09)

plan file ::: (operating system) On Unix systems that support finger, the .plan file in a user's home directory is displayed when the user is fingered. This feature humorous and self-expressive purposes (like a sig block). See also Hacking X for Y.A later innovation in plan files was the introduction of scrolling plan files which are one-dimensional animations made using only the printable ASCII sequences, since the finger command will (for security reasons; see letterbomb) not pass the escape character.Scrolling .plan files have become art forms in miniature, and some sites have started competitions to find who can create the longest running, funniest, and most original animations. A compiler (ASP) is available on Usenet for producing them. Typical animation components include: Centipede: mmmmmeLorry/Truck: oo-oP a much richer forum for the publication of personal minutiae and digital creativity.See also twirling baton.[Jargon File] (1998-01-16)

plan file "operating system" On {Unix} systems that support {finger}, the ".plan" file in a user's {home directory} is displayed when the user is fingered. This feature was originally intended to be used to keep potential fingerers apprised of one's location and near-future plans, but has been turned almost universally to humorous and self-expressive purposes (like a {sig block}). See also {Hacking X for Y}. A later innovation in plan files was the introduction of "scrolling plan files" which are one-dimensional animations made using only the printable {ASCII} character set, {carriage return} and {line feed}, avoiding terminal specific {escape sequences}, since the {finger} command will (for security reasons; see {letterbomb}) not pass the {escape} character. Scrolling .plan files have become art forms in miniature, and some sites have started competitions to find who can create the longest running, funniest, and most original animations. A compiler (ASP) is available on {Usenet} for producing them. Typical animation components include: Centipede: mmmmme Lorry/Truck: oo-oP Andalusian Video Snail: _@/ In the mid-1990s {WWW} {home pages} largely supplanted .plan files, providing a much richer forum for the publication of personal minutiae and digital creativity. See also {twirling baton}. [{Jargon File}] (1998-01-16)

pledge ::: n. --> The transfer of possession of personal property from a debtor to a creditor as security for a debt or engagement; also, the contract created between the debtor and creditor by a thing being so delivered or deposited, forming a species of bailment; also, that which is so delivered or deposited; something put in pawn.
A person who undertook, or became responsible, for another; a bail; a surety; a hostage.
A hypothecation without transfer of possession.


Pluggable Authentication Module "security" (PAM) The new industry standard integrated {login} {framework}. PAM is used by system entry components, such as the {Common Desktop Environment}'s dtlogin, to authenticate users logging into a {Unix} system. It provides pluggability for a variety of system-entry services. PAM's ability to {stack} authentication {modules} can be used to integrate {login} with different authentication mechanisms such as {RSA}, {DCE} and {Kerberos}, and thus unify login mechanisms. PAM can also integrate {smart card} authentication. {White paper (http://gr.osf.org/book/psm-wppr.htm)}. [OSF-RFC 86.0 V. Samar, R. Schemers, "Unified Login with Pluggable Authentication Modules (PAM)", Oct 1995]. (1997-07-18)

Pooling Agreement for Technical Assistance "business" (PATA) Written limitations on what types of technical information is shared when two companies (or departments) work together on a common project. Often because of security concerns rather than marketing concerns. (2010-02-20)

precarious ::: 1. Dangerously lacking in security or stability. 2. Subject to chance or unknown conditions.

preservation ::: n. --> The act or process of preserving, or keeping safe; the state of being preserved, or kept from injury, destruction, or decay; security; safety; as, preservation of life, fruit, game, etc.; a picture in good preservation.

Pretty Good Privacy "tool, cryptography" (PGP) A high security {RSA} {public-key encryption} application for {MS-DOS}, {Unix}, {VAX/VMS}, and other computers. It was written by {Philip R. Zimmermann} "pkz@acm.org" of Phil's Pretty Good(tm) Software and later augmented by a cast of thousands, especially including Hal Finney, Branko Lankester, and Peter Gutmann. PGP was distributed as "{guerrilla freeware}". The authors don't mind if it is distributed widely, just don't ask Philip Zimmermann to send you a copy. PGP uses a {public-key encryption} {algorithm} claimed by US patent

primary key "database" A unique {identifier}, often an {integer}, that labels a certain row in a table of a {relational database}. When this value occurs in other tables as a reference to a particular row in the first table it is called a "foreign key". Some {RDBMS}es can generate a new unique identifier each time a new row is inserted, others merely allow a column to be constrained to contain unique values. A table may have multiple {candidate keys}, from which the primary key is chosen. The primary key should be an arbitrary value, such as an {autoincrementing} integer. This avoids dependence on uniqueness, permanence and format of existing columns with real-world meaning (e.g. a person's name) or other external identifier (e.g. social security number). There should be enough possible primary key values to cater for the current and expected number of rows, bearing in mind that a wider column will generally be slower to process. (2006-05-29)

privacy "security" An attribute of a system's {security} that ensures that only intended or desired people or bodies can read a message or piece of stored data. Privacy is often enforced by some kind of {access control} or {encryption}. (2011-06-03)

Project Guardian "project, security" A project which grew out of the {ARPA} support for {Multics} and the sale of Multics systems to the US Air Force. The USAF wanted a system that could be used to handle more than one security classification of data at a time. They contracted with {Honeywell} and {MITRE Corporation} to figure out how to do this. Project Guardian led to the creation of the {Access Isolation Mechanism}, the forerunner of the {B2} labeling and star property support in Multics. The {DoD Orange Book} was influenced by the experience in building secure systems gained in Project Guardian. (1997-01-29)

proxy "networking" A process that accepts requests for some service and passes them on to the real {server}. A proxy may run on dedicated {hardware} or may be purely {software}. It may transform the request in some way or provide some additional layer of functionality such as {caching} or remote access. A proxy may be intended to increase security, e.g. a {web proxy} that allows multiple clients inside an organisation to access the {Internet} through a single secure, shared connection. (2007-09-03)

proxy server "networking" A {server} process that intercepts requests from a client, passes them to an {origin server} and returns the response to the client while performing various other operations in the process. An {HTTP proxy server} is a common example. A proxy may be used for purposes of {security}, performance ({caching}) or anonymity. It may be purely software or may run on its own hardware, either a standard {PC} or server machine or a custom hardware appliance. A software proxy may be on the same computer as the client or the origin server, separate hardware may be anywhere on the network in between. The proxy may filter requests, rejecting some if the request or response matches certain conditions (e.g. an {antivirus} proxy). It may cache requests and responses to reduce load on the origin server or data volume on the network or to provide quicker response to the client for common requests. The proxy may modify the request or response, e.g. to convert between different protocols or interfaces. Proxy servers are often used in large companies as part of a {firewall} so that users within the company need have no direct connection to the Internet (and can use a {private IP address} range) but can still access the {web}, {instant messenger}, etc via the proxy. Usually this requires each client to be configured to use the proxy. The term "proxy gateway" may more imply transparency (less intervention) in the request-response process, though is often used as a synonym for proxy server. (2008-07-01)

Proxy Server "software, security" (Capitalised) {Microsoft}'s {proxy server} and {proxy gateway}, designed to provide extensible {firewall} and network security. Proxy Server is part of {BackOffice}. (1999-09-17)

Public-Key Cryptography Standards "cryptography, standard" (PKCS) A set of {standards} for {public-key cryptography}, developed by {RSA Data Security, Inc.} in cooperation with an informal consortium, originally including {Apple}, {Microsoft}, {DEC}, {Lotus}, {Sun} and {MIT}. The PKCS have been cited by the {OSI Implementers' Workshop} (OIW) as a method for implementation of {OSI} standards. PKCS includes both {algorithm}-specific and algorithm-independent implementation standards. Many algorithms are supported, including {RSA} and {Diffie-Hellman} key exchange, however, only the latter two are specifically detailed. PKCS also defines an algorithm-independent {syntax} for {digital signatures}, {digital envelopes}, and extended {digital certificates}; this enables someone implementing any cryptographic algorithm whatsoever to conform to a standard syntax, and thus achieve interoperability. E-mail: pkcs@rsa.com. (1999-02-16)

public-key encryption "cryptography" (PKE, Or "public-key cryptography") An {encryption} scheme, introduced by Diffie and Hellman in 1976, where each person gets a pair of keys, called the public key and the private key. Each person's public key is published while the private key is kept secret. Messages are encrypted using the intended recipient's public key and can only be decrypted using his private key. This is often used in conjunction with a {digital signature}. The need for sender and receiver to share secret information (keys) via some secure channel is eliminated: all communications involve only public keys, and no private key is ever transmitted or shared. Public-key encryption can be used for {authentication}, {confidentiality}, {integrity} and {non-repudiation}. {RSA encryption} is an example of a public-key cryptosystem. {alt.security FAQ (http://cis.ohio-state.edu/hypertext/faq/bngusenet/alt/security/top.html)}. See also {knapsack problem}. (1995-03-27)

rainbow series "publication" Any of several series of technical manuals distinguished by cover colour. The original rainbow series was the NCSC security manuals (see {Orange Book}, {crayola books}); the term has also been commonly applied to the PostScript reference set (see {Red Book}, {Green Book}, {Blue Book}, {White Book}). Which books are meant by ""the" rainbow series" unqualified is thus dependent on one's local technical culture. [{Jargon File}] (1996-12-03)

ransomware "security" A kind of {malware} that {encrypts} files on your computer and then demands that you send the malware operator money in order to have the files decrypted. {CryptoLocker} was the best known example of ransomware. (2015-01-22)

RC4 "cryptography" A {cipher} designed by {RSA Data Security, Inc.} which can accept {keys} of arbitrary length, and is essentially a {pseudo random number generator} with the output of the generator being {XOR}ed with the data stream to produce the encrypted data. For this reason, it is very important that the same RC4 key never be used to encrypt two different data streams. The encryption mechanism used to be a trade secret, until someone posted source code for an {algorithm} onto {Usenet News}, claiming it to be equivalent to RC4. The algorithm is very fast, its security is unknown, but breaking it does not seem trivial either. There is very strong evidence that the posted algorithm is indeed equivalent to RC4. The United States government routinely approves RC4 with 40-bit keys for export. Keys this small can be easily broken by governments, criminals, and amateurs. The exportable version of {Netscape}'s {Secure Socket Layer}, which uses RC4-40, was broken by at least two independent groups. Breaking it took about eight days; in many universities or companies the same computing power is available to any computer science student. See also {Damien Doligez's SSL cracking page (http://pauillac.inria.fr/~doligez/ssl/)}, {RC4 Source and Information (http://cs.hut.fi/crypto/rc4)}, {SSLeay (http://cs.hut.fi/crypto/software.html

Real Programmers Don't Use Pascal "humour" Back in the good old days - the "Golden Era" of computers, it was easy to separate the men from the boys (sometimes called "Real Men" and "Quiche Eaters" in the literature). During this period, the Real Men were the ones that understood computer programming, and the Quiche Eaters were the ones that didn't. A real computer programmer said things like "DO 10 I=1,10" and "ABEND" (they actually talked in capital letters, you understand), and the rest of the world said things like "computers are too complicated for me" and "I can't relate to computers - they're so impersonal". (A previous work [1] points out that Real Men don't "relate" to anything, and aren't afraid of being impersonal.) But, as usual, times change. We are faced today with a world in which little old ladies can get computers in their microwave ovens, 12-year-old kids can blow Real Men out of the water playing Asteroids and Pac-Man, and anyone can buy and even understand their very own Personal Computer. The Real Programmer is in danger of becoming extinct, of being replaced by high-school students with {TRASH-80s}. There is a clear need to point out the differences between the typical high-school junior Pac-Man player and a Real Programmer. If this difference is made clear, it will give these kids something to aspire to -- a role model, a Father Figure. It will also help explain to the employers of Real Programmers why it would be a mistake to replace the Real Programmers on their staff with 12-year-old Pac-Man players (at a considerable salary savings). LANGUAGES The easiest way to tell a Real Programmer from the crowd is by the programming language he (or she) uses. Real Programmers use {Fortran}. Quiche Eaters use {Pascal}. Nicklaus Wirth, the designer of Pascal, gave a talk once at which he was asked how to pronounce his name. He replied, "You can either call me by name, pronouncing it 'Veert', or call me by value, 'Worth'." One can tell immediately from this comment that Nicklaus Wirth is a Quiche Eater. The only parameter passing mechanism endorsed by Real Programmers is call-by-value-return, as implemented in the {IBM 370} {Fortran-G} and H compilers. Real programmers don't need all these abstract concepts to get their jobs done - they are perfectly happy with a {keypunch}, a {Fortran IV} {compiler}, and a beer. Real Programmers do List Processing in Fortran. Real Programmers do String Manipulation in Fortran. Real Programmers do Accounting (if they do it at all) in Fortran. Real Programmers do {Artificial Intelligence} programs in Fortran. If you can't do it in Fortran, do it in {assembly language}. If you can't do it in assembly language, it isn't worth doing. STRUCTURED PROGRAMMING The academics in computer science have gotten into the "structured programming" rut over the past several years. They claim that programs are more easily understood if the programmer uses some special language constructs and techniques. They don't all agree on exactly which constructs, of course, and the examples they use to show their particular point of view invariably fit on a single page of some obscure journal or another - clearly not enough of an example to convince anyone. When I got out of school, I thought I was the best programmer in the world. I could write an unbeatable tic-tac-toe program, use five different computer languages, and create 1000-line programs that WORKED. (Really!) Then I got out into the Real World. My first task in the Real World was to read and understand a 200,000-line Fortran program, then speed it up by a factor of two. Any Real Programmer will tell you that all the Structured Coding in the world won't help you solve a problem like that - it takes actual talent. Some quick observations on Real Programmers and Structured Programming: Real Programmers aren't afraid to use {GOTOs}. Real Programmers can write five-page-long DO loops without getting confused. Real Programmers like Arithmetic IF statements - they make the code more interesting. Real Programmers write self-modifying code, especially if they can save 20 {nanoseconds} in the middle of a tight loop. Real Programmers don't need comments - the code is obvious. Since Fortran doesn't have a structured IF, REPEAT ... UNTIL, or CASE statement, Real Programmers don't have to worry about not using them. Besides, they can be simulated when necessary using {assigned GOTOs}. Data Structures have also gotten a lot of press lately. Abstract Data Types, Structures, Pointers, Lists, and Strings have become popular in certain circles. Wirth (the above-mentioned Quiche Eater) actually wrote an entire book [2] contending that you could write a program based on data structures, instead of the other way around. As all Real Programmers know, the only useful data structure is the Array. Strings, lists, structures, sets - these are all special cases of arrays and can be treated that way just as easily without messing up your programing language with all sorts of complications. The worst thing about fancy data types is that you have to declare them, and Real Programming Languages, as we all know, have implicit typing based on the first letter of the (six character) variable name. OPERATING SYSTEMS What kind of operating system is used by a Real Programmer? CP/M? God forbid - CP/M, after all, is basically a toy operating system. Even little old ladies and grade school students can understand and use CP/M. Unix is a lot more complicated of course - the typical Unix hacker never can remember what the PRINT command is called this week - but when it gets right down to it, Unix is a glorified video game. People don't do Serious Work on Unix systems: they send jokes around the world on {UUCP}-net and write adventure games and research papers. No, your Real Programmer uses OS 370. A good programmer can find and understand the description of the IJK305I error he just got in his JCL manual. A great programmer can write JCL without referring to the manual at all. A truly outstanding programmer can find bugs buried in a 6 megabyte {core dump} without using a hex calculator. (I have actually seen this done.) OS is a truly remarkable operating system. It's possible to destroy days of work with a single misplaced space, so alertness in the programming staff is encouraged. The best way to approach the system is through a keypunch. Some people claim there is a Time Sharing system that runs on OS 370, but after careful study I have come to the conclusion that they were mistaken. PROGRAMMING TOOLS What kind of tools does a Real Programmer use? In theory, a Real Programmer could run his programs by keying them into the front panel of the computer. Back in the days when computers had front panels, this was actually done occasionally. Your typical Real Programmer knew the entire bootstrap loader by memory in hex, and toggled it in whenever it got destroyed by his program. (Back then, memory was memory - it didn't go away when the power went off. Today, memory either forgets things when you don't want it to, or remembers things long after they're better forgotten.) Legend has it that {Seymore Cray}, inventor of the Cray I supercomputer and most of Control Data's computers, actually toggled the first operating system for the CDC7600 in on the front panel from memory when it was first powered on. Seymore, needless to say, is a Real Programmer. One of my favorite Real Programmers was a systems programmer for Texas Instruments. One day he got a long distance call from a user whose system had crashed in the middle of saving some important work. Jim was able to repair the damage over the phone, getting the user to toggle in disk I/O instructions at the front panel, repairing system tables in hex, reading register contents back over the phone. The moral of this story: while a Real Programmer usually includes a keypunch and lineprinter in his toolkit, he can get along with just a front panel and a telephone in emergencies. In some companies, text editing no longer consists of ten engineers standing in line to use an 029 keypunch. In fact, the building I work in doesn't contain a single keypunch. The Real Programmer in this situation has to do his work with a "text editor" program. Most systems supply several text editors to select from, and the Real Programmer must be careful to pick one that reflects his personal style. Many people believe that the best text editors in the world were written at Xerox Palo Alto Research Center for use on their Alto and Dorado computers [3]. Unfortunately, no Real Programmer would ever use a computer whose operating system is called SmallTalk, and would certainly not talk to the computer with a mouse. Some of the concepts in these Xerox editors have been incorporated into editors running on more reasonably named operating systems - {Emacs} and {VI} being two. The problem with these editors is that Real Programmers consider "what you see is what you get" to be just as bad a concept in Text Editors as it is in women. No the Real Programmer wants a "you asked for it, you got it" text editor - complicated, cryptic, powerful, unforgiving, dangerous. TECO, to be precise. It has been observed that a TECO command sequence more closely resembles transmission line noise than readable text [4]. One of the more entertaining games to play with TECO is to type your name in as a command line and try to guess what it does. Just about any possible typing error while talking with TECO will probably destroy your program, or even worse - introduce subtle and mysterious bugs in a once working subroutine. For this reason, Real Programmers are reluctant to actually edit a program that is close to working. They find it much easier to just patch the binary {object code} directly, using a wonderful program called SUPERZAP (or its equivalent on non-IBM machines). This works so well that many working programs on IBM systems bear no relation to the original Fortran code. In many cases, the original source code is no longer available. When it comes time to fix a program like this, no manager would even think of sending anything less than a Real Programmer to do the job - no Quiche Eating structured programmer would even know where to start. This is called "job security". Some programming tools NOT used by Real Programmers: Fortran preprocessors like {MORTRAN} and {RATFOR}. The Cuisinarts of programming - great for making Quiche. See comments above on structured programming. Source language debuggers. Real Programmers can read core dumps. Compilers with array bounds checking. They stifle creativity, destroy most of the interesting uses for EQUIVALENCE, and make it impossible to modify the operating system code with negative subscripts. Worst of all, bounds checking is inefficient. Source code maintenance systems. A Real Programmer keeps his code locked up in a card file, because it implies that its owner cannot leave his important programs unguarded [5]. THE REAL PROGRAMMER AT WORK Where does the typical Real Programmer work? What kind of programs are worthy of the efforts of so talented an individual? You can be sure that no Real Programmer would be caught dead writing accounts-receivable programs in {COBOL}, or sorting {mailing lists} for People magazine. A Real Programmer wants tasks of earth-shaking importance (literally!). Real Programmers work for Los Alamos National Laboratory, writing atomic bomb simulations to run on Cray I supercomputers. Real Programmers work for the National Security Agency, decoding Russian transmissions. It was largely due to the efforts of thousands of Real Programmers working for NASA that our boys got to the moon and back before the Russkies. Real Programmers are at work for Boeing designing the operating systems for cruise missiles. Some of the most awesome Real Programmers of all work at the Jet Propulsion Laboratory in California. Many of them know the entire operating system of the Pioneer and Voyager spacecraft by heart. With a combination of large ground-based Fortran programs and small spacecraft-based assembly language programs, they are able to do incredible feats of navigation and improvisation - hitting ten-kilometer wide windows at Saturn after six years in space, repairing or bypassing damaged sensor platforms, radios, and batteries. Allegedly, one Real Programmer managed to tuck a pattern-matching program into a few hundred bytes of unused memory in a Voyager spacecraft that searched for, located, and photographed a new moon of Jupiter. The current plan for the Galileo spacecraft is to use a gravity assist trajectory past Mars on the way to Jupiter. This trajectory passes within 80 +/-3 kilometers of the surface of Mars. Nobody is going to trust a Pascal program (or a Pascal programmer) for navigation to these tolerances. As you can tell, many of the world's Real Programmers work for the U.S. Government - mainly the Defense Department. This is as it should be. Recently, however, a black cloud has formed on the Real Programmer horizon. It seems that some highly placed Quiche Eaters at the Defense Department decided that all Defense programs should be written in some grand unified language called "ADA" ((C), DoD). For a while, it seemed that ADA was destined to become a language that went against all the precepts of Real Programming - a language with structure, a language with data types, {strong typing}, and semicolons. In short, a language designed to cripple the creativity of the typical Real Programmer. Fortunately, the language adopted by DoD has enough interesting features to make it approachable -- it's incredibly complex, includes methods for messing with the operating system and rearranging memory, and Edsgar Dijkstra doesn't like it [6]. (Dijkstra, as I'm sure you know, was the author of "GoTos Considered Harmful" - a landmark work in programming methodology, applauded by Pascal programmers and Quiche Eaters alike.) Besides, the determined Real Programmer can write Fortran programs in any language. The Real Programmer might compromise his principles and work on something slightly more trivial than the destruction of life as we know it, providing there's enough money in it. There are several Real Programmers building video games at Atari, for example. (But not playing them - a Real Programmer knows how to beat the machine every time: no challenge in that.) Everyone working at LucasFilm is a Real Programmer. (It would be crazy to turn down the money of fifty million Star Trek fans.) The proportion of Real Programmers in Computer Graphics is somewhat lower than the norm, mostly because nobody has found a use for computer graphics yet. On the other hand, all computer graphics is done in Fortran, so there are a fair number of people doing graphics in order to avoid having to write COBOL programs. THE REAL PROGRAMMER AT PLAY Generally, the Real Programmer plays the same way he works - with computers. He is constantly amazed that his employer actually pays him to do what he would be doing for fun anyway (although he is careful not to express this opinion out loud). Occasionally, the Real Programmer does step out of the office for a breath of fresh air and a beer or two. Some tips on recognizing Real Programmers away from the computer room: At a party, the Real Programmers are the ones in the corner talking about operating system security and how to get around it. At a football game, the Real Programmer is the one comparing the plays against his simulations printed on 11 by 14 fanfold paper. At the beach, the Real Programmer is the one drawing flowcharts in the sand. At a funeral, the Real Programmer is the one saying "Poor George, he almost had the sort routine working before the coronary." In a grocery store, the Real Programmer is the one who insists on running the cans past the laser checkout scanner himself, because he never could trust keypunch operators to get it right the first time. THE REAL PROGRAMMER'S NATURAL HABITAT What sort of environment does the Real Programmer function best in? This is an important question for the managers of Real Programmers. Considering the amount of money it costs to keep one on the staff, it's best to put him (or her) in an environment where he can get his work done. The typical Real Programmer lives in front of a computer terminal. Surrounding this terminal are: Listings of all programs the Real Programmer has ever worked on, piled in roughly chronological order on every flat surface in the office. Some half-dozen or so partly filled cups of cold coffee. Occasionally, there will be cigarette butts floating in the coffee. In some cases, the cups will contain Orange Crush. Unless he is very good, there will be copies of the OS JCL manual and the Principles of Operation open to some particularly interesting pages. Taped to the wall is a line-printer Snoopy calendar for the year 1969. Strewn about the floor are several wrappers for peanut butter filled cheese bars - the type that are made pre-stale at the bakery so they can't get any worse while waiting in the vending machine. Hiding in the top left-hand drawer of the desk is a stash of double-stuff Oreos for special occasions. Underneath the Oreos is a flowcharting template, left there by the previous occupant of the office. (Real Programmers write programs, not documentation. Leave that to the maintenance people.) The Real Programmer is capable of working 30, 40, even 50 hours at a stretch, under intense pressure. In fact, he prefers it that way. Bad response time doesn't bother the Real Programmer - it gives him a chance to catch a little sleep between compiles. If there is not enough schedule pressure on the Real Programmer, he tends to make things more challenging by working on some small but interesting part of the problem for the first nine weeks, then finishing the rest in the last week, in two or three 50-hour marathons. This not only impresses the hell out of his manager, who was despairing of ever getting the project done on time, but creates a convenient excuse for not doing the documentation. In general: No Real Programmer works 9 to 5 (unless it's the ones at night). Real Programmers don't wear neckties. Real Programmers don't wear high-heeled shoes. Real Programmers arrive at work in time for lunch [9]. A Real Programmer might or might not know his wife's name. He does, however, know the entire {ASCII} (or EBCDIC) code table. Real Programmers don't know how to cook. Grocery stores aren't open at three in the morning. Real Programmers survive on Twinkies and coffee. THE FUTURE What of the future? It is a matter of some concern to Real Programmers that the latest generation of computer programmers are not being brought up with the same outlook on life as their elders. Many of them have never seen a computer with a front panel. Hardly anyone graduating from school these days can do hex arithmetic without a calculator. College graduates these days are soft - protected from the realities of programming by source level debuggers, text editors that count parentheses, and "user friendly" operating systems. Worst of all, some of these alleged "computer scientists" manage to get degrees without ever learning Fortran! Are we destined to become an industry of Unix hackers and Pascal programmers? From my experience, I can only report that the future is bright for Real Programmers everywhere. Neither OS 370 nor Fortran show any signs of dying out, despite all the efforts of Pascal programmers the world over. Even more subtle tricks, like adding structured coding constructs to Fortran have failed. Oh sure, some computer vendors have come out with Fortran 77 compilers, but every one of them has a way of converting itself back into a Fortran 66 compiler at the drop of an option card - to compile DO loops like God meant them to be. Even Unix might not be as bad on Real Programmers as it once was. The latest release of Unix has the potential of an operating system worthy of any Real Programmer - two different and subtly incompatible user interfaces, an arcane and complicated teletype driver, virtual memory. If you ignore the fact that it's "structured", even 'C' programming can be appreciated by the Real Programmer: after all, there's no type checking, variable names are seven (ten? eight?) characters long, and the added bonus of the Pointer data type is thrown in - like having the best parts of Fortran and assembly language in one place. (Not to mention some of the more creative uses for

replevy ::: v. t. --> To take or get back, by a writ for that purpose (goods and chattels wrongfully taken or detained), upon giving security to try the right to them in a suit at law, and, if that should be determined against the plaintiff, to return the property replevied.
To bail. ::: n.


Resource Access Control Facility (RACF) {IBM}'s large system security product. It originally ran only under {MVS} but has since been ported to run under {VM}. (1995-02-07)

RFC 1334 "networking, security, standard, protocol" The {RFC} defining {Challenge-Handshake Authentication Protocol} and {Password Authentication Protocol}. {(rfc:1334)}. (1996-03-23)

RFC 1446 "networking, standard" The {RFC} defining security protocols for {SNMP v2}. {(rfc:1446)}. (1997-11-23)

RFC 1508 "security, standard" One of the {RFCs} defining {GSS-API}. {(rfc:1508)}. (1996-05-19)

RFC 1509 "security, standard" One of the {RFCs} defining {GSS-API}. {(rfc:1509)}. (1996-05-19)

RFC 1760 "security" The {RFC} describing the S/KEY {One-Time Password} system. {(rfc:1760)}. (2000-01-31)

RFC 1825 "networking, standard" The {RFC} describing security mechanisms for {Internet Protocol} version 4 and {IP version 6} and the services that they provide. {(rfc:1825)}. (1997-07-09)

RFC 1938 "security, standard" The {RFC} describing a proposed {standard} for a {One-Time Password} system, obsoleted by {RFC 2289}. ["A One-Time Password System.", N. Haller & C. Metz]. {(rfc:1938)}. (2000-03-05)

RFC 2298 "security, standard" The {RFC} proposing a {standard} {One-Time Password} system. {(rfc:2298)}. (2000-03-05)

RFC 2408 "standard, security" The {RFC} proposing {ISAKMP}. {(rfc:2408)}. (2000-02-08)

RFC 2516 "standard, security" The {RFC} defining {Point-to-Point Protocol over Ethernet} (PPPoE). {(rfc:2516)}. (2006-09-20)

Riordan's Internet Privacy Enhanced Mail "messaging" (RIPEM) A (not yet complete, but useful) implementation of {Privacy Enhanced Mail} (PEM). RIPEM allows your {electronic mail} to have the four security facilities provided by PEM: {disclosure protection} (optional), originator authenticity, message {integrity} measures and {non-repudiation} of origin (always). RIPEM was written primarily by Mark Riordan "mrr@scss3.cl.msu.edu". Most of the code is in the {public domain}, except for the {RSA} routines, which are a library called RSAREF licensed from {RSA Data Security, Inc}. The current (November 1993) version of RIPEM is 1.1a; the current version of the {Macintosh} {port} of RIPEM is 0.8b1. (1998-07-03)

RSA "cryptography, company" (The initials of the authors) 1. {RSA Data Security, Inc.} 2. Their {cryptography} systems, especially {RSA encryption}. The RSA {algorithm} was first described in the paper: [R. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystems". CACM 21,2; 1978] (1995-03-21)

RSA Data Security, Inc. "cryptography, company" (After Rivest, Shamir, Adleman - see {RSA}) A recognised world leader in {cryptography}, with millions of copies of its software encryption and authentication installed and in use worldwide. RSA's technologies are the global {de facto standard} for {public key cryptography} and {digital signatures}, and are part of existing and proposed {standards} for the {Internet}, {ITU-T}, {ISO}, {ANSI}, {PKCS}, {IEEE} and business and financial networks around the world. {(http://rsa.com/)}. (1994-12-08)

RSA encryption "cryptography, algorithm" A {public-key cryptosystem} for both {encryption} and {authentication}, invented in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. Its name comes from their initials. The RSA {algorithm} works as follows. Take two large {prime numbers}, p and q, and find their product n = pq; n is called the modulus. Choose a number, e, less than n and {relatively prime} to (p-1)(q-1), and find its reciprocal mod (p-1)(q-1), and call this d. Thus ed = 1 mod (p-1)(q-1); e and d are called the public and private exponents, respectively. The public key is the pair (n, e); the private key is d. The factors p and q must be kept secret, or destroyed. It is difficult (presumably) to obtain the private key d from the public key (n, e). If one could factor n into p and q, however, then one could obtain the private key d. Thus the entire security of RSA depends on the difficulty of factoring; an easy method for factoring products of large prime numbers would break RSA. {RSA FAQ (http://rsa.com/rsalabs/faq/faq_home.html)}. (2004-07-14)

safe-conduct ::: n. --> That which gives a safe passage
a convoy or guard to protect a person in an enemy&


safeness ::: n. --> The quality or state of being safe; freedom from hazard, danger, harm, or loss; safety; security; as the safeness of an experiment, of a journey, or of a possession.

SAID {Security Association ID}

SAINT 1. "language" {Symbolic Automatic INTegrator}. 2. "networking, security, tool" {Security Administrator's Integrated Network Tool}.

SAML "security" An {XML} framework for communicating user {authentication}, {entitlement}, and attribute information, developed by the Security Services Technical Committee of {OASIS}. SAML supports {federation}, allowing business entities to make assertions regarding the identity, attributes and entitlements of a subject (an entity that is often a human user) to other entities, such as a partner company or another enterprise application. (2011-05-12)

SASL 1. "language" {St Andrews Static Language}. 2. "networking" {Simple Authentication and Security Layer}.

SATAN {Security Administrator's Integrated Network Tool}

seal ::: n. --> Any aquatic carnivorous mammal of the families Phocidae and Otariidae.
An engraved or inscribed stamp, used for marking an impression in wax or other soft substance, to be attached to a document, or otherwise used by way of authentication or security.
Wax, wafer, or other tenacious substance, set to an instrument, and impressed or stamped with a seal; as, to give a deed under hand and seal.


Secure Multipurpose Internet Mail Extensions "messaging, standard" (S-MIME) A specification for secure {electronic mail}. S-MIME was designed to add security to e-mail messages in {MIME} format. The security services offered are {authentication} (using {digital signatures}) and {privacy} (using {encryption}). {(http://rsa.com/rsa/S-MIME/)}. (1997-05-10)

secureness ::: n. --> The condition or quality of being secure; exemption from fear; want of vigilance; security.

Secure Sockets Layer "networking, security" (SSL) A {protocol} designed by {Netscape Communications Corporation} to provide secure communications over the {Internet} using {asymmetric key encryption}. SSL is layered beneath application {protocols} such as {HTTP}, {SMTP}, {Telnet}, {FTP}, {Gopher} and {NNTP} and is layered above the connection protocol {TCP/IP}. It is used by the {HTTPS} {access method}. (2007-05-25)

securities ::: pl. --> of Security

Security Administrator's Integrated Network Tool "networking, security, tool" (SAINT, originally "Security Administrator Tool for Analyzing Networks", SATAN) A tool written by Dan Farmer and Wietse Venema which remotely probes systems via the {network} and stores its findings in a {database}. The results can be viewed with an {web browser}. SAINT requires {Perl} 5.000 or better. In its simplest mode, SAINT gathers as much information about remote hosts and networks as possible by examining such network services as {finger}, {NFS}, {NIS}, {FTP}, {TFTP}, {rexd}, and other services. The information gathered includes the presence of various network information services as well as potential security flaws - usually in the form of incorrectly setup or configured network services, well-known {bugs} in system or network utilities, or poor or ignorant policy decisions. It can then either report on this data or use a simple rule-based system to investigate any potential security problems. Users can then examine, query, and analyze the output with a {web browser}. While the program is primarily geared toward analysing the security implications of the results, a great deal of general network information can be gained when using the tool - network topology, network services running, and types of hardware and software being used on the network. SAINT can also be used in exploratory mode. Based on the initial data collection and a user configurable ruleset, it will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts. This not only allows the user to analyse his own network, but also to examine the real implications inherent in network trust and services and help them make reasonably educated decisions about the security level of the systems involved. {(http://wwdsi.com/saint/)}. {Old SATAN page (http://fish.com/satan/)}. {Mailing list (http://wwdsi.com/saint/list_server.html)}. (2000-08-12)

Security Association ID "networking" (SAID) A 32-bit field added to {packet} headers for {encryption} and {authentication} in the proposed {Internet Protocol Version 6}. (1997-07-09)

Security Association "networking" The relationship between two or more entities (typically, a computer, but could be a user on a computer, or software component) which describes how the entities will use security services, such as {encryption}, to communicate. See {RFC 1825}. (1997-07-09)

service "networking, programming" Work performed (or offered) by a {server}. This may mean simply serving simple requests for data to be sent or stored (as with {file servers}, {gopher} or {http} servers, {e-mail} servers, {finger} servers, {SQL} servers, etc.); or it may be more complex work, such as that of {irc} servers, print servers, {X Windows} servers, or process servers. E.g. "Access to the finger {service} is restricted to the local {subnet}, for security reasons". (1997-09-11)

Service Set Identifier "networking" (SSID) A 32-{character} unique identifier that distinguishes one wireless network from another. All devices attempting to connect to a specific network use the same SSID, which appears in the header of {packets}. Because an SSID can be intercepted, it does not supply any security to the network. (2009-01-23)

session layer "networking" The third highest {protocol layer} (layer 5) in the {OSI} seven layer model. The session layer uses the {transport layer} to establish a {connection} between processes on different {hosts}. It handles {security} and creation of the session. It is used by the {presentation layer}. Documents: {ITU} Rec. X.225 ({ISO} 8327), ITU Rec. X.215 (ISO 8326). [Examples?] (1997-12-07)

SET 1. "security" {Secure Electronic Transaction}. 2. "electronics" {Single Electron Tunneling}. 3. "standard" {Standard d'Echange et de Transfert}. (1999-03-26)

shadow ::: n. --> Shade within defined limits; obscurity or deprivation of light, apparent on a surface, and representing the form of the body which intercepts the rays of light; as, the shadow of a man, of a tree, or of a tower. See the Note under Shade, n., 1.
Darkness; shade; obscurity.
A shaded place; shelter; protection; security.
A reflected image, as in a mirror or in water.
That which follows or attends a person or thing like a


shell 1. "operating system" (Originally from {Multics}, widely propagated via {Unix}) The {command interpreter} used to pass commands to an {operating system}; so called because it is the part of the operating system that interfaces with the outside world. The commonest Unix shells are the c shell ({csh}) and the Bourne shell ({sh}). 2. (Or "wrapper") Any interface program that mediates access to a special resource or {server} for convenience, efficiency, or security reasons; for this meaning, the usage is usually "a shell around" whatever. [{Jargon File}] (1995-05-11)

shelter ::: n. --> That which covers or defends from injury or annoyance; a protection; a screen.
One who protects; a guardian; a defender.
The state of being covered and protected; protection; security. ::: v. t.


shoulder surfing "security" Secretly watching someone perform some supposedly secure action; looking over their shoulder. The canonical example is watching what keys someone presses when they enter a password. Other examples include using binoculars to watch someone across the street enter their PIN in a cash machine or simply reading sensitive information off somebody's screen without them realising. (2013-11-06)

Simple Authentication and Security Layer "networking" (SASL) {(http://asg2.web.cmu.edu/sasl/)}. [Summary?] (2001-08-24)

Simple Network Management Protocol version 2 "protocol" (SNMP v2) A revision of {Simple Network Management Protocol} (not just a new {MIB}) which includes improvements in the areas of performance, security, confidentiality, and manager-to-manager communications. The major components of SNMPv2 are defined in the following {RFCs}: {RFC 1089} - SNMP over Ethernet {RFC 1140} - IAB Official Protocol Standards {RFC 1155} - Structure and Identification of Management    Information for TCP/IP based internets {RFC 1156} (H) - Management Information Base Network Management of TCP/IP based internets {RFC 1157} - A Simple Network Management Protocol {RFC 1158} - Management Information Base Network    Management of TCP/IP based internets: MIB-II {RFC 1161} (H) - SNMP over OSI {RFC 1187} - Bulk Table Retrieval with the SNMP {RFC 1212} - Concise MIB Definitions {RFC 1213} - Management Information Base for Network    Management of TCP/IP-based internets: MIB-II {RFC 1215} (I) - A Convention for Defining Traps for use with the SNMP {RFC 1224} - Techniques for Managing    Asynchronously Generated Alerts {RFC 1270} (I) - SNMP Communication Services {RFC 1303} (I) - A Convention for Describing SNMP-based Agents {RFC 1470} (I) - A Network Management Tool Catalog {RFC 1298} - SNMP over IPX {RFC 1418} - SNMP over OSI {RFC 1419} - SNMP over IPX {RFC 1441} - Introduction to SNMP v2 {RFC 1442} - SMI For SNMP v2 {RFC 1443} - Textual Conventions for SNMP v2 {RFC 1444} - Conformance Statements for SNMP v2 {RFC 1445} - Administrative Model for SNMP v2 {RFC 1446} - Security Protocols for SNMP v2 {RFC 1447} - Party MIB for SNMP v2 {RFC 1448} - Protocol Operations for SNMP v2 {RFC 1449} - Transport Mappings for SNMP v2 {RFC 1450} - {MIB} for SNMP v2 {RFC 1451} - Manager to Manger MIB {RFC 1452} - Coexistance between SNMP v1 and SNMP v2 {FAQ (http://cis.ohio-state.edu/hypertext/faq/usenet/snmp-faq)}. {Introduction (http://gt-er.cg.org.br/documentacao/buffer/gerencia/faq1.html)}. {Cisco (http://cisco.com/cpropub/univ-src/ccdcp/data/doc/software/11_1/mib/mover.htm)}. (1997-12-02)

single sign-on "security" (SSO) Any user authentication system permiting users to access multiple data sources through a single point of entry. Part of an integrated access management framework. (2003-12-31)

SkipJack "cryptography" An {encryption} {algorithm} created by the NSA (National Security Agency) which encrypts 64-bit blocks of data with an 80-bit key. It is used in the {Clipper} chip, a {VLSI} device with an {ARM} processor core, which is intended to perform cryptographic operations while allowing the security agencies listen in. There are (apparently) two agencies, both of whom have to agree that there is a valid reason to decode a message. Don't laugh, they are serious. [Algorithm?] (1995-12-07)

sleepy ::: n. --> Drowsy; inclined to, or overcome by, sleep.
Tending to induce sleep; soporiferous; somniferous; as, a sleepy drink or potion.
Dull; lazy; heavy; sluggish.
Characterized by an absence of watchfulness; as, sleepy security.


snark [Lewis Carroll, via the Michigan Terminal System] 1. A system failure. When a user's process bombed, the operator would get the message "Help, Help, Snark in MTS!" 2. More generally, any kind of unexplained or threatening event on a computer (especially if it might be a boojum). Often used to refer to an event or a log file entry that might indicate an attempted security violation. See {snivitz}. 3. UUCP name of snark.thyrsus.com, home site of the Hacker {Jargon File} versions 2.*.*. [{Jargon File}]

social engineering "jargon, security" A term used among {crackers} and {samurai} for cracking techniques that rely on weaknesses in {wetware} rather than software; the aim is to trick people into revealing passwords or other information that compromises a target system's security. Classic scams include phoning up a mark who has the required information and posing as a field service tech or a fellow employee with an urgent access problem. See also the {tiger team} story in the {patch} entry. [{Jargon File}] (2006-11-22)

society ::: 1. The body of human beings generally, associated or viewed as members of a community. 2. A highly structured system of human organization for large-scale community living that normally furnishes protection, continuity, security, and a national identity for its members. societies.

SOCKS "security" A security package that allows a {host} behind a {firewall} to use {finger}, {FTP}, {telnet}, {Gopher}, and {Mosaic} to access resources outside the firewall while maintaining the security requirements. [The Security FAQ, {Usenet} newsgroups {news:comp.security.misc}, {news:comp.security.unix}, {news:alt.security}]. (1995-01-31)

Software Publishing Certificate "security" (SPC) A {public key certification standard} (PKCS)

Somar DumpAcl "tool" A utilty which provides a concise report of {Windows NT} file system permissions, to help find holes in system security. (1995-04-10)

SPC 1. "business" {Statistical Process Control}. Something to do with {quality management}. [What is it?] 2. "body" {Software Productivity Centre}. 3. "company" {Software Publishing Corporation}. 4. "security" {Software Publishing Certificate}.

specialty ::: n. --> Particularity.
A particular or peculiar case.
A contract or obligation under seal; a contract by deed; a writing, under seal, given as security for a debt particularly specified.
That for which a person is distinguished, in which he is specially versed, or which he makes an object of special attention; a speciality.


spyware "software" (Or "adware") Any type of software that transmits information without the user's knowledge. Information is sent via the {Internet} to a server somewhere, normally as a hidden side effect of using a program. Gathering this information may benefit the user indirectly, e.g. by helping to improve the software he is using. It may be collected for advertising purposes or, worst of all, to steal security information such as passwords to online accounts or credit card details. Spyware may be installed along with other software or as the result of a {virus} infection. There are many tools available to locate and remove various forms of spyware from a computer. Some {HTTP cookies} could be considered as spyware as their use is generally not made explicit to users. It is however possible to disallow them, either totally or individually, and some are actually useful, e.g. recording the fact that a user has logged in. {(http://spychecker.com/spyware.html)}. (2004-05-23)

Sri Aurobindo: "Confidence — the sense of security that goes with trust.” Letters on Yoga

SSLeay "networking, security, protocol" A free implementation of {Netscape}'s {Secure Socket Layer} {protocol}, coded from scratch, using only the publically available documentation of the various protocols, by Eric Young in Australia. SSLeay supports the {DES}, {RSA}, {RC4}, and {IDEA} {encryption} {algorithms}. [Home?] (2000-12-07)

Standard Generalized Markup Language "language, text" (SGML) A generic {markup} language for representing documents. SGML is an International Standard that describes the relationship between a document's content and its structure. SGML allows document-based information to be shared and re-used across applications and computer {platforms} in an open, vendor-neutral format. SGML is sometimes compared to {SQL}, in that it enables companies to structure information in documents in an open fashion, so that it can be accessed or re-used by any SGML-aware application across multiple platforms. SGML is defined in "ISO 8879:1986 Information processing -- Text and office systems -- Standard Generalized Markup Language (SGML)", an {ISO} standard produced by {JTC} 1/SC 18 and amended by "Amendment 1:1988". Unlike other common document file formats that represent both content and presentation, SGML represents a document's content {data} and structure (interrelationships among the data). Removing the presentation from content establishes a neutral format. SGML documents and the information in them can easily be re-used by publishing and non-publishing {applications}. SGML identifies document elements such as titles, paragraphs, tables, and chapters as distinct objects, allowing users to define the relationships between the objects for structuring data in documents. The relationships between document elements are defined in a {Document Type Definition} (DTD). This is roughly analogous to a collection of {field} definitions in a {database}. Once a document is converted into SGML and the information has been 'tagged', it becomes a database-like document. It can be searched, printed or even programmatically manipulated by SGML-aware applications. Companies are moving their documents into SGML for several reasons: Reuse - separation of content from presentation facilitates multiple delivery formats like {CD-ROM} and {electronic publishing}. Portability - SGML is an international, platform-independent, standard based on {ASCII} text, so companies can safely store their documents in SGML without being tied to any one vendor. Interchange - SGML is a core data standard that enables SGML-aware applications to inter-operate and share data seamlessly. A central SGML document store can feed multiple processes in a company, so managing and updating information is greatly simplified. For example, when an aeroplane is delivered to a customer, it comes with thousands of pages of documentation. Distributing these on paper is expensive, so companies are investigating publishing on CD-ROM. If a maintenance person needs a guide for adjusting a plane's flight surfaces, a viewing tool automatically assembles the relevant information from the document {repository} as a complete document. SGML can be used to define attributes to information stored in documents such as security levels. There are few clear leaders in the SGML industry which, in 1993, was estimated to be worth US $520 million and is projected to grow to over US $1.46 billion by 1998. A wide variety tools can be used to create SGML systems. The SGML industry can be separated into the following categories: Mainstream Authoring consists of the key {word processing} vendors like {Lotus}, {WordPerfect} and {Microsoft}. SGML Editing and Publishing includes traditional SGML authoring tools like {ArborText}, {Interleaf}, {FrameBuilder} and {SoftQuad Author}/Editor. SGML Conversions is one of the largest sectors in the market today because many companies are converting legacy data from mainframes, or documents created with mainstream word processors, into SGML. Electronic Delivery is widely regarded as the most compelling reason companies are moving to SGML. Electronic delivery enables users to retrieve information on-line using an intelligent document viewer. Document Management may one day drive a major part of the overall SGML industry. SGML Document Repositories is one of the cornerstone technologies that will affect the progress of SGML as a data standard. Since 1998, almost all development in SGML has been focussed on {XML} - a simple (and therefore easier to understand and implement) subset of SGML. {"ISO 8879:1986//ENTITIES Added Latin 1//EN" (http://ucc.ie/info/net/isolat1.html)} defines some characters. [How are these related to {ISO 8859}-1?]. {ISO catalogue entry (http://iso.ch/cate/d16387.html)}. SGML parsers are available from {VU, NL (ftp://star.cs.vu.nl/Sgml)}, {FSU (ftp://mailer.cc.fsu.edu/pub/sgml)}, {UIO, Norway (ftp://ifi.uio.no/pub/SGML/SGMLS)}. See also {sgmls}. {Usenet} newsgroup: {news:comp.text.sgml}. ["The SGML Handbook", Charles F. Goldfarb, Clarendon Press, 1991, ISBN 0198537379. (Full text of the ISO standard plus extensive commentary and cross-referencing. Somewhat cheaper than the ISO document)]. ["SGML - The User's Guide to ISO 8879", J.M. Smith et al, Ellis Harwood, 1988]. [Example of some SGML?] (2000-05-31)

steganography "security" Hiding a secret message within a larger one in such a way that others can not discern the presence or contents of the hidden message. For example, a message might be hidden within an {image} by changing the {least significant bits} to be the message bits. [{Chaffing and Winnowing: Confidentiality without Encryption, Ronald L. Rivest, MIT Lab for Computer Science, 1998-03-22 (http://theory.lcs.mit.edu/~rivest/chaffing.txt)}]. (1998-07-13)

stronghold ::: n. --> A fastness; a fort or fortress; fortfield place; a place of security.

su "operating system, tool, security" (substitute user) The {Unix} command which allows you to become another user after entering their {password}. su is most often used without arguments in which case it defaults to user {root}. Some versions of Unix only allows this command to be used by members of the {wheel} group. {Unix manual page}: su(1). (1996-09-08)

SyQuest Technology, Inc. "company, hardware" An early entrant into the removable {hard disk} market for {personal computers}. For may years SyQuest held the market, particularly as a method of transferring large {desktop publisher} documents to printers. SyQuest aim their products to give personal computer users "endless" hard drive space for data-intensive applications like {desktop publishing}, {Internet} information management, pre-press, {multimedia}, {audio}, {video}, {digital photography}, fast {backup}, data exchange, {archiving}, confidential data security and easy portability for the road. At the top of their current (Mar 1997) range are two drives, The {SyJet} 1.5 {GB} a 3.5 inch, double platter removable drive and the {EZFlyer} 230 {MB} also on 3.5 inch media. A cartridge holding over 4.7GB is promised before the end of 1997. In recent years they have not fared as well in the market, whilst {Iomega} has cornered the {Small Office/Home Office} (SOHO) market. Over the period 1995 to 1997 sales declined resulting in a series of losses. In the first quarter of 1997 these losses had been reduced to $6.8 million with net revenues increasing to $48.3 million. This compares to a net loss of $33.8 million, or $2.98 per share, on net revenues of $78.7 million for the same period the year before. It would appear that substantial restructuring has occurred over the past few years. {(http://syquest.com/)}. (1997-03-27)

SYSKEY "cryptography, operating system, security" A utility that {encrpyts} the {hashed} {password} information in a {SAM} database using a 128-bit {encryption key}. SYSKEY was an optional feature added in {Windows NT} 4.0 SP3. It was meant to protect against {offline} password {cracking} attacks so that the SAM database would still be secure even if someone had a copy of it. However, in December 1999, a security team from {BindView (http://bindview.com/)} found a security hole in SYSKEY which indicates that a certain form of {cryptoanalytic} attack is possible offline. A {brute-force attack} then appeared to be possible. Microsoft later collaborated with BindView to issue a fix (dubbed the 'Syskey Bug') which appears to have been settled and SYSKEY pronounced secure enough to resist brute-force attack. According to Todd Sabin of the BindView team RAZOR, the pre-RC3 versions of {Windows 2000} were also affected. {BindView Security Advisory (http://packetstorm.securify.com/9912-exploits/bindview.syskey.txt)}. {BindView press release (http://bindview.com/news/99/1222.html)}. {Microsoft bulletin (http://microsoft.com/Security/Bulletins/ms99-056.asp)}. (2000-07-16)

System Account Manager "cryptography, operating system, security" (SAM) A {password} {database} stored as a {registry file} in {Windows NT} and {Windows 2000}. The System Account Manager (SAM) database stores users' passwords in a {hashed} format. Since a {hash function} is one-way, this provides some measure of security for the storage of the passwords. In an attempt to enhance the security of the SAM database against {offline cracking}, Microsoft introduced the {SYSKEY} utility in {Windows NT} 4.0. (2000-07-19)

system administration "job" Activities performed by a system administrator (or "admin", "sysadmin", "site admin") such as monitoring security configuration, managing allocation of {user names} and {passwords}, monitoring disk space and other resource use, performing {backups}, and setting up new hardware and software. system administrators often also help users, though in a large organisation this may be a separate job. Compare {postmaster}, {sysop}, {system management}, {systems programmer}. [Other tasks?] (1999-05-02)

systems programmer "job" (sysprog) A generic job title that covers a variety of specialist roles such as writing low-level code that talks to directly to the {operating system} on a {server}. Typical skills required are experience of specific operating systems, networking ({TCP/IP}, {ATM}, {Ethernet}, {DNS}), electronic mail ({POP}, {IMAP}, {SMTP}), {web servers}, {RDBMS}, operating system and network security, and hardware ({SCSI}, {hard disks}, and {backup} devices). Contrast: {system administration}. (1999-09-14)

TCB 1. "jargon" {Trouble Came Back}. 2. "security" ({Orange Book}) {Trusted Computing Base}. 3. "operating system" {Task Control Block}. [{Jargon File}] (1998-07-02)

ten-finger interface The interface between two networks that cannot be directly connected for security reasons; refers to the practice of placing two terminals side by side and having an operator read from one and type into the other. [{Jargon File}]

The Cuckoo's Egg A great book (and subsequent BBC TV series) telling the true story of Clifford Stoll, an astronomy professor at {UCB}'s {Lawrence Berkeley Lab}. A 75-cent accounting error alerted him to the presence of an unauthorised user (a {cracker}) on his system. The cracker, code named "Hunter", was breaking into US computer systems and stealing sensitive military and security information. Hunter was part of a spy ring paid in cash and cocaine, and reporting to the KGB. ["The Cuckoo's Egg", Clifford Stoll, London: Bodley Head, 1990, ISBN 0-370-31433-6, ISBN 0-671-72688-9]. [FTP?] (1994-11-15)

The gunas affect every part of our natural being. They have indeed their strongest relative hold in the three different members of it, mind, life and body. Tamas, the principle of inertia, is strongest in material nature and in our physical being. The action of this principle is of two kinds, inertia of force and inertia of knowledge. Whatever is predominantly governed by Tamas, tends in its force to a sluggish inaction and immobility or else to a mechanical action which it does not possess, but is possessed by obscure forces which drive it in a mechanical round of energy; equally in its consciousness it turns to an inconscience or enveloped subconscience or to a reluctant, sluggish or in some way mechanical conscious action which does not possess the idea of its own energy, but is guided by an idea which seems external to it or at least concealed from its active awareness. Thus the principle of our body is in its nature inert, subconscient, incapable of anything but a mechanical and habitual self-guidance and action: though it has like everything else a principle of kinesis and a principle of equilibrium of its state and action, an inherent principle of response and a secret consciousness, the greatest portion of its rajasic motions are contributed by the lifepower and all the overt consciousness by the mental being. The principle of rajas has its strongest hold on the vital nature. It is the Life within us that is the strongest kinetic motor power, but the life-power in earthly beings is possessed by the force of desire, th
   refore rajas turns always to action and desire; desire is the strongest human and animal initiator of most kinesis and action, predominant to such an extent that many consider it the father of all action and even the originator of our being. Moreover, rajas finding itself in a world of matter which starts from the principle of inconscience and a mechanical driven inertia, has to work against an immense contrary force; th
   refore its whole action takes on the nature of an effort, a struggle, a besieged and an impeded conflict for possession which is distressed in its every step by a limiting incapacity, disappointment and suffering: even its gains are precarious and limited and marred by the reaction of the effort and an aftertaste of insufficiency and transience. The principle of sattwa has its strongest hold in the mind; not so much in the lower parts of the mind which are dominated by the rajasic life-power, but mostly in the intelligence and the will of the reason. Intelligence, reason, rational will are moved by the nature of their predominant principle towards a constant effort of assimilation, assimilation by knowledge, assimilation by a power of understanding will, a constant effort towards equilibrium, some stability, rule, harmony of the conflicting elements of natural happening and experience. This satisfaction it gets in various ways and in various degrees of acquisition. The attainment of assimilation, equilibrium and harmony brings with it always a relative but more or less intense and satisfying sense of ease, happiness, mastery, security, which is other than the troubled and vehement pleasures insecurely bestowed by the satisfaction of rajasic desire and passion. Light and happiness are the characteristics of the sattwic guna. The whole nature of the embodied living mental being is determined by these three gunas.
   Ref: CWSA Vol. 23-24, Page: 684-685


tiger team (US military jargon) 1. Originally, a team whose purpose is to penetrate security, and thus test security measures. These people are paid professionals who do hacker-type tricks, e.g. leave cardboard signs saying "bomb" in critical defence installations, hand-lettered notes saying "Your codebooks have been stolen" (they usually haven't been) inside safes, etc. After a successful penetration, some high-ranking security type shows up the next morning for a "security review" and finds the sign, note, etc. and all hell breaks loose. Serious successes of tiger teams sometimes lead to early retirement for base commanders and security officers (see the {patch} entry for an example). 2. Recently, and more generally, any official inspection team or special {firefighting} group called in to look at a problem. A subset of tiger teams are professional {crackers}, testing the security of military computer installations by attempting remote attacks via networks or supposedly "secure" communication channels. Some of their escapades, if declassified, would probably rank among the greatest hacks of all times. The term has been adopted in commercial computer-security circles in this more specific sense. [{Jargon File}]

time bomb "software, security" A subspecies of {logic bomb} that is triggered by reaching some preset time, either once or periodically. There are numerous legends about time bombs set up by programmers in their employers' machines, to go off if the programmer is fired or laid off and is not present to perform the appropriate suppressing action periodically. Interestingly, the only such incident for which we have been pointed to documentary evidence took place in the Soviet Union in 1986! A disgruntled programmer at the Volga Automobile Plant (where the Fiat clones called Ladas were manufactured) planted a time bomb which, a week after he'd left on vacation, stopped the entire main assembly line for a day. The case attracted lots of attention in the Soviet Union because it was the first cracking case to make it to court there. The perpetrator got 3 years in jail. [{Jargon File}] (2001-09-15)

TLS {Transport Layer Security protocol}

Transport Layer Security protocol "networking, protocol" (TLS) A {protocol} designed to allow {client/server} applications to communicate over the {Internet} without {eavesdropping}, {tampering}, or {message forgery}. TLS is defined in {RFC 2246}. (2003-10-03)

trap-door function "cryptography, mathematics" A special class of {one-way function}, which is reversible if you know a certain secret associated with the function. {(http://rsasecurity.com/rsalabs/faq/2-3-2.html)}. {(http://ieor.berkeley.edu/~jshu/knapsack/Review/OverviewPK.html)}. (2003-05-22)

Trojan horse "application, security" (Or just "trojan") A term coined by {MIT}-hacker-turned-NSA-spook Dan Edwards for a malicious, security-breaking program that is disguised as something benign, such as a directory lister, archiver, game or (in one notorious 1990 case on the Mac) a program to find and destroy {virus}es! A Trojan horse is similar to a {back door}. See also {RFC 1135}, {worm}, {phage}, {mockingbird}. [{Jargon File}] (2008-06-19)

unsafety ::: n. --> The quality or state of being in peril; absence of safety; insecurity.

unsurety ::: n. --> Want of surety; uncertainty; insecurity; doubt.

user name "operating system, security" (Or "logon") A unique name for each user of computer services which can be accessed by several persons. Users need to identify themselves for accounting, {security}, logging, and {resource management}. Usually a person must also enter a {password} in order to access a service. Once the user has logged on the {operating system} will often use a (short) {user identifier}, e.g. an integer, to refer to them rather than their user name. User names can usually be any short string of alphanumeric characters. Common choices are first name, initials, or some combination of first name, last name, initials and an arbitrary number. User names are often assigned by {system administrators} according to some local policy, or they may be chosen by the users themselves. User names are often also used as {mailbox} names in {electronic mail} addresses. (1997-03-16)

usr User. The "/usr" directory hierarchy on {Unix} systems. Once upon a time, in the early days of Unix, this area actually held users' home directories and files. Since these tend to expand much faster than system files, /usr would be mounted on the biggest disk on the system. The root directory, "/" in contrast, contains only what is needed to {boot} the {kernel}, after which /usr and other disks could be mounted as part of the multi-user start-up process. /usr has been used as the "everything else" area, with many "system" files such as compiler libraries (/usr/include, /usr/lib), utilty programs (/usr/bin, /usr/ucb), games (/usr/games), local additions (/usr/local), manuals (/usr/man), temporary files and queues for various {daemons} (/usr/spool). These optional extras have grown in size as Unix has evolved and disks have dropped in price. Under later versions of {SunOS}, the user files have fled /usr altogether for a new "/home" {partition} and temporary files have moved to "/var". This allows /usr to be mounted read-only with some gain in security and performance since access times are not updated for files on read-only file systems.

utility software "tool" (Or utility program, tool) Any {software} that performs some specific task that is secondary to the main purpose of using the computer (the latter would be called {application programs}) but is not essential to the operation of the computer ({system software}). Many utilities could be considered as part of the {system software}, which can in turn be considered part of the {operating system}. The following are some broad categories of utility software, specific types and examples. * Disks {disk formatter}: {FDISK}, {format} {defragmenter} {disk checker}: {fsck} {disk cleaner} {system profiler} {backup} {file system compression} * Files and directories list directory: {ls}, {dir} copy, move, remove: {cp}, {mv}, {rm}, {xcopy} {archive}: {tar} {compression}: {zip} format conversion: {atob} comparison: {diff} sort: {sort} * Security {authentication}: {login} {antivirus software}: {avast}, {Norton Antivirus} {firewall}: {Zone Alarm}, {Windows firewall} {encryption}: {gpg}) * Editors for general-purpose formats (as opposed to specific formats like a {word processing} document) {text editor}: {Emacs} {binary editor}, {hex editor} * Communications {mail transfer agent}: {sendmail} e-mail notification: {biff} file transfer: {ftp}, {rcp}, {Firefox} file synchronisation: {unison}, {briefcase} chat: {Gaim}, {cu} directory services: {bind}, {nslookup}, {whois} network diagnosis: {ping}, {traceroute} remote access: {rlogin}, {ssh} * Software development {compiler}: {gcc} build: {make}, {ant} {codewalker} {preprocessor}: {cpp} {debugger}: {adb}, {gdb} {installation}: {apt-get}, {msiexec}, {patch} {compiler compiler}: {yacc} * Hardware device configuration: {PCU}, {devman}, {stty} (2007-02-02)

Utopian socialism: Given wide cuirency by the writings of Marx and Engels, this term signifies the socialist ideas of thinkcis like Owen, St. Simon and Fourier who protested against the sufferings of the masses under capitalism and who saw in social ownership of the means of production a remedy which would eliminate unemployment and afford economic security to all, but who at the same time felt that socialism could be attained by persuading the ruling classes to give up voluntarily their privileged positions and extensive holdings. Marx and Engels criticized such a conception of method and tactics as Utopian, naive, unhistorical, and opposed to it their own "scientific socialism". See Socialism, Marxian. -- J.M.S.

vadium ::: n. --> Pledge; security; bail. See Mortgage.

Vint Cerf "person" (Vinton G. Cerf) The co-inventor with {Bob Kahn} of the {Internet} and its base {protocol}, {TCP/IP}. Like {Jon Postel}, he was crucial in the development of many higher-level protocols, and has written several dozen {RFCs} since the late 1960s. Vinton Cerf is senior vice president of Internet Architecture and Technology for {MCI WorldCom}. His team of architects and engineers design advanced Internet frameworks for delivering a combination of data, information, voice and video services for business and consumer use. In December 1997, President Clinton presented the U.S. National Medal of Technology to Cerf and his partner, Robert E. Kahn, for founding and developing the Internet. Prior to rejoining MCI in 1994, Cerf was vice president of the Corporation for National Research Initiatives (CNRI). As vice president of MCI Digital Information Services from 1982-1986, he led the engineering of {MCI Mail}, the first commercial e-mail service to be connected to the Internet. During his tenure from 1976-1982 with the U.S. Department of {Defense Advanced Research Projects Agency} (DARPA), Cerf played a key role leading the development of Internet and Internet-related data packet and security technologies. Cerf served as founding president of the {Internet Society} from 1992-1995 and is currently chairman of the Board. Cerf is a member of the U.S. Presidential Information Technology Advisory Committee (PITAC) and the Advisory Committee for Telecommunications (ACT) in Ireland. Cerf is a recipient of numerous awards and commendations in connection with his work on the Internet. In December 1994, People magazine identified Cerf as one of that year's "25 Most Intriguing People." In addition to his work on behalf of MCI and the Internet, Cerf serves as technical advisor to production for "Gene Roddenberry's Earth: Final Conflict," the number one television show in first-run syndication. He also made a special guest appearance in May 1998. Cerf also holds an appointment as distinguished visiting scientist at the Jet Propulsion Laboratory where he is working on the design of an interplanetary Internet. Cerf holds a Bachelor of Science degree in Mathematics from Stanford University and Master of Science and Ph.D. degrees in Computer Science from UCLA. He also holds honorary Doctorate degrees from the Swiss Federal Institute of Technology, Zurich; Lulea University of Technology, Sweden; University of the Balearic Islands, Palma; Capitol College and Gettysburg College. {(http://mci.com/cerfsup/)}. (1999-02-25)

Virtual Private Network "networking, security" (VPN) The use of {encryption} in the lower {protocol layers} to provide a secure connection through an otherwise insecure network, typically the {Internet}. VPNs are generally cheaper than real private networks using private lines but rely on having the same encryption system at both ends. The encryption may be performed by {firewall} software or possibly by {routers}. Link-level (layer 2 and 3) encryption provides extra protection by encrypting all of each {datagram} except the link-level information. This prevents a listener from obtaining information about network structure. While link-level encryption prevents traffic analysis (a form of attack), it must encrypt/decrypt on every {hop} and every path. Protocol-level encryption (layer 3 and 4) encryption encrypts protocol data but leaves protocol and link headers clear. While protocol-level encryption requires you to encrypt/decrypt data only once, and it encrypts/decrypts only those sessions that need it, headers are sent as clear text, allowing traffic analysis. Application (layer 5 up) encryption is based on a particular application and requires that the application be modified to incorporate encryption. {Cisco (http://cisco.com/univercd/cc/td/doc/product/lan/cat5000/cnfg_nts/rsm/rsm_pa/4801encr.htm)}. (1999-11-15)

virtual server "web" A configuration of a {web} {server} that appears to {clients} as an independent server but which is actually running on a computer that is shared by any number of other virtual servers. Each virtual server can be configured as an independent {website}, with its own {hostname}, content, and security settings. {DNS} maps the hostnames of all virtual servers on one physical server to its {IP address}. The web server software then uses the "Host" header in the {HTTP} request to determine which virtual server the request was for, and then processes the request using that virtual server's configuration. Virtual servers allow {Internet Service Providers} to share one computer between multiple {websites} while allowing the owner of each website to use and administer the server as though they had complete control. (2003-06-23)

virus "security" (By analogy with biological viruses, via science fiction) A program or piece of code, a type of {malware}, written by a {cracker}, that "infects" one or more other programs by embedding a copy of itself in them, so that they become {Trojan horses}. When these programs are executed, the embedded virus is executed too, thus propagating the "infection". This normally happens invisibly to the user. A virus has an "engine" - code that enables it to propagate and optionally a "payload" - what it does apart from propagating. It needs a "host" - the particular hardware and software environment on which it can run and a "trigger" - the event that starts it running. Unlike a {worm}, a virus cannot infect other computers without assistance. It is propagated by vectors such as humans trading programs with their friends (see {SEX}). The virus may do nothing but propagate itself and then allow the program to run normally. Usually, however, after propagating silently for a while, it starts doing things like writing "cute" messages on the terminal or playing strange tricks with the display (some viruses include {display hacks}). Viruses written by particularly antisocial {crackers} may do irreversible damage, like deleting files. By the 1990s, viruses had become a serious problem, especially among {IBM PC} and {Macintosh} users (the lack of security on these machines enables viruses to spread easily, even infecting the operating system). The production of special {antivirus software} has become an industry, and a number of exaggerated media reports have caused outbreaks of near hysteria among users. Many {lusers} tend to blame *everything* that doesn't work as they had expected on virus attacks. Accordingly, this sense of "virus" has passed into popular usage where it is often incorrectly used for other types of {malware} such as {worms} or {Trojan horses}. See {boot virus}, {phage}. Compare {back door}. See also {Unix conspiracy}. [{Jargon File}] (2003-06-20)

vulnerability "security" A {bug} or {feature} of a system that exposes it to possible attack, a flaw in the system's security. A common example of a vulnerability due to a bug is {buffer overrun}, where carefully constructed input can allow an attacker to insert arbitrary code into a running program and have it executed. The most serious vulnerabilities are those in network software, especially if they exploit traffic that is allowed through the {firewall} like {HTTP}, for example exploiting a bug in a {web browser}. The {Open Source Vulnerability Database} lists many vulnerabilities. (2007-12-02)

wall ::: n. --> A kind of knot often used at the end of a rope; a wall knot; a wale.
A work or structure of stone, brick, or other materials, raised to some height, and intended for defense or security, solid and permanent inclosing fence, as around a field, a park, a town, etc., also, one of the upright inclosing parts of a building or a room.
A defense; a rampart; a means of protection; in the plural, fortifications, in general; works for defense.


wardialer "security" Almost certainly a shortened version of "WarGames dialer", from the film {WarGames}. 1. {carrier scanner} 2. A program which attempts to break a {password} of known length by iterating thru all possible combinations of characters that could make up that password. This approach is not feasable for cracking most passwords these days. However, as late as the mid-1980s, some long-distance companies required only very short numeric access codes (e.g. five digits) to verify the identity of their customers. Wardialers were created which would, running unattended, call up long-distance providers' local connect numbers and iteratively try possible access codes. Codes which worked were logged for later illicit use. These wardialers had a high success rate because of the small range of possibilities to iterate through, e.g. 10000 for a five digit access code, compared to hundreds of trillions of combinations for an eight-character alphanumeric code. Long-distance providers soon required longer passwords and took advantage of technology for rapidly tracing the phone numbers that wardialers were being run from, such that running wardialers became pointless and dangerous. (1997-03-16)

wardriving "security" (From {wardialer} in the "carrier scanner" sense of that word) To drive around with a {laptop} with a {wireless card}, and an antenna, looking for accessible {wireless networks}. (2003-06-24)

warez "software, legal" /weirz/ A term {software pirates} use to describe {cracked} games or applications made available to the {Internet}, at no cost, usually via {FTP} or {telnet}. Often the pirate will make use of a site with lax security. (1994-11-29)

warrantise ::: n. --> Authority; security; warranty. ::: v. t. --> To warrant.

Wi-Fi Protected Access "networking, security" (WPA) A security scheme for {wireless networks}, developed by the networking industry in response to the shortcomings of {Wired Equivalent Privacy} (WEP). WPA uses {Temporal Key Integrity Protocol} (TKIP) {encryption} and provides built-in {authentication}, giving security comparable to {VPN} tunneling with WEP, with the benefit of easier administration and use. {WPA-PSK} is a simplified form of WPA. (2007-05-11)

Wi-Fi Protected Access Pre-Shared Key "networking, security" (WPA-PSK) A simplified but still powerful form of {WPA}, most suitable for home {wireless networking}. As with {WEP}, you set a static key or pass phrase, but WPA-PSK uses {TKIP} to automatically change the keys periodically, making it much more difficult to break the encryption. (2007-05-11)

Windows 2000 "operating system" (Win2k, W2k, NT5, Windows NT 5.0) An {operating system} developed by {Microsoft Corporation} for {PCs} and {servers}, as the successor to {Windows NT 4}.0. Early {beta} versions were referred to as "Windows NT 5.0". Windows 2000 was officially released on 2000-02-17. Windows 2000 is most commonly used on {Intel} {x86} and {Pentium} processors, with a {DEC Alpha} version rumoured. Unlike Windows NT 4.0, Windows 2000 is not available for {PowerPC} or {MIPS}. Windows 2000's {user interface} is very similar to {Windows 95} or Windows NT 4.0 with integrated {Internet Explorer}, or to {Windows 98}. It is available in four flavours: - Professional: the {client} version, meant for desktop {workstations}, successor to Windows NT Workstation. - Server: "entry-level" server, designed for small deployments, and departmental file, print, or {intranet} servers. - Advanced Server: high throughput, larger scale servers and applications, and small to medium scale {websites}. - Data Center Server: software for large-scale server {clusters} (in development as of 2000-03-14). New features in Windows 2000 include: - {Active Directory}. - Greatly improved built-in security mechanisms, including {Kerberos}-based {authentication}, {public key} support, an {encrypting} {file system}, and {IPsec} support. - Integrated {web browser} - {Internet Explorer} 5.0. - Integrated {web server} - {IIS} 5.0 - Terminal services for displaying application interfaces on remote computers (similar to {X-Windows}). - File protection that prevents user programs from accidentally deleting or overwriting critical system files. - Improved hardware support, including {Plug-and-Play}, {DVD}, {IEEE-1394} (FireWire), {USB}, {infra-red}, {PCMCIA}, {ACPI}, {laptop computers}. - Improved user interface, including a single point to control the entire system. - Improved management tools, including remote administration. Minimum system requirements, according to Microsoft, are {Pentium}-133 {MHz} {CPU}, 64 {MB} {RAM}, 650 {MB} of {hard disk} space. These are for W2K Professional, others require more. Many {operating systems} compete with Windows 2000, including the {Apple} {MacOS}, {Linux}, {FreeBSD}, {OpenBSD}, {NetBSD}, {Sun} {Solaris}, {IBM} {AIX}, {Hewlett-Packard} {HP-UX}, {SGI} {Irix}. Novell's NDS also provides a service similar to Active Directory. Windows 2000 will be followed by {Windows XP} Professional and {Windows 2002}. {(http://microsoft.com/windows2000/)}. (2002-01-28)

Windows NT "operating system" (Windows New Technology, NT) {Microsoft}'s 32-bit {operating system} developed from what was originally intended to be {OS/2} 3.0 before {Microsoft} and {IBM} ceased joint development of OS/2. NT was designed for high end {workstations} (Windows NT 3.1), servers (Windows NT 3.1 Advanced Server), and corporate networks (NT 4.0 Enterprise Server). The first release was {Windows NT 3.1}. Unlike {Windows 3.1}, which was a graphical environment that ran on top of {MS-DOS}, Windows NT is a complete operating system. To the user it looks like Windows 3.1, but it has true {multi-threading}, built in networking, security, and {memory protection}. It is based on a {microkernel}, with 32-bit addressing for up to 4Gb of {RAM}, virtualised hardware access to fully protect applications, installable file systems, such as {FAT}, {HPFS} and {NTFS}, built-in networking, {multi-processor} support, and {C2 security}. NT is also designed to be hardware independent. Once the machine specific part - the {Hardware Abstraction Layer} (HAL) - has been ported to a particular machine, the rest of the operating system should theorertically compile without alteration. A version of NT for {DEC}'s {Alpha} machines was planned (September 1993). NT needs a fast {386} or equivalent, at least 12MB of {RAM} (preferably 16MB) and at least 75MB of free disk space. NT 4.0 was followed by {Windows 2000}. {Usenet} newsgroups: {news:comp.os.ms-windows.nt.setup}, {news:comp.os.ms-windows.nt.misc}. (2002-06-10)

wireless local area network "networking" (WLAN /W-lan/, or "LAWN" /lorn/, sometimes "WiLAN" /wi-lan/) A communication system that transmits and receives data using modulated electromagnetic waves, implemented as an extension to, or as an alternative for, a {wired} {LAN}. WLANs are typically found within a small {client} {node}-dense locale (e.g. a campus or office building), or anywhere a traditional network cannot be deployed for logistical reasons. Benefits include user mobility in the coverage area, speed and simplicity of physical setup, and {scalability}. Being a military spin-off, WLANs also provide security features such as {encryption}, {frequency hopping}, and {firewalls}. Some of these are intrinsic to the {protocol}, making WLANs at least as secure as wired networks, and usually more so. The drawbacks are high initial cost (mostly {hardware}), limited range, possibility of mutual interference, amd the need to security-enable clients. The established protocols are covered by {IEEE 802.11 (http://standards.ieee.org/getieee802/)}. Recent developments include the {Bluetooth} project and other WPAN, or {Personal Area Network} initiatives, accessible through {IEEE 802.15 working group (http://grouper.ieee.org/groups/802/15/)}. {Wireless Lan Association (http://wlana.org/)}. {Usenet} newsgroups: {news:comp.dcom.lans.misc}, {news:comp.std.wireless}. (2003-09-23)

Wireless Transport Layer Security "standard, security" (WTLS) The {WAP} {standard} related to security. WTLS is based upon its {TCP/IP} counterpart, {Secure Sockets Layer}. [Reference?] (2003-06-17)

World-Wide Web "web, networking, hypertext" (WWW, W3, the web) A {client-server} {hypertext} distributed information retrieval system, often referred to as "The Internet" though strictly speaking, the Internet is the network and the web is just one use of the network (others being {e-mail}, {DNS}, {SSH}). Basically, the web consists of documents or {web pages} in {HTML} format (a kind of {hypertext}), each of which has a unique {URL} or "web address". {Links} in a page are URLs of other pages which may be part of the same {website} or a page on another site on a different {web server} anywhere on the {Internet}. As well as HTML pages, a URL may refer to an image, some code ({JavaScript} or {Java}), {CSS}, a {video} stream or other kinds of object. URLs typically start with "http://", indicating that the page needs to be fetched using the {HTTP} {protocol} or or "https://" for the {HTTPS} protocol which {encrypts} the request and the resulting page for security. The URL "scheme" (the bit before the ":") indicates the protocol to use. These include {FTP}, the original protocol for transferring files over the Internet. {RTSP} is a {streaming protocol} that allow a continuous feed of {audio} or {video} from the server to the browser. {Gopher} was a predecessor of HTTP and {Telnet} starts an {interactive} {command-line} session with a remote server. The web is accessed using a {client} program known as a {web browser} that runs on the user's computer. The browser fetches and displays pages and allows the user to follow {links} by clicking on them (or similar action) and to input queries to the server. A variety of browsers are freely available, e.g. {Google Chrome}, {Microsoft} {Internet Explorer}, {Apple} {Safari} and {Mozilla} {Firefox}. Early browsers included {NCSA} {Mosaic} and {Netscape} {Navigator}. Queries can be entered into "forms" which allow the user to enter arbitrary text and select options from customisable menus and other controls. The server processes each request - either a simple URL or data from a form - and returns a response, typically a page of HTML. The World-Wide Web originated from the {CERN} High-Energy Physics laboratories in Geneva, Switzerland. In the early 1990s, the developers at CERN spread word of the Web's capabilities to scientific and academic audiences worldwide. By September 1993, the share of Web traffic traversing the {NSFNET} {Internet} {backbone} reached 75 {gigabytes} per month or one percent. By July 1994 it was one {terabyte} per month. The {World Wide Web Consortium} is the main standards body for the web. Following the widespread availability of web browsers and servers from about 1995, organisations started using the same software and protocols on their own private internal {TCP/IP} networks giving rise to the term "{intranet}". {This dictionary} is accessible via the Web at {(http://foldoc.org/)}. {An article by John December (http://sunsite.unc.edu/cmc/mag/1994/oct/webip.html)}. {W3 servers, clients and tools (http://w3.org/Status.html)}. (2017-11-01)

worm "networking, security" (From "Tapeworm" in John Brunner's novel "The Shockwave Rider", via {XEROX PARC}) A program that propagates itself over a network, reproducing itself as it goes. Compare {virus}. Nowadays the term has negative connotations, as it is assumed that only {crackers} write worms. Perhaps the best-known example was the {Great Worm}. Compare {Trojan horse}. [{Jargon File}] (1996-09-17)

wp-login.php "web, security" The default name of the {web page} the allows a {web site administrator} to log in to the {dashboard} and update a {web site} powered by {WordPress}. {URL}s like http://example.com/wp-login.php are a favourite target for {brute-force attacks} that try to break into WordPress-powered web sites by guessing the admin username and password. If successful, the attacker could then publish their own content on the site or modify the existing content. {(http://www.inmotionhosting.com/support/edu/wordpress/wp-login-brute-force-attack)}. (2016-12-24)

wrapper "programming" Code which is combined with another piece of {code} to determine how that code is executed. The wrapper acts as an interface between its caller and the wrapped code. This may be done for compatibility, e.g. if the wrapped code is in a different programming language or uses different calling conventions, or for security, e.g. to prevent the calling program from executing certain functions. The implication is that the wrapped code can only be accessed via the wrapper. (1998-12-15)

WTLS {Wireless Transport Layer Security}



QUOTES [19 / 19 - 1500 / 6904]


KEYS (10k)

   3 The Mother
   1 Z'ev Ben Shimon Halevi
   1 Wikipedia
   1 sing
   1 Saint Ambrose
   1 Ramesh Balsekar
   1 Psalms XVI. 6. 9
   1 Jiddu Krishnamurti
   1 Jeff Foster
   1 Jalaluddin Rumi
   1 Friedrich Nietzsche
   1 Antoine the Healer
   1 Alice A. Bailey
   1 Alan Watts
   1 Sri Aurobindo
   1 Saint Thomas Aquinas
   1 Adyashanti

NEW FULL DB (2.4M)

   22 Benjamin Franklin
   19 Barack Obama
   16 Anonymous
   15 Donald Trump
   12 George W Bush
   7 Thomas Jefferson
   7 H G Wells
   7 Cory Doctorow
   6 William Shakespeare
   6 Ronald Reagan
   6 Rand Paul
   6 Kofi Annan
   5 Yitzhak Rabin
   5 Tony Judt
   5 Ron Paul
   5 Mehmet Murat ildan
   5 John F Kennedy
   5 James Madison
   5 Hillary Clinton
   5 Henry A Kissinger

1:Security is the mother of negligence ~ Saint Thomas Aquinas, (DV 6.5).,
2:Security does not exist but it is what we search continually, which creates the fear of not having it. ~ Jiddu Krishnamurti,
3:The very drive for security and safety is what causes so much misery and confusion. Freedom is a state of complete and absolute insecurity and not knowing. ~ Adyashanti,
4:As a matter of fact, our age is no more insecure than any other. Poverty, disease, war, change and death are nothing new. In the best of times "security" has never been more than temporary and apparent. ~ Alan Watts,
5:The lines are fallen to me in pleasant places; yea, I have a goodly heritage. Therefore my heart is glad and my spirit rejoiceth; my flesh also shall rest in security. ~ Psalms XVI. 6. 9, the Eternal Wisdom
6:The book of psalms is the voice of complete assent, the joy of freedom, a cry of happiness, the echo of gladness. It soothes the temper, distracts from care, lightens the burden of sorrow. It is a source of security at night, a lesson in wisdom by day. ~ Saint Ambrose,
7:It is the Divine Presence that gives value to life. This Presence is the source of all peace, all joy, all security. Find this Presence in yourself and all your difficulties will disappear.
   ~ The Mother, Words Of The Mother II, The Divine Is with You,
8:ur conscience is an inner light which guides us with an infallible security, shows us everywhere the Good and invites us to cooperate in it; but the intelligence snatches it away from us under a veil whose stuff is of the imagination. ~ Antoine the Healer, the Eternal Wisdom
9:Let us sing alleluia here on earth, while we still live in anxiety, so that we may sing it one day in heaven in full security...Sing now, not in order to enjoy a life of leisure, but in order to lighten our labors. Sing as wayfarers do ~ sing, but continue your journey. ~ Saint Augustine of Hippo,
10:Everyone is searching for something. Some people pursue security, others pleasure or power. Yet others look for dreams, or they know not what. There are, however, those who know what they seek but cannot find it in the natural world. For these searchers many clues have been laid out by those who have gone before. The traces are everywhere, although only those with eyes to see or ears to hear perceive them. When the significance of these signs is seriously acted upon, Providence opens a door out of the natural into the supernatural to reveal a ladder from the transient to the Eternal. He who dares the ascent enters the Way of Kabbalah.
   ~ Z'ev Ben Shimon Halevi, The Way Of Kabbalah,
11:Why does one feel afraid?

   I suppose it is because one is egoistic.
   There are three reasons. First, an excessive concern about one's security. Next, what one does not know always gives an uneasy feeling which is translated in the consciousness by fear. And above all, one doesn't have the habit of a spontaneous trust in the Divine. If you look into things sufficiently deeply, this is the true reason. There are people who do not even know that That exists, but one could tell them in other words, 'You have no faith in your destiny' or 'You know nothing about Grace' - anything whatever, you may put it as you like, but the root of the matter is a lack of trust. If one always had the feeling that it is the best that happens in all circumstances, one would not be afraid
   ~ The Mother,
12:The most spiritual men, as the strongest, find their happiness where others would find their downfall: in the labyrinth, in hardness towards oneself and others, in experiment; their delight lies in self-mastery: asceticism is with them nature, need, instinct. The difficult task they consider a privilege; to play with burdens that crush others, a recreation... Knowledge - a form of asceticism. - They are the most venerable kind of man: that does not exclude their being the cheerfullest, the kindliest. They rule not because they want to but because they are; they are not free to be second. - The second type: they are the guardians of the law, the keepers of order and security; they are the noble warriors, with the king above all as the highest formula of warrior, judge, and upholder of the law. ~ Friedrich Nietzsche, The Antichrist,
13:It is here upon earth, in the body itself, that you must acquire a complete knowledge and learn to use a full and complete power. Only when you have done that will you be free to move about with entire security in all the worlds. Only when you are incapable of having the slightest fear, when you remain unmoved, for example, in the midst of the worst nightmare, can you say, "Now I am ready to go into the vital world." But this means the acquisition of a power and a knowledge that can come only when you are a perfect master of the impulses and desires of the vital nature. You must be absolutely free from everything that can bring in the beings of the darkness or allow them to rule over you; if you are not free, beware!

No attachments, no desires, no impulses, no preferences; perfect equanimity, unchanging peace and absolute faith in the Divine protection: with that you are safe, without it you are in peril. And as long as you are not safe, it is better to do like little chickens that take shelter under the mother's wings. ~ The Mother, Questions And Answers 1929-1931,
14:Kusanagi is a leading expert in fourth-generation warfare and cyberbrain combative warfare. As the most heavily mechanized member of Section 9, she is regarded amongst her peers as the best hand-to-hand melee fighter and the most skilled "hacker and net diver." Chief Aramaki described her abilities as "...rarer than 'ESP'; the kind of person that government agencies hire to assassinate without leaving a trace." Classified as "Wizard Class" grey hat, her computer security hacking skills allow her brain-computer interface consciousness to control two-external humanoid "drone"-robots remotely with the ability to move her "ghost" from host to host. Kusanagi repeatedly demonstrates uncanny ability to hack people's wetware protected with military-grade malware protection and counter-measures, allowing her to "see through their eyes," disable their vocal systems, or even take control of their bodies altogether. As a cyborg, Kusanagi is able to perform numerous superhuman feats, such as demonstrating superhuman strength, leaping between skyscrapers, advanced acrobatics, or shooting down a bullet after it was fired at mid-range. ~ Wikipedia, Motoko Kusangi,
15:A Community of the Spirit

There is a community of the spirit.
Join it, and feel the delight
of walking in the noisy street
and being the noise.

Drink all your passion and be a disgrace.
Close both eyes to see with the other eye.
Open your hands if you want to be held.

Consider what you have been doing.
Why do you stay
with such a mean-spirited and dangerous partner?

For the security of having food. Admit it.
Here is a better arrangement.
Give up this life, and get a hundred new lives.

Sit down in this circle.

Quit acting like a wolf,
and feel the shepherd's love filling you.

At night, your beloved wanders.
Do not take painkillers.

Tonight, no consolations.
And do not eat.

Close your mouth against food.
Taste the lover's mouth in yours.

You moan, But she left me. He left me.
Twenty more will come.

Be empty of worrying.
Think of who created thought.

Why do you stay in prison
when the door is so wide open?

Move outside the tangle of fear-thinking.
Live in silence.

Flow down and down
in always widening rings of being.
~ Jalaluddin Rumi,
16:And now what methods may be employed to safeguard the worker in the field of the world? What can be done to ensure his safety in the present strife, and in the greater strife of the coming centuries? 1. A realisation that purity of all the vehicles is the prime essential. If a Dark Brother gains control over any man, it but shows that that man has in his life some weak spot.... 2. The elimination of all fear. The forces of evolution vibrate more rapidly than those of involution, and in this fact lies a recognisable security. Fear causes weakness; weakness causes a disintegration; the weak spot breaks and a gap appears, and through that gap evil force may enter.... 3. A standing firm and unmoved, no matter what occurs. Your feet may be bathed in the mud of earth, but your head may be bathed in the sunshine of the higher regions... 4. A recognition of the use of common-sense, and the application of this common-sense to the matter in hand. Sleep much, and in sleeping, learn to render the body positive; keep busy on the emotional plane, and achieve the inner calm. Do naught to overtire the body physical, and play whenever possible. In hours of relaxation comes the adjustment that obviates later tension. ~ Alice A. Bailey, Letters on Occult Meditation p. 137/8, (1922)
17:The human being is at home and safe in the material body; the body is his protection. There are some who are full of contempt for their bodies and think that things will be much better and easier after death without them. But in fact the body is your fortress and your shelter. While you are lodged in it the forces of the hostile world find it difficult to have a direct hold upon you.... Directly you enter any realm of this [vital] world, its beings gather round you to get out of you all you have, to draw what they can and make it a food and a prey. If you have no strong light and force radiating from within you, you move there without your body as if you had no coat to protect you against a chill and bleak atmosphere, no house to shield you, even no skin covering you, your nerves exposed and bare. There are men who say, 'How unhappy I am in this body', and think of death as an escape! But after death you have the same vital surroundings and are in danger from the same forces that are the cause of your misery in this life....
   "It is here upon earth, in the body itself, that you must acquire a complete knowledge and learn to use a full and complete power. Only when you have done that will you be free to move about with entire security in all the worlds." ~ The Mother, Questions And Answers 1929-1931, (12 May 1929),
18:But there's a reason. There's a reason. There's a reason for this, there's a reason education sucks, and it's the same reason that it will never, ever, ever be fixed. It's never gonna get any better. Don't look for it. Be happy with what you got. Because the owners of this country don't want that. I'm talking about the real owners now, the real owners, the big wealthy business interests that control things and make all the important decisions. Forget the politicians. The politicians are put there to give you the idea that you have freedom of choice. You don't. You have no choice. You have owners. They own you. They own everything. They own all the important land. They own and control the corporations. They've long since bought and paid for the senate, the congress, the state houses, the city halls, they got the judges in their back pockets and they own all the big media companies so they control just about all of the news and information you get to hear. They got you by the balls. They spend billions of dollars every year lobbying, lobbying, to get what they want. Well, we know what they want. They want more for themselves and less for everybody else, but I'll tell you what they don't want: They don't want a population of citizens capable of critical thinking. They don't want well informed, well educated people capable of critical thinking. They're not interested in that. That doesn't help them. Thats against their interests. Thats right. They don't want people who are smart enough to sit around a kitchen table to figure out how badly they're getting fucked by a system that threw them overboard 30 fucking years ago. They don't want that. You know what they want? They want obedient workers. Obedient workers. People who are just smart enough to run the machines and do the paperwork, and just dumb enough to passively accept all these increasingly shittier jobs with the lower pay, the longer hours, the reduced benefits, the end of overtime and the vanishing pension that disappears the minute you go to collect it, and now they're coming for your Social Security money. They want your retirement money. They want it back so they can give it to their criminal friends on Wall Street, and you know something? They'll get it. They'll get it all from you, sooner or later, 'cause they own this fucking place. It's a big club, and you ain't in it. You and I are not in the big club. And by the way, it's the same big club they use to beat you over the head with all day long when they tell you what to believe. All day long beating you over the head in their media telling you what to believe, what to think and what to buy. The table is tilted folks. The game is rigged, and nobody seems to notice, nobody seems to care. Good honest hard-working people -- white collar, blue collar, it doesn't matter what color shirt you have on -- good honest hard-working people continue -- these are people of modest means -- continue to elect these rich cocksuckers who don't give a fuck about them. They don't give a fuck about you. They don't give a fuck about you. They don't care about you at all -- at all -- at all. And nobody seems to notice, nobody seems to care. That's what the owners count on; the fact that Americans will probably remain willfully ignorant of the big red, white and blue dick that's being jammed up their assholes everyday. Because the owners of this country know the truth: it's called the American Dream, because you have to be asleep to believe it. ~ George Carlin,
19:The Two Paths Of Yoga :::
   14 April 1929 - What are the dangers of Yoga? Is it especially dangerous to the people of the West? Someone has said that Yoga may be suitable for the East, but it has the effect of unbalancing the Western mind.

   Yoga is not more dangerous to the people of the West than to those of the East. Everything depends upon the spirit with which you approach it. Yoga does become dangerous if you want it for your own sake, to serve a personal end. It is not dangerous, on the contrary, it is safety and security itself, if you go to it with a sense of its sacredness, always remembering that the aim is to find the Divine.
   Dangers and difficulties come in when people take up Yoga not for the sake of the Divine, but because they want to acquire power and under the guise of Yoga seek to satisfy some ambition. if you cannot get rid of ambition, do not touch the thing. It is fire that burns.
   There are two paths of Yoga, one of tapasya (discipline), and the other of surrender. The path of tapasya is arduous. Here you rely solely upon yourself, you proceed by your own strength. You ascend and achieve according to the measure of your force. There is always the danger of falling down. And once you fall, you lie broken in the abyss and there is hardly a remedy. The other path, the path of surrender, is safe and sure. It is here, however, that the Western people find their difficulty. They have been taught to fear and avoid all that threatens their personal independence. They have imbibed with their mothers' milk the sense of individuality. And surrender means giving up all that. In other words, you may follow, as Ramakrishna says, either the path of the baby monkey or that of the baby cat. The baby monkey holds to its mother in order to be carried about and it must hold firm, otherwise if it loses its grip, it falls. On the other hand, the baby cat does not hold to its mother, but is held by the mother and has no fear nor responsibility; it has nothing to do but to let the mother hold it and cry ma ma.
   If you take up this path of surrender fully and sincerely, there is no more danger or serious difficulty. The question is to be sincere. If you are not sincere, do not begin Yoga. If you were dealing in human affairs, then you could resort to deception; but in dealing with the Divine there is no possibility of deception anywhere. You can go on the Path safely when you are candid and open to the core and when your only end is to realise and attain the Divine and to be moved by the Divine. There is another danger; it is in connection with the sex impulses. Yoga in its process of purification will lay bare and throw up all hidden impulses and desires in you. And you must learn not to hide things nor leave them aside, you have to face them and conquer and remould them. The first effect of Yoga, however, is to take away the mental control, and the hungers that lie dormant are suddenly set free, they rush up and invade the being. So long as this mental control has not been replaced by the Divine control, there is a period of transition when your sincerity and surrender will be put to the test. The strength of such impulses as those of sex lies usually in the fact that people take too much notice of them; they protest too vehemently and endeavour to control them by coercion, hold them within and sit upon them. But the more you think of a thing and say, "I don't want it, I don't want it", the more you are bound to it. What you should do is to keep the thing away from you, to dissociate from it, take as little notice of it as possible and, even if you happen to think of it, remain indifferent and unconcerned. The impulses and desires that come up by the pressure of Yoga should be faced in a spirit of detachment and serenity, as something foreign to yourself or belonging to the outside world. They should be offered to the Divine, so that the Divine may take them up and transmute them. If you have once opened yourself to the Divine, if the power of the Divine has once come down into you and yet you try to keep to the old forces, you prepare troubles and difficulties and dangers for yourself. You must be vigilant and see that you do not use the Divine as a cloak for the satisfaction of your desires. There are many self-appointed Masters, who do nothing but that. And then when you are off the straight path and when you have a little knowledge and not much power, it happens that you are seized by beings or entities of a certain type, you become blind instruments in their hands and are devoured by them in the end. Wherever there is pretence, there is danger; you cannot deceive God. Do you come to God saying, "I want union with you" and in your heart meaning "I want powers and enjoyments"? Beware! You are heading straight towards the brink of the precipice. And yet it is so easy to avoid all catastrophe. Become like a child, give yourself up to the Mother, let her carry you, and there is no more danger for you.
   This does not mean that you have not to face other kinds of difficulties or that you have not to fight and conquer any obstacles at all. Surrender does not ensure a smooth and unruffled and continuous progression. The reason is that your being is not yet one, nor your surrender absolute and complete. Only a part of you surrenders; and today it is one part and the next day it is another. The whole purpose of the Yoga is to gather all the divergent parts together and forge them into an undivided unity. Till then you cannot hope to be without difficulties - difficulties, for example, like doubt or depression or hesitation. The whole world is full of the poison. You take it in with every breath. If you exchange a few words with an undesirable man or even if such a man merely passes by you, you may catch the contagion from him. It is sufficient for you to come near a place where there is plague in order to be infected with its poison; you need not know at all that it is there. You can lose in a few minutes what it has taken you months to gain. So long as you belong to humanity and so long as you lead the ordinary life, it does not matter much if you mix with the people of the world; but if you want the divine life, you will have to be exceedingly careful about your company and your environment.
   ~ The Mother, Questions And Answers 1929-1931,

*** WISDOM TROVE ***

1:Security will produce danger. ~ samuel-johnson, @wisdomtrove
2:Don't ask for security, ask for adventure ~ jim-rohn, @wisdomtrove
3:Security is the chief enemy of mortals. ~ william-shakespeare, @wisdomtrove
4:Security without liberty is called prison. ~ benjamin-franklin, @wisdomtrove
5:Most people want security in this world, not liberty. ~ h-l-mencken, @wisdomtrove
6:Security isn't having things, it's handling things. ~ susan-jeffers, @wisdomtrove
7:The only peace, the only security, is in fulfillment. ~ henry-miller, @wisdomtrove
8:Distrust and caution are the parents of security. ~ benjamin-franklin, @wisdomtrove
9:There is no real security in what is no longer meaningful. ~ alan-cohen, @wisdomtrove
10:The greatest security for Israel is to create new Egypts. ~ ronald-reagan, @wisdomtrove
11:We support the security of both Israel and her neighbors. ~ john-f-kennedy, @wisdomtrove
12:Shop for security over happiness and we buy it at that price. ~ richard-bach, @wisdomtrove
13:There is no security, no safety, in the appeasement of evil. ~ ronald-reagan, @wisdomtrove
14:Security is mostly a superstition. It does not exist in nature. ~ hellen-keller, @wisdomtrove
15:Security is worthless if you have to sacrifice growth to get it ~ steve-pavlina, @wisdomtrove
16:Vigor of government is essential to the security of liberty. ~ alexander-hamilton, @wisdomtrove
17:The only real security in life lies in relishing life’s insecurity. ~ m-scott-peck, @wisdomtrove
18:Security isn't what the wise person looks for - it's opportunity. ~ earl-nightingale, @wisdomtrove
19:The greatest security against sin is to be shocked at its presence. ~ thomas-carlyle, @wisdomtrove
20:We spend our time searching for security and hate it when we get it. ~ john-steinbeck, @wisdomtrove
21:You all know," said the Guide, "that security is mortals' greatest enemy. ~ c-s-lewis, @wisdomtrove
22:Financial security puts me at ease and makes me reel good about my future ~ louise-hay, @wisdomtrove
23:Satan can control you if you let outward things determine your security. ~ joyce-meyer, @wisdomtrove
24:The ignorance of one voter in a democracy impairs the security of all. ~ john-f-kennedy, @wisdomtrove
25:We will bankrupt ourselves in the vain search for absolute security. ~ dwight-eisenhower, @wisdomtrove
26:Inspect every piece of pseudoscience and you will find a security blanket. ~ isaac-asimov, @wisdomtrove
27:Nothing can bring a real sense of security into the home except true love. ~ billy-graham, @wisdomtrove
28:Poverty with security is better than plenty in the midst of fear and uncertainty. ~ aesop, @wisdomtrove
29:The beauty of enmity is insecurity; the beauty of friendship is in security. ~ robert-frost, @wisdomtrove
30:The US Airforce assures me that UFO's pose no threat to National Security. ~ john-f-kennedy, @wisdomtrove
31:As a very important source of strength and security, cherish public credit. ~ george-washington, @wisdomtrove
32:Tradition becomes our security, and when the mind is secure it is in decay. ~ jiddu-krishnamurti, @wisdomtrove
33:True security lies not in the things one has, but in the things one can do without. ~ og-mandino, @wisdomtrove
34:A people who chose security over liberty will receive neither nor deserve either. ~ benjamin-franklin, @wisdomtrove
35:Perform your job better than anyone else can. That's the best job security I know. ~ h-jackson-brown-jr, @wisdomtrove
36:Our lives are structured around power symbols: money, authority, title, beauty, security. ~ caroline-myss, @wisdomtrove
37:Better to be despised for too anxious apprehensions than ruined by too confident a security. ~ edmund-burke, @wisdomtrove
38:Our growing softness, our increasing lack of physical fitness, is a menace to our security. ~ john-f-kennedy, @wisdomtrove
39:Your real security is yourself. You know you can do it, and they can't ever take that away from you. ~ mae-west, @wisdomtrove
40:A strong American economy is essential to the well-being and security of our friends and allies. ~ ronald-reagan, @wisdomtrove
41:Our lives are structured around power symbols: money, authority, title, beauty, security. ~ norman-vincent-peale, @wisdomtrove
42:I don't think any of us should forget that the security of America is our highest responsibility. ~ ronald-reagan, @wisdomtrove
43:Civilized people have exchanged some part of their chances of happiness for a measure of security. ~ sigmund-freud, @wisdomtrove
44:He who would trade liberty for some temporary security, deserves neither liberty nor security. ~ benjamin-franklin, @wisdomtrove
45:People willing to trade their freedom for temporary security deserve neither and will lose both. ~ benjamin-franklin, @wisdomtrove
46:Seek opportunity, not security. A boat in the harbor is safe, but in time its bottom will rot out. ~ h-jackson-brown-jr, @wisdomtrove
47:We view our Nation's strength and security as a trust, upon which rests the hope of free men everywhere. ~ dwight-eisenhower, @wisdomtrove
48:Financial security and independence are like a three-legged stool resting on savings, insurance and investments ~ brian-tracy, @wisdomtrove
49:There is more security in self-denial, mortification, and other like virtues, than in an abundance of tears. ~ teresa-of-avila, @wisdomtrove
50:There is no defense or security for any of us except in the highest intelligence and development of all. ~ booker-t-washington, @wisdomtrove
51:Doing a job RIGHT the first time gets the job done. Doing the job WRONG fourteen times gives you job security. ~ stephen-hawking, @wisdomtrove
52:Photographers and artists contribute a lot to the world and have a right to exist in relative security and comfort. ~ amsel-adams, @wisdomtrove
53:There is more security in the adventurous and exciting, for in movement there is life, and in change there is power. ~ alan-cohen, @wisdomtrove
54:We must achieve both security and solvency. In fact, the foundation of military strength is economic strength, ~ dwight-eisenhower, @wisdomtrove
55:We must achieve both security and solvency. In fact, the foundation of military strength is economic strength. ~ dwight-eisenhower, @wisdomtrove
56:Don't ask for security, ask for adventure. Better to live 30 years full of adventure than a 100 years safe in the corner. ~ jim-rohn, @wisdomtrove
57:Deep, contended joy comes from a place of complete security and confidence [in God] - even in the midst of trial. ~ charles-r-swindoll, @wisdomtrove
58:It is possible to provide security against other ills, but as far as death is concerned, we men live in a city without walls. ~ epicurus, @wisdomtrove
59:The reason you might choose to embrace the artist within you now is that this is the path to (cue the ironic music) security. ~ seth-godin, @wisdomtrove
60:There can be no security anywhere in the free world if there is no fiscal and economic stability within the United States. ~ ronald-reagan, @wisdomtrove
61:To invest one’s identity and security in something that appears, moves, changes and disappears is the cause of unhappiness. ~ rupert-spira, @wisdomtrove
62:Against other things it is possible to obtain security, but when it comes to death we human beings all live in an unwalled city. ~ epicurus, @wisdomtrove
63:There is no security in following the call to adventure. Nothing is exciting if you know what the outcome is going to be. ~ joseph-campbell, @wisdomtrove
64:Too much concern about physical security and too little concern about spirituality is the hallmark of today's world. ~ mata-amritanandamayi, @wisdomtrove
65:My security does not come from the way people treat me or by comparing myself to others. It comes from my basic integrity. ~ stephen-r-covey, @wisdomtrove
66:Side effect of over-emphasizing the importance of personal security in your life is that it can cause you to live reactively. ~ steve-pavlina, @wisdomtrove
67:Our whole life is taken up with anxiety for personal security, with preparations for living, so that we really never live at all. ~ leo-tolstoy, @wisdomtrove
68:Where is the security for property, for reputation, for life, if the sense of religious obligation deserts the oaths . . . ? ~ george-washington, @wisdomtrove
69:I oppose registration for the draft... because I believe the security of freedom can best be achieved by security through freedom. ~ ronald-reagan, @wisdomtrove
70:Life seems completely different, exciting and worthwhile. Your only hope and security is in knowing that they are a part of your life. ~ bob-marley, @wisdomtrove
71:A medical revolution has extended the life of our elder citizens without providing the dignity and security those later years deserve. ~ john-f-kennedy, @wisdomtrove
72:I have an affection for a great city. I feel safe in the neighborhood of man, and enjoy the sweet security of the streets. ~ henry-wadsworth-longfellow, @wisdomtrove
73:They say they seek security and quiet, the condition they call peace. Even as they speak they create the seeds of turmoil and violence. ~ frank-herbert, @wisdomtrove
74:Let us fight for a new world, a decent world that will give men a chance to work, that will give youth a future and old age a security. ~ charlie-chaplan, @wisdomtrove
75:The moment one is on the side of life; peace and security drop out of consciousness. The only peace, the only security, is in fulfillment. ~ henry-miller, @wisdomtrove
76:In a world in which the total of human knowledge is doubling about every ten years, our security can rest only on our ability to learn ~ nathaniel-branden, @wisdomtrove
77:An abundance mentality springs from internal security, not from external rankings, comparisons, opinions, possessions, or associations.   ~ stephen-r-covey, @wisdomtrove
78:If you want total security, go to prison. There you're fed, clothed, given medical care and so on. The only thing lacking... is freedom. ~ dwight-eisenhower, @wisdomtrove
79:What is the most sacred duty and the greatest source of our security in a Republic? An inviolable respect for the Constitution and Laws. ~ alexander-hamilton, @wisdomtrove
80:While we measure our own success in terms of our personal comfort and security, the universe measures our success by how much we have learned. ~ caroline-myss, @wisdomtrove
81:Security, the chief pretense of civilization, cannot exist where the worst of dangers, the danger of poverty, hangs over everyone’s head. ~ george-bernard-shaw, @wisdomtrove
82:The real secret to a life of abundance is to stop spending your days searching for security and to start spending your time pursuing opportunity. ~ robin-sharma, @wisdomtrove
83:We need an adequate defense, but every arms dollar we spend above adequacy has a long-term weakening effect upon the nation and its security. ~ dwight-eisenhower, @wisdomtrove
84:The instant formal government is abolished, society begins to act. A general association takes place, and common interest produces common security. ~ thomas-paine, @wisdomtrove
85:We like security: we like the pope to be infallible in matters of faith, and grave doctors to be so in moral questions so that we can feel reassured. ~ blaise-pascal, @wisdomtrove
86:While we measure our own success in terms of our personal comfort and security, the universe measures our success by how much we have learned. ~ norman-vincent-peale, @wisdomtrove
87:Love is the most durable power in the world. This creative force is the most potent instrument available in mankind's quest for peace and security. ~ martin-luther-king, @wisdomtrove
88:The fact is that people are good.  Give people affection and security, and they will give affection and be secure in their feelings and their behavior. ~ abraham-maslow, @wisdomtrove
89:To express yourself in freedom, you must die to everything of yesterday. From the &
90:Of course my jokes are in poor taste, inappropriate, and confused; they reveal my lack of security. But that is because I have no respect for myself. ~ fyodor-dostoevsky, @wisdomtrove
91:The word of a gentleman is as good as his bond — sometimes better; as in the present case, where his bond might prove but a doubtful sort of security. ~ charles-dickens, @wisdomtrove
92:Once writing has become your major vice and greatest pleasure only death can stop it. Financial security then is a great help as it keeps you from worrying. ~ ernest-hemingway, @wisdomtrove
93:The more you seek security, the less of it you have. But the more you seek opportunity, the more likely it is that you will achieve the security that you desire. ~ brian-tracy, @wisdomtrove
94:Though a wide ocean separates the United States from Europe, yet there are various considerations that warn us against an excess of confidence or security. ~ alexander-hamilton, @wisdomtrove
95:We do not keep security establishments merely to defend property or territory or rights abroad or at sea. We keep the security forces to defend a way of life. ~ dwight-eisenhower, @wisdomtrove
96:Happiness is peace after strife, the overcoming of difficulties, the feeling of security and well-being. The only really happy folk are married women and single men. ~ h-l-mencken, @wisdomtrove
97:The man who looks for security, even in the mind, is like a man who would chop off his limbs in order to have artificial ones which will give him no pain or trouble. ~ henry-miller, @wisdomtrove
98:Gough never pretended to perfection or to sainthood - well, hardly ever. Although when he set off the metal detector at airport security, he would blame his aura. ~ william-faulkner, @wisdomtrove
99:We welcome change and openness; for we believe that freedom and security go together, that the advance of human liberty can only strengthen the cause of world peace. ~ ronald-reagan, @wisdomtrove
100:The knowledge that you can handle anything that comes your way is the key to allowing yourself to take risks. ... security is not having things; it's handling things. ~ susan-jeffers, @wisdomtrove
101:It is presumable that no country will be able to borrow of foreigners upon better terms than the United States, because none can, perhaps, afford so good security. ~ alexander-hamilton, @wisdomtrove
102:Once you become dedicated to a cause, personal security is not the goal. What will happen to you personally does not matter. My cause, my race, is worth dying for. ~ martin-luther-king, @wisdomtrove
103:The best security for civilization is the dwelling, and upon properly appointed and becoming dwellings depends, more than anything else, the improvement of mankind. ~ benjamin-disraeli, @wisdomtrove
104:If money is your hope for independence you will never have it. The only real security that a man will have in this world is a reserve of knowledge, experience, and ability. ~ henry-ford, @wisdomtrove
105:Life is known only by those who have found a way to be comfortable with change and the unknown. Given the nature of life, there may be no security, but only adventure. ~ rachel-naomi-remen, @wisdomtrove
106:This [a state militia system] appears to me the only substitute that can be devised for a standing army, and the best possible security against it, if it should exist. ~ alexander-hamilton, @wisdomtrove
107:Success, recognition, and conformity are the bywords of the modern world where everyone seems to crave the anesthetizing security of being identified with the majority. ~ martin-luther-king, @wisdomtrove
108:Creative experiences can be produced regularly, consistently, almost daily in people’s lives. It requires enormous personal security and openness and a spirit of adventure.   ~ stephen-r-covey, @wisdomtrove
109:That the greatest security of the people, against the encroachments and usurpations of their superiors, is to keep the Spirit of Liberty constantly awake, is an undeniable truth ~ edmund-burke, @wisdomtrove
110:People residing within the cult of average don’t like to see others rise. It threatens their security, and spotlights their low self-worth. Go for great, no matter what they say. ~ robin-sharma, @wisdomtrove
111:I know of no realm of life that can provide more companionship in a lonely world or greater feelings of security and purpose in chaotic times than the close ties of a family. ~ charles-r-swindoll, @wisdomtrove
112:The time will come when mankind will begin to get away from the consciousness of needing so many material things. More security and peace will be found in the simple life. ~ paramahansa-yogananda, @wisdomtrove
113:The desire of reward is one of the strongest incentives of human conduct; ... the best security for the fidelity of mankind is to make their interest coincide with their duty. ~ alexander-hamilton, @wisdomtrove
114:The soft-minded man always fears change. He feels security in the status quo, and he has an almost morbid fear of the new. For him, the greatest pain is the pain of a new idea. ~ martin-luther-king, @wisdomtrove
115:Stop looking outside for scraps of pleasure or fulfilment, for validation, security, or love - you have a treasure within that is infinitely greater than anything the world can offer. ~ eckhart-tolle, @wisdomtrove
116:Using another as a means of satisfaction and security is not love. Love is never security; love is a state in which there is no desire to be secure; it is a state of vulnerability. ~ jiddu-krishnamurti, @wisdomtrove
117:The end of all political associations is the preservation of the natural and imprescriptible rights of man; and these rights are liberty, property, security, and resistance of oppression. ~ thomas-paine, @wisdomtrove
118:For too long, too many people dependent on Social Security have been cruelly frightened by individuals seeking political gain through demagoguery and outright falsehood, and this must stop. ~ ronald-reagan, @wisdomtrove
119:Your security is not your job, or your bank account, or your investments, or your spouse or your parents. Your security is your ability to connect with the cosmic power that creates all things. ~ louise-hay, @wisdomtrove
120:Our forbearance should never be misunderstood. Our reluctance for conflict should not be misjudged as a failure of will. When action is required to preserve our national security, we will act. ~ ronald-reagan, @wisdomtrove
121:The farmers can be thankful. Didn't the Farm Board decide in Washington last week that they could have cheaper interest? All the farmers have to do now is to find something new to put up as security. ~ will-rogers, @wisdomtrove
122:When people appear to be something other than good and decent, it is only because they are reacting to stress, pain, or the deprivation of basic human needs such as security, love, and self-esteem. ~ abraham-maslow, @wisdomtrove
123:Should any political party attempt to abolish social security, unemployment insurance, and eliminate labor laws and farm programs, you would not hear of that party again in our political history. ~ dwight-eisenhower, @wisdomtrove
124:Now this brings me to my main topic - our military strength - more specifically, how to stay strong against threat from outside, without undermining the economic health that supports our security. ~ dwight-eisenhower, @wisdomtrove
125:The most disgusting cad in the world is the man who on the grounds of decorum and morality avoids the game of love. He is one who puts his own ease and security above the most laudable of philanthropies. ~ h-l-mencken, @wisdomtrove
126:Religious externals may have meaning for the God-inhabited soul; for any others they are not only useless but may actually become snares, deceiving them into a false and perilous sense of security. ~ aiden-wilson-tozer, @wisdomtrove
127:The true principle of government is this - make the system complete in its structure; give a perfect proportion and balance to its parts; and the powers you give it will never affect your security. ~ alexander-hamilton, @wisdomtrove
128:Together, we'll build a far better future for America - a future of growth, opportunity, and security, anchored by the values of a people who are confident, compassionate, and whose heart is good. ~ ronald-reagan, @wisdomtrove
129:What does not come and go - remains. It is the ever greedy mind that creates ideas of progress and evolution towards perfection. It disturbs and talks of order, destroys and seeks security. ~ sri-nisargadatta-maharaj, @wisdomtrove
130:Here then is the origin and rise of government; namely, a mode rendered necessary by the inability of moral virtue to govern the world; here too is the design and end of government, viz. Freedom and security. ~ thomas-paine, @wisdomtrove
131:Having established as our goals a lasting world peace with justice and the security of freedom on this earth, we must be prepared to make whatever sacrifices are demanded as we pursue this path to its end. ~ dwight-eisenhower, @wisdomtrove
132:So long as we use comfort and security as our criteria of success, we will fear our own intuitive guidance because by its very nature it directs us into new cycles of learning that are sometimes uncomfortable. ~ caroline-myss, @wisdomtrove
133:It is increasingly clear that no matter what party is in power, so long as our national security needs keep rising, an economy hampered by restrictive tax rates will never produce enough jobs or enough profits. ~ john-f-kennedy, @wisdomtrove
134:Such is the uncertainty of human affairs, that security and despair are equal follies; and as it is presumption and arrogance to anticipate triumphs, it is weakness and cowardice to prog-nosticate miscarriages. ~ samuel-johnson, @wisdomtrove
135:In a free government, the security for civil rights must be the same as that for religious rights. It consists in the one case in the multiplicity of interests, and in the other in the multiplicity of sects. ~ alexander-hamilton, @wisdomtrove
136:I believe with all my heart that our first priority must be world peace, and that use of force is always and only a last resort, when everything else has failed, and then only with regard to our national security. ~ ronald-reagan, @wisdomtrove
137:I consider the war of America against Britain as the country's war, the public's war, or the war of the people in their own behalf, for the security of their natural rights, and the protection of their own property. ~ thomas-paine, @wisdomtrove
138:It is in the relaxation of security; it is in the expansion of prosperity; it is in the hour of dilatation of the heart, and of its softening into festivity and pleasure, that the real character of men is discerned. ~ edmund-burke, @wisdomtrove
139:So long as we use comfort and security as our criteria of success, we will fear our own intuitive guidance because by its very nature it directs us into new cycles of learning that are sometimes uncomfortable. ~ norman-vincent-peale, @wisdomtrove
140:When in a state of security, he does not forget the possibility of ruin. When all is orderly, he does not forget that disorder may come. Thus his person is not endangered, and his States and all their clans are preserved. ~ confucius, @wisdomtrove
141:When there is total surrender, complete relinquishment of all concern with one's past, presents and future, with one's physical and spiritual security and standing, a new life dawns, full of love and beauty ~ sri-nisargadatta-maharaj, @wisdomtrove
142:Military power serves the cause of security by making prohibitive the cost of any aggressive attack. It serves the cause of peace by holding up a shield behind which the patient constructive work of peace can go on. ~ dwight-eisenhower, @wisdomtrove
143:It may safely be received as an axiom in our political system, that the state governments will in all possible contingencies afford complete security against invasions of the public liberty by the national authority. ~ alexander-hamilton, @wisdomtrove
144:My life nah important to me, but other people life important. My life is only important if me can help plenty people. If my life is just for me and my own security then me no want it. My life is for people. That's way me is. ~ bob-marley, @wisdomtrove
145:Only an alert and knowledgeable citizenry can complel the proper meshing of the huge industrial and military machinery of defense with our peaceful methods and goals, so that security and liberty may prosper together. ~ dwight-eisenhower, @wisdomtrove
146:The label YA actually means nothing except that the protagonists, or some of them, are young. Publishers like it because it is a secure marketing niche. But the cost of security is exclusion from literary consideration. ~ ursula-k-le-guin, @wisdomtrove
147:… there is a different kind of security that is worth pursuing, and this is the internal security of trusting yourself to handle anything that may come down the pike. This is the only lasting security, the only real security. ~ wayne-dyer, @wisdomtrove
148:Nothing pleases people more than to go on thinking what they have always thought, and at the same time imagine that they are thinking something new and daring: it combines the advantage of security and the delight of adventure. ~ t-s-eliot, @wisdomtrove
149:The most intense conflicts, if overcome, leave behind a sense of security and calm that is not easily disturbed. It is just these intense conflicts and their conflagration which are needed to produce valuable and lasting results. ~ carl-jung, @wisdomtrove
150:Life is certainly only worthwhile as it represents struggle for worthy causes. There is no struggle in perfect security. I am quite certain that the human being could not continue to exist if he or she had perfect security. ~ dwight-eisenhower, @wisdomtrove
151:Reading the morning newspaper is the realist's morning . One orients one's attitude toward the either by or by what the world is. The former gives as much security as the latter, in that one knows how one stands. ~ georg-wilhelm-friedrich-hegel, @wisdomtrove
152:Wherefore, security being the true design and end of government, it unanswerably follows that whatever form thereof appears most likely to ensure it to us, with the least expense and greatest benefit, is preferable to all others. ~ thomas-paine, @wisdomtrove
153:Arms alone can give the world no permanent peace, no confident security. Arms are solely for defense - to protect from violent assault what we already have. They are only a costly insurance. They cannot add to human progress. ~ dwight-eisenhower, @wisdomtrove
154:The Earth should not be cut up into hundreds of different sections, each inhabited by a self-defined segment of humanity that considers its own welfare and its own "national security" to be paramount above all other consideration. ~ isaac-asimov, @wisdomtrove
155:What we really want is &
156:When a man has a gift in speaking the truth, brute aggression is no longer his security blanket for approval. He, on the contrary, spends most of his energy trying to tone it down because his very nature is already offensive enough. ~ criss-jami, @wisdomtrove
157:Security is mostly a superstition. It does not exist in nature, nor do the children of men as a whole experience it. Avoiding danger is no safer in the long run than outright exposure. Life is either a daring adventure, or nothing. ~ hellen-keller, @wisdomtrove
158:Security isn't what the wise person looks for; it's opportunity. And once we begin looking for that, we find it on every side. You can measure opportunity with the same yardstick that measures the risk involved. They go together. ~ earl-nightingale, @wisdomtrove
159:I have named the destroyers of nations: comfort, plenty, and security - out of which grow a bored and slothful cynicism, in which rebellion against the world as it is, and myself as I am, are submerged in listless self-satisfaction. ~ john-steinbeck, @wisdomtrove
160:My fellow Americans, I must speak to you tonight about a mounting danger in Central America that threatens the security of the United States. This danger will not go away it will grow worse, much worse, if we fail to take action now. ~ ronald-reagan, @wisdomtrove
161:We do not deny any nation's legitimate interest in security. But protecting the security of one nation by robbing another of its national independence and national traditions is not legitimate. In the long run, it is not even secure. ~ ronald-reagan, @wisdomtrove
162:No government can guarantee security. It can only tax production, distribution and service and gradually crush the power to pay taxes. That settles nothing. It only uses up the gains of the past and postpones the developments of the future. ~ henry-ford, @wisdomtrove
163:Respectability and security are subtle traps on life's journey. Those who are drawn to extremes are often nearer to renewal and self-discovery. Those trapped in the bland middle region of respectability are lost without ever realizing it. ~ john-odonohue, @wisdomtrove
164:While it may be theoretically possible to demonstrate the risks inherent in any treaty... the far greater risk to our security are the risks of unrestricted testing, the risks of a nuclear arms race, the risks of new nuclear powers... . ~ john-f-kennedy, @wisdomtrove
165:In our production-oriented society, being busy, having an occupation, has become one of the main ways, if not the main way, of identifying ourselves. Without an occupation, not just our economic security but our very identity is endangered. ~ henri-nouwen, @wisdomtrove
166:Look at airport security now. What started out as definite racial profiling is now where the computer picks a name. That's why you get a seven-month-old getting a pat down. [Imitates a security officer.] "Check the diapers. They're full." ~ robin-williams, @wisdomtrove
167:The biggest mistake that you can make is to believe that you are working for somebody else. Job security is gone. The driving force of a career must come from the individual. Remember: Jobs are owned by the company, you own your career! ~ earl-nightingale, @wisdomtrove
168:It must happen to us all‚ ¶We pack up what we've learned so far and leave the familiar behind. No fun, that shearing separation, but somewhere within, we must dimly know that saying goodbye to safety brings the only security we’ll ever know. ~ richard-bach, @wisdomtrove
169:Refugee today means somebody who has no home. No homeland. No security. No government to protect him or her. And it is of course one feels not only uprooted, one feels useless. One feels always surrounded by hostile forces. Arousing suspicion. ~ elie-wiesel, @wisdomtrove
170:If we depend for our happiness on another, on society or on environment, they become essential to us; we cling to them, and any alteration of these we violently oppose because we depend upon them for our psychological security and comfort. ~ jiddu-krishnamurti, @wisdomtrove
171:In learning and argumentation, the quality brain is similar to a facility of maximum security. What passes the logic test, free of fallacy and pretense, then must pass the test of biblical accuracy in order to proceed as an adopted, reliable truth. ~ criss-jami, @wisdomtrove
172:Even if you think the tentacles of security have already wrapped themselves around you and you can't move because of your obligations, it's never too late-there are always unlimited ways to follow your dreams, and it is much easier than you think. ~ rhonda-byrne, @wisdomtrove
173:He who is surety is never sure himself. Take advice, and never be security for more than you are quite willing to lose. Remember the word of the wise man: He that is surety for a stranger shall smart for it; and he that hateth suretyship is sure. ~ charles-spurgeon, @wisdomtrove
174:Since the foundation of the State of Israel, the United States has stood by her and helped her to pursue security, peace, and economic growth. Our friendship is based on historic moral and strategic ties, as well as our shared dedication to democracy. ~ ronald-reagan, @wisdomtrove
175:Sleep is still most perfect, in spite of hygienists, when it is shared with a beloved. The warmth, the security and peace of soul, the utter comfort from the touch of the other, knits the sleep, so that it takes the body and soul completely in its healing. ~ d-h-lawrence, @wisdomtrove
176:Events of October 1962 indicated, as they had all through history, that control of the sea means security. Control of the seas can mean peace. Control of the seas can mean victory. The United States must control the seas if it is to protect your security... . ~ john-f-kennedy, @wisdomtrove
177:We come into relationships often very much identified with our needs. I need this, I need security, I need refuge, I need friendship. And all of relationships are symbiotic in that sense. We come together because we fulfill each others' needs at some level or other. ~ ram-das, @wisdomtrove
178:The family should be a closely knit group. The home should be a self-contained shelter of security; a kind of school where life's basic lessons are taught; and a kind of church where God is honored; a place where wholesome recreation and simple pleasures are enjoyed. ~ billy-graham, @wisdomtrove
179:God doesn't promise security from life's storms but security in life's storms. God doesn't always call the equipped, but he will always equip the called. In the long run, avoiding danger is no safer than outright exposure. The fearful are caught as often as the bold. ~ hellen-keller, @wisdomtrove
180:It takes a lot of courage to release the familiar and seemingly secure, to embrace the new. But there is no real security in what is no longer meaningful. There is more security in the adventurous and exciting, for in movement there is life, and in change there is power. ~ alan-cohen, @wisdomtrove
181:If all that Americans want is security, they can go to prison. They'll have enough to eat, a bed and a roof over their heads. But if an American wants to preserve his dignity and his equality as a human being, he must not bow his neck to any dictatorial government. ~ dwight-eisenhower, @wisdomtrove
182:With my mother's death all settled happiness, all that was tranquil and reliable, disappeared from my life. There was to be much fun, many pleasures, many stabs of Joy; but no more of the old security. It was sea and islands now; the great continent had sunk like Atlantis. ~ c-s-lewis, @wisdomtrove
183:Take a moment to reflect upon the existence of the musical The Book of Mormon. Now imagine the security precautions that would be required to stage a similar production about Islam. The project is unimaginable—not only in Beirut, Baghdad, or Jerusalem, but in New York City. ~ sam-harris, @wisdomtrove
184:I have faith that God will care for me, and God does provide my needs. I don't in any way feel insecure because I don't know where I will sleep at night, where or when I will eat next. When you have spiritual security, you have no more feeling of need for material security. ~ peace-pilgrim, @wisdomtrove
185:I have long been convinced that the idea of liberty is abhorrent to most human beings. What they want is security, not freedom. Thus it seldom causes any public indignation when an enterprising tyrant claps down on one of his enemies. To most men it seems a natural proceeding. ~ h-l-mencken, @wisdomtrove
186:Should I become President... I will not risk American lives... by permitting any other nation to drag us into the wrong war at the wrong place at the wrong time through an unwise commitment that is unwise militarily, unnecessary to our security and unsupported by our allies. ~ john-f-kennedy, @wisdomtrove
187:What if free people could live secure in the knowledge that their security did not rest upon the threat of instant U.S. retaliation to deter a Soviet attack, that we could intercept and destroy strategic ballistic missiles before they reached our own soil or that of our allies? ~ ronald-reagan, @wisdomtrove
188:I make no effort to predict the course of general business or the stock market. Period. However, currently there are practices snowballing in the security markets and business world which, while devoid of short term predictive value, bother me as to possible long term consequences. ~ warren-buffet, @wisdomtrove
189:All of us have been trained by education and environment to seek personal gain and security and to fight for ourselves. Though we cover it over with pleasant phrases, we have been educated for various professions within a system which is based on exploitation and acquisitive fear. ~ jiddu-krishnamurti, @wisdomtrove
190:Financial security is a constant in my life. I allow my income to constantly expand, no matter what the newspapers and economists say. I move beyond my present income, and I go beyond the economic forecasts. I do not listen to people out there telling me how far I can go or what I can do. ~ louise-hay, @wisdomtrove
191:I admire the good samaritan, but I don't want to be one.I don't want to spend my life picking up people by the side of the road after they have been beaten up and robbed.I want to change the Jericho road, so that everybody has an opportunity for a job, education, security, health. ~ martin-luther-king, @wisdomtrove
192:For power can guarantee the interests of some men but it can never foster the good of man. Power always protects the good of some at the expense of all the others. Only love can attain and preserve the good of all. Any claim to build the security of all on force is a manifest imposture. ~ thomas-merton, @wisdomtrove
193:For power can guarantee the interests of some men but it can never foster the good of man. Power always protects the good of some at the expense of all the others.  Only love can attain and preserve the good of all.  Any claim to build the security of all on force is a manifest imposture. ~ thomas-merton, @wisdomtrove
194:Your adventure has to be coming out of your own interior. If you are ready for it then doors will open where there were no doors before, and where there would not be doors for anyone else. And you must have courage. It's the call to adventure, which means there is no security, no rules. ~ joseph-campbell, @wisdomtrove
195:Who does not observe the immediate glow and security that is diffused over the life of woman, before restless or fretful, by engaging in gardening, building, or the lowest department of art? Here is something that is not routine&
196:To put is still more plainly: the desire for security and the feeling of insecurity are the same thing. To hold your breath is to lose your breath. A society based on the quest for security is nothing but a breath-retention contest in which everyone is as taut as a drum and as purple as a beet. ~ alan-watts, @wisdomtrove
197:The search for certainty and security is an attachment to the known. The known is the past. There is no evolution in that. Uncertainty on the other hand is the fertile ground of pure creativity and freedom. I relinquish my attachment to the known and step into the field of all possibilities.   ~ deepak-chopra, @wisdomtrove
198:The superior man, when resting in safety, does not forget that danger may come. When in a state of security he does not forget the possibility of ruin. When all is orderly, he does not forget that disorder may come. Thus his person is not endangered, and his States and all their clans are preserved. ~ confucius, @wisdomtrove
199:There is little value in insuring the survival of our nation if our traditions do not survive with it. And there is very grave danger that an announced need for increased security will be seized upon by those anxious to expand its meaning to the very limits of official censorship and concealment. ~ john-f-kennedy, @wisdomtrove
200:But if we admit God, must we admit Miracle? Indeed, indeed, you have no security against it. That is the bargain. Theology says to you in effect, &
201:Dogmas&
202:Ineffective people live day after day with unused potential. They experience synergy only in small, peripheral ways in their lives. But creative experiences can be produced regularly, consistently, almost daily in people's lives. It requires enormous personal security and openness and a spirit of adventure. ~ stephen-r-covey, @wisdomtrove
203:We are all of us not merely liable to fear, we are also prone to be afraid of being afraid, and the conquering of fear produces exhilaration.…The contrast between the previous apprehension and the present relief and feeling of security promotes a self-confidence that is the very father and mother of courage. ~ malcolm-gladwell, @wisdomtrove
204:Liberty is of small value to the lower third of humanity. They greatly prefer security, which means protection by some class above them. They are always in favor of despots who promise to feed them. The only liberty an inferior man really cherishes is the liberty to quit work, stretch out in the sun, and scratch himself. ~ h-l-mencken, @wisdomtrove
205:If you surrender everything to the government and give it total power to plan the whole economy, this will not guarantee your economic security, but it will guarantee the descent of the entire nation to a level of miserable poverty&
206:The more we try to live in the world of words, the more we feel isolated and alone, the more all the joy and liveliness of things is exchanged for mere certainty and security. On the other hand, the more we are forced to admit that we actually live in the real world, the more we feel ignorant, uncertain, and insecure about everything. ~ alan-watts, @wisdomtrove
207:Many people confuse authority and the power of efficiency, as if the first role of people with responsibility is to take decisions, command effectively and so exercise power. But their role first of all is to be a person to whom others can turn for help and advice, to provide security, to affirm, to support, to encourage and to guide. ~ jean-vanier, @wisdomtrove
208:Out yonder they may curse, revile, and torture one another, defile all the human instincts, make a shambles of creation (if it were in their power), but here, no, here, it is unthinkable, here there is abiding peace, the peace of God, and the serene security created by a handful of good neighbors living at one with the creature world. ~ henry-miller, @wisdomtrove
209:Civil rights are those which appertain to man in right of his being a member of society. Every civil right has for its foundation some natural right pre-existing in the individual, but to the enjoyment of which his individual power is not, in all cases, sufficiently competent. Of this kind are all those which relate to security and protection. ~ thomas-paine, @wisdomtrove
210:There is simply too much unnecessary suffering in our world. And we should see that as a national security risk, by the way. Given enough time, desperate people will tend to do desperate things. At a certain point you won't be able to build enough prisons or enough bombs to eradicate the effects of all that violence inside so many hearts. ~ marianne-williamson, @wisdomtrove
211:This Government, the offspring of your own choice, uninfluenced and unawed, adopted upon full investigation and mature deliberation, completely free in its principles, in the distribution of its powers, uniting security with energy, and containing within itself a provision for its own amendment, has a just claim to your confidence and your support. ~ george-washington, @wisdomtrove
212:Remember that every government service, every offer of government - financed security, is paid for in the loss of personal freedom... In the days to come, whenever a voice is raised telling you to let the government do it, analyze very carefully to see whether the suggested service is worth the personal freedom which you must forgo in return for such service. ~ ronald-reagan, @wisdomtrove
213:The same technology transforming our lives can solve the greatest problem of the 20th century. A security shield can one day render nuclear weapons obsolete and free mankind from the prison of nuclear terror. America met one historic challenge and went to the Moon. Now America must meet another: to make our strategic defense real for all the citizens of planet Earth. ~ ronald-reagan, @wisdomtrove
214:If the minority, and a small one too, is suffered to dictate to the majority, after measures have undergone the most solemn discussions by the representatives of the people, and their will through this medium is enacted into a law, there can be no security for life, liberty, or property; nor, if the laws are not to govern, can any man know how to conduct himself in safety. ~ george-washington, @wisdomtrove
215:Let the Negro march. Let him make pilgrimages to city hall. Let him go on freedom rides. And above all, make an effort to understand why he must do this. For if his frustration and despair are allowed to continue piling up, millions of Negroes will seek solace and security in black-nationalist ideologies. And this, inevitably, would lead to a frightening racial nightmare. ~ martin-luther-king, @wisdomtrove
216:Intuitive guidance means having the self-esteem to recognize that the discomfort or confusion that a person feels is actually directing him to take charge of his life and make choices that will break him out of stagnation or misery. And, while we measure our own success in terms of our personal comfort and security, the universe measures our success by how much we have learned. ~ caroline-myss, @wisdomtrove
217:The man who is not frightened of life is not frightened of being completely insecure for he understands that inwardly, psychologically, there is no security... ..When there is no security there is an endless movement and then life and death are the same... .The man who lives without conflict, who lives with beauty and love, is not frightened of death because to love is to die. ~ jiddu-krishnamurti, @wisdomtrove
218:Intuitive guidance means having the self-esteem to recognize that the discomfort or confusion that a person feels is actually directing him to take charge of his life and make choices that will break him out of stagnation or misery. And, while we measure our own success in terms of our personal comfort and security, the universe measures our success by how much we have learned. ~ norman-vincent-peale, @wisdomtrove
219:I never did use earphones until into the Eighties or Nineties. I don't like to use earphones. I've never heard anybody sing with earphones effectively. They just give you a false sense of security. A lot of us don't need earphones. I don't think Springsteen or Mick do. But other people more or less have given in. But they ought not to. They don't need to. Especially if they have a good band. ~ bob-dylan, @wisdomtrove
220:No treaty, however much it may be to the advantage of all, however tightly it may be worded, can provide absolute security against the risks of deception and evasion. But it can, if it is sufficiently effective in its enforcement and if it is sufficiently in the interests of its signers, offer far more security and far fewer risks than an unabated, uncontrolled, unpredictable arms race. ~ john-f-kennedy, @wisdomtrove
221:Do you desire security? Here you have it. The Lord says to you, "I will never abandon you, I will always be with you." If a good man made you such a promise, you would trust him. God makes it, and do you doubt? Do you seek a support more sure than the word of God, which is infallible? Surely, He has made the promise, He has written it, He has pledged His word for it, it is most certain. ~ saint-augustine, @wisdomtrove
222:Today I will factor in uncertainty as an essential ingredient of my experience. In my willingness to accept uncertainty, solutions will spontaneously emerge out of the problem, out of the confusion, disorder, and chaos. The more uncertain things seem to be, the more secure I will feel, because uncertainty is my path to freedom. Through the wisdom of uncertainty, I will find my security.   ~ deepak-chopra, @wisdomtrove
223:Fear begins and ends with the desire to be secure; inward and outward security, with the desire to be certain, to have permanency. The continuity of permanence is sought in every direction, in virtue, in relationship, in action, in experience, in knowledge, in outward and inward things. To find security and be secure is the everlasting cry. It is this insistent demand that breeds fear. ~ jiddu-krishnamurti, @wisdomtrove
224:MAN is a social animal, gregarious by nature, and finds his greatest sense of security and satisfaction in the company of others who share his interests and attitudes. Of all the many groups into which humans have collected themselves, of all the many tribes, clans, organizations, and societies throughout history, none has been so powerful, so far-reaching, or more universal than the church. ~ billy-graham, @wisdomtrove
225:Our true choice is not between tax reduction on the one hand and the avoidance of large federal deficits on the other. It is increasingly clear that no matter what party is in power, so long as our national security needs keep rising, an economy hampered by restrictive tax rates will never produce enough revenues to balance our budget, just as it will never produce enough jobs or enough profits. ~ john-f-kennedy, @wisdomtrove
226:A host of positive psychological changes inevitably will result from widespread economic security. The dignity of the individual will flourish when the decisions concerning his life are in his own hands, when he has the means to seek self-improvement. Personal conflicts among husbands, wives and children will diminish when the unjust measurement of human worth on the scale of dollars is eliminated. ~ martin-luther-king, @wisdomtrove
227:What we seek to advance, what we seek to develop in all of our colleges and universities, are educated men and women who can bear the burdens of responsible citizenship, who can make judgments about life as it is, and as it must be, and encourage the people to make those decisions which can bring not only prosperity and security, but happiness to the people of the United Sates and those who depend upon it. ~ john-f-kennedy, @wisdomtrove
228:Those who have not found their true wealth, which is the radiant joy of Being and the deep, unshakable peace that comes with it, are beggars, even if they have great material wealth. They are looking outside for scraps of pleasure or fulfillment, for validation, security, or love, while they have a treasure within that not only includes all those things but is infinitely greater than anything the world can offer. ~ eckhart-tolle, @wisdomtrove
229:It is obvious that the performance of a stock last year or last month is no reason, per se, to either own it or to not own it now. It is obvious that an inability to "get even" in a security that has declined is of no importance. It is obvious that the inner warm glow that results from having held a winner last year is of no importance in making a decision as to whether it belongs in an optimum portfolio this year. ~ warren-buffet, @wisdomtrove
230:To the security of a free Constitution it [knowledge] contributes in various ways: by teaching the people themselves to know and to value their own rights, to discern and provide against invasions of them, to distinguish between oppression and the necessary exercise of lawful authority, between burdens proceeding from a disregard to their convenience and those resulting from the inevitable exigencies of society. ~ george-washington, @wisdomtrove
231:You and I are told we must choose between a left or right, but I suggest there is no such thing as a left or right. There is only an up or down. Up to man's age-old dream - the maximum of individual freedom consistent with order -or down to the ant heap of totalitarianism. Regardless of their sincerity, their humanitarian motives, those who would sacrifice freedom for security have embarked on this downward path. ~ ronald-reagan, @wisdomtrove
232:The writer's only responsibility is to his art. He will be completely ruthless if he is a good one. He has a dream. It anguishes him so much he must get rid of it. He has no peace until then. Everything goes by the board: honor, pride, decency, security, happiness, all, to get the book written. If a writer has to rob his mother, he will not hesitate; the &
233:For if leisure and security were enjoyed by all alike, the great mass of human beings who are normally stupefied by poverty would become literate and would learn to think for themselves; and when once they had done this, they would sooner or later realise that the privileged minority had no function, and they would sweep it away. In the long run, a hierarchical society was only possible on a basis of poverty and ignorance. ~ george-orwell, @wisdomtrove
234:Should any political party attempt to abolish social security unemployment insurance and eliminate labor laws and farm programs you would not hear of that party again in our political history. There is a tiny splinter group of course that believes you can do these things. Among them are a few other Texas oil millionaires and an occasional politician or business man from other areas. Their number is negligible and they are stupid. ~ dwight-eisenhower, @wisdomtrove
235:The art of war is at once comprehensive and complicated; ... it demands much previous study; and ... the possession of it, in its most improved and perfect state, is always a great moment to the security of a nation. This, therefore, ought to be a serious care of every government; and for this purpose, an academy, where a regular course of instruction is given, is an obvious expedient, which different nations have successfully employed. ~ george-washington, @wisdomtrove
236:Your corn is ripe today, mine will be so tomorrow. &
237:The safe and general antidote against sorrow is employment. It is commonly observed, that among soldiers and seamen, though there is much kindness, there is little grief; they see their friend fall without any of that lamentation which is indulged in security and idleness, because they have no leisure to spare from the care of themselves; and whoever shall keep his thoughts equally busy will find himself equally unaffected with irretrievable losses. ~ samuel-johnson, @wisdomtrove
238:For nearly a century, the moral relativism of science has given faith-based religion&
239:Many persons think that by hoarding money they are gaining safety for themselves. If money is your only hope for independence, you will never have it. The only real security that a man can have in this world is a reserve of knowledge, experience, and ability. Without these qualities, money is practically useless. The security even of money depends on knowledge, experience, and ability. If productive ideas are displaced by destructive ideas, economic life suffers. ~ henry-ford, @wisdomtrove
240:If this nation is to be wise as well as strong, if we are to achieve our destiny, then we need more new ideas for more wise men reading more good books in more public libraries. These libraries should be open to all except the censor. We must know all the facts and hear all the alternatives and listen to all the criticisms. Let us welcome controversial books and controversial authors. For the Bill of Rights is the guardian of our security as well as our liberty. ~ john-f-kennedy, @wisdomtrove
241:If this nation is to be wise as well as strong, if we are to achieve our destiny, then we need more new ideas for more wise men reading more good books in more public libraries. These libraries should be open to all—except the censor. We must know all the facts and hear all the alternatives and listen to all the criticisms. Let us welcome controversial books and controversial authors. For the Bill of Rights is the guardian of our security as well as our liberty. ~ john-f-kennedy, @wisdomtrove
242:I am convinced that the deepest desire within each of us is to be liberated from the controlling influences of our own psychic madness or patterns of fear. All other things—the disdain of ordinary life, the need to control others rather than be controlled, the craving for material goods as a means of security and protection against the winds of chaos—are external props that serve as substitutes for the real battle, which is the one waged within the individual soul. ~ caroline-myss, @wisdomtrove
243:The Kennedy Administration's public pronouncements on the matter suggested that the presence of Soviet nuclear missiles in Castro's Cuba would represent an unacceptable strategic threat to the United States. . . . This urgent transformation of Cuba into an important strategic base - by the presence of these large, long-range, and clearly offensive weapons of sudden mass-destruction - constitutes an explicit threat to the peace and security of all the Americas. . . . ~ john-f-kennedy, @wisdomtrove
244:I am convinced that the deepest desire within each of us is to be liberated from the controlling influences of our own psychic madness or patterns of fear. All other things—the disdain of ordinary life, the need to control others rather than be controlled, the craving for material goods as a means of security and protection against the winds of chaos—are external props that serve as substitutes for the real battle, which is the one waged within the individual soul. ~ norman-vincent-peale, @wisdomtrove
245:I do ask every publisher, every editor, and every newsman in the nation to reexamine his own standards, and to recognize the nature of our country's peril. In time of war, the government and the press have customarily joined in an effort based largely on self-discipline, to prevent unauthorized disclosures to the enemy. In time of "clear and present danger," the courts have held that even the privileged rights of the First Amendment must yield to the public's need for national security. ~ john-f-kennedy, @wisdomtrove
246:By calling attention to &
247:We ought not to look back, unless it is to derive useful lessons from past errors, and for the purpose of profiting by dear bought experience. To enveigh against things that are past and irremediable, is unpleasing; but to steer clear of the shelves and rocks we have struck upon, is the part of wisdom, equally as incumbent on political as other men, who have their own little bark, or that of others, to navigate through the intricate paths of life, or the trackless ocean, to the haven of security and rest. ~ george-washington, @wisdomtrove
248:Human beings have a drive for security and safety, which is often what fuels the spiritual search. This very drive for security and safety is what causes so much misery and confusion. Freedom is a state of complete and absolute insecurity and not knowing. So, in seeking security and safety, you actually distance yourself from the freedom you want. There is no security in freedom, at least not in the sense that we normally think of security. This is, of course, why it is so free: there's nothing there to grab hold of. ~ adyashanti, @wisdomtrove
249:You say you love your wife. You depend on her; she has given you her body, her emotions, her encouragement, a certain feeling of security and well-being. Then she turns away from you; she gets bored or goes off with someone else, and your whole emotional balance is destroyed, and this disturbance, which you don't like, is called jealousy. There is pain in it, anxiety, hate and violence. So what you are really saying is, &
250:Let it simply be asked where is the security for property, for reputation, for life, if the sense of religious obligation deserts the oaths, which are the instruments of investigation in the Courts of Justice? And let us with caution indulge the opposition, that morality can be maintained without religion. Whatever may be conceded to the influence of refined education on minds of peculiar structure, reason and experience both forbid us to expect that National morality can prevail in exclusion of religious principle. ~ george-washington, @wisdomtrove
251:In essence, terrorism is a show. Terrorists stage a terrifying spectacle of violence that captures our imagination and makes us feel as if we are sliding back into medieval chaos. Consequently states often feel obliged to react to the theatre of terrorism with a show of security, orchestrating immense displays of force, such as the persecution of entire populations or the invasion of foreign countries. In most cases, this overreaction to terrorism poses a far greater threat to our security than the terrorists themselves. ~ yuval-noah-harari, @wisdomtrove
252:Many people say, "When I get a million dollars, then I'll be happy because I'll have security," but that's not necessarily so. Most people who acquire a million dollars want another and then another. Or they could be like a good friend of mine who made and lost every dime of a million dollars. It didn't bother him a bit. He wasn't excited about it, but he explained to me, "Zig, I still know everything necessary to make another million dollars, and I've learned what to do not to lost it. I'll simply go back to work and earn it again. ~ zig-ziglar, @wisdomtrove
253:The unawakened mind tends to make war against the way things are. To follow a path with heart, we must understand the whole process of making war within ourselves and without, how it begins and how it ends. War’s roots are in ignorance. Without understanding we can easily become frightened by life’s fleeting changes, the inevitable losses, disappointments, the insecurity of our aging and death. Misunderstanding leads us to fight against life, running from pain or grasping at security and pleasures that by their nature can never be satisfying. ~ jack-kornfield, @wisdomtrove
254:Even if it be true that all these shapes, and forms, and appearances, and phenomena, and personalities, be but illusion as compared to the inner Reality— what of it? Are you not then assured that the Spirit within Yourself is the Spirit of the Absolute— that the Reality within You is the Reality of the Absolute— that you ARE, because the Absolute IS, and cannot be otherwise? Does not the Peace, and Calm, and Security, and Bliss that comes to you with this Realization, far more than counterbalance the petty nothings that you have discarded? ~ william-walker-atkinson, @wisdomtrove
255:One observer commenting on security analysts over forty stated: "They know too many things that are no longer true." As long as I am "on stage", publishing a regular record and assuming responsibility for management of what amounts to virtually 100% of the net worth of many partners, I will never be able to put sustained effort into any non-BPL activity. If I am going to participate publicly. I can't help being competitive. I know I don't want to be totally occupied with out-pacing an investment rabbit all my life. The only way to slow down is to stop. ~ warren-buffet, @wisdomtrove
256:It is with great satisfaction that I have signed into law the Social Security Amendments of 1961. They represent an additional step toward eliminating many of the hardships resulting from old age, disability, or the death of the family wage-earner. A nation's strength lies in the well-being of its people. The Social Security program plays an important part in providing for families, children, and older persons in time of stress, but it cannot remain static. Changes in our population, in our working habits, and in our standard of living require constant revision. ~ john-f-kennedy, @wisdomtrove
257:I welcome this chance to further strengthen the unbreakable ties between the United States and Israel and to assure you of our commitment to Israel's security and well-being. Israel and America may be thousands of miles apart, but we are philosophical neighbors sharing a strong commitment to democracy and the rule of law. What we hold in common are the bonds of trust and friendship, qualities that in our eyes make Israel a great nation. No people have fought longer, struggled harder, or sacrificed more than yours in order to survive, to grow, and to live in freedom ~ ronald-reagan, @wisdomtrove
258:It is with great satisfaction that I have signed into law the Social Security Amendments of 1961. They represent an additional step toward eliminating many of the hardships resulting from old-age, disability, or the death of the family wage earner. . . . A Nation's strength lies in the well being of its people. The social security program plays an important part in providing for families, children, and older persons in time of stress, but it cannot remain static. Changes in our population, in our working habits, and in our standard of living require constant revision. ~ john-f-kennedy, @wisdomtrove
259:Now he realized the truth: that sacrifice was no purchase of freedom. It was like a great elective office, it was like an inheritance of power - to certain people at certain times an essential luxury, carrying with it not a guarantee but a responsibility, not a security but an infinite risk. Its very momentum might drag him down to ruin - the passing of the emotional wave that made it possible might leave the one who made it high and dry forever on an island of despair... Sacrifice by its very nature was arrogant and impersonal; sacrifice should be eternally supercilious. ~ f-scott-fitzgerald, @wisdomtrove
260:Because the egoic mind has led us to feel separate from our immortal Ground of Being over the millennia, we have invented a number of immortality symbols to give us a precarious sense of security and identity in life. Traditionally, these have been religious in character, such as the belief in everlasting life after death, in the West, and the belief in reincarnation, in the East. However, today, it is money that provides the primary immortality symbol. It is our obsession for money that is driving humanity to extinction. For when we do not face our fears with full consciousness and intelligence, these fears will eventually come along to haunt us. ~ ken-wilber, @wisdomtrove
261:As the twenty-first century unfolds, it is becoming more and more evident that the major problems of our time – energy, the environment, climate change, food security, financial security – cannot be understood in isolation. They are systemic problems, which means that they are all interconnected and interdependent. Ultimately, these problems must be seen as just different facets of one single crisis, which is largely a crisis of perception. It derives from the fact that most people in our modern society, and especially our large social institutions, subscribe to the concepts of an outdated worldview, a perception of reality inadequate for dealing with our overpopulated, globally interconnected world. ~ fritjof-capra, @wisdomtrove

*** NEWFULLDB 2.4M ***

1:security guard says. ~ Jillian Dodd,
2:Security searches ~ Victoria Aveyard,
3:We have the worst security! ~ CM Punk,
4:you can’t buy security ~ Frank Herbert,
5:basement security suite, ~ Kate Messner,
6:Security breeds stagnation. ~ Andy Warhol,
7:The Foundation for Security ~ Joyce Meyer,
8:Music is like my security blanket. ~ Yoko Ono,
9:Security will produce danger. ~ Samuel Johnson,
10:Security is the denial of life ~ Germaine Greer,
11:Security, we have a jumper! Security? ~ CM Punk,
12:Canine homeland security at work. ~ Laura Childs,
13:Home meant comfort and security. ~ Leighann Dobbs,
14:It's a good thing a DUI's job security. ~ CM Punk,
15:Liberty comes only after security. ~ Viktor Orban,
16:Peace is the opposite of security. ~ Eric Metaxas,
17:Place is security, space is freedom. ~ Yi Fu Tuan,
18:Security is a kind of death. ~ Tennessee Williams,
19:The price of security is insecurity. ~ Dan Harris,
20:Revolutionaries don't get job security. ~ Ruby Dee,
21:Security sets a premium on feebleness. ~ H G Wells,
22:Genre is a minimum security prison. ~ David Shields,
23:It’s funny that DiCarlo’s security ~ David Baldacci,
24:Like all security, privacy is hard. ~ Cory Doctorow,
25:Only the insecure strive for security. ~ Wayne Dyer,
26:To get wealth and security by guile ~ Thiruvalluvar,
27:Don't ask for security, ask for adventure ~ Jim Rohn,
28:the security and transport of the ~ Michael Connelly,
29:And he was a top-security prisoner too. ~ J K Rowling,
30:The precondition to freedom is security. ~ Rand Beers,
31:Character is the best security. ~ Margaret Ayer Barnes,
32:he needed the security of other bodies. ~ William Boyd,
33:Man's security comes from within himself. ~ Manly Hall,
34:have security clearances anymore.” “So ~ David Baldacci,
35:Nobody has any security in loving me. ~ Brigitte Bardot,
36:Never surrender opportunity to security. ~ Branch Rickey,
37:Security is no replacement for liberty. ~ Martin Firrell,
38:Statement of earnings from Social Security ~ Vicki Robin,
39:Liberty is security. Freedom is security. ~ Jesse Ventura,
40:Private security is a license to stalk. ~ Catherine Bybee,
41:reviewed all the school’s security tapes. ~ Melinda Leigh,
42:Sensitive to symptoms could enhance security. ~ Toba Beta,
43:Well, I don't have much job security. ~ William J Clinton,
44:Confidence is its own security. ~ Letitia Elizabeth Landon,
45:Dogs like to obey. It gives them security. ~ James Herriot,
46:I think security is a big issue for people. ~ Cindy McCain,
47:something no good security man would permit. ~ Eoin Colfer,
48:People want security in this insecure world. ~ David Bailey,
49:There is no security. Only opportunity. ~ Douglas MacArthur,
50:Public Enemy is the security of the hip-hop party. ~ Chuck D,
51:Security lies in our ability to produce. ~ Douglas MacArthur,
52:The only security is courage. ~ Francois de La Rochefoucauld,
53:There is no security in life, only opportunity. ~ Mark Twain,
54:They exchanged looks full of mischievous security. ~ Colette,
55:Tradition is a prop for social security. ~ Walter J Phillips,
56:Certainly Social Security needs to be reformed. ~ Kent Conrad,
57:Expelled Nazis got millions in US Social Security ~ Anonymous,
58:Immigration security is national security. ~ Kellyanne Conway,
59:I would say national security is work in progress. ~ Jeb Bush,
60:Security is of the world, insecurity is of the divine. ~ Osho,
61:Security is the chief enemy of mortals. ~ William Shakespeare,
62:We must discover security within ourselves. ~ Boris Pasternak,
63:I have a second dog, too, mainly for security. ~ Carrie Fisher,
64:I never sought to privatize Social Security. ~ Saxby Chambliss,
65:Let's protect our social security and Medicare. ~ Donald Trump,
66:People want opportunity so they can earn security. ~ Jack Kemp,
67:Security should not be a black and white thing. ~ Greg Gutfeld,
68:Security without liberty is called prison. ~ Benjamin Franklin,
69:A house without security cannot be a home! ~ Mehmet Murat ildan,
70:Living based in security is living based in fear. ~ T Harv Eker,
71:Safety and Security Instruments out of San Diego. ~ Vince Flynn,
72:Security has no place in the life of an actress. ~ Claire Bloom,
73:Take away security to leave room for experience. ~ Karin Fossum,
74:The only security of all is in a free press. ~ Thomas Jefferson,
75:Those who trade liberty for security have neither. ~ John Adams,
76:Education must promote peace, security and happiness. ~ Sai Baba,
77:Security, a hypothetical, remaining to be proved. ~ Lauren Groff,
78:There cannot be prosperity without security. ~ Francois Hollande,
79:Security and safety were the reward of dullness. ~ Hanif Kureishi,
80:Social Security is an extremely complicated program. ~ John Thune,
81:There can be no security where there is fear. ~ Felix Frankfurter,
82:Great. There goes our security deposit." ~ Sean ~ Dianne Duvall,
83:I'm looking for men who can give me security. ~ Elisabetta Canalis,
84:My friends, Israel's security is non-negotiable. ~ Hillary Clinton,
85:Security is having a home town. - Charles Schulz ~ David Michaelis,
86:The price of security is insecurity.” Dr. Jay Harris, ~ Dan Harris,
87:Trust is what God resurrects when our security dies. ~ A J Swoboda,
88:In our culture, security has become an obsession. ~ Benjamin Carson,
89:Most people want security in this world, not liberty. ~ H L Mencken,
90:Our biggest national security crisis is Barack Obama. ~ John Bolton,
91:Security isn't having things, it's handling things. ~ Susan Jeffers,
92:The best security for old age: respect your children. ~ Sholem Asch,
93:There is nothing more dangerous than security. ~ Francis Walsingham,
94:A false sense of security is the only kind there is. ~ Michael Meade,
95:Do you want to see God more than you desire security? ~ Francis Chan,
96:Security is not having things, it’s handling things. ~ Susan Jeffers,
97:Stock market risk is ok, but not for Social Security. ~ Barack Obama,
98:The only peace, the only security, is in fulfillment. ~ Henry Miller,
99:Distrust and caution are the parents of security. ~ Benjamin Franklin,
100:If you sacrifice liberty for security, you will lose both. ~ Ron Paul,
101:I never voted to spend one penny of Social Security money. ~ Ron Paul,
102:Legos, the most deadly form of home security. -Truth ~ Lani Lynn Vale,
103:No” creates safety, security, and the feeling of control ~ Chris Voss,
104:There was a security in seeing myself mirrored back. ~ Kristen Arnett,
105:The spread of freedom is the best security for the free. ~ Tony Blair,
106:We all flee in hope of finding some ground of security ~ M T Anderson,
107:Indemnity for the past and security for the future. ~ Bertrand Russell,
108:I would rather be a security guard than a rock star. ~ Bruce McCulloch,
109:Then she stepped through security. She never came back. ~ Gayle Forman,
110:I mean, I've never really had much security, to be honest. ~ Aaron Paul,
111:I was testing dorm security. It sucks. -Rose to Dimitri ~ Richelle Mead,
112:My biggest concern is security and keeping Londoners safe. ~ Sadiq Khan,
113:No one from the beginning of time has had security. ~ Eleanor Roosevelt,
114:Politiets overvåkningstjeneste, or POT, the Security Service, ~ Jo Nesb,
115:Social Security is at last on the nation's front burner. ~ Nick Clooney,
116:Social Security mess is another failed progressive policy. ~ Jim DeMint,
117:The security of the woman is the security of society. ~ Atifete Jahjaga,
118:To be honest, as an actor, job security is not a trait. ~ Taylor Kinney,
119:In wartime, people willing to sacrifice liberty for security. ~ Ron Paul,
120:It's not 2038 that Social Security is bankrupt. It's now. ~ Gary Johnson,
121:I was testing dorm security," I said. "It sucks." - Rose ~ Richelle Mead,
122:Protected by a security gate and an electronic keypad. You ~ Terry Hayes,
123:... security is not having things; it’s handling things. ~ Susan Jeffers,
124:The more security you seek, the less freedom you have. ~ Robert Kiyosaki,
125:The quality of life decreases with heightened security. ~ Rebecca Miller,
126:We need more personnel within our security agencies. ~ Wolfgang Schauble,
127:were technically their security detail. Chen, who was new, ~ John Scalzi,
128:I can't let safety and security become the focus of my life. ~ Judy Blume,
129:'National Security' is the root password to the Constitution. ~ Phil Karn,
130:The greatest security for Israel is to create new Egypts. ~ Ronald Reagan,
131:Those who prefer security to liberty deserve neither. ~ Benjamin Franklin,
132:As you all know, Security Is Mortals chiefest Enemy. ~ William Shakespeare,
133:But no phrase puzzled them more than Social Security deduction. ~ Suki Kim,
134:For me, peace should provide security to the Jewish people. ~ Ariel Sharon,
135:I want to protect and preserve social security and Medicare. ~ Dean Heller,
136:National security is vital for economic and social progress. ~ Paul Kagame,
137:Our owne actions are our security, not others judgements. ~ George Herbert,
138:Social Security faces a long-term actuarial deficit, yes. ~ Peter R Orszag,
139:Social Security is a covenant that should not be broken. ~ Emanuel Cleaver,
140:There is no security in following the call to adventure. ~ Joseph Campbell,
141:There is no such thing as security. There never has been. ~ Germaine Greer,
142:We support the security of both Israel and her neighbors. ~ John F Kennedy,
143:Where security exists, liberty and opportunity do not. ~ Benjamin Franklin,
144:common defense, security of liberty, and general welfare.’”7 ~ Lynne Cheney,
145:Gross negligence in handling national security is a felony. ~ Bill O Reilly,
146:If you give up freedom to get security, you deserve neither. ~ Matthew Dowd,
147:I know where my security comes from, and it’s from you, God. ~ Holley Gerth,
148:Israel is our friend, that we will assist in their security. ~ Barack Obama,
149:Nothing said false sense of security like a bunch of guns. ~ Sheralyn Pratt,
150:The secret to strong security: less reliance on secrets. ~ Whitfield Diffie,
151:We admire the castles, because we admire the security! ~ Mehmet Murat ildan,
152:Companies don't give job security. Only satisfied customers do. ~ Jack Welch,
153:He who sacrifices freedom for security deserves neither. ~ Benjamin Franklin,
154:Israel's flexibility is dependent on its sense of security. ~ Elliott Abrams,
155:Let's put the safety and security of the American people first. ~ Mike Pence,
156:Ports are the gaping hole in America's homeland security. ~ Dianne Feinstein,
157:Shop for security over happiness and we buy it at that price. ~ Richard Bach,
158:The Israeli people must be free to live in peace and security. ~ Chuck Hagel,
159:There is no security, no safety, in the appeasement of evil. ~ Ronald Reagan,
160:The test of liberty is the position and security of minorities. ~ Lord Acton,
161:I always had a hankering for the security of impossible dreams. ~ Azar Nafisi,
162:I just think that we ought to protect the Social Security fund. ~ John McCain,
163:I'm not in favor of privatizing Social Security or making cuts. ~ Mitt Romney,
164:Religion exists to instill false security and blind faith, ~ Kelley Armstrong,
165:Sometimes any emotion is better than the boredom of security. ~ Robert Greene,
166:Those Who Sacrifice Liberty For Security Deserve Neither. ~ Benjamin Franklin,
167:You know what the best security system is? Window shades. ~ Patricia Cornwell,
168:And you all know, security
Is mortals' chiefest enemy ~ William Shakespeare,
169:Climate change constitutes a serious threat to global security. ~ Barack Obama,
170:I will continue to believe that Israel's security is paramount. ~ Barack Obama,
171:No security guard can stop a refrigerator falling off a skyscraper. ~ Jadakiss,
172:Our security must be threatened in order for us to appreciate it. ~ Mary Astor,
173:Security is mostly a superstition. It does not exist in nature. ~ Helen Keller,
174:Security is mostly a superstition. It does not exist in nature… ~ Wayne W Dyer,
175:We are living in a world where everything is based on security. ~ Alain Robert,
176:When you borrow trouble you give your peace of mind as security. ~ Myrtle Reed,
177:Airport security exists to guard us against terrorist attacks. ~ Salman Rushdie,
178:And you all know, security
Is mortals' chiefest enemy. ~ William Shakespeare,
179:Being lost in Australia gives you a lovely feeling of security. ~ Bruce Chatwin,
180:Be someone’s security blanket when theirs is in the wash. ~ Richelle E Goodrich,
181:Extreme poverty anywhere is a threat to human security everywhere. ~ Kofi Annan,
182:I'm very happy in my law practice and my security firm. ~ George Stephanopoulos,
183:In the end, they wanted security more than they wanted freedom. ~ Edward Gibbon,
184:Israel has its own right as a nation to defend its national security. ~ Al Gore,
185:National security is the fig leaf against freedom of information. ~ Ralph Nader,
186:Now we must put our heads together and suck national security. ~ Mohammed Hanif,
187:Security is worthless if you have to sacrifice growth to get it ~ Steve Pavlina,
188:Security-related sensors have also exploded onto the scene. ~ Peter H Diamandis,
189:serious matters demanded the formality of pointless security. ~ James L Cambias,
190:There is no security for those who seek it outside of themselves. ~ Byron Katie,
191:The security fence is reversible. Human lives are irreversible. ~ Silvan Shalom,
192:We all flee in hope of finding some ground of security ~ Matthew Tobin Anderson,
193:Great. There goes our security deposit." ~ Dianne Duvall Sean ~ Dianne Duvall,
194:I feel gigantic affection for all of Homeland Security at airports. ~ Jeff Perry,
195:I have it.” She got into the passenger seat of the security van. ~ Iris Johansen,
196:Should National Security Issues be decided by a Local Referendum? ~ Arun Jaitley,
197:The only way to save Social Security is to raise the retirement age. ~ Rand Paul,
198:Tuesday morning, and with all the new security, I had to leave ~ Nicholas Sparks,
199:If it had a social security number, Ronan had fought with it. ~ Maggie Stiefvater,
200:Knowing what to expect next gives children a sense of security. ~ Hillary Clinton,
201:Security isn't just a feature, it's a base, it's a fundamental, right. ~ Tim Cook,
202:The only real security in life lies in relishing life's insecurity ~ M Scott Peck,
203:"There is no security for those who seek it outside of themselves." ~ Byron Katie,
204:Vigor of government is essential to the security of liberty. ~ Alexander Hamilton,
205:But our great security lies, I think, in our growing strength. ~ Benjamin Franklin,
206:I'm six foot two. If I need security around me, there's a problem. ~ Ryan Reynolds,
207:I think people are losing that sense of security pretty fast, frankly. ~ Avi Lewis,
208:It is the government’s job to increase both freedom and security. ~ Timothy Snyder,
209:No one can build his security upon the nobleness of another person. ~ Willa Cather,
210:Security doesn't rob ambition; the illusion of security robs ambition. ~ Jay Samit,
211:The only real security in life lies in relishing life's insecurity. ~ M Scott Peck,
212:There is no security on this earth; there is only opportunity. ~ Douglas MacArthur,
213:They sought security by piling up more and more irrelevant weapons. ~ John Brunner,
214:We stand for global security and so we take care of everyone's life. ~ Evo Morales,
215:America employs more private security guards than high school teachers. ~ Anonymous,
216:Chase after money and security and your heart will never unclench. ~ Gautama Buddha,
217:How much liberty do with want to give up for a false sense of security? ~ Rand Paul,
218:I don't think people today need to derive security from possessions. ~ Emilio Pucci,
219:I follow my course with the precision and security of a sleepwalker. ~ Adolf Hitler,
220:I’m a gunsmith and security expert,” he continued, shaking his head. ~ Joanna Wylde,
221:I’m worried about your lack of security, not your lack of nookie. ~ Kerrelyn Sparks,
222:Ninety percent of the cases of polio are in security-vulnerable areas. ~ Bill Gates,
223:Real security is contemplating death, not pretending it doesn't exist. ~ Eve Ensler,
224:Strength is the outcome of need; security sets a premium on feebleness. ~ H G Wells,
225:The first goal of the technostructure is its own security. ~ John Kenneth Galbraith,
226:The man who would choose security over freedom deserves neither. ~ Thomas Jefferson,
227:There is no security for any of us unless there is security for all ~ Howard W Koch,
228:[V]igor of government is essential to the security of liberty. ~ Alexander Hamilton,
229:When settled people look for security, they look for continuity.” Here ~ Robin Hobb,
230:A man who would sacrifice freedom for security deserves neither. ~ Benjamin Franklin,
231:Chief of security : They have a tank! How did they get a tank up here? ~ Eoin Colfer,
232:Scrambling for security has never brought anything but momentary joy. ~ Pema Ch dr n,
233:Some in Washington say that you have to trade your liberty for security. ~ Rand Paul,
234:The greatest security against sin is to be shocked at its presence. ~ Thomas Carlyle,
235:We (the DOE) are poisoning our people in the name of national security. ~ John Glenn,
236:You live in a dangerous place when you sacrifice integrity for security. ~ Amy Grant,
237:If we restrict liberty to attain security we will lose them both. ~ Benjamin Franklin,
238:I support all efforts to protect the security of the state of Israel. ~ Anwar Ibrahim,
239:The U.S. cannot impose freedom, security, and unity in Iraq by force. ~ Peter DeFazio,
240:We spend our time searching for security and hate it when we get it. ~ John Steinbeck,
241:You all know," said the Guide, "that security is mortals' greatest enemy. ~ C S Lewis,
242:Are you so afraid that you are willing to trade your freedom for security? ~ Rand Paul,
243:Financial security puts me at ease and makes me reel good about my future ~ Louise Hay,
244:From a security perspective, if you're connected, you're screwed. ~ Daniel J Bernstein,
245:Is it security you want? There is no security at the top of the world. ~ Garet Garrett,
246:I will heal my people and will let them enjoy abundant peace and security. ~ Anonymous,
247:Satan can control you if you let outward things determine your security. ~ Joyce Meyer,
248:The only reason for security is that our salvation is in God’s hand. Our ~ John Calvin,
249:The security of Israel is a moral imperative for all free peoples. ~ Henry A Kissinger,
250:What a man wants is a mate and what a woman wants is infinite security. ~ Sylvia Plath,
251:America employs more private security guards than high school teachers. ~ Russell Brand,
252:[Donald Trump] is not going to cut Social Security, Medicare and Medicaid. ~ John Lewis,
253:do: SAVE MONEY FOR AUTONOMY AND SECURITY, TO INSULATE YOURSELF FROM STRESS. ~ Anonymous,
254:Fliers at Chicago’s O’Hare International lined up at a security checkpoint. ~ Anonymous,
255:Happiness has many roots, but none more important than security. ~ Edward Stettinius Jr,
256:I could still walk the street. I don't have to have no massive security. ~ Doug E Fresh,
257:Security is a false God. Begin to make sacrifices to it and you are lost. ~ Paul Bowles,
258:Security is the essential roadblock to achieving the road map to peace. ~ George W Bush,
259:Social Security is a family insurance program, not an investment scheme. ~ Diane Watson,
260:The ignorance of one voter in a democracy impairs the security of all. ~ John F Kennedy,
261:There is no real security except for whatever you build inside yourself. ~ Gilda Radner,
262:We've been able to build up the Afghan security forces and stabilize it. ~ Barack Obama,
263:A safe, affordable and plentiful supply of food is a national security issue. ~ Doug Ose,
264:Boredom flourishes too, when you feel safe. It's a symptom of security. ~ Eugene Ionesco,
265:but by and large ITS proved that the best security was no security at all. ~ Steven Levy,
266:If we give up freedom for security, we are in danger of losing both. ~ Benjamin Franklin,
267:Jay was basically Wyatt’s right hand man and head of his personal security. ~ Katie Reus,
268:Knowing what to expect next gives children a sense of security. ~ Hillary Rodham Clinton,
269:Music is like my security blanket. The first medium that I learned was music. ~ Yoko Ono,
270:That’s the other problem with human security: they’re allowed to give up. ~ Martha Wells,
271:"The desire for security and the feeling of insecurity are the same thing." ~ Alan Watts,
272:There was a long time I had no job security, no options and no education. ~ Ronda Rousey,
273:Those who seek security chase it for a lifetime without ever finding it. ~ Deepak Chopra,
274:Currently, 94 out of 100 of us pay the Social Security tax all year round. ~ Nick Clooney,
275:If you're invested in security and certainty, you are on the wrong planet. ~ Pema Chodron,
276:If you're invested in security and certainty, you are on the wrong planet. ~ Pema Chödrön,
277:Inspect every piece of pseudoscience and you will find a security blanket. ~ Isaac Asimov,
278:Matter of internal security - the age-old cry of the oppressor. Picard ~ Gene Roddenberry,
279:Nothing can bring a real sense of security into the home except true love. ~ Billy Graham,
280:One's only security in life comes from doing something uncommonly well. ~ Abraham Lincoln,
281:Poverty with security is better than plenty in the midst of fear and uncertainty. ~ Aesop,
282:The goal of the human soul is conquest, perfection, security, superiority. ~ Alfred Adler,
283:Those who would give up their civil liberties for security deserve neither. ~ Larry Flynt,
284:Winnie the Pooh seems to me to be a fundamental text on national security. ~ Barack Obama,
285:Ask for no guarantees, ask for no security, there never was such an animal. ~ Ray Bradbury,
286:If we make the journey to get security, we’re completely missing the point. ~ Pema Ch dr n,
287:Look at Israel. Israel is a great country for examples on how to do security. ~ Joe Arpaio,
288:The training and equipping of Iraqi security forces should be accelerated. ~ Peter DeFazio,
289:We will bankrupt ourselves in the vain search for absolute security. ~ Dwight D Eisenhower,
290:Excessive dealings with tyrants are not good for the security of free states. ~ Demosthenes,
291:Fort Lonesome! Security situation is in degradation mode and headed for sucky! ~ John Ringo,
292:Gender based violence anywhere is a threat to peace and security everywhere. ~ John F Kerry,
293:Geraldo has returned to the states. See? I told you airline security was a joke. ~ Jay Leno,
294:He’d seen what became of men who sacrificed their hearts’ desires for security. ~ Ginn Hale,
295:I do hope that all nations can live in complete security and welfare. ~ Mahmoud Ahmadinejad,
296:"If you're invested in security and certainty, you are on the wrong planet." ~ Pema Chödrön,
297:Inauguration Security was tighter than Kirstie Alley in a pair of spandex pants. ~ Jay Leno,
298:Internal security means something. It means war against your own population. ~ Noam Chomsky,
299:The beauty of enmity is insecurity; the beauty of friendship is in security. ~ Robert Frost,
300:The US Airforce assures me that UFO's pose no threat to National Security. ~ John F Kennedy,
301:What it is,” she sighed, “to have to choose between self and security. ~ Tsitsi Dangarembga,
302:You cannot have security at the expense of the insecurity of others. ~ Mohammad Javad Zarif,
303:DeVasher, head of security, occupied the largest of the small, plain offices. ~ John Grisham,
304:Everyone wanted security, but first they wanted to feel more threatened. ~ Gon alo M Tavares,
305:I guess that's why I buried myself in books. There was comfort there. Security. ~ Tom Isbell,
306:I've made peace with insecurity... because there is no security of any kind. ~ Dick Van Dyke,
307:I worry about financial security, and the older I get the more I worry about it. ~ J Robbins,
308:Protection and security are only valuable if they do not cramp life excessively. ~ Carl Jung,
309:Security isn't what I hunger for. I hunger for change. I hunger for connection. ~ Eve Ensler,
310:The threshold of insult is in direct relation to intelligence and security. ~ John Steinbeck,
311:Those who are willing to forfeit liberty for security will have neither. ~ Benjamin Franklin,
312:Benjamin Graham, the author of Security Analysis, a classic guide to investing. ~ Gary Keller,
313:Give people plenty and security, and they will fall into spiritual torpor. ~ Charles A Murray,
314:I helped Ben with the third edition of Security Analysis, published in 1951. ~ Walter Schloss,
315:I want to give producers more financial security. ~ Estelle Morris Baroness Morris of Yardley,
316:Security is not found in the absence of danger, but in the presence of Jesus. ~ John Eldredge,
317:Silence is the best security to the man who distrusts himself. ~ Francois de La Rochefoucauld,
318:Social Security is not in crisis. It's a crisis the president's created, period. ~ Harry Reid,
319:Terrorism is a significant threat to peace and security, prosperity and people. ~ Ban Ki moon,
320:The security of our country is not just a top priority, it's the top priority. ~ J D Hayworth,
321:The terror attacks of Sept. 11, 2001, changed the way we think about security. ~ Richard Burr,
322:You can't kill your way to security and you can't lead by scaring people. ~ Bruce Springsteen,
323:Freedom would be meaningless without security in the home and in the streets. ~ Nelson Mandela,
324:Isn't that the ultimate homeland security, standing up and defending marriage? ~ Rick Santorum,
325:I would love to see a march on Washington that says 'Save our Social Security' ~ Barbara Boxer,
326:Just a little help, a small security force, a bit of food, can save lives ~ Nicholas D Kristof,
327:security isn’t the heart’s true desire, that it’s the unknown we long for. ~ Meg Waite Clayton,
328:The uncontested core of security is providing protection through strength. But ~ George Lakoff,
329:The world’s population spends 500,000 hours a day typing Internet security codes. ~ John Lloyd,
330:To step toward your destiny, you might have to step away from your security. ~ Craig Groeschel,
331:Where’s security?” “I don’t know, but I’m assuming they were caught off guard. ~ Peter Tieryas,
332:You’re not doing security at Family Dollar! You’re supposed to be the elite! ~ Phoenix Daniels,
333:America will never seek a permission slip to defend the security of our people. ~ George W Bush,
334:As a very important source of strength and security, cherish public credit. ~ George Washington,
335:How old are you? Sixteen? S-seventeen? [asks security guard] Is seventeen legal? ~ Alice Cooper,
336:I've forgotten more about national security than George W. Bush will ever learn. ~ Wesley Clark,
337:There is no such thing as perfect security, only varying levels of insecurity. ~ Salman Rushdie,
338:Anyone willing to give up liberty in exchange for security deserves neither. ~ Benjamin Franklin,
339:He prefers the security of known misery to the misery of unfamiliar insecurity. ~ Sheldon B Kopp,
340:I hate flying, taking my clothes off, and going through the whole security. ~ Harry Dean Stanton,
341:I'm always advised and I follow that advice never to talk about security issues. ~ Geert Wilders,
342:In a multitude of acquaintances is less security, than in one faithful friend. ~ Herman Melville,
343:The only real security for social well-being is the free exercise of men's minds. ~ Harold Laski,
344:This is how it goes when Homeland Security's been canceled due to lack of sanity. ~ Stephen King,
345:Tradition becomes our security, and when the mind is secure it is in decay. ~ Jiddu Krishnamurti,
346:True security lies not in the things one has, but in the things one can do without. ~ Og Mandino,
347:What a sense of security in an old book which Time has criticized for us! ~ James Russell Lowell,
348:Anyone who trades liberty for security deserves neither liberty nor security. ~ Benjamin Franklin,
349:For better or worse, security was one of the few growth industries in France. Just ~ Daniel Silva,
350:I saw my real gods . . the gods of most men. Food, drink, and security in conformity. ~ Anne Rice,
351:Is your security going after the threat? Or is the security static?” Lucas asked. ~ John Sandford,
352:I was driving by, doing a security check... and I smelled leg of lamb." Morelli ~ Janet Evanovich,
353:Jesus Christ is not a security from storms. He is the perfect security in storms ~ Kathy Troccoli,
354:Peace with Syria would provide more security than a few settlements on the Golan. ~ Yitzhak Rabin,
355:Practicing security means continually turning towards the best version of yourself. ~ Eve Rickert,
356:The barbarian waits, and we grow weaker in the security of our ease and pleasure. ~ John Williams,
357:The key to economic security - to food security in Africa is empowering the women. ~ Judith Rodin,
358:The only person who is going to give you security and the life you want is you. ~ Robert Kiyosaki,
359:We all have our security blankets in this world. Some are just sharper than others. ~ Rob Thurman,
360:When you've got a new family, any kind of security you can have is great. ~ Matthew William Goode,
361:A Security officer throws a loaf of bread at the louder ones for their trouble. ~ Victoria Aveyard,
362:Beware of the words "internal security," for they are the eternal cry of the oppressor. ~ Voltaire,
363:But, alas, nobody anticipated the United States Department of Homeland Security. ~ Richard Dawkins,
364:Failure gave me an inner security that I had never attained by passing examinations. ~ J K Rowling,
365:Iran's nuclearization is the greatest single national security threat America faces. ~ Mitt Romney,
366:I won't be satisfied until I've put the entire security industry out of work. ~ Daniel J Bernstein,
367:My major focus is national security because that's really what the president runs. ~ Rudy Giuliani,
368:poor judgment to guarantee another person’s debt     or put up security for a friend.+ ~ Anonymous,
369:So close the book and go. The world is full of security systems. Hack one of them. ~ Cory Doctorow,
370:"The best form of security we can offer ourselves is to develop an open heart." ~ Mingyur Rinpoche,
371:The fear and the search for security have turned the world into a horrific hell. ~ Samael Aun Weor,
372:The only thing more dangerous than a developer is a developer conspiring with Security. ~ Gene Kim,
373:Those who are ready to sacrifice freedom for security ultimately will lose both. ~ Abraham Lincoln,
374:To go to war without the Security Council will not be in conformity with the Council. ~ Kofi Annan,
375:Uncertainty and expectation are the joys of life. Security is an insipid thing. ~ William Congreve,
376:We should be a rich country again, and if we do that, we can leave Social Security. ~ Donald Trump,
377:While Social Security faces some long-term challenges, the system is not in crisis. ~ Chaka Fattah,
378:Don’t tease me unless you want an audience when I f**k you.”
-Beck, Corp Security ~ Harper Sloan,
379:Every unpunished murder takes away something from the security of every man's life ~ Daniel Webster,
380:How we treat the earth basically effects our social welfare and our national security. ~ Jim Fowler,
381:I have never favored a Social Security retirement age of 70 nor do I favor one of 68. ~ Howard Dean,
382:Insecurity exists in the absence of knowledge. All security derives from knowledge. ~ L Ron Hubbard,
383:Investment must always consider the price as well as the quality of the security. ~ Benjamin Graham,
384:It's no use. I find it impossible to work with security staring me in the face. ~ Sherwood Anderson,
385:Nothing is so dangerous for our security as large groups of desperate people. ~ Marianne Williamson,
386:safety and security come from knowing that your partner loves, trusts and values you. ~ Eve Rickert,
387:The important thing about security systems isn’t how they work, it’s how they fail. ~ Cory Doctorow,
388:The only security a man can ever have is the ability to do a job uncommonly well. ~ Abraham Lincoln,
389:The worst thing wealth does is give those that have it a false sense of security. ~ Rachel E Carter,
390:We have to fight for our freedoms, also, economic and our national security freedoms. ~ Sarah Palin,
391:We need to phase Medicare and Social Security out in favor of something privatized. ~ Sharron Angle,
392:When you abandon freedom to achieve security, you lose both and deserve neither. ~ Thomas Jefferson,
393:Corporations are reneging on pension obligations. Social Security is under attack. ~ Dennis Kucinich,
394:Having a sense of security in one realm gives us the freedom to be original in another. ~ Adam Grant,
395:He said the threshold of insult is in direct relation to intelligence and security. ~ John Steinbeck,
396:It is no use. I find it impossible to work with security staring me in the face. ~ Sherwood Anderson,
397:I was driving by, doing a security check... and I smelled leg of lamb."
Morelli ~ Janet Evanovich,
398:Real freedom for people can only exist whenever there is security and independence. ~ Alexis Tsipras,
399:Security is not the meaning of my life. Great opportunities are worth the risk. ~ Shirley Hufstedler,
400:The email began: “The security of people’s communications is very important to me, ~ Glenn Greenwald,
401:The thing that I should wish to obtain from money would be leisure with security. ~ Bertrand Russell,
402:We should be talking about expanding Social Security benefits - not cutting them. ~ Elizabeth Warren,
403:When I go into the stores, I pet the saddles. Until security comes and takes me away. ~ Jodie Foster,
404:[America] will stand steadfast with Israel in pursuit of security and a lasting peace. ~ Barack Obama,
405:A people who chose security over liberty will receive neither nor deserve either. ~ Benjamin Franklin,
406:I think what children need is love, security, stability, consistency, and kindness. ~ Rosie O Donnell,
407:It is no use. I find it impossible to work with security staring me in the face. ~ Sherwood Anderson,
408:Man maintains his balance, poise, and sense of security only as he is moving forward. ~ Maxwell Maltz,
409:May it be to the world... to assume the blessings and security of self-government. ~ Thomas Jefferson,
410:Poverty must be reduced not only for reasons of moral and justice, but also of security. ~ Anna Lindh,
411:Social Security and Medicare represent promises made and we must keep these commitments. ~ Tom Coburn,
412:Social Security is a secure way to find great pleasure in being terribly deceived. ~ Ernie J Zelinski,
413:The benefits of ownership center around security, privacy, and control. Right ~ Robbie Kellman Baxter,
414:The bottom line is that it's better to run a workforce on security than insecurity. ~ Jared Bernstein,
415:We have to create security for the working families of Britain, and that's what I'll do ~ Ed Miliband,
416:A cat cares for you only as a source of food, security and a place in the sun. ~ Charles Horton Cooley,
417:A man's own good breeding is the best security against other people's ill manners. ~ Lord Chesterfield,
418:Find all of your security and worth in being a child of God, a member of Christ’s body. ~ Francis Chan,
419:From the time I was 8 until now, I've been working. My Social Security is looking solid. ~ Jose Garces,
420:In the world of cyber security, the last thing you want is to have a target painted on you. ~ Tim Cook,
421:Life is full of contradictions. We crave security and independence in equal measures. ~ Twinkle Khanna,
422:People, for reasons of kind of security, they tend to move towards people like themselves. ~ Ira Sachs,
423:The life expectancy is much longer today than it was when Social Security was created. ~ Virginia Foxx,
424:The most capricious modern entitlement is not just Social Security but to self-esteem. ~ George F Will,
425:The national debate on Social Security has been cheapened by demagoguery on all sides. ~ Bill Delahunt,
426:This is no time to lend money, especially upon bare friendship without security. ~ William Shakespeare,
427:Why should old people get [Social Security]? They just sit around all day doing nothing. ~ Pat Paulsen,
428:For the security of the UK, it matters a lot for Somalia to become a more stable place. ~ William Hague,
429:I don't have pets, I have two guard dogs; and I don't do my own shopping; it's a security thing. ~ Enya,
430:I've been saying for years, we're gonna have to spend a lot more time on cyber security. ~ Barack Obama,
431:move by Ukraine to join NATO, which the Kremlin says is a major threat to Russian security. ~ Anonymous,
432:Security is when I'm very much in love with somebody extraordinary who loves me back. ~ Shelley Winters,
433:The Green New Deal is about creating economic security for everyone, and doing it quickly. ~ Jill Stein,
434:When you have three teenagers, it gives a whole new meaning to "homeland security." ~ Bruce Springsteen,
435:Whites who haven’t yet emigrated to Australia semigrate instead to security complexes – ~ Karin Brynard,
436:Because of its huge territory, Russia must devote a great deal of attention to security. ~ Sergei Ivanov,
437:I'm a national security liberal, which I tell people because it's meant to sound absurd. ~ Rachel Maddow,
438:It is true greatness to have in one the frailty of a man and the security of a god. ~ Seneca the Younger,
439:Like once we picked Jim Norton as the head of security, the writing flows pretty easily. ~ Ted Alexandro,
440:the enemy of security: repetition leads to patterns, and cryptanalysts thrive on patterns. ~ Simon Singh,
441:The GOP, Truman said, was more interested in partisan advantage than in national security. ~ Jon Meacham,
442:The more a person seeks security, the more that person gives up control over his life. ~ Robert Kiyosaki,
443:There is not much collective security in a flock of sheep on the way to the butcher. ~ Winston Churchill,
444:We have problems with our physical security, operational security through to management. ~ Kevin Mitnick,
445:Beneath his awe, he had a sudden sense of security and serenity he had never felt before. ~ John Williams,
446:I didn't spend a lot of time on national security the American people will be glad to know. ~ Paul Begala,
447:Increasing the minimum wagewill put billions annually into the Social Security trust fund. ~ Bruce Braley,
448:In this effort to attain security, independence and privacy of course were suspect.... ~ Ursula K Le Guin,
449:It proved once again the theory that no security system is a match for a stupid employee. ~ Steig Larsson,
450:It proved once again the theory that no security system is a match for a stupid employee. ~ Stieg Larsson,
451:Life is full of contradictions. We crave security and independence in equal measures. As ~ Twinkle Khanna,
452:Our lives are structured around power symbols: money, authority, title, beauty, security. ~ Caroline Myss,
453:The firmest security of peace is the preparation during peace of the defenses of war. ~ John Quincy Adams,
454:we deny our destiny because it’s leading us toward happiness, and all we want is security. ~ Paulo Coelho,
455:Well, let's go back to the original intent of Social Security. It is an insurance contract. ~ Chuck Hagel,
456:Without those hackers, we wouldn't solve the problems we need to solve, especially security. ~ Fred Durst,
457:Given a choice between dancing pigs and security, users will pick dancing pigs every time. ~ Edward Felten,
458:God can judge me, I don't need a jury. Nothing standing in my way, like nothing's my security. ~ Lil Wayne,
459:Israel has an important principle: It is only Israel that is responsible for our security. ~ Yitzhak Rabin,
460:I was too old for a paper route, too young for Social Security and too tired for an affair. ~ Erma Bombeck,
461:I will never, ever apologize for protecting the safety and security of the American people. ~ Donald Trump,
462:Millions do not now have protection or security against the economic effects of sickness. ~ Harry S Truman,
463:My grandmother had this high-tech security system - a rusty nail she used to lock the door. ~ Quincy Jones,
464:Politics in the true sense, have to do with the prosperity, peace and security of the people. ~ Henry Ford,
465:Without Social Security, poverty rates for African American seniors would more than double. ~ Chaka Fattah,
466:Worldviews are more a mental security blanket than a serious effort to understand the world ~ Bryan Caplan,
467:All of us who serve in the House of Representatives and the Senate pay into Social Security. ~ Virgil Goode,
468:Americans used to roar like lions for liberty; now we bleat like sheep for security. ~ Norman Vincent Peale,
469:Better to be despised for too anxious apprehensions than ruined by too confident a security. ~ Edmund Burke,
470:Greece is a pillar of peace and security in a region where stabilization is on the growth. ~ Alexis Tsipras,
471:I used to think that one of the great signs of security was the ability to just walk away. ~ Jack Nicholson,
472:Liberty is a luxury of security; the free individual is a product and a mark of civilization. ~ Will Durant,
473:Security isn't securities. It's knowing that someone cares whether you are or cease to be. ~ Malcolm Forbes,
474:(State Security may not have been full of computer geniuses, but still, I had to be careful). ~ Wael Ghonim,
475:The greatest threat to our national security is our debt. We borrow a million dollars a minute. ~ Rand Paul,
476:The only job security you have today os your commitment to continuous personal improvement. ~ Ken Blanchard,
477:Those who desire to give up freedom in order to gain security will not have either one. ~ Benjamin Franklin,
478:Those who give up their liberty for more security neither deserve liberty nor security. ~ Benjamin Franklin,
479:We need a global parliament, a global government and possibly a global ministry for security. ~ Lech Walesa,
480:Better to be despised for too anxious apprehensions, than ruined by too confident a security. ~ Edmund Burke,
481:Be wary of security as a goal. It may often look like life's best prize. Usually it's not. ~ William Zinsser,
482:For he that is delighted by concord, And who abideth in the Law, Falleth not from Security. ~ Gautama Buddha,
483:I dream of a Digital India where mobile enabled emergency services ensure Personal Security. ~ Narendra Modi,
484:Our growing softness, our increasing lack of physical fitness, is a menace to our security. ~ John F Kennedy,
485:Any private security is a joke in a country where youre up against your own government. ~ Bidzina Ivanishvili,
486:direction générale de la sécurité intérieure, or DGSI, was France’s internal security service. ~ Daniel Silva,
487:Granted, this system is insane, but we must not let sanity stand in the way of airport security. ~ Dave Barry,
488:If you are not able to provide security for your own country, how can you guarantee liberties? ~ Viktor Orban,
489:If you want a strong future: Becoming secure with insecurity is the best security you can have. ~ Bill Jensen,
490:It is the duty of the government to guarantee maximum security, and this is not an easy task. ~ Yitzhak Rabin,
491:Michael Flynn was one of Trump`s top national security advisors throughout the campaign. ~ Lawrence O Donnell,
492:Our security is assured by our perseverance and by our sure belief in the success of liberty. ~ George W Bush,
493:Social Security is a program that should be strengthened and preserved for future generations. ~ Diane Watson,
494:Such security is equal liberty. But it is not necessarily equality in the use of the earth. ~ Benjamin Tucker,
495:The constitution had nothing to do with it. It was, after all, a matter of national security. ~ Stieg Larsson,
496:The least grace is a better security for heaven than the greatest gifts or privileges whatsoever. ~ John Owen,
497:There is a need for Social Security reform to ensure its stability, and Congress must act. ~ Grace Napolitano,
498:There is no security, internal or external. Security exists not, that’s why existence is so beautiful. ~ Osho,
499:Unbelievers enjoy the security of their unbelief; there is great confidence in ignorance. ~ Stephen R Lawhead,
500:We've got to see a state where the Afghan government can handle its own day-to-day security. ~ Stephen Harper,
501:Without that sense of security which property gives, the land would still be uncultivated. ~ Francois Quesnay,
502:Among seniors, Social Security is the sole source of income for 26 percent of nonmarried women. ~ Diane Watson,
503:He must do the work for which he is suited—work that will provide a life of safety and security. ~ Lisa Valdez,
504:I believe that social security should be a universal retirement guarantee and not means tested. ~ Steve Israel,
505:If the economy is strained, then Social Security, like the rest of the government, will be, too. ~ Mark Dayton,
506:Iraq has a new opportunity to comply with all these relevant resolutions of the Security Council. ~ Kofi Annan,
507:I've always been an independent person, but that independence was in the setting of security ~ Patricia Heaton,
508:Security depends not so much upon how much you have, as upon how much you can do without. ~ Joseph Wood Krutch,
509:These days, security for your devices is just simple good sense, like putting on your seat belt. ~ Jason Fried,
510:The true enemies of Social Security and Medicare are those who defend an imploding status quo. ~ Mitch Daniels,
511:This sounds like you’re saying that national security is more important than the Constitution. ~ Cory Doctorow,
512:Those who give up liberty for the sake of security, deserve neither liberty nor security. ~ Benjamin Franklin,
513:You can't tell me that all the wars we are fighting are in America's national security interest. ~ Todd Rokita,
514:As a submissive needed the security of a dominant’s arms, the dominant needed to provide it. ~ Cherise Sinclair,
515:But Paul had had no interest in security. After all, nobody could understand the code he wrote. ~ Kore Yamazaki,
516:Food is as important as energy, as security, as the environment. Everything is linked together. ~ Louise Fresco,
517:In its haste to bolster nationalism, in its obsession with security, Europe is losing its soul. ~ Tariq Ramadan,
518:Its hard to exaggerate the importance of preserving the financial integrity of Social Security. ~ Bill Delahunt,
519:Now, rest in the security of My name and all that it means to your identity. (Isaiah 45:2 – 3) ~ Lysa TerKeurst,
520:Only in growth, reform, and change, paradoxically enough, is true security to be found. ~ Anne Morrow Lindbergh,
521:preparation without security was meaningless, especially in the face of a widespread disaster. ~ Steven Konkoly,
522:The minuses of celebrity include having to live with security and the knowledge that you may be stalked. ~ Enya,
523:A strong American economy is essential to the well-being and security of our friends and allies. ~ Ronald Reagan,
524:Is it wrong to leave relative security in favor of unknown risk at the side of someone you love? ~ Ellen Hopkins,
525:My mother was a great bringer-up of children. My memories are of a sense of security and comfort. ~ Graham Swift,
526:Self-confidenc e alone is security. Your ability is your security. There is no security but you. ~ L Ron Hubbard,
527:The emotional security and political stability in this country entitle us to be a nuclear power. ~ Anthony Mason,
528:The greatest threat that the world faces, the greatest national security threat is a nuclear Iran. ~ Mitt Romney,
529:The only security was death. So long as one wanted to go on living one had to accept the risks. ~ Winston Graham,
530:When we talk about safety and security of the American people, politics falls aside pretty quickly. ~ Bill Frist,
531:Why should one U.S. airman give up his life when our national security is not in imminent danger? ~ Sean Hannity,
532:With Jesus we have 100 percent security, and no one can ever breach the parameters of His love. ~ David Jeremiah,
533:And let us be frank, the security threats that emanate from our ports come from foreign cargo. ~ Dana Rohrabacher,
534:Are you sleepwalking?' A voice asked behind me. "I was testing dorm security," I said. "It sucks. ~ Richelle Mead,
535:Find your security, success, and peace in God. Then, and only then, can it never be taken from you. ~ Mike Bickle,
536:I don't think any of us should forget that the security of America is our highest responsibility. ~ Ronald Reagan,
537:I feel I belong in the movie business and I belong in the security business. It's a natural for me. ~ Sam J Jones,
538:In a free government the security for civil rights must be the same as that for religious rights. ~ James Madison,
539:Our obsession with security is a measure of the power we have granted the future to hold over us. ~ Wendell Berry,
540:The government I led gave ordinary people peace, security, dignity, and opportunity to progress. ~ Benazir Bhutto,
541:The impact of climate change is a tremendous risk to the security and well-being of our countries. ~ Nancy Pelosi,
542:The social structure of any nation-state is ultimately determined by its security arrangements. ~ Neal Stephenson,
543:Walls don't work. ... Instead of building walls to create security, we need to build bridges. ~ James G Stavridis,
544:We, the people, still believe that every citizen deserves a basic measure of security and dignity. ~ Barack Obama,
545:Writing, printing, and the Internet give a false sense of security about the permanence of culture. ~ Jane Jacobs,
546:As president, improving cyber security will be an immediate and top priority for my administration. ~ Donald Trump,
547:But the mattress was soft and the blankets warm. Thus every small animal is lulled into security. ~ Kiersten White,
548:Civilized people have exchanged some part of their chances of happiness for a measure of security. ~ Sigmund Freud,
549:Complexity is the worst enemy of security, and our systems are getting more complex all the time. ~ Bruce Schneier,
550:He changes, encourages, and motivates us not by the uncertainty of fear, but by the security of love. ~ J D Greear,
551:He who would trade liberty for some temporary security, deserves neither liberty nor security. ~ Benjamin Franklin,
552:I dream of a Digital India where cyber security becomes an integral part of our National Security. ~ Narendra Modi,
553:Industry, commerce and security are the surest roads to the happiness and prosperity of people. ~ Thomas Jefferson,
554:Libyans have to work together for a new Libya. They should keep in place the sinews of security. ~ Andrew Mitchell,
555:Most men see most women as sex objects, whereas most women see most men as security objects. ~ Mokokoma Mokhonoana,
556:Security and contentment can come only through interdependence of every man upon every other man. ~ Walter Russell,
557:Social security isn’t a ponzi scheme. It’s not bankrupting us. It’s not an outrage. It is working. ~ Rachel Maddow,
558:The best security for people's doing their duty is that they should not know anything else to do. ~ Walter Bagehot,
559:The Fourth Amendment is on life support and the chief agent of that is the National Security Agency. ~ Nat Hentoff,
560:The regional security in the Middle East cannot be further compromised by an Iranian loose cannon. ~ Russ Carnahan,
561:There is a universal urge to rethink our spirituality in order to give us a new sense of security. ~ Claudia Llosa,
562:There will be times of security for you—a storehouse of salvation, wisdom, and knowledge. Isaiah 33:6 ~ Beth Moore,
563:We had become a country that valued security over freedom, power over justice, and war over peace. ~ Robert Kroese,
564:We reject the use of national security letters to spy on citizens who are not suspected of a crime. ~ Barack Obama,
565:You will not really have durable peace without a proper security structure in the Middle East. ~ Mohamed ElBaradei,
566:All Americans have a sacred duty to guarantee Social Security benefits to our nation's senior citizens ~ Steve King,
567:Attitudes toward other creatures is conditioned by one's level of security within the universe. ~ Mamphela Ramphele,
568:Beauty is a radiance that originates from within and comes from inner security and strong character. ~ Jane Seymour,
569:Carelessness about our security is dangerous, carelessness about our freedom is also dangerous. ~ Adlai Stevenson I,
570:Department of Homeland Security. “Each one of them is mid- to upper-level management in their agencies. ~ Brad Thor,
571:How can we protect homeland security unless the government stops the invasion of illegal aliens? ~ Phyllis Schlafly,
572:I don't know what the hell I'm doing here. I'm 237 years old, I should be collecting social security. ~ Woody Allen,
573:I think 9/11 guaranteed that national security is going to be in the forefront of every election. ~ George H W Bush,
574:Most men love money and security more, and creation and construction less, as they get older. ~ John Maynard Keynes,
575:People willing to trade their freedom for temporary security deserve neither and will lose both ~ Benjamin Franklin,
576:Real security can only be found in that which can never be taken from you — your relationship with God. ~ Anonymous,
577:Reporting Iran's dossier to the UN security council will be unconstructive and the end of diplomacy. ~ Ali Larijani,
578:Since problems spill across borders, security anywhere depends on sustainable development everywhere. ~ Ban Ki moon,
579:Social Security is a social insurance program - it is not designed to be the same thing as a 401(k). ~ Paul Krugman,
580:Taking Bast to the Dallas Museum would’ve been like trying to get a bazooka through airport security ~ Rick Riordan,
581:The definition of a security state is one that prioritizes security over all other considerations. ~ Edward Snowden,
582:The principal thing is to understand that there is no safety or security. ~ Alan W. Watts, The Wisdom of Insecurity,
583:Because my wife worked for him, and I run security checks on anyone my wife works with" - Christian Grey ~ E L James,
584:For 50 years, the Republicans have been accusing the Democrats of being soft on national security. ~ George McGovern,
585:Greater flexibility in the workplace demands that we also create greater security. Globalization is ~ Rutger Bregman,
586:I consider biennial elections as a security that the sober, second thought of the people shall be law. ~ Fisher Ames,
587:If Russia's interests and security are threatened, Russia will resist. Everyone needs to know that. ~ Vladimir Putin,
588:If you seek security in life, unknowingly you seek death. The only truly secure place is your grave. ~ Jaggi Vasudev,
589:In the United States national security interests to have a working relationship with Russia. ~ Katrina vanden Heuvel,
590:open societies will once again be urged to close in upon themselves, sacrificing freedom for ‘security’. ~ Tony Judt,
591:People willing to trade their freedom for temporary security deserve neither and will lose both. ~ Benjamin Franklin,
592:Real security can only be found in that which can never be taken from you--your relationship with God. ~ Rick Warren,
593:security was warfare writ small, and that deterrence relied in no small part upon that same deceit. ~ Joseph Brassey,
594:They want the federal government controlling Social Security like it's some kind of federal program. ~ George W Bush,
595:Achieving climate security must be the core of foreign policy. All of us have to pick up the pace. ~ Margaret Beckett,
596:Are you sleepwalking?' A voice asked behind me.
"I was testing dorm security," I said. "It sucks. ~ Richelle Mead,
597:At the departure gate, a drunken airport security woman was handing out box cutters to the passengers. ~ Warren Ellis,
598:For these reasons, women tend to rely more heavily on Social Security in their retirement than do men. ~ Steve Israel,
599:I characterize myself as a retired hacker. I'm applying what I know to improve security at companies. ~ Kevin Mitnick,
600:If faith is lost, there is no security and there is no life for him who does not adhere to religion. ~ Muhammad Iqbal,
601:If! If! If There were so many ifs in life, never any certainty of anything, never any security... ~ Margaret Mitchell,
602:If I were emotionally dependent, my sense of worth and security would come from your opinion of me. ~ Stephen R Covey,
603:I'm a little uncomfortable with the idea of judges overruling presidents on national security matters. ~ David Brooks,
604:I shut the security-center door, stepped over the giant’s body, and went on my merry, murderous way. ~ Jennifer Estep,
605:Men who have lived significant lives are men who never waited: not for money, security, ease, or women. ~ David Deida,
606:Never once have I thought that Social Security would be something that would ever be available to me. ~ Henry Rollins,
607:Oh, fantastic. My security is in the hands of a hormonal teenager with a JFK Jr. poster on her wall. ~ Bethany Turner,
608:Over the years, Steve has come to understand I need the clicker. He says it's my security blanket. ~ Brendan Shanahan,
609:Security was a mirage; being
tied down hardly counted when the other end of the rope had unraveled. ~ Jodi Picoult,
610:There are over 100 entities in the federal government that have something to do with homeland security. ~ Andrew Card,
611:They are what human beings turn into when they trade life for existence and ambition for security. ~ Raymond Chandler,
612:We will kill bin Laden. We will crush al Qaeda. That has to be our biggest national security priority. ~ Barack Obama,
613:When we face a choice between adding features and resolving security issues, we need to choose security. ~ Bill Gates,
614:When you run ads saying you are going to save social security, my friend, that's all hat and no cattle. ~ John McCain,
615:Who dares to strike today, when having the security of a permanent job is itself becoming a privilege? ~ Slavoj Zizek,
616:And how the government communicates about homeland security is central to how the public responds. ~ Patrick J Kennedy,
617:Any society that gives up a little liberty to gain a little security deserves neither, and will lose both. ~ Kyle West,
618:Being a blockhead is sometimes the best security against being cheated by a man of wit. ~ Francois de La Rochefoucauld,
619:Craving security is the cause of insecurity. Freedom is knowing that the only point of arrival is now. ~ Deepak Chopra,
620:Demography, not democracy, will be the most critical factor for security and growth in the 21st century ~ Lee Kuan Yew,
621:I believe that our national security lies not just in protecting our borders, but in bridging divides. ~ Joe Lieberman,
622:I don't agree with the libertarians. I want my security first. I'll deal with all the details after that. ~ Trent Lott,
623:I feel very lucky that I don't have to rely on a man to give me financial security. That's a big deal. ~ Kirsten Dunst,
624:Index funds do not trade from security to security and, thus, they tend to avoid capital gains taxes. ~ Burton Malkiel,
625:Privacy and security are those things you give up when you show the world what makes you extraordinary. ~ Margaret Cho,
626:Security matters should not be entrusted to people who make decisions without weighing things up. ~ Thomas de Maiziere,
627:The American people demand results, not rhetoric, especially when it comes to national security issues. ~ J D Hayworth,
628:Today more people believe in UFOs than believe that Social Security will take care of their retirement. ~ Scott D Cook,
629:We have a situation where the security of America is at stake, and it's a very, very serious situation. ~ Donald Trump,
630:Well, human security is a concept that I am very committed to enshrining in American foreign policy. ~ Hillary Clinton,
631:A large key is not a guarantee of security,” says Hellman, “but a small key is a guarantee of insecurity. ~ Steven Levy,
632:Blackwater had won $1 billion in “diplomatic security” contracts through the State Department alone.81 ~ Jeremy Scahill,
633:committed more money to AIG than the federal government had spent on Social Security and Medicare. ~ Timothy F Geithner,
634:Cooperation is for safety, security and companionship. Competition is for personal growth and status. ~ Jordan Peterson,
635:Hillary Clinton's been the worst violator of cyber security so far in the history of the United States. ~ Rudy Giuliani,
636:HIV/AIDS has become much more than a health issue. HIV/AIDS is a development issue, it's a security issue. ~ Kofi Annan,
637:How does a retail security guard tell a shopper from a shoplifter? Answer: a shoplifter doesn’t look at tags. ~ Roosh V,
638:I think every school needs a protection plan with a either police officer or certified armed security. ~ Wayne LaPierre,
639:Nothing in this world compares to the comfort and security of having someone just hold your hand. ~ Richelle E Goodrich,
640:Our nation's security, economy, and place on the world stage depends on the success our educational system. ~ Ed Markey,
641:Seek opportunity, not security. A boat in the harbor is safe, but in time its bottom will rot out. ~ H Jackson Brown Jr,
642:The mind conforms, imitates, because there is more security in conformity, in following a pattern. ~ Jiddu Krishnamurti,
643:The weather offers a false sense of security—with so much beauty you assume nothing bad can ever happen. ~ Sejal Badani,
644:A country where there is no security of life is certainly not a country but just a slaughter house! ~ Mehmet Murat ildan,
645:Because we lack a divine Center our need for security has led us into an insane attachment to things. ~ Richard J Foster,
646:But I'm saying we are loosing the people who are going to pay my social security. And that bothers me. ~ Joycelyn Elders,
647:By dedicating so much concentration to the issue of security, bilateral matters pass to a secondary level. ~ Vicente Fox,
648:I can’t do this by myself. It requires two security codes to access the full system and shut it down. ~ Alan Dean Foster,
649:If you can't even acknowledge that you have to fix Social Security, that's not a very good starting point. ~ Rob Portman,
650:I'm a professor of national security studies, and I know a lot more about fighting than Rumsfeld does. ~ Barry McCaffrey,
651:In a democracy, the public should be asked how much security and how much privacy they want for themselves. ~ Max Mosley,
652:Inspect every piece of pseudoscience and you will find a security blanket, a thumb to suck, a skirt to hold. ~ Anonymous,
653:Internal Security Act, which gave the police virtually unlimited powers to arrest and detain without trial. ~ Mark Tully,
654:It is not patriotic to commit young Americans to war unless our national security clearly requires it. ~ George McGovern,
655:Marcus is a great example of that way of thinking. He’s always looking for ways a security system fails. ~ Cory Doctorow,
656:on the site you plan to hit, it’s going to beef up security.” “But we’d be looking for a killer. Not a thief. ~ J D Robb,
657:Power is not happiness. Security and peace are more to be desired than a name at which nations tremble. ~ William Godwin,
658:Security is here to protect citizens. You can’t do that if you insist on seeing any of them as adversaries. ~ Ann Leckie,
659:Security is not a license for people in authority to hide tactics they would never openly admit to using. ~ John G Hemry,
660:Security is when everything is settled, when nothing can happen to you; security is the denial of life. ~ Germaine Greer,
661:Such problems are not solved in one day but there is a great step toward peace and security in the region. ~ Paul Kagame,
662:Superstition, then and now, is not just a threat to the truth. It’s also a threat to national security. ~ Steven Johnson,
663:The matter of social security and these grants is to help to address the levels of poverty in the country. ~ Thabo Mbeki,
664:The opposite of security is insecurity, and the only way to overcome insecurity is to take risks. ~ Theodore J Forstmann,
665:The people who live on the land - Israelis and Palestinians - have a right to live in security and peace. ~ Noam Chomsky,
666:Tyranny and anarchy are alike incompatible with freedom, security, and the enjoyment of opportunity. ~ Jeane Kirkpatrick,
667:We clearly need to break our addiction on Saudi Arabian oil that is a security threat to the United States. ~ Jay Inslee,
668:Whatever is at the center of our life will be the source of our security, guidance, wisdom, and power. ~ Stephen R Covey,
669:Anything in your life that’s acting as a security blanket is only smothering the person you were born to be. ~ Mandy Hale,
670:At the moment, we don't deserve international cricket in our country. The security situation is poor here. ~ Rashid Latif,
671:Cooperation is for safety, security and companionship. Competition is for personal growth and status. ~ Jordan B Peterson,
672:Due process and judicial process are not one and the same, particularly when it comes to national security. ~ Eric Holder,
673:I think in the U.S., the border fence is no longer an immigration issue primarily; it's a security issue. ~ Duncan Hunter,
674:I've been going around the world; I've been to China, I sang at the General Assembly, the Security Council. ~ Robert Davi,
675:keeping a well-supplied larder was one way to buy at least a small measure of security, a way to feel safe. ~ Dean Koontz,
676:Mark my words, there will be an intensive effort to privatize Social Security and Medicare and Medicaid. ~ Bernie Sanders,
677:Since 1998, the Administration has begun to upgrade counterintelligence and security at U.S. weapons labs. ~ Charles Bass,
678:Surgeon general's job is to protect, promote and advance the health, safety and security of the nation. ~ Richard Carmona,
679:The belief that security can be obtained by throwing a small state to the wolves is a fatal delusion. ~ Winston Churchill,
680:They want the federal government controlling the Social Security, like it's some kind of federal program. ~ George W Bush,
681:We all know that Social Security is one of this country's greatest success stories in the 20th century. ~ Mitch McConnell,
682:We all must recognize that homeland security funds should be allocated by threat and no other reason. ~ Michael Bloomberg,
683:A certain degree of preparation for war . . . affords also the best security for the continuance of peace. ~ James Madison,
684:All military regimes use security as the reason why they should remain in power. It's nothing original. ~ Aung San Suu Kyi,
685:And patience flees my heart, And reason flees my mind. Oh, how drunk can I get to be, Without your love's security? ~ Rumi,
686:An there is always the question: is it really proven that retaliatory actions solve the security problem?. ~ Moshe Sharett,
687:Everything goes by the board: honor, pride, decency, security, happiness, all, to get the book written. ~ William Faulkner,
688:If Parliament may take from me one shilling in the pound, what security have I for the other nineteen? ~ Richard Henry Lee,
689:I have had national security background, 10 years on the Intelligence Committee, the last two years as chair. ~ Bob Graham,
690:I'm afraid, based on my own experience, that fascism will come to America in the name of national security. ~ Jim Garrison,
691:It is my experience that most claims of national security are part of a campaign to avoid telling the truth. ~ Ben Bradlee,
692:Madoff's scam was small compared to Ponzi schemes the government itself runs: Social Security and Medicare. ~ John Stossel,
693:More young people believe they'll see a U.F.O. than that they'll see their own Social Security benefits. ~ Mitch McConnell,
694:my soul, you are my only security. When you turn me into a human the next time, make me a better fighter. ~ Kulpreet Yadav,
695:NARA must provide security at our facilities to protect our public patrons, our staff, and our holdings. ~ Allen Weinstein,
696:Never could an increase of comfort or security be a sufficient good to be bought at the price of liberty. ~ Hilaire Belloc,
697:Sadly the job security of lawyers has been ruined, so they are less willing to defend political defendants. ~ Shirin Ebadi,
698:The greatest threat to the security of the people of North Korea comes from the government of North Korea. ~ Ari Fleischer,
699:The lack of substantial resources and staffing along the Northern U.S. border poses a real security threat. ~ Mark Kennedy,
700:The purpose of U.S. foreign policy is protecting the security of Americans, not crusading for goodness abroad. ~ Don Feder,
701:These days, the only security you have is the confidence in yourself and your ability to make things happen. ~ Peter Voogd,
702:we are motivated to meet our needs for significance and security in ways we unconsciously believe will work. ~ Larry Crabb,
703:What is most important for Europe is economic growth and jobs, security at home and safety in the world. ~ Peter Mandelson,
704:When you understand this, you begin to realize that you already have all the security you wanted money to ~ Steve Chandler,
705:After all, lies about guaranteed security are far more seductive than lectures about personal responsibility. ~ Ben Shapiro,
706:At the present moment, the security of coherent philosophy, which existed from Parmenides to Hegel, is lost. ~ Karl Jaspers,
707:Britain and the United States are, and will remain, strong and close partners on trade, security and defence. ~ Theresa May,
708:First, I do not think there is any silver bullet to solving the technology side of the security equation. ~ John W Thompson,
709:for anger seemed, if anything, more unsafe than love: only those who know their own security can afford either. ~ Anonymous,
710:For happiness one needs security, but joy can spring like a flower even from the cliffs of despair. ~ Anne Morrow Lindbergh,
711:For the sake of our security, our economy and our planet, we must have the courage and commitment to change. ~ Barack Obama,
712:I’m sorry, ma’am,” the receptionist said. “Only clients allowed in the back. Security reasons.” “Security? ~ Garrard Conley,
713:I will also continue to fight to provide better economic security for victims of domestic violence. ~ Lucille Roybal Allard,
714:Marco [Rubio] has opposed at every point increased security - border security for those who come to our country. ~ Ted Cruz,
715:Nowadays we raise our children in a cocoon of domesticated security, far from any sense of risk or adventure. ~ Alan Hirsch,
716:PLEASE CEASE ATTEMPTS TO OVERRIDE MY SECURITY PROTOCOLS, BYRON. FOR WANT OF A BETTER DESCRIPTOR, IT TICKLES. ~ Amie Kaufman,
717:Security wins many battles but loses the security war. We are definitely going backwards in computer security. ~ Adi Shamir,
718:The money that goes into Social Security is not the government's money. it's your money. You paid for it. ~ Mitch McConnell,
719:The old problems - love, money, security, status, health, etc. - are still here to plague us or please us. ~ Shelley Berman,
720:They turned over the reception desk and the poor security guards did the only thing they could do. They ran. ~ Marlon James,
721:War has been the necessary and inevitable consequence of the establishment of a monopoly on security. ~ Gustave de Molinari,
722:We had become a country that valued security over freedom, power over justice, and war over peace. I wanted ~ Robert Kroese,
723:A country that demands moral perfection in its foreign policy will achieve neither perfection nor security ~ Henry Kissinger,
724:But I made him the Deputy Secretary for Homeland Security because that added an element of political espionage. ~ Wes Craven,
725:I welcome the Democrats' ideas on Social Security. I think it is very important to make a bipartisan reform. ~ Jack Kingston,
726:Security is mostly a superstition. It does not exist in nature. Life is either a daring adventure or nothing. ~ Helen Keller,
727:Since 1980, there have been 91 breaches of security at the White House. Well, 92 if you count George Bush. ~ David Letterman,
728:s security expert Bruce Schneier has said, "Making bits harder to copy is like making water that's less wet. ~ Cory Doctorow,
729:std::bind can express the same thing, but the construct is an example of job security through code obscurity: ~ Scott Meyers,
730:Uncertainty is the only certainty there is, and knowing how to live with insecurity is the only security ~ John Allen Paulos,
731:United States foreign policy, which includes national security, is literally disintegrating before our eyes. ~ Rush Limbaugh,
732:We think stories are about getting money and security, but the truth is, it all comes down to relationships. ~ Donald Miller,
733:A true leader cannot be dependent on companionship for his or her security, but must learn to trust in God alone. ~ Eric Ludy,
734:By our daylight standard he walked out of security into darkness, danger, and death.
But did he see like that? ~ H G Wells,
735:Canada is preparing to play a major role in the continued stability and security of Afghanistan through ISAF. ~ Paul Cellucci,
736:For I had rather die in the adventure ot noble achievements, then live in obscure and sluggish security. ~ Margaret Cavendish,
737:Homeland Security is armed and locked and ready to blow your brains out if you start protesting martial law. ~ Gerald Celente,
738:If the nuclear dossier is referred to the U. N. Security Council, Iran will have to resume uranium enrichment. ~ Ali Larijani,
739:If we gave up our freedom as the price of security, we would no longer be the great nation that we are. ~ Ruth Bader Ginsburg,
740:I think we will begin to see some real efforts made to do things like protecting Social Security and Medicare. ~ John Dingell,
741:I would rather be a librarian, but I worry about the job security. Books may be temporary; dicks are forever. ~ Gillian Flynn,
742:John was in constant need of proof of love and security and he was constantly testing people for that proof. ~ Cynthia Lennon,
743:People who assure you that you can only gain security at the price of liberty usually want to deny you both. ~ Timothy Snyder,
744:Security is not a license for people in authority to hide the tactics they would never openly admit to using. ~ Jack Campbell,
745:Some of the things I'm doing probably aren't popular but they're necessary for security and for other reasons. ~ Donald Trump,
746:Thanks Darling for the beautiful flowers and all the prayers. Now can you just get my puppy past security? ~ Elizabeth Taylor,
747:The Republican Party is a friend of Social Security the way Colonel Sanders was a friend of chickens. ~ Charles Taylor Manatt,
748:This theme interests me because I believe, with the author, that security declines as security machinery expands. ~ E B White,
749:Uncertainty is the only certainty there is, and knowing how to live with insecurity is the only security. ~ John Allen Paulos,
750:When you lived in an unpredictable world with no security, anxiety was your ally. It warned you of coming danger ~ L H Cosway,
751:Anyone who thinks that security products alone offer true security is settling for the illusion of security. ~ Kevin D Mitnick,
752:A particularly important use of codes a was by banks. Worries about the security of telegraphic money transfers ~ Tom Standage,
753:I am determined that my children should have no financial security. It ruins people not having to earn money. ~ Nigella Lawson,
754:I'd like to have permanent time off, really. The goal is financial security and permanent time off, basically. ~ Paul Giamatti,
755:If you spend more on coffee than on IT security, you will be hacked. What's more, you deserve to be hacked. ~ Richard A Clarke,
756:I have a huge need for financial security; the emigrant in me has a fear of ending up homeless and in the gutter. ~ Ruth Behar,
757:One poll shows that by 61 percent to 29 percent Americans under 40 say that Social Security needs to be fixed. ~ Virginia Foxx,
758:Social Security is not just another government spending program. It is a promise from generation to generation. ~ Hank Johnson,
759:Something is really screwy in the world when I’m finding reasons to thank Development and Security in the same day. ~ Gene Kim,
760:"The most intense conflicts, if overcome, leave behind a sense of security and calm that is not easily disturbed." ~ Carl Jung,
761:The only real security in life comes from knowing that every single day you are improving yourself in some way. ~ Tony Robbins,
762:There is no defense or security for any of us except in the highest intelligence and development of all. ~ Booker T Washington,
763:We are ready to compromise. We are ready to take calculated risks, but for a peace that will give us security. ~ Yitzhak Rabin,
764:We view our Nation's strength and security as a trust, upon which rests the hope of free men everywhere. ~ Dwight D Eisenhower,
765:When you know you're capable of dealing with whatever comes, you have the only security the world has to offer. ~ Harry Browne,
766:A country that demands moral perfection in its foreign policy will achieve neither perfection nor security. ~ Henry A Kissinger,
767:A lot more government,” Sam said. “And a lot more ‘guards’ I would say. With safety and security came ignorance. ~ Randi Darren,
768:A strong man next to you in bed is a comfort, but real security is a German Shepherd bitch on guard at the door. ~ Susan Conant,
769:For individual freedom can come about only, can be conceived only, if there is some sense of security to life. ~ Russell Shorto,
770:Human beings the world over need freedom and security that they may be able to realize their full potential. ~ Aung San Suu Kyi,
771:is not a voracious capitalism but the spiritual insight that we cannot buy the identity and security we seek. ~ Parker J Palmer,
772:I think General [Mike] Flynn is probably the top contender for that job [of national security adviser]. ~ George Stephanopoulos,
773:Most recently, the Erdoğan government in Turkey used security crises to justify his tightening grip on power. ~ Steven Levitsky,
774:Nazi storm troopers began as a security detail clearing the halls of Hitler’s opponents during his rallies. As ~ Timothy Snyder,
775:Not only is privatizing Social Security not the solution to Social Security, it would exacerbate the problem. ~ Shelley Berkley,
776:Pundits are used to analyzing the gap between what our ideals suggest and what our security interests require. ~ Elliott Abrams,
777:Silver Avalanche coming up the driveway," calls Jeffrey from upstairs.
"What are you, security?" I call back. ~ Cynthia Hand,
778:Snow White gets a Social Security card. She gets a job building houses out in California. Picks oranges. ~ Catherynne M Valente,
779:The FBI has long been a part of the security for the nation's banks because bank robberies have been a priority ~ John Ashcroft,
780:The people of my country want the two freedoms that spell security: freedom from want and freedom from fear. ~ Aung San Suu Kyi,
781:The Social Security's medical consultants support the interest not of the victims but of the organization. ~ Simone de Beauvoir,
782:Though the terror of the sea gives to none security, in the secret of the shell. Self preserving we may dwell. ~ Muhammad Iqbal,
783:Until our hearts find complete security and significance in God's unconditional love, we will never be satisfied. ~ Renee Swope,
784:Until our hearts find complete security and significance in God’s unconditional love, we will never be satisfied. ~ Renee Swope,
785:Walking in a beautiful narrow street is an excellent way of discovering life with the feeling of security! ~ Mehmet Murat ildan,
786:We cannot let those who would try to destabilize the world to interfere with American interests and security. ~ Hillary Clinton,
787:When it sinks in that once we trust in Jesus we are eternally his, we immediately feel security and freedom. ~ Jefferson Bethke,
788:When we get our security from Christ, we no longer have to look for it in the world, and that’s a pretty good trade. ~ Bob Goff,
789:When you know you're capable of dealing with whatever comes, you have the only security the world has to offer. ~ Harry Browne,
790:an instant I considered calling security myself, but, realizing that this might be someone in need, I assumed a ~ Robin S Sharma,
791:Doing a job RIGHT the first time gets the job done. Doing the job WRONG fourteen times gives you job security. ~ Stephen Hawking,
792:Emotions themselves are actually the cause of the basic fear that drives everyone to seek security constantly. ~ David R Hawkins,
793:I do want to be very clear: I see our nuclear deterrent as absolutely core insurance for our national security. ~ Andrea Leadsom,
794:In the long-term, security comes from an asset you create or acquire, not a position in someone else's asset. ~ Chris Guillebeau,
795:I've lived so frugally for so long. I have to have that financial security or the world feels out of control for me. ~ DJ Qualls,
796:I would prefer the teacher to focus on teaching and have a security officer worry about keeping the kids safe. ~ Andrea Tantaros,
797:Last night we had Bill Clinton, the former president. Security was as tight as Governor Christie's yoga pants. ~ David Letterman,
798:Security is a double-edged sword: While a fence sure protects the fenced; it also imprisons the protected. ~ Mokokoma Mokhonoana,
799:That’s a huge reason why Cyrus started the security company—to give jobs to brothers who the community shut out. ~ Katie McGarry,
800:The American people must be willing to give up a degree of personal privacy in exchange for safety and security. ~ Louis J Freeh,
801:5: Social security will break small business, become a huge tax burden on our citizens, and bankrupt our country! ~ Joseph Conrad,
802:Almost half of all Latinas currently on Social Security rely exclusively on their benefit check in retirement. ~ Grace Napolitano,
803:Even without reforms, the Social Security fund will be able to meet 100 percent of its obligations until 2042. ~ Grace Napolitano,
804:Hunter already had some baggage, add my baggage on top of that and it’d be a recipe for pissing off airport security. ~ Anonymous,
805:If you are looking to outer, passing, mutable things for either happiness or security, you are not putting God first. ~ Emmet Fox,
806:I want people to know that I am tough on illegal immigration and we are working to provide needed border security. ~ David Dreier,
807:I would rather be a librarian, but I worry about the job security. Books may be temporary; dicks are forever. The ~ Gillian Flynn,
808:People who assure you that you can only gain security at the price of liberty usually want to deny you both. You ~ Timothy Snyder,
809:Photographers and artists contribute a lot to the world and have a right to exist in relative security and comfort. ~ Ansel Adams,
810:Social Security has been effective for 70 years; prior predictions of its demise have been totally overstated. ~ Grace Napolitano,
811:Spiritual security means you are fully alive and comfortable in your life as it is, without expecting anything. ~ Dainin Katagiri,
812:The boy manifested the sort of submissive dimness that foretold a long sad future in minimum-security institutions ~ Carl Hiaasen,
813:The federal government can't remodel every firehouse and buy every new policeradio in the name of Homeland Security. ~ Bob Inglis,
814:The mark of a truly civilized man is confidence in the strength and security derived from the inquiring mind. ~ Felix Frankfurter,
815:This has ever been the fate of energy in security; it takes to art and to eroticism, and then come languor and decay. ~ H G Wells,
816:This is a fact: Strength in the pursuit of peace is no vice; isolation in the pursuit of security is no virtue. ~ George H W Bush,
817:When the day comes, I remember how much I loathe flying. I seethe at the humiliation of airport security checks. ~ Tom Hodgkinson,
818:You can prematurely optimize maintainability, flexibility, security, and robustness just like you can performance. ~ John Carmack,
819:But when it came to paranoid security protocols, the DPRK was starting to make the Chinese look like rank amateurs. ~ Mark Greaney,
820:documented in a security file was of no concern to him. The fact that a man like Joe Tex could have access to it ~ James Lee Burke,
821:I mean I would rather be a librarian but I worry about the job security, books may be temporary dicks are forever. ~ Gillian Flynn,
822:Only those means of security are good, are certain, are lasting, that depend on yourself and your own vigor. ~ Niccolo Machiavelli,
823:Our preferences for stability and security blind us to the opportunities for adventure when they present themselves. ~ Alan Hirsch,
824:Security is mostly a superstition. It does not exist in nature nor do the children of men as a whole experience it. ~ Helen Keller,
825:Social security was never intended to be a retirement plan. At most, it was designed to provide an income supplement. ~ David Bach,
826:Ten books in and the Red Stone Security series is still going strong because of you, my wonderful readers. Thank you. ~ Katie Reus,
827:The development of the Internet has posed new challenges to national sovereignty, security and development interests. ~ Xi Jinping,
828:There’s a security guard, like, ten feet away. I could have you kicked out of here.”
“For what? Being awesome? ~ Victoria Scott,
829:This has ever been the fate of energy in security; it takes to art and to eroticism, and then comes languor and decay. ~ H G Wells,
830:Trading privacy for security is stupid enough; not getting any actual security in the bargain is even more stupid. ~ Cory Doctorow,
831:Wealth did not, he realised, guarantee happiness, but it did offer a measure of security and opportunity. ~ Hannah Mary Rothschild,
832:We are apt to be deluded into false security by political catch-words, devised to flatter rather than instruct. ~ James A Garfield,
833:We need to put the security back in the National Security Agency. We can't have the national surveillance agency. ~ Edward Snowden,
834:And our security will require all Americans to be forward-looking and resolute, to be ready for pre-emptive action. ~ George W Bush,
835:And over time, I think, as Iraqi security capacity builds, you'll see American and coalition presence there decline. ~ John Abizaid,
836:Every time, every time a tourist or an immigrant or a refugee shows up in another country there's a security risk. ~ Justin Trudeau,
837:For a people who are free, and who mean to remain so, a well-organized and armed militia is their best security. ~ Thomas Jefferson,
838:However, we are not all rational, and some of us may need the security of distorted estimates to avoid paralysis. ~ Daniel Kahneman,
839:If! If! If! There were so many ifs in life, never any sense of security, always the dread of losing everything. ~ Margaret Mitchell,
840:If virtue & knowledge are diffused among the people, they will never be enslav'd. This will be their great security. ~ Samuel Adams,
841:I mean, if my phone is trying to kill me then that crazy X-ray machine at airport security is a straight-up assassin. ~ Amy Poehler,
842:In other words, who dares to strike today,when having the security of a permanent job is itself becoming a privilege? ~ Slavoj i ek,
843:National security is a serious matter and I do not think it is in proper to discuss such details in a public forum. ~ Narendra Modi,
844:Operation Iraqi Freedom is over, and the Iraqi people now have lead responsibility for the security of their country ~ Barack Obama,
845:Whatever you're selling, storage or networking or security, you're going head to head with the incumbent players. ~ Marc Andreessen,
846:Don't ask for security, ask for adventure. Better to live 30 years full of adventure than a 100 years safe in the corner. ~ Jim Rohn,
847:Gas stations are considering hiring security guards. Why are they getting security guards? We're the ones getting robbed. ~ Jay Leno,
848:I did not want to provide a blueprint or roadmap for the terrorists, saying 'Here are our new security procedures'. ~ John S Pistole,
849:In your career, even more than for a brand, being safe is risky. The path to lifetime job security is to be remarkable. ~ Seth Godin,
850:Let's means-test benefits - let's means-test Social Security and Medicare and make the rich pay more for these benefits. ~ Rand Paul,
851:Our biggest national security threat is the environmental destruction of our planet and the arms race with ourselves. ~ Jello Biafra,
852:Our long-term security depends on our deep faith in liberty. And we'll continue to promote freedom around the world. ~ George W Bush,
853:Peace is a deep quietude where no disturbance can come- a quietude with a sense of established security and release. ~ Sri Aurobindo,
854:Possessions and concessions are not often what they seem, they drag you down and load you down in disguise of security. ~ Neil Young,
855:Smell is important. It reminds a person of all the things he's been through; it is a sheath of memories and security. ~ Tove Jansson,
856:Social Security runs seamlessly and efficiently—less than 1 percent of its expenditures are for administration. ~ David Cay Johnston,
857:The Israelis want security. The Arabs want dignity. And they consider the demands of each other as incompatible. ~ Henry A Kissinger,
858:The militia is our ultimate safety. We can have no security without it. The great object is that every man be armed. ~ Patrick Henry,
859:There is more security in self-denial, mortification, and other like virtues, than in an abundance of tears. ~ Saint Teresa of Avila,
860:This country cannot afford to tear itself apart on a partisan basis on issues so vital to our national security. ~ Henry A Kissinger,
861:We have the right to ensure our security, especially when it is possible to reach agreement on a political solution. ~ Yitzhak Rabin,
862:We must achieve both security and solvency. In fact, the foundation of military strength is economic strength, ~ Dwight D Eisenhower,
863:We must achieve both security and solvency. In fact, the foundation of military strength is economic strength. ~ Dwight D Eisenhower,
864:And patience flees my heart,
And reason flees my mind.
Oh, how drunk can I get to be,
Without your love's security? ~ Rumi,
865:a person who never learned to trust confuses intensity with intimacy, obsession with care, and control with security. ~ John Bradshaw,
866:I mean, I would rather be a librarian, but I worry about the job security. Books may be temporary; dicks are forever. ~ Gillian Flynn,
867:I think it's critical that we return national security issues to the center of the overall political debate in America. ~ John Bolton,
868:I've had death threats, but I've never been fearful for my life. Although I have traveled with security since the '60s. ~ Hugh Hefner,
869:No amount of security is worth the suffering of a life lived chained to a routine that has killed your dreams.       I ~ Kent Nerburn,
870:Population growth and the proliferation of mega-cities around the world redefines the entire global security agenda. ~ Helmut Schmidt,
871:Security here in New York City is still very tight. Hookers in Times Square now are demanding two forms of fake ID. ~ David Letterman,
872:The bottom line is, if somebody doesn't go through proper security screening, they're not going to go on the flight. ~ John S Pistole,
873:The dullness of certain people is sometimes a sufficient security against the attack of an artful man. ~ Francois de La Rochefoucauld,
874:You know, 600,000 millionaires get a Social Security check every month. I think there's enough waste and inefficiency. ~ Richard Lamm,
875:Deep, contended joy comes from a place of complete security and confidence [in God] - even in the midst of trial. ~ Charles R Swindoll,
876:I smiled at one of the guards. He did not smile back. There was nothing funny about national security, nothing at all. ~ Kurt Vonnegut,
877:It's important for people of color to link up with issues around globalization, food security, health, the environment. ~ Danny Glover,
878:I've got to put my kids through school. And I like the security of working every day, which is what television is about. ~ Stacy Keach,
879:I want ordinary people to enjoy a decent standard of living, with ever increasing security, comfort and joy. ~ Gloria Macapagal Arroyo,
880:Letting go of the security of what is commonly understood requires a big leap of faith and a willingness to fall. ~ Henry Kimsey House,
881:One of the sharp parallels is that neither Vietnam nor Iraq was the slightest threat to America's national security. ~ George McGovern,
882:The house wife is an unpaid employee in her husband's house in return for the security of being a permanent employee. ~ Germaine Greer,
883:The most certain test by which we judge whether a country is really free is the amount of security enjoyed by minorities. ~ Lord Acton,
884:There are no plans in President-elect [Donald] Trump's policies moving forward to touch Medicare and Social Security. ~ Reince Priebus,
885:There’s a security guard, like, ten feet away. I could have you kicked out of here.”

“For what? Being awesome? ~ Victoria Scott,
886:There should be a Transatlantic renaissance between the US and Europe based on shared prosperity, security, and values. ~ John F Kerry,
887:There's just no real job security when you're shooting a show about an apocalypse and anybody could die at any time. ~ Melissa McBride,
888:The Russians and rogue actors, including ISIS - this is a serious part of the 21st century security challenge that we face. ~ Jeb Bush,
889:The secretary of Homeland Security working with myself and my staff will begin immediate construction of a border wall. ~ Donald Trump,
890:THOSE WHO FIND THEIR SENSE OF SECURITY IN CHRIST ARE NOT EASILY SHAKEN BY CIRCUMSTANCES OR OTHER PEOPLE’S OPINION OF THEM. ~ Anonymous,
891:We are taking additional measures to ensure security and stability in Tal Afar and to restore its people's rights ~ Ibrahim al Jaafari,
892:When a good man employs others he becomes a slave to the job, for the job is the guarantee for the security of many men. ~ Nevil Shute,
893:when you are a small minority and you own the majority’s wealth, security is naturally a primary consideration. ~ Kim Stanley Robinson,
894:A country whose security depends on producing a genius in each generation sets itself a task no society has ever met. ~ Henry Kissinger,
895:Airports say work and security checks and delays. Ports say... I don’t know. Something completely different. Escape, maybe. ~ Ruth Ware,
896:Conservatives value economic liberty and moral security, while the liberal values economic security and moral liberty. ~ Jonah Goldberg,
897:First, the constitution [of Ukraine] has to be reformed. Only then can confidence building and border security follow. ~ Vladimir Putin,
898:If it's crazy to call for putting police and armed security in our school to protect our children, then call me crazy. ~ Wayne LaPierre,
899:If you ask amateurs to act as front-line security personnel, you shouldn't be surprised when you get amateur security. ~ Bruce Schneier,
900:In the worship of security we fling ourselves beneath the wheels of routine-and before we know it our lives are gone. ~ Sterling Hayden,
901:Our security doesn't come from turning away from the hard stuff; it comes from the knowledge that we can handle it. ~ Tim DeChristopher,
902:Real security only comes when we are comfortable with who we are, real happiness is a byproduct of a life well lived. ~ Daniel Gottlieb,
903:Social security has enabled people to retire with dignity and overwhelmingly not be in poverty. We have to keep it solvent. ~ Tim Kaine,
904:The capacity of Iraq's security forces has improved, and Iraq's leaders have made strides toward political accommodation ~ Barack Obama,
905:The most dangerous enemy to Israel's security is the intellectual inertia of those who are responsible for security. ~ David Ben Gurion,
906:The Product of Freedom and Security is a constant (F X S = k). Giving up freedom for security is beginning to look naive. ~ Larry Niven,
907:The tomb was empty-the greatest security breach of all time.Yet that event gives lasting security to all God's people. ~ David Jeremiah,
908:This country has a mental health problem disguised as a gun problem, and a tyranny problem disguised as a security problem. ~ Joe Rogan,
909:When we, as small children, experienced our safety or security being threatened, our bodies reacted by erecting defenses. ~ Mark Wolynn,
910:You already know the end result… laid off, fired, no retirement, no benefits, no security and certainly no comfort. ~ Robert T Kiyosaki,
911:And don't worry too much about security. You will eventually have a deep security when you begin to do what you want. ~ Natalie Goldberg,
912:EARTH comprises distances, great and small; danger and security; open ground and narrow passes; the chances of life and death. ~ Sun Tzu,
913:I am no longer an advocate of elaborate techniques of security analysis in order to find superior value opportunities. ~ Benjamin Graham,
914:I'd thought sexuality was instinctive or natural, but it's profoundly linked to inner security and cultural context. ~ Tahar Ben Jelloun,
915:In an efficient market at any point in time the actual price of a security will be a good estimate of its intrinsic value. ~ Eugene Fama,
916:is get a door open, away from the security of the hotel.” “So killing a hundred people is worth the life of your father? A ~ Brad Taylor,
917:I think Donald Trump laid out a series of priorities that doesn't end with border security, it begins with border security. ~ Mike Pence,
918:It is possible to provide security against other ills, but as far as death is concerned, we men live in a city without walls. ~ Epicurus,
919:People who are willing to give up freedom for the sake of short term security, deserve neither freedom nor security. ~ Benjamin Franklin,
920:places of security to be built upon those towers, that the stones and the arrows of the Lamanites could not hurt them. ~ Joseph Smith Jr,
921:Social Security was always supposed to be basically, in theory, an insurance program where you pay in and then you get out. ~ Judd Gregg,
922:Some people think self-employment is risky, but the real risk lies in deriving your security from an external source. ~ Chris Guillebeau,
923:The little jihad is over, and now we have the bigger jihad - the bigger battle is achieving security and economic growth ~ Mahmoud Abbas,
924:To have in general but little feeling, seems to be the only security against feeling too much on any particular occasion. ~ George Eliot,
925:Each time you stay present with fear and uncertainty, you're letting go of a habitual way of finding security and comfort. ~ Pema Chodron,
926:I can not be mistaken - what I say and do is historical.I follow my life with the precision and security of a sleep walker ~ Adolf Hitler,
927:It is time to understand the environment for what it is: the national security issue of the early twenty-first century. ~ Robert D Kaplan,
928:Primary aim of quantum artificial intelligence is to improve human freedom, dignity, equality, security, and total well-being. ~ Amit Ray,
929:Right now, with terrorism and poverty and Wall Street and Social Security having problems, nudity should not be the issue. ~ Robin Thicke,
930:Stalin’s postwar goals were security for himself, his regime, his country, and his ideology, in precisely that order. ~ John Lewis Gaddis,
931:the post-9/11 American veneration of security above all else has created a climate particularly conducive to abuses of power. ~ Anonymous,
932:There can be no compromise on the right of personal security; there can be no compromise on securing of human rights. ~ Hubert H Humphrey,
933:The safeguard of morality is religion, and morality is the best security of law and the surest pledge of freedom. ~ Alexis de Tocqueville,
934:Thus did Jack Easy make the best use that he could of his strength, and become, as it were, the champion and security ~ Frederick Marryat,
935:We put up the very best cyber security - what I call infrastructure to stop them, but [hackers] constantly [didn't stop]. ~ Donna Brazile,
936:[Adolf Hitler] was always intensely worried about security and people watching or being nosy, intruding on his private life. ~ Gretl Braun,
937:As both a former governor and a Naval officer I can tell you energy security remains among biofuels' most important benefits. ~ Matt Blunt,
938:Forget fashion, dress for comfort and for ease of getting through security, so no hats, belts or unnecessary accessories. ~ David Harewood,
939:Great countries need to secure their border for national security purposes, for economic purposes and for rule of law purposes. ~ Jeb Bush,
940:If we topple [Bashar] Assad, the result will be ISIS will take over Syria, and it will worsen U.S. national security interests. ~ Ted Cruz,
941:In terms of security for wildlife and our society, it's an incredibly alarming situation, and we need to address that. ~ Veronika Varekova,
942:Liberty has meaning only if we still believe in it when terrible things happen and a false government security blanket beckons. ~ Ron Paul,
943:Our peculiar security is in the possession of a written Constitution. Let us not make it a blank paper by construction. ~ Thomas Jefferson,
944:President Trump's made it clear that his administration is going to put the safety and security of the American people first. ~ Mike Pence,
945:The only true security in life comes from knowing that every single day you are improving yourself in some way, that you ~ Anthony Robbins,
946:The reason you might choose to embrace the artist within you now is that this is the path to (cue the ironic music) security. ~ Seth Godin,
947:There can be no security anywhere in the free world if there is no fiscal and economic stability within the United States. ~ Ronald Reagan,
948:There is little passion for anything except pleasure and comfort and security. Indeed, passion is confused with fanaticism. ~ Peter Kreeft,
949:The trade-off between freedom and security, so often proposed so seductively, very often leads to the loss of both. ~ Christopher Hitchens,
950:Unbelievers enjoy the security of their unbelief; there is great confidence in ignorance. But I had seen the Cythrawl. ~ Stephen R Lawhead,
951:We must plan for freedom, and not only for security, if for no other reason than only freedom can make security more secure. ~ Karl Popper,
952:We really don't need the United Nations approval to act. When it comes to our security, we do not need anyones permission. ~ George W Bush,
953:Against other things it is possible to obtain security, but when it comes to death we human beings all live in an unwalled city. ~ Epicurus,
954:All too often, the security of a mediocre present is more comfortable than the adventure of trying to be more in the future. ~ Tony Robbins,
955:American leaders worry about the security of their country. Israeli leaders worry about the survival of their country. ~ Benjamin Netanyahu,
956:Everybody, every American starts to have - needs to start having a security plan. We need to be able to protect ourselves. ~ Wayne LaPierre,
957:He spoke again as if he hadn’t just shattered his promise and her security. Her house of glass now lay in a pile of shards. ~ Aleatha Romig,
958:It has been clear for some time now that we have to do more for domestic and external security. I am prepared for that. ~ Wolfgang Schauble,
959:I would urge that we all use a little bit of caution in dealing with an issue that is so vital to our national security. ~ Theodore Stevens,
960:Love consists in leaving the loved one space to be themselves while providing the security within which that self may flourish. ~ Tony Judt,
961:Never waste a good crisis...Don't waste it when it can have a very positive impact on climate change and energy security. ~ Hillary Clinton,
962:See the world. It's more fantastic than any dream made or paid for in factories. Ask for no guarantees, ask for no security. ~ Ray Bradbury,
963:Some people have a fear of rejecting all the security that comes with family, church and state. They become fundamentalists. ~ Harold Ramis,
964:The cross is the sign that stands in judgment on all the false security in our lives and restores faith in God alone. ~ Dietrich Bonhoeffer,
965:Too much concern about physical security and too little concern about spirituality is the hallmark of today's world. ~ Mata Amritanandamayi,
966:Under the old rules, Steve Bannon could never get a security clearance. But there could be a new rule, the Trump Rule. ~ Lawrence O Donnell,
967:Whatever is at the center of our life will be the source of our security, guidance, wisdom, and power.Life just has to go on! ~ Rick Warren,
968:Against other things it is possible to obtain security, but when it comes to death, we human beings all live in an unwalled city. ~ Epicurus,
969:....a person's true security consists not in his own persinal, solitary effort, but in the common integrity of mankind. ~ Fyodor Dostoyevsky,
970:As long as we believe that there is something that will permanently satisfy our hunger for security, suffering is inevitable. ~ Pema Ch dr n,
971:Challenging the integrity of the non-proliferation regime is a matter which can affect international peace and security. ~ Mohamed ElBaradei,
972:For me, privacy and security are really important. We think about it in terms of both: You can't have privacy without security. ~ Larry Page,
973:Is Stephen Harper using the imagined fear of widespread security threats to score political points before the next election? ~ Elizabeth May,
974:I think a loaded weapon aboard an airplane, whether its in the cargo section or in your overhead baggage, is a security issue. ~ Janice Hahn,
975:To love is to be vulnerable; and it is only in vulnerability and risk—not safety and security—that we overcome darkness. ~ Madeleine L Engle,
976:Under the new conditions of perfect comfort and security, that restless energy, that with us is strength, would become weakness. ~ H G Wells,
977:A lot of people can't be on their own. They get frightened. Isolation doesn't bother me at all. It gives me a sense of security. ~ Jimmy Page,
978:Even excessive shouting can damage a kid’s sense of security and contribute to mental health and behavioral issues down the road. ~ J D Vance,
979:If we didn't have Social Security, our seniors would live mostly in poverty. You'd have another 18 million people in poverty. ~ Michael Moore,
980:I glance up at the security camera staring us down. I wave, if you can call flipping Rex off waving. Nitro would be proud. ~ Tera Lynn Childs,
981:I'm going to spend a lot of time on Social Security. I enjoy it. I enjoy taking on the issue. I guess, it's the mother in me. ~ George W Bush,
982:It makes me feel like working non-stop: at least, on sets, the level of security gives me a bit of privacy. It's a relief. ~ Robert Pattinson,
983:It was either me or Confucius that said the journey of a thousand miles begins with a vicious ass raping at airport security. ~ Doug Stanhope,
984:Like all forms of collective security, multilateral sanctions require a unanimity rarely achieved in international politics. ~ Elliott Abrams,
985:My hopes are that I can give my children security, health, and the confidence to create the life they want and serve others. ~ Mallika Chopra,
986:The main thrust of the Social Security reform was to get the benefit structure in line with the realities of the Trust Funds. ~ George W Bush,
987:The secret of true prosperity is finding our security through our connection with the divine, with the spiritual world. ~ Christopher Penczak,
988:The source of our unease is the unfulfillable longing for a lasting certainty and security, for something solid to hold on to. ~ Pema Ch dr n,
989:they could talk and agree with themselves, the world was nailed down, and they loved it. They received a feeling of security. ~ Ralph Ellison,
990:They gave Mrs. Cortez a check for five hundred and eighty-three dollars—a month’s rent in advance and a month’s rent as security— ~ Ira Levin,
991:To believe is very dull. To doubt is intensely engrossing. To be on the alert is to live, to be lulled into security is to die. ~ Oscar Wilde,
992:Working together, America's military, Iraqi security forces and the Iraqi people have won a major battle in the war on terrorism. ~ Paul Ryan,
993:Afghanistan is one of the poorest countries on earth. Security issue or no security issue, there would need to be a focus on it. ~ Helen Clark,
994:All too often, the security of a mediocre present is more comfortable than the adventure of trying to be more in the future. ~ Anthony Robbins,
995:But wealth is a great means of refinement; and it is a security for gentleness, since it removes disturbing anxieties. ~ Donald Grant Mitchell,
996:Here at its extremities the terrified transients gathered, gazing out at the vast refulgent ocean for some sign of security. We ~ William Boyd,
997:He who is firmly seated in authority soon learns to think security, and not progress, the highest lesson in statecraft. ~ James Russell Lowell,
998:If the security personnel do their job properly, they just might cause you to miss your plane, thereby possibly saving your life. ~ Dave Barry,
999:If we admit God, must we admit Miracle? Indeed, indeed, you have no security against it. That is the bargain.” —C. S. LEWIS ~ Norman L Geisler,
1000:I just heard George W. Bush's new plan for airline security. From here on out, every plane will now have its own hockey dad. ~ David Letterman,
1001:I know when to retreat, when to lull my opponent into a false sense of security… and when to launch a final, victorious strike. ~ Nalini Singh,
1002:I take the market-efficiency hypothesis to be the simple statement that security prices fully reflect all available information. ~ Eugene Fama,
1003:I was looking for something to love, for I was in love with loving, and I hated security and a smooth way, free from snares. ~ Saint Augustine,
1004:Many people want only enough money to provide general security and some small measure of amusement, and are satisfied with that. ~ Elliott Kay,
1005:Social Security's future has gotten worse, and each year we delay reform adds to the cost we are pushing off onto our children. ~ John Goodman,
1006:That must be the chief reason to become sergeant; so you can assign yourself to monitor the most beautiful security risk. ~ James Alan Gardner,
1007:The security intended to the general liberty consists in the frequent election and in the rotation of the members of Congress. ~ James Madison,
1008:The security of the citizens of Israel, the future of the state of Israel, this is the Israeli governments responsibility. ~ Avigdor Lieberman,
1009:the sense of security people get from conformity cannot be understated; it is one of the great enemies of Personal Freedom. ~ Brendon Burchard,
1010:Today’s security scan is sponsored by Ringclean Fresh Wipes. Smell the freshness. Feel the freshness. Taste the freshness. ~ Barry J Hutchison,
1011:We discovered that safety and security are commodities you can sell in return for excitement but you can never buy them back. ~ Louise Doughty,
1012:We spend all of our energies trying to make ourselves feel better, trying to bury our fears, endlessly seeking security. ~ Henepola Gunaratana,
1013:We will never know what anyone is really like, until everyone has economic security and doesn't have to answer to anyone else. ~ Jacque Fresco,
1014:What a sense of security in an old book which  Time has criticised for us! ~ James Russell Lowell, My Study Windows, Library of Old Authors.,
1015:Anything that you do to increase job security automatically does work for you. It makes your employees a closer part of the unit. ~ Roger Smith,
1016:By 2003 he had begun to worry that powerful countries were pursuing their own security in ways that aggravated their peril. He ~ Samantha Power,
1017:Heroin", declared Durius Walker, Rydell's colleague in security at the Lucky Dragon on Sunset. "It's the opiate of the masses. ~ William Gibson,
1018:I knew no way other than eating to alleviate the loneliness, to fill in the spaces where comfort and security could have been. ~ Andie Mitchell,
1019:In the long course of history, having people who understand your thought is much greater security than another submarine. ~ J William Fulbright,
1020:In today's integrated world economy, ... eradicating poverty may contribute as much to U.S. security as eradicating terrorism. ~ Lester R Brown,
1021:It is difficult to give children a sense of security unless you have it yourself. If you have it, they catch it from you. ~ William C Menninger,
1022:Love means giving up - yielding my preferences, comfort, goals, security, money, energy, or time for the benefit of someone else. ~ Rick Warren,
1023:Mmmm, Kate, the Chief of Security. Sexy. Who better to guard my body then the woman who owns it?"
"Curran, I will punch you. ~ Ilona Andrews,
1024:Our whole life is taken up with anxiety for personal security, with preparations for living, so that we really never live at all. ~ Leo Tolstoy,
1025:People will live there, and never again will there be a curse of destruction. So Jerusalem will dwell in security. Zechariah 14:11 ~ Beth Moore,
1026:The most tragic form of loss isn't the loss of security; it's the loss of the capacity to imagine that things could be different. ~ Ernst Bloch,
1027:The number of unfinished construction projects has increased significantly. A lot of these are not covered with any security ~ Tatyana Golikova,
1028:The success of the future does not lie solely on the safety of the past, but relies broadly on the security of the present. ~ Israelmore Ayivor,
1029:The thirst of soul is sweeter than the wine of material things, and the fear of spirit is dearer than the security of the body. ~ Khalil Gibran,
1030:Violence as a way of gaining power... is being camouflaged under the guise of tradition, national honor [and] national security. ~ Alfred Adler,
1031:You can share a bathroom and pee while your partner is in the shower. It’s wonderful to have this security, but it is not erotic. ~ Marisa Peer,
1032:Your father leaving your family, that's your bedrock for all your future relationships and that's your security when you're a kid. ~ Naomi Judd,
1033:Your security from divine judgment doesn’t depend on living a perfect life but on being sheltered by the blood of Christ. ~ John F MacArthur Jr,
1034:Deleting welfare didn't eliminate poverty itself. We might as well have expected to conquer aging by overturning Social Security. ~ Thomas Frank,
1035:Had someone from Serbia flown a Greater Serbia flag in Tirana or Pristina, it would become an issue for the U.N. Security Council. ~ Ivica Dacic,
1036:[Politicans] are salespeople. Instead of rotisserie ovens they are selling this idea of preemptive war or social-security reforms. ~ Jon Stewart,
1037:Serene will be our days, and bright and happy will our nature be, when love is an unerring light, and joy its own security. ~ William Wordsworth,
1038:The economics of the security world are all horribly, horribly nasty and are largely based on fear, intimidation and blackmail. ~ Linus Torvalds,
1039:The media needs to begin demanding to hear Hillary Clinton's answer on how her policies will affect Americans and their security. ~ Donald Trump,
1040:Today Homeland Security Chief Tom Ridge lowered the terror alert from orange to yellow. Does anybody need 16 miles of duct tape? ~ Craig Kilborn,
1041:Where is the security for property, for reputation, for life, if the sense of religious obligation deserts the oaths . . . ? ~ George Washington,
1042:In 2010, 70 percent of federal tax revenue was consumed by three entitlement programs (Medicare, Medicaid, and Social Security) ~ Philip K Howard,
1043:Once a woman goes over 25, she prioritizes 'financial security' in a potential lover. Love and good looks are just a bonus. ~ Mokokoma Mokhonoana,
1044:Only In America can a renowned and devoted terrorism supporter like Peter King be the arbiter of national security and treason. ~ Glenn Greenwald,
1045:People need security of the mind. Why do they want democracy? Because it can give them freedom and security in a balanced way. ~ Aung San Suu Kyi,
1046:Salvation is a one-time decision, but finding satisfaction in Christ and living in the security of His promises is a daily process. ~ Renee Swope,
1047:security,” he asserted. “We must give more attention to intellectual leadership and a strengthening of the spiritual concept that ~ Kevin M Kruse,
1048:Social Security's not the hard one to solve. Medicare, that is the gorilla in the room, and you've got to put all of it on the table. ~ Joe Biden,
1049:The idea of achieving security through national armament is, at the present state of military technique, a disastrous illusion. ~ Albert Einstein,
1050:The privatization plan weakens Social Security and threatens our economic security by creating trillions of dollars in new debt. ~ Ruben Hinojosa,
1051:We have a president who apparently loves instability and revolution, and that is the antithesis of those two words, Social Security. ~ Glenn Beck,
1052:Your castles and strongholds shall have bars of iron and bronze, and as your day, so shall your strength, your rest and security, be. ~ Anonymous,
1053:Black men, Indian men, and gay men have all have something in common: They do not provide an economic security blanket for women. ~ Warren Farrell,
1054:Chase after money and security
and your heart will never unclench.
Care about people's approval
and you will be their prisoner. ~ Lao Tzu,
1055:Clearly security without values is like a ship without a rudder. But values without security are like a rudder without a ship. ~ Henry A Kissinger,
1056:Disarming Iraq is legal under a series of U.N. resolutions. Iraq is in flagrant violation of U.N. Security Council resolutions. ~ Jose Maria Aznar,
1057:I can certainly put myself in Israel's shoes. They are humans just like we are. They want peace and security inside their borders. ~ Mahmoud Abbas,
1058:I can hear my aunt's voice, telling me that if my security depends on a man's words or action, I've lost sight of my power. ~ Terese Marie Mailhot,
1059:I carry a weapon. I got a death threat a few years ago and was really scared. But I don't want bodyguards. I am my own security. ~ Miranda Lambert,
1060:I oppose registration for the draft... because I believe the security of freedom can best be achieved by security through freedom. ~ Ronald Reagan,
1061:It's important to recognize that you can't have 100 percent security and also then have 100 percent privacy and zero inconvenience. ~ Barack Obama,
1062:National security is the first duty of government but we are also committed to reversing the substantial erosion of civil liberties. ~ Theresa May,
1063:Our first and immutable commitment must be to the security of Israel, our only true ally in the Middle East and the only democracy. ~ Barack Obama,
1064:The heroic life is living the individual adventure (but) there's no security there. Nothing is exciting if you know the outcome. ~ Joseph Campbell,
1065:This moving away from comfort and security, this stepping out into what is unknown, uncharted and shaky - that's called liberation. ~ Pema Chodron,
1066:Those who know the normal life of the poor... will realize well enough that without economic security, liberty is not worth having. ~ Harold Laski,
1067:We should do nothing for revenge, but everything for security: nothing for the past; everything for the present and the future. ~ James A Garfield,
1068:When it comes to security, when it comes to ISIS, when it comes to the military, every single category I`m leading, like, by a lot. ~ Donald Trump,
1069:All we have to do now is to inform the public that the payment of social security taxes is voluntary and watch the mass exodus. ~ Walter E Williams,
1070:A stable Iraq at peace with its neighbors will remain elusive until we improve both the security and the economic environment in Iraq. ~ Tom Lantos,
1071:Beyond violating our laws, visa overstays, pose - and they really are a big problem, pose a substantial threat to national security. ~ Donald Trump,
1072:Don't live in the castles; freedom is in the fields! But I can also say: Don't live in the fields; security is in the castles! ~ Mehmet Murat ildan,
1073:Easter says that love is more powerful than death, bigger than the dark, bigger than cancer, bigger even than airport security lines. ~ Anne Lamott,
1074:Energy has become a national security issue and as technology continues to improve, there will be more debates like the one on Keystone. ~ Ed Royce,
1075:If you want to kill someone, you'd better pull off a perfect crime. Our security lies in the fact that that's damnably hard to do. ~ Claude Lelouch,
1076:I want to rob a bank so much - and I'm from the Midwest, so we have like one bank, no security cameras, and so I designed this thing. ~ Kellan Lutz,
1077:Life seems completely different, exciting and worthwhile. Your only hope and security is in knowing that they are a part of your life. ~ Bob Marley,
1078:Love consists in leaving the loved one space to be themselves while providing the security within which that self may flourish ~ Rainer Maria Rilke,
1079:The front line with ISIS isn't just in Iraq and Syria, it's in Kennedy Airport and the Rio Grande. Border security is national security. ~ Ted Cruz,
1080:The mind finds security and strength in religious and political patterns, and this is what gives stamina to the organizations. ~ Jiddu Krishnamurti,
1081:The most modern contemporary bureaucracies were those established by authoritarian states in their pursuit of national security. ~ Francis Fukuyama,
1082:There is no prospect that the United States will say to Israel, 'You do such and such and we'll not support you in your security. ~ George P Shultz,
1083:There is no security for any power unless it be a security in which its neighbours have an equal share. ~ Edward Grey 1st Viscount Grey of Fallodon,
1084:Those who suffer rest their security not on things, which often cannot be enjoyed and may soon be taken away, but rather on people. ~ Philip Yancey,
1085:I had been sort of a rising star - an athlete, a scholar, a leader. My dream was to become a high-level national security adviser. ~ Paula Broadwell,
1086:In the national security establishment, it is somewhat frowned upon for people to take extremely harsh partisan roles in campaigns. ~ John Heilemann,
1087:I will keep the promise I made to you to open a new era on the Korean peninsula, based on strong security and trust-based diplomacy. ~ Park Geun hye,
1088:On a planet that increasingly resembles one huge Maximum Security prison, the only intelligent choice is to plan a jail break. ~ Robert Anton Wilson,
1089:The reality is that Social Security is not a government handout. It is a benefit that is earned and paid for through hard work. ~ David Cay Johnston,
1090:There is, in fact, a strong case to be made that a prime concern of government is the security of state power from the population. As ~ Noam Chomsky,
1091:The TSA is under fire for major security lapses. The TSA has let through pipe bombs, knives, and the last three Nicolas Cage movies. ~ Conan O Brien,
1092:We live at the edge of the world, so we live on the edge. Kiwis will always sacrifice money and security for adventure and challenge. ~ Lucy Lawless,
1093:We must work together to save and strengthen Social Security not just for my father's generation but also for my daughters' generation. ~ John Thune,
1094:We will keep the promise of Social Security by taking the responsible steps to strengthen it - not by turning it over to Wall Street. ~ Barack Obama,
1095:When you are constantly in pursuit of security, you are in pursuit of death, because life is never secure. It doesn’t matter what you do, ~ Sadhguru,
1096:You cannot achieve environmental security and human development without addressing the basic issues of health and nutrition. ~ Gro Harlem Brundtland,
1097:After September 11, it became unpatriotic to question any homeland-security or defense spending, and that let things get out of control. ~ Jeff Flake,
1098:Americans need accurate information in order to consider Social Security reform. Too bad the media can't be counted upon to provide it. ~ Herman Cain,
1099:concessions to adversaries only end in self reproach, and the more strictly they are avoided the greater will be the chance of security. ~ Thucydides,
1100:C. S. Lewis put it, “If we admit God, must we admit Miracle? Indeed, indeed, you have no security against it. That is the bargain. ~ Norman L Geisler,
1101:I'd also remind people, if I were running for Presidency, that a long-term problem facing the budget is Social Security and Medicare. ~ George W Bush,
1102:I’m a little concerned about national security when two bad-ass Rangers can’t get their shit together enough to figure out how they feel. ~ Cat Grant,
1103:It is amazing where God will take you when you are willing to follow. Life is full of surprises when we choose mystery over security. ~ Erwin McManus,
1104:I've spent hundreds of thousands of pounds on the very best security and I can assure you my homes are as safe as the Bank of England. ~ Simon Cowell,
1105:Let the child see Mama and Daddy both at least once a day. Never quarrel or argue in front of a baby or a child-it destroys security. ~ L Ron Hubbard,
1106:My best advice for mental training is simply to create good habits, in order to build a sense of security and calm around you. ~ Alexander Gustafsson,
1107:Security is elusive. It's impossible. We all die. We all get old. We all get sick. People leave us. People change us. Nothing is secure. ~ Eve Ensler,
1108:The antidote to loneliness isn’t just being around random people indiscriminately, the antidote to loneliness is emotional security. ~ Benedict Wells,
1109:The national security issues are a really good window into the character of the person that somebody wants to have as commander in chief. ~ Tim Kaine,
1110:The prophet disdains those for whom God's presence is a comfort and security; to him it is a challenge, an incessant demand. ~ Abraham Joshua Heschel,
1111:The security of faith does not make us motionless or close us off, but sends us forth to bear witness and to dialogue with all people. ~ Pope Francis,
1112:Any society that would give up essential liberty to obtain a little security will deserve neither and lose both."
Ben Franklin ~ Benjamin Franklin,
1113:As Ben Franklin was alleged to have said, those who would trade a little liberty for a little security deserve neither and will lose both. ~ Brad Thor,
1114:Fortunately, thanks to the clear-headed and courageous actions of the security team, the only people killed were the jihad attackers. ~ Robert Spencer,
1115:Germany is prepared to agree to any solemn pact of non-aggression, because she does not think of attacking but only acquiring security. ~ Adolf Hitler,
1116:Having more exposure is kind of a bittersweet thing for me, honestly, because it's nice to have a little more job security in life now. ~ Ani DiFranco,
1117:In eight years alone—2010–2018—the DOE’s National Nuclear Security Administration collected enough material to make 160 nuclear bombs. ~ Michael Lewis,
1118:It isn't for the moment you are stuck that you need courage, but for the long uphill climb back to sanity, faith and security. ~ Anne Morrow Lindbergh,
1119:Like many Eastern European gangsters, he had been an official in the state security apparatus until the Communist regime collapsed. ~ Massimo Carlotto,
1120:Our policy is impossible to justify on rational grounds, which is why we’ve started invoking national security and other shibboleths. ~ James K Morrow,
1121:Senator Marco 'amnesty' Rubio, who has worst voting record in Senate, just hit me on national security - but I said don't go into Iraq. ~ Donald Trump,
1122:Women had little security other than jewelry, so even the poorest among us sported gold chains, earrings, and rings as their insurance. ~ Yangsze Choo,
1123:A medical revolution has extended the life of our elder citizens without providing the dignity and security those later years deserve. ~ John F Kennedy,
1124:An abundance mentality springs from internal security, not from external rankings, comparisons, opinions, possessions, or associations. ~ Stephen Covey,
1125:Contrary to many of the rumors and innuendo in circulation, I wholeheartedly believe that Obama views Israels security as absolute. ~ Edgar Bronfman Sr,
1126:[C]ourage is reckoned the greatest of all virtues; because, unless a man has that virtue, he has no security for preserving any other. ~ Samuel Johnson,
1127:Donald Trump is not a serious kind of candidate. We need someone that thinks this through. That can lead our country to safety and security. ~ Jeb Bush,
1128:...I don't want security - to be self-assured - I want to risk my heart in making your portrait and be paid the wages of your devotion... ~ John Geddes,
1129:I have an affection for a great city. I feel safe in the neighborhood of man, and enjoy the sweet security of the streets. ~ Henry Wadsworth Longfellow,
1130:I just spent 11 and a half months in a maximum-security jail, got shot five times, and was wrongly convicted of a crime I didn't commit. ~ Tupac Shakur,
1131:In the department of homeland security and each agency that's there there's a morale problem. It's a different morale problem in each one. ~ Steve King,
1132:It is almost a guarantee that in the pursuit of security you will become more insecure. Inherent in the quest for security is its undoing. ~ Eve Ensler,
1133:Maybe everyone is a little too reassuring that things are going to be OK to college graduates. It gives them a false sort of security. ~ Peter Dinklage,
1134:Nike actually has a pair of shoes called Air-Turbulence. Try getting past airline security wearing those. Might as well call them Air-Osama. ~ Jay Leno,
1135:Probably the only place where a man can feel really secure is in a maximum security prison, except for the imminent threat of release. ~ Germaine Greer,
1136:The security guy asked my name address and phone number, and then he asked me what was the difference between a condom and a cockpit. ~ Chuck Palahniuk,
1137:They say they seek security and quiet, the condition they call peace. Even as they speak they create the seeds of turmoil and violence. ~ Frank Herbert,
1138:5. We can depend on God, too. He’s there, and He cares. Our spiritual beliefs can provide us with a strong sense of emotional security. ~ Melody Beattie,
1139:Business is a competitive endeavor, and job security lasts only as long as the customer is satisfied. Nobody owes anybody else a living. To ~ Sam Walton,
1140:Christians can be confident about their growth in sanctification and eternal security because they are confident in the God who promises it. ~ John Owen,
1141:Entrepreneurs are not necessarily risk takers; it’s just that they define risk and security differently from the way other people do. ~ Chris Guillebeau,
1142:I think you'll be a great teacher," said Gary. That's his role in my life: blind encourager and ambassador of false senses of security. ~ Matthew Norman,
1143:It's very liberating for me to realize that I don't have to step up to the plate with a plot that involves the U.N. Security Council. ~ Jonathan Franzen,
1144:Jesus to me is somebody I can think about for security and confidence. Somebody I can revere in terms of bravery and in terms of courage. ~ Donald Trump,
1145:Name me a leader who has a better idea for homeland security than making us take off our shoes in airports and throw away our shampoo?
~ Lee Iacocca,
1146:National security begins with border security. Foreign terrorists will not be able to strike America if they cannot get into our country. ~ Donald Trump,
1147:Security guys break the Mac every single day. Every single day, they come out with a total exploit, your machine can be taken over totally. ~ Bill Gates,
1148:Since when had I become such a slave to security? Since when had my dream to be my own boss morphed into merely working for my dream boss? ~ Meg Donohue,
1149:The greatest source of security our children have in this world is a God-honoring, Christ-centered marriage between their parents. ~ Voddie T Baucham Jr,
1150:And it was kind of romantic thinking of him as my protector. I liked that. He was like a security blanket... only less fluffy. ~ Courtney Allison Moulton,
1151:As part of Social Security reform, I believe that private savings accounts are a part of it - along the lines that President Bush proposed. ~ John McCain,
1152:Clean energy is good for the environment, good for national security, and good for thousands of Americans who desire a rewarding career. ~ John Garamendi,
1153:Democrats talk about programs like Social Security or Medicare, but it's not clear to most voters what Democrats' core moral values are. ~ Jonathan Haidt,
1154:House Republicans want to pass a strong border security, illegal immigration bill. We want a bill. There is no ifs, ands or buts about it. ~ John Boehner,
1155:I have been taught by senior national security officials for decades never to bring them a problem without also suggesting a solution. ~ Richard A Clarke,
1156:It is inevitable, that eventually the people will demand absolute security from the state... And absolute security is absolute slavery. ~ Taylor Caldwell,
1157:Let us fight for a new world, a decent world that will give men a chance to work, that will give youth a future and old age a security. ~ Charlie Chaplin,
1158:Most people are looking for security, a nice, safe, prosperous future. And there's nothing wrong with that. It's called the American Dream. ~ Lee Iacocca,
1159:Rejection steals the security of all we thought was beautiful and stable and leaves us scared and fragile and more vulnerable than ever. ~ Lysa TerKeurst,
1160:The future of peace and prosperity that we seek for all the world's peoples needs a foundation of tolerance, security, equality and justice. ~ Kofi Annan,
1161:The moment one is on the side of life; peace and security drop out of consciousness. The only peace, the only security, is in fulfillment. ~ Henry Miller,
1162:The security of a cryptosystem must not depend on keeping secret the crypto-algorithm. The security depends only on keeping secret the key. ~ Simon Singh,
1163:A big part of the story is American imperialism, and the flip side of that is the building up of the national security state here at home. ~ Peter Kuznick,
1164:Amanda, whether you know it or not, I'm all the security you'll ever need. I would never let anyone harm a single hair on your head. ~ Stephanie Evanovich,
1165:Defeating Barack Obama becomes, in fact, a duty of national security. Because the fact is, he is incapable of defending the United States. ~ Newt Gingrich,
1166:God's mapmakers give no thought to their own desires or security. Instead, they eagerly spill themselves out as a fragrant offering to heaven. ~ Eric Ludy,
1167:Good days are such a mysterious gift that you dare not question them much, and the only problem is they give you a false sense of security. ~ Paul Monette,
1168:Haiti, like any place, has its security problems; it has a great challenge in terms of establishing a kind of globally acceptable rule of law. ~ Sean Penn,
1169:Hardworking men and women deserve not only job security, but also a paycheck when they need to take time off to care for a loved one. ~ Kirsten Gillibrand,
1170:In a world in which the total of human knowledge is doubling about every ten years, our security can rest only on our ability to learn ~ Nathaniel Branden,
1171:It isn't for the moment you are struck that you need courage, but for the long uphill climb back to sanity and faith and security. ~ Anne Morrow Lindbergh,
1172:It is the nature of human life to feed our ever-present security needs by displaying fear in the presence of anyone who is “different. ~ John Shelby Spong,
1173:it’s not owning property that gives you security; it just gives your creditors security. Real security comes from having a steady income, ~ Niall Ferguson,
1174:I would be shocked by the lack of security if we were not at Amity headquarters. They often straddle the line between trust and stupidity. ~ Veronica Roth,
1175:My best security is within the munitions of an immutable Jehovah, where His unalterable promises stand like giant walls of rock. ~ Charles Haddon Spurgeon,
1176:Never steal anything so small that you'll have to go to an unpleasant city jail for it instead of a minimum-security federal tennis prison. ~ P J O Rourke,
1177:The most profound security threat we face today is global warming....climate change has the capacity to change the way all of us live. ~ William J Clinton,
1178:There's, under Obama, an epidemic has developed of abusing national security laws to crack down on legitimate use of the First Amendment. ~ Julian Assange,
1179:We need to have every single school in America immediately deploy a protection program proven to work —and by that I mean armed security. ~ Wayne LaPierre,
1180:We've come to this dark time in which the new Gestapo of Homeland Security lurks here, where citizens are having their rights suspended. ~ Harry Belafonte,
1181:You're married? I notice you're not wearinga ring.'
'I can't, sadly. It's far too large. It bleeps when I go through airport security'. ~ Robert Harris,
1182:Every step of the way, I made a point to underpromise and overdeliver. In the long run, that's the only way to ensure security in any job. ~ Howard Schultz,
1183:From the economy to national security to government ethics, the Republican nominee promised once-in-a-lifetime change if he is elected Nov. 8. ~ Paul Gigot,
1184:He doesn’t know I know his secret. For a man so obsessed with security and privacy, he’s a surprisingly bad stalker. It’s almost endearing. ~ Chance Carter,
1185:I found out this summer how to hook up my Xbox 360 in the hotel and get past security. It took me a while to figure out, but I got it now. ~ Gilbert Arenas,
1186:In a world of complex threats, our security and leadership depends on all elements of our power - including strong and principled diplomacy. ~ Barack Obama,
1187:In the short run, the stock market is a voting machine; in the long run it is a weighing machine. —Benjamin Graham, Security Analysis (1934) ~ John C Bogle,
1188:In this shrinking world, it is futile to seek safety behind geographical barriers. Real security will be found only in law and in justice. ~ Harry S Truman,
1189:Israel is our ally and in that we've made a very strong commitment to support Israel, we will support Israel if her security is threatened. ~ George W Bush,
1190:I think that special relationship between the UK and the US has been an important part of security across the world particularly to the West. ~ Theresa May,
1191:It isn't for the moment you are struck that you need courage, but for that long uphill climb back to sanity and faith and security. ~ Anne Morrow Lindbergh,
1192:Priests are pretty much the same the world over. They seem to feel that their exclusive contact with God gives them a certain job security. ~ David Eddings,
1193:The information encoded in your DNA determines your unique biological characteristics, such as sex, eye color, age and Social Security number. ~ Dave Barry,
1194:Well, his head of security certainly did a good job. I love coconut, strawberry jam, and pina colada. So, yay to that intrusive bastard. ~ Georgia Le Carre,
1195:We stand with women by fighting for economic security, protecting access to health care and supporting women's leadership across the country ~ Barack Obama,
1196:What a sense of security in an old book which Time has criticised for us! ~ James Russell Lowell, My Study Windows 1871, chapter "Library of Old Authors'".,
1197:You're married? I notice you're not wearing a ring.'
'I can't, sadly. It's far too large. It bleeps when I go through airport security'. ~ Robert Harris,
1198:Energy security based on clean & reliable sources is essential for India's future. Nuclear energy has a key role in India's energy strategy. ~ Narendra Modi,
1199:General [James] Mattis has got a really intellectual mindset about how the United States should go about protecting its national security. ~ Peter R Mansoor,
1200:His security rests not only on what Alice does but also on what she thinks. Her fantasies are proof of her freedom and separateness, and that ~ Esther Perel,
1201:I could not really complain, because he had only given me his word of honor as security; I ought to have required of him something substantial. ~ Mark Twain,
1202:If her security rests upon her alliance with a man, another woman may take that man away; therefore women have no unity between themselves. ~ Frederick Lenz,
1203:It is to be feared that many believers lose their strength as Samson lost his locks, while sleeping on the lap of carnal security. ~ Charles Haddon Spurgeon,
1204:it’s worth the loss to have that memory. Big, bad, scary Joe Callahan, security to the stars, losing control and ripping away my underwear. ~ Kristen Ashley,
1205:It was this that frightened me--the sense that behind the grande amoureuse lay concealed a little bourgeoise who wanted security in love. ~ Ana s Nin,
1206:The first job of the president of the United States is to protect your safety and your security and the security and safety of your family. ~ Chris Christie,
1207:To achieve progress and development it is necessary to bring about co-ordination between liberty and security through Devotion. ~ Pandurang Shastri Athavale,
1208:To express yourself in freedom, you must die to everything of yesterday. From the 'old', you derive security; from the 'new', you gain the flow. ~ Bruce Lee,
1209:Andrew Saul is John Hall in a business suit. He's wrong on the war, on national security, immigration, abortion. He's Sue Kelly all over again. ~ Andrew Saul,
1210:Credit, that rare bird of security and peace, rested with none, but stood with upraised wings, ready to fly off at the first rumor of suspicion. ~ Mark Twain,
1211:I really believe that we don't have to make a trade-off between security and privacy. I think technology gives us the ability to have both. ~ John Poindexter,
1212:I simply cannot see how denying chemotherapy treatment for Palestinian children increases Israel's security or advances U.S. national interests. ~ Lois Capps,
1213:I think we will have to spend more on defense, for infrastructure, for extension of the broadband network and also for domestic security. ~ Wolfgang Schauble,
1214:Looking from a perch of relative security now, I find there to be a certain absolute beauty in the closeness that comes with shared suffering. ~ Jodi Daynard,
1215:nonattachment to results” was my long-sought Holy Grail, the middle path, the marriage of “the price of security” and “the wisdom of insecurity. ~ Dan Harris,
1216:Security against foreign danger is one of the primitive objects of civil society. It is an avowed and essential object of the American Union. ~ James Madison,
1217:The conscious mind is going to suggest the obvious, the cliché, because these things have offered the security of having succeeded in the past. ~ David Mamet,
1218:What is the most sacred duty and the greatest source of our security in a Republic? An inviolable respect for the Constitution and Laws. ~ Alexander Hamilton,
1219:What takes place in the Security Council more closely resembles a mugging than either a political debate or an effort at problem-solving. ~ Jeane Kirkpatrick,
1220:Counting obligations under Medicare and Social Security, the real debt of the United States is more than 10 times the reported national debt. ~ Addison Wiggin,
1221:Every step of the way, I made it a point to underpromise and overdeliver. In the long run, that's the only way to ensure security in any job. ~ Howard Schultz,
1222:If you care anything about your personal security, you should first of all pray for order and tranquility throughout the four quarters of the land. ~ Nichiren,
1223:If you run into trouble, just tell everybody that the security of the country requires a strong domestic Egyptian-cotton speculating industry. ~ Joseph Heller,
1224:If you want total security, go to prison. There you're fed, clothed, given medical care and so on. The only thing lacking... is freedom. ~ Dwight D Eisenhower,
1225:I was so nervous about the airport, going through security and doing all that gives me some serious fucking anxiety. ... Everyone seemed so chill. ~ Jen Wilde,
1226:Maintaining security in the present undermined her chances of broadening her security-enhancing network of relationships in the long run. ~ Stephen A Mitchell,
1227:Paul drew, however, little more than hostility from those identified as the Orthodox party, for whom any change threatened their security. ~ John Shelby Spong,
1228:Security is not a static thing. Security would only lie in a man's confidence in reaching his goals and, indeed, in his having goals to reach. ~ L Ron Hubbard,
1229:The only security for the American people today, or for any people, is to be found through the control of force rather than the use of force. ~ Norman Cousins,
1230:Today's global landscape is increasingly interconnected. China and the Middle East play critical roles towards international peace and security. ~ Rick Larsen,
1231:True security lies in the unrestrained embrace of insecurity - in the recognition that we never really stand on solid ground, and never can. ~ Oliver Burkeman,
1232:We’d like to see the security supervisor,” Isaiah said. “You mean Ed?” she said, as if they were making a silly mistake. “If that’s his name.” “What ~ Joe Ide,
1233:While we measure our own success in terms of our personal comfort and security, the universe measures our success by how much we have learned. ~ Caroline Myss,
1234:You will see things that other people never see. Most people never see these opportunities because they’re looking for money and security, ~ Robert T Kiyosaki,
1235:Even if you accept the theory of man-made climate change, wind turbines are a rotten way to reduce CO2 emissions, or to improve energy security. ~ Roger Helmer,
1236:He shall spurn fate, scorn death, and bear His hopes 'bove wisdom, grace and fear: And you all know, security Is mortals' chiefest enemy. ~ William Shakespeare,
1237:I didn’t comment on the large knife he slid under the pillow. We all have our security blankets in this world. Some are just sharper than others. ~ Rob Thurman,
1238:If I'm vice president of the United States and Donald Trump is president, we're going to put the safety and security of the American people first. ~ Mike Pence,
1239:I have a personal belief that you never have to give up liberty for security. You can still provide security without sacrificing our Bill of Rights. ~ Ron Paul,
1240:I just don't think we should go hellfire damnation around the globe freeing people, unless it is directly related to our own national security. ~ Gerald R Ford,
1241:My identity and my security are not in my spiritual progress. My identity and my security are in God’s acceptance of me given as a gift in Christ. ~ J D Greear,
1242:Security represents your sense of worth, your identity, your emotional anchorage, your self-esteem, your basic personal strength or lack of it. ~ Stephen Covey,
1243:Security, the chief pretense of civilization, cannot exist where the worst of dangers, the danger of poverty, hangs over everyone's head. ~ George Bernard Shaw,
1244:She stared him down. "Are you shitting me?"
"No, ma'am," Tucker said. "We at Homeland Security do not have a sense of humor of which we're aware. ~ J K Beck,
1245:Society needs to see science not as a luxury of funding but as a fundamental activity that drives enlightenment, economics, and security. ~ Neil deGrasse Tyson,
1246:The Bush Administration claims there is a Social Security crisis only to distract Americans from its serious mismanagement of the federal budget. ~ Mark Dayton,
1247:The reality of today from a cyber security point of view - I think some of the top people predict that the next big war is fought on cyber security. ~ Tim Cook,
1248:There are hard choices to be made in balancing the country's security and an individual's liberties. But it is a choice that has to be faced. ~ Charles Kennedy,
1249:There are more hackers breeding every day, and more brilliant minds are turning into hackers. Security has advanced, but so have hackers. ~ Michael Demon Calce,
1250:These days, government employees are better off in almost every area: pay, benefits, time off and security, on top of working fewer hours. ~ Mortimer Zuckerman,
1251:This is systems security for the Central Intelligence Agency. We would like to know why you are attempting to hack one of our classified databases. ~ Dan Brown,
1252:This is what terrorism is occupied with as well: making real, palpable violence surface in opposition to the invisible violence of security. ~ Jean Baudrillard,
1253:This sense of the safe-deposit box as a totem of responsible security inspired me to rent a box myself shortly after the birth of our first child…. ~ Eric Zorn,
1254:To live fully, one must be free, but to be free one must give up security. Therefore, to live one must be ready to die. How's that for a paradox? ~ Tom Robbins,
1255:A 2010 investigation found that 1,931 different corporations are working on intelligence, counterterrorism, or homeland security inside the US. ~ Bruce Schneier,
1256:A well-regulated militia, being necessary to the security of a free state, the right of the people to keep and bear arms shall not be infringed. ~ James Madison,
1257:Because I don't believe that it's really desirable to have security on a computer, I shouldn't be willing to help uphold the security regime. ~ Richard Stallman,
1258:But this had always been part of his work—no matter how vast the security apparatus behind you, the fact was that, in the end, you were alone. ~ Olen Steinhauer,
1259:Computer security was only as good as the programmer. The one who had fire walled this database has been good ---but not great. - Robert Puller ~ David Baldacci,
1260:If you've got a brand new administration coming into office you want to have, at the very least, a national security team in place on day one. ~ Mitch McConnell,
1261:It must be felt that there is no national security but in the nation's humble, acknowledged dependence upon God and His overruling providence. ~ Franklin Pierce,
1262:Military hardliners called me a 'security threat' for promoting peace in South Asia and for supporting a broad-based government in Afghanistan. ~ Benazir Bhutto,
1263:My body knew what to do, what it wanted , even though my brain was firing off so many warnings I felt like Homeland Security during a Code Red. ~ J Lynn,
1264:National security advisors are not there to be advocates, generally. They`re not there to be partisans, they`re not there to be ideologues. ~ Lawrence O Donnell,
1265:Noting the lack of crime or security in the Netherlands, the author asked a native who guarded a national landmark. He got the replay, "We all do. ~ Bill Bryson,
1266:One half of the world's people live on less than two dollars a day. This should concern our national security policy as well as our conscience. ~ Lee H Hamilton,
1267:Retirement security is often compared to a three-legged stool supported by Social Security, employer-provided pension funds, and private savings. ~ Sander Levin,
1268:That's what I am standing up for - Israel's future as a Jewish and democratic state living side-by-side in peace and security with its neighbors. ~ John F Kerry,
1269:The real secret to a life of abundance is to stop spending your days searching for security and to start spending your time pursuing opportunity. ~ Robin Sharma,
1270:Those who insist on transferring the Iranian nuclear dossier to the UN Security Council have received an additional argument for doing so. ~ Mahmoud Ahmadinejad,
1271:what economic benefit smokers provide for nonsmokers (they die earlier, leaving more Social Security and pension benefits for the rest of us), ~ Charles Wheelan,
1272:Whether the aim is in heaven or on earth, wisdom or wealth, the essential condition of its pursuit and attainment is always security and order. ~ Johan Huizinga,
1273:While the form of treachery varies slightly from case to case, liberals always manage to take the position that most undermines American security. ~ Ann Coulter,
1274:A little wisdom is indeed possible; but this blessed security have I found in all things, that they prefer--to DANCE on the feet of chance. ~ Friedrich Nietzsche,
1275:As long as NATO changes when the world is changing, we will be very important for the security of all our allies, including the United States. ~ Jens Stoltenberg,
1276:Authoritarian politicians cast their rivals as criminal, subversive, unpatriotic, or a threat to national security or the existing way of life. ~ Steven Levitsky,
1277:Cell phones were like those security guys in red shirts on old Star Trek: as soon as something started happening, they were always the first to go. ~ Jim Butcher,
1278:Information is power. Information is security. Plans made with imperfect information are fatally flawed, will fail or succeed on the toss of a coin. ~ Ann Leckie,
1279:I particularly recognize that reasonable people can disagree as to what that proper balance or blend is between privacy and security and safety. ~ John S Pistole,
1280:It is the first time in the history of Rwanda that political change in the highest leadership of the country has taken place in peace and security. ~ Paul Kagame,
1281:It's different for every writer. It's not a career for anyone who needs security. It's a career for gamblers. It's a career of ups and downs. ~ George R R Martin,
1282:My mother used to say that there are no strangers, only friends you haven't met yet. She's now in a maximum security twilight home in Australia ~ Barry Humphries,
1283:Our Special Operations units deal primarily with nontraditional security threats we call the ‘three forces’: terrorism, separatism, and extremism. ~ Marc Cameron,
1284:Social Security is unsustainable because it is not meeting the first order condition of a Ponzi scheme, namely expanding the pool of suckers. ~ Walter E Williams,
1285:The future of healthcare security should include flexibility from the federal government to allow us to serve the state's most vulnerable citizens. ~ Tom Vilsack,
1286:The security of the United States, which is so dependent on having accurate and timely intelligence, is not a Republican or a Democratic issue. ~ Saxby Chambliss,
1287:For he is not poor who has little; only he that desires much … and true security lies not in the things one has but in the things one can do without. ~ Og Mandino,
1288:If you don't care about money, Nina dear, call it by its other names."
"Kruge? Scrub? Kaz's one true love?"
"Freedom, security, retribution. ~ Leigh Bardugo,
1289:I say to the young: Do not stop thinking of life as an adventure. You have no security unless you can live bravely, excitingly, imaginatively. ~ Eleanor Roosevelt,
1290:I warm up. I do about 50 push-ups with my trainer and my security just to get pumped up before a show, get our energy up. And then I just go have fun. ~ Joe Jonas,
1291:Mr. A. gets the things done he wants done, and as by-products he gains confidence, a feeling of inner security, self-reliance, and more income. ~ David J Schwartz,
1292:My mother is my last point of security in relation to my past, and if that breaks, I will not ever have that type of pure love or pure attachment. ~ Shirin Neshat,
1293:One final bit of advice. The next time a senior administrator of the CIA tells you she has a national-security crisis Leave the bullshit in Cambridge. ~ Dan Brown,
1294:Peacekeeping works in some situations, but it very often needs other ingredients. Peacekeeping is not the aspirin of international security. ~ Jean Marie Guehenno,
1295:Resentment seems to have been given us by nature for a defense, and for a defense only! It is the safeguard of justice and the security of innocence. ~ Adam Smith,
1296:Rilke’s admonition: love consists in leaving the loved one space to be themselves while providing the security within which that self may flourish. As ~ Tony Judt,
1297:The American people deserve a budget that invests in the future, protects the most vulnerable among us and helps to create jobs and economic security ~ Carl Levin,
1298:The instant formal government is abolished, society begins to act. A general association takes place, and common interest produces common security. ~ Thomas Paine,
1299:The real secret to a life of abundance is to stop spending your days searching for security and to start spending your time pursuing opportunity. ~ Robin S Sharma,
1300:There is no such thing as a good nuclear weapons system. There is no way to achieve, in the sound sense, national security through nuclear weapons. ~ Herbert York,
1301:The security of every society must always depend, more or less, upon the martial spirit of the great body of the people.” —Adam Smith ~ Bathroom Readers Institute,
1302:The too perfect security of the Upper-worlders had led them to a slow movement of degeneration, a general dwindling in size strength and intelligence. ~ H G Wells,
1303:We need to expand Social Security to prevent the looming retirement crisis, and we can do it simply by asking billionaires to pay their fair share. ~ Robert Reich,
1304:For mere vengeance I would do nothing. This nation is too great to look for mere revenge. But for security of the future I would do every thing. ~ James A Garfield,
1305:For more than forty years, the United States Congress has shamelessly used payroll taxes intended for Social Security to fund big government spending. ~ Mike Pence,
1306:Hillary Clinton has jeopardized. Totally jeopardized national security by putting her e-mails on a private server, all to hide her corrupt dealings. ~ Donald Trump,
1307:I cannot however help repeating Piety, because I think it indispensible. Religion in a Family is at once its brightest Ornament & its best Security. ~ Samuel Adams,
1308:In the brief monthly reports of the Security Police, I only want figures on how many Jews have been shipped off and how many are currently left. ~ Heinrich Himmler,
1309:It will take hard work, but doing nothing on Social Security, for example, simply makes sure the system will go broke. It's time to make some reforms. ~ Joni Ernst,
1310:I was opposed to the U.S. involvement in Libya from the very start. President Obama has never made a compelling national security case on Libya. ~ Michele Bachmann,
1311:monotony is not to be worshipped as a virtue; nor the marriage bed treated as a coffin for security rather than a couch from which to rise refreshed. ~ Freya Stark,
1312:Oh, hey,” I said. “Looks like the whole Vegas Metro SWAT division is here. Plus the FBI, Homeland Security, and probably the IRS for good measure. ~ Craig Schaefer,
1313:People are afraid of things they don't understand. They don't know how to relate. It threatens their security, their existence, their career, image. ~ Bill Laswell,
1314:This is just another of an endless series of experiences over time that have demonstrated that the future of security prices is never predictable. ~ Mahatma Gandhi,
1315:Two increasing themes which appear to dominate our listening, reading and watching lives are propaganda and 'national security', or manufactured war. ~ John Pilger,
1316:We need an adequate defense, but every arms dollar we spend above adequacy has a long-term weakening effect upon the nation and its security. ~ Dwight D Eisenhower,
1317:With 3 percent of the worlds resources and 25 percent of the worlds demand, it is pretty obvious this country cannot drill its way to energy security. ~ Lois Capps,
1318:You’re a hothouse flower,” I tell her. “You can’t grow under natural conditions. You need adventure. And security and love in order to stay alive. ~ Krista Ritchie,
1319:Affairs Minister Sushma Swaraj and Afghan President Hamid Karzai held wide-ranging talks in Kabul on Wednesay on the political and security situation in ~ Anonymous,
1320:All the world’s principal security codes exploit trapdoor operations. Every time you shop online or extract cash from an ATM machine you are using them. ~ Anonymous,
1321:Djuna had wanted a life of desire and freedom, not luxury but beauty, not security but fulfillment, not perfection but a perfect moment like this one... ~ Ana s Nin,
1322:Heavily armed men in uniform were everywhere, but there was nothing you could call genuine security: as usual, too many guns, not enough intelligence. ~ Terry Hayes,
1323:I don't want to rip away the security that people finally have; 18 million people now have healthcare; preexisting conditions are no longer a bar. ~ Hillary Clinton,
1324:In America, the term younger poet is applied with chivalric liberality. It can be used to describe anyone not yet collecting a Social Security pension. ~ Dana Gioia,
1325:in a tan uniform were charging through the double door of his suite. Two security guards raced by, joining the others. Kasey grabbed her room key and, ~ Diane Capri,
1326:It is security that I crave and money provides security. What is that old line about money? "Some is good, more is better and too much is just right." ~ Neil Oliver,
1327:Security is a big concern on the social web. People are going to try to destroy social media just like they are trying to breach data in other areas. ~ Sandy Carter,
1328:The fastest growing occupation in the private sector is security guards. The fastest growing occupation in the public sector is prison guards. (1992) ~ Robert Reich,
1329:The only thing more dangerous than a developer is a developer conspiring with Security. The two working together gives us means, motive, and opportunity. ~ Gene Kim,
1330:The too perfect security of the Upper-worlders had led them to a slow movement of degeneration, a general dwindling in size, strength, and intelligence. ~ H G Wells,
1331:The UN now and world government eventually must serve one single goal—the guarantee of the security, tranquillity, and the welfare of all mankind. ~ Albert Einstein,
1332:When I look at Social Security, I consider it the most important social program in the United States, arguably the most successful program in the world. ~ Jim Leach,
1333:A just security to property is not afforded by that government, under which unequal taxes oppress one species of property and reward another species. ~ James Madison,
1334:and several bystanders—the innkeeper, assorted security personnel, probably a nurse or two, all terrified into competency by my grandfather’s rage—stood ~ T a Obreht,
1335:And we need to maintain our foothold in the fight against terrorism and terrorist groups and respond to any degradation of Iraqi security or stability. ~ Rick Larsen,
1336:I'm driving so it's your job to make small talk."
"Oh."
"Not that small." He waved at the security guard as we left the club. "Make medium talk. ~ Marta Acosta,
1337:Issues are won based upon whether or not you can keep this economy strong; elections are won based upon economic issues and national security issues. ~ George W Bush,
1338:It is a virtual reflex for governments to plead security concerns when they undertake any controversial action, often as a pretext for something else. ~ Noam Chomsky,
1339:Our approach [to global security] has changed by the way we've elevated development. The biggest lesson is to recognize global responsibility. ~ Anne Marie Slaughter,
1340:Poverty and the rule of race that is called apartheid drive the Transkeian migrant from security on the land to work in the cities, and then back again. ~ Ruth First,
1341:Revolutionaries don't get job security. They compete with rats for cheese and with strays for shelter--after the big bullets make feet out of their knees. ~ Ruby Dee,
1342:The correct use of a strong cipher is a clear boon to sender and receiver, but the misuse of a weak cipher can generate a very false sense of security. ~ Simon Singh,
1343:The more security you seek, the less freedom you have. The people with the most security are in jail. That is why it is called ‘maximum security. ~ Robert T Kiyosaki,
1344:The security of people and nations rests on four pillars - food, energy, water and climate. They are all closely related, and all under increasing stress ~ Tom Burke,
1345:They're doing everything they can to tighten security at the White House. Today, on the roof of the White House, they added one of those fake owls. ~ David Letterman,
1346:We like security: we like the pope to be infallible in matters of faith, and grave doctors to be so in moral questions so that we can feel reassured. ~ Blaise Pascal,
1347:We will strengthen our security by building missile defense, restoring our military might, and standing by and strengthening our intelligence officers. ~ Mitt Romney,
1348:When I come into the theatre I get a sense of security. I love an audience. I love people, and I act because I like trying to give pleasure to people. ~ Vivien Leigh,
1349:Every corporate security may be best viewed, in the first instance, as an ownership interest in, or a claim against, a specific business enterprise. ~ Benjamin Graham,
1350:For example, the vast majority of security break-ins occur as a result of problems with known fixes. With an automated system, you can keep up to date. ~ Ben Horowitz,
1351:I considered the prevention of war as the test of our security policy; in addition to being able to rapidly and forcefully end any war forced upon us. ~ Yitzhak Rabin,
1352:It seems that 'national security' is the root password to the Constitution. As with any dishonest superuser, the best countermeasure is strong encryption. ~ Phil Karn,
1353:It's nice, it gives you a feeling of security so that if something breaks we know we can always call a guy over and he'll bring a drill or something. ~ Brooke Shields,
1354:I was a member of the Armed Services Committee for 18 years. I spent a big chunk of my life studying national security issues and our role in the world. ~ John Kasich,
1355:I wouldn't give up on Russia. I think they have legitimate security concerns from Islamic fundamentalism, not only on their border but in their country. ~ John Bolton,
1356:National security rests on the credible threat of a form of warfare universally condemned since the Dark Ages, the wholesale slaughter of noncombatants. ~ George Will,
1357:Obama was particularly offended, as he put it, that “the National Security Agency has been spying on Americans without judicial approval.” Justifying ~ Jeremy Scahill,
1358:Oh sons of Arabs and the Arab Gulf, rebel against the foreigner...Take revenge for your dignity, holy places, security, interests and exalted values. ~ Saddam Hussein,
1359:Regression is defined here as a psychological retreat to a prior stage of development in order to reduce fear and foster an illusion of security. ~ Robert W Firestone,
1360:The national security state has many unfair and cruel weapons in its arsenal, but that of junk science is one which can be fought and perhaps defeated. ~ Aldrich Ames,
1361:The Senator from Massachusetts has given us ample grounds to doubt the judgment and the attitude he brings to bear on vital issues of national security. ~ Dick Cheney,
1362:We are not inviting—we are guarded. Most of our energy is spent trying to hide our true selves, and control our worlds to have some sense of security. ~ John Eldredge,
1363:You must be conscious of being healthy if you are to know what health is. You must be conscious of being secure if you are to know what security is. ~ Neville Goddard,
1364:All too many others have been more cautious than courageous and have remained silent behind the anesthetizing security of stained-glass windows ~ Martin Luther King Jr,
1365:But the bubble had popped. The first person had disobeyed, and one by one those around them had realized their security was thin gauze atop a gushing cut. ~ Sean Platt,
1366:I'd actually love to think that I could trust Kerry on national security. But the only way I could do that, at this point, would be via self-delusion. ~ Glenn Reynolds,
1367:I have had to pay a price for leaving Islam and for speaking out. I have to pay for round-the-clock security because of the death threats against me. ~ Ayaan Hirsi Ali,
1368:It is outrageous that the United States today remains dependent on Putin's Russia, particularly for a national security space launch program," McCain said. ~ Anonymous,
1369:It takes a lot of courage to release the familiar and seemingly secure, to embrace the new. But there is no real security in what is no longer meaningful. ~ Alan Cohen,
1370:Long hair is a security blanket for me. I cut it short a few years ago and I really never want to do that again. When I do cut it, I cut it myself. ~ Alanis Morissette,
1371:Meaningful progress toward social justice cannot be made in sclerotic education systems that put adults’ job security before children’s civil rights. ~ Arthur C Brooks,
1372:No matter how you cut it, this real debate on personal accounts is about the legitimacy of Social Security; it's not about the solvency of Social Security. ~ Joe Biden,
1373:Nothing is going on."

"Hey, you're the one who tried to knock a security camera off the side of a building. That's a lot of pent-up frustration. ~ Myra McEntire,
1374:The fact is that people are good, Give people affection and security, and they will give affection and be secure in their feelings and their behavior. ~ Abraham Maslow,
1375:The only way to live in any true security is to live so close to the bottom that when you fall you do not have far to drop, you do not have much to lose. ~ Dorothy Day,
1376:The Wild, Wild West, this cyberterrorism. This new, scary frontier. Anyone sitting on a couch in his underwear could undermine the security of a nation. ~ Bill Clinton,
1377:We must allow the Word of God to confront us, to disturb our security, to undermine our complacency and to overthrow our patterns of thought and behavior. ~ John Stott,
1378:When leaders fail to empower others, it is usually due to three main reasons: 1. Desire for Job Security 2. Resistance to Change 3. Lack of Self-Worth ~ John C Maxwell,
1379:Without sound conservation and management measures, fisheries will quickly become depleted and a basic component of global food security will be lost. ~ Sigmar Gabriel,
1380:A nation has the right to defend itself, but when it comes to the broader issue of peace and security, the legitimacy rests only with the Security Council. ~ Kofi Annan,
1381:Earthly goods deceive the human heart into believing that they give it security and freedom from worry. But in truth, they are what cause anxiety. ~ Dietrich Bonhoeffer,
1382:Even in the common affairs of life, in love, friendship, and marriage, how little security have we when we trust our happiness in the hands of others! ~ William Hazlitt,
1383:Iran is the greatest national security threat America faces. Russia does continue to battle us in the U.N. time and time again. I have clear eyes on this. ~ Mitt Romney,
1384:It's strange that the newspapers don't see a connection between their false revelations about my private life and my need for seclusion and security. ~ Agnetha Faltskog,
1385:Remember, the security and happiness you are seeking is not in your material possessions, your degrees, or relationships. It is much closer than you think. ~ Mabel Katz,
1386:There is an obligation both moral, but also legal, I believe, against a reporter disclosing something which would so severely compromise national security. ~ Peter King,
1387:The sanctions may be imposed only by the decision of the UN Security Council. A unilateral imposition of sanctions is a violation of international law. ~ Vladimir Putin,
1388:The Ukrainian authorities said Thursday that former President Viktor F. Yanukovych and Russian security agents were involved in plans for elite police units ~ Anonymous,
1389:The word of a gentleman is as good as his bond — sometimes better; as in the present case, where his bond might prove but a doubtful sort of security. ~ Charles Dickens,
1390:We seek love in relationships, peace in security, and joy in material things...but these feelings are divine and not dependent on any outer circumstances. ~ Vivian Amis,
1391:When the fear of losing money and failing becomes too painful inside, a fear we both have, he chooses to seek security and I choose to seek freedom. ~ Robert T Kiyosaki,
1392:You've just got to do what you think is right, and just make the decisions based upon noble causes. And a noble cause is peace and security and freedom. ~ George W Bush,
1393:As policy makers, our interest isn't necessarily the narrow interests of specific corporations but the national security interests of the United States. ~ Carlos Curbelo,
1394:Britain, Europe's second largest economy, a member of the G-7 and the UN Security Council, wants to leave the EU. That weakens us and it weakens Britain. ~ Martin Schulz,
1395:Compassionate people are geniuses in the art of living, more necessary to the dignity, security, and joy of humanity than the discoverers of knowledge. ~ Albert Einstein,
1396:He shall spurn fate, scorn death, and bear
His hopes 'bove wisdom, grace and fear:
And you all know, security
Is mortals' chiefest enemy. ~ William Shakespeare,
1397:If I were dead, then nobody in England would have to fuss about the cost of my security and whether or not I merited such special treatment for so long. ~ Salman Rushdie,
1398:I have some security that could protect me against provocations but of course there are more terrible actions that could not be stopped by any security. ~ Garry Kasparov,
1399:In the movies, killers are omnipotent. In real life, they are not. They don’t escape from handcuffs in the middle of a high-security federal penitentiary. ~ Harlan Coben,
1400:Job security is a myth...it is also risky for self-employed people in my opinion. If they get sick, injured, or die, their income is directly impacted. ~ Robert Kiyosaki,
1401:Let someone take away any sense of privacy or security you might still possess. Then have someone use that insecurity to satisfy their own twisted curiosity. ~ Jay Asher,
1402:No sustainable development, environmental harmony or lasting security will happen if we are unable to eradicate hunger and extreme inequality ~ Luiz Inacio Lula da Silva,
1403:Of course my jokes are in poor taste, inappropriate, and confused; they reveal my lack of security. But that is because I have no respect for myself. ~ Fyodor Dostoevsky,
1404:President George W. Bush is the first American president to call openly for two-states, Israel and Palestine, living side by side in peace and security. ~ Lee H Hamilton,
1405:The largest single contributor to Iraq's security is that effort of Iraqi people who continue to step forward to join the various Iraqi security forces. ~ Craig L Thomas,
1406:There is a comfort in conformity, a security in control, that is appealing. There is a thrill in domination, and we are all secretly attracted to violence. ~ Tom Robbins,
1407:We have to yet really seriously debate the constitutional issues and whether or not we're willing to give up more freedom in order to have more security. ~ William Cohen,
1408:What is novel is a president who wishes to maintain, while in office, a personal security force which during his campaign used force against dissenters. ~ Timothy Snyder,
1409:What’s in that backpack, by the way? You’re always guarding it like it holds national security secrets or something. (Tory) Dirty underwear. (Acheron) ~ Sherrilyn Kenyon,
1410:He let himself into the security office and scanned the wall of surveillance monitors. Parking lot clear. Corridors empty. Cafeteria empty. Heart empty. ~ Kerrelyn Sparks,
1411:I am on record as saying that we need to put more money into the Social Security Trust Fund. That's part of my commitment to raise taxes on the wealthy. ~ Hillary Clinton,
1412:I have social anxiety. It's easier up on stage because there's security in being there. When I'm off stage I'm trying not to be a manic freak. I'm quite shy. ~ Sia Furler,
1413:It is only natural that for any statesman at the helm of any government the question of his country's security should be a concern of the utmost importance. ~ Eisaku Sato,
1414:It's time to stop the raid on the Social Security trust fund and start allowing Americans to invest their Social Security taxes in personal savings accounts. ~ Mike Pence,
1415:Mr Lysander Rief looks like someone who is far more at ease occupying the cold security of the dark; a man happier with the dubious comfort of the shadows. ~ William Boyd,
1416:Of course my jokes are in poor taste, inappropriate, and confused; they reveal my lack of security. But that is because I have no respect for myself. ~ Fyodor Dostoyevsky,
1417:The financial security of older training analysts in power and the distraction from the ordinary uncertainties of aging may play an important role here. ~ Otto F Kernberg,
1418:There is one safeguard known generally to the wise, which is an advantage and security to all, but especially to democracies as against despots - suspicion. ~ Demosthenes,
1419:The true credit for our safety and security goes to our men and women who are serving in places like Iraq and Afghanistan in the global war on terrorism. ~ Asa Hutchinson,
1420:We have become dangerously comfortable- believers ooze with wealth and let their addictions to comfort and security numb the radical urgency of the gospel. ~ Francis Chan,
1421:An evil exists that threatens every man, woman, and child of this great nation. We must take steps to ensure our domestic security and protect our homeland. ~ Adolf Hitler,
1422:A transitional government is the beginning of a transfer of sovereignty. It's a question of Iraqi security and moving forward with the political process. ~ Joschka Fischer,
1423:Happiness is the harvest of a quiet mind. Anchor your thoughts on peace, poise, security and divine guidance and your mind will be productive of happiness. ~ Joseph Murphy,
1424:Love is the most durable power in the world. This creative force is the most potent instrument available in mankind's quest for peace and security. ~ Martin Luther King Jr,
1425:Our Hispanic community needs to understand how important the Social Security system is for not only its retired citizens, but also its disabled workers. ~ Grace Napolitano,
1426:The realities of the modern global economy require government to play a substantial role in ensuring the national and economic security of the people. ~ Matthew Continetti,
1427:There are a whole variety of reasons I want to be attorney general, a whole variety of things that I do as attorney general that go beyond national security. ~ Eric Holder,
1428:There can be no sense of security in your existence when it depends upon outside factors, for the unpredictable changes of reality can never be controlled. ~ Deepak Chopra,
1429:We are the only people on Earth asked to guarantee the security of our occupier...while Israel is the only country that calls for defense from its victims. ~ Hanan Ashrawi,
1430:We must allow the Word of God to confront us, to disturb our security, to undermine our complacency and to overthrow our patterns of thought and behavior. ~ John R W Stott,
1431:We, Russia, are prepared to work with others. I am convinced that stability and security in Europe cannot be considered without taking Russia into account. ~ Boris Yeltsin,
1432:We will not enjoy security without development, we will not enjoy development without security, and we will not enjoy either without respect for human rights. ~ Kofi Annan,
1433:And it is no less true, that personal security and private property rest entirely upon the wisdom, the stability, and the integrity of the courts of justice. ~ Joseph Story,
1434:Donald Trump has made it clear, he wants to make a priority of national security, rebuilding our military, but he wants to do it in a fiscally responsible way. ~ Mike Pence,
1435:For security you need more soldiers, you need more policemen, you need more vehicles, you need more planes, you need more guns, you need more communications. ~ Alvaro Uribe,
1436:I’d be able to bypass the gate’s security wards without a problem, which was good. I didn’t much feel like being blown up again. Its charm wears off quickly. ~ Tim Marquitz,
1437:In the conventional wisdom of conservatives, the modern search for security is regularly billed as the greatest single threat to economic progress. ~ John Kenneth Galbraith,
1438:It isn't for the moment you are struck that you need courage, but for the long uphill climb back to sanity and faith and security. Anne Morrow Lindbergh ~ Albert Schweitzer,
1439:I told John Kerry and General Allen, the Americans’ expert, ‘We live here, I live here, I know what we need to ensure the security of Israel’s people.’ ~ Benjamin Netanyahu,
1440:It turns out Dimitri had a friend, who had a friend, and despite the best security in the Moroi world, we managed to get into the Court's prison facilities. ~ Richelle Mead,
1441:Michael Flynn not exactly cut from that cloth. Someone who has very strong views about almost everything in the realm of national security and defense. ~ Lawrence O Donnell,
1442:People think of security as a noun, something you go buy. In reality, it's an abstract concept like happiness. Openness is unbelievably helpful to security. ~ James Gosling,
1443:The security light made me feel safe, though I knew that was an illusion. If there's light, you can just see what's coming for you a little more clearly. ~ Charlaine Harris,
1444:We have now just enshrined, as soon as I sign this bill, the core principle that everybody should have some basic security when it comes to their healthcare. ~ Barack Obama,
1445:What is novel is a president who wishes to maintain, while in office, a personal security force which during his campaign used force against dissenters. As ~ Timothy Snyder,
1446:What’s in that backpack, by the way? You’re always guarding it like it holds national security secrets or something. (Tory)
Dirty underwear. (Acheron) ~ Sherrilyn Kenyon,
1447:A modern, autonomous, and thoroughly trained Air Force in being at all times will not alone be sufficient, but without it there can be no national security. ~ Henry H Arnold,
1448:An expectation is a shelter - it gives you a security feeling. So when someone breaks your expectations he is breaking your shelter, making you insecure, fearful. ~ Rajneesh,
1449:But clearly the fact that we've gone from zero Iraqi security forces on duty in May to up to 200,000 today is an enormous accomplishment, but it's not enough. ~ John Abizaid,
1450:I have to say that elections, even in the most peaceful region, always make the hardest time for regional state institutions, including security structures. ~ Akhmad Kadyrov,
1451:I nearly forgot something my old father told me not long before he died. He said the threshold of insult is in direct relation to intelligence and security. ~ John Steinbeck,
1452:In fact, you don’t have a soul, you are your own soul. In other words, you are not this book, your social security card, your body or your mind. You are you. ~ L Ron Hubbard,
1453:is Shaun Mason activating security profile Pardy. Something’s wrong with Brenda, we’re out of Mister Pibb, and hunting season’s here. Now let’s go to Hollywood. ~ Mira Grant,
1454:I think most human beings are dualistic thinkers. It gets them through the day. It gives them a sense of superiority and security - that's what the ego wants. ~ Richard Rohr,
1455:I will not cut benefits. I want to enhance benefits for low-income workers and for women who have been disadvantaged by the current Social Security system. ~ Hillary Clinton,
1456:[Liberty] considers religion as the safeguard of morality, and morality as the best security of law and the surest pledge of the duration of freedom. ~ Alexis de Tocqueville,
1457:One of the things that has been truly incredible to observe though, is the amount of venture investment that has gone into early stage security technology. ~ John W Thompson,
1458:Our nation has both an obligation and self-interest in facing head-on the serious environmental, economic and national security threat posed by global warming. ~ John McCain,
1459:Practise your confidence tricks on the street and you risk getting shot by trigger-happy security guards; do it in the office and you get put on the board. ~ James Scudamore,
1460:The failure of the United Nations - My failure is maybe, in retrospective, that I was not enough aggressive with the members of the Security Council. ~ Boutros Boutros Ghali,
1461:There will be no recognition of Israel and there will be no security for the occupation and colonization forces. Resistance will remain our strategic option. ~ Khaled Mashal,
1462:The world oscillates endlessly between pleasure and pain,” she continued. “There can be no security, no stability here. These are to be found in God alone. ~ Radhanath Swami,
1463:Unless the Security Council is restored to its pre-eminent position as the sole source of legitimacy on the use of force, we are on a dangerous path to anarchy. ~ Kofi Annan,
1464:We are experiencing a level-one security breach and all elevators have been temporarily shut down. Please enjoy a hot cup of tea while we wait for clearance. ~ Marissa Meyer,
1465:We continue to believe that a two-state solution is the only way for the long-term security of Israel, if it wants to stay both a Jewish state and democratic. ~ Barack Obama,
1466:We need to take steps to strengthen and mend Social Security so that its promise of a secure retirement is just as real for seniors in the future as it is today. ~ Herb Kohl,
1467:'Green' issues at last are attracting serious attention, owing to critically important links between the environment and the economy, health, and our security. ~ Sylvia Earle,
1468:I am convinced that there exists a tradable security in the Western world that would be 100% correlated with the changes in temperature in Ulan Bator, ~ Nassim Nicholas Taleb,
1469:I drove her to the airport. She kissed me goodbye. She told me that she loved me more than life itself. Then she skipped through security. She never came back. ~ Gayle Forman,
1470:In a world where lifelong employment in the same job is a thing of the past, creativity is not a luxury. It is essential for personal security and fulfillment. ~ Ken Robinson,
1471:In the long term, Israel's security rests on only one pillar: the Palestinians' acceptance of the country. It isn't the atom bomb that makes Israel secure. ~ Daniel Barenboim,
1472:In this time of challenge, I am asking the prime minister to address Congress on the grave threats radical Islam and Iran pose to our security and way of life. ~ John Boehner,
1473:I was very concerned that President Bush is still trying to frighten or scare the American people with respect to the condition of the Social Security system. ~ Paul Sarbanes,
1474:The cultivated mind is the guardian genius of democracy. It is the only dictator that free man acknowledges. It is the only security that free man desires. ~ Mirabeau B Lamar,
1475:The fine print in the President's Social Security proposal is that all present and future workers under age 55 will have their promised retirement benefits cut. ~ Mark Dayton,
1476:If we have access to nuclear energy, that adds to our maneuverability in ensuring energy security as India marches on, on the path to accelerated development. ~ Manmohan Singh,
1477:In the hacking world, security is more of a response than a proactive measure. They wait for hackers to attack and then they patch, based on the attacks. ~ Michael Demon Calce,
1478:It's clear that agriculture, done right, is the best means the world has today to simultaneously tackle food security, poverty and environmental degradation. ~ Irene Rosenfeld,
1479:...let us continue to work together to develop and nurture in future generations a culture of human rights, to promote freedom, security and peace in all nations. ~ Kofi Annan,
1480:Men were indeed more foolish and more cruel than the beasts of the jungle! How fortunate was he who lived in the peace and security of the great forest! ~ Edgar Rice Burroughs,
1481:My time in the Army gave me an understanding for what it takes to provide for our national security and what it means to our service members and their families. ~ James Inhofe,
1482:Once writing has become your major vice and greatest pleasure only death can stop it. Financial security then is a great help as it keeps you from worrying. ~ Ernest Hemingway,
1483:President Barack Obama benefits from the shared experience and wisdom of top national security and foreign policy advisers, many of them career professionals. ~ Chris Matthews,
1484:scholars and academics invited for conferences or seminars require security clearance before they will be given visas. Corporate executives and businessmen do not. ~ Anonymous,
1485:We have to make sure that we are a force for peace and stability in the world, and that we're prepared to defend freedom and the security of the American people ~ Thad Cochran,
1486:We should find other platforms, other forums for that [foreign policy], and there are plenty of them, including, for example, the UN and the Security Council. ~ Vladimir Putin,
1487:When the material, psychological and spiritual dimensions are brought into balance, life becomes whole, and this union brings feelings of comfort and security. ~ Deepak Chopra,
1488:A fitting external security environment could also play an important role in promoting social consensus and institutionalization towards democratization. ~ Recep Tayyip Erdogan,
1489:Anyone who has had the experience of going through American security checks knows the purpose of these checks is not to make you safer; it's just to annoy you. ~ Salman Rushdie,
1490:Boone Pickens should be commended for his leadership on American energy security, and for bringing Ted Turner along on some sensible approaches to enhancing it. ~ Frank Gaffney,
1491:From 1836, down to last year, there is no proof of the Government having any confidence in the duration of peace, or possessing increased security against war. ~ Richard Cobden,
1492:I am concerned for the security of our great Nation; not so much because of any treat from without, but because of the insidious forces working from within. ~ Douglas MacArthur,
1493:If we want to boost border security, we have to help law enforcement agencies beef up their resources to meet this demand. We cannot have one without the other. ~ Henry Cuellar,
1494:I've been involved with law enforcement for some time. My father was in law enforcement. I went through the training for Homeland Security. I enjoy it very much. ~ Lou Ferrigno,
1495:Laws to suppress tend to strengthen what they would prohibit. This is the fine point on which all legal professions of history have based their job security. ~ Alexander Herzen,
1496:Most museums - with all their burdens to pay for exhibitions, administration, and security - really don't have any money really to acquire art, with few exceptions. ~ Eli Broad,
1497:Social Security is meant to be - to make sure that no one who's worked hard, and played by the rules, and paid into the system grows old in poverty in America. ~ Chris Christie,
1498:Sustenance for the infant and child is more than alimentary nourishment. The child needs love, security, narcissistic supplies -- however one may describe it. ~ Alexander Lowen,
1499:The American people have come to rely on the government for their security. They will find out how incompetent the government is when they no longer have security. ~ James Cook,
1500:The hard fact is that so long as Saddam remains in power, he threatens the well-being of his people, the peace of his region, and the security of the world. ~ William J Clinton,

IN CHAPTERS [233/233]



   62 Integral Yoga
   19 Poetry
   19 Philosophy
   18 Occultism
   17 Christianity
   13 Psychology
   10 Fiction
   5 Yoga
   4 Baha i Faith
   2 Science
   2 Integral Theory
   1 Hinduism
   1 Alchemy


   67 Sri Aurobindo
   36 The Mother
   26 Satprem
   11 Carl Jung
   10 Saint Augustine of Hippo
   9 H P Lovecraft
   9 Friedrich Nietzsche
   7 Nolini Kanta Gupta
   7 Aleister Crowley
   5 Saint Teresa of Avila
   5 Jordan Peterson
   5 James George Frazer
   5 Baha u llah
   4 Pierre Teilhard de Chardin
   3 William Wordsworth
   3 Thubten Chodron
   3 Swami Krishnananda
   3 Plotinus
   3 Plato
   2 Walt Whitman
   2 Sri Ramakrishna
   2 Rudolf Steiner
   2 John Keats
   2 Jean Gebser
   2 Franz Bardon


   18 The Synthesis Of Yoga
   11 Record of Yoga
   10 City of God
   9 Lovecraft - Poems
   6 Thus Spoke Zarathustra
   6 Agenda Vol 03
   5 The Practice of Psycho therapy
   5 The Life Divine
   5 The Golden Bough
   5 Savitri
   5 Maps of Meaning
   5 Agenda Vol 04
   4 Magick Without Tears
   4 Agenda Vol 08
   4 Agenda Vol 06
   3 Wordsworth - Poems
   3 Twilight of the Idols
   3 The Study and Practice of Yoga
   3 The Interior Castle or The Mansions
   3 The Human Cycle
   3 The 7 Habits of Highly Effective People
   3 Questions And Answers 1929-1931
   3 Liber ABA
   3 Letters On Yoga II
   3 How to Free Your Mind - Tara the Liberator
   3 Essays On The Gita
   3 Aion
   2 Words Of Long Ago
   2 Whitman - Poems
   2 The Way of Perfection
   2 The Secret Doctrine
   2 The Practice of Magical Evocation
   2 The Mother With Letters On The Mother
   2 The Gospel of Sri Ramakrishna
   2 The Ever-Present Origin
   2 The Book of Certitude
   2 Questions And Answers 1957-1958
   2 Questions And Answers 1953
   2 Plotinus - Complete Works Vol 04
   2 Mysterium Coniunctionis
   2 Letters On Yoga IV
   2 Letters On Yoga III
   2 Letters On Yoga I
   2 Knowledge of the Higher Worlds
   2 Keats - Poems
   2 Essays In Philosophy And Yoga
   2 Collected Works of Nolini Kanta Gupta - Vol 03
   2 Agenda Vol 07
   2 Agenda Vol 05


0.00 - INTRODUCTION, #The Gospel of Sri Ramakrishna, #Sri Ramakrishna, #Hinduism
   When Ramkumar reprimanded Gadadhar for neglecting a "bread-winning education", the inner voice of the boy reminded him that the legacy of his ancestors — the legacy of Rama, Krishna, Buddha, Sankara, Ramanuja, Chaitanya — was not worldly security but the Knowledge of God. And these noble sages were the true representatives of Hindu society. Each of them was seated, as it were, on the crest of the wave that followed each successive trough in the tumultuous course of Indian national life. All demonstrated that the life current of India is spirituality. This truth was revealed to Gadadhar through that inner vision which scans past and future in one sweep, unobstructed by the barriers of time and space. But he was unaware of the history of the profound change that had taken place in the land of his birth during the previous one hundred years.
   Hindu society during the eighteenth century had been passing through a period of decadence. It was the twilight of the Mussalman rule. There were anarchy and confusion in all spheres. Superstitious practices dominated the religious life of the people. Rites and rituals passed for the essence of spirituality. Greedy priests became the custodians of heaven. True philosophy was supplanted by dogmatic opinions. The pundits took delight in vain polemics.
  --
   Naturally the temple officials took him for an insane person. His worldly well-wishers brought him to skilled physicians; but no-medicine could cure his malady. Many a time he doubted his sanity himself. For he had been sailing across an uncharted sea, with no earthly guide to direct him. His only haven of security was the Divine Mother Herself. To Her he would pray: "I do not know what these things are. I am ignorant of mantras and the scriptures. Teach me, Mother, how to realize Thee. Who else can help me? Art Thou not my only refuge and guide?" And the sustaining presence of the Mother never failed him in his distress or doubt. Even those who criticized his conduct were greatly impressed with his purity, guilelessness, truthfulness, integrity, and holiness. They felt an uplifting influence in his presence.
   It is said that samadhi, or trance, no more than opens the portal of the spiritual realm. Sri Ramakrishna felt an unquenchable desire to enjoy God in various ways. For his meditation he built a place in the northern wooded section of the temple garden. With Hriday's help he planted there five sacred trees. The spot, known as the Panchavati, became the scene of many of his visions.

01.03 - The Yoga of the King - The Yoga of the Souls Release, #Savitri, #Sri Aurobindo, #Integral Yoga
  As the security of her changing world
  And shapes the figure of her unborn mights.

0 1961-11-07, #Agenda Vol 02, #The Mother, #Integral Yoga
   Naturally, its preferable to be in a comfortable position (its a question of security). If you venture to do these kinds of things standing up, for instance, as I have seen them done, its dangerous. But if one is quietly stretched out, there is no need for trance.
   Besides, according to what Ive been told (not physically), I believe that the Rishis practiced going into trance. But I suppose they wanted to achieve what Sri Aurobindo speaks of: a PHYSICAL transformation of the physical body permitting one to LIVE this consciousness instead of the ordinary consciousness. Did they ever do it? I dont know. The Veda simply recounts what the forefa thers have done. But who are these forefa thers?

0 1962-01-09, #Agenda Vol 03, #The Mother, #Integral Yoga
   Later, when he withdrew and put me in front, there was naturally a bit more activity, as well as the semblance of responsibility but it was only a semblance. What security! A sense of total, total security for thirty years. Not once. There was just a single scratch, so to speak, when he had that accident and broke his leg. There was a formation at work (an adverse force) and he wasnt taking sufficient precautions for himself because it was directed against both of us, and more especially against me (it had tried once or twice to fracture my skull, things like that). Well, he was so intent on keeping it from seriously touching my body that it managed to sneak in and break his leg. That was a shock. But he straightened everything out again almost immediatelyit all fell back into place and went on like that till the end.
   And the feeling was so strong that even during his illness (which lasted for months, you know), I had a sense of perfect security; so much so that the idea of his life being really affected in the least by this illness couldnt even occur to me! I didnt want to believe it when the doctor said, Its over. I didnt want to believe it. And as long as I stayed in the room with me in the room he couldnt leave his body. And so there was a terrible tension in himon the one hand the inner will to depart, and then this thing holding him there in his body: the fact that I knew he was alive and could only be alive. He had to signal me to go to my room, supposedly to rest (I didnt rest); and no sooner had I left his room than he was gone.
   They immediately called me back. Thats how it was. Then when he came to me, when I really saw what had happened, when he went out of his body and entered into mine (the most material part of him, the part involved with external things) and I understood that I had the entire responsibility for all the work AND for the sadhana7well, then I locked a part of me away, a deep psychic8 part that was living, beyond all responsibility, in the ECSTASY of the realization: the Supreme. I took it and locked it away, I sealed it off and said, Youre not moving until until all the rest is ready.

0 1962-03-11, #Agenda Vol 03, #The Mother, #Integral Yoga
   It should at least be mentioned that some beings in the vital world can take on completely deceptive appearances at willall the most dazzling lights are found in the vital, but with a particular quality. So those who have truly approached THE Light cant be deceived. Because its indefinable, something the spiritual sense alone can feel: perfect security, perfect peace, perfect purity (although I hesitate to use the word purity, which has taken on such an idiotic meaning); what I mean is the absence of all admixture.
   To those with the spiritual sense, the most dazzling vital lights always seem to have something artificial about themthey FEEL artificial and cold, hard, aggressive, deceptive. But thats the point: you yourself must be beyond all this. Not to be fooled, you mustnt fool yourself!

0 1962-05-24, #Agenda Vol 03, #The Mother, #Integral Yoga
   But it cant be an Ashram organ. It should look like a literary review (it cant be politicalyoud be thrown in jail the day after it came out!). It shouldnt be presented as something practical, but merely as literary or philosophical speculation; that wouldnt matter at all, but it would give the journal a certain security which, as a combat magazine, it would need.
   Its something that could very well be planned and prepared for 65 or 67. It could probably be done in 67. And then, for each issue (I dont know how many issues a year there would be) we could take one of these aphorisms (like the one on Europe, for example) and go into it all the way.

0 1962-11-27, #Agenda Vol 03, #The Mother, #Integral Yoga
   One day, I dont remember on what occasion, I saw what had motivated the forefa thers who wrote the Vedas: it was the need for immortality; they were in quest of immortality.6 From there, I went on to Buddha and saw what had set the Buddha on his way: this kind of need for permanence, purely and simply; the vision of the impermanence of things had profoundly troubled him, and he felt the need for Permanence. His whole quest was to find the Permanent (why was he so anxious to have the Permanent?). There are a few things like that in human nature, in the deep human need. And then I saw another such need: a need for the Certitude which is security. I dont know how to explain it. Because I had the experience of it, I saw it was one of the human needs; and I understood it very intensely, for when I met Sri Aurobindo, this Certitude is what made me feel I had found the Truth I needed. And I didnt realize how DEEP this need was until he left his bodyjust then, at the moment of the transition. Then the entire physical consciousness felt its certitude and security collapse. At that moment I saw (we spoke about it with Nolini a year later and he had had exactly the same impression), I saw this was similar to Buddhas experience when he realized that everything was impermanent and so all of life collapsed in other words, Something Else HAD to be found. Well, at that moment. Id already had all my experiences, but with Sri Aurobindo, for the thirty years I lived with him (a little more than thirty years), I lived in an absolute, an absolute of securitya sense of total security, even physical, even the most material security. A sense of absolute security, because Sri Aurobindo was there. And it held me up, you know, like this (gesture of being carried): not for ONE MINUTE in those thirty years did it leave me. That was why I could do my work with a Base, really, a Base of absolutenessof eternity and absoluteness. I realized it when he left: THAT suddenly collapsed.
   And then I understood that it is one of lifes needs (there are several); and its what spurs the human being to get out of his present state and find another one. These needs are (whats the word?) the seeds, the germs of evolution. They compel us to progress. The whole time Sri Aurobindo was here, as I said, individual progress was automatic: all the progress Sri Aurobindo made, I made. But I was in a state of eternity, of absoluteness, with a feeling of such security, in every circumstance. Nothing, nothing unfortunate could happen, for he was there. So when he left, all at oncea fall into a pit. And thats what projected me wholly (Mother gestures forward).
   That is, I understood why he left. The whole terrestrial evolution had come to a halt. One progressedone can always progress, thats nothing but the entire TERRESTRIAL evolution was at a standstill. If there were permanence in life, nothing would budge. And these needs are the seeds of evolution. So thats what I saw: in the past, in the future, universally. It was very interesting.

0 1962-11-30, #Agenda Vol 03, #The Mother, #Integral Yoga
   Id had the contact with the inner Divine, Id had the realization of Eternity, Id had all those realizations, but as long as I was living with Sri Aurobindo I felt the absolute through him, and (what shall I say?). All those imperative needs I called the seeds of evolution are the levers or springboards to make man realize that the ONE AND ONLY, the one and only absolute is the Supreme; the one and only permanence is the Supreme; the one and only security is the Supreme; the one and only immortality is the Supreme. That the only purpose of manifestation is to lead YOU THERE.
   Thats essentially it: from my experience of the Supreme through the manifestation of Sri Aurobindo, I was projected into a direct experience, with no intermediary.

0 1962-12-04, #Agenda Vol 03, #The Mother, #Integral Yoga
   What he is now striving to give this body is the consciousness of Permanence, of Immortality, of the Certitude of absolute securityin Matter, in Life, in every moments action. And that is becoming nearer and nearer, more and more constant. Gradually, the mixture of old impressions is disappearing thats the BEDROCK, the basis of the transformation.
   In the true movement, you feel the Absolute and Eternity physically. How? Its impossible to describe, but thats how it is. And the minute you get out of That, when you fall back even slightly into the ordinary movement, the old movement, theres a feeling of ABSOLUTE uncertainty! Uncertainty at every second. It would be impossible for an ordinary human being to live in that consciousness, with that sense of total and absolute uncertainty, of total and absolute impermanenceits no longer a destruction,1 but its not yet an ascending transformation. Absolute instability. It doesnt last more than a fraction of a secondjust enough time to become aware of oneself, thats all.

0 1963-01-18, #Agenda Vol 04, #The Mother, #Integral Yoga
   As I told you, Sri Aurobindo lives there permanently, as though in a house of his own: you can see him, you can stay with him, he is busy. It is very much like the physical, but a physical that would be less grating, you understand, where things are more harmonious and satisfying, less excited. There is less of that feeling of haste and uncertainty. In that house where Sri Aurobindo lives, life unfolds very, very harmoniously: people come and go, there are meals even. But all that obeys more general laws, and a sense of security and certainty not to be found in physical life. And the symbolism is more exact (I dont know how to express it), the symbolic transcription of things is less distorted, more exact.
   This is the subtle physical as I know it, I cant say if it is the same for everyone. Sri Aurobindo said, There is a true physical, well, I have a feeling that this is what he calls the true physicala subtler physical, the true physical which is behind.

0 1963-03-23, #Agenda Vol 04, #The Mother, #Integral Yoga
   No, in spite of everything, the body doesnt have that sort of eternal stability, the sense of its immortality (immortality isnt the right word), of its permanence. Not that it has a sense of impermanence, far from it, the cells feel eternal that much is there. But a certain something that would be sheltered from all attacks. It still feels the attacks. It feels an instability, it doesnt have a sense of absolute security, it hasnt yet reached a state of absolute security thats it: the sense of security. There are still vibrations of in security. Yet that seems so mean, so silly! It still lives in in security. security, the sense of security only comes through union with the Supremenothing in life as it is, nothing in the world as it is, can offer the sense of security, its impossible. But to feel the Supremes presence so constantly, to be able to pass everything on to Him, To You, to You, to You, and yet not to have a sense of security! A shock or a blow comes (not necessarily personally, but in life), and theres still a particular vibration: the vibration of in securityit still exists. The body finds that disquieting, painful: Why? Not that it complains, but it complains about itself, it finds itself not up to the mark.
   To know that all is You, that You alone exist, to feel You everywhere, to feel You always, and still to be open to the first thing that comes from outside to give you a blow, a sense of in securityhow absurd!
   Of course, with a concentration of the true being (gesture above), it disappears instantly but that means it isnt the body that feels a sense of security! Its the true consciousness (and quite naturally so, for it would not be true if it didnt have that sense). But what we want is the body to exist in ITSELF, by ITSELF, with all qualities WITHIN ITSELF. In other words, God shouldnt need to manifest for the body to live without anxiety!
   No, thats not THE thing!

0 1963-03-27, #Agenda Vol 04, #The Mother, #Integral Yoga
   Then I thought: now, Sri Aurobindo, its quite clear; for him, the goal was Perfection. Perfection not in the sense of a summit but of an all-inclusive totality in which everything is represented, has a place. And I saw that this Perfection would comemust comein stages. He announced something the realization of which will stretch over thousands of years. So it must come in stages. And I saw that what I find essential, indispensable (everything is there, everything finds a place, yet there is a kind of anguishnot a personal anguish but a terrestrial anguish), is security. A need for securitywhatever you attempt, whatever you seek, even Love, even Perfection, it needs security. Nothing can be achieved with the feeling that all opposing forces can come and sweep everything away. We must find the point where nothing can be touched or destroyed or halted. Therefore, its security, the very essence of security. So I wrote:
   Sri Aurobindo promised Perfection
  --
   is security.
   All the global trends that result in peace movements of one kind or another, are nothing but this: they are expressions of the quest for security. My own experience is a super security, which can be really found only in union with the Supremenothing, nothing, nothing in the world can give you security, except this: union, identification with the Supreme. Thats what I told you: as long as Sri Aurobindo was here in his body, I had a sense of perfect securityextraordinary, extraordinary! Nothing, nothing could make a dent in itnothing. So his departure was like like a smashing of that experience.2 In truth, from the supreme point of view, that may have been the cause of his departure. Though it seems to me a very small cause for a very big event. But since in the experience that security was taking root more and more, more and more firmly, and was spreading3 Probably the time had not come. I dont know. As I said, from a universal and everlasting (I cant say eternal), everlasting point of view, its a small cause for a big effect. We could say it was probably ONE of the causes that made his departure necessary.
   Consequently, according to the experience of these last few days, the quest for security is but a first step towards Perfection. He came to announce (I put promise deliberately), to PROMISE Perfection, but between that promise and its realization, there are many steps; and in my experience, this is the first step: the quest for security. And it corresponds fairly well to the global state of mind.
   (silence)
   The nations of the world legitimize that destructive madness of the arms race by saying its a way to prevent destruction through fear thats futile. As an argument, its futile, but thats the way they think. Its part of that same thirst or need for security: nothing can be achieved except in peace, nothing can be arrived at except in peace, nothing can be realized except in peacewe need peace, individually, collectively, globally. So lets make horrifying weapons of destruction so that men will be so frightened that nothing will happenhow childish! But thats the current state of mind. It is still one of those in English they say device, a ploy (its not a ploy, its a meansbetween ploy and means) to urge the human race on towards its evolutionary goal. And for that, we must catch hold of the Divine: its a means of catching hold of the Divine. For there is nothingnothing, nothing exists from the point of view of security, except the Supreme. If we ARE the Supreme, that is to say, the supreme Consciousness, supreme Power, supreme Existence, then there is securityoutside of that, there is none. Because everything is in perpetual motion. What exists at one moment in time, as Sri Aurobindo says (time is an unbroken succession of moments), what exists at a given moment no longer exists the next, so theres no security. Its the same experience, seen from another angle, as that of Buddha, who said there was no permanence. And basically, the Rishis saw only from the angle of human existence, thats why they were after Immortality. It all boils down to the same thing.
   (Mother remains in contemplation)

0 1963-03-30, #Agenda Vol 04, #The Mother, #Integral Yoga
   Last time, you said, As that security was taking root more and more, more and more firmly, and was spreading Do you mean that Sri Aurobindos very presence
   Yes. Yes.
  --
   Thats just what I mean: the world wasnt ready, and there was (what shall I say?) the paradox of a center of security in total contradiction with the general world condition.
   He himself said it: The world is not ready. So
   Thats what I meant, his physical presence was the sign of security taking root, but the world wasnt ready. So, as the effect of his presence kept increasing, it brought about an increasing contradictionan increasing OPPOSITION.
   ***

0 1963-06-29, #Agenda Vol 04, #The Mother, #Integral Yoga
   Yes. Oh, but there are many who are in dangerbecause theyre not sincere, anyone can deceive them. You know, in such cases, for occult danger, the ONE THING thats absolutely indispensable is sincerity. Its the safeguard and security. Sincerity is security. For example, in the presence of that being, insincere people would have said, Oh, its the Mother. They WOULD NOT HAVE SEEN, you understand. But she sawits her sincerity that saw.
   The only thing (but it doesnt matter, it will come) is that if instead of trying to escape she had taken a determined attitude and said, In the name of the Mother, open the door, brrrt! she would have seen everything vanish. But that I dont think it will happen again, but if it does, she will know what to do next time. Its a kind of sense of the battle.

0 1964-03-04, #Agenda Vol 05, #The Mother, #Integral Yoga
   As for me, I only saw one thing: on the morning of the 29th, I woke up (woke up, I mean got up) with the consciousness the Vedic Rishis called the straight consciousness, the one that comes straight from the Lord the Truth-Consciousness, basically. It was absolutely quiet, calm, but with a sort of supersensation of an absolute well-being. Well-being, securityyes, a securityan indescribable peace, without the contrast of opposites. And it lasted about three hours, continuously, solidly, effortlessly (I didnt make any effort to keep it). I only had a definite perception that it was what they called the consciousness of truth and immortality, along with a perception (an observation, rather), fairly clear and precise, of the way in which it becomes crookedness (you know their word).
   I hadnt tried to have that experience, I hadnt thought about it or anythingit came as something massive, and it stayed. But I had the feeling it was individual: I didnt feel it was something descending on earth. I felt it was something given to me, given to this body. Thats why I didnt attach much importance to it. The feeling of a grace given to this body. And it didnt leave tillit hasnt left, but it has been little by little and very slowly veiled by you know, that chaos of work, which has never been so chaotic and feverish at the same time.1 For about two weeks, it has been appalling. We havent come out of it yet. It has veiled that state FOR ME. But I clearly felt it was something GIVEN to this body.

0 1964-03-28, #Agenda Vol 05, #The Mother, #Integral Yoga
   And there was that experience, which of all experiences was truly the most I could say the most decisive: that was when Sri Aurobindo left his body. Because materially, for the body, it was the complete collapse of a sort of unshakable trust, a sense of absolute security, of certitude that things were going to be done just like that, harmoniously. Then his departure the blow of a sledgehammer on the head. And the entire weight of the responsibility here, on the body. Voil.
   That means quite a preparationwhich is as wise as all the rest.

0 1965-09-11, #Agenda Vol 06, #The Mother, #Integral Yoga
   (On September 6, after months of clashes in the Kutch desert, Indian troops penetrated into Pakistan. Karachi calls for help from the "Western allies." New Delhi orders a general mobilization. On September 16, China will declare its support of Pakistan. On September 19, the security Council enjoins India and Pakistan to cease fire and the U.S.S.R. proposes a meeting at Tashkent. On September 22, India and Pakistan order a cease-fire. On September 25, China reiterates its claim to 35,000 square miles of Indian territory. This is the second Indo-Pakistani conflict since Independence. There will be a third in 1971 over Bangladesh.)
   We are threatened with a blackout.

0 1965-09-18, #Agenda Vol 06, #The Mother, #Integral Yoga
   The world situation is critical today. Indias fate too is hanging in the balance. There was a time when India was absolutely secure, there was no danger whatever of her being a victim to Asuric aggression. But things have changed. People and forces in India have acted in such a way as to invite Asuric influences upon her; these have worked insidiously and undermined the security that was there.
   May 25, 1941

0 1965-09-22, #Agenda Vol 06, #The Mother, #Integral Yoga
   The security Council has issued an ultimatum to India and Pakistan for a cease-fire.
   In inner contact with this organization.

0 1965-09-25, #Agenda Vol 06, #The Mother, #Integral Yoga
   (Following the security Council's ultimatum, India accepted the cease-fire as of September 22.)
   So you were right, in the end!

0 1966-05-25, #Agenda Vol 07, #The Mother, #Integral Yoga
   But when you have the positive experience of the sole and exclusive existence of the Supreme and that everything is just the play of the Supreme with Himself, instead of its being something disquieting or unpleasant or unsettling, its on the contrary a sort of total security.
   The only reality is the Supreme. And all this is a game He plays with Himself. I find this much more comforting than the other way around.

0 1966-09-28, #Agenda Vol 07, #The Mother, #Integral Yoga
   If, when the transformative action creates a suffering, there is in what suffers the necessary aspiration and opening, the remedy is absorbed at the same time, and the effect is total, complete: the transformation, along with the action necessary to obtain it, and at the same time the cure of the false sensation caused by the resistance. And the suffering is replaced by something unknown on this earth, but which has to do with joy, ease, trust, and security. Its a supersensation, in perfect peace, and clearly the only thing that can be eternal.
   This analysis expresses very imperfectly what we could call the content of the Ananda.

0 1967-04-19, #Agenda Vol 08, #The Mother, #Integral Yoga
   "The sense of touch alone is fully developed (in the newborn). That allows it to remain in intimate contact with its mother and prolong the time of gestation, which is a period of intense development in the security of oneness. The least separation may cause an irreparable trauma, that 'fall on the head' which is the usual but abnormal condition of the newborn in civilized peoples. This is well-known to primitive peoples, where the mother keeps the naked child on her naked skin and never parts with it.... Until the other senses are specialized, it is chiefly through the surface of the skin that the child receives its education.... If one wants it to incarnate really, to be friends with matter, its body to become as intimate as its soul, one must invent for it a yoga of caresses and play." (It is worth noting that an attempt to put these alluring and specious theories into practice was to have catastrophic results, as we shall see later in the Agenda: the main effect of the said "caresses" is to attract into the child's body vital forces of a dark order, and "genii of sex" rather than anything else, are likely to be incarnated.)
   This is how Mother replied to the disciple who had sent her her study on the formation of the new child: "I have read your work with keen interestit deals with an important aspect of the problem. But a public presentation is impossible. Seeing and reading this, too many young girls would imagine they are destined to give birth to the 'solar child'that would be a disaster." Then Mother added: "In order to realize this work, one must have gone beyond all desire; and unfortunately, this is not generally the case as yet. Whereas ambition and vanity are rather widespread maladies."

0 1967-04-22, #Agenda Vol 08, #The Mother, #Integral Yoga
   The difficulty is always the transition. You see, the body acts (it is carried, so to speak: things are done without the sense of resistance or fatigue, nothing of the sort, that doesnt exist), and then, if for some reason or other (generally an influence or a thought coming from someone else), if the memory of the other method (the ordinary method, the universal method of all human beings) comes all of a sudden, it is as if (its very strange) it is as if the body could no longer DO ANYTHING, absolutely as if it were about to faint. Then, there immediately comes the reaction, and the other movement gets the upper hand again. But that makes for a difficult time. When these lapses will become impossible, there will be security. But as it is now, its difficult.
   Only, now (formerly there was a moment when it was dangerous), now there is immediately in the cells that movement of adoration, which calls, You, You, You Then its all right.

0 1967-07-19, #Agenda Vol 08, #The Mother, #Integral Yoga
   I dont remember, because I dont note those things mentally, but its an experience I have had with someone I see very often (maybe every day, I dont know, I forget who). One day, for a time, the impression of an existent relationship, full and You could call it comfortable, with a sense of security; the same person in the same circumstances: suddenly like an image of himself: hollow (very alive and mentally active), but hollow and dry, indifferentnonexistent, so to say.
   That was a few days ago. I dont know who it was anymore.

0 1967-08-12, #Agenda Vol 08, #The Mother, #Integral Yoga
   Things are very bad. But in reality in reality its just as well, because it awakens them to the necessity of doing something. Theres no security anywhere anymore, people who left from Calcutta to come here for the 15th have been stopped on the way, their train had to be diverted because there were, I dont know, bandits somewhere.
   No, they werent bandits at all! Thats whats more serious: its not bandits, its students who stopped the trains! And to cap it all, the Chief Minister of Bengal has declared their grievances to be legitimate.
  --
   In any case, those who were expected here are forty-eight hours late. No, theres no longer any security: someone we know was sitting at his window in Calcuttasitting at his table and writing and from the street they threw a bowlful of acid at him! Why? Nobody knows.
   Theyve lost all their values. Yesterday I met the Vice-chancellor of Bangalore University1; can you guess what they teach in psychology at the university? They teach Freud and Jung! European psychoanalysis! In this country where there is THE knowledge, where there is everything, they go after

0 1971-12-04, #Agenda Vol 12, #The Mother, #Integral Yoga
   The world situation is critical today. Indias fate too is hanging in the balance. There was a time when India was a absolutely secure, there was no danger whatever of her being victim to Asuric aggression. But things have changed. People and forces in India have acted in such a way as to invite Asuric influences upon her: these have worked insidiously and undermined the security that was there.
   If India is in danger, Pondicherry cannot be expected to remain outside the danger zone. It will share the fate of the rest of the country. The protection I can give is not unconditional. It is idle to hope that in spite of anything and everything, the protection will be there over all. My protection is there if conditions are fulfilled. It goes without saying that any sympathy or support for the Nazis (or for any ally of theirs) automatically cuts across the circle of protection. Apart from this obvious and external factor, there are more fundamental psychological conditions which demand fulfillment. The Divine can give protection only to those who are whole-heartedly faithful to the Divine, who live truly in the spirit of sadhana and keep their consciousness and preoccupation fixed upon the Divine and the service of the Divine. Desire, for example, insistence on ones likes and conveniences, all movements of hypocrisy and insincerity and falsehood, are great obstacles standing in the way of the Divines protection. If you seek to impose your will upon the Divine, it is as if you were calling for a bomb to fall upon you. I do not say that things are bound to happen in this way; but they are very likely to happen, if people do not become conscious and strictly vigilant and act in the true spirit of a spiritual seeker. If the psychological atmosphere remains the same as that of the outside world, there can be no wall of security against the dark Forces that are working out in it the ordeal of danger, suffering and destruction entering here.
   The Mother

03.03 - A Stainless Steel Frame, #Collected Works of Nolini Kanta Gupta - Vol 02, #Nolini Kanta Gupta, #Integral Yoga
   The government of a country is, as we know, the steel frame that holds together the life of its people: it is that that gives the primary stability and security, scope and free play to all its activities. In India it was the pride of the British that they built up such a frame; and although that frame sometimes seemed almost to throttle the nation in its firm and rigid grip, still today we are constrained to recognise that it was indeed a great achievement: Pax Britannica was in fact a very efficient reality. The withdrawal of the power that was behind us has left the frame very shaky; and our national government is trying hard to set it up again, streng thening, reinforcing, riveting wherever and however necessary. But the misfortune is that the steel has got rusted and worn out from inside.
   In other words, a diminution of public morality and collective honesty has set in, an ebbing of the individual consciousness too that made for rectitude and justice and equity and fair dealing. Men who are limbs of that frame, who by their position ensure the strength of that frame the bolts and nuts, screws and hingehave, on a large scale, allowed themselves to be uncertain and loose in their moral make-up. Along with the outer check, the inner check too has given way: hence the colossal disintegration, the general debacle in the life of the body politic and the body social.

03.03 - The House of the Spirit and the New Creation, #Savitri, #Sri Aurobindo, #Integral Yoga
  A rich security to difference.
  On a meeting line of hazardous extremes

06.02 - The Way of Fate and the Problem of Pain, #Savitri, #Sri Aurobindo, #Integral Yoga
  But where then is the soul's security,
  Its poise in this circling of unreal suns?

06.23 - Here or Elsewhere, #Collected Works of Nolini Kanta Gupta - Vol 03, #Nolini Kanta Gupta, #Integral Yoga
   In the same way, there are souls that have emerged out of the fire of earthly life and are enjoying the safety and security of the heavens; but they have been called to come back into the world, add to the experience of the tranquil above the experience of the trouble below. Surely it increases the scope of their consciousness. But to turn upon the world means also to re-enter into ignorance, for this world means ignorance, as it is, it is nothing but ignorance. The role then of one who returns is once more to embrace ignorance, but with a view to bringing into it the light and bliss that he gained from above, permeating the stuff of the present world with the substance of the higher consciousness. It is a sacrifice demanded of him, thus to abandon the eternal felicity of the high heavens the unbroken union with the Divine above and to enter into the depths of this great perilous world: but this is a privilege too, to bring solace to the afflicted, the transforming light to obscure souls, the radiant energy to inert earth. It is a high privilege for which the luminous soul is thankful: he modestly accepts a gift of grace from the Supreme. He accepts the Ignorance and offers it: he lays it at the feet of the Supreme so that it may be transmuted into lightlight here below. His own role is that of a modest intermediary.
   ***

07.21 - On Occultism, #Collected Works of Nolini Kanta Gupta - Vol 03, #Nolini Kanta Gupta, #Integral Yoga
   He knew very well that nothing could happen to him, the barrier was sound and secure and yet each time the snake darted at him, he leaped back to avoid the blow as it were. The thing repeated itself continually and however much he repeated to himself all the reasons of his safety and security, the reflex gesture could not be controlled.
   Only the scientist did not know one thingan element of occult knowledge escaped him. The physical movement of the serpent was accompanied by a considerable amount of a vital projection of its nervous energy. It was that which struck him with an irresistible force. It was almost like a violent physical shock and mere reason has no power to control it. To check and control, you must learn the occult way.

10.02 - The Gospel of Death and Vanity of the Ideal, #Savitri, #Sri Aurobindo, #Integral Yoga
  Yet this security and guarantor
  Pressed for credentials an impostor proves:

1.00 - Main, #The Book of Certitude, #Baha u llah, #Baha i
  They whom God hath endued with insight will readily recognize that the precepts laid down by God constitute the highest means for the maintenance of order in the world and the security of its peoples. He that turneth away from them is accounted among the abject and foolish. We, verily, have commanded you to refuse the dictates of your evil passions and corrupt desires, and not to transgress the bounds which the Pen of the Most High hath fixed, for these are the breath of life unto all created things. The seas of Divine wisdom and Divine utterance have risen under the breath of the breeze of the All-Merciful. Hasten to drink your fill, O men of understanding! They that have violated the Covenant of God by breaking His commandments, and have turned back on their heels, these have erred grievously in the sight of God, the All-Possessing, the Most High.
  O ye peoples of the world! Know assuredly that My commandments are the lamps of My loving providence among My servants, and the keys of My mercy for My creatures. Thus hath it been sent down from the heaven of the Will of your Lord, the Lord of Revelation. Were any man to taste the sweetness of the words which the lips of the All-Merciful have willed to utter, he would, though the treasures of the earth be in his possession, renounce them one and all, that he might vindicate the truth of even one of His commandments, shining above the Dayspring of His bountiful care and loving-kindness.

1.00 - PREFACE - DESCENSUS AD INFERNOS, #Maps of Meaning, #Jordan Peterson, #Psychology
  I returned to university and began to study psychology. I visited a maximum security prison on the
  outskirts of Edmonton, under the supervision of an eccentric adjunct professor at the University of Alberta.

1.013 - Defence Mechanisms of the Mind, #The Study and Practice of Yoga, #Swami Krishnananda, #Yoga
  A political manoeuvre is adopted by the mind by the manufacture of certain mechanisms psychologically, which are usually called by psychologists as defence mechanisms. These defence mechanisms are very peculiar structures like bulldozers and tanks which we have in armies and public works which the mind manufactures for its stability, security, sustenance and permanent establishment in the world of diversities. These defence mechanisms are terrible machineries which the mind manufactures and keeps secret, unknown to people, like secret weapons which one may wield, not allowing them to come to the knowledge of other people. If everyone knows what weapons we have got, then they won't be effective, because others also may manufacture the same weapons. So we keep our weapons very secret and use them only when they are necessary, in warfare or on a battlefield. Everyone has these weapons, and they are not made of material objects. They are psychological apparatuses which the mind always keeps ready at hand, whenever there is any kind of threat to the psychological security or individual happiness. The adepts who have made deep study of this subject are the psychoanalysts in the Western world and the teachers of yoga in the East, particularly Sage Patanjali; and certain other texts like the Upanishads have made a study of the subtle devices that the mind employs for the purpose of its individual security and permanent satisfaction.
  These mechanisms of the mind are to be studied very well before we try to adopt the method of self-control. Otherwise, we will be pursuing what they call a wild goose chase and we will get nothing out of our efforts. The mind is a terrible trickster, and it cannot be easily tackled by open methods. Frontal attacks will not always succeed, because these mechanisms of the mind are invisible weapons; they are not visible to the eye. The reactions that the mind sets up in respect of persons outside and things around are indications of the presence of these defence mechanisms. Even when these reactions are set up by the mind in respect of externals, the mechanisms are not made visible we see only reactions, and not the source or the cause of the reactions. They will all be kept hidden so that the nature of a person cannot be known, and even when the person sets up a reaction, that nature is kept secret always. That is another device of the mind. Through all of our outward behaviour and conduct, we cannot be studied properly by a mere look at our faces, because we are very secret inside, looking like something else outside. This deep-rooted secrecy of the mental structure has to be dug out and brought to the surface of consciousness before any successful effort can be made in the direction of self-control.

1.01 - Archetypes of the Collective Unconscious, #The Archetypes and the Collective Unconscious, #Carl Jung, #Psychology
  gerous way. But since ignorance is no guarantee of security, and
  in fact only makes our in security still worse, it is probably bet-
  --
  even the slightest hope of security, does it become possible for us
  to experience an archetype that up till then had lain hidden

1.01 - Fundamental Considerations, #The Ever-Present Origin, #Jean Gebser, #Integral
  We shall therefore beginwith the evidence and not with idealistic constructions; in the face of present-day weapons of annihilation, such constructions have less chance of survival than ever before. But as we shall see, weapons and nuclear fission are not the only realities to be dealt with; spiritual reality in its intensified form is also becoming effectual and real. This new spiritual reality is without question our only security that the threat of material destruction can be averted. Its realization alone seems able to guarantee mans continuing existence in the face of the powers of technology, rationality, and chaotic emotion. If our consciousness, that is, the individual persons awareness, vigilance, and clarity of vision, cannot master the new reality and make possible its realization, then the prophets of doom will have been correct. Other alternatives are an illusion; consequently, great demands are placed on us, and each one of us have been given a grave responsibility, not merely to survey but to actually traverse the path opening before us.
  There are surely enough historical instances of the catastrophic downfall of entire peoples and cultures. Such declines were triggered by the collision of deficient and exhausted attitudes that were insufficient for continuance with those more recent, more intense and, in some respects, superior. One such occurrence vividly exemplifies the decisive nature of such crises: the collision of the magical, mythical, and unperspectival culture of the Central American Aztecs with the rational-technological, perspectival attitude of the sixteenthcentury Spanish conquistadors. A description of this event can be found in the Aztec chronicle of Frey Bernardino de Sahagun, written eight years after Cortez conquest of Mexico on the basis of Aztec accounts. The following excerpt forms the beginning of the thirteenth chapter of the chronicle which describes the conquest of Mexico City:

1.01 - MASTER AND DISCIPLE, #The Gospel of Sri Ramakrishna, #Sri Ramakrishna, #Hinduism
  "The bound souls are tied to the world by the fetters of 'woman and gold'. They are bound hand and foot. Thinking that 'woman and gold' will make them happy and give them security, they do not realize that it will lead them to annihilation. When a man thus bound to the world is about to die, his wife asks, 'You are about to go; but what have you done for me?' Again, such is his attachment to the things of the world that, when he sees the lamp burning brightly, he says: 'Dim the light. Too much oil is being used.' And he is on his death-bed!
  "The bound souls never think of God. If they get any leisure they indulge in idle gossip and foolish talk, or they engage in fruitless work. If you ask one of them the reason, he answers, 'Oh, I cannot keep still; so I am making a hedge.' When time hangs heavy on their hands they perhaps start playing cards."

1.025 - Sadhana - Intensifying a Lighted Flame, #The Study and Practice of Yoga, #Swami Krishnananda, #Yoga
  I can give you examples of quantitative systems which we create in our practical daily life for the purpose of overcoming the urges of the ego and connecting it with wider or larger wholes. A physical individual, or a bodily person, is the lowest unit of reality as far as our experience goes. An utterly selfish individual is one who looks upon the body as the ultimate reality, and the only reality there is nothing else. Now, this is the grossest form of egoism, where the bodily individuality is regarded as the only reality and everything else is completely ignored. This is the animal's way of thinking, to some extent. The tiger has no concern for anything except its own personal existence, and it can pounce on anyone for the sake of its own security and existence.
  The animalistic way of thinking persists in the human level also, and often many times, in fact the urge to assert one's bodily individuality vehemently gains the upper hand, though rationally it would not be possible for anyone to justify the exclusive reality of a bodily personality. Such was the primitive condition of people in prehistoric times, or Paleolithic times, as they say, when human beings were not yet evolved to the present condition of social understanding. In the biological history of mankind, right from creation as far as the mind can go, it is said that the evolution of the human individual, right from the lowest levels, included certain conditions of human existence which were inseparable from animal life. The caveman, the Neanderthal man and such other primitive types of existence point to an animal mind operating through a human body, where cannibalism was not unfamiliar. One could eat another, because the animal mind was not completely absent even in the human body, and there was in security on account of it being possible for one man to eat another man. As history tells us, it took ages for the primitive mind to realise the necessity for individuals to come into agreement among themselves for the purpose of security. If I start jumping upon you and you start jumping upon me, both of us will be unhappy and insecure, and you would not know whether you will be safe and I cannot know if I will be safe. This sort of thing would be most undesirable.
  It is said by anthropologists, historian's of mankind's evolution, and political historians, that a state was reached when it was felt necessary to organise people into groups, and this was the beginning of the governmental system. A government is nothing but an agreement among people in order that there may not be warfare among individuals and attacks every day. Otherwise there would be chaos and confusion, and anyone could attack at any moment, for any reason whatsoever. Therefore, an agreement was made, an organisation was set up, a rule was framed and a system was brought forth under which it was obligatory on the part of individuals to obey certain principles laid down by groups, of which some people were made leaders. It does not mean that these leaders were kings or autocrats; they were the governors of law, the dispensers of justice, and the instruments for the maintenance of order in the group of people who found it necessary to bring about this system.

1.02 - MAPS OF MEANING - THREE LEVELS OF ANALYSIS, #Maps of Meaning, #Jordan Peterson, #Psychology
  exploration that allows for emotional regulation (that generates security, essentially) is not objective
  description as the scientist might have it but categorization of the implications of an unexpected
  --
  Fear is not conditioned; security is unlearned, in the presence of particular things (stimuli) or contexts,
  as a consequence of violation of explicit or implicit presupposition. Classical behavioral psychology is
  wrong in the same manner our folk presumptions are wrong: fear is not secondary, not learned security
  is secondary, learned. Everything not explored is tainted, a priori, with apprehension. Any thing or
  --
  consists of, in an environment permanently characterized by the interplay between security and
  unpredictability. We are extremely (uncontrollably) imitative, appallingly social, and interminably
  --
  another. This upper familiar level provides walls of security; provides the stable structure within which
  necessary change can occur, without catastrophe.
  --
  results, it is correct! Why did I want to be a doctor? For monetary security. Because it was expected of me
  (for reasons of tradition my father was a doctor). For reasons of status. Because I could appease the
  --
  (1) I want to help people; (2) I need some monetary security; (3) I would like to stay in the health
  profession; (4) perhaps status is not as important as I thought (and might therefore be sacrificed, to
  --
  cultural protection from the terrible forces of nature, security for the weak, and wisdom for the foolish.
  Simultaneously, however, he is the force who devours his own offspring, who rules the kingdom with a
  --
  tolerable and that security remains flexible.
  Mephistopheles: Congratulations, before you part from me!
  --
  of explored territory is therefore defined, at least in general, by security. Secure territory is that place
  where we know how to act. Knowing how to act means being sure that our actions, undertaken in the
  --
  culture, the Great Father, is simultaneously and unceasingly tyranny and order, because security of person
  and property is always obtained at the cost of absolute freedom. The eternal subject, man, the knower, is
  --
  unexplored; symbolizes the juxtaposition of the masculine principles of security, tyranny and order with
  the feminine principles of darkness, dissolution, creativity and chaos. Furthermore, as a snake, the
  --
  familiar; as security and tyranny simultaneously. The Great Father is patriarchal society, tradition, pomp
  and circumstance, military-industrial complex, and super-ego: demanding, rigid, unjust, dangerous and
  --
  as security. The wise King maintains stability, not because he is afraid of the unknown, but because nothing
  new can be built without a strong foundation. He is the adaptive routines, developed by the heroes of the

1.02 - Meditating on Tara, #How to Free Your Mind - Tara the Liberator, #Thubten Chodron, #unset
  is more important because that gives me a sense of security. Cake is an example; we may enact this behavior in other aspects of our life. Generosity is the
  antidote that frees our mind.

1.02 - The 7 Habits An Overview, #The 7 Habits of Highly Effective People, #Stephen Covey, #unset
  If I were physically dependent -- paralyzed or disabled or limited in some physical way -- I would need you to help me. If I were emotionally dependent, my sense of worth and security would come from your opinion of me. If you didn't like me, it could be devastating. If I were intellectually
   dependent, I would count on you to do my thinking for me, to think through the issues and problems of my life.

1.02 - The Age of Individualism and Reason, #The Human Cycle, #Sri Aurobindo, #Integral Yoga
  The individualistic age of Europe was in its beginning a revolt of reason, in its culmination a triumphal progress of physical Science. Such an evolution was historically inevitable. The dawn of individualism is always a questioning, a denial. The individual finds a religion imposed upon him which does not base its dogma and practice upon a living sense of ever verifiable spiritual Truth, but on the letter of an ancient book, the infallible dictum of a Pope, the tradition of a Church, the learned casuistry of schoolmen and Pundits, conclaves of ecclesiastics, heads of monastic orders, doctors of all sorts, all of them unquestionable tribunals whose sole function is to judge and pronounce, but none of whom seems to think it necessary or even allowable to search, test, prove, inquire, discover. He finds that, as is inevitable under such a regime, true science and knowledge are either banned, punished and persecuted or else rendered obsolete by the habit of blind reliance on fixed authorities; even what is true in old authorities is no longer of any value, because its words are learnedly or ignorantly repeated but its real sense is no longer lived except at most by a few. In politics he finds everywhere divine rights, established privileges, sanctified tyrannies which are evidently armed with an oppressive power and justify themselves by long prescription, but seem to have no real claim or title to exist. In the social order he finds an equally stereotyped reign of convention, fixed disabilities, fixed privileges, the self-regarding arrogance of the high, the blind prostration of the low, while the old functions which might have justified at one time such a distribution of status are either not performed at all or badly performed without any sense of obligation and merely as a part of caste pride. He has to rise in revolt; on every claim of authority he has to turn the eye of a resolute inquisition; when he is told that this is the sacred truth of things or the comm and of God or the immemorial order of human life, he has to reply, But is it really so? How shall I know that this is the truth of things and not superstition and falsehood? When did God comm and it, or how do I know that this was the sense of His comm and and not your error or invention, or that the book on which you found yourself is His word at all, or that He has ever spoken His will to mankind? This immemorial order of which you speak, is it really immemorial, really a law of Nature or an imperfect result of Time and at present a most false convention? And of all you say, still I must ask, does it agree with the facts of the world, with my sense of right, with my judgment of truth, with my experience of reality? And if it does not, the revolting individual flings off the yoke, declares the truth as he sees it and in doing so strikes inevitably at the root of the religious, the social, the political, momentarily perhaps even the moral order of the community as it stands, because it stands upon the authority he discredits and the convention he destroys and not upon a living truth which can be successfully opposed to his own. The champions of the old order may be right when they seek to suppress him as a destructive agency perilous to social security, political order or religious tradition; but he stands there and can no other, because to destroy is his mission, to destroy falsehood and lay bare a new foundation of truth.
  But by what individual faculty or standard shall the innovator find out his new foundation or establish his new measures? Evidently, it will depend upon the available enlightenment of the time and the possible forms of knowledge to which he has access. At first it was in religion a personal illumination supported in the West by a theological, in the East by a philosophical reasoning. In society and politics it started with a crude primitive perception of natural right and justice which took its origin from the exasperation of suffering or from an awakened sense of general oppression, wrong, injustice and the indefensibility of the existing order when brought to any other test than that of privilege and established convention. The religious motive led at first; the social and political, moderating itself after the swift suppression of its first crude and vehement movements, took advantage of the upheaval of religious reformation, followed behind it as a useful ally and waited its time to assume the lead when the spiritual momentum had been spent and, perhaps by the very force of the secular influences it called to its aid, had missed its way. The movement of religious freedom in Europe took its stand first on a limited, then on an absolute right of the individual experience and illumined reason to determine the true sense of inspired Scripture and the true Christian ritual and order of the Church. The vehemence of its claim was measured by the vehemence of its revolt from the usurpations, pretensions and brutalities of the ecclesiastical power which claimed to withhold the Scripture from general knowledge and impose by moral authority and physical violence its own arbitrary interpretation of Sacred Writ, if not indeed another and substituted doctrine, on the recalcitrant individual conscience. In its more tepid and moderate forms the revolt engendered such compromises as the Episcopalian Churches, at a higher degree of fervour Calvinistic Puritanism, at white heat a riot of individual religious judgment and imagination in such sects as the Anabaptist, Independent, Socinian and countless others. In the East such a movement divorced from all political or any strongly iconoclastic social significance would have produced simply a series of religious reformers, illumined saints, new bodies of belief with their appropriate cultural and social practice; in the West atheism and secularism were its inevitable and predestined goal. At first questioning the conventional forms of religion, the mediation of the priesthood between God and the soul and the substitution of Papal authority for the authority of the Scripture, it could not fail to go forward and question the Scripture itself and then all supernaturalism, religious belief or suprarational truth no less than outward creed and institute.

1.02 - The Divine Is with You, #Words Of The Mother II, #The Mother, #Integral Yoga
  the source of all peace, all joy, all security. Find this Presence in
  yourself and all your difficulties will disappear.

1.02 - The Magic Circle, #The Practice of Magical Evocation, #Franz Bardon, #Occultism
  A true magic circle represents the symbolic lay-out of the macrocosm and the microcosm, that is, of the perfect man. It stands for the Beginning and the Ending for the Alpha and the Omega, as well as for Eternity, which has no beginning and no end. The magic circle, therefore, is a symbolic diagram of the Infinite, of Divinity in all its aspects, as can be comprehended by the microcosm, i. e. by the true adept, the perfect magician. To draw a magic circle means to symbolize the Divine in His perfection, to get into contact with Him. This happens, above all, at the moment the magician is standing in the centre of the magic circle, for it is by this act that the contact with the Divinity is demonstrated graphically. It is the magician's contact with the macrocosm in his highest step of consciousness. Therefore, from the point of view of true magic, it is quite logical that standing in the centre of the magic circle is equivalent to being, in one's consciousness, a unity with the Universal Divinity. From this one can see clearly that a magic circle is not only a diagram for protection from unwanted negative influences, but security and inviolability are brought about by this conscious and spiritual contact with the Highest. The magician who stands in the centre of the magic circle is protected from any influence, no matter, whether good or evil, for himself is, in fact, symbolizing the Divine in the universe. Furthermore, by standing in the centre of the magic circle, the magician also represents the Divinity in the microcosm and controls and rules the beings of the universe in a totalitarian manner.
  The esoteric essence of the magician's standing in the centre of the magic circle is, therefore, quite different from that which the books on evocations usually maintain. If a magician standing in the centre of the magic circle were not conscious of the fact that he is, at that moment, symbolizing God the Divine and Infinite, he would not be able to practise any influence on any being whatsoever. The magician is, at that instant, a perfect magic authority whom all powers and beings must absolutely obey. His will and the orders he gives to beings or powers are equivalent to the will and orders of the Infinite, the Divine, and must therefore be unconditionally respected by the beings and powers the magician has conjured up. If the magician, during such an operation, has not the right attitude towards his doings, he degrades himself to a sorcerer, a charlatan, who simply mimics and has no true contact with the Highest. The magician's authority would, in such a case, be rather doubtful. Moreover, he would be in danger of losing his control over such beings and powers, or, what would even be worse, he could be mocked by them, not to speak of other unwanted and unforeseen surprises and accompanying phenomena that he would be exposed, especially if negative forces were involved.

1.02 - The Three European Worlds, #The Ever-Present Origin, #Jean Gebser, #Integral
  We are then perhaps justified in speaking of the "space" of antiquity as undifferentiated space, as a simple inherence within the security of the maternal womb;. expressing an absence of any confrontation with actual, exterior space. The predominance of the two constitutive polar elements, the paternal phallic column and the maternal uterine cave the forces to which unperspectival man was subject reflects his inextricable relationship to his parental world and, consequently, his complete dependence on it which excluded any awareness of an ego in our modern sense. He remains sheltered and enclosed in the world of the "we" where outer objective space is still non-existent.
  The two polar elements which made up the spaceless foundation of the ancient world were first united and creatively amalgamated in Christian ecclesiastical architecture. (The symbolic content of these elements does not, as we will see later emphasize the sexual, but rather the psychical and mythical aspects.) Their amalgamation subsequently gives rise to the Son of Man; the duality of the column and tower, the vault and dome of Christian church architecture made feasible for the first time the trinity represented by the son-as-man, the man who will create his own space.

1.03 - APPRENTICESHIP AND ENCULTURATION - ADOPTION OF A SHARED MAP, #Maps of Meaning, #Jordan Peterson, #Psychology
  continued tribal security that boys transcend their dependency upon their mothers. This separation often
  takes place under purposefully frightening and violent conditions. In the general initation pattern, the men,
  --
  and not a given; where security final authority, in the form of parent no longer exists. As the childhood
  personality is destroyed, the adult personality a manifestation of transmitted culture is inculcated. The

1.03 - Questions and Answers, #Book of Certitude, #unset, #Zen
  ANSWER: If, when the hour of obligatory prayer arriveth, there be no security, one should, upon arrival in safe surroundings, perform a prostration in place of each Obligatory Prayer that was missed, and after the final prostration, sit cross-legged and read the designated verse. If there be a safe place, obligatory prayer is not suspended during travel.
  59. QUESTION: If, after a traveller hath stopped and rested it is the time for obligatory prayer, should he perform the prayer, or make the prostration in its stead?

1.03 - Some Aspects of Modern Psycho therapy, #The Practice of Psycho therapy, #Carl Jung, #Psychology
  sense of security, of protection, of reciprocated love, of trust, of faitha
  thing that has many names.

1.03 - Tara, Liberator from the Eight Dangers, #How to Free Your Mind - Tara the Liberator, #Thubten Chodron, #unset
  will bring us security in cyclic existence. In fact, our attachment to them
  keeps us bound in a prison of dissatisfaction. We constantly crave more and

1.03 - THE GRAND OPTION, #The Future of Man, #Pierre Teilhard de Chardin, #Christianity
  thought. We cannot recapture the animal security of instinct. Be-
  cause, in becoming men, we have acquired the power of looking to

1.04 - THE APPEARANCE OF ANOMALY - CHALLENGE TO THE SHARED MAP, #Maps of Meaning, #Jordan Peterson, #Psychology
  our patriotism reflects knowledge that our personal integrity and security is integrally bound up, for
  better or worse, with the destiny of our cultures. We are therefore motivated to protect those cultures to
  --
  case, however, that our attempts to bolster the security of part of our protective identity undermine our
  stability at a higher-order of being. The American (British, Russian, Chinese) Way of Life, for example,
  --
  The security of predictable society provides an antidote to fear, but a too-rigid society ensures its own
  eventual destruction. The future brings with it the unknown; inflexibility and unwillingness to change
  --
  forever insufficient, forever lacking in security; drove us to regard the unknown place of death, in
  addition, as simultaneous eternal source of new redemptive information. This contamination rendered every

1.05 - 2010 and 1956 - Doomsday?, #Preparing for the Miraculous, #George Van Vrekhem, #Integral Yoga
  threatens freedom and security. No one knows the exact
  solution to this dilemma, he writes in The Future of Life.

1.057 - The Four Manifestations of Ignorance, #The Study and Practice of Yoga, #Swami Krishnananda, #Yoga
  Social life is nothing but a set-up of living which has been agreed upon by different individuals in a group for the purpose of mutual sustenance, coordination and security, as no individual can be secure by itself in the light of the presence of other individuals because each individual is a centre of egoism, a principle of intense self-affirmation which denies the reality of every other individual. The meaning of individuality or egoism is the denial of value to others, and sometimes the force of denial becomes so intense that it comes to the surface as conflict, as warfare. Whether it is through words or actually in fight, internally there is a feeling of irreconcilability among individuals. They are not really friends, because their very existence is an irreconcilability; it is an untenability; it is a denial of the truths which prevail in the midst of this apparent diversity.
  Simultaneously with this urge to affirm oneself as an individual isolated from others, there is a contrary feeling of the necessity to relate oneself to others. We create a tense form of living, which is our present-day social living, where internally we dislike one another but outwardly we feel a necessity to be brothers. There is a necessity felt both ways. I feel a necessity to maintain my individuality. I cannot merge myself in you then, I will lose my individuality. It is a loss of my very status, which I would not like. So I maintain and preserve vehemently my individuality but at the same time, I cannot exist in that condition because of my dependence upon other individuals.

1.05 - Christ, A Symbol of the Self, #Aion, #Carl Jung, #Psychology
  only lulls one into a sense of false security. Human nature is
  capable of an infinite amount of evil, and the evil deeds are as

1.05 - Morality and War, #Words Of The Mother III, #The Mother, #Integral Yoga
  Exclusive turning of all movements towards the Divine: the sure means of having security.
  Nothing is in safety except what is given to the Divine.

1.05 - Some Results of Initiation, #Knowledge of the Higher Worlds, #Rudolf Steiner, #Theosophy
   permits intercourse with beings of higher worlds, though only when their existence is manifested in the astral or soul-world. The development of this lotus flower, however, is not advisable unless the student has made great progress on that path of esoteric development which enables him to raise his spirit into a still higher world. This entry into the spiritual world proper must always run parallel with the development of the lotus flowers, otherwise the student will fall into error and confusion. He would undoubtedly be able to see, but he would remain incapable of forming a correct estimate of what he saw. Now, the development of the six-petalled lotus flower itself provides a certain security against confusion and instability, for no one can be easily confused who has attained perfect equilibrium between sense (or body), passion (or soul), and idea (or spirit). And yet, something more than this security is required when, through the development of the six-petalled lotus flower, living beings of independent existence are revealed to his spirit, beings belonging to a world so completely different from the world known to his physical senses. The development
   p. 162
   of the lotus flowers alone does not assure sufficient security in these higher worlds; still higher organs are necessary. The latter will now be described before the remaining lotus flowers and the further organization of the soul-body are discussed. (This expression-soul-body-although obviously contradictory when taken literally, is used because to clairvoyant perception the impression received spiritually corresponds to the impression received physically when the physical body is perceived.)
  The development of the soul-body in the manner described above permits perception in a supersensible world, but anyone wishing to find his way in this world must not remain stationary at this stage of development. The mere mobility of the lotus flowers is not sufficient. The student must acquire the power of regulating and controlling the movement of his spiritual organs independently and with complete consciousness; otherwise he would become a plaything for external forces and powers. To avoid this he must acquire the faculty of hearing what is called the inner world, and this involves the development not only of the soul-body but also of the etheric

1.05 - Splitting of the Spirit, #The Red Book Liber Novus, #unset, #Zen
  I: But our knowledge? Does our knowledge also not hold good for you? What is it going to be, if not knowledge? Where is security? Where is solid ground? Where is light? Your darkness is not only darker than night, but bottomless as well. If its not going to be knowledge, then perhaps it will do without speech and words too?
  My soul: No words.

1.05 - THE HOSTILE BROTHERS - ARCHETYPES OF RESPONSE TO THE UNKNOWN, #Maps of Meaning, #Jordan Peterson, #Psychology
  meaning and his refusal to sacrifice meaning for security renders existence acceptable, despite its
  tragedy.
  --
  existence of threats to their security and moral integrity with evil. This means that the proper-thinking
  confuse the being of the genius and the stranger, who offer up experience that exists in contrast with
  --
  engenders avoidance. The human tendency to flee into false havens of security can therefore be viewed
  with sympathy and understanding. Maturation is a frightening process. Transformation from the paradisal
  --
  comparative responsibility and lack of security that are part and parcel of maturity.
  As maturation takes place, the environment transforms. As the developing individual masters his
  --
  such protection; undermined his ability to utilize the sole process capable of actually providing security and
  freedom:
  --
  consequence of the desire for too much security, attains its inevitable victory. The vicious circle created
  by the liar spirals down inevitably to the underworld. This process is schematically represented in Figure
  --
  consequence of security-seeking, made necessary by the abandonment of individual heroism as a potential
  mode of adaptation. Such abandonment occurs as a consequence of premature and arrogant self-definition
  --
  The constant search for security, rather than the embodiment of freedom, is wish for rule by laws letter,
  rather than laws spirit. The resultant forcible suppression of deviance is based upon desire to support the
  --
  adversarial mode of adaptation produces (1) an accelerated search for security, and increased likelihood of
  aggression, in those cases where identification with the cultural canon is deemed possible, or (2)
  --
  intrusion of fate into this self-deceptive security occurs at night. Arrest takes place without warning, in the
  early hours of the morning, when people are easily frightened, dazed and less likely to offer resistance,
  more willing to cooperate, in their fear and naive hope afraid for the security of their nervously gathered
  family, standing helpless in their household, at the mercy of state authority, in its most contemptible and
  --
  insolent entrance of the unwiped jackboots of the unsleeping State security operatives. The frightened
  and cowed civilian witness at their backs....
  --
  clothes are best to wear; and the security agents keep interrupting and hurrying you:
  You dont need anything. Theyll feed you there. Its warm there. (Its all lies. They keep hurrying
  --
  judgment is befogged. In a night arrest the State security men have a superiority in numbers; there are
  many of them, armed, against one person who hasnt even finished buttoning his trousers.491
  --
  already taken, prior to incarceration, in the large part decisions to choose security, instead of maintenance
  of conscience; to embrace safety, instead of soul:
  --
  of the self; through acceptance of ideological promise, offer of material security and guarantee of
  (unearned) intrapsychic stability:
  --
  resources and security of person. Moral knowledge, knowledge of good and evil, is the capability to choose
  pattern of adaptation authoritarian, decadent or creative in the face of mortal limitation, explicit and
  --
  The victim who finds personal security in identity with his persecutor has become that persecutor; has
  eliminated the possibility of further adaptation, integration and growth; has voluntarily forfeited possibility
  --
  result. If the individual strives primarily for material security, or social acceptance, rather than for the
  mythic love of God and fellow man, then respect for truth will suffer, and complete adaptation will become
  --
  subjugated, in the course of individual and social existence. If security or power is valued above all else,
  then all will become subject to the philosophy of expedience. In the long term, adoption of such a policy
  --
  remains, for example, sensual pleasure, social acceptance, power, or material security then aspects of
  behavior and ideation which exist in conflict to these goals will become pathologically twisted in
  --
  (Antibess) the security chief kept trying to recruit him as a stoolie. Grigoryev replied to him quite
  honestly and candidly: I find it quite repulsive to talk to you. You will find many willing without me.
  --
  positive aspect); but the price paid for absolute security is freedom and individuality, and therefore,
  creativity. Sacrifice of individual creativity, by choice, eventually deprives life of pleasure, of meaning
  --
  existence allows for introduction of sufficiently bearable meaning into blessed security; makes every
  individual a stalwart guardian of tradition and an intrepid explorer of the unknown; insures simultaneous
  --
  sum total of our choices. In rejecting our errors, we gain short-term security but throw away our identity
  with the process that allows us to transcend our weaknesses, and tolerate our painfully limited lives:
  --
  What is an iron block for man? Shaped, a spear, and therefore food and death and security; suspended, a
  pendulum, key to measurement of the earths rotation; dropped, significant of gravity, and the large-scale
  --
  state (in the absence of current security, happiness), exploration is or has been, by definition, incomplete.
  The residual mysteries that still accompany current being, which manifest themselves in the intrinsic
  --
  This means, merely, that his self-concept provides him with illusory security (as a prison protects its
  inmates from the outside). But the Nazi actions that is, the willful torture of innocents, and enjoyment of
  --
  rejected by the builders, directly identified with Christ (and as the rock upon which security itself might
  be founded). This stone, this immovable and indestructible center, incorporated the patriarchal and
  --
  This is the message that everyone wants to hear. Risk your security. Face the unknown. Quit lying to
  yourself, and do what your heart truly tells you to do. You will be better for it, and so will the world.
  --
  intrapsychic incorporation of belief, security, and goal. Adoption of this secondary protective structure
  dramatically extends and shapes individual capability.
  --
  abandonment of individual interest hence meaning, hence divinity for safety and security; is sacrifice of
  the individual to appease the Great Mother and Great Father.
  --
  her from disrupting his familys (false) security. Unlike Raskolnikov, however, the good physician suffers no long-term
  psychic trauma, and everything returns to normal within the year. The movie, placid on the surface, is more

1.06 - MORTIFICATION, NON-ATTACHMENT, RIGHT LIVELIHOOD, #The Perennial Philosophy, #Aldous Huxley, #Philosophy
  A drunken man who falls out of a cart, though he may suffer, does not die. His bones are the same as other peoples; but he meets his accident in a different way. His spirit is in a condition of security. He is not conscious of riding in the cart; neither is he conscious of falling out of it. Ideas of life, death, fear and the like cannot penetrate his breast; and so he does not suffer from contact with objective existence. If such security is to be got from wine, how much more is it to be got from God?
  Chuang Tzu

1.06 - Origin of the four castes, #Vishnu Purana, #Vyasa, #Hinduism
  Formerly, oh best of Brahmans, when the truth-meditating Brahmā was desirous of creating the world, there sprang from his mouth beings especially endowed with the quality of goodness; others from his breast, pervaded by the quality of foulness; others from his thighs, in whom foulness and darkness prevailed; and others from his feet, in whom the quality of darkness predominated. These were, in succession, beings of the several castes, Brahmans, Kṣetriyas, Vaisyas, and Śūdras, produced from the mouth, the breast, the thighs, and the feet of Brahmā[2]. These he created for the performance of sacrifices, the four castes being the fit instruments of their celebration. By sacrifices, oh thou who knowest the truth, the gods are nourished; and by the rain which they bestow, mankind are supported[3]: and thus sacrifices, the source of happiness, are performed by pious men, attached to their duties, attentive to prescribed obligations, and walking in the paths of virtue. Men acquire (by them) heavenly fruition, or final felicity: they go, after death, to whatever sphere they aspire to, as the consequence of their human nature. The beings who were created by Brahmā, of these four castes, were at first endowed with righteousness and perfect faith; they abode wherever they pleased, unchecked by any impediment; their hearts were free from guile; they were pure, made free from soil, by observance of sacred institutes. In their sanctified minds Hari dwelt; and they were filled with perfect wisdom, by which they contemplated the glory of Viṣṇu[4]. After a while (after the Tretā age had continued for some period), that portion of Hari which has been described as one with Kāla (time) infused into created beings sin, as yet feeble though formidable, or passion and the like: the impediment of soul's liberation, the seed of iniquity, sprung from darkness and desire. The innate perfectness of human nature was then no more evolved: the eight kinds of perfection, Rasollāsā and the rest, were impaired[5]; and these being enfeebled, and sin gaining strength, mortals were afflicted with pain, arising from susceptibility to contrasts, as heat and cold, and the like. They therefore constructed places of refuge, protected by trees, by mountains, or by water; surrounded them by a ditch or a wall, and formed villages and cities; and in them erected appropriate dwellings, as defences against the sun and the cold[6]. Having thus provided security against the weather, men next began to employ themselves in manual labour, as a means of livelihood, (and cultivated) the seventeen kinds of useful grain-rice, barley, wheat, millet, sesamum, panic, and various sorts of lentils, beans, and pease[7]. These are the kinds cultivated for domestic use: but there are fourteen kinds which may be offered in sacrifice; they are, rice, barley, Māṣa, wheat, millet, and sesamum; Priya
  gu is the seventh, and kulattha, pulse, the eighth: the others are, Syāmāka, a sort of panic; Nīvāra, uñcultivated rice; Jarttila, wild sesamum; Gavedukā (coix); Markata, wild panic; and (a plant called) the seed or barley of the Bambu (Venu-yava). These, cultivated or wild, are the fourteen grains that were produced for purposes of offering in sacrifice; and sacrifice (the cause of rain) is their origin also: they again, with sacrifice, are the great cause of the perpetuation of the human race, as those understand who can discriminate cause and effect. Thence sacrifices were offered daily; the performance of which, oh best of Munis, is of essential service to mankind, and expiates the offences of those by whom they are observed. Those, however, in whose hearts the dross of sin derived from Time (Kāla) was still more developed, assented not to sacrifices, but reviled both them and all that resulted from them, the gods, and the followers of the Vedas. Those abusers of the Vedas, of evil disposition and conduct, and seceders from the path of enjoined duties, were plunged in wickedness[8]. The means of subsistence having been provided for the beings he had created, Brahmā prescribed laws suited to their station and faculties, the duties of the several castes and orders[9], and the regions of those of the different castes who were observant of their duties. The heaven of the Pitris is the region of devout Brahmans. The sphere of Indra, of Kṣetriyas who fly not from the field. The region of the winds is assigned to the Vaisyas who are diligent in their occupations and submissive. Śūdras are elevated to the sphere of the Gandharvas. Those Brahmans who lead religious lives go to the world of the eighty-eight thousand saints: and that of the seven Ṛṣis is the seat of pious anchorets and hermits. The world of ancestors is that of respectable householders: and the region of Brahmā is the asylum of religious mendicants[10]. The imperishable region of the Yogis is the highest seat of Viṣṇu, where they perpetually meditate upon the supreme being, with minds intent on him alone: the sphere where they reside, the gods themselves cannot behold. The sun, the moon, the planets, shall repeatedly be, and cease to be; but those who internally repeat the mystic adoration of the divinity, shall never know decay. For those who neglect their duties, who revile the Vedas, and obstruct religious rites, the places assigned after death are the terrific regions of darkness, of deep gloom, of fear, and of great terror; the fearful hell of sharp swords, the hell of scourges and of a waveless sea[11].

1.06 - The Sign of the Fishes, #Aion, #Carl Jung, #Psychology
  welfare, lifelong security, peace among the nations, etc.? He
  hides under idealisms, under -isms in general, and of these the

1.07 - A Song of Longing for Tara, the Infallible, #How to Free Your Mind - Tara the Liberator, #Thubten Chodron, #unset
  take refuge in another three jewels: in the shopping center, the refrigerator, and the tv. Realizing that these cannot provide the happiness and security we seek, we abandon our refuge in worldly things and take refuge in Tara,
  who embodies the Three Jewels.

1.08 - Phlegyas. Philippo Argenti. The Gate of the City of Dis., #The Divine Comedy, #Dante Alighieri, #Christianity
  Hast rendered me security, and drawn me
  From imminent peril that before me stood,

1.08 - Psycho therapy Today, #The Practice of Psycho therapy, #Carl Jung, #Psychology
  has no security in himself and reduces him to a helpless particle. The
  totalitarian State could not tolerate for one moment the right of

1.09 - Fundamental Questions of Psycho therapy, #The Practice of Psycho therapy, #Carl Jung, #Psychology
  The patient, that is to say, can win his own inner security only from the
   security of his relationship to the doctor as a human being. The doctor can

1.09 - SKIRMISHES IN A WAY WITH THE AGE, #Twilight of the Idols, #Friedrich Nietzsche, #Philosophy
  merely commanding. The highest sensation of power and security finds
  expression in grandeur of style. That power which no longer requires to
  --
  society cannot as a whole _stand security_ for itself into the remotest
  generations, marriage has no meaning whatsoever.--Modern marriage _has

1.09 - The Guardian of the Threshold, #Knowledge of the Higher Worlds, #Rudolf Steiner, #Theosophy
  A truly terrible spectral being confronts him, and he will need all the presence of mind and faith in the security of his path which he has had ample opportunity to acquire in the course of his previous training.
  The Guardian proclaims his signification somewhat in the following words: "Hitherto, powers invisible to thyself watched over thee. They saw to it that in the course of thy lives each of thy good deeds brought its reward, and each of thine evil deeds was attended by its evil results. Thanks to their influence thy character formed itself out of thy life-experiences and thy thoughts. They were the instruments of thy destiny. They ordained that measure of joy and pain allotted to thee in thine incarnations, according to thy conduct in lives gone by. They ruled over thee as the all-embracing

1.10 - The Magical Garment, #The Practice of Magical Evocation, #Franz Bardon, #Occultism
  When the robe is ready, the magician must wash it in running water in order to de-od it, so that no alien influence will remain on the silk. Then he must iron the robe by himself, for no other hands but his should ever come in contact with it. The magician will find these measures quite justified, for, being very particular in this respect, he will already find it disturbing if another person, even if it is someone of his family, of his relations or friends, merely touches one of his magical implements. The robe prepared in the manner described must then be put in front of the magician, who, by help of imagination, must unite himself with his deity and bless the robe, not as his own person, but as the deity evoking itself. He must take an oath, that is swear to the garment that he will only use it for ritual purposes. A dress influenced and impregnated in such a way then has genuine magical power and will offer the magician absolute security. Before the magician prepares his robe for magical purposes he may embroider it, if he likes, with universal symbols similar to his cap. All this, of course, entirely depends on his own will and he may rest assured that he cannot make any mistakes in this respect.

1.10 - The Three Modes of Nature, #The Synthesis Of Yoga, #Sri Aurobindo, #Integral Yoga
  This supreme harmony cannot come except by the cessation of egoistic will and choice and act and the quiescence of our limited intelligence. The individual ego must cease to strive, the mind fall silent, the desire-will learn not to initiate. Our personality must join its source and all thought and initiation come from above. The secret Master of our activities will be slowly unveiled to us and from the security of the supreme Will and Knowledge give the sanction to the Divine Shakti who will do all works in us with a purified and exalted nature for her instrument; the individual centre of personality will be only the upholder of her works here, their recipient and channel, the reflector of her power and luminous participator in her light, joy and force. Acting it will not act and no reaction of the lower
  Prakriti will touch it. The transcendence of the three modes of

1.10 - THINGS I OWE TO THE ANCIENTS, #Twilight of the Idols, #Friedrich Nietzsche, #Philosophy
  out of measures of security calculated to preserve each member of
  their society from the inner _explosive material_ that lay in his

1.12 - ON THE FLIES OF THE MARKETPLACE, #Thus Spoke Zarathustra, #Friedrich Nietzsche, #Philosophy
  sudden men, go back to your security: it is only in
  the market place that one is assaulted with Yes? or No?

1.13 - The Lord of the Sacrifice, #Essays On The Gita, #Sri Aurobindo, #Integral Yoga
   the impermanent, mutable, multiple activity of the world finds above itself its base of permanence, security and peace, is the immobile Self, the Akshara, the Brahman. If we see this, we shall see that to raise one's consciousness and the poise of one's being out of limited personality into this infinite and impersonal
  Brahman is the first spiritual necessity. To see all beings in this one Self is the knowledge which raises the soul out of egoistic ignorance and its works and results; to live in it is to acquire peace and firm spiritual foundation.

1.14 - The Structure and Dynamics of the Self, #Aion, #Carl Jung, #Psychology
  "It restored their former security of life to those once near to death," the author
  says of the Pelican, which, as we know, is an allegory of Christ.

1.16 - The Suprarational Ultimate of Life, #The Human Cycle, #Sri Aurobindo, #Integral Yoga
  For this growing collectivist or cooperative tendency embodies the second instinct of the vital or practical being in man. It shows itself first in the family ideal by which the individual subordinates himself and finds his vital satisfaction and practical account, not in his own predominant individuality, but in the life of a larger vital ego. This ideal played a great part in the old aristocratic views of life; it was there in the ancient Indian idea of the kula and the kuladharma, and in later India it was at the root of the joint-family system which made the strong economic base of mediaeval Hinduism. It has taken its grossest Vaishya form in the ideal of the British domestic Philistine, the idea of the human individual born here to follow a trade or profession, to marry and procreate a family, to earn his living, to succeed reasonably if not to amass an efficient or ostentatious wealth, to enjoy for a space and then die, thus having done the whole business for which he came into the body and performed all his essential duty in life,for this apparently was the end unto which man with all his divine possibilities was born! But whatever form it may take, however this grossness may be refined or toned down, whatever ethical or religious conceptions may be superadded, always the family is an essentially practical, vitalistic and economic creation. It is simply a larger vital ego, a more complex vital organism that takes up the individual and englobes him in a more effective competitive and cooperative life unit. The family like the individual accepts and uses society for its field and means of continuance, of vital satisfaction and well-being, of aggrandisement and enjoyment. But this life unit also, this multiple ego can be induced by the cooperative instinct in life to subordinate its egoism to the claims of the society and trained even to sacrifice itself at need on the communal altar. For the society is only a still larger vital competitive and cooperative ego that takes up both the individual and the family into a more complex organism and uses them for the collective satisfaction of its vital needs, claims, interests, aggrandisement, well-being, enjoyment. The individual and family consent to this exploitation for the same reason that induced the individual to take on himself the yoke of the family, because they find their account in this wider vital life and have the instinct in it of their own larger growth, security and satisfaction. The society, still more than the family, is essentially economic in its aims and in its very nature. That accounts for the predominantly economic and materialistic character of modern ideas of Socialism; for these ideas are the full rationalistic flowering of this instinct of collective life. But since the society is one competitive unit among many of its kind, and since its first relations with the others are always potentially hostile, even at the best competitive and not cooperative, and have to be organised in that view, a political character is necessarily added to the social life, even predominates for a time over the economic and we have the nation or State. If we give their due value to these fundamental characteristics and motives of collective existence, it will seem natural enough that the development of the collective and cooperative idea of society should have culminated in a huge, often a monstrous overgrowth of the vitalistic, economic and political ideal of life, society and civilisation.
  What account are the higher parts of mans being, those finer powers in him that more openly tend to the growth of his divine nature, to make with this vital instinct or with its gigantic modern developments? Obviously, their first impulse must be to take hold of them and dominate and transform all this crude life into their own image; but when they discover that here is a power apart, as persistent as themselves, that it seeks a satisfaction per se and accepts their impress to a certain extent, but not altogether and, as it were, unwillingly, partially, unsatisfactorily,what then? We often find that ethics and religion especially, when they find themselves in a constant conflict with the vital instincts, the dynamic life-power in man, proceed to an attitude of almost complete hostility and seek to damn them in idea and repress them in fact. To the vital instinct for wealth and wellbeing they oppose the ideal of a chill and austere poverty; to the vital instinct for pleasure the ideal not only of self-denial, but of absolute mortification; to the vital instinct for health and ease the ascetics contempt, disgust and neglect of the body; to the vital instinct for incessant action and creation the ideal of calm and inaction, passivity, contemplation; to the vital instinct for power, expansion, domination, rule, conquest the ideal of humility, self-abasement, submission, meek harmlessness, docility in suffering; to the vital instinct of sex on which depends the continuance of the species, the ideal of an unreproductive chastity and celibacy; to the social and family instinct the anti-social ideal of the ascetic, the monk, the solitary, the world-shunning saint. Commencing with discipline and subordination they proceed to complete mortification, which means when translated the putting to death of the vital instincts, and declare that life itself is an illusion to be shed from the soul or a kingdom of the flesh, the world and the devil,accepting thus the claim of the unenlightened and undisciplined life itself that it is not, was never meant to be, can never become the kingdom of God, a high manifestation of the Spirit.

1.17 - The Divine Soul, #The Life Divine, #Sri Aurobindo, #Integral Yoga
  4:Its consciousness would not be shut out from any part of the infinite truth, nor limited by any poise or status that it might assume in its relations with others, nor condemned to any loss of self-knowledge by its acceptance of a purely phenomenal individuality and the play of practical differentiation. It would in its self-experience live eternally in the presence of the Absolute. To us the Absolute is only an intellectual conception of indefinable existence. The intellect tells us simply that there is a Brahman higher than the highest,2 an Unknowable that knows itself in other fashion than that of our knowledge; but the intellect cannot bring us into its presence. The divine soul living in the Truth of things would, on the contrary, always have the conscious sense of itself as a manifestation of the Absolute. Its immutable existence it would be aware of as the original "self-form"3 of that Transcendent, - Sachchidananda; its play of conscious being it would be aware of as manifestation of That in forms of Sachchidananda. In its every state or act of knowledge it would be aware of the Unknowable cognising itself by a form of variable self-knowledge; in its every state or act of power, will or force aware of the Transcendence possessing itself by a form of conscious power of being and knowledge; in its every state or act of delight, joy or love aware of the Transcendence embracing itself by a form of conscious self-enjoyment. This presence of the Absolute would not be with it as an experience occasionally glimpsed or finally arrived at and held with difficulty or as an addition, acquisition or culmination superimposed on its ordinary state of being: it would be the very foundation of its being both in the unity and the differentiation; it would be present to it in all its knowing, willing, doing, enjoying; it would be absent neither from its timeless self nor from any moment of Time, neither from its spaceless being nor from any determination of its extended existence, neither from its unconditioned purity beyond all cause and circumstance nor from any relation of circumstance, condition and causality. This constant presence of the Absolute would be the basis of its infinite freedom and delight, ensure its security in the play and provide the root and sap and essence of its divine being.
  5:Moreover such a divine soul would live simultaneously in the two terms of the eternal existence of Sachchidananda, the two inseparable poles of the self-unfolding of the Absolute which we call the One and the Many. All being does really so live; but to our divided self-awareness there is an incompatibility, a gulf between the two driving us towards a choice, to dwell either in the multiplicity exiled from the direct and entire consciousness of the One or in the unity repellent of the consciousness of the Many. But the divine soul would not be enslaved to this divorce and duality. It would be aware in itself at once of the infinite self-concentration and the infinite self-extension and diffusion. It would be aware simultaneously of the One in its unitarian consciousness holding the innumerable multiplicity in itself as if potential, unexpressed and therefore to our mental experience of that state non-existent, and of the One in its extended consciousness holding the multiplicity thrown out and active as the play of its own conscious being, will and delight. It would equally be aware of the Many ever drawing down to themselves the One that is the eternal source and reality of their existence and of the Many ever mounting up attracted to the One that is the eternal culmination and blissful justification of all their play of difference. This vast view of things is the mould of the Truth-Consciousness, the foundation of the large Truth and Right hymned by the Vedic seers; this unity of all these terms of opposition is the real Adwaita, the supreme comprehending word of the knowledge of the Unknowable.

1.17 - The Transformation, #Sri Aurobindo or the Adventure of Consciousness, #Satprem, #Integral Yoga
  We have in fact spent all these centuries preparing the Base: a base of security and well-being through our science, a base of charity through our religions and morals, a base of beauty and harmony through our arts, and a mental base of rigorous exactitude, but these are all bases for something else. Absorbed as we are in our effort for perfection, we see only one angle of the great Work the angle of earthly immortality, like the rishis; the angle of eternal Permanence, like the Buddha; the angle of charity, of well-being, all kinds of angles but we are not going to continue playing forever like children with building blocks! None of these is an end, but only a negative condition of the Play. Nothing has really yet begun! Perhaps we are expected,
  first, to become conscious of the Play in order for it to begin. We have exhausted all kinds of adventures since Jules Verne, and they have all gradually closed in on us. What war, what revolution is still worth giving one's blood for? Our Everests have all been deflowered, and the high seas are patrolled night and day; everything is monitored,

1.19 - Equality, #Essays On The Gita, #Sri Aurobindo, #Integral Yoga
   wise man who labours for perfection is carried away by the vehement insistence of the senses." Perfect security can only be had by resorting to something higher than the sattwic quality, something higher than the discerning mind, to the Self, - not the philosopher's intelligent self, but the divine sage's spiritual self which is beyond the three gunas. All must be consummated by a divine birth into the higher spiritual nature.
  And the philosopher's equality is like the Stoic's, like the world-fleeing ascetic's, inwardly a lonely freedom, remote and aloof from men; but the man born to the divine birth has found the Divine not only in himself, but in all beings. He has realised his unity with all and his equality is therefore full of sympathy and oneness. He sees all as himself and is not intent on his lonely salvation; he even takes upon himself the burden of their happiness and sorrow by which he is not himself affected or subjected. The perfect sage, the Gita more than once repeats, is ever engaged with a large equality in doing good to all creatures and makes that his occupation and delight, sarvabhutahite ratah.. The perfect Yogin is no solitary musing on the Self in his ivory tower of spiritual isolation, but yuktah. kr.tsna-karma-kr.t, a many-sided universal worker for the good of the world, for

1.2.01 - The Call and the Capacity, #Letters On Yoga II, #Sri Aurobindo, #Integral Yoga
  It is difficult to say that any particular quality makes one fit or the lack of it unfit. One may have strong sex impulses, doubts, revolts and yet succeed in the end, while another may fail. If one has a fundamental sincerity, a will to go through in spite of all things and a readiness to be guided, that is the best security in the sadhana.
  Fitness for Yoga is a very relative term - the real fitness comes by the soul's call and the power to open oneself to the Divine.

12.01 - The Return to Earth, #Savitri, #Sri Aurobindo, #Integral Yoga
  A quiet rapture, a vast security.
  Then sighing to her touch the soft-winged sleep

1.2.08 - Faith, #Letters On Yoga II, #Sri Aurobindo, #Integral Yoga
  Confidence - the sense of security that goes with trust.
  Faith is a feeling in the whole being, belief is mental; confidence means trust in a person or in the Divine or a feeling of surety about the result of one's seeking or endeavour.
  --
  There is no other reason for your troubles than this readiness to listen to their knock and open the door. You speak of X, but that is why X gets on because when they knock, he turns them out at once. If you resolutely do that, you will arrive also at security and perfect ease - for there are only two things that create in security
  - doubt and desire. If you desire only the Divine, there is an absolute certitude that you will reach the Divine. But all these questionings and repinings at each moment because you have not yet reached, only delay and keep an impeding curtain before the heart and the eyes. For at every step when one makes an advance, the opposite forces will throw this doubt like a rope between the legs and stop one short with a stumble - it is their metier to do that. One must not give them that advantage. Instead of saying,

12.09 - The Story of Dr. Faustus Retold, #Collected Works of Nolini Kanta Gupta - Vol 04, #Nolini Kanta Gupta, #Integral Yoga
   In our Puranas too we see whenever and wherever the Rishis assemble and start doing tapasya, the hostiles they are called rakshasasrush in, try to break their tapasya, even kill them. The akshasas are the embodiments of the dark forces, agents and armies of the Devil himself. The Rishis had to seek refuge in the help of the gods, that is to say, take refuge in the strength and sincerity of their souls, that is the only way to safety and security, to the achievement of their goal.
   I may dwell here upon a characteristic feature in the matter of rakshasas, they are a special type of hostile force. Rakshasas are well known for their greed for human flesh, the flesh of animals is the usual food for animals that take flesh excepting perhaps the Royal Bengal Tiger, even then it is said they do so only when compelled, but for the rakshasas the human fleshnara mansais a supreme delicacy; sweet, very sweet indeed it is to the tongue of the rakshasa. But is it really sweet? Is there a special reason for such a predilection in them for human flesh? Here is an explanation. It occurs to me that human flesh is really sweet; the human body has been sweetened because it contains something which the other animals do not have, it is precisely the thing that we were talking about just now, because the human body enshrines a soul, and the soul is the source of all sweetness. Thus, since the body holds the soul in it, the body itself becomes sweet by contact or infusion. The rakshasas have come to know of it, that is to say, not the soul but the sweetness that the soul induces in the material flesh. There must be some truth in the suggestion. Consequently a rishi's body must be all the more appetising to the rakshasa, for it must contain a larger store of sweetness, a rishi's body enshrining a larger and greater soul in view of his rishihood.

1.21 - The Ascent of Life, #The Life Divine, #Sri Aurobindo, #Integral Yoga
  1:WE HAVE seen that as the divided mortal Mind, parent of limitation and ignorance and the dualities, is only a dark figure of the supermind, of the self-luminous divine Consciousness in its first dealings with the apparent negation of itself from which our cosmos commences, so also Life as it emerges in our material universe, an energy of the dividing Mind subconscious, submerged, imprisoned in Matter, Life as the parent of death, hunger and incapacity, is only a dark figure of the divine superconscient Force whose highest terms are immortality, satisfied delight and omnipotence. This relation fixes the nature of that great cosmic processus of which we are a part; it determines the first, the middle and the ultimate terms of our evolution. The first terms of Life are division, a forcedriven subconscient will, apparent not as will but as dumb urge of physical energy, and the impotence of an inert subjection to the mechanical forces that govern the interchange between the form and its environment. This inconscience and this blind but potent action of Energy are the type of the material universe as the physical scientist sees it and this his view of things extends and turns into the whole of basic existence; it is the consciousness of Matter and the accomplished type of material living. But there comes a new equipoise, there intervenes a new set of terms which increase in proportion as Life delivers itself out of this form and begins to evolve towards conscious Mind; for the middle terms of Life are death and mutual devouring, hunger and conscious desire, the sense of a limited room and capacity and the struggle to increase, to expand, to conquer and to possess. These three terms are the basis of that status of evolution which the Darwinian theory first made plain to human knowledge. For the phenomenon of death involves in itself a struggle to survive, since death is only the negative term in which Life hides from itself and tempts its own positive being to seek for immortality. The phenomenon of hunger and desire involves a struggle towards a status of satisfaction and security, since desire is only the stimulus by which Life tempts its own positive being to rise out of the negation of unfulfilled hunger towards the full possession of the delight of existence. The phenomenon of limited capacity involves a struggle towards expansion, mastery and possession, the possession of the self and the conquest of the environment, since limitation and defect are only the negation by which Life tempts its own positive being to seek for the perfection of which it is eternally capable. The struggle for life is not only a struggle to survive, it is also a struggle for possession and perfection, since only by taking hold of the environment whether more or less, whether by self-adaptation to it or by adapting it to oneself either by accepting and conciliating it or by conquering and changing it, can survival be secured, and equally is it true that only a greater and greater perfection can assure a continuous permanence, a lasting survival. It is this truth that Darwinism sought to express in the formula of the survival of the fittest.
  2:But as the scientific mind sought to extend to Life the mechanical principle proper to the existence and concealed mechanical consciousness in Matter, not seeing that a new principle has entered whose very reason of being is to subject to itself the mechanical, so the Darwinian formula was used to extend too largely the aggressive principle of Life, the vital selfishness of the individual, the instinct and process of self-preservation, selfassertion and aggressive living. For these two first states of Life contain in themselves the seeds of a new principle and another state which must increase in proportion as Mind evolves out of matter through the vital formula into its own law. And still more must all things change when as Life evolves upward towards Mind, so Mind evolves upward towards Supermind and Spirit. Precisely because the struggle for survival, the impulse towards permanence is contradicted by the law of death, the individual life is compelled, and used, to secure permanence rather for its species than for itself; but this it cannot do without the co-operation of others; and the principle of co-operation and mutual help, the desire of others, the desire of the wife, the child, the friend and helper, the associated group, the practice of association, of conscious joining and interchange are the seeds out of which flowers the principle of love. Let us grant that at first love may only be an extended selfishness and that this aspect of extended selfishness may persist and dominate, as it does still persist and dominate, in higher stages of the evolution: still as mind evolves and more and more finds itself, it comes by the experience of life and love and mutual help to perceive that the natural individual is a minor term of being and exists by the universal. Once this is discovered, as it is inevitably discovered by man the mental being, his destiny is determined; for he has reached the point at which Mind can begin to open to the truth that there is something beyond itself; from that moment his evolution, however obscure and slow, towards that superior something, towards Spirit, towards supermind, towards supermanhood is inevitably predetermined.

1.22 - The Necessity of the Spiritual Transformation, #The Human Cycle, #Sri Aurobindo, #Integral Yoga
  Nietzsches idea that to develop the superman out of our present very unsatisfactory manhood is our real business, is in itself an absolutely sound teaching. His formulation of our aim, to become ourselves, to exceed ourselves, implying, as it does, that man has not yet found all his true self, his true nature by which he can successfully and spontaneously live, could not be bettered. But then the question of questions is there, what is our self, and what is our real nature? What is that which is growing in us, but into which we have not yet grown? It is something divine, is the answer, a divinity Olympian, Apollonian, Dionysiac, which the reasoning and consciously willing animal, man, is labouring more or less obscurely to become. Certainly, it is all that; but in what shall we find the seed of that divinity and what is the poise in which the superman, once self-found, can abide and be secure from lapse into this lower and imperfect manhood? Is it the intellect and will, the double-aspected buddhi of the Indian psychological system? But this is at present a thing so perplexed, so divided against itself, so uncertain of everything it gains, up to a certain point indeed magically creative and efficient but, when all has been said and done, in the end so splendidly futile, so at war with and yet so dependent upon and subservient to our lower nature, that even if in it there lies concealed some seed of the entire divinity, it can hardly itself be the seed and at any rate gives us no such secure and divine poise as we are seeking. Therefore we say, not the intellect and will, but that supreme thing in us yet higher than the Reason, the spirit, here concealed behind the coatings of our lower nature, is the secret seed of the divinity and will be, when discovered and delivered, luminous above the mind, the wide ground upon which a divine life of the human being can be with security founded.
  When we speak of the superman, we speak evidently of something abnormal or supernormal to our present nature, so much so that the very idea of it becomes easily alarming and repugnant to our normal humanity. The normal human does not desire to be called out from its constant mechanical round to scale what may seem to it impossible heights and it loves still less the prospect of being exceeded, left behind and dominated,although the object of a true supermanhood is not exceeding and domination for its own sake but precisely the opening of our normal humanity to something now beyond itself that is yet its own destined perfection. But mark that this thing which we have called normal humanity, is itself something abnormal in Nature, something the like and parity of which we look around in vain to discover; it is a rapid freak, a sudden miracle. Abnormality in Nature is no objection, no necessary sign of imperfection, but may well be an effort at a much greater perfection. But this perfection is not found until the abnormal can find its own secure normality, the right organisation of its life in its own kind and power and on its own level. Man is an abnormal who has not found his own normality,he may imagine he has, he may appear to be normal in his own kind, but that normality is only a sort of provisional order; therefore, though man is infinitely greater than the plant or the animal, he is not perfect in his own nature like the plant and the animal. This imperfection is not a thing to be at all deplored, but rather a privilege and a promise, for it opens out to us an immense vista of self-development and self-exceeding. Man at his highest is a half-god who has risen up out of the animal Nature and is splendidly abnormal in it, but the thing which he has started out to be, the whole god, is something so much greater than what he is that it seems to him as abnormal to himself as he is to the animal. This means a great and arduous labour of growth before him, but also a splendid crown of his race and his victory. A kingdom is offered to him beside which his present triumphs in the realms of mind or over external Nature will appear only as a rough hint and a poor beginning.
  What precisely is the defect from which all his imperfection springs? We have already indicated it,that has indeed been the general aim of the preceding chapters,but it is necessary to state it now more succinctly and precisely. We see that at first sight man seems to be a double nature, an animal nature of the vital and physical being which lives according to its instincts, impulses, desires, its automatic orientation and method, and with that a half-divine nature of the self-conscious intellectual, ethical, aesthetic, intelligently emotional, intelligently dynamic being who is capable of finding and understanding the law of his own action and consciously using and bettering it, a reflecting mind that understands Nature, a will that uses, elevates, perfects Nature, a sense that intelligently enjoys Nature. The aim of the animal part of us is to increase vital possession and enjoyment; the aim of the semi-divine part of us is also to grow, possess and enjoy, but first to possess and enjoy intelligently, aesthetically, ethically, by the powers of the mind much more than by the powers of the life and body, and, secondly, to possess and enjoy, not so much the vital and physical except in so far as that is necessary as a foundation and starting-point, a preliminary necessity or condition, a standing-ground and basis, but things intellectual, ethical and aesthetic, and to grow not so much in the outward life, except in so far as that is necessary to the security, ease and dignity of our human existence, but in the true, the good and the beautiful. This is the manhood of man, his unique distinction and abnormality in the norm of this inconscient material Nature.
  This means that man has developed a new power of being,let us call it a new soul-power, with the premiss that we regard the life and the body also as a soul-power, and the being who has done that is under an inherent obligation not only to look at the world and revalue all in it from this new elevation, but to compel his whole nature to obey this power and in a way reshape itself in its mould, and even to reshape, so far as he can, his environmental life into some image of this greater truth and law. In doing this lies his svadharma, his true rule and way of being, the way of his perfection and his real happiness. Failing in this, he fails in the aim of his nature and his being, and has to begin again until he finds the right path and arrives at a successful turning-point, a decisive crisis of transformation. Now this is precisely what man has failed to do. He has effected something, he has passed a certain stage of his journey. He has laid some yoke of the intellectual, ethical, aesthetic rule on his vital and physical parts and made it impossible for himself to be content with or really to be the mere human animal. But more he has not been able to do successfully. The transformation of his life into the image of the true, the good and the beautiful seems as far off as ever; if ever he comes near to some imperfect form of it,and even then it is only done by a class or by a number of individuals with some reflex action on the life of the mass,he slides back from it in a general decay of his life, or else stumbles on from it into some bewildering upheaval out of which he comes with new gains indeed but also with serious losses. He has never arrived at any great turning-point, any decisive crisis of transformation.
  --
  The first result of this imperfect awakening seemed likely to be a return to an older ideal, with a will to use the reason and the ethical mind better and more largely in the ordering of individual, of national and of international life. But such an attempt, though well enough as a first step, cannot be the real and final solution; if our effort ends there, we shall not arrive. The solution lies, we have said, in an awakening to our real, because our highest self and nature,that hidden self which we are not yet, but have to become and which is not the strong and enlightened vital Will hymned by Nietzsche, but a spiritual self and spiritual nature that will use the mental being which we already are, but the mental being spiritualised, and transform by a spiritual ideality the aim and action of our vital and physical nature. For this is the formula of man in his highest potentiality, and safety lies in tending towards our highest and not in resting content with an inferior potentiality. To follow after the highest in us may seem to be to live dangerously, to use again one of Nietzsches inspired expressions, but by that danger comes victory and security. To rest in or follow after an inferior potentiality may seem safe, rational, comfortable, easy, but it ends badly, in some futility or in a mere circling, down the abyss or in a stagnant morass. Our right and natural road is towards the summits.
  We have then to return to the pursuit of an ancient secret which man, as a race, has seen only obscurely and followed after lamely, has indeed understood only with his surface mind and not in its heart of meaning, and yet in following it lies his social no less than his individual salvation,the ideal of the kingdom of God, the secret of the reign of the Spirit over mind and life and body. It is because they have never quite lost hold of this secret, never disowned it in impatience for a lesser victory, that the older Asiatic nations have survived so persistently and can now, as if immortal, raise their faces towards a new dawn; for they have fallen asleep, but they have not perished. It is true that they have for a time failed in life, where the European nations who trusted to the flesh and the intellect have succeeded; but that success, speciously complete but only for a time, has always turned into a catastrophe. Still Asia had failed in life, she had fallen in the dust, and even if the dust in which she was lying was sacred, as the modern poet of Asia has declared,though the sacredness may be doubted,still the dust is not the proper place for man, nor is to lie prostrate in it his right human attitude. Asia temporarily failed not because she followed after things spiritual, as some console themselves by saying,as if the spirit could be at all a thing of weakness or a cause of weakness,but because she did not follow after the spirit sufficiently, did not learn how entirely to make it the master of life. Her mind either made a gulf and a division between life and the Spirit or else rested in a compromise between them and accepted as final socio-religious systems founded upon that compromise. So to rest is perilous; for the call of the Spirit more than any other demands that we shall follow it always to the end, and the end is neither a divorce and departure nor a compromise, but a conquest of all by the spirit and that reign of the seekers after perfection which, in the Hindu religious symbol, the last Avatar comes to accomplish.

1.26 - On discernment of thoughts, passions and virtues, #The Ladder of Divine Ascent, #Saint John of Climacus, #unset
  (F) security of the light of prayer (R) god of the demons
  (G) abundance of divine illumination (S) lord of the passions

1.28 - Supermind, Mind and the Overmind Maya, #The Life Divine, #Sri Aurobindo, #Integral Yoga
  8:In its nature and law the Overmind is a delegate of the Supermind Consciousness, its delegate to the Ignorance. Or we might speak of it as a protective double, a screen of dissimilar similarity through which Supermind can act indirectly on an Ignorance whose darkness could not bear or receive the direct impact of a supreme Light. Even, it is by the projection of this luminous Overmind corona that the diffusion of a diminished light in the Ignorance and the throwing of that contrary shadow which swallows up in itself all light, the Inconscience, became at all possible. For Supermind transmits to Overmind all its realities, but leaves it to formulate them in a movement and according to an awareness of things which is still a vision of Truth and yet at the same time a first parent of the Ignorance. A line divides Supermind and Overmind which permits a free transmission, allows the lower Power to derive from the higher Power all it holds or sees, but automatically compels a transitional change in the passage. The integrality of the Supermind keeps always the essential truth of things, the total truth and the truth of its individual self-determinations clearly knit together; it maintains in them an inseparable unity and between them a close interpenetration and a free and full consciousness of each other: but in Overmind this integrality is no longer there. And yet the Overmind is well aware of the essential Truth of things; it embraces the totality; it uses the individual self-determinations without being limited by them: but although it knows their oneness, can realise it in a spiritual cognition, yet its dynamic movement, even while relying on that for its security, is not directly determined by it. Overmind Energy proceeds through an illimitable capacity of separation and combination of the powers and aspects of the integral and indivisible all-comprehending Unity. It takes each Aspect or Power and gives to it an independent action in which it acquires a full separate importance and is able to work out, we might say, its own world of creation. Purusha and Prakriti, Conscious Soul and executive Force of Nature, are in the supramental harmony a two-aspected single truth, being and dynamis of the Reality; there can be no disequilibrium or predominance of one over the other. In Overmind we have the origin of the cleavage, the trenchant distinction made by the philosophy of the Sankhyas in which they appear as two independent entities, Prakriti able to dominate Purusha and cloud its freedom and power, reducing it to a witness and recipient of her forms and actions, Purusha able to return to its separate existence and abide in a free self-sovereignty by rejection of her original overclouding material principle. So with the other aspects or powers of the Divine Reality, One and Many, Divine Personality and Divine Impersonality, and the rest; each is still an aspect and power of the one Reality, but each is empowered to act as an independent entity in the whole, arrive at the fullness of the possibilities of its separate expression and develop the dynamic consequences of that separateness. At the same time in Overmind this separateness is still founded on the basis of an implicit underlying unity; all possibilities of combination and relation between the separated Powers and Aspects, all interchanges and mutualities of their energies are freely organised and their actuality always possible.
  9:If we regard the Powers of the Reality as so many Godheads, we can say that the Overmind releases a million Godheads into action, each empowered to create its own world, each world capable of relation, communication and interplay with the others. There are in the Veda different formulations of the nature of the Gods: it is said they are all one Existence to which the sages give different names; yet each God is worshipped as if he by himself is that Existence, one who is all the other Gods together or contains them in his being; and yet again each is a separate Deity acting sometimes in unison with companion deities, sometimes separately, sometimes even in apparent opposition to other Godheads of the same Existence. In the Supermind all this would be held together as a harmonised play of the one Existence; in the Overmind each of these three conditions could be a separate action or basis of action and have its own principle of development and consequences and yet each keep the power to combine with the others in a more composite harmony. As with the One Existence, so with its Consciousness and Force. The One Consciousness is separated into many independent forms of consciousness and knowledge; each follows out its own line of truth which it has to realise. The one total and manysided Real-Idea is split up into its many sides; each becomes an independent Idea-Force with the power to realise itself. The one Consciousness-Force is liberated into its million forces, and each of these forces has the right to fulfil itself or to assume, if needed, a hegemony and take up for its own utility the other forces. So too the Delight of Existence is loosed out into all manner of delights and each can carry in itself its independent fullness or sovereign extreme. Overmind thus gives to the One Existence-Consciousness-Bliss the character of a teeming of infinite possibilities which can be developed into a multitude of worlds or thrown together into one world in which the endlessly variable outcome of their play is the determinant of the creation, of its process, its course and its consequence.

1.2 - Katha Upanishads, #Kena and Other Upanishads, #Sri Aurobindo, #Integral Yoga
  infinity of power and the other shore of security and praise
  and scope and wide moving and firm foundation,11 wise
  --
  supreme and imperishable, and the far shore of security to
  those who would cross this ocean.

1.3.03 - Quiet and Calm, #Letters On Yoga II, #Sri Aurobindo, #Integral Yoga
  Peace is a deep quietude where no disturbance can come - a quietude with a sense of established security and release.
  In complete silence there are either no thoughts or, if they come, they are felt as something coming from outside and not disturbing the silence.

1.37 - Describes the excellence of this prayer called the Paternoster, and the many ways in which we shall find consolation in it., #The Way of Perfection, #Saint Teresa of Avila, #Christianity
  on earth can desire, because it brings complete security. No words could ever exaggerate the
  importance of this. The Lord, then, saw it was necessary to awaken such souls and to remind them

1.39 - Continues the same subject and gives counsels concerning different kinds of temptation. Suggests two remedies by which we may be freed from temptations.135, #The Way of Perfection, #Saint Teresa of Avila, #Christianity
  There is another very dangerous kind of temptation: a feeling of security caused by the belief
  that we shall never again return to our past faults and to the pleasures of the world. "I know all
  --
  sense of security, they think nothing of running once more into occasions of sin. They soon come
  up against these-and then God preserve them from falling back farther than before! The devil,

1.39 - Prophecy, #Magick Without Tears, #Aleister Crowley, #Philosophy
    nine months before the Betrayal, which stripped Britain of the last rags of honour, prestige and security, and will break up civilisation.
  I have always maintained that Munich marked the true outbreak of the war, because Hitler's rape of Czecho-Slovakia, however justifiable, was irreconcilably incompatible with our Foreign Policy; and Munich is Nine Months to a day after my Gesture.

1.49 - Ancient Deities of Vegetation as Animals, #The Golden Bough, #James George Frazer, #Occultism
  kept till next sowing-time or harvest as a pledge and security for
  the continuance or renewal of the corn-spirit's energies.

1.53 - Mother-Love, #Magick Without Tears, #Aleister Crowley, #Philosophy
  This is commonly seen as the possessive instinct: it may often be masked as "protective" but its essential truth is the impulse to devour. Hence the death-like idea of "home," where she can digest her victims in security and at leisure.
  Hence, as even Jung saw in his very first book, and wrote in stated terms, the first task of manhood of the "hero" is to escape from the mother. Now the son, with his male formula, his formula of life, his instinct to push out, to break down all that would restrain him, finds it perfectly natural to "bite the hand that fed him," as the complaint might piteously wail. But the daughter has no club to smash, no sword to cut; all she can hope to do is to pass the buck. The amoeba, born of fusion,[111] nourished by wrapping its pseudopods around such drifting particles as come within its scope, is but a parasite on its own dam until the fusion is complete.

1.60 - Between Heaven and Earth, #The Golden Bough, #James George Frazer, #Occultism
  eternally fresh and young, a pledge and security that men and
  animals shall in like manner renew their youth by a perpetual

1.65 - Balder and the Mistletoe, #The Golden Bough, #James George Frazer, #Occultism
  comparative security above the ground, appears to promise to its
  fortunate possessor a similar security from some of the ills that
  beset the life of man on earth. We have already met with examples of

1.66 - The External Soul in Folk-Tales, #The Golden Bough, #James George Frazer, #Occultism
  deposits it for security in some snug spot, intending to replace it
  in his body when the danger is past. Or if he should discover some
  place of absolute security, he may be content to leave his soul
  there permanently. The advantage of this is that, so long as the

1.67 - The External Soul in Folk-Custom, #The Golden Bough, #James George Frazer, #Occultism
  time in some place of security outside the body, or at all events in
  the hair, is found in the popular tales of many races. It remains to
  --
  further security he deposits in his own medicine-bag. It seems
  probable that many amulets have been similarly regarded as
  --
  kept for greater security. An old Mang'anje woman in the West Shire
  district of British Central Africa used to wear round her neck an

1.78 - Sore Spots, #Magick Without Tears, #Aleister Crowley, #Philosophy
  In the case of religion, the consciousness of guilt extended to cover everything from "playin' chuch-farden on the blessd tombstones" to "the blasphemy against the Holy Ghost." Against this vague and monstrous bogey, religion is the only safeguard, and therefore to suggest the unsoundness of the guarantee is to strike at the roots of all security. It is like hinting to some besotted and uxorious oldster, that his young wife may be unfaithful. It is the poison that Iago dripped so skillfully into the long hairy ear of the dull Moor. So he reacts irrationally every bush conceals a bear nay, more likely a Boojum,[154] or a Bunyip,[155] or some other creature of fear-spurred Imagination! "Monstrum informe, ingens, horrendum."[156] Note well the "informe."
  And because the guarantee is unsound (and must be, or where would be the point of "Faith"?) reassurance is in the nature of things impossible. Like the demented rider in The Erl-King, the chase goes ever wilder and wilder, until he plunges at the end into the bottomless bog of madness and destruction.

18.02 - Ramprasad, #Collected Works of Nolini Kanta Gupta - Vol 05, #Nolini Kanta Gupta, #Integral Yoga
   A right hand calls down safety and security:
   Oh! the dark beauty of her matchless body.

1.80 - Life a Gamble, #Magick Without Tears, #Aleister Crowley, #Philosophy
  but this is another kind of security; it is the Hubris which "tempts Providence," the insolence of thinking that nothing can go wrong.
  Anyhow, there's no such thing as safety. Life is a gamble. From the moment of incarnation a million accidents are possible. Miscarriage, still-birth, abortion; throughout life, until your heart beats for the last time, "you never can tell"   and then you start all over again with your next incarnation!

1929-04-14 - Dangers of Yoga - Two paths, tapasya and surrender - Impulses, desires and Yoga - Difficulties - Unification around the psychic being - Ambition, undoing of many Yogis - Powers, misuse and right use of - How to recognise the Divine Will - Accept things that come from Divine - Vital devotion - Need of strong body and nerves - Inner being, invariable, #Questions And Answers 1929-1931, #The Mother, #Integral Yoga
  Yoga is not more dangerous to the people of the West than to those of the East. Everything depends upon the spirit with which you approach it. Yoga does become dangerous if you want it for your own sake, to serve a personal end. It is not dangerous, on the contrary, it is safety and security itself, if you go to it with a sense of its sacredness, always remembering that the aim is to find the Divine.
  Dangers and difficulties come in when people take up Yoga not for the sake of the Divine, but because they want to acquire power and under the guise of Yoga seek to satisfy some ambition. If you cannot get rid of ambition, do not touch the thing. It is fire that burns.

1929-05-12 - Beings of vital world (vampires) - Money power and vital beings - Capacity for manifestation of will - Entry into vital world - Body, a protection - Individuality and the vital world, #Questions And Answers 1929-1931, #The Mother, #Integral Yoga
  It is here upon earth, in the body itself, that you must acquire a complete knowledge and learn to use a full and complete power. Only when you have done that will you be free to move about with entire security in all the worlds. Only when you are incapable of having the slightest fear, when you remain unmoved, for example, in the midst of the worst nightmare, can you say, Now I am ready to go into the vital world. But this means the acquisition of a power and a knowledge that can come only when you are a perfect master of the impulses and desires of the vital nature. You must be absolutely free from everything that can bring in the beings of the darkness or allow them to rule over you; if you are not free, beware!
  No attachments, no desires, no impulses, no preferences; perfect equanimity, unchanging peace and absolute faith in the Divine protection: with that you are safe, without it you are in peril. And as long as you are not safe, it is better to do like little chickens that take shelter under the mothers wings.

1951-03-14 - Plasticity - Conditions for knowing the Divine Will - Illness - microbes - Fear - body-reflexes - The best possible happens - Theories of Creation - True knowledge - a work to do - the Ashram, #Questions And Answers 1950-1951, #The Mother, #Integral Yoga
   There are three reasons. First, an excessive concern about ones security. Next, what one does not know always gives an uneasy feeling which is translated in the consciousness by fear. And above all, one doesnt have the habit of a spontaneous trust in the Divine. If you look into things sufficiently deeply, this is the true reason. There are people who do not even know that That exists, but one could tell them in other words, You have no faith in your destiny or You know nothing about Graceanything whatever, you may put it as you like, but the root of the matter is a lack of trust. If one always had the feeling that it is the best that happens in all circumstances, one would not be afraid.
   The first movement of fear comes automatically. There was a great scientist who was also a great psychologist (I dont remember his name now); he had developed his inner consciousness but wanted to test it. So he undertook an experiment. He wanted to know if, by means of consciousness, one could control the reflex actions of the body (probably he didnt go far enough to be able to do it, for it can be done; but in any case, for him it was still impossible). Well, he went to the zoological garden, to the place where snakes were kept in a glass cage. There was a particularly aggressive cobra there; when it was not asleep, it was almost always in a fury, for through the glass it could see people and that irritated it terribly. Our scientist went and stood in front of the cage. He knew very well that it was made in such a way that the snake could never break the glass and that he ran no risk of being attacked. So from there he began to excite the snake by shouts and gestures. The cobra, furious, hurled itself against the glass, and every time it did so the scientist closed his eyes! Our psychologist told himself, But look here, I know that this snake cannot pass through, why do I close my eyes? Well, one must recognise that it is difficult to conquer the reaction. It is a sense of protection, and if one feels that one cannot protect oneself, one is afraid. But the movement of fear which is expressed by the eyes fluttering is not a mental or a vital fear: it is a fear in the cells of the body; for it has not been impressed upon them that there is no danger and they do not know how to resist. It is because one has not done yoga, you see. With yoga one can watch with open eyes, one would not close them; but one would not close them because one calls upon something else, and that something else is the sense of the divine Presence in oneself which is stronger than everything.

1953-07-01, #Questions And Answers 1953, #The Mother, #Integral Yoga
   It is here upon earth, in the body itself, that you must acquire a complete knowledge and learn to use a full and complete power. Only when you have done that will you be free to move about with entire security in all the worlds.
   Questions and Answers 1929-1931 (12 May 1929)

1953-08-26, #Questions And Answers 1953, #The Mother, #Integral Yoga
   It is almost the same as that of rather unintellectual men for the Divine. It is made of admiration, trust and a sense of security. Admiration: it seems to you something really very beautiful. And it is not reasoned out: an admiration from the heart, so to speak, spontaneous. For instance, dogs have this in a very high degree. And then, trustnaturally this is sometimes mixed with other things: with the feeling of some need and dependence, for it is that person who will give me to eat when I am hungry, give me shelter when it is rough weather, who will look after me. This is not the most beautiful side. And then, unfortunately, it gets mixed up (and I believe I consider it entirely mans fault) with a kind of fear; a feeling of dependence and a kind of fear of something which is much stronger, much more conscious, much more which can harm you, and you have no strength to defend yourself. It is a pity, but I believe it is altogether mans fault.
   But if men really deserved the love of animals, it would be made of a feeling of wonder and of the sense of security. It is something very fine, this sense of security; something thats able to protect you, to give you all that you need, and near which you can always find shelter.
   Animals have an altogether rudimentary mind. They are not tormented by incessant thoughts like human beings. For example, they feel a spontaneous gratitude for an act of kindness towards them, whilst men, ninety-eight times out of a hundred, begin to reason and ask themselves what interest one could have in being good. This is one of the great miseries of mental activity. Animals are free from this and when you are kind to them they are grateful to you, spontaneously. And they have trust. So their love is made of that, and it turns into a very strong attachment, an irresistible need to be near you.

1955-03-02 - Right spirit, aspiration and desire - Sleep and yogic repose, how to sleep - Remembering dreams - Concentration and outer activity - Mother opens the door inside everyone - Sleep, a school for inner knowledge - Source of energy, #Questions And Answers 1955, #The Mother, #Integral Yoga
  In any case one thing you can do in all security is, before going to sleep, to concentrate, relax all tension in the physical being, try that is, in the body try so that the body lies like a soft rag on the bed, that it is no longer something with twitchings and cramps; to relax it completely as though it were a kind of thing like a rag. And then, the vital: to calm it, calm it as much as you can, make it as quiet, as peaceful as possible. And then the mind also the mind, try to keep it like that, without any activity. You must put upon the brain the force of great peace, great quietude, of silence if possible, and not follow ideas actively, not make any effort, nothing, nothing; you must relax all movement there too, but relax it in a kind of silence and quietude as great as possible.
  Once you have done all this, you may add either a prayer or an aspiration in accordance with your nature, to ask for the consciousness and peace and to be protected against all the adverse forces throughout the sleep, to be in a concentration of quiet aspiration and in the protection; ask the Grace to watch over your sleep; and then go to sleep. This is to sleep in the best possible conditions. What happens afterwards depends on your inner impulses, but if you do this persistently, night after night, night after night, after some time it will have its effect.

1957-01-02 - Can one go out of time and space? - Not a crucified but a glorified body - Individual effort and the new force, #Questions And Answers 1957-1958, #The Mother, #Integral Yoga
  And so, you see, the first movement of vital self-conceit when it is told, You dont exist in yourself, naturally it says, All right, I wont do anything any more! I am not the one who works, so I wont work any longer and Very good, the Divine can do everything, it is his business, I wont stir any more. If the credit does not go to meit comes to that I wont do anything any more. Well! But indeed theres no word for such things. This is something I constantly hear, it is simply a way of venting ones offended self-conceit, thats all. But the true reaction, the pure reaction is an enthusiastic impulse of collaboration, to play the game with all the energy, the will-power at the disposal of ones consciousness, in the state one is in, with the feeling of being supported, carried by something infinitely greater than oneself, which makes no mistakes, something which protects you and at the same time gives you all the necessary strength and uses you as the best instrument. And one feels that, and one feels one is working in security, that one can no longer make any mistakes, that what one does is done with the utmost result andin delight. That is the true movement; to feel that ones will is intensified to the utmost because it is no longer a tiny little microscopic person in infinity but an infinite universal Power which makes you act: the Force of Truth. This is the only true reaction.
  The other onemiserable. Ah! I am not the one who is doing things, ah! it is not my will being expressed, ah! it is not my power that is working so I lie down flat, stretch myself out in inert passivity and I wont move. Very well, then, one tells the Divine, do whatever you like, I dont exist any longer. That is poor indeed! There.

1958-07-16 - Is religion a necessity?, #Questions And Answers 1957-1958, #The Mother, #Integral Yoga
  For most people, it is security, for instance: living in security, being in conditions where one is sure of being able to go on existing. That is one of the great aims, one might say, one of the great motives of human effort. There are people for whom comfort is the important thing; for others it is pleasure, amusement.
  All that is very low and one would not be inclined to give it the name of an ideal, but it is truly a form of religion, something which may seem to be worth consecrating ones life to. There are many influences which seek to impose themselves on human beings by using that as a basis. The feeling of in security, uncertainty, is a kind of tool, a means used by political or religious groups to influence individuals. They play on these ideas.

1970 02 18, #On Thoughts And Aphorisms, #The Mother, #Integral Yoga
   343The gain of democracy is the security of the individuals life, liberty and goods from the caprices of the tyrant one or the selfish few; its evil is the decline of greatness in humanity.
   All human governments are a falsehood or a chimera. One can hope that one day the earth will be governed by the Truth only if the Supreme Lord makes this Truth evident to all.

1.A - ANTHROPOLOGY, THE SOUL, #Philosophy of Mind, #unset, #Zen
  (1) The first of these is the natural lapse of the ages in man's life. He begins with Childhood - mind wrapped up in itself. His next step is the fully developed antithesis, the strain and struggle of a universality which is still subjective (as seen in ideals, fancies, hopes, ambitions) against his immediate individuality. And that individuality marks both the world which, as it exists, fails to meet his ideal requirements, and the position of the individual himself, who is still short of independence and not fully equipped for the part he has to play (Youth). Thirdly, we see man in his true relation to his environment, recognizing the objective necessity and reasonableness of the world as he finds it - a world no longer incomplete, but able in the work which it collectively achieves to afford the individual a place and a security for his performance. By his share in this collective work he first is really somebody, gaining an effective existence and an objective value (Manhood). Last of all comes the finishing touch to this unity with objectivity: a unity which, while on its realist side it passes into the inertia of deadening habit, on its idealist side gains freedom from the limited interests and entanglements of the outward present (Old Age).
   397 (2) Next we find the individual subject to a real antithesis, leading it to seek and find itself in another individual. This - the sexual relation - on a physical basis, shows, on its one side, subjectivity remaining in an instinctive and emotional harmony of moral life and love, and not pushing these tendencies to an extreme universal phase, in purposes political, scientific, or artistic; and on the other, shows an active half, where the individual is the vehicle of a struggle of universal and objective interests with the given conditions (both of his own existence and of that of the external world), carrying out these universal principles into a unity with the world which is his own work. The sexual tie acquires its moral and spiritual significance and function in the family.

1f.lovecraft - The Case of Charles Dexter Ward, #Lovecraft - Poems, #unset, #Zen
   beauty, accomplishments, and social security. At length his survey
   narrowed down to the household of one of his best and oldest

1f.lovecraft - The Crawling Chaos, #Lovecraft - Poems, #unset, #Zen
   added sense of security brought by closed shutters and artificial light
   calmed my nerves to some degree, but I could not shut out the

1f.lovecraft - The Dream-Quest of Unknown Kadath, #Lovecraft - Poems, #unset, #Zen
   above, but a few survived to be rescued. When the security of the land
   parties seemed assured, Carters galley sallied forth between the

1f.lovecraft - The Green Meadow, #Lovecraft - Poems, #unset, #Zen
   security in strange contrast to my general horror.
   Then it was that I heard, at a distance immeasurable, the sound of

1f.lovecraft - The Loved Dead, #Lovecraft - Poems, #unset, #Zen
   it all I felt a supreme sense of security, for who would for a moment
   suspect an employee in an undertaking establishment, where Death was

1f.lovecraft - The Night Ocean, #Lovecraft - Poems, #unset, #Zen
   whose bare walls gave a sudden feeling of security.
   My cottage was entirely free of the village, as if it had wandered down
  --
   impassive and submissive, and gave me a feeling of security against the
   ravenous night. As darkness is akin to death, so is light to vitality.
  --
   we are tired, steeping ourselves within their lulling security like
   those early half-mammals which had not yet ventured upon the oozy land.
  --
   going to the security of inland fields, where one cannot even hear the
   ocean. So August ended, and I had been at the beach many days.

1f.lovecraft - The Shadow over Innsmouth, #Lovecraft - Poems, #unset, #Zen
   real apprehension of its need, but that any symbol of security was
   welcome in an environment of this kind. There were adequate bolts on

1f.lovecraft - The Shunned House, #Lovecraft - Poems, #unset, #Zen
   above-ground windows, and a sense of security glowed from the unlocked
   door which placed me only a few feet from the placid sidewalk outside.

1f.lovecraft - Till A the Seas, #Lovecraft - Poems, #unset, #Zen
   and security that this exodus from past scenes was difficult. Nor were
   these events received phlegmatically; their very slowness was

1.jk - Hyperion. Book I, #Keats - Poems, #John Keats, #Poetry
  (line 14): It seems to me that the power of realization shown in the first decade, and indeed throughout the fragment, answers all objections to the subject, and is the most absolute security for the nobility of the result which Keats would have achieved had he finished the poem. It is impossible to over-estimate the value of such a landscape, so touched in with a few strokes of titanic meaning and completeness; and the whole sentiment of gigantic despair reflected around the fallen god of the Titan dynasty, and permeating the landscape, is resumed in the most perfect manner in the incident of the motionless fallen leaf, a line almost as intense and full of the essence of poetry as any line in our language. It were ungracious to take exception to the poor Naiad; but she has not the convincing appropriateness of the rest of this sublime opening.'
  (line 51): Leigh Hunt's remarks upon Keats's failure to finish the poem are specially appropriate to this passage, "If any living poet could finish this fragment, we believe it is the author himself. But perhaps he feels that he ought not. A story which involves passion, almost of necessity involves speech; and though we may well enough describe beings greater than ourselves by comparison, unfortunately we cannot make them speak by comparison."

1.jk - Otho The Great - Act IV, #Keats - Poems, #John Keats, #Poetry
  You live alone in my security:
  So keep your wits at work, for your own sake,

1.jr - Rise, Lovers, #Rumi - Poems, #Jalaluddin Rumi, #Poetry
  Trembling like a leaf and twig from fear of falling, our hearts are throbbing; let us go to the Abode of security.
  There is no escape from pain, since we are in exile, and there is no escape from dust, seeing that we are going to a dustbowl.

1.pbs - Hellas - A Lyrical Drama, #Shelley - Poems, #Percy Bysshe Shelley, #Fiction
  Glory and science and security,
  On Freedom hang like fruit on the green tree,
  --
  Or Danger, when security looks pale?
  How said the messengerwho, from the fort

1.rb - Paracelsus - Part I - Paracelsus Aspires, #Browning - Poems, #Robert Browning, #Poetry
  For this distinction than security
  Of its existence? whether you discern
  --
  By the security of no broad course,
  Without success forever in its eyes!

1.rmr - Fear of the Inexplicable, #Rilke - Poems, #Rainer Maria Rilke, #Poetry
  down. Thus they have a certain security. And yet that dangerous
  in security is so much more human which drives the prisoners in

1.sfa - The Praises of God, #unset, #Arthur C Clarke, #Fiction
   English version by Regis J. Armstrong, OFM CAP & Ignatius C. Brady, OFM Original Language Italian You are holy, Lord, the only God, You do wonders. You are strong, You are great, You are the most high, You are the almighty King. You, Holy Father, the King of heaven and earth. You are Three and One, Lord God of gods; You are good, all good, the highest good, Lord, God, living and true. You are love, charity. You are wisdom; You are humility; You are patience; You are beauty; You are meekness; You are security; You are inner peace; You are joy; You are our hope and joy; You are justice; You are moderation, You are all our riches. You are beauty, You are meekness; You are the protector, You are the guardian and defender; You are strength; You are refreshment. You are our hope, You are our faith, You are our charity, You are all our sweetness, You are our eternal life: Great and wonderful Lord, God almighty, Merciful Savior. [1495.jpg] -- from Francis and Clare: The Complete Works: The Classics of Western Spirituality, Translated by Regis J. Armstrong, OFM CAP / Translated by Ignatius C. Brady, OFM <
1.tm - The Fall, #unset, #Arthur C Clarke, #Fiction
   Original Language English There is no where in you a paradise that is no place and there You do not enter except without a story. To enter there is to become unnameable. Whoever is nowhere is nobody, and therefore cannot exist except as unborn: No disguise will avail him anything Such a one is neither lost nor found. But he who has an address is lost. They fall, they fall into apartments and are securely established! They find themselves in streets. They are licensed To proceed from place to place They now know their own names They can name several friends and know Their own telephones must some time ring. If all telephones ring at once, if all names are shouted at once and all cars crash at one crossing: If all cities explode and fly away in dust Yet identities refuse to be lost. There is a name and a number for everyone. There is a definite place for bodies, there are pigeon holes for ashes: Such security can business buy! Who would dare to go nameless in so secure a universe? Yet, to tell the truth, only the nameless are at home in it. They bear with them in the center of nowhere the unborn flower of nothing: This is the paradise tree. It must remain unseen until words end and arguments are silent. [1499.jpg] -- from Selected Poems of Thomas Merton, by Thomas Merton <
1.whitman - A Carol Of Harvest For 1867, #Whitman - Poems, #unset, #Zen
       security;
   Not a maize-stalk dangle, as now, its silken tassels in peace.)

1.whitman - As I Lay With My Head in Your Lap, Camerado, #Whitman - Poems, #unset, #Zen
  For I confront peace, security, and all the settled laws, to unsettle them;
  I am more resolute because all have denied me, than I could ever have been had all accepted me;

1.ww - Book Tenth {Residence in France continued], #Wordsworth - Poems, #unset, #Zen
  On her security, and to the world
  Show what she was, a high and fearless soul,

1.ww - Ode to Duty, #Wordsworth - Poems, #unset, #Zen
   And joy its own security.
   And they a blissful course may hold

1.ww - The Excursion- VII- Book Sixth- The Churchyard Among the Mountains, #Wordsworth - Poems, #unset, #Zen
  For its last flight to heaven's security.
  --The bodily frame wasted from day to day;

2.01 - The Ordinary Life and the True Soul, #Questions And Answers 1929-1931, #The Mother, #Integral Yoga
  Indeed the very act of genuine self-giving is its own immediate rewardit brings with it such happiness, such confidence, such security as nothing else can give. But till the self-giving is firmly psychic there will be disturbances, the interval of dark moments between bright ones. It is only the psychic that keeps on progressing in an unbroken line, its movement a continuous ascension. All other movements are broken and discontinuous. And it is not till the psychic is felt as yourself that you can be an individual even; for it is the true self in you. Before the true self is known, you are a public place, not a being. There are so many clashing forces working in you; hence, if you wish to make real progress, know your own being which is in constant union with the Divine. Then alone will transformation be possible. All the other parts of your nature are ignorant: the mind, for instance, often commits the mistake of thinking that every brilliant idea is also a luminous idea. It can with equal vigour trump up arguments for and against God: it has no infallible sense of the truth. The vital is generally impressed by any show of power and is willing to see in it the Godlike. It is only the psychic which has a just discrimination: it is directly aware of the supreme Presence, it infallibly distinguishes between the divine and the undivine. If you have even for a moment contacted it, you will carry with you a conviction about the Divine which nothing will shake.
  How, you ask me, are we to know our true being? Ask for it, aspire after it, want it as you want nothing else. Most of you here are influenced by it, but it should be more than an influence, you should be able to feel identified with it. All urge for perfection comes from it, but you are unaware of the source, you are not collaborating with it knowingly, you are not in identification with its light. Do not think I refer to the emotional part of you when I speak of the psychic. Emotion belongs to the higher vital, not to the pure psychic. The psychic is a steady flame that burns in you, soaring towards the Divine and carrying with it a sense of strength which breaks down all oppositions. When you are identified with it you have the feeling of the divine truth then you cannot help feeling also that the whole world is ignorantly walking on its head with its feet in the air!

2.01 - War., #The Interior Castle or The Mansions, #Saint Teresa of Avila, #Christianity
  10.: Reason convinces the soul that as outside its interior castle are found neither peace nor security, it should cease to seek another home abroad, its own being full of riches that it can enjoy at will. Besides, it is not every one who, like itself, possesses all he needs within his own dwelling, and above all, such a Host, Who will give it all it can desire, unless, like the prodigal son, it chooses to go astray and feed with the swine.3' Surely these arguments are strong enough to defeat the devil's wiles! But, O my God, how the force of worldly habits and the example of others who practise them ruin everything! Our faith is so dead that we trust less to its teaching than to what is visible, though, indeed, we see that worldly lives bring nothing but unhappiness. All this results from those venomous thoughts I described, which, unless we are very careful, will deform the soul as the sting of a viper poisons and swells the body.
  11.: When this happens, great care is evidently needed to cure it, and only God's signal mercy prevents its resulting in death. Indeed, the soul passes through severe trials at this time, especially when the devil perceives from a person's character and behaviour that she is likely to make very great progress, for then all hell will league together to force her to turn back. O my Lord! what need there is here that, by Thy mercy, Thou shouldst prevent the soul from being deluded into forsaking the good begun! Enlighten it to see that its welfare consists in perseverance in the right way, and in the withdrawing from bad company.

2.02 - Habit 2 Begin with the End in Mind, #The 7 Habits of Highly Effective People, #Stephen Covey, #unset
  "Our peculiar security," said Thomas Jefferson, "is in the possession of a written Constitution."
  A personal mission statement based on correct principles becomes the same kind of standard for an individual. It becomes a personal constitution, the basis for making major, life-directing decisions, the basis for making daily decisions in the midst of the circumstances and emotions that affect our lives. It empowers individuals with the same timeless strength in the midst of change.
  --
  Whatever is at the center of our life will be the source of our security, guidance, wisdom, and power.
   security represents your sense of worth, your identity, your emotional anchorage, your self-esteem, your basic personal strength or lack of it.
  --
  These four factors -- security, guidance, wisdom, and power -- are interdependent. security and clear guidance bring true wisdom, and wisdom becomes the spark or catalyst to release and direct power. When these four factors are present together, harmonized and enlivened by each other, they create the great force of a noble personality, a balanced character, a beautifully integrated individual.
  These life-support factors also undergird every other dimension of life. And none of them is an all-or-nothing matter. The degree to which you have developed each one could be charted somewhere on a continuum, much like the Maturity Continuum described earlier. At the bottom end, the four factors are weak. You are basically dependent on circumstances or other people, things over which you have no direct control. At the top end you are in control. You have independent strength and the foundation for rich, interdependent relationships.
  Your security lies somewhere on the continuum between extreme in security on one end, wherein your life is buffeted by all the fickle forces that play upon it, and a deep sense of high intrinsic worth and personal security on the other end. Your guidance ranges on the continuum from dependence on the social mirror or other unstable, fluctuating sources to strong inner direction. Your wisdom falls somewhere between a totally inaccurate map where everything is distorted and nothing seems to fit, and a complete and accurate map of life wherein all the parts and principles are properly related to each other. Your power lies somewhere between immobilization or being a puppet pulled by someone else's strings to high proactivity, the power to act according to your own values instead of being acted upon by other people and circumstances.
  The location of these factors on the continuum, the resulting degree of their integration, harmony, and balance, and their positive impact on every aspect of your life is a function of your center, the basic paradigms at your very core.
  --
  There is only phantom security in such a relationship when all appears to be going well. Guidance is based on the emotion of the moment. Wisdom and power are lost in the counterdependent negative interactions.
  Family Centeredness. Another common center is the family. This, too, may seem to be natural and proper. As an area of focus and deep investment, it provides great opportunities for deep relationships, for loving, for sharing, for much that makes life worthwhile. But as a center, it ironically destroys the very elements necessary to family success.
  People who are family-centered get their sense of security or personal worth from the family tradition and culture or the family reputation. Thus, they become vulnerable to any changes in that tradition or culture and to any influences that would affect that reputation.
  Family-centered parents do not have the emotional freedom, the power, to raise their children with their ultimate welfare truly in mind. If they derive their own security from the family, their need to be popular with their children may override the importance of a long-term investment in their children's growth and development. Or they may be focused on the proper and correct behavior of the moment.
  Any behavior that they consider improper threatens their security. They become upset, guided by the emotions of the moment, spontaneously reacting to the immediate concern rather than the long-term growth and development of the child. They may overreact and punish out of bad temper. They tend to love their children conditionally, making them emotionally dependent or counterdependent and rebellious.
  Money Centeredness. Another logical and extremely common center to people's lives is making money. Economic security is basic to one's opportunity to do much in any other dimension. In a hierarchy or continuum of needs, physical survival and financial security comes first. Other needs are not even activated until that basic need is satisfied, at least minimally.
  Most of us face economic worries. Many forces in the wider culture can and do act upon our economic situation, causing or threatening such disruption that we often experience concern and worry that may not always rise to the conscious surface.
  --
  Consider again the four life-support factors -- security, guidance, wisdom, and power. Suppose I derive much of my security from my employment or from my income or net worth. Since many factors affect these economic foundations, I become anxious and uneasy, protective and defensive, about anything that may affect them. When my sense of personal worth comes from my net worth, I am vulnerable to anything that will affect that net worth. But work and money, per se, provide no wisdom, no guidance, and only a limited degree of power and security. All it takes to show the limitations of a money center is a crisis in my life or in the life of a loved one.
  Money-centered people often put aside family or other priorities, assuming everyone will understand that economic demands come first. I know one father who was leaving with his children for a promised trip to the circus when a phone call came for him to come to work instead. He declined.
  --
  Because their identity and sense of self-worth are wrapped up in their work, their security is vulnerable to anything that happens to prevent them from continuing in it. Their guidance is a function of the demands of the work. Their wisdom and power come in the limited areas of their work, rendering them ineffective in other areas of life.
  Possession Centeredness. A driving force of many people is possessions -- not only tangible, material possessions such as fashionable clothes, homes, cars, boats, and jewelry, but also the intangible possessions of fame, glory, or social prominence. Most of us are aware, through our own experience, how singularly flawed such a center is, simply because it can vanish rapidly and it is influenced by so many forces.
  If my sense of security lies in my reputation or in the things I have, my life will be in a constant state of threat and jeopardy that these possessions may be lost or stolen or devalued. If I'm in the presence of someone of greater net worth or fame or status, I feel inferior. If I'm in the presence of someone of lesser net worth or fame or status, I feel superior. My sense of self-worth constantly fluctuates. I don't have any sense of constancy or anchorage or persistent selfhood. I am constantly trying to protect and insure my assets, properties, securities, position, or reputation. We have all heard stories of people committing suicide after losing their fortunes in a significant stock decline or their fame in a political reversal.
  Pleasure Centeredness. Another common center, closely allied with possessions, is that of fun and pleasure. We live in a world where instant gratification is available and encouraged. Television and movies are major influences in increasing people's expectations. They graphically portray what other people have and can do in living the life of ease and "fun."
  --
  Where is the security, the guidance, the wisdom, and the power? At the low end of the continuum, in the pleasure of a fleeting moment.
  Malcom Muggeridge writes "A Twentieth-Century Testimony":
  --
  The individual who is friend- or enemy-centered has no intrinsic security. Feelings of self-worth are volatile, a function of the emotional state or behavior of other people. Guidance comes from the person's perception of how others will respond, and wisdom is limited by the social lens or by an
   enemy-centered paranoia. The individual has no power. Other people are pulling the strings.
  --
  In the church-centered life, image or appearance can become a person's dominant consideration, leading to hypocrisy that undermines personal security and intrinsic worth. Guidance comes from a social conscience, and the church-centered person tends to label others artificially in terms of "active,"
  "inactive," "liberal," "orthodox," or "conservative."
  Because the church is a formal organization made up of policies, programs, practices, and people, it cannot by itself give a person any deep, permanent security or sense of intrinsic worth. Living the principles taught by the church can do this, but the organization alone cannot.
  Nor can the church give a person a constant sense of guidance. Church-centered people often tend to live in compartments, acting and thinking and feeling in certain ways on the Sabbath and in totally different ways on weekdays. Such a lack of wholeness or unity or integrity is a further threat to security, creating the need for increased labeling and self-justifying.
  Seeing the church as an end rather than as a means to an end undermines a person's wisdom and sense of balance. Although the church claims to teach people about the source of power, it does not claim to be that power itself. It claims to be one vehicle through which divine power can be channeled into man's nature.
  --
  There is little security, guidance, wisdom, or power in the limited center of self. Like the Dead Sea in Palestine, it accepts but never gives. It becomes stagnant.
  On the other hand, paying attention to the development of self in the greater perspective of improving one's ability to serve, to produce, to contri bute in meaningful ways, gives context for dramatic increase in the four life-support factors
  --
  The ideal, of course, is to create one clear center from which you consistently derive a high degree of security, guidance, wisdom, and power, empowering your proactivity and giving congruency and harmony to every part of your life.
  If you are Spouse Centered...
     security
    Your feelings of security are based on the way your spouse treats you.
    You are highly vulnerable to the moods and feelings of your spouse.
  --
     security
    Your security is founded on family acceptance and fulfilling family expectations.
    Your sense of personal security is as volatile as the family.
    Your feelings of self-worth are based on the family reputation.
  --
     security
    Your personal worth is determined by your net worth.
    You are vulnerable to anything that threatens your economic security.
    GUIDANCE
  --
     security
    You tend to define yourself by your occupational role.
  --
     security
    Your security is based on your reputation, your social status, or the tangible things you possess.
    You tend to compare what you have to what others have.
  --
     security
    You feel secure only when you're on a pleasure "high.
    Your security is short-lived, anesthetizing, and dependent on your environment.
    GUIDANCE
  --
     security
    Your security is a function of the social mirror.
    You are highly dependent on the opinion of others.
  --
     security
    Your security is volatile, based on the movements of your enemy.
    You are always wondering what he is up to.
  --
     security
    Your security is based on church activity and on the esteem in which you are held by those in authority or influence in the church.
    You find identity and security in religious labels and comparisons.
    GUIDANCE
  --
     security
    Your security is constantly changing and shifting.
    GUIDANCE
  --
  Our security comes from knowing that, unlike other centers based on people or things which are subject to frequent and immediate change, correct principles do not change. We can depend on them
  Principles don't react to anything. They won't divorce us or run away with our best friend. They aren't out to get us. They can't pave our way with shortcuts and quick fixes. They don't depend on the behavior of others, the environment, or the current fad for their validity. Principles don't die.
  --
     security
    Your security is based on correct principles that do not change, regardless of external conditions or circumstances.
    You know that true principles can repeatedly be validated in your own life, through your own experiences.
  --
    Your source of security provides you with an immovable, unchanging, unfailing core enabling you to see change as an exciting adventure and opportunity to make significant contri butions.
    GUIDANCE
  --
  As a principle-centered person, you see things differently. And because you see things differently, you think differently, you act differently. Because you have a high degree of security, guidance, wisdom, and power that flows from a solid, unchanging core, you have the foundation of a highly proactive and highly effective life.
  --- Writing and Using a A Personal Mission Statement
  --
  These things represent the belief system of IBM. Everything else will change, but these three things will not change. Almost like osmosis, this belief system has spread throughout the entire organization, providing a tremendous base of shared values and personal security for everyone who works there.
  Once I was training a group of people for IBM in New York. It was small group, about 20 people, and one of them became ill. He called his wife in California, who expressed concern because his illness required a special treatment. The IBM people responsible for the training session arranged to have him taken to an excellent hospital with medical specialists in the disease. But they could sense that his wife was uncertain and really wanted him home where their personal physician could handle the problem.

2.03 - Karmayogin A Commentary on the Isha Upanishad, #Isha Upanishad, #unset, #Zen
  advantages of security, assistance and social life which membership of the community could alone provide. The sanction was
  again a communal sanction; the custom-code of the tribe or
  --
  for his security and his self-gratification. His passive mentality
  therefore not only accepts but welcomes rigid control by the

2.05 - Habit 3 Put First Things First, #The 7 Habits of Highly Effective People, #Stephen Covey, #unset
  Quadrant II activities you have planned. Your principle center, your self-awareness, and your conscience can provide a high degree of intrinsic security, guidance, and wisdom to empower you to
   use your independent will and maintain integrity to the truly important.

2.07 - I Also Try to Tell My Tale, #The Castle of Crossed Destinies, #Italo Calvino, #Fiction
  The trick of arranging some tarots in a line and making stories emerge from them is something I could perform also with paintings in museums: putting, for example, a Saint Jerome in the place of the Hermit, a Saint George in the place of the Knight of Swords, to see what comes out. They are, as it happens, the painting subjects that have most attracted me. In museums I always enjoy stopping at the Saint Jeromes. The painters portray the hermit as a scholar consulting treatises outdoors, seated at the mouth of a cave. A little farther on a lion is curled up, domestic, serene. Why the lion? Does the written word tame passions? Or subdue the forces of nature? Or does it find a harmony with the inhumanity of the universe? Or incubate a violence, held back but always ready to spring, to claw? Explain it as you will, painters have been pleased to show Saint Jerome with a lion (taking as genuine the old tale of the thorn in the paw, thanks to the usual mistake of a copyist), and so it gives me satisfaction and security to see them together, to try to recognize myself there, not particularly in the saint or even in the lion (though, for that matter, the two often resemble each other), but in the pair together, in the whole, in the picture, figures, objects, landscape.
  In the landscape the objects of reading and writing are placed among rocks, grass, lizards, having become products and instruments of the mineral-vegetable-animal continuum. Among the hermit's bric-a-brac there is also a skull: the written word always takes into consideration the erasure of the person who has written or the one who will read. Inarticulate nature comprehends in her discourse the discourse of human beings.

2.07 - The Knowledge and the Ignorance, #The Life Divine, #Sri Aurobindo, #Integral Yoga
  This is the plenitude of the supreme divine self-knowledge; it is also the plenitude of the divine all-knowledge. Next, at the other pole of things, we see this consciousness dwelling upon apparent oppositions in itself, and the most extreme antinomy of all reaches its acme in what seems to us to be a complete nescience of itself, an effective, dynamic, creative Inconscience, though we know that this is merely a surface appearance and that the divine Knowledge works with a sovereign security and sureness within the operations of the Inconscient. Between these two oppositions and as a mediary term we see Consciousness working with a partial, limited self-awareness which is equally superficial, for behind it and acting through it is the divine AllKnowledge. Here in its intermediate status, it seems to be a standing compromise between the two opposites, between the supreme Consciousness and the Nescience, but may prove rather in a larger view of our data to be an incomplete emergence of the Knowledge to the surface. This compromise or imperfect emergence we call the Ignorance, from our own point of view, because ignorance is our own characteristic way of the soul's self-withholding of complete self-knowledge. The origin of these three poises of the power of consciousness and their exact relation is what we have, if possible, to discover.
  If we discovered that Ignorance and Knowledge were two independent powers of Consciousness, it might then be that we would have to pursue their difference up to the highest point

2.09 - The Pantacle, #Liber ABA, #Aleister Crowley, #Philosophy
  27:He should have a thorough grounding in classic, mathematics, and science; also enough general knowledge of modern languages and of the shifts of life to enable him to travel in any part of the world with ease and security.
  28:History and geography he can pick up as he wants them; and what should interest him most in any subject is its links with some other subject, so that his Pantacle may not lack what painters call "composition."

2.0 - THE ANTICHRIST, #Twilight of the Idols, #Friedrich Nietzsche, #Philosophy
  of the law, the custodians of order and of security, the noble
  warriors, the king, above all, as the highest formula of the warrior,

2.15 - The Cosmic Consciousness, #The Synthesis Of Yoga, #Sri Aurobindo, #Integral Yoga
  It is as the immanent, silent Self in all that the foundation of this cosmic consciousness can most easily be laid by the mental being, the Witness pure and omnipresent who regards all the activity of the universe as the Conscious Soul of the cosmos, Sachchidananda for whose delight universal Nature displays the eternal procession of her works. We are aware of an unwounded Delight, a pure and perfect Presence, an infinite and self-contained Power present in ourselves and all things, not divided by their divisions, not affected by the stress and struggle of the cosmic manifestation, within it all even while superior to it all. Because of that all this exists, but that does not exist because of all this; it is too great to be limited by the movement in Time and Space which it inhabits and supports. This foundation enables us to possess in the security of the divine existence the whole universe within our own being. We are no longer limited and shut in by what we inhabit, but like the Divine contain in ourselves all that for the purpose of the movement of Nature we consent to inhabit. We are not mind or life or body, but the informing and sustaining Soul, silent, peaceful, eternal, that possesses them; and this Soul we find everywhere sustaining and informing and possessing all lives and minds and bodies and cease to regard it as a separate and individual being in our own. In it all this moves and acts; within all this it is stable and immutable. Having this, we possess our eternal self-existence at rest in its eternal consciousness and bliss.
  Next we have to realise this silent Self as the Lord of all the action of universal Nature, the same Self-existent displayed in the creative force of its eternal consciousness. All this action is only His power and knowledge and self-delight going abroad in His infinite being to do the works of His eternal wisdom and will. We realise the Divine, the eternal Self of all, first, as the source of all action and inaction, of all knowledge and ignorance, of all delight and suffering, of all good and evil, perfection and imperfection, of all force and form, of all the outgoing of Nature from the eternal divine Principle and of all the return of Nature towards the Divine. We realise it next as itself going abroad in its Power and Knowledge, -- for the Power and Knowledge are Itself, -- not only the source of their works, but the creator and doer of their works, one in all existences; for the many souls of the universal manifestation are only faces of the one Divine, the many minds, lives, bodies are only His masks and disguises.

2.24 - The Message of the Gita, #Essays On The Gita, #Sri Aurobindo, #Integral Yoga
  Godhead. Action is for self-finding, for self-fulfilment, for selfrealisation and not only for its own external and apparent fruits of the moment or the future. There is an inner law and meaning of all things dependent on the supreme as well as the manifested nature of the self; the true truth of works lies there and can be represented only incidentally, imperfectly and disguised by ignorance in the outer appearances of the mind and its action. The supreme, the faultless largest law of action is therefore to find out the truth of your own highest and inmost existence and live in it and not to follow any outer standard and dharma. All life and action must be till then an imperfection, a difficulty, a struggle and a problem. It is only by discovering your true self and living according to its true truth, its real reality that the problem can be finally solved, the difficulty and struggle overpassed and your doings perfected in the security of the discovered self and spirit turn into a divinely au thentic action. Know then your self; know your true self to be God and one with the self of all others; know your soul to be a portion of God. Live in what you know; live in the self, live in your supreme spiritual nature, be united with
  God and Godlike. Offer, first, all your actions as a sacrifice to the Highest and the One in you and to the Highest and the One in the world; deliver last all you are and do into his hands for the supreme and universal spirit to do through you his own will and works in the world. This is the solution that I present to you and in the end you will find that there is no other."

2.26 - The Ascent towards Supermind, #The Life Divine, #Sri Aurobindo, #Integral Yoga
  The spiritual evolution obeys the logic of a successive unfolding; it can take a new decisive main step only when the previous main step has been sufficiently conquered: even if certain minor stages can be swallowed up or leaped over by a rapid and brusque ascension, the consciousness has to turn back to assure itself that the ground passed over is securely annexed to the new condition. It is true that the conquest of the spirit supposes the execution in one life or a few lives of a process that in the ordinary course of Nature would involve a slow and uncertain procedure of centuries or even of millenniums: but this is a question of the speed with which the steps are traversed; a greater or concentrated speed does not eliminate the steps themselves or the necessity of their successive surmounting. The increased rapidity is possible only because the conscious participation of the inner being is there and the power of the Supernature is already at work in the half-transformed lower nature, so that the steps which would otherwise have had to be taken tentatively in the night of Inconscience or Ignorance can now be taken in an increasing light and power of Knowledge. The first obscure material movement of the evolutionary Force is marked by an aeonic graduality; the movement of life progress proceeds slowly but still with a quicker step, it is concentrated into the figure of millenniums; mind can still further compress the tardy leisureliness of Time and make long paces of the centuries; but when the conscious Spirit intervenes, a supremely concentrated pace of evolutionary swiftness becomes possible. Still, an involved rapidity of the evolutionary course swallowing up the stages can only come in when the power of the conscious Spirit has prepared the field and the supramental Force has begun to use its direct influence. All Nature's transformations do indeed wear the appearance of a miracle, but it is a miracle with a method: her largest strides are taken over an assured ground, her swiftest leaps are from a base that gives security and certainty to the evolutionary saltus; a secret all-wisdom governs everything in her, even the steps and processes that seem to be most unaccountable.
  This law of Nature's procedure brings in the necessity of a gradation in the last transitional process, a climbing of degrees, an unfolding of higher and higher states that lead us from the spiritualised mind to supermind, - a steep passage that could not be accomplished otherwise. There are above us, we have seen, successive states, levels or graded powers of being overtopping our normal mind, hidden in our own superconscient parts, higher ranges of Mind, degrees of spiritual consciousness and experience; without them there would be no links, no helpful intervening spaces to make the immense ascension possible. It is indeed from these higher sources that the secret spiritual Power acts upon the being and by its pressure brings about the psychic transformation or the spiritual change; but in the early stages of our growth this action is not apparent, it remains occult and unseizable. At first what is necessary is that the pure touch of the spiritual force must intervene in mental nature: that awakening pressure must stamp itself upon mind and heart and life and give them their upward orientation; a subtle light or a great transmuting power must purify, refine and uplift their motions and suffuse them with a higher consciousness that does not belong to their own normal capacity and character. This can be done from within by an invisible action through the psychic entity and the psychic personality; a consciously felt descent from above is not indispensable. The presence of the spirit is there in every living being, on every level, in all things, and because it is there, the experience of Sachchidananda, of the pure spiritual existence and consciousness, of the delight of a divine presence, closeness, contact can be acquired through the mind or the heart or the life-sense or even through the physical consciousness; if the inner doors are flung sufficiently open, the light from the sanctuary can suffuse the nearest and the farthest chambers of the outer being. The necessary turn or change can also be brought about by an occult descent of the spiritual force from above, in which the influx, the influence, the spiritual consequence is felt, but the higher source is unknown and the actual feeling of a descent is not there. A consciousness so touched may be so much uplifted that the being turns to an immediate union with the Self or with the Divine by departure from the evolution and, if that is sanctioned, no question of graduality or steps or method intervenes, the rupture with Nature can be decisive: for the law of departure, once it is made possible, is not or need not be the same as the law of the evolutionary transformation and perfection; it is or can be a leap, a breaking out of bonds rapid or immediate, - the spiritual evasion is secured and its only remaining sanction is the destined fall of the body. But if the transformation of earth life is intended, the first touch of spiritualisation must be followed by an awakening to the higher sources and energies, a seeking for them and an enlargement and heightening of the being into their characteristic status and a conversion of the consciousness to their greater law and dynamic nature. This change must go step by step, till the stair of the ascension is transcended and there is an emergence to those greatest wide-open spaces of which the Veda speaks, the native spaces of a consciousness which is supremely luminous and infinite.
  --
  In the terrestrial evolution itself the overmind descent would not be able to transform wholly the Inconscience; all that it could do would be to transform in each man it touched the whole conscious being, inner and outer, personal and universally impersonal, into its own stuff and impose that upon the Ignorance illumining it into cosmic truth and knowledge. But a basis of Nescience would remain; it would be as if a sun and its system were to shine out in an original darkness of Space and illumine everything as far as its rays could reach so that all that dwelt in the light would feel as if no darkness were there at all in their experience of existence. But outside that sphere or expanse of experience the original darkness would still be there and, since all things are possible in an overmind structure, could reinvade the island of light created within its empire. Moreover, since Overmind deals with different possibilities, its natural action would be to develop the separate possibility of one or more or numerous dynamic spiritual formulations to their utmost or combine or harmonise several possibilities together; but this would be a creation or a number of creations in the original terrestrial creation, each complete in its separate existence. The evolved spiritual individual would be there, there might evolve also a spiritual community or communities in the same world as mental man and the vital being of the animal, but each working out its independent existence in a loose relation within the terrestrial formula. The supreme power of the principle of unity taking all diversities into itself and controlling them as parts of the unity, which must be the law of the new evolutionary consciousness, would not as yet be there. Also by this much evolution there could be no security against the downward pull or gravitation of the Inconscience which dissolves all the formations that life and mind build in it, swallows all things that arise out of it or are imposed upon it and disintegrates them into their original matter. The liberation from this pull of the Inconscience and a secured basis for a continuous divine or gnostic evolution would only be achieved by a descent of the Supermind into the terrestrial formula, bringing into it the supreme law and light and dynamis of the spirit and penetrating with it and transforming the inconscience of the material basis.
  A last transition from Overmind to Supermind and a descent of Supermind must therefore intervene at this stage of evolutionary Nature.

2.3.02 - The Supermind or Supramental, #Letters On Yoga I, #Sri Aurobindo, #Integral Yoga
  Each Godhead, as it were, creates his own world, but without conflict with others; each Aspect, each Idea, each Force of things can be felt in its full separate energy or splendour and work out its values, but this does not create a disharmony because the Overmind has the sense of the Infinite and in the true (not spatial) Infinite many concording infinities are possible. This peculiar security of Overmind is however not transferable to the lower planes of consciousness which it supports and governs, because as one descends in the scale the stress on division and multiplicity increases and in the Mind the underlying oneness becomes vague, abstract, indeterminate and indeterminable and the only apparent concreteness is that of the phenomenal which is by its nature a form and representation - the self-view of the
  One has already begun to disappear. Mind acts by representations and constructions, by the separation and weaving together of its constructed data; it can make a synthetic construction and see it as the whole, but when it looks for the reality of things, it takes refuge in abstractions - it has not the concrete vision, experience, contact sought by the mystic and the spiritual seeker. To know Self and Reality directly or truly, it has to be silent and reflect some light of these things or undergo selfexceeding and transformation, and this is only possible either by a higher Light descending into it or by its ascent, the taking up or immergence of it into a higher Light of existence. In Matter, descending below Mind, we arrive at the acme of the principle of fragmentation and division; the One, though secretly there, is lost to knowledge and we get the fullness of the Ignorance,

2.3.03 - The Mother's Presence, #The Mother With Letters On The Mother, #Sri Aurobindo, #Integral Yoga
  6 February 1937 greater ease and security.
  In the evening meditation, there was an intense movement of surrender from the heart. I had the feeling of Mother's presence immediately in front of me and aspiration rose up from below. There was a willing and loving surrender from the heart, from the entire being, as if for fulfilment. I suppose the psychic being came to the front.

2.3.04 - The Mother's Force, #The Mother With Letters On The Mother, #Sri Aurobindo, #Integral Yoga
  Every time I receive the Mother's touch at Pranam, I feel a sense of strong nourishment, even in the physical being. When she presses her fingers on the opening point of the spinal cord at the top of my head, I feel something subtle coming in which makes my inner being overflow with joy. This sense of nourishment (as if a new substance is being created within) is so strong that even when I am unwell and weak, it completely dominates with its sense of joy and security.
  As you suffer from ill-health, Mother presses the nourishment of the divine strength and health into your physical being, renewing its substance with that.

3.00.2 - Introduction, #The Practice of Psycho therapy, #Carl Jung, #Psychology
  with that of primitives. The security of our ego has, in comparison with
  earlier times, greatly increased and has even taken such a dangerous leapforward that, although we sometimes speak of Gods will, we no longer

3.01 - Fear of God, #The Interior Castle or The Mansions, #Saint Teresa of Avila, #Christianity
  1.: As for those who, by the mercy of God, have vanquished in these combats and persevered until they reached the third mansions, what can we say to them but 'Blessed is the man that feareth the Lord'?1' It is no small favour from God that I should be able to translate this verse into Spanish so as to explain its meaning, considering how dense I usually am in such matters. We may well call these souls blessed, for, as far as we can tell, unless they turn back in their course they are on the safe road to salvation. Now, my sisters, you see how important it is for them to conquer in their former struggles, for I am convinced that our Lord will henceforth never cease to keep them in security of conscience, which is no small boon.
  2.: I am wrong in saying ' security,' for there is no security in this life; understand that in such cases I always imply: 'If they do not cease to continue as they have begun.' What misery to live in this world! We are like men whose enemies are at the door, who must not lay aside their arms, even while sleeping or eating, and are always in dread lest the foe should enter the fortress by some breach in the walls. O my Lord and my all! How canst Thou wish us to prize such a wretched existence? We could not desist from longing and begging Thee to take us from it, were it not for the hope of losing it for Thy sake or devoting it entirely to Thy service-and above all because we know it is Thy will that we should live. Since it is so, 'Let us die with Thee!'2' as St. Thomas said, for to be away from Thee is but to die again and again, haunted as we are by the dread of losing Thee for ever!
  3.: This is why I say, daughters, that we ought to ask our Lord as our boon to grant us one day to dwell in safety with the Saints, for with such fears, what pleasure can she enjoy whose only pleasure is to please God? Remember, many Saints have felt this as we do, and were even far more fervent, yet fell into grave sin, and we cannot be sure that God would stretch forth His hand to raise us from sin again to do such penance as they performed. This applies to extraordinary grace.3' Truly, my daughters, I feel such terror as I tell you this, that I know not how to write it, nor even how to go on living, when I reflect upon it as I very often do. Beg of His Majesty, my daughters, to abide within me, for otherwise, what security could I feel, after a life so badly spent as mine has been?
  4.: Do not grieve at knowing this. I have often seen you troubled when I spoke about it, for you wish that my past had been a very holy one, in which you are right-indeed, I wish the same myself. But what can be done, now that I have wasted it entirely through my own fault? I have no right to complain that God withheld the aid I needed to fulfil your wishes. It is impossible for me to write this without tears and great shame, when I see that I am explaining these matters to those capable of teaching me. What a hard task has obedience laid, upon me! God grant that, as I do it for Him, it may be of some service to you; therefore beg Him to pardon me for my miserable presumption.

3.01 - Love and the Triple Path, #The Synthesis Of Yoga, #Sri Aurobindo, #Integral Yoga
  The devotee on the other hand tends to look down on the sawdust dryness of mere knowledge. And it is true that philosophy by itself without the rapture of spiritual experience is something as dry as it is clear and cannot give all the satisfaction we seek, that its spiritual experience even, when it has not left its supports of thought and shot up beyond the mind, lives too much in an abstract delight, and that what it reaches, is not indeed the void it seems to the passion of the heart, but still has the limitations of the peaks. On the other hand, love itself is not complete without knowledge. The Gita distinguishes between three initial kinds of Bhakti, that which seeks refuge in the Divine from the sorrows of the world, rta, that which, desiring, approaches the Divine as the giver of its good, arthrth, and that which attracted by what it already loves, but does not yet know, yearns to know this divine Unknown, jijsu; but it gives the palm to the Bhakti that knows. Evidently the intensity of passion which says, ''I do not understand, I love,'' and loving, cares not to understand, is not love's last self-expression, but its first, nor is it its highest intensity. Rather as knowledge of the Divine grows, delight in the Divine and love of it must increase. Nor can mere rapture be secure without the foundation of knowledge; to live in what we love, gives that security, and to live in it means to be one with it in consciousness, and oneness of consciousness is the perfect condition of knowledge. Knowledge of the Divine gives to love of the Divine its firmest security, opens to it its own widest joy of experience, raises it to its highest pinnacles of outlook.
  If the mutual misunderstandings of these two powers are an ignorance, no less so is the tendency of both to look down on the way of works as inferior to their own loftier pitch of spiritual achievement. There is an intensity of love, as there is an intensity of knowledge, to which works seem something outward and distracting. But works are only thus outward and distracting when we have not found oneness of will and consciousness with the Supreme. When once that is found, works become the very power of knowledge and the very outpouring of love. If knowledge is the very state of oneness and love its bliss, divine works are the living power of its light and sweetness. There is a movement of love, as in the aspiration of human love, to separate the lover and the loved in the enjoyment of their exclusive oneness away from the world and from all others, shut up in the nuptial chambers of the heart. That is perhaps an inevitable movement of this path. But still the widest love fulfilled in knowledge sees the world not as something other and hostile to this joy, but as the being of the Beloved and all creatures as his being, and in that vision divine works find their joy and their justification. This is the knowledge in which an integral Yoga must live. We have to start Godward from the powers of the mind, the intellect, the will, the heart, and in the mind all is limited. Limitations, exclusiveness there can hardly fail to be at the beginning and for a long time on the way. But an integral Yoga will wear these more loosely than more exclusive ways of seeking, and it will sooner emerge from the mental necessity. It may commence with the way of love, as with the way of knowledge or of works; but where they meet, is the beginning of its joy of fulfilment. Love it cannot miss, even if it does not start from it; for love is the crown of works and the flowering of knowledge.

3.01 - Natural Morality, #Let Me Explain, #Pierre Teilhard de Chardin, #Christianity
  manity may be released in fullness and security. The moralist
  112

3.02 - The Great Secret, #unset, #Arthur C Clarke, #Fiction
    And what have I contri buted to humanity? Men travel more easily. Do they understand each other any better? Following my example, all sorts of labour-saving gadgets have been mass- produced and made available to an increasing number of customers. How far has this done anything more than to create new needs and a corresponding greed for gain? My workers are well paid but it seems that I have only succeeded in arousing in them the desire to earn always more - and above all more than workers in other factories. I feel that they are dissatisfied, unhappy in fact. Contrary to my hopes, raising their standard of living, assuring their security, has not induced them to develop their human personality. Indeed, the mass of human suffering remains practically unchanged, as formidable as ever, and, it seems, incurable by the means I have used. There is something fundamentally wrong which my actions fail to correct and which I even fail to understand. I feel that there is a secret yet to be discovered; and without this discovery all our efforts are in vain.
  THE ATHLETE

3.03 - ON INVOLUNTARY BLISS, #Thus Spoke Zarathustra, #Friedrich Nietzsche, #Philosophy
  shall be security and nothing desire.
  But, brooding, the sun of my love lay on me; Zarathustra was cooking in his own juice-then shadows

3.04 - BEFORE SUNRISE, #Thus Spoke Zarathustra, #Friedrich Nietzsche, #Philosophy
  round roof, its azure bell, and eternal security; and
  blessed is he who blesses thus.

3.05 - SAL, #Mysterium Coniunctionis, #Carl Jung, #Psychology
  [343] The shadow exerts a dangerous fascination which can be countered only by another fascinosum. It cannot be got at by reason, even in the most rational person, but only by illumination, of a degree and kind that are equal to the darkness but are the exact opposite of enlightenment. For what we call rational is everything that seems fitting to the man in the street, and the question then arises whether this fitness may not in the end prove to be irrational in the bad sense of the word. Sometimes, even with the best intentions this dilemma cannot be solved. This is the moment when the primitive trusts himself to a higher authority and to a decision beyond his comprehension. The civilized man in his closed-in environment functions in a fitting and appropriate manner, that is, rationally. But if, because of some apparently insoluble dilemma, he gets outside the confines of civilization, he becomes a primitive again; then he has irrational ideas and acts on hunches; then he no longer thinks but it thinks in him; then he needs magical practices in order to gain a feeling of security; then the latent autonomy of the unconscious becomes active and begins to manifest itself as it has always done in the past.
  [344] The good tidings announced by alchemy are that, as once a fountain sprang up in Judaea, so now there is a secret Judaea the way to which is not easily found, and a hidden spring whose waters seem so worthless685 and so bitter that they are deemed of no use at all. We know from numerous hints686 that mans inner life is the secret place where the aqua solvens et coagulans, the medicina catholica or panacea, the spark of the light of nature,687 are to be found. Our text shows us how much the alchemists put their art on the level of divine revelation and regarded it as at least an essential complement to the work of redemption. True, only a few of them were the elect who formed the golden chain linking earth to heaven, but still they were the fathers of natural science today. They were the unwitting instigators of the schism between faith and knowledge, and it was they who made the world conscious that the revelation was neither complete nor final. Since these things are so, says an ecclesiastic of the seventeenth century, it will suffice, after the light of faith, for human ingenuity to recognize, as it were, the refracted rays of the Divine majesty in the world and in created things.688 The refracted rays correspond to the certain luminosity which the alchemists said was inherent in the natural world.

3.07 - The Formula of the Holy Grail, #Liber ABA, #Aleister Crowley, #Philosophy
  shrieks for collateral security. It would be a great error to ask too
  much. In consequence of the peculiar character of the recollections

3.09 - The Return of the Soul, #The Practice of Psycho therapy, #Carl Jung, #Psychology
  with the bait of social security. Against the daemonism from within, the
  Church offers some protection so long as it wields authority. But
  protection and security are only valuable when not excessively cramping
  to our existence; and in the same way the superiority of consciousness is

3.11 - Spells, #Advanced Dungeons and Dragons 2E, #unset, #Zen
  Sphere of security ::: (Abjuration)
    Sphere: Protection
  --
    Sphere of security protects the priest who casts the spell and his companions within the area of effect. Enemy creatures within the area are unaffected.
    The sphere grants affected creatures a +2 bonus to armor class, a +2 bonus to all saving throws vs. magic, and 50% magic resistance. Casting this portion of the spell requires 1 round.

3.1.3 - Difficulties of the Physical Being, #Letters On Yoga IV, #Sri Aurobindo, #Integral Yoga
  In the purification of the physical nature, more even than in the rest, it is not safe to assume that there will be no more attacks of old forces or habits of the naturetill the thing is actually and unmistakably done. One must remain vigilant till there is the full siddhi. For in the physical, habit, memory, mechanical response have an immense power of survival therefore a return of old vibrations or formations is always possible. Only when there is the full purification and transformation is there the perfect security
  ***

3.14 - Of the Consecrations, #Liber ABA, #Aleister Crowley, #Philosophy
  Britain of the last rags of honour, prestige and security, and will break up
  civilization. See Magick Without Tears, letter 39.]

33.17 - Two Great Wars, #Collected Works of Nolini Kanta Gupta - Vol 07, #Nolini Kanta Gupta, #Integral Yoga
   A third boon was to lay the foundations of an International Society. This no doubt implied that the different countries and peoples of the world were to attain their freedom and autonomy. But in order that the smaller units might be left in security and there might be a check on unjust dealings among the nations, there had to come into being a Society of Nations where the representatives of all the nations could meet. This is what came to be known as the League of Nations. The unity of the human race was to be founded on a complex harmony of the diverse groups of men.
   The ideal now was to create a race of men endowed with the highest gifts of education and training - what in the view of the sages and mystics would be a race of god - men the transformation of man from the animal-state to that of the gods. But that was precisely what stirred the opposing Forces to action. They were to keep man distracted, lure him from the good path into evil ways, change him, not into a god but into a demon, a titan, a ghoul. (Goe the once had presented this picture.) That is how man got his notion of the super-race, and the notion took concrete shape among a particular people and some particular individuals. That is what lay behind the rise of Hitler and his Nazis in Germany. Stalin and his Bolsheviks appeared as their counterparts in Russia. Mussolini was their henchman, a "satellite" in modern parlance; Our Puranic scriptures tell of the ancient Shumbha and Nishumbha, Hiranyaksha and Hiranyakashipu, Shishupala and Raktadanta, dual power of Evil defying the Divine Power. Something similar seemed to be happening again.

3-5 Full Circle, #unset, #Arthur C Clarke, #Fiction
  "The power of the executive [the controller) has been enfeebled, often to the verge of impotence, by the pressures of the representative assembly and of mass opinions [the work component). This derangement of the governing power has forced the democratic states to commit disastrous and, it could be, fatal mistakes. It has also transformed the assemblies in most, perhaps not in all, democratic states from defenders of local and personal rights (of the two components) into boss-ridden oligarchies [lower level, predatory controllers], threatening the security, the solvency, and the liberties of the state [the social system as a whole]."19 pp. 54-55.
  Lippmann now states the systems-theoretic meaning of democratic constitutions: "In the traditions of Western society, civilized government is founded on the assumption that the two powers [controller and work component] exercising the two [cybernetic] functions will be in balance-that they will check, restrain, compensate; complement, inform and vitalize each other."

3.7.1.03 - Rebirth, Evolution, Heredity, #Essays In Philosophy And Yoga, #Sri Aurobindo, #Integral Yoga
  Face to face with psychic and spiritual secrecies, as in the open elementary world even of mind, Science has still the uninformed gaze and the groping hands of the infant. In that sphere she, so precise, illuminative, compelling in the physical, sees only the big blazing buzzing confusion which James tells us, with a possibly inaccurate vividness of alliterative phrase, is the newborn babys view of the sensible world into which he has dropped down the mysterious stairs of birth. Science, faced with what are still to her the wonderful random accords and unexplained miracles of consciousness, protects herself from the errors of the imagination,but stumbling incidentally by that very fact into plenty of the errors of an inadequate induction,behind an opaque shield of cautelous scepticism. She clings with the grasping firmness of the half-drowned to planks of security she thinks she has got in a few well-tested correspondences,so-styled, though the word as used explains nothing,between mental action and its accompaniment of suggestive or instrumental physical functionings. She is determined, if she can, to explain every supraphysical phenomenon by some physical fact; psychological process of mind must not exist except as result or rendering of physiological process of body. This set resolution, apparently rational and cautious of ascertainable and firmly tangible truth, but really heroic in its paradoxical temerity, shuts up her chance of rapid discovery, for the present at least, in a fairly narrow circle. It taints too her extensions of physical truth into the psychological field with a pursuing sense of inadequacy. And this inadequacy in extended application is very evident in her theories of heredity and evolution when she forces them beyond their safe ground of physical truth and labours to illumine by them the subtle, complex, elusive phenomena of our psychological being.
  There are still, I dare say, persons here and there who cherish a secret or an open unfaith in the theory of a physical evolution and believe that it will one day pass into the limbo of dead generalisations like the Ptolemaic theory in astronomy or like the theory of humours in medicine; but this is a rare and excessive scepticism. Yet it may not be without use or aptitude for our purpose to note that contrary to current popular notions the scientific account of this generalisation, like that of a good number of others, is not yet conclusively proved, even though now taken for granted. But still there is on the whole a mass of facts and indications in its favour so considerable as to look overwhelming, so that we cannot resist the conclusion that in this way or some such way the whole thing came about and we find it difficult to conceive any more convincing explanation of the indubitable ascending and branching scale of genus and species which meets even our casual scrutiny of living existence. One thing at least seems now intellectually certain, we can no longer believe that these suns and systems were hurled full-shaped and eternally arranged into boundless space and all these numberless species of being planted on earth ready-made and nicely tailored in seven days or any number of days in a sudden outburst of caprice or Dionysiac excitement or crowded activity of mechanical conception by the fiat of a timeless Creator. The successive development which was summarily proposed by ancient Hindu thinkers, the lower forms of being first, man afterwards as the crown of the Spirits development of life on earth, has been confirmed by the patient and detailed scrutiny of physical science,an aeonic development, though the farther Hindu conception of a constant repetition of the principle in cycles is necessarily incapable of physical evidence.

3.7.2.03 - Mind Nature and Law of Karma, #Essays In Philosophy And Yoga, #Sri Aurobindo, #Integral Yoga
  At first however the moral conceptions of man and the direction and output and the demand of return of the ethical energy in him get themselves inextricably mixed with his vital conceptions and demands and even afterwards lean on them very commonly and very considerably for a support and incentive. Human morality first takes up an enormous mass of customary rules of action, a conventional and traditional practice much of which is of a very doubtful moral value, gives to it an imperative sanction of right and slips into the crude mass or superimposes on it, but still as a part of one common and equal code, the true things of the ethical ideal. It appeals to the vital being, his desires, hopes and fears, incites man to virtue by the hope of rewards and the dread of punishment, imitating in this device the method of his crude and fumbling social practice: for that, finding its law and rule which, good or bad, it wishes to make imperative as supposing it to be at least the best calculated for the order and efficiency of the community, opposed by mans vital being, bribes and terrifies as well as influences, educates and persuades him to acceptance. Morality tells man, accommodating itself to his imperfection, mostly through the mouth of religion, that the moral law is imperative in itself, but also that it is very expedient for him personally to follow it, righteousness in the end the safest policy, virtue the best paymaster in the long run,for this is a world of Law or a world ruled by a just and virtuous or at least virtue-loving God. He is assured that the righteous man shall prosper and the wicked perish and that the paths of virtue lie through pleasant places. Or, if this will not serve, since it is palpably false in experience and even man cannot always deceive himself, it offers him a security of vital rewards denied here but conceded in some hereafter. Heaven and hell, happiness and suffering in other lives are put before him as the bribe and the menace. He is told, the better to satisfy his easily satisfied intellect, that the world is governed by an ethical law which determines the measure of his earthly fortunes, that a justice reigns and this is justice, that every action has its exact rebound and his good shall bring him good and his evil evil. It is these notions, this idea of the moral law, of righteousness and justice as a thing in itself imperative, but still needing to be enforced by bribe and menace on our human nature,which would seem to show that at least for that nature they are not altogether imperative,this insistence on reward and punishment because morality struggling with our first unregenerate being has to figure very largely as a mass of restraints and prohibitions and these cannot be enforced without some fact or appearance of a compelling or inducing outward sanction, this diplomatic compromise or effort at equivalence between the impersonal ethical and the personal egoistic demand, this marriage of convenience between right and vital utility, virtue and desire,it is these accommodations that are embodied in the current notions of the law of Karma.
  What real truth is there behind the current notions of Karma in the actual facts or the fundamental powers of the life of man here or the visible working of the law of the energies of the cosmos? There is evidently a substantial truth, but it is a part only of the whole; its reign or predominance belongs to a certain element only, to the emphasis of one line among many of a transitional movement between the law of the vital energy and a greater and higher law of the mind and spirit. A mixture of any two kinds of energy sets up a mixed and complex action of the output of the energy and the return, and a too sharp-cut rule affixing vital returns to a mental and moral output of force is open to much exception and it cannot be the whole inner truth of the matter. But still where the demand is for the vital return, for success, an outer happiness, good, fortune, that is a sign of the dominant intention in the energy and points to a balance of forces weighing in the indicated direction. At first sight, if success is the desideratum, it is not clear what morality has to say in the affair, since we see in most things that it is a right understanding and intelligent or intuitive practice of the means and conditions and an insistent power of the will, a settled drive of the force of the being of which success is the natural consequence. Man may impose by a system of punishments a check on the egoistic will and intelligence in pursuit of its vital ends, may create a number of moral conditions for the worlds prizes, but this might appear, as is indeed contended in certain vitalistic theories, an artificial imposition on Nature and a dulling and impoverishment of the free and powerful play of the mind force and the life force in their alliance. But in truth the greatest force for success is a right concentration of energy, tapasy, and there is an inevitable moral element in Tapasya.
  --
  And there are cosmic as well as human forces that respond to this balance of the mental and moral and the vital order. First there is something subtle, inscrutable and formidable that meets us in our paths, a Force of which the ancient Greeks took much notice, a Power that is on the watch for man in his effort at enlargement, possession and enjoyments and seems hostile and opposite. The Greeks figured it as the jealousy of the gods or as Doom, Necessity, Ate. The egoistic force in man may proceed far in its victory and triumph, but it has to be wary or it will find this power there on the watch for any flaw in his strength or action, any sufficient opportunity for his defeat and downfall. It dogs his endeavour with obstacle and reverse and takes advantage of his imperfections, often dallying with him, giving him long rope, delaying and abiding its time, and not only of his moral shortcomings but of his errors of will and intelligence, his excesses and deficiencies of strength and prudence, all defects of his nature. It seems overcome by his energies of Tapasya, but it waits its season. It overshadows unbroken or extreme prosperity and often surprises it with a sudden turn to ruin. It induces a security, a self-forgetfulness, a pride and insolence of success and victory and leads on its victim to dash himself against the hidden seat of justice or the wall of an invisible measure. It is as fatal to a blind self-righteousness and the arrogations of an egoistic virtue as to vicious excess and selfish violence. It appears to demand of man and of individual men and nations that they shall keep within a limit and a measure, while all beyond that brings danger; and therefore the Greeks held moderation in all things to be the greatest part of virtue.
  There is here something in the life forces obscure to us, considered by our partial feelings sinister because it crosses our desires, but obedient to some law and intention of the universal mind, the universal reason or Logos which the ancients perceived at work in the cosmos. Its presence, when felt by the cruder kind of religious mind, generates the idea of calamity as a punishment for sin,not observing that it has a punishment too for ignorance, for error, stupidity, weakness, defect of will and tapasya. This is really a resistance of the Infinite acting through life against the claim of the imperfect ego of man to enlarge itself, possess, enjoy and have, while remaining imperfect, a perfect and enduring happiness and complete felicity of its world-experience. The claim is, we may say, immoral, and the Force that resists it and returns, however uncertainly and late to our eyes, suffering and failure as a reply to our imperfections, may be considered a moral Force, an agent of a just Karma, though not solely in the narrowly ethical sense of Karma. The law it represents is that our imperfections shall have their passing or their fatal consequences, that a flaw in our output of energy may be mended or counterbalanced and reduced in consequence, but if persisted in shall react even in excess of its apparent merits, that an error may seem to destroy all the result of the Tapasya, because it springs from a radical unsoundness in the intention of the will, the heart, the ethical sense or the reason. This is the first line of the transitional law of Karma.

3 - Commentaries and Annotated Translations, #Hymns to the Mystic Fire, #Sri Aurobindo, #Integral Yoga
  condition for the security of the soul when it plunges into the
  myriad-billowed ocean of manifest existence. The Impersonal

4.03 - The Meaning of Human Endeavor, #Hymn of the Universe, #Pierre Teilhard de Chardin, #Christianity
  rious in the struggle against the spurious security
  and strength and attraction of the past can attain to

4.08 - The Liberation of the Spirit, #The Synthesis Of Yoga, #Sri Aurobindo, #Integral Yoga
  All the trouble and suffering of the soul proceeds from this wrong egoistic and separative way of existence. The soul not in possession of its free self-existence, anatmavan, because it is limited in its consciousness, is limited in knowledge; and this limited knowledge takes the form of a falsifying knowledge. The struggle to return to a true knowing is imposed upon it, but the ego in the separative mind is satisfied with shows and fragments of knowledge which it pieces together into some false or some imperfect total or governing notion, and this knowledge fails it and has to be abandoned for a fresh pursuit of the one thing to be known. That one thing is the Divine, the Self, the Spirit in whom universal and individual being find at last their right foundation and their right harmonies. Again, because it is limited in force, the ego-prisoned soul is full of many incapacities; wrong knowledge is accompanied by wrong will, wrong tendencies and impulses of the being, and the acute sense of this wrongness is the root of the human consciousness of sin. This deficiency of its nature it tries to set right by standards of conduct which will help it to remove the egoistic consciousness and satisfactions of sin by the egoistic consciousness and self-satisfaction of virtue, the rajasic by the sattwic egoism. But the original sin has to be cured, the separation of its being and will from the divine Being and the divine Will; when it returns to unity with the divine Will and Being, it rises beyond sin and virtue to the infinite self-existent purity and the security of its own divine nature. Its incapacities it tries to set right by organising its imperfect knowledge and disciplining its half-enlightened will and force and directing them by some systematic effort of the reason; but the result must always be a limited, uncertain, mutable and stumbling way and standard of capacity in action. Only when it returns again to the large unity of the free spirit, bhuma, can the action of its nature move perfectly as the instrument of the infinite Spirit and in the steps of the Right and Truth and Power which belong to the free soul acting from the supreme centre of its existence. Again, because it is limited in the delight of being, it is unable to lay hold on the secure, self-existent perfect bliss of the spirit or the delight, the Ananda of the universe which keeps the world in motion, but is only able to move in a mixed and shifting succession of pleasures and pains, joys and sorrows, or must take refuge in some conscient inconscience or neutral indifference. The ego mind cannot do otherwise, and the soul which has externalised itself in ego, is subjected to this unsatisfactory, secondary, imperfect, often perverse, troubled or annulled enjoyment of existence; yet all the time the spiritual and universal Ananda is within, in the self, in the spirit, in its secret unity with God and existence. To cast away the chain of ego and go back to free self, immortal spiritual being is the soul's return to its own eternal divinity.
  The will to the imperfect separative being, that wrong Tapas which makes the soul in Nature attempt to individualise itself, to individualise its being, consciousness, force of being, delight of existence in a separative sense, to have these things as its own, in its own right and not in the right of God and of the universal oneness, is that which brings about this wrong turn and creates the ego. To turn from this original desire is therefore essential, to get back to the will without desire whose whole enjoyment of being and whole will in being is that of a free universal and unifying Ananda. These two things are one, liberation from the will that is of the nature of desire and liberation from the ego, and the oneness which is brought about by the happy loss of the will of desire and the ego, is the essence of Mukti.

4.09 - The Liberation of the Nature, #The Synthesis Of Yoga, #Sri Aurobindo, #Integral Yoga
  The gunas affect every part of our natural being. They have indeed their strongest relative hold in the three different members of it, mind, life and body. Tamas, the principle of inertia, is strongest in material nature and in our physical being. The action of this principle is of two kinds, inertia of force and inertia of knowledge. Whatever is predominantly governed by Tamas, tends in its force to a sluggish inaction and immobility or else to a mechanical action which it does not possess, but is possessed by obscure forces which drive it in a mechanical round of energy; equally in its consciousness it turns to an inconscience or enveloped subconscience or to a reluctant, sluggish or in some way mechanical conscious action which does not possess the idea of its own energy, but is guided by an idea which seems external to it or at least concealed from its active awareness. Thus the principle of our body is in its nature inert, subconscient, incapable of anything but a mechanical and habitual self-guidance and action: though it has like everything else a principle of kinesis and a principle of equilibrium of its state and action, an inherent principle of response and a secret consciousness, the greatest portion of its rajasic motions is contri buted by the life-Power and all the overt consciousness by the mental being. The Principle of Rajas has its strongest hold on the vital nature. It is the Life within us that is the strongest kinetic motor power, but the life-power in earthly beings is possessed by the force of desire, therefore Rajas turns always to action and desire; desire is the strongest human and animal initiator of most kinesis and action, predominant to such an extent that many consider it the father of all action and even the originator of our being. Moreover, Rajas finding itself in a world of matter which starts from the principle of inconscience and a mechanically driven inertia, has to work against an immense contrary force; therefore its whole action takes on the nature of an effort, a struggle, a besieged and an impeded conflict for possession which is distressed in its every step by a limiting incapacity, disappointment and suffering: even its gains are precarious and limited and marred by the reaction of the effort and an after-taste of insufficiency and transience. The principle of Sattwa has its strongest hold in the mind; not so much in the lower parts of the mind which are dominated by the rajasic life-power, but mostly in the intelligence and the will of the reason. Intelligence, reason, rational will are moved by the nature of their predominant principle towards a constant effort of assimilation, assimilation by knowledge, assimilation by a power of understanding will, a constant effort towards equilibrium, some stability, rule, harmony of the conflicting elements of natural happening and experience. This satisfaction it gets in various ways and in various degrees of acquisition. The attainment of assimilation, equilibrium and harmony brings with it always a relative but more or less intense and satisfying sense of ease, happiness, mastery, security, which is other than the troubled and vehement pleasures insecurely bestowed by the satisfaction of rajasic desire and passion. Light and happiness are the characteristics of the sattwic Guna. The whole nature of the embodied living mental being is determined by these three gunas.
  But these are only predominant powers in each part of our complex system. The three qualities mingle, combine and strive in every fibre and in every member of our intricate psychology. The mental character is made by them, the character of our reason, the character of our will, the character of our moral, aesthetic, emotional, dynamic, sensational being. Tamas brings in all the ignorance, inertia, weakness, incapacity which afflicts our nature, a clouded reason, nescience, unintelligence, a clinging to habitual notions and mechanical ideas, the refusal to think and know, the small mind, the closed avenues, the trotting round of mental habit, the dark and the twilit places. Tamas brings in the impotent will, want of faith and self-confidence and initiative, the disinclination to act, the shrinking from endeavour and aspiration, the poor and little spirit, and in our moral and dynamic being the inertia, the cowardice, baseness, sloth, lax subjection to small and ignoble motives, the weak yielding to our lower nature. Tamas brings into our emotional nature insensibility, indifference, want of sympathy and openness, the shut soul, the callous heart, the soon spent affection and languor of the feelings, into our aesthetic and sensational nature the dull aesthesis, the limited range of response, the insensibility to beauty, all that makes in man the coarse, heavy and vulgar spirit. Rajas contri butes our normal active nature with all its good and evil; when unchastened by a sufficient element of Sattwa, it turns to egoism, self-will and violence, the perverse, obstinate or exaggerating action of the reason, prejudice, attachment to opinion, clinging to error, the subservience of the intelligence to our desires and preferences and not to the truth, the fanatic or the sectarian mind, self-will, pride, arrogance, selfishness, ambition, lust, greed, cruelty, hatred, jealousy, the egoisms of love, all the vices and passions, the exaggerations of the aesthesis, the morbidities and perversions of the sensational and vital being. Tamas in its own right produces the coarse, dull and ignorant type of human nature. Rajas the vivid, restless, kinetic man, driven by the breath of action, passion and desire. Sattwa produces a higher type. The gifts of Sattwa are the mind of reason and balance, clarity of the disinterested truth-seeking open intelligence, a will subordinated to the reason or guided by the ethical spirit, self-control, equality, calm, love, sympathy, refinement, measure, fineness of the aesthetic and emotional mind, in the sensational being delicacy, just acceptivity, moderation and poise, a vitality subdued and governed by the mastering intelligence. The accomplished types of the sattwic man are the philosopher, saint and sage, of the rajasic man the statesman, warrior, forceful man of action. But in all men there is in greater or less proportions a mingling of the gunas, a multiple personality and in most a good deal of shifting and alternation from the predominance of one to the prevalence of another Guna; even in the governing form of their nature most human beings are of a mixed type. All the colour and variety of life is made of the intricate pattern of the weaving of the gunas.

4.09 - THE SHADOW, #Thus Spoke Zarathustra, #Friedrich Nietzsche, #Philosophy
  sleep calmly, enjoying their new security. Beware lest
  a narrow faith imprison you in the end-some harsh

4.10 - The Elements of Perfection, #The Synthesis Of Yoga, #Sri Aurobindo, #Integral Yoga
  The first necessity is some fundamental poise of the soul both in its essential and its natural being regarding and meeting the things, impacts and workings of Nature. This poise we shall arrive at by growing into a perfect equality, samata. The self, spirit or Brahman is one in all and therefore one to all; it is, as is said in the Gita which has developed fully this idea of equality and indicated its experience on at least one side of equality, the equal Brahman, samam brahma; the Gita even goes so far in one passage as to identify equality and yoga, samatvam yoga ucyate. That is to say, equality is the sign of unity with the Brahman, of becoming Brahman, of growing into an undisturbed spiritual poise of being in the Infinite. Its importance can hardly be exaggerated; for it is the sign of our having passed beyond the egoistic determinations of our nature, of our having conquered our enslaved response to the dualities, of our having transcended the shifting turmoil of the gunas, of our having entered into the calm and peace of liberation. Equality is a term of consciousness which brings into the whole of our being and nature the eternal tranquillity of the Infinite. Moreover, it is the condition of a securely and perfectly divine action; the security and largeness of the cosmic action of the Infinite is based upon and never breaks down or forfeits its eternal tranquillity. That too must be the character of the perfect spiritual action; to be equal and one to all things in spirit, understanding, mind, heart and natural consciousness, -- even in the most physical consciousness, -- and to make all their workings, whatever their outward adaptation to the thing to be done, always and imminuably full of the divine equality and calm must be its inmost principle. That may be said to be the passive or basic, the fundamental and receptive side of equality, but there is also an active and possessive side, an equal bliss which can only come when the peace of equality is founded and which is the beatific flower of its fullness.
  The next necessity of perfection is to raise all the active parts of the human nature to that highest condition and working pitch of their power and capacity, sakti, at which they become capable of being divinised into true instruments of the free, perfect, spiritual and divine action. For practical purposes we may take the understanding, the heart, the Prana and the body as the four members of our nature which have thus to be prepared, and we have to find the constituent terms of their perfection. Also there is the dynamical force in us (virya) of the temperament, character and soul nature, svabhava, which makes the power of our members effective in action and gives them their type and direction; this has to be freed from its limitations, enlarged, rounded so that the whole manhood in us may become the basis of a divine manhood, when the Purusha, the real Man in us, the divine Soul, shall act fully in this human instrument and shine fully through this human vessel. To divinise the perfected nature we have to call in the divine Power or shakti to replace our limited human energy so that this may be shaped into the image of and filled with the force of a greater infinite energy, daivi prakrti, bhagavati sakti. This perfection will grow in the measure in which we can surrender ourselves, first, to the guidance and then to the direct action of that Power and of the Master of our being and our works to whom it belongs, and for this purpose faith is the essential, faith is the great motor-power of our being in our aspirations to perfection, -- here, a faith in God and the shakti which shall begin in the heart and understanding, but shall take possession of all our nature, all its consciousness, all its dynamic motive-force. These four things are the essentials of this second element of perfection, the full powers of the members of the instrumental nature, the perfected dynamis of the soul nature, the assumption of them into the action of the divine Power, and a perfect faith in all our members to call and support that assumption, sakti, virya, daivi prakrti, sraddha.

4.1.1.04 - Foundations of the Sadhana, #Letters On Yoga III, #Sri Aurobindo, #Integral Yoga
  If you keep the wideness and calm as you are keeping it and also the love for the Mother in the heart, then all is safe - for it means the double foundation of the Yoga - the descent of the higher consciousness with its peace, freedom and security from above and the openness of the psychic which keeps all the effort or all the spontaneous movement turned towards the true goal.
  To quiet the mind in such a way that no thoughts will come is not easy and usually takes time. The most necessary thing is to feel a quietude in the mind so that if thoughts come they do not disturb or hold the mind or make it follow them, but simply cross and pass away. The mind first becomes the witness of the passage of thought and not the thinker, afterwards it is able not to watch the thoughts but lets them pass unnoticed and concentrates in itself or on the object it chooses without trouble.

4.11 - THE WELCOME, #Thus Spoke Zarathustra, #Friedrich Nietzsche, #Philosophy
  And this is the first thing I offer you: security. The
  second thing, however, is my little finger. And once

4.1.4 - Resistances, Sufferings and Falls, #Letters On Yoga IV, #Sri Aurobindo, #Integral Yoga
  Life as it is is certainly full of mishap and suffering and looks like an inconsequence of Nature that has no eventual significance. But even if one does not find the concealed significance, yet if one can live in the higher calm, one can pass through it without being immersed in its bitternesses or its engulfing turmoils. That you have seen for yourself. I certainly hope that you will arrive at stability and security in that higher calm and with it the security of life cannot fail to come.
  The divine support will always be there if you hold on to it and our direct help cannot but be yours when you ask and call for it. You have only to hold on to your effort in spite of what seeks to shake you. Then certainly you will reach the height to which you aspire. I do not see why it should not be in the end the highest height but that we will leave for the future to decide. To have solid calmness is in itself something fundamental and sufficient.

4.14 - The Power of the Instruments, #The Synthesis Of Yoga, #Sri Aurobindo, #Integral Yoga
  The second member of the Yoga of self-perfection is the heightened, enlarged and rectified power of the instruments of our normal Nature. The cultivation of this second perfection need not wait for the security of the equal mind and spirit, but it is only in that security that it can become complete and act in the safety of the divine leading. The object of this cultivation is to make tile nature a fit instrument for divine works. All work is done by power, by shakti, and since the integral Yoga does not contemplate abandonment of works, but rather a doing of all works from the divine consciousness and with the supreme guidance, the characteristic powers of the instruments, mind, life and body must not only be purified of defects, but raised to a capacity for this greater action. In the end they must undergo a spiritual and supramental transfiguration.
  There are four members of this second part of the sadhana or discipline of self-perfection and the first of them is right shakti, the right condition of the powers of the intelligence, heart, vital mind and body. It will only be possible at present to suggest a preliminary perfection of the last of these four, for the full siddhi will have to be dealt with after I have spoken of the supermind and its influence on the rest of the being. The body is not only the necessary outer instrument of the physical part of action, but for the purposes of this life a base or pedestal also for all inner action. All working of mind or spirit has its vibration in the physical consciousness, records itself there in a kind of subordinate corporeal notation and communicates itself to the material world partly at least through the physical machine. But the body of man has natural limitations in this capacity which it imposes on the play of the higher parts of his being. And, secondly, it has a subconscient consciousness of its own in which it keeps with an obstinate fidelity the past habits and past nature of the mental and vital being and which automatically opposes and obstructs any very great upward change or at least prevents it from becoming a radical transformation of the whole nature. It is evident that if we are to have a free divine or spiritual and supramental action conducted by the force and fulfilling the character of a diviner energy, some fairly complete transformation must be effected ill this outward character of the bodily nature. The physical being of man has always been felt by the seekers of perfection to be a great impediment and it has been the habit to turn from it with contempt, denial or aversion and a desire to suppress altogether or as far as may be the body and the physical life. But this cannot be the right method for the integral Yoga. The body is given us as one instrument necessary to the totality of our works and it is to be used, not neglected, hurt, suppressed or abolished. If it is imperfect, recalcitrant, obstinate, so are also the other members, the vital being, heart and mind and reason. It has like them to be changed and perfected and to undergo a transformation. As we must get ourselves a new life, new heart, new mind, so we have in a certain sense to build for ourselves a new body.

4.15 - ON SCIENCE, #Thus Spoke Zarathustra, #Friedrich Nietzsche, #Philosophy
  up here, you and I. For I seek more security, that is why
  I came to Zarathustra. For he is the firmest tower and

4.22 - The supramental Thought and Knowledge, #The Synthesis Of Yoga, #Sri Aurobindo, #Integral Yoga
  This supramental knowledge is not primarily or essentially a thought knowledge. The intellect does not consider that it knows a thing until it has reduced its awareness of it to the terms of thought, not, that is to say, until it has put it into a system of representative mental concepts, and this kind of knowledge gets its most decisive completeness when it can be put into clear, precise and defining speech. It is true that the mind gets its knowledge primarily by various kinds of impressions beginning from the vital and the sense impressions and rising to the intuitive, but these are taken by the developed intelligence only as data and seem to it uncertain and vague in themselves until they have been forced to yield up all their content to the thought and have taken their place in some intellectual relation or in an ordered thought sequence. It is true again that there is a thought and a speech which are rather suggestive than definitive and have in their own way a greater potency and richness of content, and this kind already verges on the intuitive: but still there is a demand in the intellect to bring out in clear sequence and relation the exact intellectual content of these suggestions and until that is done it does not feel satisfied that its knowledge is complete. The thought labouring in the logical intellect is that which normally seems best to organise the mental action and gives to the mind a sense of sure definiteness, security and completeness in its knowledge and its use of knowledge. Nothing of this is at all true of the supramental knowledge.
  The supermind knows most completely and securely not by thought but by identity, by a pure awareness of the self-truth of things in the self and by the self, atmani atmanam atmana. I get the supramental knowledge best by becoming one with the truth, one with the object of knowledge; the supramental satisfaction and integral light is most there when there is no further division between the knower, knowledge and the known, jnata, jnanam, jneyam. I see the thing known not as an object outside myself, but as myself or a part of my universal self contained in my most direct consciousness. This leads to the highest and completest knowledge; thought and speech being representations and not this direct possession in the consciousness are to the supermind a lesser form and, if not filled with the spiritual awareness, thought becomes in fact a diminution of knowledge. For it would be, supposing it to be a supramental thought, only a partial manifestation of a greater knowledge existing in the self but not at the time present to the immediately active consciousness. In the highest ranges of the infinite there need be no thought at all because all would be experienced spiritually, in continuity, in eternal possession and with an absolute directness and completeness. Thought is only one means of partially manifesting and presenting what is hidden in this greater self-existent knowledge. This supreme kind of knowing will not indeed be possible to us in its full extent and degree until we can rise through many grades of the supermind to that infinite. But still as the supramental power emerges and enlarges its action, something of this highest way of knowledge appears and grows and even the members of the mental being, as they are intuitivised and supramentalised, develop more and more a corresponding action upon their own level. There is an increasing power of a luminous vital, psychic, emotional, dynamic and other identification with all the things and beings that are the objects of our consciousness and these transcendings of the separative consciousness bring with them many forms and means of a direct knowledge.

4.25 - Towards the supramental Time Vision, #The Synthesis Of Yoga, #Sri Aurobindo, #Integral Yoga
  At the same time it will be found that it is still a limited instrument. In the first place it will represent a superior knowledge working in the stuff of mind, cast into mental forms and still subject to mental conditions and limitations. It will always lean chiefly on the succession of present moments as a foundation for its steps and successions of knowledge, however far it may range backward or forward, -- it will move in the stream of Time even in its higher revelatory action and not see the movement from above or in the stabilities of eternal time with their large ranges of vision, and therefore it will always be bound to a secondary and limited action and to a certain dilution, qualification and relativity in its activities. Moreover, its knowing will be not a possession in itself but a reception of knowledge. It will at most create in place of tile mind of ignorance a mind of self-forgetful knowledge constantly reminded and illumined from a latent self-awareness and all-awareness. The range, the extent, the normal lines of action of the knowledge will vary according to the development, but it can never be free from very strong limutations. And this limitation will give a tendency to the still environing or subconsciously subsisting mind of ignorance to reassert itself, to rush in or up, acting where the intuitive knowledge refuses or is unable to act and bringing in with it again its confusion and mixture and error. The only security will be a refusal to attempt to know or at least a suspension of the effort of knowledge until or unless the higher light descends and extends its action. This self-restraint is difficult to mind and, too contentedly exercised, may limit the growth of the seeker. If, on the other hand, the mind of ignorance is allowed again to emerge and seek in its own stumbling imperfect force, there may be a constant oscillation between the two states or a mixed action of the two powers in place of a definite though relative perfection.
  The issue out of this dilemma is to a greater perfection towards which the formation of the intuitive, inspired and revelatory mind is only a preparatory stage, and that comes by a constant instreaming and descent of more and more of the supramental light and energy into the whole mental being and a constant raising of the intuition and its powers towards their source in the open glories of the supramental nature. There is then a double action of the intuitive mind aware of, open to and referring its knowledge constantly to the light above it for support and confirmation and of that light itself creating a highest mind of knowledge, --really the supramental action itself in a more and more transformed stuff of mind and a less and less insistent subjection to mental conditions. There is thus formed a lesser supramental action, a mind of knowledge tending always to change into the true supermind of knowledge. The mind of ignorance is more and more definitely excluded, its place taken by the mind of self-forgetful knowledge illumined by the intuition, and the intuition itself more perfectly organised becomes capable of answering to a larger and larger call upon it. The increasing mind of knowledge acts as an intermediary power and, as it forms itself, it works upon the other, transforms or replaces it and compels the farther change which effects the transition from mind to supermind. It is here that a change begins to take place in the time-consciousness and time-knowledge which finds its base and complete reality and significance only on the supramental levels. It is therefore in relation to the truth of supermind that its workings can be more effectively elucidated : for the mind of knowledge is only a projection and a last step in the ascent towards the supramental nature.

4.2 - Karma, #Essays Divine And Human, #Sri Aurobindo, #Integral Yoga
  342. The gain of democracy is the security of the individual's life, liberty and goods from the caprices of the tyrant one or the selfish few; its evil is the decline of greatness in humanity.
  343. This erring race of human beings dreams always of perfecting their environment by the machinery of government and society; but it is only by the perfection of the soul within that the outer environment can be perfected. What thou art within, that outside thee thou shalt enjoy; no machinery can rescue thee from the law of thy being.

4.4.5.02 - Descent and Psychic Experiences, #Letters On Yoga III, #Sri Aurobindo, #Integral Yoga
  peace, freedom and security from above and the openness of
  the psychic which keeps all the effort or all the spontaneous

5.01 - EPILOGUE, #The Phenomenon of Man, #Pierre Teilhard de Chardin, #Christianity
  efforts it requires) we soon see, under the veil of security and
  harmony which viewed from on high envelop the rise of

5.4.02 - Occult Powers or Siddhis, #Letters On Yoga I, #Sri Aurobindo, #Integral Yoga
  All these "experiments" of yours are founded upon the vital nature and the mind in connection with it; working on this foundation, there is no security against falsehood and fundamental error. No amount of powers (small or great) developing can be a surety against wandering from the Truth; and, if you allow pride and arrogance and ostentation of power to creep in and hold you, you will surely fall into error and into the power of rajasic Maya and Avidya. Our object is not to get powers, but to ascend towards the divine Truth-consciousness and bring its Truth down into the lower members. With the
  Truth all the necessary powers will come, not as one's own, but as the Divine's. The contact with the Truth cannot grow through rajasic mental and vital self-assertion, but only through psychic purity and surrender.

6.08 - Intellectual Visions, #The Interior Castle or The Mansions, #Saint Teresa of Avila, #Christianity
  11. It would be worse should he tell you the devil is deceiving you, although no learned man would say so if he sees in you the effects described. Even should your adviser say this, I know that the same Lord Who is beside you will comfort and reassure you and will go to your counsellor and give him light that he may impart it to you.147 If the director, though given to prayer, has not been led by God in this way, he will at once take fright and condemn it. Therefore I advise you to choose a qualified theologian and, if possible, one who is also spiritual. The Prioress ought to allow you this, for although she may feel sure that you are safe from delusion because you lead a good life, yet she is bound to permit you to consult some one for your mutual security. When you have conferred with these persons, be at peace; trouble yourself no more about the matter, for sometimes when there is no cause for fear, the demon gives rise to such immoderate scruples that the person cannot be satisfied with consulting her confessor only once on the subject, especially if he is inexperienced and timid or if he bids her consult him again.
  12. Thus that which should have been kept strictly private becomes public;148 such a person is persecuted and tormented and finds that what she believed to be her own secret has become public property. Hence she suffers many troubles which may even devolve upon the Order in such times as these. Consequently I warn all Prioresses that great caution is required in such matters; also they must not think a nun more virtuous than the rest because such favours are shown her. Our Lord guides every one, in the way He knows to be best.

6.09 - THE THIRD STAGE - THE UNUS MUNDUS, #Mysterium Coniunctionis, #Carl Jung, #Psychology
  [759] The production of the lapis was the goal of alchemy in general. Dorn was a significant exception, because for him this denoted only the completion of the second stage of conjunction. In this he agrees with psychological experience. For us the representation of the idea of the self in actual and visible form is a mere rite dentre, as it were a propaedeutic action and mere anticipation of its realization. The existence of a sense of inner security by no means proves that the product will be stable enough to withstand the disturbing or hostile influences of the environment. The adept had to experience again and again how unfavourable circumstances or a technical blunder oras it seemed to himsome devilish accident hindered the completion of his work, so that he was forced to start all over again from the very beginning. Anyone who submits his sense of inner security to analogous psychic tests will have similar experiences. More than once everything he has built will fall to pieces under the impact of reality, and he must not let this discourage him from examining, again and again, where it is that his attitude is still defective, and what are the blind spots in his psychic field of vision. Just as a lapis Philosophorum, with its miraculous powers, was never produced, so psychic wholeness will never be attained empirically, as consciousness is too narrow and too one-sided to comprehend the full inventory of the psyche. Always we shall have to begin again from the beginning. From ancient times the adept knew that he was concerned with the res simplex, and the modern man too will find by experience that the work does not prosper without the greatest simplicity. But simple things are always the most difficult.
  [760] The One and Simple is what Dorn called the unus mundus, This one world was the res simplex.228 For him the third and highest degree of conjunction was the union of the whole man with the unus mundus. By this he meant, as we have seen, the potential world of the first day of creation, when nothing was yet in actu, i.e., divided into two and many, but was still one.229 The creation of unity by a magical procedure meant the possibility of effecting a union with the worldnot with the world of multiplicity as we see it but with a potential world, the eternal Ground of all empirical being, just as the self is the ground and origin of the individual personality past, present, and future. On the basis of a self known by meditation and produced by alchemical means, Dorn hoped and expected to be united with the unus mundus.

7.04 - Self-Reliance, #Words Of Long Ago, #The Mother, #Integral Yoga
  But personal effort brings about still greater marvels: it covers the soil with rich harvests, tames wild beasts, tunnels through mountains, erects dykes and bridges, builds cities, launches ships on the ocean and flying machines in the air; in short it gives more well-being and security to all.
  By personal effort man becomes more noble, more just, more kind: this is the true progress.

7.15 - The Family, #Words Of Long Ago, #The Mother, #Integral Yoga
  "I cannot let your father go unless I have some security, some pledge that he will return to finish his sentence."
  "We have no money," the boy replied, "but I shall be the pledge myself and I shall stay in prison in my father's place."

7 - Yoga of Sri Aurobindo, #unset, #Arthur C Clarke, #Fiction
  and security, the reflex gesture could not be controlled.
  Only the scientist did not know one thing an ele-

Aeneid, #unset, #Arthur C Clarke, #Fiction
  and for security, are changed; they now
  want weapons, pray the pact can be unmade;
  --
  will win security for you in battle
  and lead you toward a great reward: only

Apology, #unset, #Arthur C Clarke, #Fiction
  Some one will say: Yes, Socrates, but cannot you hold your tongue, and then you may go into a foreign city, and no one will interfere with you? Now I have great difficulty in making you understand my answer to this. For if I tell you that to do as you say would be a disobedience to the God, and therefore that I cannot hold my tongue, you will not believe that I am serious; and if I say again that daily to discourse about virtue, and of those other things about which you hear me examining myself and others, is the greatest good of man, and that the unexamined life is not worth living, you are still less likely to believe me. Yet I say what is true, although a thing of which it is hard for me to persuade you. Also, I have never been accustomed to think that I deserve to suffer any harm. Had I money I might have estimated the offence at what I was able to pay, and not have been much the worse. But I have none, and therefore I must ask you to proportion the fine to my means. Well, perhaps I could afford a mina, and therefore I propose that penalty: Plato, Crito, Critobulus, and Apollodorus, my friends here, bid me say thirty min, and they will be the sureties. Let thirty min be the penalty; for which sum they will be ample security to you.
  Not much time will be gained, O Athenians, in return for the evil name which you will get from the detractors of the city, who will say that you killed Socrates, a wise man; for they will call me wise, even although I am not wise, when they want to reproach you. If you had waited a little while, your desire would have been fulfilled in the course of nature. For I am far advanced in years, as you may perceive, and not far from death. I am speaking now not to all of you, but only to those who have condemned me to death. And I have another thing to say to them: you think that I was convicted because I had no words of the sort which would have procured my acquittalI mean, if I had thought fit to leave nothing undone or unsaid. Not so; the deficiency which led to my conviction was not of wordscertainly not. But I had not the boldness or impudence or inclination to address you as you would have liked me to do, weeping and wailing and lamenting, and saying and doing many things which you have been accustomed to hear from others, and which, as I maintain, are unworthy of me. I thought at the time that I ought not to do anything common or mean when in danger: nor do I now repent of the style of my defence; I would rather die having spoken after my manner, than speak in your manner and live. For neither in war nor yet at law ought I or any man to use every way of escaping death. Often in battle there can be no doubt that if a man will throw away his arms, and fall on his knees before his pursuers, he may escape death; and in other dangers there are other ways of escaping death, if a man is willing to say and do anything. The difficulty, my friends, is not to avoid death, but to avoid unrighteousness; for that runs faster than death. I am old and move slowly, and the slower runner has overtaken me, and my accusers are keen and quick, and the faster runner, who is unrighteousness, has overtaken them. And now I depart hence condemned by you to suffer the penalty of death,they too go their ways condemned by the truth to suffer the penalty of villainy and wrong; and I must abide by my awardlet them abide by theirs. I suppose that these things may be regarded as fated,and I think that they are well.

Big Mind (ten perfections), #unset, #Arthur C Clarke, #Fiction
  As power I am not about resisting or overcoming situations, but about inhabiting every human emotion and every situation. I realize the wisdom of in security. In other words, my power is in realizing that there is no security, there's nothing that we can rely or depend on. Everything is transient, even what appear to be the most solid things are actually in constant flux. We think we can count on something outside our self, or even within, and through deep realization we discover there is no security.
  This gives me the freedom to live in the moment, to be present and flexible. I don't get attached to things as easily, nor become dependent on people, ideas, or concepts.

Blazing P1 - Preconventional consciousness, #unset, #Arthur C Clarke, #Fiction
  but are not comprehended. [This is] a state when the B problems, that is safety and security
  and assurance problems, activate the second or the O neurological system that is specifically
  --
  Bottom line: Safety and security47
  Basic theme: Keep the spirits happy and the tribes next warm and safe48
  --
  The egocentric existential state arises when the achievement of relative safety and security
  produces P problems of existence, the problems of boredom in a being as intelligent as the

Blazing P2 - Map the Stages of Conventional Consciousness, #unset, #Arthur C Clarke, #Fiction
  comm and to achieve safety and security in this world.
  To attain safety and security, he seeks to create an orderly, predictable, stable, unchanging
  world one in which the unexpected does not happen. As he sees it only complete denial of
  --
  Peace in this world relates to safety and security, and the way to achieve this is to divine the
  immutable laws of living and submit to and obey them and, once having found them, let no
  --
  everlasting security, are fulfilled by the theophilosophical prescriptions of authority or when
  higher authority does not solve the problems of everlasting peace and creates the problem
  that Gods word alone is not enough to achieve lasting order and security. Rigid, dogmatic,
  authoritarian leadership blocks those developing feelings of self which begin to emerge. This

Blazing P3 - Explore the Stages of Postconventional Consciousness, #unset, #Arthur C Clarke, #Fiction
  sustain our individual and corporate survival, security and significance. Many persons in this
  stage die at the hands of those whom they hope to change. Universalizers are often more

BOOK I. - Augustine censures the pagans, who attributed the calamities of the world, and especially the sack of Rome by the Goths, to the Christian religion and its prohibition of the worship of the gods, #City of God, #Saint Augustine of Hippo, #Christianity
  If the famous Scipio Nasica were now alive, who was once your pontiff, and was unanimously chosen by the senate, when, in the panic created by the Punic war, they sought for the best citizen to entertain the Phrygian goddess, he would curb this shamelessness of yours, though you would perhaps scarcely dare to look upon the countenance of such a man. For why in your calamities do you complain of Christianity, unless because you desire to enjoy your luxurious licence unrestrained, and to lead an abandoned and profligate life without the interruption of any uneasiness or disaster? For certainly your desire for peace, and prosperity, and plenty is not prompted by any purpose of using these blessings honestly, that is to say, with moderation, sobriety, temperance, and piety; for your purpose rather is to run riot in an endless variety of sottish pleasures, and thus to generate from your prosperity a moral pestilence which will prove a thousand-fold more disastrous than the fiercest enemies. It was such a calamity as this that Scipio, your chief pontiff, your best man in the judgment of the whole senate, feared when he refused to agree to the destruction of Carthage, Rome's rival; and opposed Cato, who advised its destruction. He feared security, that enemy of weak minds, and he perceived that a wholesome fear would be a fit guardian for the citizens. And[Pg 43] he was not mistaken: the event proved how wisely he had spoken. For when Carthage was destroyed, and the Roman republic delivered from its great cause of anxiety, a crowd of disastrous evils forthwith resulted from the prosperous condition of things. First concord was weakened, and destroyed by fierce and bloody seditions; then followed, by a concatenation of baleful causes, civil wars, which brought in their train such massacres, such bloodshed, such lawless and cruel proscription and plunder, that those Romans who, in the days of their virtue, had expected injury only at the hands of their enemies, now that their virtue was lost, suffered greater cruelties at the hands of their fellow-citizens. The lust of rule, which with other vices existed among the Romans in more unmitigated intensity than among any other people, after it had taken possession of the more powerful few, subdued under its yoke the rest, worn and wearied.
  31. By what steps the passion for governing increased among the Romans.

BOOK II. - A review of the calamities suffered by the Romans before the time of Christ, showing that their gods had plunged them into corruption and vice, #City of God, #Saint Augustine of Hippo, #Christianity
  Again, I presume it was due to this natural equity and virtue, that after the expulsion of King Tarquin, whose son had violated Lucretia, Junius Brutus the consul forced Lucius Tarquinius Collatinus, Lucretia's husb and and his own colleague, a good and innocent man, to resign his office and go into banishment, on the one sole charge that he was of the name and blood of the Tarquins. This injustice was perpetrated with the approval, or at least connivance, of the people, who had themselves raised to the consular office both Collatinus and Brutus. Another instance of this equity and virtue is found in their treatment of Marcus Camillus. This eminent man, after he had rapidly conquered the Veians, at that time the most formidable of Rome's enemies, and who had maintained a ten years' war, in which the Roman army had suffered the usual calamities attendant on bad generalship, after he had restored security to Rome, which had begun to tremble for its safety, and after he had taken the wealthiest city of the enemy, had charges brought against him by the malice of those that envied his success, and by the insolence of the tribunes of the people; and seeing that the city bore him no gratitude for preserving it, and that he would certainly be condemned, he went into exile, and even in his absence was fined 10,000 asses. Shortly after, however, his ungrateful country had again to seek his protection from the Gauls. But I cannot now mention all the shameful and iniquitous acts with which Rome was agitated, when the aristocracy attempted to subject the people, and the people resented their encroachments, and the advocates of either party[Pg 69] were actuated rather by the love of victory than by any equitable or virtuous consideration.
    18. What the history of Sallust reveals regarding the life of the Romans, either when straitened by anxiety or relaxed in security.
  I will therefore pause, and adduce the testimony of Sallust himself, whose words in praise of the Romans (that "equity and virtue prevailed among them not more by force of laws than of nature") have given occasion to this discussion. He was referring to that period immediately after the expulsion of the kings, in which the city became great in an incredibly short space of time. And yet this same writer acknowledges in the first book of his history, in the very exordium of his work, that even at that time, when a very brief interval had elapsed after the government had passed from kings to consuls, the more powerful men began to act unjustly, and occasioned the defection of the people from the patricians, and other disorders in the city. For after Sallust had stated that the Romans enjoyed greater harmony and a purer state of society between the second and third Punic wars than at any other time, and that the cause of this was not their love of good order, but their fear lest the peace they had with Carthage might be broken (this also, as we mentioned, Nasica contemplated when he opposed the destruction of Carthage, for he supposed that fear would tend to repress wickedness, and to preserve wholesome ways of living), he then goes on to say: "Yet, after the destruction of Carthage, discord, avarice, ambition, and the other vices which are commonly generated by prosperity, more than ever increased." If they "increased," and that "more than ever," then already they had appeared, and had been increasing. And so Sallust adds this reason for what he said. "For," he says, "the oppressive measures of the powerful, and the consequent secessions of the plebs from the patricians, and other civil dissensions, had existed from the first, and affairs were administered with equity and well-tempered justice for no longer a period than the short time after the expulsion of the kings, while the city was occupied with the serious Tuscan war and Tarquin's vengeance." You see how, even in that brief period after the expulsion of the kings, fear, he acknowledges, was the cause of the interval of[Pg 70] equity and good order. They were afraid, in fact, of the war which Tarquin waged against them, after he had been driven from the throne and the city, and had allied himself with the Tuscans. But observe what he adds: "After that, the patricians treated the people as their slaves, ordering them to be scourged or beheaded just as the kings had done, driving them from their holdings, and harshly tyrannizing over those who had no property to lose. The people, overwhelmed by these oppressive measures, and most of all by exorbitant usury, and obliged to contri bute both money and personal service to the constant wars, at length took arms, and seceded to Mount Aventine and Mount Sacer, and thus obtained for themselves tribunes and protective laws. But it was only the second Punic war that put an end on both sides to discord and strife." You see what kind of men the Romans were, even so early as a few years after the expulsion of the kings; and it is of these men he says, that "equity and virtue prevailed among them not more by force of law than of nature."
  --
  But if our adversaries do not care how foully and disgracefully the Roman republic be stained by corrupt practices, so long only as it holds together and continues in being, and if they therefore pooh-pooh the testimony of Sallust to its "utterly wicked and profligate" condition, what will they make of Cicero's statement, that even in his time it had become entirely extinct, and that there remained extant no Roman republic at all? He introduces Scipio (the Scipio who had destroyed Carthage) discussing the republic, at a time when already there were presentiments of its speedy ruin by that corruption which Sallust describes. In fact, at the time when the discussion took place, one of the Gracchi, who, according to Sallust, was the first great instigator of seditions, had already been put to death. His death, indeed, is mentioned in the same book. Now Scipio, in the end of the second book, says: "As, among the different sounds which proceed from lyres, flutes, and the human voice, there must be maintained a certain harmony which a cultivated ear cannot endure to hear disturbed or jarring, but which may be elicited in full and absolute concord by the modulation even of voices very unlike one another; so, where reason is allowed to modulate the diverse elements of the state, there is obtained a perfect concord from the upper, lower, and middle classes as from various sounds; and what musicians call harmony in singing, is concord in matters of state, which is the strictest bond and best security of any republic, and which by no ingenuity can be retained where justice has become extinct." Then, when he had expatiated somewhat more fully, and had more copiously illustrated the benefits of its presence and the ruinous effects of its absence upon a state, Pilus, one of the company present at the discussion, struck in and demanded that the question should be more thoroughly sifted, and that[Pg 75] the subject of justice should be freely discussed for the sake of ascertaining what truth there was in the maxim which was then becoming daily more current, that "the republic cannot be governed without injustice." Scipio expressed his willingness to have this maxim discussed and sifted, and gave it as his opinion that it was baseless, and that no progress could be made in discussing the republic unless it was established, not only that this maxim, that "the republic cannot be governed without injustice," was false, but also that the truth is, that it cannot be governed without the most absolute justice. And the discussion of this question, being deferred till the next day, is carried on in the third book with great animation. For Pilus himself undertook to defend the position that the republic cannot be governed without injustice, at the same time being at special pains to clear himself of any real participation in that opinion. He advocated with great keenness the cause of injustice against justice, and endeavoured by plausible reasons and examples to demonstrate that the former is beneficial, the latter useless, to the republic. Then, at the request of the company, Llius attempted to defend justice, and strained every nerve to prove that nothing is so hurtful to a state as injustice; and that without justice a republic can neither be governed, nor even continue to exist.
  When this question has been handled to the satisfaction of the company, Scipio reverts to the original thread of discourse, and repeats with commendation his own brief definition of a republic, that it is the weal of the people. "The people" he defines as being not every assemblage or mob, but an assemblage associated by a common acknowledgment of law, and by a community of interests. Then he shows the use of definition in debate; and from these definitions of his own he gathers that a republic, or "weal of the people," then exists only when it is well and justly governed, whether by a monarch, or an aristocracy, or by the whole people. But when the monarch is unjust, or, as the Greeks say, a tyrant; or the aristocrats are unjust, and form a faction; or the people themselves are unjust, and become, as Scipio for want of a better name calls them, themselves the tyrant, then the republic is not only blemished (as had been proved the day[Pg 76] before), but by legitimate deduction from those definitions, it altogether ceases to be. For it could not be the people's weal when a tyrant factiously lorded it over the state; neither would the people be any longer a people if it were unjust, since it would no longer answer the definition of a people"an assemblage associated by a common acknowledgment of law, and by a community of interests."

BOOK III. - The external calamities of Rome, #City of God, #Saint Augustine of Hippo, #Christianity
  Omitting many things, that I may not exceed the limits of the work I have proposed to myself, I come to the epoch between the second and last Punic wars, during which, according to Sallust, the Romans lived with the greatest virtue and concord. Now, in this period of virtue and harmony, the great Scipio, the liberator of Rome and Italy, who had with surprising ability brought to a close the second Punic war that horrible, destructive, dangerous contestwho had defeated Hannibal and subdued Carthage, and whose whole life is said to have been dedicated to the gods, and cherished in their temples,this Scipio, after such a triumph, was obliged to yield to the accusations of his enemies, and to leave his country, which his valour had saved and liberated, to spend the remainder of his days in the town of Liternum, so indifferent to a recall from exile, that he is said to have given orders that not even his remains should lie in his ungrateful country. It was at that time also that the proconsul Cn. Manlius, after subduing the Galatians, introduced into Rome the luxury of Asia, more destructive than all hostile armies. It was then that iron bedsteads and expensive carpets were first used; then, too, that female singers were admitted at banquets, and other licentious abominations were introduced. But at present I meant to speak, not of the evils men voluntarily practise, but of those they suffer in spite of themselves. So that the case of Scipio, who succumbed to his enemies, and died in exile from the country he had rescued, was mentioned by me as being pertinent to the present discussion; for this was the reward he received from those Roman gods whose temples he saved from Hannibal, and who are worshipped only for the sake of securing temporal[Pg 124] happiness. But since Sallust, as we have seen, declares that the manners of Rome were never better than at that time, I therefore judged it right to mention the Asiatic luxury then introduced, that it might be seen that what he says is true, only when that period is compared with the others, during which the morals were certainly worse, and the factions more violent. For at that time I mean between the second and third Punic war that notorious Lex Voconia was passed, which prohibited a man from making a woman, even an only daughter, his heir; than which law I am at a loss to conceive what could be more unjust. It is true that in the interval between these two Punic wars the misery of Rome was somewhat less. Abroad, indeed, their forces were consumed by wars, yet also consoled by victories; while at home there were not such disturbances as at other times. But when the last Punic war had terminated in the utter destruction of Rome's rival, which quickly succumbed to the other Scipio, who thus earned for himself the surname of Africanus, then the Roman republic was overwhelmed with such a host of ills, which sprang from the corrupt manners induced by prosperity and security, that the sudden overthrow of Carthage is seen to have injured Rome more seriously than her long-continued hostility. During the whole subsequent period down to the time of Csar Augustus, who seems to have entirely deprived the Romans of liberty,a liberty, indeed, which in their own judgment was no longer glorious, but full of broils and dangers, and which now was quite enervated and languishing, and who submitted all things again to the will of a monarch, and infused as it were a new life into the sickly old age of the republic, and inaugurated a fresh rgime;during this whole period, I say, many military disasters were sustained on a variety of occasions, all of which I here pass by. There was specially the treaty of Numantia, blotted as it was with extreme disgrace; for the sacred chickens, they say, flew out of the coop, and thus augured disaster to Mancinus the consul; just as if, during all these years in which that little city of Numantia had withstood the besieging army of Rome, and had become a terror to the republic, the other generals had all marched against it under unfavourable auspices.
  [Pg 125]
  --
  Then followed the victory of Sylla, the so-called avenger of the cruelties of Marius. But not only was his victory purchased with great bloodshed; but when hostilities were finished, hostility survived, and the subsequent peace was bloody as the war. To the former and still recent massacres of the elder Marius, the younger Marius and Carbo, who belonged to the same party, added greater atrocities. For when Sylla approached, and they despaired not only of victory, but of life itself, they made a promiscuous massacre of friends and foes. And, not satisfied with staining every corner of Rome with blood, they besieged the senate, and led forth the senators to death from the curia as from a prison. Mucius Scvola the pontiff was slain at the altar of Vesta, which he had clung to[Pg 130] because no spot in Rome was more sacred than her temple; and his blood well-nigh extinguished the fire which was kept alive by the constant care of the virgins. Then Sylla entered the city victorious, after having slaughtered in the Villa Publica, not by combat, but by an order, 7000 men who had surrendered, and were therefore unarmed; so fierce was the rage of peace itself, even after the rage of war was extinct. Moreover, throughout the whole city every partisan of Sylla slew whom he pleased, so that the number of deaths went beyond computation, till it was suggested to Sylla that he should allow some to survive, that the victors might not be destitute of subjects. Then this furious and promiscuous licence to murder was checked, and much relief was expressed at the publication of the prescription list, containing though it did the death-warrant of two thousand men of the highest ranks, the senatorial and equestrian. The large number was indeed saddening, but it was consolatory that a limit was fixed; nor was the grief at the numbers slain so great as the joy that the rest were secure. But this very security, hard-hearted as it was, could not but bemoan the exquisite torture applied to some of those who had been doomed to die. For one was torn to pieces by the unarmed hands of the executioners; men treating a living man more savagely than wild beasts are used to tear an abandoned corpse. Another had his eyes dug out, and his limbs cut away bit by bit, and was forced to live a long while, or rather to die a long while, in such torture. Some celebrated cities were put up to auction, like farms; and one was collectively condemned to slaughter, just as an individual criminal would be condemned to death. These things were done in peace when the war was over, not that victory might be more speedily obtained, but that, after being obtained, it might not be thought lightly of. Peace vied with war in cruelty, and surpassed it: for while war overthrew armed hosts, peace slew the defenceless. War gave liberty to him who was attacked, to strike if he could; peace granted to the survivors not life, but an unresisting death.
    29. A comparison of the disasters which Rome experienced during the Gothic and Gallic invasions, with those occasioned by the authors of the civil wars.

BOOK II. -- PART II. THE ARCHAIC SYMBOLISM OF THE WORLD-RELIGIONS, #The Secret Doctrine, #H P Blavatsky, #Theosophy
  shelter and security, which is rather a prosaic definition. But such is the usual destiny of ideas and
  things in this world of spiritual decadence, if also of physical progress. PAN was at one time absolute
  --
  thus rejecting the only knowledge upon which he can with full security base his Science. Yet this
  manifested Force has an answer for him who seeks to fathom it. He who sees in the cross, the

BOOK I. -- PART III. SCIENCE AND THE SECRET DOCTRINE CONTRASTED, #The Secret Doctrine, #H P Blavatsky, #Theosophy
  They may be left with the greatest security and confidence to Science, to be justified some day. Let us
  hear some more, however, about this primordial genetic type of the symbolical caduceus.

BOOK IX. - Of those who allege a distinction among demons, some being good and others evil, #City of God, #Saint Augustine of Hippo, #Christianity
  Among the philosophers there are two opinions about these mental emotions, which the Greeks call , while some of our own writers, as Cicero, call them perturbations,[331] some[Pg 356] affections, and some, to render the Greek word more accurately, passions. Some say that even the wise man is subject to these perturbations, though moderated and controlled by reason, which imposes laws upon them, and so restrains them within necessary bounds. This is the opinion of the Platonists and Aristotelians; for Aristotle was Plato's disciple, and the founder of the Peripatetic school. But others, as the Stoics, are of opinion that the wise man is not subject to these perturbations. But Cicero, in his book De Finibus, shows that the Stoics are here at variance with the Platonists and Peripatetics rather in words than in reality; for the Stoics decline to apply the term "goods" to external and bodily advantages,[332] because they reckon that the only good is virtue, the art of living well, and this exists only in the mind. The other philosophers, again, use the simple and customary phraseology, and do not scruple to call these things goods, though in comparison of virtue, which guides our life, they are little and of small esteem. And thus it is obvious that, whether these outward things are called goods or advantages, they are held in the same estimation by both parties, and that in this matter the Stoics are pleasing themselves merely with a novel phraseology. It seems, then, to me that in this question, whether the wise man is subject to mental passions, or wholly free from them, the controversy is one of words rather than of things; for I think that, if the reality and not the mere sound of the words is considered, the Stoics hold precisely the same opinion as the Platonists and Peripatetics. For, omitting for brevity's sake other proofs which I might adduce in support of this opinion, I will state but one which I consider conclusive. Aulus Gellius, a man of extensive erudition, and gifted with an eloquent and graceful style, relates, in his work entitled Noctes Attic,[333] that he once made a voyage with an eminent Stoic philosopher; and he goes on to relate fully and with gusto what I shall barely state, that when the ship was tossed and in danger from a violent storm, the philosopher[Pg 357] grew pale with terror. This was noticed by those on board, who, though themselves threatened with death, were curious to see whether a philosopher would be agitated like other men. When the tempest had passed over, and as soon as their security gave them freedom to resume their talk, one of the passengers, a rich and luxurious Asiatic, begins to banter the philosopher, and rally him because he had even become pale with fear, while he himself had been unmoved by the impending destruction. But the philosopher availed himself of the reply of Aristippus the Socratic, who, on finding himself similarly bantered by a man of the same character, answered, "You had no cause for anxiety for the soul of a profligate debauchee, but I had reason to be alarmed for the soul of Aristippus." The rich man being thus disposed of, Aulus Gellius asked the philosopher, in the interests of science and not to annoy him, what was the reason of his fear? And he, willing to instruct a man so zealous in the pursuit of knowledge, at once took from his wallet a book of Epictetus the Stoic,[334] in which doctrines were advanced which precisely harmonized with those of Zeno and Chrysippus, the founders of the Stoical school. Aulus Gellius says that he read in this book that the Stoics maintain that there are certain impressions made on the soul by external objects which they call phantasi, and that it is not in the power of the soul to determine whether or when it shall be invaded by these. When these impressions are made by alarming and formidable objects, it must needs be that they move the soul even of the wise man, so that for a little he trembles with fear, or is depressed by sadness, these impressions anticipating the work of reason and self-control; but this does not imply that the mind accepts these evil impressions, or approves or consents to them. For this consent is, they think, in a man's power; there being this difference between the mind of the wise man and that of the fool, that the fool's mind yields to these passions and consents to them, while that of the wise man, though it cannot help being invaded by them, yet retains with unshaken firmness a true and steady persuasion of those things which it ought rationally to desire or avoid. This account of what[Pg 358] Aulus Gellius relates that he read in the book of Epictetus about the sentiments and doctrines of the Stoics I have given as well as I could, not, perhaps, with his choice language, but with greater brevity, and, I think, with greater clearness. And if this be true, then there is no difference, or next to none, between the opinion of the Stoics and that of the other philosophers regarding mental passions and perturbations, for both parties agree in maintaining that the mind and reason of the wise man are not subject to these. And perhaps what the Stoics mean by asserting this, is that the wisdom which characterizes the wise man is clouded by no error and sullied by no taint, but, with this reservation that his wisdom remains undisturbed, he is exposed to the impressions which the goods and ills of this life (or, as they prefer to call them, the advantages or disadvantages) make upon them. For we need not say that if that philosopher had thought nothing of those things which he thought he was forthwith to lose, life and bodily safety, he would not have been so terrified by his danger as to betray his fear by the pallor of his cheek. Nevertheless, he might suffer this mental disturbance, and yet maintain the fixed persuasion that life and bodily safety, which the violence of the tempest threatened to destroy, are not those good things which make their possessors good, as the possession of righteousness does. But in so far as they persist that we must call them not goods but advantages, they quarrel about words and neglect things. For what difference does it make whether goods or advantages be the better name, while the Stoic no less than the Peripatetic is alarmed at the prospect of losing them, and while, though they name them differently, they hold them in like esteem? Both parties assure us that, if urged to the commission of some immorality or crime by the threatened loss of these goods or advantages, they would prefer to lose such things as preserve bodily comfort and security rather than commit such things as violate righteousness. And thus the mind in which this resolution is well grounded suffers no perturbations to prevail with it in opposition to reason, even though they assail the weaker parts of the soul; and not only so, but it rules over them, and, while it refuses its consent and resists them, administers[Pg 359] a reign of virtue. Such a character is ascribed to neas by Virgil when he says,
  "He stands immovable by tears, Nor tenderest words with pity hears."[335]

BOOK V. - Of fate, freewill, and God's prescience, and of the source of the virtues of the ancient Romans, #City of God, #Saint Augustine of Hippo, #Christianity
  Philosophers,who place the end of human good in virtue itself, in order to put to shame certain other philosophers, who indeed approve of the virtues, but measure them all with reference to the end of bodily pleasure, and think that this pleasure is to be sought for its own sake, but the virtues on account of pleasure,are wont to paint a kind of word-picture, in which Pleasure sits like a luxurious queen on a royal seat, and all the virtues are subjected to her as slaves, watching her nod, that they may do whatever she shall command. She commands Prudence to be ever on the watch to discover how Pleasure may rule, and be safe. Justice she orders to grant what benefits she can, in order to secure those friendships which are necessary for bodily pleasure; to do wrong to no one, lest, on account of the breaking of the laws, Pleasure be not able to live in security. Fortitude she orders to keep her mistress, that is, Pleasure, bravely in her mind, if any affliction befall her body which does not occasion death, in order that by remembrance of former delights she may mitigate the poignancy of present pain. Temperance she commands to take only a certain quantity even of the most favourite food, lest, through immoderate use, anything prove hurtful by disturbing the health of the body, and thus Pleasure, which the Epicureans make to consist chiefly in the health of the body, be grievously offended. Thus the virtues, with the whole dignity of their glory, will be the slaves of Pleasure, as of some imperious and disreputable woman.
  There is nothing, say our philosophers, more disgraceful[Pg 218] and monstrous than this picture, and which the eyes of good men can less endure. And they say the truth. But I do not think that the picture would be sufficiently becoming, even if it were made so that the virtues should be represented as the slaves of human glory; for, though that glory be not a luxurious woman, it is nevertheless puffed up, and has much vanity in it. Wherefore it is unworthy of the solidity and firmness of the virtues to represent them as serving this glory, so that Prudence shall provide nothing, Justice distribute nothing, Temperance moderate nothing, except to the end that men may be pleased and vainglory served. Nor will they be able to defend themselves from the charge of such baseness, whilst they, by way of being despisers of glory, disregard the judgment of other men, seem to themselves wise, and please themselves. For their virtue,if, indeed, it is virtue at all,is only in another way subjected to human praise; for he who seeks to please himself seeks still to please man. But he who, with true piety towards God, whom he loves, believes, and hopes in, fixes his attention more on those things in which he displeases himself, than on those things, if there are any such, which please himself, or rather, not himself, but the truth, does not attri bute that by which he can now please the truth to anything but to the mercy of Him whom he has feared to displease, giving thanks for what in him is healed, and pouring out prayers for the healing of that which is yet unhealed.

BOOK XIII. - That death is penal, and had its origin in Adam's sin, #City of God, #Saint Augustine of Hippo, #Christianity
  Thus the souls of departed saints are not affected by the death which dismisses them from their bodies, because their flesh rests in hope, no matter what indignities it receives after sensation is gone. For they do not desire that their bodies be forgotten, as Plato thinks fit, but rather, because they remember what has been promised by Him who deceives no man, and who gave them security for the safe keeping even of the hairs of their head, they with a longing patience wait in hope of the resurrection of their bodies, in which they have suffered many hardships, and are now to suffer never again. For if they did not "hate their own flesh," when it, with its native infirmity, opposed their will, and had to be constrained by the spiritual law, how much more shall they love it, when it shall even itself have become spiritual! For as, when the spirit serves the flesh, it is fitly called carnal, so, when the flesh serves the spirit, it will justly be called spiritual. Not that it is converted into spirit, as some fancy from the words, "It is sown in corruption, it is raised in incorruption,"[600] but because it is subject to the spirit with a perfect and marvellous readiness of obedience, and responds in all things to the will that has entered on immortality,all reluctance, all corruption, and all slowness being removed. For the body will not only be better than it was here in its best estate of health, but it will surpass the[Pg 545] bodies of our first parents ere they sinned. For, though they were not to die unless they should sin, yet they used food as men do now, their bodies not being as yet spiritual, but animal only. And though they decayed not with years, nor drew nearer to death,a condition secured to them in God's marvellous grace by the tree of life, which grew along with the forbidden tree in the midst of Paradise,yet they took other nourishment, though not of that one tree, which was interdicted not because it was itself bad, but for the sake of commending a pure and simple obedience, which is the great virtue of the rational creature set under the Creator as his Lord. For, though no evil thing was touched, yet if a thing forbidden was touched, the very disobedience was sin. They were, then, nourished by other fruit, which they took that their animal bodies might not suffer the discomfort of hunger or thirst; but they tasted the tree of life, that death might not steal upon them from any quarter, and that they might not, spent with age, decay. Other fruits were, so to speak, their nourishment, but this their sacrament. So that the tree of life would seem to have been in the terrestrial Paradise what the wisdom of God is in the spiritual, of which it is written, "She is a tree of life to them that lay hold upon her."[601]
    21. Of Paradise, that it can be understood in a spiritual sense without sacrificing the historic truth of the narrative regarding the real place.

BOOK XIV. - Of the punishment and results of mans first sin, and of the propagation of man without lust, #City of God, #Saint Augustine of Hippo, #Christianity
  For that fear of which the Apostle John says, "There is no fear in love; but perfect love casteth out fear, because fear hath torment. He that feareth is not made perfect in love,"[80]that fear is not of the same kind as the Apostle Paul felt lest the Corinthians should be seduced by the subtlety of the serpent; for love is susceptible of this fear, yea, love alone is capable of it. But the fear which is not in love is of that kind of which Paul himself says, "For ye have not received the spirit of bondage again to fear."[81] But as for that "clean fear which endureth for ever,"[82] if it is to exist in the world to come (and how else can it be said to endure for ever?), it is not a fear deterring us from evil which may happen, but preserving us in the good which cannot be lost. For where the love of acquired good is unchangeable, there certainly the fear that avoids evil is, if I may say so, free from anxiety. For under the name of "clean fear" David signifies that will by which we shall necessarily shrink from sin, and guard against it, not with the anxiety of weakness, which fears that we may strongly sin, but with the tranquillity of perfect love. Or if no kind of fear at all shall exist in that most imperturbable security of perpetual and blissful delights, then the expression, "The fear[Pg 20] of the Lord is clean, enduring for ever," must be taken in the same sense as that other, "The patience of the poor shall not perish for ever."[83] For patience, which is necessary only where ills are to be borne, shall not be eternal, but that which patience leads us to will be eternal. So perhaps this "clean fear" is said to endure for ever, because that to which fear leads shall endure.
  And since this is so,since we must live a good life in order to attain to a blessed life,a good life has all these affections right, a bad life has them wrong. But in the blessed life eternal there will be love and joy, not only right, but also assured; but fear and grief there will be none. Whence it already appears in some sort what manner of persons the citizens of the city of God must be in this their pilgrimage, who live after the spirit, not after the flesh,that is to say, according to God, not according to man, and what manner of persons they shall be also in that immortality whither they are journeying. And the city or society of the wicked, who live not according to God, but according to man, and who accept the doctrines of men or devils in the worship of a false and contempt of the true divinity, is shaken with those wicked emotions as by diseases and disturbances. And if there be some of its citizens who seem to restrain and, as it were, temper those passions, they are so elated with ungodly pride, that their disease is as much greater as their pain is less. And if some, with a vanity monstrous in proportion to its rarity, have become enamoured of themselves because they can be stimulated and excited by no emotion, moved or bent by no affection, such persons rather lose all humanity than obtain true tranquillity. For a thing is not necessarily right because it is inflexible, nor healthy because it is insensible.

BOOK XIX. - A review of the philosophical opinions regarding the Supreme Good, and a comparison of these opinions with the Christian belief regarding happiness, #City of God, #Saint Augustine of Hippo, #Christianity
  But not even the saints and faithful worshippers of the one true and most high God are safe from the manifold temptations and deceits of the demons. For in this abode of weakness, and in these wicked days, this state of anxiety has also its use, stimulating us to seek with keener longing for that security where peace is complete and unassailable. There we shall enjoy the gifts of nature, that is to say, all that God the Creator of all natures has bestowed upon ours,gifts not only good, but eternal,not only of the spirit, healed now by wisdom, but also of the body renewed by the resurrection. There the virtues shall no longer be struggling against any vice or evil, but shall enjoy the reward of victory, the eternal peace which no adversary shall disturb. This is the final blessedness, this the ultimate consummation, the unending end. Here, indeed, we are said to be blessed when we have such peace as can be enjoyed in a good life; but such blessedness is mere misery compared to that final felicity. When we mortals possess such peace as this mortal life can afford, virtue, if we are living rightly, makes a right use of the advantages of this peaceful condition; and when we have it not, virtue makes a good use even of the evils a man suffers. But this is true virtue, when it refers all the advantages it makes a good use of, and all that it does in making good use of good and evil things, and itself also, to that end in which we shall enjoy the best and greatest peace possible.
  11. Of the happiness of the eternal peace, which constitutes the end or true perfection of the saints.

BOOK XVII. - The history of the city of God from the times of the prophets to Christ, #City of God, #Saint Augustine of Hippo, #Christianity
  Whoever hopes for this so great good in this world, and in this earth, his wisdom is but folly. Can any one think it was fulfilled in the peace of Solomon's reign? Scripture certainly commends that peace with excellent praise as a shadow of that which is to come. But this opinion is to be vigilantly opposed, since after it is said, "And the son of iniquity shall not humble him any more," it is immediately added, "as from the beginning, from the days in which I appointed judges over my people Israel."[441] For the judges were appointed over that people from the time when they received the land of[Pg 199] promise, before kings had begun to be there. And certainly the son of iniquity, that is, the foreign enemy, humbled him through periods of time in which we read that peace alternated with wars; and in that period longer times of peace are found than Solomon had, who reigned forty years. For under that judge who is called Ehud there were eighty years of peace.[442] Be it far from us, therefore, that we should believe the times of Solomon are predicted in this promise, much less indeed those of any other king whatever. For none other of them reigned in such great peace as he; nor did that nation ever at all hold that kingdom so as to have no anxiety lest it should be subdued by enemies: for in the very great mutability of human affairs such great security is never given to any people, that it should not dread invasions hostile to this life. Therefore the place of this promised peaceful and secure habitation is eternal, and of right belongs eternally to Jerusalem the free mother, where the genuine people of Israel shall be: for this name is interpreted "Seeing God;" in the desire of which reward a pious life is to be led through faith in this miserable pilgrimage.[443]
  14. Of David's concern in the writing of the Psalms.

BOOK XXII. - Of the eternal happiness of the saints, the resurrection of the body, and the miracles of the early Church, #City of God, #Saint Augustine of Hippo, #Christianity
  Let us here recite the passage in which Tully expresses his astonishment that the apotheosis of Romulus should have been credited. I shall insert his words as they stand: "It is most worthy of remark in Romulus, that other men who are said to have become gods lived in less educated ages, when there was a greater propensity to the fabulous, and when the uninstructed were easily persuaded to believe anything. But the age of Romulus was barely six hundred years ago, and already literature and science had dispelled the errors that attach to an uncultured age." And a little after he says of the same Romulus words to this effect: "From this we may perceive that Homer had flourished long before Romulus, and that there was now so much learning in individuals, and so generally diffused an enlightenment, that scarcely any room was left for fable. For antiquity admitted fables, and sometimes even very clumsy ones; but this age [of Romulus] was sufficiently enlightened to reject whatever had not the air of truth." Thus one of the most learned men, and certainly the most eloquent, M. Tullius Cicero, says that it is surprising that the divinity of Romulus was believed in, because the times were already so enlightened that they would not accept a fabulous fiction. But who believed that Romulus was a god except Rome, which was itself small and in its infancy? Then afterwards it was necessary that succeeding generations should preserve the tradition of their ancestors; that, drinking in this superstition with their mother's milk, the state might grow and come to such power that it might dictate this belief, as from a point of vantage, to all the nations over whom its sway extended. And these nations, though they might not believe that Romulus was a god, at least said so, that they might not give offence to their sovereign state by refusing to give its founder that title which was given him by Rome, which had adopted this belief, not by a love of error, but an error of love. But though Christ is the founder of the heavenly and eternal city, yet it did not believe Him to be God because it was founded by Him, but rather it[Pg 481] is founded by Him, in virtue of its belief. Rome, after it had been built and dedicated, worshipped its founder in a temple as a god; but this Jerusalem laid Christ, its God, as its foundation, that the building and dedication might proceed. The former city loved its founder, and therefore believed him to be a god; the latter believed Christ to be God, and therefore loved Him. There was an antecedent cause for the love of the former city, and for its believing that even a false dignity attached to the object of its love; so there was an antecedent cause for the belief of the latter, and for its loving the true dignity which a proper faith, not a rash surmise, ascribed to its object. For, not to mention the multitude of very striking miracles which proved that Christ is God, there were also divine prophecies heralding Him, prophecies most worthy of belief, which being already accomplished, we have not, like the fathers, to wait for their verification. Of Romulus, on the other hand, and of his building Rome and reigning in it, we read or hear the narrative of what did take place, not prediction which beforeh and said that such things should be. And so far as his reception among the gods is concerned, history only records that this was believed, and does not state it as a fact; for no miraculous signs testified to the truth of this. For as to that wolf which is said to have nursed the twin-brothers, and which is considered a great marvel, how does this prove him to have been divine? For even supposing that this nurse was a real wolf and not a mere courtezan, yet she nursed both brothers, and Remus is not reckoned a god. Besides, what was there to hinder any one from asserting that Romulus or Hercules, or any such man, was a god? Or who would rather choose to die than profess belief in his divinity? And did a single nation worship Romulus among its gods, unless it were forced through fear of the Roman name? But who can number the multitudes who have chosen death in the most cruel shapes rather than deny the divinity of Christ? And thus the dread of some slight indignation, which it was supposed, perhaps groundlessly, might exist in the minds of the Romans, constrained some states who were subject to Rome to worship Romulus as a god; whereas the dread, not of a slight mental shock, but of severe and various punishments,[Pg 482] and of death itself, the most formidable of all, could not prevent an immense multitude of martyrs throughout the world from not merely worshipping but also confessing Christ as God. The city of Christ, which, although as yet a stranger upon earth, had countless hosts of citizens, did not make war upon its godless persecutors for the sake of temporal security, but preferred to win eternal salvation by abstaining from war. They were bound, imprisoned, beaten, tortured, burned, torn in pieces, massacred, and yet they multiplied. It was not given to them to fight for their eternal salvation except by despising their temporal salvation for their Saviour's sake.
  I am aware that Cicero, in the third book of his De Republica, if I mistake not, argues that a first-rate power will not engage in war except either for honour or for safety. What he has to say about the question of safety, and what he means by safety, he explains in another place, saying, "Private persons frequently evade, by a speedy death, destitution, exile, bonds, the scourge, and the other pains which even the most insensible feel. But to states, death, which seems to emancipate individuals from all punishments, is itself a punishment; for a state should be so constituted as to be eternal. And thus death is not natural to a republic as to a man, to whom death is not only necessary, but often even desirable. But when a state is destroyed, obliterated, annihilated, it is as if (to compare great things with small) this whole world perished and collapsed." Cicero said this because he, with the Platonists, believed that the world would not perish. It is therefore agreed that, according to Cicero, a state should engage in war for the safety which preserves the state permanently in existence, though its citizens change; as the foliage of an olive or laurel, or any tree of this kind, is perennial, the old leaves being replaced by fresh ones. For death, as he says, is no punishment to individuals, but rather delivers them from all other punishments, but it is a punishment to the state. And therefore it is reasonably asked whether the Saguntines did right when they chose that their whole state should perish rather than that they should break faith with the Roman republic; for this deed of theirs is applauded by the citizens of the earthly republic. But I do not see how they could[Pg 483] follow the advice of Cicero, who tells us that no war is to be undertaken save for safety or for honour; neither does he say which of these two is to be preferred, if a case should occur in which the one could not be preserved without the loss of the other. For manifestly, if the Saguntines chose safety, they must break faith; if they kept faith, they must reject safety; as also it fell out. But the safety of the city of God is such that it can be retained, or rather acquired, by faith and with faith; but if faith be abandoned, no one can attain it. It is this thought of a most stedfast and patient spirit that has made so many noble martyrs, while Romulus has not had, and could not have, so much as one to die for his divinity.

BS 1 - Introduction to the Idea of God, #unset, #Arthur C Clarke, #Fiction
  Its really not a good thing, because it manifests itself not only in individual psychopathologies, but also in social psychopathologies. Thats this proclivity of people to get tangled up in ideologies, and I really do think of them as crippled religions. Thats the right way to think about them. Theyre like religion thats missing an arm and a leg, but can still hobble along. It provides a certain amount of security and group identity, but its warped and twisted and demented and bent, and its a parasite on something underlying thats rich and true. Thats how it looks to me, anyways. I think its very important that we sort out this problem. I think that there isnt anything more important that needs to be done than that. Ive thought that for a long, long timeprobably since the early 80s, when I started looking at the role that belief systems played in regulating psychological and social health. You can tell that they do that because of how upset people get if you challenge their belief systems. Why the hell do they care, exactly? What difference does it make if all of your ideological axioms are 100 percent correct?
  People get unbelievable upset when you poke them in the axioms, so to speak, and it is not by any stretch of the imagination obvious why. Theres a fundamental truth that theyre standing on. Its like theyre on a raft in the middle of the ocean. Youre starting to pull out the logs, and theyre afraid theyre going to fall in and drown. Drown in what? What are the logs protecting them from? Why are they so afraid to move beyond the confines of the ideological system? These are not obvious things. Ive been trying to puzzle that out for a very long time. Ive done some lectures about that that are on YouTube. Most of you know that. Some of what Im going to talk about in this series youll have heard, if youve listened to the YouTube videos, but Im trying to hit it from different angles.
  --
  Ive already given you some hints about it. Weve extracted it in part from observations of our own behaviour and other peoples behaviour, and weve extracted it in part by the nature of our embodiment, thats been shaped over hundreds of millions of years. We see the infinite plane of facts, and we impose a moral interpretation on it. The moral interpretation is what to do about what is. Thats associated both with securitybecause you just dont need too much complexity and also with aim. Were mobile creatures, and we need to know where were going. All were ever concerned about, roughly speaking, is where were going. Thats what we need to know: where we are we going, what we are doing, and why. Thats not the same question as, what is the world made of, objectively? Its a different question. It requires different answers. Thats the domain of the moral, as far as Im concerned, which is, what are you aiming at? Thats the question of the ultimate ideal, in some sense. Even if you have trivial little fragmentary ideals, theres something trying to emerge out of that thats more coherent and more integrated and more applicable and more practical. And thats the other thing: you think about literature, and you think about art, and you think those arent very tightly tied to the earth. Theyre empyrean, airy, spiritual, and they dont seem practical. But Im a practical person.
  Part of the reason that I want to assess these books from a literary, aesthetic, and evolutionary perspective is to extract out something of value thats practical. One of the rules that I have when Im lecturing is that I dont want to tell anybody anything that they cant use. I think of knowledge as a tool. Its something to implement in the world. Were tool-using creatures, and our knowledge is tools. We need tools to work in the world. We need tools to regulate our emotions, to make things better, to put an end to suffering to the degree that we can, to live with ourselves properly, and to stand up properly. You need the tools to do that. So I dont want to do anything in this lecture series that isnt practical. I want you to come away having things put together in a way that you can immediately apply. Im not interested in abstraction for the sake of abstraction. Its gotta make sense, because the more restrictions on your theory, the better. I want it all laid out causally, so that B follows A and B precedes C. That way its understandable and doesn't require any unnecessary leap of faith.

ENNEAD 02.03 - Whether Astrology is of any Value., #Plotinus - Complete Works Vol 04, #Plotinus, #Christianity
  18. Must the evils in the universe be considered as necessary,266 because they are the consequences of the superior principles? Yes, for without them the universe would be imperfect. The greater number of evils, if not all of them, are useful to the universe; such as the venomous animals; though they often ignore their real utility. Even wickedness is useful in certain respects, and can produce many beautiful things; for example, it leads to fine inventions, it forces men to prudence, and does not let them fall asleep in an indolent security.267
  PICTURE OF THE STRUCTURE OF THE UNIVERSE.

ENNEAD 03.02 - Of Providence., #Plotinus - Complete Works Vol 04, #Plotinus, #Christianity
  No one in his senses would complain of the existence of animals inferior to man, if, besides, they contri bute towards the embellishment of the universe. Would it not be ridiculous to complain that some of them bite men, as if the latter had an imprescriptible right to complete security? The existence of these animals is necessary; it procures us advantages both evident and still unknown, but which will be revealed in the course of time. Thus there is nothing useless in animals, either in respect to themselves, or to man.54 It is, besides, ridiculous to complain because many animals are wild, when there are even men who are such; what should surprise us most is that many animals are not submissive to man, and defend themselves against him.55
  IF UNJUST ACTS ARE PRODUCED ASTROLOGICALLY THEN DIVINE REASON IS TO BLAME.

ENNEAD 04.08 - Of the Descent of the Soul Into the Body., #Plotinus - Complete Works Vol 01, #Plotinus, #Christianity
  7. As there are two kinds of being (or, existence), one of sensation, and the other intelligible, it is preferable for the soul to live in the intelligible world; nevertheless, as a result of her nature, it is necessary for her also to participate in sense-affairs.180 Since she occupies only an intermediate rank, she must not feel wronged at not being the best of beings.181 Though on one hand her condition be divine, on the other she is located on the limits of the intelligible world, because of her affinity for sense-nature. She causes this nature to participate in her powers, and she even receives something therefrom, when, instead of managing131 the body without compromising her own security, she permits herself to be carried away by her own inclination to penetrate profoundly within it, ceasing her complete union with the universal Soul. Besides, the soul can rise above the body after having learned to feel how happy one is to dwell on high, by the experience of things seen and suffered here below, and after having appreciated the true Good by the comparison of contraries. Indeed the knowledge of the good becomes clearer by the experience of evil, especially among souls which are not strong enough to know evil before having experienced it.182
  THE PROCESSION OF INTELLIGENCE IS AN EXCURSION DOWNWARDS AND UPWARDS.

Gorgias, #unset, #Arthur C Clarke, #Fiction
  The false politician is the serving-man of the state. In order to govern men he becomes like them; their 'minds are married in conjunction;' they 'bear themselves' like vulgar and tyrannical masters, and he is their obedient servant. The true politician, if he would rule men, must make them like himself; he must 'educate his party' until they cease to be a party; he must brea the into them the spirit which will hereafter give form to their institutions. Politics with him are not a mechanism for seeming what he is not, or for carrying out the will of the majority. Himself a representative man, he is the representative not of the lower but of the higher elements of the nation. There is a better (as well as a worse) public opinion of which he seeks to lay hold; as there is also a deeper current of human affairs in which he is borne up when the waves nearer the shore are threatening him. He acknowledges that he cannot take the world by forcetwo or three moves on the political chess board are all that he can fore seetwo or three weeks moves on the political chessboard are all that he can foreseetwo or three weeks or months are granted to him in which he can provide against a coming struggle. But he knows also that there are permanent principles of politics which are always tending to the well-being of statesbetter administration, better education, the reconciliation of conflicting elements, increased security against external enemies. These are not 'of to-day or yesterday,' but are the same in all times, and under all forms of government. Then when the storm descends and the winds blow, though he knows not beforeh and the hour of danger, the pilot, not like Plato's captain in the Republic, half-blind and deaf, but with penetrating eye and quick ear, is ready to take comm and of the ship and guide her into port.
  The false politician asks not what is true, but what is the opinion of the worldnot what is right, but what is expedient. The only measures of which he approves are the measures which will pass. He has no intention of fighting an uphill battle; he keeps the roadway of politics. He is unwilling to incur the persecution and enmity which political convictions would entail upon him. He begins with popularity, and in fair weather sails gallantly along. But unpopularity soon follows him. For men expect their leaders to be better and wiser than themselves: to be their guides in danger, their saviours in extremity; they do not really desire them to obey all the ignorant impulses of the popular mind; and if they fail them in a crisis they are disappointed. Then, as Socrates says, the cry of ingratitude is heard, which is most unreasonable; for the people, who have been taught no better, have done what might be expected of them, and their statesmen have received justice at their hands.

Liber 111 - The Book of Wisdom - LIBER ALEPH VEL CXI, #unset, #Arthur C Clarke, #Fiction
   came, stepping stealthily, a certain security against the grossest
   Perils, so that a few Men could be spared from Toil to cultivate

Prayers and Meditations by Baha u llah text, #Prayers and Meditations by Baha u llah, #unset, #Zen
  All laud and honor to Thee, O my God! Thou well knowest the things which, for a score of years, have happened in Thy days, and have continued to happen until this hour. No man can reckon, nor can any tongue tell, what hath befallen Thy chosen ones during all this time. They could obtain no shelter, nor find any refuge in which they could abide in safety. Turn, then, O my God, their fear into the evidences of Thy peace and Thy security, and their abasement into the sovereignty of Thy glory, and their poverty into Thine all-sufficient riches, and their distress into the wonders of Thy perfect tranquillity. Vouchsafe unto them the fragrances of Thy might and Thy mercy, and send down upon them, out of Thy marvelous loving-kindness, what will enable them to dispense with all except Thee, and will detach them from aught save Thyself, that the sovereignty of Thy oneness may be revealed and the supremacy of Thy grace and Thy bounty demonstrated.
  Wilt Thou not, O my God, look upon the tears which Thy loved ones have shed? Wilt Thou not pity, O my Beloved, the eyes which have been dimmed by reason of their separation from Thee, and because of the cessation of the signs of Thy victory? Wilt Thou not behold, O my Master, the hearts wherein have beaten the wings of the dove of longing and love for Thee? By Thy glory! Things have come to such a pass that hope hath well nigh been banished from the hearts of Thy chosen ones, and the breaths of despair are ready to seize them, by reason of what hath befallen them in Thy days.

r1912 07 01, #Record of Yoga, #Sri Aurobindo, #Integral Yoga
   August, 1912, will complete the seventh year of my practice of Yoga. It has taken so long to complete a long record of wanderings, stumbles, gropings, experiments,for Nature beginning in the dark to grope her way to the lightnow an assured, but not yet a full lustre,for the Master of the Yoga to quiet the restless individual will and the presumptuous individual intelligence so that the Truth might liberate itself from human possibilities & searchings and the Power emerge out of human weaknesses and limitations. The night of the thirtieth marked by a communication from the sahasradala, of the old type, sruti, but clear of the old confusions which used to rise around the higher Commands. It was clearly the Purushottama speaking and the Shakti receiving the command. Already the lipi had given warning of a new life beginning on the 1 July,a new life, that is to say, a new type of action, starting with a temporarily complete realisation of novel Personality and the final inevitable seal on the dasyabhava. Not that anything was done abruptly. In this yoga at least nothing has been abrupt except the beginnings,the consummations are always led up to by long preparation & development, continual ebb & flow, ceaseless struggling, falling & risinga progress from imperfection through imperfections to imperfect and insecure perfections & only at last an absolute finality and security.
   Even now the dasyam though complete in action, is not free of an intellectual questioning. But this last leaven of asraddha, of nastikya-buddhi, is confined to the truth or untruth of the Adesha given in the jail, the apprehension of certain forms of akalyana; it is not capable any longer of positiveness & even at its highest is unable to generalise itself. For the rest the triple dasyam of the body is active beyond doubt, the last shadowy effigies of the double dasyam is fading awayin the mind and feelings there is not the same clearness; for the shadow of the double dasyam still persists by the strength of the asraddha, but the express thought, the vak of the divine communication, the experiences & feelings (all except the depression due to doubt) are ordinarily independent of the anumati. Only the perceptions present still a field to the unhappy independence of the soul, its triste liberty to doubt & revolt against God, and from this field the others are sometimes temporarily affected.

r1912 11 17, #Record of Yoga, #Sri Aurobindo, #Integral Yoga
   None of these four directions have been fulfilled. There is an attempt to adhere to them, but it is combated always by the experience of asiddhi. The establishment of intellectual infallibility which seemed assured at one time by the fulfilment of the intellectual perceptions & the right placing, accompanied with definite proofs, of that which was misplaced has been followed by a strong disillusionment which challenges the whole foundation of the theory as a self-delusion. While the existence of a perfectly accurate trikaldrishti, perceiving truth past, present & future even to exact time, place & circumstance has been put beyond all dispute, the fact that what seems to be precisely the same movement brings error & failure, clouds the whole issue & is being dwelt on in order to break down sraddha. For where is the use of trikaldrishti & aishwarya when one can never be certain whether a perception is trikaldrishti or false intuition, the perception of an actuality or a possibility, the perception of that which will be or the perception of something that someone else thinks of doing or looks at as a possibility, or whether an expense of will will bring a favourable or perverse result? The doubt comes to be one of Gods guidance & the reality of the Adesha. The science of Yoga is justified, but the idea of the personal mission seems to be convicted of essential falsity. Meanwhile the particular siddhis established maintain themselves ordinarily, but do not progress. Only the sahitya proceeds smoothly & seems to develop in security.
   ***

r1913 06 16b, #Record of Yoga, #Sri Aurobindo, #Integral Yoga
   The prediction about satiety has already been fulfilled in the particular instance at issue, but there must now be effected a general security in the siddhi. The satiety of struggle & failure which has long possessed the psychic prana must be expelled absolutely. Until it is expelled, struggle & failure will continue.
   Aishwarya perfect in circumstance is now acting, although limited & besieged by the imperfection.

r1913 06 16, #Record of Yoga, #Sri Aurobindo, #Integral Yoga
   The prediction about satiety has already been fulfilled in the particular instance at issue, but there must now be effected a general security in the siddhi. The satiety of struggle & failure which has long possessed the psychic prana must be expelled absolutely. Until it is expelled, struggle & failure will continue.
   Aishwarya perfect in circumstance is now acting, although limited & besieged by the imperfection.

r1913 07 09, #Record of Yoga, #Sri Aurobindo, #Integral Yoga
   The programme for the next three days is yesterdays with additions. The utthapana and saundarya especially must move forward. Trikaldrishti has already reasserted itself, but is imperfect in circumstance; this imperfection will now disappear. Aishwarya is inconstant in its action & often effective only against resistance; the action must be regular & the effectiveness spontaneous. Lipi must get a complete hold on the akash and the difficulty of the stability in rupa, especially in lifelike rupa must at last disappear. Ananda delivered from interruption and arogya triumphant over attack must reach a more solid state of security (vjastih); utthapana recover itself and saundarya, now constantly obstructed and thrown back, share in the general victorious movement.
   The 9 has been a day of failure & recoil. The attempt to establish the avegamaya tejas & sraddha without reaction has broken down; the avega became manomaya and resulted in confusion of knowledge, misplacement of tejas & final return of asamata, ashanti, duhkha in strong & then violent touches (10th) which, at first violently expelled, again & successfully invaded the system, supported by the revolt of the Jiva against the asatya. The saundarya has broken down or gone back in the parts not irrevocably fixed & the violent return of asaundarya is successful everywhere. Aishwarya is not entirely ineffective, but subject to frequent failure & almost universal resistance. The touches of roga returned where they were on the point of evanescence and there has been some diminution in the force of continuity of the kamananda. The promises of finality held out to the mind in the first & second chatusthayas, as well as in some details of the third & fourth, have proved, as always, to be tejasic and deceptive. On the other side, there has been enforced a more general perception of the unity of all movements of the Prakriti and of the unity of the mover of the Prakriti & their unity also with the same Purusha & Prakriti in this adhara. The Jiva also is made to recognise its unity with the Prakriti, but not yet with the Purusha, except in occasional glimpses.

r1913 09 25, #Record of Yoga, #Sri Aurobindo, #Integral Yoga
   The apparent movement of reaction has ended, even more than usual, in a strong advance. The basis of samata has been streng thened and widely confirmed in the fixed perception of all things as true & all events as destined and helpful; if asamata now comes, it must be a purely mechanical movement of memory in the physical parts, unless knowledge is forcibly taken away. This in future will not be allowed. With samata dasya, tejas, sraddha have attained a more perfect security. All that is now needed is the expulsion of the physical memory of adasya & nistejas and the perfection of effective tapas in the knowledge & the power to establish the sraddha of the Ishwari in the Prakriti; the mere human sraddha is now well founded except in the adeshasiddhi. The faith in rapidity is really part of the faith in the adeshsiddhi, its condition and foundation. The relics of the egoistic outlook & inlook in the physical mind have also to be expelled.
   The basis of effectiveness in knowledge has been laid, the centre of true sight, ritam in satyam, has been revealed in action perfectly removing anrita suggestions, suggesting and approving the ritam. The basis of effectiveness in action has not been revealed. This will now have to be done.

r1913 11 14, #Record of Yoga, #Sri Aurobindo, #Integral Yoga
   There is a movement which has often been presaged, but never succeeded in locating itself; the movement of the higher rudra intensity of knowledge, action, ananda. Now that the Mahakali tapas is finally seated in the adhara, this loftier movement of the life & Yoga may with security establish its initial activities. Rapidity of the rest of the siddhi is an essential factor in the rudra movement. During the rest of the month the siddhi of this rudra tapatya must be the principal aim of the Shakti.
   ***

r1913 12 01b, #Record of Yoga, #Sri Aurobindo, #Integral Yoga
   Much was expected of yesterdays movement, but it has been followed up by a struggle, not a victory. The intensifying of the Brahmabuddhi is the one positive gain, & to this may be added the firm extension of the brihat in the jnana with the mixed satya & anrita of trikaldrishti & telepathy. The difficulty is in the insufficient streng thening of the decisive viveka & the insufficient finality of the transfer of the intellectual movements to the vijnanabuddhi. The lipi announcing the finality of the transfer referred only to the completion of the process, not to the security of the results attained. The attack has destroyed the conditions of the vijnana manifestation and they have to be reconstituted in the active consciousness. There is as yet no finality of settled truth or settled effectiveness.
   This is one side of the truth; the other is that the transfer has been finally secured, since it is only in appearance that the ideality has been disintegrated in the active consciousness. The disintegration is real to the intellectual judgment, not to the viveka.

r1913 12 31, #Record of Yoga, #Sri Aurobindo, #Integral Yoga
   In the afternoon there was a strong effort to reidealise the whole consciousness as well as the activity which succeeded with the thought but only partially with the trikaldrishti. In the evening there was, after a short struggle in which the trikaldrishti was almost unerring but the tapas only partially & defensively effective, an unprecedented sequent faultlessness of the effective will and, with one or two slight deflections, of the perceptive knowledge, but all this was in the manasa ketu and not in the daivya. So far it was a success for the manasa element which seeks to use the vijnana for its own development while refusing to the vijnana the possession & enjoyment of the system. The results however failed to give satisfaction to the Jiva or to the system which now demands vijnana and rejects the manasa perceptions whether true or false. This virati is the security that the attempt of the lower to use & dominate the higher cannot eventually succeed.
   In the night for the first time there was entire success of the stability of rupa in the swapna samadhi, one scene, a street & the exterior of a house & its environment, lasting in spite of attempts of the asiddhi for many seconds before first one or two details became inconstant and then a swift shifting series of similar scenes was substituted for the one stable scene. Like the vision of the city on the hill some days ago, this was an unique instance & a success only in type, but it is an assurance of success in the near future.

r1915 05 22, #Record of Yoga, #Sri Aurobindo, #Integral Yoga
   The vibrations of asamata of asiddhi continue & amount to a breaking in on the siddhi of the fourth chatusthaya. As usual, there was a false security that this lapse would not again happen. There is also a shadow of the asamata of asatya.
   ***

r1920 06 20, #Record of Yoga, #Sri Aurobindo, #Integral Yoga
   The representative mould of the bodily consciousness now predominates, but is not yet fixed in security. It is sometimes drawn back and the revelatory takes its place. There is not the sure pratistha
   Afternoonlast nights Ananda again in action.

Tablets of Baha u llah text, #Tablets of Baha u llah, #Baha u llah, #Baha i
  concerneth trustworthiness. Verily it is the door of security for all that dwell on earth and a token of glory on the part of the All-Merciful. He who partaketh thereof hath indeed partaken of the treasures of wealth and prosperity. Trustworthiness is the greatest portal leading unto the tranquility and security of the people. In truth the stability of every affair hath depended and doth depend upon it. All the domains of power, of grandeur and of wealth are illumined by its light. The Revelation of Bahá'u'lláh vol. 4 p. 18
  Not long ago these sublime words were revealed from the Pen of the Most High:
  --
  The people of Persia have turned away from Him Who is the Protector and the Helper. They are clinging to and have enmeshed themselves in the vain imaginings of the foolish. So firmly do they adhere to superstitions that naught can sever them therefrom save the potent arm of God--exalted is His glory. Beseech thou the Almighty that He may remove with the fingers of divine power the veils which have shut out the diverse peoples and kindreds, that they may attain the things that are conducive to security, progress and advancement and may hasten forth towards the incomparable Friend.
  
  --
  O people of Bahá! Each one of the ordinances We have revealed is a mighty stronghold for the preservation of the world of being. Verily, this Wronged One desireth naught but your security and elevation.
  We exhort the men of the House of Justice and command them to ensure the protection and safeguarding of men, women and children. It is incumbent upon them to have the utmost regard for the interests of the people at all times and under all conditions. Blessed is the ruler who succoureth the captive, and the rich one who careth for the poor, and the just one who secureth from the wrong doer the rights of the downtrodden, and happy the trustee who observeth that which the Ordainer, the Ancient of Days hath prescribed unto him.
  --
  O people of God! Give ear unto that which, if heeded, will ensure the freedom, well-being, tranquility, exaltation and advancement of all men. Certain laws and principles are necessary and indispensable for Persia. However, it is fitting that these measures should be adopted in conformity with the considered views of His Majesty--may God aid him through His grace--and of the learned divines and of the high-ranking rulers. Subject to their approval a place should be fixed where they would meet. There they should hold fast to the cord of consultation and adopt and enforce that which is conducive to the security, prosperity, wealth and tranquility of the people. For were any measure other than this to be adopted, it could not but result in chaos and commotion.
  93
  --
  In formulating the principles and laws a part hath been devoted to penalties which form an effective instrument for the security and protection of men. However, dread of the penalties maketh people desist only outwardly from committing vile and contemptible deeds, while that which guardeth and restraineth man both outwardly and inwardly hath been and still is the fear of God. It is man's true protector and his spiritual guardian. It behooveth him to cleave tenaciously unto that which will lead to the appearance of this supreme bounty. Well is it with him who giveth ear unto whatsoever My Pen of Glory hath proclaimed and observeth that whereunto he is bidden by the Ordainer, the Ancient of Days.
  Incline your hearts, O people of God, unto the counsels of your true, your incomparable Friend. The Word of God may be likened unto a sapling, whose roots have been implanted in the hearts of men. It is incumbent upon you to foster its growth through the living waters of wisdom, of sanctified and holy words, so that its root may become firmly fixed and its branches may spread out as high as the heavens and beyond.
  --
  Praise be unto God Who hath manifested the Point, hath unfolded therefrom the knowledge of all things, whether of the past or of the future--a Point He hath chosen to be the Herald of His Name and the Harbinger of His Great Revelation which hath caused the limbs of all mankind to quake and the splendor of His light to shine forth above the horizon of the world. Verily, this is the Point which God hath ordained to be an ocean of light for the sincere among His servants and a flame of fire to the froward amidst His creatures and the impious among His people--they who bartered away the gift of God for unbelief, and the celestial food for hypocrisy, and led their associates to a wretched abode. These are the people who have manifested sedition throughout the world and have violated His Covenant on the Day when the immortal Being mounted His throne and the Crier raised His Voice from the haven of security and peace in the holy Vale. The Dawn-Breakers p. 514 footnote #18
  103
  --
  We have enjoined upon all mankind to establish the Most Great Peace--the surest of all means for the protection of humanity. The sovereigns of the world should, with one accord, hold fast thereunto, for this is the supreme instrument that can ensure the security and welfare of all peoples and nations. They, verily, are the manifestations of the power of God and the daysprings of His authority. We beseech the Almighty that He may graciously assist them in that which is conducive to the well-being of their subjects. A full explanation regarding this matter hath been previously set forth by the Pen of Glory; well is it with them that act accordingly.
  The third Ishráq
  --
  In another passage He hath written: Take heed, O concourse of the rulers of the world! There is no force on earth that can equal in its conquering power the force of justice and wisdom. I, verily, affirm that there is not, and hath never been, a host more mighty than that of justice and wisdom. Blessed is the king who marcheth with the ensign of wisdom unfurled before him, and the battalions of justice massed in his rear. He verily is the ornament that adorneth the brow of peace and the countenance of security. There can be no doubt whatever that if the day-star of justice, which the clouds of tyranny have obscured, were to shed its light upon men, the face of the earth would be completely transformed.
  165
  The Great Being, wishing to reveal the prerequisites of the peace and tranquility of the world and the advancement of its peoples, hath written: The time must come when the imperative necessity for the holding of a vast, an all-embracing assemblage of men will be universally realized. The rulers and kings of the earth must needs attend it, and, participating in its deliberations, must consider such ways and means as will lay the foundations of the world's Great Peace amongst men. Such a peace demandeth that the Great Powers should resolve, for the sake of the tranquility of the peoples of the earth, to be fully reconciled among themselves. Should any king take up arms against another, all should unitedly arise and prevent him. If this be done, the nations of the world will no longer require any armaments, except for the purpose of preserving the security of their realms and of maintaining internal order within their territories. This will ensure the peace and composure of every people, government and nation. We fain would hope that the kings and rulers of the earth, the mirrors of the gracious and almighty name of God, may attain unto this station, and shield mankind from the onslaught of tyranny.
  Likewise He saith: Among the things which are conducive to unity and concord and will cause the whole earth to be regarded as one country is that the diverse languages be reduced to one language and in like manner the scripts used in the world be confined to a single script. It is incumbent upon all nations to appoint some men of understanding and erudition to convene a gathering and through joint consultation choose one language from among the varied existing languages, or create a new one, to be taught to the children in all the schools of the world.
  --
  In these days the tabernacle of justice hath fallen into the clutches of tyranny and oppression. Beseech ye the One true God--exalted be His glory--not to deprive mankind of the ocean of true understanding, for were men but to take heed they would readily appreciate that whatever hath streamed from and is set down by the Pen of Glory is even as the sun for the whole world and that therein lie the welfare, security and true interests of all men; otherwise the earth will be tormented by a fresh calamity every day and unprecedented commotions will break out. God grant that the people of the world may be graciously aided to preserve the light of His loving counsels within the globe of wisdom. We cherish the hope that everyone may be adorned with the vesture of true wisdom, the basis of the government of the world.
  The Great Being saith: The heaven of statesmanship is made luminous and resplendent by the brightness of the light of these blessed words which hath dawned from the dayspring of the Will of God: It behooveth every ruler to weigh his own being every day in the balance of equity and justice and then to judge between men and counsel them to do that which would direct their steps unto the path of wisdom and understanding. This is the cornerstone of statesmanship and the essence thereof. From these words every enlightened man of wisdom will readily perceive that which will foster such aims as the welfare, security and protection of mankind and the safety of human lives. Were men of insight to quaff their fill from the ocean of inner meanings which lie enshrined in these words and become acquainted therewith, they would bear witness to the sublimity and the excellence of this utterance. If this lowly one were to set forth that which he perceiveth, all would testify unto God's consummate wisdom. The secrets of statesmanship and that of which the people are in need lie enfolded within these words. This lowly servant earnestly entreateth the One true God--exalted be His glory--to illumine the eyes of the people of the world with the splendor of the light of wisdom that they, one and all, may recognize that which is indispensable in this day.
  167
  --
  O my friend! In all circumstances one should seize upon every means which will promote security and tranquility among the peoples of the world. The Great Being saith: In this glorious Day whatever will purge you from corruption and will lead you towards peace and composure, is indeed the Straight Path.
  Please God, the peoples of the world may be led, as the result of the high endeavors exerted by their rulers and the wise and learned amongst men, to recognize their best interests. How long will humanity persist in its waywardness? How long will injustice continue? How long is chaos and confusion to reign amongst men? How long will discord agitate the face of society?
  --
  Rejoice thou with great joy that We have remembered thee both now and in the past. Indeed the sweet savors of this remembrance shall endure and shall not change throughout the eternity of the Names of God, the Lord of mankind. We have graciously accepted thy devotions, thy praise, thy teaching work and the services thou hast rendered for the sake of this mighty Announcement. We have also hearkened unto that which thy tongue hath uttered at the meetings and gatherings. Verily thy Lord heareth and observeth all things. We have attired thee with the vesture of My good-pleasure in My heavenly Kingdom, and from the Divine Lote-Tree which is raised on the borders of the vale of security and peace, situate in the luminous Spot beyond the glorious City, We call aloud unto thee saying: In truth there is no God but Me, the All-Knowing, the All-Wise. We have brought thee into being to serve Me, to glorify My Word and to proclaim My Cause. Center thine energies upon that wherefor thou hast been created by virtue of the Will of the supreme Ordainer, the Ancient of Days.
  246

Talks With Sri Aurobindo 1, #unset, #Arthur C Clarke, #Fiction
  and security to France. He was not only one of the conquerors but also one
  of the greatest administrators and organisers the world has seen. If it had not
  --
  PURANI: J has sent a letter saying that he was arrested by the Government because of his anti-war pamphlet and that he was released on personal security.
  SRI AUROBINDO: What a genius, for getting into trouble!

The Act of Creation text, #The Act of Creation, #Arthur Koestler, #Psychology
  flight. As security and comfort increased in the species, the afFect-
  generating emergency mechanisms of the sympathico-adrenal system
  --
  the laughing animal, could emerge: first a relative security of existence,
  which called for new outlets for excess energies; second and more
  --
  intuition, with the security of instinct, without the help of a single
  mathematical formula. 24
  --
  . . . The moon has a security against falling in her very motion and
  the swing of her revolutions, just as objects put in slings are prevented
  --
  captivity; and in human history, of course, with the increase of security
  against the hazards of the natural and social environment. To quote

The Anapanasati Sutta A Practical Guide to Mindfullness of Breathing and Tranquil Wisdom Meditation, #unset, #Arthur C Clarke, #Fiction
  happiness, do not actually bring real peace and security.
  Instead, it leads to more pain and dissatisfaction. To these

The Book of Certitude - P1, #The Book of Certitude, #Baha u llah, #Baha i
  Among the Prophets was Noah. For nine hundred and fifty years He prayerfully exhorted His people and summoned them to the haven of security and peace. None, however, heeded His call. Each day they inflicted on His blessed person such pain and suffering that no one believed He could survive. How frequently they denied Him, how malevolently they hinted their suspicion against Him! Thus it hath been revealed: "And as often as a company of His people passed by Him, they derided Him. To them He said: 'Though ye scoff at us now, we will scoff at you hereafter even as ye scoff at us. In the end ye shall know.'" 1 Long afterward, He several times promised victory to His companions and fixed the hour thereof. But when the hour struck, the divine promise was not fulfilled. This caused a few among the small number of His followers to turn away from Him, and to this testify the records of the best-known books. These you must certainly have perused; if not, undoubtedly you will. Finally, as stated in books and traditions, there remained with Him only forty or seventy-two of His followers. At last from the depth of His being He cried aloud: "Lord! Leave not upon the land a single dweller from among the unbelievers." 2 1. Qur'án 11:38.
  2. Qur'án 71:26.

The Dwellings of the Philosophers, #unset, #Arthur C Clarke, #Fiction
  wars, upheavals are disastrous to them. They demand security born of order and concord in
  order to grow, to bloom, and to bear fruit. Such strong reasons urge us to accept, with great

the Eternal Wisdom, #unset, #Arthur C Clarke, #Fiction
  7)Our conscience is an inner light which guides us with an infallible security, shows us everywhere the Good and invites us to cooperate in it; but the intelligence snatches it away from us under a veil whose stuff is of the imagination. ~ Antoine the Healer
  8)The sovereign good has its abode in the soul; when that is upright, attentive to its duties, shut in upon itself, it has nothing to desire, it enjoys a perfect happiness. ~ Seneca
  --
  23) The lines are fallen to me in pleasant places; yea, I have a goodly heritage. Therefore my heart is glad and my spirit rejoiceth; my flesh also shall rest in security. ~ Psalms XVI. 6. 9
  A Rationalistic Critic on Indian Culture - X View Similar New Birth or Decadence?

The Pilgrims Progress, #unset, #Arthur C Clarke, #Fiction
  {33} Then I stepped to him that plucked him out, and said, Sir, wherefore, since over this place is the way from the City of Destruction to yonder gate, is it that this plat is not mended, that poor travellers might go thither with more security? And he said unto me, This miry slough is such a place as cannot be mended; it is the descent whither the scum and filth that attends conviction for sin doth continually run, and therefore it is called the Slough of Despond; for still, as the sinner is awakened about his lost condition, there ariseth in his soul many fears, and doubts, and discouraging apprehensions, which all of them get together, and settle in this place. And this is the reason of the badness of this ground.
  {34} It is not the pleasure of the King that this place should remain so bad. [Isa. 35:3,4] His labourers also have, by the direction of His Majesty's surveyors, been for above these sixteen hundred years employed about this patch of ground, if perhaps it might have been mended: yea, and to my knowledge, said he, here have been swallowed up at least twenty thousand cart-loads, yea, millions of wholesome instructions, that have at all seasons been brought from all places of the King's dominions, and they that can tell, say they are the best materials to make good ground of the place; if so be, it might have been mended, but it is the Slough of Despond still, and so will be when they have done what they can.
  --
  {111} Then I saw that he went on, trembling for fear of the lions, but taking good heed to the directions of the porter; he heard them roar, but they did him no harm. Then he clapped his hands, and went on till he came and stood before the gate where the porter was. Then said Christian to the porter, Sir, what house is this? And may I lodge here to-night? The porter answered, This house was built by the Lord of the hill, and he built it for the relief and security of pilgrims. The porter also asked whence he was, and whither he was going.
  {112} CHR. I am come from the City of Destruction, and am going to Mount Zion; but because the sun is now set, I desire, if I may, to lodge here to-night.
  --
  {115} Then she asked him whence he was, and whither he was going, and he told her. She asked him also how he got into the way; and he told her. Then she asked him what he had seen and met with in the way; and he told, her. And last she asked his name; so he said, It is Christian, and I have so much the more a desire to lodge here to-night, because, by what I perceive, this place was built by the Lord of the hill for the relief and security of pilgrims. So she smiled, but the water stood in her eyes; and after a little pause, she said, I will call forth two or three more of the family. So she ran to the door, and called out Prudence, Piety, and Charity, who, after a little more discourse with him, had him into the family; and many of them, meeting him at the threshold of the house, said, Come in, thou blessed of the Lord; this house was built by the Lord of the hill, on purpose to entertain such pilgrims in. Then he bowed his head, and followed them into the house. So when he was come in and sat down, they gave him something to drink, and consented together, that until supper was ready, some of them should have some particular discourse with Christian, for the best improvement of time; and they appointed Piety, and Prudence, and Charity to discourse with him; and thus they began:
  {116} PIETY. Come, good Christian, since we have been so loving to you, to receive you in our house this night, let us, if perhaps we may better ourselves thereby, talk with you of all things that have happened to you in your pilgrimage.
  --
  {252} HOLD-THE-WORLD. Ay, and hold you there still, good Mr. By-ends; for, for my part, I can count him but a fool, that, having the liberty to keep what he has, shall be so unwise as to lose it. Let us be wise as serpents; it is best to make hay when the sun shines; you see how the bee lieth still all winter, and bestirs her only when she can have profit with pleasure. God sends sometimes rain, and sometimes sunshine; if they be such fools to go through the first, yet let us be content to take fair weather along with us. For my part, I like that religion best that will stand with the security of God's good blessings unto us; for who can imagine, that is ruled by his reason, since God has bestowed upon us the good things of this life, but that he would have us keep them for his sake? Abraham and Solomon grew rich in religion. And Job says, that a good man shall lay up gold as dust. But he must not be such as the men before us, if they be as you have described them.
  SAVE-ALL. I think that we are all agreed in this matter, and therefore there needs no more words about it.

Timaeus, #unset, #Arthur C Clarke, #Fiction
  Enough of diseaseI have now to speak of the means by which the mind and body are to be preserved, a higher theme than the other. The good is the beautiful, and the beautiful is the symmetrical, and there is no greater or fairer symmetry than that of body and soul, as the contrary is the greatest of deformities. A leg or an arm too long or too short is at once ugly and unserviceable, and the same is true if body and soul are disproportionate. For a strong and impassioned soul may 'fret the pigmy body to decay,' and so produce convulsions and other evils. The violence of controversy, or the earnestness of enquiry, will often generate inflammations and rheums which are not understood, or assigned to their true cause by the professors of medicine. And in like manner the body may be too much for the soul, darkening the reason, and quickening the animal desires. The only security is to preserve the balance of the two, and to this end the mathematician or philosopher must practise gymnastics, and the gymnast must cultivate music. The parts of the body too must be treated in the same waythey should receive their appropriate exercise. For the body is set in motion when it is heated and cooled by the elements which enter in, or is dried up and moistened by external things; and, if given up to these processes when at rest, it is liable to destruction. But the natural motion, as in the world, so also in the human frame, produces harmony and divides hostile powers. The best exercise is the spontaneous motion of the body, as in gymnastics, because most akin to the motion of mind; not so good is the motion of which the source is in another, as in sailing or riding; least good when the body is at rest and the motion is in parts only, which is a species of motion imparted by physic. This should only be resorted to by men of sense in extreme cases; lesser diseases are not to be irritated by medicine. For every disease is akin to the living being and has an appointed term, just as life has, which depends on the form of the triangles, and cannot be protracted when they are worn out. And he who, instead of accepting his destiny, endeavours to prolong his life by medicine, is likely to multiply and magnify his diseases. Regimen and not medicine is the true cure, when a man has time at his disposal.
  Enough of the nature of man and of the body, and of training and education. The subject is a great one and cannot be adequately treated as an appendage to another. To sum up all in a word: there are three kinds of soul located within us, and any one of them, if remaining inactive, becomes very weak; if exercised, very strong. Wherefore we should duly train and exercise all three kinds.

Verses of Vemana, #is Book, #unset, #Zen
  He is a fool who gives his hand to another in assurance of security while he himself is transient as a figure in a mirror; void of happiness why should we contract marriage in this fleeting life?
  662
  --
  He is a fool who gives his hand to another in assurance of security while he himself is transient as a figure in a mirror; void of happiness why should we contract marriage in this fleeting life?
  662

WORDNET



--- Overview of noun security

The noun security has 9 senses (first 3 from tagged texts)
                  
1. (17) security ::: (the state of being free from danger or injury; "we support the armed services in the name of national security")
2. (5) security, protection ::: (defense against financial failure; financial independence; "his pension gave him security in his old age"; "insurance provided protection against loss of wages due to illness")
3. (1) security ::: (freedom from anxiety or fear; "the watch dog gave her a feeling of security")
4. security, certificate ::: (a formal declaration that documents a fact of relevance to finance and investment; the holder has a right to receive interest or dividends; "he held several valuable securities")
5. security, surety ::: (property that your creditor can claim in case you default on your obligation; "bankers are reluctant to lend without good security")
6. security, security department ::: (a department responsible for the security of the institution's property and workers; "the head of security was a former policeman")
7. security, surety ::: (a guarantee that an obligation will be met)
8. security system, security measure, security ::: (an electrical device that sets off an alarm when someone tries to break in)
9. security, security measures ::: (measures taken as a precaution against theft or espionage or sabotage etc.; "military security has been stepped up since the recent uprising")


--- Synonyms/Hypernyms (Ordered by Estimated Frequency) of noun security

9 senses of security                          

Sense 1
security
   => safety
     => condition, status
       => state
         => attribute
           => abstraction, abstract entity
             => entity

Sense 2
security, protection
   => assets
     => possession
       => relation
         => abstraction, abstract entity
           => entity

Sense 3
security
   => fearlessness, bravery
     => feeling
       => state
         => attribute
           => abstraction, abstract entity
             => entity

Sense 4
security, certificate
   => legal document, legal instrument, official document, instrument
     => document, written document, papers
       => writing, written material, piece of writing
         => written communication, written language, black and white
           => communication
             => abstraction, abstract entity
               => entity

Sense 5
security, surety
   => transferred property, transferred possession
     => possession
       => relation
         => abstraction, abstract entity
           => entity

Sense 6
security, security department
   => department, section
     => division
       => administrative unit, administrative body
         => unit, social unit
           => organization, organisation
             => social group
               => group, grouping
                 => abstraction, abstract entity
                   => entity

Sense 7
security, surety
   => guarantee, warrant, warrantee, warranty
     => assurance, pledge
       => commitment, dedication
         => message, content, subject matter, substance
           => communication
             => abstraction, abstract entity
               => entity

Sense 8
security system, security measure, security
   => electrical device
     => device
       => instrumentality, instrumentation
         => artifact, artefact
           => whole, unit
             => object, physical object
               => physical entity
                 => entity

Sense 9
security, security measures
   => precaution, safeguard, guard
     => measure, step
       => maneuver, manoeuvre, tactical maneuver, tactical manoeuvre
         => move
           => decision, determination, conclusion
             => choice, selection, option, pick
               => action
                 => act, deed, human action, human activity
                   => event
                     => psychological feature
                       => abstraction, abstract entity
                         => entity


--- Hyponyms of noun security

5 of 9 senses of security                      

Sense 1
security
   => peace, public security
   => secureness
   => protection, shelter

Sense 2
security, protection
   => easy street
   => hedge, hedging
   => insurance

Sense 3
security
   => confidence

Sense 4
security, certificate
   => government security, agency security
   => mortgage-backed security
   => registered security
   => scrip
   => stock certificate, stock
   => tax-exempt security, tax-exempt
   => bond, bond certificate
   => zero-coupon security, zero coupon security
   => partnership certificate
   => proprietorship certificate
   => convertible, convertible security
   => letter security
   => listed security
   => unlisted security, over the counter security, OTC security

Sense 5
security, surety
   => deposit
   => earnest
   => recognizance, recognisance
   => warrant, stock warrant, stock-purchase warrant


--- Synonyms/Hypernyms (Ordered by Estimated Frequency) of noun security

9 senses of security                          

Sense 1
security
   => safety

Sense 2
security, protection
   => assets

Sense 3
security
   => fearlessness, bravery

Sense 4
security, certificate
   => legal document, legal instrument, official document, instrument

Sense 5
security, surety
   => transferred property, transferred possession

Sense 6
security, security department
   => department, section

Sense 7
security, surety
   => guarantee, warrant, warrantee, warranty

Sense 8
security system, security measure, security
   => electrical device

Sense 9
security, security measures
   => precaution, safeguard, guard




--- Coordinate Terms (sisters) of noun security

9 senses of security                          

Sense 1
security
  -> safety
   => biosafety
   => risklessness
   => invulnerability, impregnability
   => salvation
   => security

Sense 2
security, protection
  -> assets
   => share, portion, part, percentage
   => tax base
   => receivables
   => crown jewel
   => deep pocket
   => reserve assets
   => sum, sum of money, amount, amount of money
   => resource
   => intangible, intangible asset
   => liquid assets, current assets, quick assets
   => investment, investment funds
   => equity
   => security, protection
   => material resource
   => capital
   => capital, working capital
   => funds, finances, monetary resource, cash in hand, pecuniary resource
   => hole card
   => credit
   => overage
   => accounts receivable

Sense 3
security
  -> fearlessness, bravery
   => security

Sense 4
security, certificate
  -> legal document, legal instrument, official document, instrument
   => articles of incorporation
   => derivative instrument, derivative
   => negotiable instrument
   => passport
   => ship's papers
   => manifest
   => debenture
   => power of attorney
   => letters of administration
   => letters testamentary
   => working papers, work papers, work permit
   => act, enactment
   => law
   => bill, measure
   => brief, legal brief
   => will, testament
   => living will
   => deed, deed of conveyance, title
   => assignment
   => trust deed, deed of trust
   => conveyance
   => tax return, income tax return, return
   => license, licence, permit
   => patent, letters patent
   => opinion, legal opinion, judgment, judgement
   => acquittance, release
   => writ, judicial writ
   => mandate, authorization, authorisation
   => affidavit
   => written agreement
   => indictment, bill of indictment
   => impeachment
   => arraignment
   => security, certificate

Sense 5
security, surety
  -> transferred property, transferred possession
   => acquisition
   => grant, assignment
   => escheat
   => stolen property
   => inheritance, heritage
   => outgo, spending, expenditure, outlay
   => loss
   => security, surety

Sense 6
security, security department
  -> department, section
   => academic department
   => business department
   => personnel department, personnel office, personnel, staff office
   => government department
   => payroll, payroll department
   => security, security department

Sense 7
security, surety
  -> guarantee, warrant, warrantee, warranty
   => security, surety
   => deposit
   => stock warrant

Sense 8
security system, security measure, security
  -> electrical device
   => antenna, aerial, transmitting aerial
   => attenuator
   => ballast, light ballast
   => battery, electric battery
   => bimetallic strip
   => brush
   => capacitor, capacitance, condenser, electrical condenser
   => cell, electric cell
   => circuit, electrical circuit, electric circuit
   => control panel, instrument panel, control board, board, panel
   => distributor, distributer, electrical distributor
   => electrograph
   => electrostatic generator, electrostatic machine, Wimshurst machine, Van de Graaff generator
   => filter
   => flasher
   => fuse, electrical fuse, safety fuse
   => inductor, inductance
   => jack
   => load
   => plug, male plug
   => precipitator, electrostatic precipitator, Cottrell precipitator
   => reactor
   => rectifier
   => relay, electrical relay
   => resistor, resistance
   => security system, security measure, security
   => Segway, Segway Human Transporter, Segway HT
   => solar array, solar battery, solar panel
   => spark arrester
   => spark plug, sparking plug, plug
   => suppressor, suppresser
   => transducer
   => transformer
   => transponder
   => zapper

Sense 9
security, security measures
  -> precaution, safeguard, guard
   => backstop
   => security, security measures




--- Grep of noun security
agency security
bureau of diplomatic security
canadian security intelligence service
collective security
committee for state security
communications security establishment
convertible security
department of homeland security
federal security bureau
federal security service
general security services
government security
homeland security
insecurity
international relations and security network
letter security
listed security
mortgage-backed security
national security agency
national security council
otc security
over the counter security
private security force
public security
registered security
security
security blanket
security consultant
security council
security department
security deposit
security director
security force
security guard
security intelligence
security intelligence review committee
security interest
security measure
security measures
security review
security service
security staff
security system
social security
social security administration
social security number
tax-exempt security
transportation security administration
unlisted security
zero-coupon security
zero coupon security



IN WEBGEN [10000/3601]

Wikipedia - 1987 Mecca incident -- July 1987 clash between Shia pilgrims and Saudi Arabian security forces during the Islamic Hajj season
Wikipedia - 2017 Equifax data breach -- Major cybersecurity incident
Wikipedia - 2019 Internet blackout in Iran -- A week-long total internet blackout ordered by Supreme National Security Council
Wikipedia - 2020 boogaloo killings -- Killings of security personnel and law enforcement officers in California
Wikipedia - 2020 General Directorate of Security Super King Air 350 crash -- Aircraft crash in Van, Turkey
Wikipedia - 2nd Security Force Assistance Brigade -- Brigade in the US Army (e. 2018)
Wikipedia - 32 ft Transportable Port Security Boat (TPSB) -- US Coast Guard boats
Wikipedia - Abdallah ibn al-Musayyab al-Dabbi -- Provincial Abbasid governor, security chief
Wikipedia - Abdullah Laghmani -- Former Afghan deputy chief of security
Wikipedia - Abdussalam Ashour -- Libyan security officer
Wikipedia - Active measures -- Term for the actions of political warfare conducted by the Soviet and Russian security services
Wikipedia - Adirondack Correctional Facility -- Medium-security state prison, located in New York, US
Wikipedia - Administration for Security and Counterintelligence
Wikipedia - ADT Inc. -- American security systems firm
Wikipedia - Adversarial machine learning -- Research field that lies at the intersection of machine learning and computer security
Wikipedia - African Security Congress -- South African political party
Wikipedia - Air Canada Flight 018 Stowaway incident -- Hong Kong airport security breach
Wikipedia - Air gap (networking) -- Network security measure
Wikipedia - Airline security
Wikipedia - Airport security
Wikipedia - Akihiko Saito -- Japanese security contractor and terrorism casualty
Wikipedia - Alarm.com -- American security company
Wikipedia - Albion Correctional Facility -- Medium-security state prison for female prisoners, located in New York, US
Wikipedia - Alec Muffett -- Software engineer, security expert
Wikipedia - Alexander Heid -- American computer security consultant
Wikipedia - Alexandra Phelan -- International law and global health security researcher
Wikipedia - Alex Holden -- Owner of Hold Security
Wikipedia - Alliance for Securing Democracy -- American national security advocacy group
Wikipedia - Altona Correctional Facility -- Medium-security state prison, located in New York, US
Wikipedia - Altor Networks -- Computer security company
Wikipedia - American Civil Liberties Union v. National Security Agency
Wikipedia - American depositary receipt -- Security representing ownership of an underlying number of shares of a foreign company
Wikipedia - American Security and Trust Company Building -- Historic building in Washington, D.C
Wikipedia - Angela Sasse -- Computer scientist and information security expert
Wikipedia - Ann Z. Caracristi -- Cryptanalyst, former Deputy Director of the National Security Agency
Wikipedia - AppArmor -- Linux kernel security module
Wikipedia - Application firewall -- Layer 7/application layer network security system
Wikipedia - Application-level gateway -- Security component that augments a firewall or NAT employed in a computer network
Wikipedia - Application security
Wikipedia - Arizona SB 1070 -- 2010 border security legislation in Arizona
Wikipedia - Arkhangelsk FSB office bombing -- 2018 terrorist attack against the Russian security service
Wikipedia - Armoured One -- U.S. security company
Wikipedia - ARPANET encryption devices -- Security tools used on ARPANET
Wikipedia - ARX (Algorithmic Research Ltd.) -- digital security company
Wikipedia - Assa Abloy -- Swedish conglomerate, manufacturer of locks and security systems
Wikipedia - Asset (computer security) -- Data, device, or other component of a computing environment
Wikipedia - Attica Correctional Facility -- Maximum-security state prison for male prisoners, located in New York, US
Wikipedia - Auction rate security -- Debt instrument with a long-term nominal maturity with a regularly reset interest rate
Wikipedia - Australian Security Intelligence Organisation
Wikipedia - Automotive security
Wikipedia - Avast -- Czech security software company
Wikipedia - BackBox -- security-oriented Linux distribution
Wikipedia - Badaber uprising -- Armed rebellion by captured and imprisoned Soviet and Afghan security forces against Pakistani- and American-backed Afghan mujahideen forces
Wikipedia - BAE Systems -- Defence, security, and aerospace company
Wikipedia - Bangladesh Institute of Peace & Security Studies -- Research institute in Bangladesh
Wikipedia - Bare Hill Correctional Facility -- Medium security state prison in Franklin County, New York
Wikipedia - Barricade tape -- Security item to mark hazardous areas
Wikipedia - Beacon Correctional Facility -- Former female minimum security state prison in New York
Wikipedia - Bearer bond -- a debt security not registered to any specific investor
Wikipedia - Belgian General Information and Security Service
Wikipedia - Berrimah Prison -- Former maximum security prison in Australia
Wikipedia - BeyondCorp -- Security framework
Wikipedia - Beyond Fear: Thinking Sensibly About Security in an Uncertain World
Wikipedia - Biosecurity Act 2015 -- Australian law
Wikipedia - Biosecurity
Wikipedia - Bitdefender -- Romanian cybersecurity technology company
Wikipedia - Black hat (computer security) -- Computer hacker with malicious intent
Wikipedia - BlackNurse (Computer Security)
Wikipedia - BlueKeep (security vulnerability)
Wikipedia - BlueKeep -- Windows security hole
Wikipedia - Boeing Defense, Space & Security -- Business unit of Boeing responsible for defense and aerospace products and services
Wikipedia - Border Guards Bangladesh -- Border security agency of the Bangladesh government
Wikipedia - Border guard -- Government service concerned with security of national borders
Wikipedia - Border Security Force (Water Wing) -- Special units of Border Security Force of India.
Wikipedia - Border Security Force -- Indian para-military Force
Wikipedia - Border Service of the Federal Security Service of the Russian Federation -- Border guard branch of the Federal Security Service of Russia
Wikipedia - Borlaug Dialogue -- Annual symposium on global food security
Wikipedia - Bouncer (doorman) -- Type of security guard
Wikipedia - Brandon Wales -- American national security official
Wikipedia - Brent Scowcroft -- US National Security Advisor
Wikipedia - Brinks Home Security -- Security company
Wikipedia - Browser security
Wikipedia - BT Managed Security Solutions
Wikipedia - Buffer overflow -- Anomaly in computer security and programming
Wikipedia - Bulletin of the Atomic Scientists -- nonprofit organization concerning science and global security issues
Wikipedia - Butana Almond Nofomela -- South African security policeman convicted of murder
Wikipedia - Cabinet Committee on National Security (Pakistan)
Wikipedia - Canadian Security Intelligence Service
Wikipedia - Capability-based security -- Computer safety concept
Wikipedia - Carbon Black (company) -- U.S.-based cybersecurity company
Wikipedia - Card security code -- Security feature on payment cards
Wikipedia - Category:Center for a New American Security
Wikipedia - Category:Computer network security
Wikipedia - Category:Computer security academics
Wikipedia - Category:Computer security organizations
Wikipedia - Category:Computer security qualifications
Wikipedia - Category:Computer security standards
Wikipedia - Category:Computer security
Wikipedia - Category:Free security software
Wikipedia - Category:Hacking (computer security)
Wikipedia - Category:National Security Agency people
Wikipedia - Category:National Security Agency
Wikipedia - Category:Operating system security
Wikipedia - Category:People associated with computer security
Wikipedia - Category:Security breaches
Wikipedia - Category:Security
Wikipedia - Category:Writers about computer security
Wikipedia - Cayuga Correctional Facility -- Medium-security state prison in Moravia, New York, US
Wikipedia - Center for International Security and Cooperation
Wikipedia - Center for Research in Security and Privacy
Wikipedia - Center for Research in Security Prices -- Research center of the University of Chicago
Wikipedia - Center for Security and Emerging Technology -- American technology think tank
Wikipedia - Central European Journal of International and Security Studies -- Academic journal
Wikipedia - Central Industrial Security Force Act -- Act of the Indian Parliament
Wikipedia - Central Leading Group for Internet Security and Informatization
Wikipedia - Central Office for Information Technology in the Security Sector -- German federal agency
Wikipedia - Central Security Service -- United States Department of Defense government agency
Wikipedia - Centrelink -- federal social security program of the Australian Government
Wikipedia - Certificate Transparency -- Internet security standard for auditing digital certificates by creating public logs recording certificates issued by publicly trusted certificate authorities
Wikipedia - Certified Information Security Manager
Wikipedia - Certified Information Systems Security Professional
Wikipedia - Certified Penetration Testing Engineer -- Cyber security certification
Wikipedia - Certified Wireless Security Professional -- Certification
Wikipedia - Chad Wolf -- De facto acting United States Secretary of Homeland Security (unlawfully serving)
Wikipedia - Chantal Kabore-Zoungrana -- Burkinese animal nutritionist and biosecurity expert
Wikipedia - Charlie Miller (security researcher)
Wikipedia - Checkmarx -- Israeli software security company
Wikipedia - Check Point -- Israeli security company
Wikipedia - Chief information security officer
Wikipedia - Chillicothe Correctional Institution -- American medium security prison
Wikipedia - Chris Krebs -- Cybersecurity and infrastructure security expert
Wikipedia - Chris Kubecka -- American computer programmer and computer security researcher
Wikipedia - Christopher Boyd (IT security) -- Computer Security researcher
Wikipedia - Chronicle Security
Wikipedia - CIC (Nintendo) -- Security lockout chip used in Nintendo game consoles
Wikipedia - CipherCloud -- Cloud security software company
Wikipedia - Cipher security summary
Wikipedia - Clinton Correctional Facility -- Maximum-security state prison for men in New York, US
Wikipedia - C-list (computer security)
Wikipedia - Cloud access security broker -- Cloud security software
Wikipedia - Cloud computing security
Wikipedia - Coast Guard of Georgia -- maritime warfare and security branch of GeorgiaM-bM-^@M-^Ys military and border police
Wikipedia - Coast guard -- Maritime security organization of a particular country
Wikipedia - Code Access Security
Wikipedia - Cold boot attack -- a means of compromising computer security by restarting the computer
Wikipedia - Collective Security Treaty Organization
Wikipedia - Collective security
Wikipedia - Collins Correctional Facility -- Medium security prison in Collins, New York, US
Wikipedia - Columbia Correctional Institution (Wisconsin) -- Maximum-security prison in Portage, Wisconsin, United States
Wikipedia - Comando Interforze per le Operazioni Cibernetiche -- Italian government agency for cybersecurity
Wikipedia - Command Consulting Group -- International security and intelligence consulting firm
Wikipedia - Command Control (event) -- Cybersecurity conference hosted in Munich, Germany
Wikipedia - Committee for Safeguarding National Security of the Hong Kong Special Administrative Region -- An organ of the Central People's Government (State Council) of China in Hong Kong
Wikipedia - Committee of General Security
Wikipedia - Common Vulnerabilities and Exposures -- Catalogue of information security vulnerabilities
Wikipedia - Communications protection -- Application of communications security measures to telecommunications systems
Wikipedia - Communications Security Establishment Canada
Wikipedia - Communications Security Establishment
Wikipedia - Communications security
Wikipedia - Comodo Cybersecurity -- American technology company
Wikipedia - Compartmentalization (information security)
Wikipedia - Comprehensive National Cybersecurity Initiative
Wikipedia - Comprehensive Social Security Assistance -- Hong Kong welfare programme
Wikipedia - Computer emergency response team -- Organisation which responds to computer security incidents
Wikipedia - Computer security audit
Wikipedia - Computer security compromised by hardware failure
Wikipedia - Computer security conference
Wikipedia - Computer security model -- Plan for specifying and enforcing security policies
Wikipedia - Computer security software -- Computer program for information security
Wikipedia - Computer Security
Wikipedia - Computer security -- The protection of computer systems from theft or damage
Wikipedia - Congressional Biodefense Caucus -- Caucus dedicated to biodefense enterprise and national security
Wikipedia - Connecticut Four -- Librarians who challenged the constitutional validity of National Security Letters
Wikipedia - Content Security Policy -- Computer security standard to prevent cross-site scripting and related attacks
Wikipedia - Control-Alt-Delete -- Computer keyboard shortcut that triggers a reboot or system security function
Wikipedia - Coordinating Ministry for Political, Legal, and Security Affairs (Indonesia) -- Indonesian government ministry
Wikipedia - CopperheadOS -- Mobile operating system focused on privacy and security
Wikipedia - Coronavirus Aid, Relief, and Economic Security Act
Wikipedia - Corporate security
Wikipedia - Corps of Commissionaires (United Kingdom) -- The oldest security company in the world.
Wikipedia - Corps of Gendarmerie of Vatican City -- Police and security force of Vatican City
Wikipedia - Council for National Defense and Security (Vietnam)
Wikipedia - Counterintelligence state -- Form of government where state security services permeate society
Wikipedia - Counterpane Internet Security
Wikipedia - Counter-Terrorism and Security Act 2015 -- United Kingdom act
Wikipedia - Covert channel -- Computer security attack that creates a capability to transfer information between processes that are not supposed to be allowed to communicate
Wikipedia - Coxsackie Correctional Facility -- Maximum security state prison in New York, US
Wikipedia - Critical security studies
Wikipedia - Cross-site scripting -- Computer security vulnerability
Wikipedia - Cross-site tracing -- Network security vulnerability exploiting the HTTP TRACE method
Wikipedia - CrowdStrike -- American cybersecurity technology company
Wikipedia - Cryptek -- US information security company
Wikipedia - Cryptlib -- Open source software security toolkit library
Wikipedia - Crypto AG -- Swiss company specialising in communications and information security
Wikipedia - Cryptographic Module Validation Program -- Joint American-Canadian security accreditation program for cryptographic modules
Wikipedia - Cryptosystem -- Suite of cryptographic algorithms needed to implement a particular security service
Wikipedia - CUSIP -- Nine-character alphanumeric code that identifies a North American financial security
Wikipedia - Cyberbiosecurity
Wikipedia - Cyberoam -- Computer security company
Wikipedia - Cyber Peace Foundation -- Indian Cyber Security Nonprofit organization
Wikipedia - Cyber Security and Crime Division -- Branch of Bangladesh Police
Wikipedia - Cybersecurity and Infrastructure Security Agency -- United States federal agency
Wikipedia - Cybersecurity information technology list -- Wikimedia list article
Wikipedia - Cybersecurity Law of the People's Republic of China
Wikipedia - Cyber-security regulation
Wikipedia - Cyber security standards
Wikipedia - Cybersecurity standards
Wikipedia - Cyber Security
Wikipedia - Cyber security
Wikipedia - Cybersecurity
Wikipedia - Cynet (company) -- Cyber security company from Israel
Wikipedia - Danish Security and Intelligence Service
Wikipedia - DarkMatter (Emirati company) -- Cybersecurity company
Wikipedia - Database security
Wikipedia - Data center security -- Set of policies, precautions and practices to avoid unauthorized access and manipulation of a data center's resources
Wikipedia - Data-centric security
Wikipedia - Datagram Transport Layer Security -- Communications protocol; lets datagram-based applications communicate in a way designed to prevent eavesdropping, tampering, or message forgery
Wikipedia - Data security
Wikipedia - Datto (company) -- American cybersecurity and data backup company
Wikipedia - Dave Chalk (entrepreneur) -- Canadian technology entrepreneur, cyber security specialist, and media personality
Wikipedia - David Venable -- Cyber security professional
Wikipedia - DEA Office of National Security Intelligence
Wikipedia - Debt bondage -- Person's pledge of their labor or services as security for the repayment for a debt or other obligation
Wikipedia - Defense Counterintelligence and Security Agency
Wikipedia - Defense Security Cooperation Agency
Wikipedia - Defense Security Service
Wikipedia - Department for Protection and Security -- Security branch of the National Rally
Wikipedia - Department of Defense Information Assurance Certification and Accreditation Process -- Computer security process
Wikipedia - Department of Health and Social Security
Wikipedia - Department of Homeland Security appointments by Donald Trump -- Wikimedia list article
Wikipedia - Department of Homeland Security
Wikipedia - Department of State Security (South Africa)
Wikipedia - Department of the Navy Central Adjudication Facility -- U.S. armed forces information security organization
Wikipedia - Deputy Director of the National Security Agency
Wikipedia - DHS Office of Strategy, Policy, and Plans -- Department of homeland security for policy plan
Wikipedia - Directorate-General for External Security
Wikipedia - Directorate of Defence Intelligence and Security
Wikipedia - Director of the National Security Agency
Wikipedia - Dirty COW -- Computer security vulnerability
Wikipedia - Dodge Correctional Institution -- Maximum security prison in Wisconsin
Wikipedia - Domain Name System Security Extensions -- Suite of IETF specifications for securing certain kinds of information provided by DNS
Wikipedia - Dorothy E. Denning -- American information security researcher
Wikipedia - Downstate Correctional Facility -- A maximum-security prison in the Town of Fishkill in the Hudson Valley region of New York
Wikipedia - Draft:Brett Buerhaus -- American computer security researcher
Wikipedia - Draft:Cyber Secure Central -- International cybersecurity company
Wikipedia - Draft:Dr. Ananth Prabhu G -- Author | Cyber Law & Security Expert | Motivational Speaker
Wikipedia - Draft:Jacob Helberg -- American national security author, political philanthropist
Wikipedia - Draft:Verkada -- Cloud-based physical security startup
Wikipedia - Draft:Vincent Troia -- Computer security professional
Wikipedia - DSMA-Notice -- official request not to publish information for reasons of national security
Wikipedia - Dutch Military Intelligence and Security Service
Wikipedia - Eastern Sabah Security Zone -- Security zone in the Malaysian state of Sabah
Wikipedia - East Jersey State Prison -- Maximum-security prison in New Jersey
Wikipedia - Economic security
Wikipedia - Edward Snowden -- American whistleblower, former National Security Agency contractor
Wikipedia - EFAIL -- email security vulnerability
Wikipedia - ELearnSecurity Certified Professional Penetration Tester
Wikipedia - ELearnSecurity
Wikipedia - Elizabeth Neumann -- American security expert
Wikipedia - Elmira Correctional Facility -- Maximum security state prison in New York, US
Wikipedia - Emmanuel Yao Adzator -- Ghanaian security expert
Wikipedia - Emotional insecurity
Wikipedia - Emotional security
Wikipedia - Employees' State Insurance -- Self-financing social security and health insurance scheme for Indian workers
Wikipedia - Employment and Support Allowance -- British social security benefit
Wikipedia - Encyclopedia of Cryptography and Security -- Book by Technische Universiteit Eindhoven
Wikipedia - Endpoint security
Wikipedia - Energy Independence and Security Act of 2007 -- United States law
Wikipedia - Energy security and renewable technology
Wikipedia - Energy security -- National security considerations of energy availability
Wikipedia - Enterprise information security architecture
Wikipedia - Entity List -- List published by the Bureau of Industry and Security of businesses, research institutions, government and private organizations, individuals, and other types of legal persons subject to specific license requirements for the export, reexport and/or transfer of specified items
Wikipedia - Entropic security -- Concept in cryptography
Wikipedia - Erie County Holding Center -- Pre-trial, maximum security detention facility in New York, US
Wikipedia - Ernst Kaltenbrunner -- Austrian SS and chief of the Reich Main Security Office
Wikipedia - Estonian Internal Security Service
Wikipedia - EternalBlue -- Computer security exploit
Wikipedia - European Network and Information Security Agency
Wikipedia - European Union Agency for Cybersecurity -- Agency of the European Union
Wikipedia - European Union Maritime Security Strategy -- A maritime security strategy
Wikipedia - Evil maid attack -- Type of computer security breach
Wikipedia - Exploit (computer security)
Wikipedia - Exploit kit -- Collection of security exploit tools
Wikipedia - External Security Organisation
Wikipedia - Fabrizio Quattrocchi -- Italian security officer
Wikipedia - Fake security camera -- Empty
Wikipedia - Falih Al-Fayyadh -- Advisor of National Security Council
Wikipedia - FBI National Security Branch -- US FBI national security unit
Wikipedia - Federal Correctional Institution, Englewood -- Low-security United States federal prison for male inmates
Wikipedia - Federal Correctional Institution, Otisville -- Medium-security federal prison for male inmates located near Otisville, New York
Wikipedia - Federal Correctional Institution, Ray Brook -- Medium-security federal prison in New York, US
Wikipedia - Federal Office for Information Security
Wikipedia - Federal Security Service
Wikipedia - Felix von Leitner -- German IT security expert
Wikipedia - Finnish Security Intelligence Service
Wikipedia - Firewall (computing) -- Software or hardware-based network security system
Wikipedia - Firewalls and Internet Security
Wikipedia - Fishkill Correctional Facility -- Multi-security level prison in New York, US
Wikipedia - Five Points Correctional Facility -- Maximum security men's prison located in Romulus, New York
Wikipedia - Food insecurity among college students in the United States -- Hunger among American college students
Wikipedia - Food security during the COVID-19 pandemic -- Famines related to the pandemic caused by coronavirus disease 2019.
Wikipedia - Food security in Mozambique -- Security of food in the East African nation of Mozambique
Wikipedia - Food security in the Central Valley, California -- Widespread issue where most of the nation's agriculture is produced
Wikipedia - Food security -- Measure of availability and accessibility of food
Wikipedia - Foreign language anxiety -- feeling of unease and insecurity experienced in learning or using a foreign language
Wikipedia - Fortune Brands Home & Security -- American industrial company
Wikipedia - Frank Abagnale -- American security consultant, former confidence trickster, check forger, impostor, and escape artist
Wikipedia - Frank Garner -- American Chief of Police, security consultant, politician from Montana
Wikipedia - Franklin Correctional Facility -- Medium security state prison in New York, US
Wikipedia - F-Secure -- Finnish cyber security company
Wikipedia - Full disclosure (computer security) -- Policy in computer security
Wikipedia - G4S -- British multinational security services company
Wikipedia - Galveston National Laboratory -- High security National Biocontainment Laboratory
Wikipedia - Garda Crime and Security Branch
Wikipedia - Gemalto -- International digital security company
Wikipedia - General Directorate of General Security -- Lebanese intelligence agency
Wikipedia - General Intelligence and Security Service
Wikipedia - General Security Directorate (Iraq)
Wikipedia - General Security Directorate (Syria)
Wikipedia - Generic Security Services Application Program Interface
Wikipedia - German Aerospace Center -- Research center of the Federal Republic of Germany for aerospace and power engineering, transport and security
Wikipedia - Ghidra -- Free reverse engineering tool developed by the National Security Agency
Wikipedia - Ghost Security
Wikipedia - Global Health Security Index -- |Preparedness rating
Wikipedia - GlobalSecurity.org -- Think tank website focused on security issues
Wikipedia - Goatse Security -- Hacker group
Wikipedia - Gouverneur Correctional Facility -- Medium-security state prison for men located in New York, US
Wikipedia - Government Communications Security Bureau
Wikipedia - Gowanda Correctional Facility -- Medium-security state prison for men located in New York, US
Wikipedia - Great Meadow Correctional Facility -- Maximum-security state prison for men located in New York, US
Wikipedia - Green Haven Correctional Facility -- Maximum-security state prison for men located in New York, US
Wikipedia - Grid Security Infrastructure
Wikipedia - Groveland Correctional Facility -- Medium-security state prison for men located in New York, US
Wikipedia - Guardly -- Canadian security company
Wikipedia - Hacker (computer security)
Wikipedia - Halogen Group Nigeria -- Nigerian security company
Wikipedia - Hanwha Techwin -- South Korean electronics and security camera company
Wikipedia - Hardware security module
Wikipedia - Hardware security
Wikipedia - Hash function security summary -- Publicly known attacks against cryptographic hash functions
Wikipedia - Have I Been Pwned? -- Consumer security website and email alert system
Wikipedia - HBGary -- American cybersecurity company
Wikipedia - Heartbleed -- Security bug in OpenSSL
Wikipedia - High Tech Gays v. Defense Industrial Security Clearance Office -- U.S. legal case
Wikipedia - HM Prison Barwon -- Maximum security prison in Lara, Victoria, Australia
Wikipedia - Homeland Security Act
Wikipedia - Homeland Security Advisor
Wikipedia - Homeland Security Cybersecurity Boots-on-the-Ground Act -- Bill of the 113th United States Congress
Wikipedia - Homeland Security Distinguished Service Medal -- United States Homeland Security Department distinguished service medal
Wikipedia - Homeland Security (Egypt)
Wikipedia - Homeland security -- United States notion of safety from terrorism
Wikipedia - Home security -- Set of practices to protect homes against crime
Wikipedia - Hong Kong national security law -- Chinese legislation on national security in Hong Kong
Wikipedia - Howard Schmidt -- American computer security expert
Wikipedia - H. R. McMaster -- 26th United States National Security Advisor
Wikipedia - HTTP parameter pollution -- Web security vulnerability
Wikipedia - HTTP request smuggling -- Web security vulnerability
Wikipedia - HTTP Strict Transport Security -- HTTP response header field and associated policy
Wikipedia - Icelandic Coast Guard -- Maritime security branch of Iceland's military
Wikipedia - Identity-based security
Wikipedia - IEEE 802.11w-2009 -- Security amendment to IEEE 802.11 standard
Wikipedia - Imperva -- Provider of cyber and data security products
Wikipedia - Income Support -- British social security benefit
Wikipedia - Independent National Security Legislation Monitor -- Independent oversight body of the Australian Government
Wikipedia - Indian Coast Guard -- Maritime security agency of India's military
Wikipedia - Industrial espionage -- Use of espionage for commercial purposes rather than security
Wikipedia - Information and Security Service of the Republic of Moldova
Wikipedia - Information security awareness
Wikipedia - Information Security Group
Wikipedia - Information security operations center -- Facility where enterprise information systems are monitored, assessed, and defended
Wikipedia - Information Security Oversight Office
Wikipedia - Information Security
Wikipedia - Information security
Wikipedia - Information Systems Security Architecture Professional
Wikipedia - Information Systems Security Engineering Professional
Wikipedia - Information Systems Security Management Professional
Wikipedia - Information technology security audit
Wikipedia - Information theoretic security
Wikipedia - Information-theoretic security
Wikipedia - Institute for Science and International Security
Wikipedia - Institute for Social Security and Services for State Workers -- Mexican public health system
Wikipedia - Intelligence and Security Committee Russia report -- UK government investigation into allegations of Russian interference in British politics
Wikipedia - Intelligence and Security Service of the Ministry of Defence (Slovenia)
Wikipedia - Intelligence cycle security
Wikipedia - Intelligence-Security Agency of Bosnia and Herzegovina
Wikipedia - Intel Security
Wikipedia - Interagency Security Classification Appeals Panel
Wikipedia - Internal Security Act, 1982
Wikipedia - Internal Security Act (Singapore) -- Statute of the Parliament of Singapore
Wikipedia - Internal Security Agency
Wikipedia - Internal Security Department (Brunei)
Wikipedia - Internal Security Department (Singapore)
Wikipedia - Internal Security Forces
Wikipedia - Internal Security Operations Command
Wikipedia - Internal Security Organisation
Wikipedia - Internal Security Service
Wikipedia - International Criminal Tribunal for Rwanda -- International court established by the United Nations Security Council in Resolution 955
Wikipedia - International Maritime Security Construct -- Consortium
Wikipedia - International Peace and Security Institute -- Nonprofit organization
Wikipedia - International Securities Identification Number -- Identifier for a security
Wikipedia - International Security Assistance Force -- NATO-led security mission in Afghanistan, 2001-14
Wikipedia - International Security
Wikipedia - Internet Resource Locator -- Bank layers of security
Wikipedia - Internet safety -- Being aware of safety and security risks on the Internet
Wikipedia - Internet Security Research Group -- Californian public-benefit corporation which focuses on Internet security
Wikipedia - Internet Security Systems
Wikipedia - Internet security -- Branch of computer security specifically related to Internet, often involving browser security and the World Wide Web
Wikipedia - Invention Secrecy Act -- United States national security law
Wikipedia - Iranian Security Police
Wikipedia - Ishaq ibn Ibrahim al-Mus'abi -- Chief of security in Baghdad
Wikipedia - ISO 22322 -- International security standard
Wikipedia - ISO 22398 -- Security exercise standards
Wikipedia - ISO/IEC 27001 -- Information security standard
Wikipedia - ITF Enhancing Human Security -- Non profit humanitarian organization
Wikipedia - IT security
Wikipedia - Itzhak Ilan -- Israeli security official
Wikipedia - Jacob Appelbaum -- American computer security researcher and journalist (born 1 April 1983)
Wikipedia - James Dolan (computer security expert) -- American computer security expert, co-developed SecureDrop
Wikipedia - James Giermanski -- American security specialist
Wikipedia - James Kennedy (security guard) -- Scottish security guard posthumously awarded the George Cross
Wikipedia - James L. Jones -- US Marines Commandant and National Security Advisor
Wikipedia - James Loy -- Commandant of the U.S. Coast Guard and Deputy Secretary of Homeland Security
Wikipedia - Jamie Foxx: I Might Need Security -- 2002 stand-up comedy television special
Wikipedia - Janet Napolitano -- Third United States Secretary of Homeland Security
Wikipedia - Jason Harrington -- American writer and former Transportation Security Administration employee
Wikipedia - Jaya Baloo -- Dutch cybersecurity expert
Wikipedia - Jealousy -- Emotion referring to the thoughts and feelings of insecurity, fear, and envy over relative lack of possessions, status or something of great personal value
Wikipedia - Joanna Rutkowska -- Polish hacker and computer security expert
Wikipedia - Job security -- An assurance that an individual is likely to retain employment, with relatively low chance of becoming unemployed
Wikipedia - Jobseeker's Allowance -- British social security benefit
Wikipedia - John Black (cryptographer) -- American cryptographer and security researcher
Wikipedia - John Bolton -- 27th United States National Security Advisor, lawyer, and diplomat
Wikipedia - Johnny Long -- American computer security expert
Wikipedia - Johns Hopkins Center for Health Security -- Organization
Wikipedia - Joint Security Area (film) -- 2000 South Korean mystery thriller by Park Chan-wook
Wikipedia - Joint Security Area -- Portion of the Korean Demilitarized Zone (DMZ) where North and South Korean forces stand face-to-face
Wikipedia - Jon Callas -- American computer security expert
Wikipedia - Joseph V. Cuffari -- Inspector General of the U.S. Department of Homeland Security
Wikipedia - Jump server -- A computer on a network used to access a separate security zone
Wikipedia - Kaliti Prison -- maximum security prison in Ethiopia
Wikipedia - Kaspersky Lab -- Russian multinational cybersecurity and anti-virus provider
Wikipedia - Katie Moussouris -- American computer security researcher, entrepreneur, and pioneer in vulnerability disclosure
Wikipedia - Katrina Leung -- FBI Informant and PRC Ministry of State Security (MSS) agent
Wikipedia - Kazakhstan man-in-the-middle attack -- State-actor security exploit by the government of Kazakhstan
Wikipedia - Kentucky State Penitentiary -- Maximum security prison located at Eddyville, Kentucky
Wikipedia - Kerdasa massacre -- The killing of eleven security personnel in August 2013 in a town in Giza
Wikipedia - Keren Elazari -- Cybersecurity expert
Wikipedia - Kevin Mitnick -- American computer security consultant, author, convicted criminal, and hacker
Wikipedia - KGB -- Main security agency for the Soviet Union
Wikipedia - Kingston Penitentiary -- Canadian maximum security prison
Wikipedia - Kirstjen Nielsen -- 6th United States Secretary of Homeland Security
Wikipedia - Knesset Guard -- Israeli protective security unit
Wikipedia - KOBIL Systems -- German information security company
Wikipedia - Kr00k -- Security vulnerability affecting WiFi traffic
Wikipedia - Kratos Defense & Security Solutions -- U.S. military contractor
Wikipedia - Kyle Milliken -- American computer hacker and security consultant
Wikipedia - LAN Manager -- Depreciated Microsoft networking system with broken security
Wikipedia - Lawal Musa Daura -- Nigerian security agent
Wikipedia - Lawfare (blog) -- U.S. national security blog
Wikipedia - Lawrence Ward (serjeant-at-arms) -- British security expert
Wikipedia - Lazy FP state restore -- Intel processor security vulnerability
Wikipedia - Lebanese State Security
Wikipedia - Lee S. Wolosky -- American National Security Council staffer and lawyer
Wikipedia - LetsTrack -- India-based global security service company
Wikipedia - Lightweight Portable Security
Wikipedia - Lincoln Correctional Facility -- Minimum-security state prison for men located in New York, US
Wikipedia - Linguistic insecurity -- lack of confidence about one's way of speaking
Wikipedia - Linux Security Modules
Wikipedia - List of Afghan security forces fatality reports in Afghanistan -- Wikipedia list article
Wikipedia - List of computer security certifications
Wikipedia - List of Iraqi security forces fatality reports in Iraq -- Wikipedia list article
Wikipedia - List of private security companies -- Wikipedia list article
Wikipedia - List of security assessment tools -- Wikipedia list article
Wikipedia - List of security hacking incidents -- Wikipedia list article
Wikipedia - List of United Nations Security Council resolutions on the Nagorno-Karabakh conflict
Wikipedia - List of vetoed United Nations Security Council resolutions -- Wikipedia list article
Wikipedia - Livingston Correctional Facility -- Former medium-security state prison in New York, US
Wikipedia - Load value injection -- Microprocessor security vulnerability
Wikipedia - Local Security Authority Subsystem Service
Wikipedia - Lock (security device)
Wikipedia - Louisiana State Penitentiary -- Maximum-security prison farm in Louisiana
Wikipedia - Mac Defender -- Rogue security software
Wikipedia - MAC flooding -- Technique employed to compromise the security of network switches
Wikipedia - Magic Alex -- Greek businessman, electronics engineer and security consultant
Wikipedia - Maire O'Neill -- Northern Irish academic (engineering, information security)
Wikipedia - Man-in-the-browser -- Proxy Trojan horse that infects a web browser by taking advantage of vulnerabilities in browser security to modify web pages, modify transaction content or insert additional transactions, in a covert fashion
Wikipedia - Mantrap (access control) -- Physical security access control system
Wikipedia - Marcus Hutchins -- British IT security researcher and expert
Wikipedia - Marcy Correctional Facility -- Medium-security state prison for men located in New York, US
Wikipedia - Maritime domain awareness -- The effective understanding of anything associated with the maritime domain that could impact security, safety, economy, or environment
Wikipedia - Maritime security (USCG) -- United States Coast Guard
Wikipedia - Matthew Seiyefa -- Nigerian security agent
Wikipedia - Maximum Security (horse) -- American Thoroughbred racehorse
Wikipedia - McAfee -- American global computer security software company
Wikipedia - McCarran Internal Security Act
Wikipedia - Meltdown (security vulnerability) -- Microprocessor security vulnerability
Wikipedia - Melvin Goodman -- American national security and intelligence expert
Wikipedia - Metasploit Project -- Computer security testing tool
Wikipedia - Mexican Social Security Institute -- Mexican social welfare institution
Wikipedia - Michael Patrick Mulroy -- Senior National Security Official
Wikipedia - Michael Reiter (police officer) -- American security advisor and former Palm Beach, Florida, police chief
Wikipedia - Microsoft Baseline Security Analyzer -- Computer security evaluation tool
Wikipedia - Microsoft Forefront -- Line-of-business security software by Microsoft Corporation
Wikipedia - Microsoft Security Essentials -- Free antivirus product produced by Microsoft for the Windows operating system
Wikipedia - Mid-Orange Correctional Facility -- Former medium-security state prison for men located in New York, US
Wikipedia - Military Security Agency
Wikipedia - Military Security and Intelligence Agency
Wikipedia - Military Service for Security and Intelligence
Wikipedia - Military Staff Committee -- United Nations Security Council subsidiary body
Wikipedia - Milton Smith -- American computer security application developer, researcher, and writer
Wikipedia - Minister of Justice and Public Security -- Norwegian cabinet position
Wikipedia - Minister of National Security and Intelligence (New Zealand) -- New Zealand minister of the Crown
Wikipedia - Minister of Public Security (Vietnam) -- Government minister in Vietnam
Wikipedia - Minister of Safety and Security v Luiters (SCA) -- South African Supreme Court of Appeal case
Wikipedia - Ministry for National Security (Turkmenistan)
Wikipedia - Ministry for State Security (Soviet Union)
Wikipedia - Ministry of Defence and National Security (Fiji) -- Ministry of Fiji
Wikipedia - Ministry of Defence (Brunei) -- Bruneian government ministry responsible for military and national security
Wikipedia - Ministry of Home Security -- Former British government department
Wikipedia - Ministry of Internal Affairs (Russia) -- Russian government ministry responsible for security and law enforcement within Russian borders
Wikipedia - Ministry of Justice and Public Security (Brazil) -- Justice ministry of Brazil
Wikipedia - Ministry of Justice, Immigration and National Security (Dominica) -- Government ministry of Dominica
Wikipedia - Ministry of National Security of Azerbaijan
Wikipedia - Ministry of Public Safety and Security -- Former organization of the national government of South Korea
Wikipedia - Ministry of Security and Public Administration -- Former ministry of the national government of South Korea
Wikipedia - Ministry of Social Security (North Korea) -- North Korean Law Enforcement Agency
Wikipedia - Ministry of State Security (China)
Wikipedia - Ministry of State Security (Soviet Union)
Wikipedia - Minnesota Correctional Facility - Oak Park Heights -- Maximum security prison in Minnesota, United States
Wikipedia - Mississippi State Penitentiary -- maximum-security prison farm in Mississippi, USA
Wikipedia - Mitama Security: Spirit Busters -- Japanese manga series by Tsurun Hatomune
Wikipedia - Mobile Security Deployment -- Police unit of the US State Department
Wikipedia - Mobile security -- Security risk and prevention for mobile devices
Wikipedia - Mohammed Masoom Stanekzai -- Former head of National Directorate of Security
Wikipedia - Molly O'Toole -- American immigration and security reporter
Wikipedia - Monique Marie Chouraeshkenazi -- American-Jewish author, professor, researcher, and homeland/national security expert
Wikipedia - Month of bugs -- Strategy used by security researchers
Wikipedia - Montreux Document -- Agreement between signature countries obligations regarding private military and security companies in war zones
Wikipedia - Muhammad ibn Ishaq ibn Ibrahim -- Chief of security in Baghdad
Wikipedia - Muhammad Mustapha Abdallah -- Nigerian Professional Security Officer
Wikipedia - Multilevel security
Wikipedia - Munich Security Conference -- Annual conference on international security policy
Wikipedia - MVM, Inc. -- Private security contractor
Wikipedia - MyGate -- Security software
Wikipedia - Nadia Heninger -- American cryptographer, computer security expert
Wikipedia - Naked short selling -- Practice of short-selling a tradable asset of any kind without first borrowing the security or ensuring that the security can be borrowed
Wikipedia - National Committee on Security Affairs -- Highest policy-making authority on national security of Bangladesh
Wikipedia - National Computer Security Center
Wikipedia - National Counterintelligence and Security Center -- US federal agency
Wikipedia - National Cybersecurity Authority (Saudi Arabia) -- Cybersecurity entity of the government of Saudi Arabia
Wikipedia - National Cybersecurity Center -- US non-profit organization
Wikipedia - National Cyber Security Centre (United Kingdom) -- Organisation of the UK Government
Wikipedia - National Cyber Security Division
Wikipedia - National Cyber Security Hall of Fame
Wikipedia - National Cybersecurity Hall of Fame
Wikipedia - National Cyber Security Policy 2013
Wikipedia - National Directorate of Security
Wikipedia - National Industrial Security Academy -- CISF institute
Wikipedia - National Infrastructure Security Co-ordination Centre -- Inter-departmental centre of the UK government
Wikipedia - National Intelligence and Security Agency
Wikipedia - National Intelligence and Security Service
Wikipedia - National Organization of Social Security Claimants' Representatives -- American law association
Wikipedia - National Police Agency Security Bureau (Japan)
Wikipedia - National Public Security Force -- Police in Brazil
Wikipedia - National Security (2003 film) -- 2003 film by Dennis Dugan
Wikipedia - National Security Adviser (United Kingdom) -- Official in the British government
Wikipedia - National Security Advisor (United States) -- White House advisory position
Wikipedia - National security advisor -- Wikipedia disambiguation page
Wikipedia - National Security Affairs Cell -- Government agency of Bangladesh
Wikipedia - National Security Agency (Bahrain)
Wikipedia - National Security Agency (disambiguation)
Wikipedia - National Security Agency (Egypt) -- Egyptian security service
Wikipedia - National Security Agency (Liberia)
Wikipedia - National Security Agency (Montenegro)
Wikipedia - National Security Agency -- U.S. signals intelligence organization
Wikipedia - National Security and Homeland Security Presidential Directive -- American directive
Wikipedia - National Security Archive
Wikipedia - National Security Bureau (Republic of China)
Wikipedia - National Security Bureau (Taiwan)
Wikipedia - National Security Committee of the Republic of Kazakhstan
Wikipedia - National Security Council Intelligence Directives
Wikipedia - National Security Council (Pakistan)
Wikipedia - National Security Council (United Kingdom) -- British government Cabinet committee
Wikipedia - National Security Council -- Body responsible for coordinating policy on national security issues
Wikipedia - National Security Directive
Wikipedia - National Security Education Program -- US federal government initiative
Wikipedia - National Security Guard -- Indian counter-terrorism unit
Wikipedia - National Security Intelligence
Wikipedia - National Security Law of the People's Republic of China -- Chinese law
Wikipedia - National security of China
Wikipedia - National security of the United States
Wikipedia - National Security Operations Center
Wikipedia - National Security Service (Armenia)
Wikipedia - National Security Service (Maldives)
Wikipedia - National Security Service (Uzbekistan)
Wikipedia - National Security Space Launch -- Expendable launch system program of the United States Space Force
Wikipedia - National security -- Security and defense of a nation state
Wikipedia - Naveed Jamali -- American national security commentator
Wikipedia - NetTop -- National Security Agency project
Wikipedia - Network Lateral Movement -- Cybersecurity term for attack strategies
Wikipedia - Network Security Services
Wikipedia - Network Security Toolkit
Wikipedia - Network Security
Wikipedia - Network security -- Computer network access control
Wikipedia - New Look (policy) -- US national security policy
Wikipedia - New Zealand Security Intelligence Service
Wikipedia - NIST Cybersecurity Framework
Wikipedia - Norton Internet Security -- Computer protection software
Wikipedia - Norwegian Police Security Service
Wikipedia - NT LAN Manager -- Suite of Microsoft security protocols for authentication, integrity, and confidentiality
Wikipedia - NTLMSSP -- Binary messaging protocol used by the Microsoft Security Support Provider Interface
Wikipedia - Nuctech Company -- Chinese security products company
Wikipedia - Oak Ridge gatehouses -- Historic security checkpoints in Oak Ridge, TN, US
Wikipedia - Offensive Security Certified Professional -- Ethical hacking certification by Offensive Security
Wikipedia - Offensive Security -- American international information security company
Wikipedia - Office for Safeguarding National Security of the CPG in the HKSAR -- An organ of the Central People's Government (State Council) of China in Hong Kong
Wikipedia - Office for Transportation Security -- Agency of the Philippine government
Wikipedia - Office of National Security -- South Korean ministry
Wikipedia - Ogdensburg Correctional Facility -- Medium-security state prison for male prisoners, located in New York, US
Wikipedia - Old Age Security -- Canadian pension program
Wikipedia - Olivia Troye -- American National Security expert
Wikipedia - OneSpan -- American cybersecurity technology company
Wikipedia - ONVIF -- Industry forum facilitating the development and use of standard IP-based security products
Wikipedia - OpenBSD security features
Wikipedia - OpenBSD -- Security-focused Unix-like operating system
Wikipedia - Open security
Wikipedia - Open Source Security Foundation
Wikipedia - Open-source software security
Wikipedia - Operation Amotekun -- Security outfit in South Western, Nigeria
Wikipedia - Operation Coldstore -- Covert security operation in Singapore
Wikipedia - Operation Spectrum -- Covert security operation in Singapore
Wikipedia - Operation Vaksince -- Military operation by Macedonian security forces
Wikipedia - Oppenheimer security hearing -- 1954 United States Atomic Energy Commission investigation
Wikipedia - Organization for Security and Cooperation in Europe
Wikipedia - Organization for Security and Co-operation in Europe -- Security-oriented intergovernmental organization
Wikipedia - Orleans Correctional Facility -- Medium-security state prison for male prisoners, located in New York, US
Wikipedia - Otisville Correctional Facility -- Medium-security state prison located in New York, US
Wikipedia - Outline of computer security
Wikipedia - Paladin Group (security company) -- Southeast Asian military contractor
Wikipedia - Palestinian Naval Police -- naval component of the Palestinian National Security Forces
Wikipedia - Palestinian Preventive Security -- Security apparatus of Palestine
Wikipedia - Panamanian Public Forces -- National security force of Panama
Wikipedia - Panic selling -- The sudden, widespread selling of a security based on fear rather than reasoned analysis causing its price to drop
Wikipedia - Park police -- Type of security police
Wikipedia - Parliament Security Services -- Law enforcement agency in India
Wikipedia - Paul Erasmus -- South African Security Police officer
Wikipedia - Paul Joyal -- American security analyst
Wikipedia - Payment Card Industry Data Security Standard -- Set of security requirements for credit card processors
Wikipedia - Penetration test -- Method of evaluating computer and network security by simulating a cyber attack
Wikipedia - People's Commissariat for State Security -- Soviet secret police agency
Wikipedia - Personal Internet Security 2011 -- 21st century malware
Wikipedia - Personal security
Wikipedia - Personnel Security Research Center -- Agency of the United States Department of Defense
Wikipedia - Peter J. Brown -- American homeland security advisor
Wikipedia - Phedra Clouner -- Belgian cybersecurity professional
Wikipedia - Philippine House Committee on National Defense and Security -- Standing committee of the House of Representatives of the Philippines
Wikipedia - Philippine House Special Committee on Food Security -- Special committee of the House of Representatives of the Philippines
Wikipedia - Philippine Senate Committee on National Defense and Security, Peace, Unification and Reconciliation -- Standing committee of the Senate of the Philippines
Wikipedia - Physical information security
Wikipedia - Physical security
Wikipedia - Pierlucio Tinazzi -- Italian security guard
Wikipedia - Pinkerton (detective agency) -- Private security guard and detective agency in the United States
Wikipedia - Police and Security News -- American magazine
Wikipedia - Police/Worlds: Studies in Security, Crime and Governance -- Series of monographs
Wikipedia - Political Movement for Social Security -- Political party in Colombia
Wikipedia - Pradhan Mantri Garib Kalyan Anna Yojana -- India's food security program for the poor
Wikipedia - Presidency of State Security
Wikipedia - President's Medal for Shooting (Rhodesia) -- Medal awarded to the Champion chost of the Rhodesian Security Forces
Wikipedia - Principles of Information Security -- Textbook
Wikipedia - Private military company -- company providing armed combat or security services
Wikipedia - Progressive Internationalism: A Democratic National Security Strategy -- Proposed national security policy report
Wikipedia - Prohibited airspace -- Airspace within which flight of aircraft is not allowed, usually due to security concerns
Wikipedia - Proliferation Security Initiative -- Global initiative to stop trafficking of weapons of mass destruction
Wikipedia - Protecting American Communities Task Force -- Part of the US Department of Homeland Security
Wikipedia - Protective Security Command -- Singapore counter terrorism police unit
Wikipedia - Provable security
Wikipedia - Public Facilities Privacy & Security Act -- Act passed in the U.S. state of North Carolina in 2016
Wikipedia - Public Security Directorate -- Police agency of Jordan
Wikipedia - Public Security Intelligence Agency -- Japanese intelligence agency
Wikipedia - Public Security Section 9 -- Fictional intelligence department
Wikipedia - Public transport security
Wikipedia - Qatar State Security
Wikipedia - Q clearance -- U.S. Dept. of Energy security clearance level
Wikipedia - Quadrilateral Security Dialogue -- Informal strategic forum between the US, Japan, India and Australia
Wikipedia - Qualys -- American web security company
Wikipedia - Qubes OS -- Security-focused Linux-based operating system
Wikipedia - RAF Regiment -- Force security element of Royal Air Force
Wikipedia - Railway Nirapatta Bahini -- Security force for Bangladesh Railway
Wikipedia - Railway Protection Force -- Indian security force
Wikipedia - Rajesh De -- American lawyer, former White House Staff Secretary and General Counsel to the U.S. National Security Agency.
Wikipedia - Raymond H. A. Carter -- French soldier and security consultant
Wikipedia - Rebecca Bace -- American computer security expert
Wikipedia - Rebecca Katz -- American biosecurity scientist
Wikipedia - Rebecca Mercuri -- American expert in computer security
Wikipedia - Regions and Powers: The Structure of International Security -- 2003 book by Barry Buzan and Ole Waever
Wikipedia - Republican Guard (Ethiopia) -- Protective security unit in Ethiopia
Wikipedia - Resource Access Control Facility -- Standard security product included in the z/OS operating system
Wikipedia - Reverse-path forwarding -- Multicast routing technique to minimize loops and enhance security
Wikipedia - Ring (company) -- Home security products manufacturer
Wikipedia - Ring (computer security)
Wikipedia - Riptech -- Network security company
Wikipedia - Riverview Correctional Facility -- Medium-security state prison for male prisoners, located in New York, US
Wikipedia - Rob Bertholee -- Head of the General Intelligence and Security Service (2011-2018)
Wikipedia - Robert C. O'Brien -- US National Security Advisor
Wikipedia - Robert C. Seacord -- American computer security expert
Wikipedia - Robert N. Rose -- American cybersecurity expert
Wikipedia - Rogue security software
Wikipedia - RSA Data Security
Wikipedia - RSA Security -- American computer security company
Wikipedia - Rubicon International Services -- British security company
Wikipedia - Ruger Security-Six -- American revolver
Wikipedia - Ryan Maness -- American cybersecurity expert
Wikipedia - Sadie Creese -- British cybersecurity specialist
Wikipedia - Salah Mohammed Tubaigy -- Professor in the criminal evidence department at Naif Arab University for Security Sciences; head of the Saudi Scientific Council of Forensics
Wikipedia - Sam Curry -- American computer security researcher
Wikipedia - Same-origin policy -- Security measure for client-side scripting
Wikipedia - SAML 2.0 -- XML-based protocol for exchanging authentication and authorization identities between security domains
Wikipedia - SAML-based products and services -- List of computer security products using Security Assertion Markup Language
Wikipedia - Samsung Knox -- Security features in Samsung smartphones.
Wikipedia - Sandbox (computer security) -- Computer security mechanism for isolating running programs from each other in a highly controlled environment
Wikipedia - Sarah Gordon -- Computer security researcher
Wikipedia - SAVAK -- Secret police, domestic security and intelligence service in Iran during the reign of the Pahlavi dynasty
Wikipedia - Schizoglossia -- linguistic insecurity about one's native language
Wikipedia - Secretariat of Security and Civilian Protection (Mexico) -- Mexican cabinet-level government agency
Wikipedia - Secretary of State for Social Security (Spain) -- Official of the Ministry of Inclusion, Social Security and Migration of the Government of Spain
Wikipedia - Secure Real-time Transport Protocol -- Security profile for Real-time Transport Protocol
Wikipedia - Securitas Direct -- A security company based in Malmo, Sweden
Wikipedia - Security Account Manager -- Windows database that stores users' passwords
Wikipedia - Security Accounts Manager
Wikipedia - Security Administrator Tool for Analyzing Networks -- vulnerability scanner for networks
Wikipedia - Security alarm -- A system that detects unauthorised entry
Wikipedia - Security Analysis (book) -- 1934 book by Benjamin Graham
Wikipedia - Security and Intelligence Agency
Wikipedia - Security and Intelligence Division
Wikipedia - Security and Intelligence Services (India) -- Indian private security company
Wikipedia - Security and Maintenance -- Microsoft Windows software
Wikipedia - Security and Privacy in Computer Systems
Wikipedia - Security Assertion Markup Language -- XML-based format and protocol for exchanging authentication and authorization data between parties
Wikipedia - Security Bank -- Bank in the Philippines
Wikipedia - Security blanket
Wikipedia - Security breaches
Wikipedia - Security breach notification laws
Wikipedia - Security breach
Wikipedia - Security BSides
Wikipedia - Security bugs
Wikipedia - Security bug
Wikipedia - Security camera
Wikipedia - Security clearance -- Status granted to individuals allowing them access to classified information or to restricted areas
Wikipedia - Security company
Wikipedia - Security Consultancy Wing -- Consultancy wing of the CISF
Wikipedia - Security culture
Wikipedia - Security descriptor
Wikipedia - Security detail -- Protective team assigned to an individual or group
Wikipedia - Security Development Lifecycle
Wikipedia - Security dilemma
Wikipedia - Security engineering
Wikipedia - Security-Enhanced Linux -- Linux kernel security module
Wikipedia - Security-evaluated operating system
Wikipedia - Security (finance)
Wikipedia - Security-focused operating system
Wikipedia - Security Forces Command -- Military of Northern Cyprus
Wikipedia - Security hacker -- Computer security term; someone who hacks computer systems
Wikipedia - Security Identifier
Wikipedia - Security Industry Association -- U.S. trade association
Wikipedia - Security information and event management -- Computer security
Wikipedia - Security information management
Wikipedia - Security Information Service
Wikipedia - Security Intelligence Agency
Wikipedia - Security in the Persian Gulf Region -- 2016 book by Fatemeh Shayan
Wikipedia - Security kernel -- telecommunication term
Wikipedia - Security level -- Measure of cryptographic strength
Wikipedia - Security management
Wikipedia - Security of Information Act -- An Act of the Parliament of Canada addressing national security
Wikipedia - Security of King and Government Act 1695 -- Act of the Parliament of England
Wikipedia - Security Pacific Bank -- United States bank
Wikipedia - Security Paper Mill -- Iranian government secure paper mill
Wikipedia - Security patch
Wikipedia - Security police
Wikipedia - Security Printing and Minting Organization -- Iranian mint, subsidiary of the Central Bank of Iran
Wikipedia - Security printing
Wikipedia - Security protocol
Wikipedia - Security Service of Ukraine
Wikipedia - Security service (telecommunication)
Wikipedia - Security Support Provider Interface
Wikipedia - Security switch -- Hardware device to protect computers, laptops, smartphones and similar devices from unauthorized access or operation
Wikipedia - Security testing
Wikipedia - Security theater -- Security measures that are mostly for show
Wikipedia - Security thread -- Security feature of banknotes
Wikipedia - Security through obscurity -- Reliance on design or implementation secrecy for security
Wikipedia - Security token -- Device used to access electronically restricted resource
Wikipedia - Security+
Wikipedia - Security -- Degree of resistance to, or protection from, harm
Wikipedia - Separation of protection and security
Wikipedia - Shannon security
Wikipedia - Shawangunk Correctional Facility -- Maximum-security state prison for male prisoners, located in New York, US
Wikipedia - Shellshock (software bug) -- Security bug in the Unix Bash shell discovered in 2014
Wikipedia - Shield Group Security -- Former Iraqi security company
Wikipedia - Shin Bet -- Israel's internal security service
Wikipedia - Sicherheitspolizei -- State security police of Nazi Germany
Wikipedia - SigSpoof -- Security vulnerabilities that affected GNU Privacy Guard
Wikipedia - Silovik -- Post-communist Russian politician with background in intelligence, security or military forces
Wikipedia - Silvio Cesare -- Australian security researcher
Wikipedia - Simon (cipher) -- Family of lightweight block ciphers publicly released by the National Security Agency (NSA) in June 2013
Wikipedia - Simple Authentication and Security Layer -- Framework for authentication and data security in Internet protocols
Wikipedia - SimpliSafe -- American home security company
Wikipedia - Single-tranche CDO -- Complex derivative financial security
Wikipedia - Sing Sing -- US maximum security prison
Wikipedia - Situation Room (photograph) -- Photo of U.S. national security officials during Operation Neptune Spear
Wikipedia - Slovenian Intelligence and Security Agency
Wikipedia - Slowloris (computer security)
Wikipedia - Smack (Linux security module)
Wikipedia - SMBGhost (security vulnerability) -- security vulnerability
Wikipedia - Social Affairs and Social Security Committee (Iceland) -- Standing committee of the Icelandic parliament
Wikipedia - Social engineering (computer security)
Wikipedia - Social engineering (security) -- Psychological manipulation of people into performing actions or divulging confidential information
Wikipedia - Social Security Administration -- Independent agency of the U.S. federal government
Wikipedia - Social Security Contributions and Benefits Act 1992 -- United Kingdom legislation
Wikipedia - Social Security Death Index -- Database of American death records
Wikipedia - Social Security Disability Insurance
Wikipedia - Social security in Australia -- Welfare payments provided by the Australian Government
Wikipedia - Social security in Germany -- Includes all statutory insurance in Germany
Wikipedia - Social security in Spain
Wikipedia - Social Security Number
Wikipedia - Social security number
Wikipedia - Social Security number -- Nine-digit number issued to U.S. citizens and permanent residents
Wikipedia - Social Security Tribunal of Canada -- Canadian tribunal
Wikipedia - Social Security (United States) -- American system of social security
Wikipedia - Social security
Wikipedia - Software development security
Wikipedia - Software Guard Extensions -- Security-related instruction code processor extension
Wikipedia - Software security
Wikipedia - Solange Ghernaouti -- Swiss academic, international expert in cybersecurity and cyber defence
Wikipedia - Southern Ohio Correctional Facility -- Maximum security prison in Scioto County, Ohio, U.S.
Wikipedia - Soviet security services
Wikipedia - Special Security Directorate -- Anti-communist division of the Hellenic Gendarmerie (1929-1944)
Wikipedia - Special Security Unit -- Pakistani counter-terrorism agency
Wikipedia - Spectra Cyber Security Solutions Trophy Handicap Chase -- Steeplechase horse race in Britain
Wikipedia - Spectre (security vulnerability) -- processor security vulnerability
Wikipedia - Speculative Store Bypass -- processor security vulnerability
Wikipedia - Spoiler (security vulnerability) -- Security vulnerability on CPUs that use speculative execution
Wikipedia - Spot contract -- Contract to buy or sell a commodity, security or currency for immediate settlement
Wikipedia - Sri Lanka Civil Security Force -- National Home Guard Service
Wikipedia - Standish Maximum Correctional Facility -- Closed Michigan Department of Corrections maximum security prison in Standish, MI
Wikipedia - Stasi -- State security service of East Germany
Wikipedia - Stateful firewall -- Connection tracking network security system
Wikipedia - State Security Administration (Yugoslavia) -- Secret police organization of Yugoslavia
Wikipedia - State Security Agency (South Africa)
Wikipedia - State Security Committee of the Republic of Belarus
Wikipedia - State Security Council
Wikipedia - State Security Department of Lithuania
Wikipedia - State Security Department
Wikipedia - State Security Investigations Service -- Former security agency in Egypt
Wikipedia - State Security Service (Azerbaijan)
Wikipedia - State Security Service (Belgium)
Wikipedia - State Security Service (Nigeria)
Wikipedia - State Special Communications Service of Ukraine -- Technical security and intelligence service of Ukraine
Wikipedia - Stateville Correctional Center -- Maximum security prison near Joliet, IL
Wikipedia - Stealth Key -- 3D metal printed security key
Wikipedia - Stefano Fratepietro -- Italian IT Security Expert
Wikipedia - Stephen Kent (network security)
Wikipedia - Steve Gibson (computer programmer) -- Computer enthusiast, software engineer and security researcher
Wikipedia - Stig Bergling -- Swedish Security Service officer
Wikipedia - Sullivan Correctional Facility -- Maximum-security state prison for male prisoners, located in New York, US
Wikipedia - Supplemental Security Income -- United States government program that provides stipends to low-income people who are either aged 65 or older, blind, or disabled
Wikipedia - Surajit Kar Purkayastha -- State Security Advisor of West Bengal and former Indian police officer
Wikipedia - Susan Rice -- 24th United States National Security Advisor
Wikipedia - Swedish Military Intelligence and Security Service
Wikipedia - Swedish Security Service
Wikipedia - Systems Security Certified Practitioner
Wikipedia - Taconic Correctional Facility -- Medium-security state prison for female prisoners, located in New York, US
Wikipedia - Tahnoun bin Zayed Al Nahyan (national security advisor) -- National Security Advisor of UAE
Wikipedia - Tamperproofing -- Any technique used to hinder, deter or detect unauthorised access to a device or circumvention of a security system
Wikipedia - Tarah Wheeler -- American cybersecurity executive and diversity activist
Wikipedia - Tavis Ormandy -- English-born computer security analyst known for detecting high-risk vulnerabilities in software
Wikipedia - Template talk:Information Security Certifications
Wikipedia - Template talk:Information security
Wikipedia - Template talk:Object-capability security
Wikipedia - Tenable, Inc. -- Cybersecurity company
Wikipedia - Tennessee Department of Safety and Homeland Security -- Government agency in Tennessee, United States
Wikipedia - Terje Rod-Larsen -- Terje Rod-Larsen - Special Envoy of the Secretary-General for the implementation of Security Council resolution 1559/2004
Wikipedia - The Code On Social Security, 2020 -- Act of Indian Parliament
Wikipedia - Threat actor -- Cybersecurity term
Wikipedia - Thriller (viral video) -- 2007 viral video featuring the CPDRC Dancing Inmates of a high-security penitentiary
Wikipedia - Thunderspy -- security vulnerability
Wikipedia - Time-based One-Time Password -- Security algorithm which generates a unique value based on time
Wikipedia - Timeline of computer security hacker history
Wikipedia - Title 6 of the United States Code -- United States Code title that governs Domestic Security
Wikipedia - T. M. Jobaer -- Director General of National Security Intelligence of Bangladesh
Wikipedia - Tokenization (data security) -- Concept in data security
Wikipedia - Tokyo Metropolitan Police Department Public Security Bureau
Wikipedia - Tom Ridge -- American politician, Pennsylvania governor and first Secretary of Homeland Security
Wikipedia - Transportation Security Administration -- United States federal government agency
Wikipedia - Transport Layer Security -- Cryptographic protocols for securing data in transit
Wikipedia - Trend Micro Internet Security
Wikipedia - Trend Micro -- International cyber security company
Wikipedia - Troy Hunt -- Australian web security expert
Wikipedia - Truman National Security Project -- Left-leaning national security and leadership development organization based in Washington, D.C.
Wikipedia - Trusted computing base -- Set of all computer components critical to its security
Wikipedia - Trusty system (prison) -- Penal security system
Wikipedia - Ubong King -- Business consultant, security expert and motivational speaker
Wikipedia - UK Cyber Security Forum
Wikipedia - Ultra Electronics -- British defence, security, transport and energy company
Wikipedia - Undersecretariat of Public Order and Security -- Former governmental intelligence organization of Turkey
Wikipedia - Union security agreement -- Contractual agreement between a trade union and an employer
Wikipedia - United Nations Security Council Resolution 1002 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1030 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1035 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 10 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 11 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1203 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1244 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 12 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 133 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 134 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 135 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 136 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 137 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 138 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 139 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 13 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 140 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1419 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 141 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 142 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 143 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1448 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 144 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 145 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 146 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 147 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 148 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 149 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 14 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 150 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 151 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 152 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 153 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1541 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 154 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 155 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 156 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1574 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 157 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 158 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 159 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 15 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 160 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1651 -- UN Security Council resolution on Sudan
Wikipedia - United Nations Security Council Resolution 16 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1784 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 17 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 181
Wikipedia - United Nations Security Council Resolution 1846 -- 2008 resolution relating to piracy off the coast of Somalia
Wikipedia - United Nations Security Council Resolution 18 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1911 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1918 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 191
Wikipedia - United Nations Security Council Resolution 1921 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 195 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 19 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 20 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 21 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 22 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 2334 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 23 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 24 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 25 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 26 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 27 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 282
Wikipedia - United Nations Security Council Resolution 28 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 292 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 298 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 29 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 2 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 30 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 314 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 31 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 32 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 338 -- 1973 UN Security Council resolution calling for a ceasefire in the Yom Kippur War
Wikipedia - United Nations Security Council Resolution 34 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 36 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 37 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 392
Wikipedia - United Nations Security Council Resolution 3 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 418
Wikipedia - United Nations Security Council Resolution 435
Wikipedia - United Nations Security Council Resolution 458 -- 1979 United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 482 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 4 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 537 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 550 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 590 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 591
Wikipedia - United Nations Security Council Resolution 5 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 6 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 781 -- October 1992 resolution establishing a no-fly zone in Bosnia and Herzegovina
Wikipedia - United Nations Security Council Resolution 786 -- November 1992 resolution increasing UNPROFOR monitoring of a no-fly zone in Bosnia and Herzegovina
Wikipedia - United Nations Security Council Resolution 7 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 80 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 815 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 816 -- March 1993 resolution extending and allowing UNPROFOR enforcement of a no-fly zone in Bosnia and Herzegovina
Wikipedia - United Nations Security Council Resolution 822 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 836 -- June 1993 resolution allowing UNPROFOR force to protect "safe areas" in Bosnia and Herzegovina
Wikipedia - United Nations Security Council Resolution 856 -- 1993 UN Security Council resolution on Liberia
Wikipedia - United Nations Security Council Resolution 862 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 881 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 8 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 914 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 989 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 9 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council resolution -- UN resolution adopted by the 15 members of the Security Council
Wikipedia - United Nations Security Council -- One of the six principal organs of the UN, charged with the maintenance of international security
Wikipedia - United States Army Security Agency
Wikipedia - United States Department of Homeland Security -- United States federal department
Wikipedia - United States Department of Justice National Security Division
Wikipedia - United States Homeland Security Council -- U.S. federal executive public safety, immigration and disaster relief forum
Wikipedia - United States House Committee on Homeland Security -- Standing committee of the United States House of Representatives
Wikipedia - United States National Security Council -- U.S. federal executive national security and intelligence forum
Wikipedia - United States Penitentiary, Big Sandy -- High-security federal prison in Kentucky
Wikipedia - United States Penitentiary, Coleman -- High-security United States federal prison in Florida
Wikipedia - United States Penitentiary, Lee -- US high-security federal prison in Virginia
Wikipedia - United States Penitentiary, Lewisburg -- High-security US federal prison for male inmates
Wikipedia - United States Penitentiary, Terre Haute -- High-security, federal prison in Indiana, US
Wikipedia - United States Penitentiary, Thomson -- Maximum security federal prison in Illinois
Wikipedia - United States Secretary of Homeland Security -- head of the United States Department of Homeland Security
Wikipedia - United States Senate Committee on Homeland Security and Governmental Affairs -- Standing committee of the United States Senate
Wikipedia - United States Senate Subcommittee on Internal Security -- Former U.S. Senate subcommittee
Wikipedia - Uniting for Consensus -- Group of countries opposing UN Security Council expansion
Wikipedia - Universal basic services -- Social-Security system
Wikipedia - Universal Credit -- British social security benefit
Wikipedia - University of Belgrade Faculty of Security Studies -- Independent faculty of the University of Belgrade
Wikipedia - Unix security
Wikipedia - UN Security Council
Wikipedia - Upstate Correctional Facility -- Maximum-security state prison for male prisoners, located in New York, US
Wikipedia - Upstream collection -- Term used by the National Security Agency (NSA) of the United States
Wikipedia - Uptane -- Software security framework
Wikipedia - US Department of Homeland Security
Wikipedia - Vappala Balachandran -- Indian national security intelligence specialist (born 1937)
Wikipedia - Veracode -- Application security company
Wikipedia - Vietnam People's Public Security
Wikipedia - Vigipirate -- French national security alert system
Wikipedia - Viktor Cherkesov -- Russian security services official
Wikipedia - Village guard system -- Paramilitary security guards in Turkey
Wikipedia - Virtual security switch
Wikipedia - VirusTotal -- Cybersecurity website owned by Alphabet Inc.
Wikipedia - Vulnerability database -- Computer security vulnerabilities
Wikipedia - Wallkill Correctional Facility -- Medium-security state prison, located in New York, US
Wikipedia - Walt Whitman Rostow -- American economist, political theorist and National Security Advisor (1916-2003)
Wikipedia - War bond -- Government debt security issued to finance military operations and other wartime expenditure
Wikipedia - Wardialing -- Computer security attack via dial-up modems
Wikipedia - Warshipping -- Computer security attack via package delivery
Wikipedia - Washington Correctional Facility -- Medium-security state prison for male prisoners, located in New York, US
Wikipedia - Water security
Wikipedia - Web API security
Wikipedia - Web application firewall -- HTTP specific network security system
Wikipedia - Web application security
Wikipedia - Weighted average cost of capital -- Rate that a company is expected to pay on average to all its security holders to finance its assets; firmM-bM-^@M-^Ys cost of capital
Wikipedia - Wende Correctional Facility -- Maximum-security state prison, located in New York, US
Wikipedia - White hat (computer security) -- Computer hacker who hacks ethically (white hat hacker)
Wikipedia - White House Police Force -- Defunct American security police force
Wikipedia - Wi-Fi Protected Access -- Security protocol to secure wireless computer networks
Wikipedia - Wikimedia Foundation v. NSA -- Lawsuit against the U.S. National Security Agency
Wikipedia - William Evanina -- Director of the National Counterintelligence and Security Center
Wikipedia - William L. Uanna -- United States security expert
Wikipedia - Windows Live OneCare -- Discontinued Microsoft security software
Wikipedia - Window Snyder -- Computer security expert
Wikipedia - Wired Equivalent Privacy -- Deprecated security algorithm for wireless networks
Wikipedia - Wireless security
Wikipedia - Wissam Eid -- Lebanese security official
Wikipedia - Woodbourne Correctional Facility -- Medium-security state prison, located in New York, US
Wikipedia - Worshipful Company of Security Professionals -- Livery company of the City of London
Wikipedia - Wyoming Correctional Facility -- Medium-security state prison for male prisoners, located in New York, US
Wikipedia - Xavier's Security Enforcers -- Fictional comic book group
Wikipedia - XSS worm -- Malicious payload that breaches browser security
Wikipedia - Xtralis -- Fire safety and physical security equipment manufacturer
Wikipedia - Xu Yongyue -- Chinese politician and Minister of State Security
Wikipedia - Y-12 National Security Complex -- US Energy Dept facility in Oak Ridge, Tennessee
Wikipedia - Yosemite bowline -- Loop knot often perceived as having better security than a bowline
Wikipedia - Yusuf Magaji Bichi -- Nigerian security agent head
Janet Napolitano ::: Born: November 29, 1957; Occupation: Former United States Secretary of Homeland Security;
Brent Scowcroft ::: Born: March 19, 1925; Occupation: Former National Security Advisor;
Zbigniew Brzezinski ::: Born: March 28, 1928; Occupation: Former National Security Advisor;
Michael Chertoff ::: Born: November 28, 1953; Occupation: Former United States Secretary of Homeland Security;
James L. Jones ::: Born: December 19, 1943; Occupation: Former United States National Security Advisor;
Sandy Berger ::: Born: October 28, 1945; Died: December 2, 2015; Occupation: Former United States National Security Advisor;
Stephen Hadley ::: Born: February 13, 1947; Occupation: Former National Security Advisor;
Jeh Johnson ::: Born: September 11, 1957; Occupation: United States Secretary of Homeland Security;
Henry A. Kissinger ::: Born: May 27, 1923; Occupation: Former National Security Advisor;
https://www.goodreads.com/book/show/1072633.Mastering_SQL_Server_2000_Security
https://www.goodreads.com/book/show/1085874.Safety_And_Security_For_Women_Who_Travel
https://www.goodreads.com/book/show/10915491-the-search-for-financial-security
https://www.goodreads.com/book/show/11044896-applied-cryptography-and-network-security
https://www.goodreads.com/book/show/11044899-applied-cryptography-and-network-security
https://www.goodreads.com/book/show/113638.Homeland_Insecurity
https://www.goodreads.com/book/show/1227169.Regional_Security_In_The_Middle_East
https://www.goodreads.com/book/show/1268272.The_New_Challenges_to_International_National_and_Human_Security_Policy
https://www.goodreads.com/book/show/12735669-german-military-reform-and-european-security
https://www.goodreads.com/book/show/12827518-national-security
https://www.goodreads.com/book/show/1284342.Social_Security_and_Medicare
https://www.goodreads.com/book/show/1303564.Maximum_Security
https://www.goodreads.com/book/show/13124510-the-wisdom-of-insecurity
https://www.goodreads.com/book/show/13510071-her-personal-security
https://www.goodreads.com/book/show/13688624-social-security-reform
https://www.goodreads.com/book/show/1376155.Issues_in_Privatizing_Social_Security
https://www.goodreads.com/book/show/1412956.The_Social_Security_Swindle
https://www.goodreads.com/book/show/141381.Administrating_Web_Servers_Security_Maintenance_Interactive_Workbook
https://www.goodreads.com/book/show/14611427-who-watches-the-watchmen-the-conflict-between-national-security-and-fre
https://www.goodreads.com/book/show/15864492-promoting-international-energy-security
https://www.goodreads.com/book/show/16010271-browser-security-handbook
https://www.goodreads.com/book/show/16182409-cybersecurity-and-cyberwar
https://www.goodreads.com/book/show/17349435-social-security-made-simple
https://www.goodreads.com/book/show/17628197-modern-security-analysis
https://www.goodreads.com/book/show/17716318-security
https://www.goodreads.com/book/show/17723970-quality-reliability-security-and-robustness-in-heterogeneous-networks
https://www.goodreads.com/book/show/17946215-national-security-and-free-speech
https://www.goodreads.com/book/show/17978391-russian-security-and-paramilitary-forces-since-1991
https://www.goodreads.com/book/show/18210740-national-insecurity
https://www.goodreads.com/book/show/18270185-monster-security-services
https://www.goodreads.com/book/show/19035718-modern-security-analysis
https://www.goodreads.com/book/show/19075285-the-journal-of-international-security-affairs-spring-2010
https://www.goodreads.com/book/show/192218.Paul_H_Nitze_On_National_Security_And_Arms_Control
https://www.goodreads.com/book/show/19247148-cybersecurity-and-cyberwar
https://www.goodreads.com/book/show/19292351-a-traveler-s-guide-to-cyber-security
https://www.goodreads.com/book/show/19513855-maximum-insecurity
https://www.goodreads.com/book/show/20310066-false-security
https://www.goodreads.com/book/show/203409.Security_Analysis
https://www.goodreads.com/book/show/20488957-the-cloud-security-rules
https://www.goodreads.com/book/show/20609832-basic-politics-of-movement-security
https://www.goodreads.com/book/show/20665848-emergency-as-security
https://www.goodreads.com/book/show/20868014-the-security-of-water-food-energy-and-liveability-of-cities
https://www.goodreads.com/book/show/21342827-the-journal-of-international-security-affairs-fall-winter-2012
https://www.goodreads.com/book/show/21413220-engineering-security
https://www.goodreads.com/book/show/2169145.Cryptographic_Security_Architecture
https://www.goodreads.com/book/show/21864633-offender-motivation-and-values-in-international-security
https://www.goodreads.com/book/show/22402620-in-security-2-1
https://www.goodreads.com/book/show/23461132-china-and-cybersecurity
https://www.goodreads.com/book/show/23461770-comptia-security
https://www.goodreads.com/book/show/2380307.Security_Without_War
https://www.goodreads.com/book/show/23822295-access-denied-for-reasons-of-national-security
https://www.goodreads.com/book/show/23967329-security
https://www.goodreads.com/book/show/24179027-healthcare-information-security-and-privacy
https://www.goodreads.com/book/show/24426675-social-security-works
https://www.goodreads.com/book/show/26083308.The_DevOps_Handbook_How_to_Create_World_Class_Agility__Reliability__and_Security_in_Technology_Organizations
https://www.goodreads.com/book/show/26457475-security-and-privacy-in-social-networks
https://www.goodreads.com/book/show/26795350-the-maximum-security-book-club
https://www.goodreads.com/book/show/27112550-human-security-and-philanthropy
https://www.goodreads.com/book/show/2719573-social-security-and-the-golden-age
https://www.goodreads.com/book/show/276808.Essential_PHP_Security
https://www.goodreads.com/book/show/2792182-information-security
https://www.goodreads.com/book/show/28021615-india-s-naval-strategy-and-asian-security
https://www.goodreads.com/book/show/28198102-international-security-40
https://www.goodreads.com/book/show/28433.Surprise_Security_and_the_American_Experience
https://www.goodreads.com/book/show/29369848-ccie-security-written-exam-guide
https://www.goodreads.com/book/show/29895091-agile-application-security
https://www.goodreads.com/book/show/30171770-international-security-40
https://www.goodreads.com/book/show/30245539-the-prepper-s-guide-to-disaster-water-security
https://www.goodreads.com/book/show/30354093-security-operations-center-analyst-guide
https://www.goodreads.com/book/show/30386597-cybersecurity-in-the-european-union
https://www.goodreads.com/book/show/30416847-security-operations-center---analyst-guide
https://www.goodreads.com/book/show/30537669-racy-rocket-adventures-short-security-level-2
https://www.goodreads.com/book/show/30821483-harry-the-information-security-hero
https://www.goodreads.com/book/show/3135001-the-rise-and-falling-out-of-saint-leslie-of-security
https://www.goodreads.com/book/show/31748904-applied-cryptography-and-network-security
https://www.goodreads.com/book/show/31868076-false-security
https://www.goodreads.com/book/show/32056020-cracking-security-misconceptions
https://www.goodreads.com/book/show/32062692.Bring_It__Sabel_Security__2__Trench_Coats__1_6_
https://www.goodreads.com/book/show/32178989-aws-security-best-practices
https://www.goodreads.com/book/show/3268675-security-engineering
https://www.goodreads.com/book/show/32955504-security-operations-center-guidebook
https://www.goodreads.com/book/show/33245246.Elizabeth_I_A_Study_in_Insecurity
https://www.goodreads.com/book/show/3346158-schneier-on-security
https://www.goodreads.com/book/show/3425426-visible-ops-security
https://www.goodreads.com/book/show/34395490-social-security-made-simple
https://www.goodreads.com/book/show/345074.Body_of_Secrets_Anatomy_of_the_Ultra_Secret_National_Security_Agency_from_the_Cold_War_Through_the_Dawn_of_a_New_Century
https://www.goodreads.com/book/show/34802097-science-fiction-futures-marine-corps-security-environment-forecast
https://www.goodreads.com/book/show/35294023-false-security-and-false-hope
https://www.goodreads.com/book/show/355186.Security_Warrior
https://www.goodreads.com/book/show/35585306.Beyond_Scarcity_Water_Security_in_the_Middle_East_and_North_Africa
https://www.goodreads.com/book/show/35703663.Element_42__Sabel_Security__3_
https://www.goodreads.com/book/show/36409874-use-of-cyber-threat-intelligence-in-security-operation-center
https://www.goodreads.com/book/show/38479271-financial-decision-making-and-retirement-security-in-an-aging-world
https://www.goodreads.com/book/show/38731621-white-hat-security-series---boxed-set
https://www.goodreads.com/book/show/3967971-encyclopedia-of-united-states-national-security
https://www.goodreads.com/book/show/39732639-security-operations-center---siem-use-cases-and-cyber-threat-intelligenc
https://www.goodreads.com/book/show/39830518-security-operations-center---siem-use-cases-and-cyber-threat-intelligenc
https://www.goodreads.com/book/show/40092288-use-of-cyber-threat-intelligence-in-security-operations-center
https://www.goodreads.com/book/show/40146997-windows-server-2016-security-certificates-and-remote-access-cookbook
https://www.goodreads.com/book/show/40203719-windows-server-2016-security-certificates-and-remote-access-cookbook
https://www.goodreads.com/book/show/40233349-dc-security
https://www.goodreads.com/book/show/40969203-shards-of-love-a-safe-security-trilogy
https://www.goodreads.com/book/show/41827850-mac-security-boxset
https://www.goodreads.com/book/show/43464864.Overture__North_Security___1_
https://www.goodreads.com/book/show/4371438-access-denied-for-reasons-of-national-security
https://www.goodreads.com/book/show/43832227-technology-and-national-security
https://www.goodreads.com/book/show/44166651-technology-and-national-security
https://www.goodreads.com/book/show/44491834-exam-ref-ms-500-microsoft-365-security-administration
https://www.goodreads.com/book/show/4477532-social-security
https://www.goodreads.com/book/show/45420191-international-security-43
https://www.goodreads.com/book/show/45486680-1080p-fhd-wifi-ip-camera-wireless-2-4-g-wifi-security-panoramic-viewing
https://www.goodreads.com/book/show/45712718-security-operations-in-practice
https://www.goodreads.com/book/show/4735754-global-insecurity
https://www.goodreads.com/book/show/4873951-environment-and-security
https://www.goodreads.com/book/show/4935169-the-essence-of-security
https://www.goodreads.com/book/show/551520.The_Wisdom_of_Insecurity
https://www.goodreads.com/book/show/6515342-security
https://www.goodreads.com/book/show/6817610-so-long-insecurity
https://www.goodreads.com/book/show/6818096-ufos-and-the-national-security-state-2
https://www.goodreads.com/book/show/6854774-computer-security-esorics-2009
https://www.goodreads.com/book/show/7400142-corruption-global-security-and-world-order
https://www.goodreads.com/book/show/745668.Saving_Social_Security
https://www.goodreads.com/book/show/7930544-the-future-of-transatlantic-security-relations-colloquium-report
https://www.goodreads.com/book/show/8085736-security-analysis-part-vii---additional-aspects-of-security-analysis-d
https://www.goodreads.com/book/show/8220181-security-analysis-part-i---survey-and-approach
https://www.goodreads.com/book/show/8224907-security-analysis-part-iv---theory-of-common-stock-investment-the-divi
https://www.goodreads.com/book/show/8230173-taxation-incomplete-markets-and-social-security
https://www.goodreads.com/book/show/8238560-security-analysis-part-iii---senior-securities-with-speculative-feature
https://www.goodreads.com/book/show/8256199-security-analysis-part-vi---balance-sheet-analysis-implications-of-ass
https://www.goodreads.com/book/show/8396109-security-analysis-part-ii---fixed-value-investments
https://www.goodreads.com/book/show/8396111-security-analysis-part-v---analysis-of-the-income-account-the-earnings
https://www.goodreads.com/book/show/8454578-preparing-the-u-s-army-for-homeland-security
https://www.goodreads.com/book/show/8548281-the-wisdom-of-insecurity
https://www.goodreads.com/book/show/875977.Environmental_Scarcity_And_Global_Security
https://www.goodreads.com/book/show/8777674-security-analysis
https://www.goodreads.com/book/show/8939563-alternative-security
https://www.goodreads.com/book/show/9025002-the-physics-of-space-security
https://www.goodreads.com/book/show/904656.Uncle_Eric_Talks_About_Personal_Career_And_Financial_Security
https://www.goodreads.com/book/show/9247661-modern-personal-security-solutions
https://www.goodreads.com/book/show/951969.Social_Security
https://www.goodreads.com/book/show/98887.UFOs_and_the_National_Security_State_1
https://www.goodreads.com/book/show/990721.Security_First
https://www.goodreads.com/author/show/14907028.Homeland_Security_Committee_Homeland_Security_Committee
https://familypedia.wikia.org/wiki/Forum:Social_Security_Numbers
https://familypedia.wikia.org/wiki/Social_Security_number
https://familypedia.wikia.org/wiki/Template:UN_Security_Council
https://itlaw.wikia.org/wiki/Category:Cybersecurity
https://itlaw.wikia.org/wiki/Category:Legislation-Australia-Security
https://itlaw.wikia.org/wiki/Category:Legislation-EU-Security
https://itlaw.wikia.org/wiki/Category:Legislation-U.K.-Security
https://itlaw.wikia.org/wiki/Category:Security
https://itlaw.wikia.org/wiki/Computer_Security:_Hackers_Penetrate_DOD_Computer_Systems
https://itlaw.wikia.org/wiki/Hackers_Wanted:_An_Examination_of_the_Cybersecurity_Labor_Market
https://itlaw.wikia.org/wiki/Information_Security:_Computer_Hacker_Information_Available_on_the_Internet
https://itlaw.wikia.org/wiki/Security
https://military.wikia.org/wiki/Anti-terrorism,_Crime_and_Security_Act_2001
https://military.wikia.org/wiki/Boeing_Defense,_Space_&_Security
https://military.wikia.org/wiki/Collective_security
https://military.wikia.org/wiki/Communications_Security_Establishment_Canada
https://military.wikia.org/wiki/Federal_Security_Service
https://military.wikia.org/wiki/File:Pentagon_Security_Camera_1.ogv
https://military.wikia.org/wiki/International_Security_Assistance_Force
https://military.wikia.org/wiki/Kosovo_Security_Force
https://military.wikia.org/wiki/List_of_Afghan_security_forces_fatality_reports_in_Afghanistan
https://military.wikia.org/wiki/Minister_for_International_Security_Strategy
https://military.wikia.org/wiki/National_security
https://military.wikia.org/wiki/National_Security_Act_of_1947
https://military.wikia.org/wiki/Palestinian_National_Security_Forces
https://military.wikia.org/wiki/Strategic_Defence_and_Security_Review_2015
https://military.wikia.org/wiki/United_Nations_Security_Council
https://military.wikia.org/wiki/United_Nations_Security_Council_Resolution_1368
https://military.wikia.org/wiki/United_States_National_Security_Council
https://religion.wikia.org/wiki/Community_Security_Trust
https://religion.wikia.org/wiki/Hyperdispensationalism#Security_of_Salvation
https://religion.wikia.org/wiki/United_Nations_Security_Council_Resolution_271
dedroidify.blogspot - obama-calls-for-domestic-security-force
dedroidify.blogspot - daily-conspiracy-security
wiki.auroville - Auroville_Safety_and_Security_Team
Psychology Wiki - National_security
https://tvtropes.org/pmwiki/pmwiki.php/ComicStrip/InSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Fanfic/Security
https://tvtropes.org/pmwiki/pmwiki.php/Film/JointSecurityArea
https://tvtropes.org/pmwiki/pmwiki.php/Film/NationalSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Literature/MagicalSecurityTaskforce
https://tvtropes.org/pmwiki/pmwiki.php/Literature/TheStrangestSecurityTapeIveEverSeen
https://tvtropes.org/pmwiki/pmwiki.php/Main/ClairvoyantSecurityForce
https://tvtropes.org/pmwiki/pmwiki.php/Main/DestroyTheSecurityCamera
https://tvtropes.org/pmwiki/pmwiki.php/Main/GeorgeJetsonJobSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Main/InnSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Main/InsecurityCamera
https://tvtropes.org/pmwiki/pmwiki.php/Main/InsecuritySystem
https://tvtropes.org/pmwiki/pmwiki.php/Main/MagicalSecurityCam
https://tvtropes.org/pmwiki/pmwiki.php/Main/OddlyOvertrainedSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Main/OverreactingAirportSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Main/SecurityBlanket
https://tvtropes.org/pmwiki/pmwiki.php/Main/SecurityCling
https://tvtropes.org/pmwiki/pmwiki.php/Main/SelfDestructingSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Main/SwissCheeseSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Main/UltimateJobSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Main/UselessSecurityCamera
https://tvtropes.org/pmwiki/pmwiki.php/Main/VetinariJobSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Manga/MitamaSecuritySpiritBusters
https://tvtropes.org/pmwiki/pmwiki.php/Music/Security
https://tvtropes.org/pmwiki/pmwiki.php/Pantheon/MaximumSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Series/BorderSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Series/Insecurity
https://tvtropes.org/pmwiki/pmwiki.php/VideoGame/FiveNightsAtFreddysSecurityBreach
http://tvtropes.org/pmwiki/pmwiki.php/Tropers/HairSecuritySchool
https://en.wikiquote.org/wiki/File:20031025_Palestinian_at_Israeli_security_fence_by_Olivia_Heussler.jpg
https://en.wikiquote.org/wiki/File:Signing_Of_The_Social_Security_Act.jpg
https://en.wikiquote.org/wiki/File:UN_security_council_2005.jpg
https://en.wikiquote.org/wiki/Insecurity
https://en.wikiquote.org/wiki/Job_security
https://en.wikiquote.org/wiki/National_security
https://en.wikiquote.org/wiki/Security
https://en.wikiquote.org/wiki/Security_alarm
https://en.wikiquote.org/wiki/Social_security
https://en.wikiquote.org/wiki/Social_Security_(United_States)
https://en.wikiquote.org/wiki/The_Production_of_Security
The A-Team (1983 - 1987) - In 1972, a crack commando unit was sent to prison by a military court for a crime they didnt commit. These men promptly escaped from a maximum-security stockade to the Los Angeles underground. Today, still wanted by the government, they survive as soldiers of fortune. If you have a problem, if no o...
Magnum, P.I. (1980 - 1988) - After leaving Naval Intelligence, the laid back Thomas Magnum III, struck a deal with the millionaire play boy author Robin Masters. Robin owned a rather large estate in Hawaii and Magnum moved into the guest house for free in exchange for running a series of security checks on the estate, property...
Yo Yogi! (1991 - 1992) - Yo Yogi! featured the gang as young teenagers (Yogi, Boo Boo, Huck, Snagglepuss & Cindy). They worked for the LAF (Lost & Found) detective agency which was run by head security agent John Smith (later the park ranger), over @ Jellystone Mall (owned by Doggie Daddy & Augie Doggie).
It Takes a Thief (1968 - 1970) - It Takes A Thief was an intrigue TV series about an international cat burglar who got caught but was given his freedom provided he worked with a government security agency to steal from those who would threaten our nation's security.
Half Nelson (1985 - 1985) - Joe Pesci plays Rocky Nelson who was a former NY cop and now works as a security guard.
Karneval (2013 - 2013) - Nai searches for someone important to him, with only an abandoned bracelet as a clue. Gareki steals and pick-pockets to get by from day to day. The two meet in a strange mansion where they are set-up, and soon become wanted criminals by military security operatives. When Nai and Gareki find themselv...
Lauras Stern (Laura's Star) (2002 - 2011) - German animated television series. One day Laura helped a fallen star and since that day, the star has been her own special friend. In a witty and poetic fashion, he shows her how to dream with your eyes open, and how to overcome fear and insecurity.
Elfen Lied (2004 - 2004) - Diclonious are a breed of artificial superhumans. They look identical to most humans, except for their horns sticking out of their heads, pink hair in females...and an extremely deadly telekinetic power. One of them, Lucy, breaks free from a research lab and escapes her security compound. After...
Palace Guard (1991 - 1992) - After three years in prison, legendary jewel thief Tommy Logan (played by D.W. Moffett) is released on parole and hired, because of his criminal expertise, as a security expert by Arturo Taft (Tony LoBianco), owner of the world wide ultra luxurious Palace Hotel chain.
Lost (2004 - 2010) - The survivors of Oceanic Flight 815 were 1,000 miles off course when they crashed on a lush, mysterious island. Each person possesses a shocking secret, but they've got nothing on the island itself, which harbors a monstrous security system, a series of underground bunkers and a group of violent sur...
Inspector Gadget(1999) - Matthew Broderick stars in this live-action adaptation of the popular animated series. When a well-meaning but overly trusting security guard is wounded in an explosion created by the evil Dr. Claw, a beautiful scientist named Brenda (Joely Fisher) takes him under her wing and turns him into a crime...
Chopping Mall(1986) - A group of teenagers that work at the mall all get together for a late night party in one of the stores. When the mall accidently goes on lock down before they can get out, The robot security system activates after a malfunction and goes on a killing spree. One by one the three bots try to rid the m...
Escape from New York(1981) - In the year 1997 New York city has been turned into a maximum security prison. The President of the States plane has crashed in the Manhattan area. It's up to US veteran & bank robber Snake Plissken to get him back t
First Kid(1996) - Some say that to be the leader of a country is one of the loneliest jobs in the world. But being the child of a world leader can be doubly so. Constantly surrounded by security officers, restricted in movements and having almost every waking moment carefully monitored makes normalcy an impossibility...
The Silence of the Lambs(1991) - FBI trainee Clarice Starling ventures into a maximum-security asylum to pick the diseased brain of Hannibal Lecter, a psychiatrist turned homicidal cannibal. Starling needs clues to help her capture a serial killer. Unfortunately, her Faustian relationship with Lecter soon leads to his escape, and n...
U.S. Marshals(1998) - Tommy Lee Jones returns as United States Marshall Sam Gerard, the role that earned him an Academy Award, in this sequel to the 1993 blockbuster The Fugitive. Gerard has been assigned to escort a federal prisoner to a maximum security prison in Missouri. On the same flight is Mark Sheridan (Wesley Sn...
Armed and Dangerous(1986) - Frank Dooley is an ex-cop, thrown out of the force after being framed by corrupt colleagues. Herman Kane is an out of work attorney who quit because he lost his nerve. Both men turn to a private security firm to find employment, but everything goes quickly wrong when the first warehouse they guard g...
Sneakers(1992) - Martin Bishop is the head of a group of experts who specialise in testing security systems. When he is blackmailed by Government agents into stealing a top secret black box, the team find themselves embroiled in a game of danger and intrigue. After they recover the box, they discover that it has the...
Private Resort(1985) - Jack (Depp) and his buddy ben (Morrow) check in at a posh Florida resort, planning to spend every hour in hot pursuit of gorgeous babes. But their plans hit a major detour when they try to bed the wife of a conniving jewel theif (Ector Elizondo). They'll have to outsmart him, a nasty security guard...
Passenger 57(1992) - John Cutter is a security expert, who is presently still mourning the death of his wife. His friend, who works for an airline, offers him the job of chief of security, which he accepts. He is then being flown to L.A. for the company's annual meeting, where he will be introduced as the new Chief of S...
Shampoo(1975) - George Roundy is a Beverly Hills hairstylist whose uncontrolled libido stands between him and his ambitions. He wants the security of a relationship. He wants to be a hairdressing "star" and open his own salon. But the fact that he beds down with the wife, daughter and mistress of a potential backer...
Club Fed(1990) - A beautiful,yet clumsy,murder suspect(Judy Landers) is sent to a posh,minimum security resort/prison where she gets framed for embezzlement.It is up to an, equally clumsy, FBI agent(Lance Kinsey)to prove her innocence.
Virus(1996) - Former football player Brian Bosworth headlines this ecologically conscious direct-to-video actioner. He plays a member of the presidential security staff who with his lovely lady partner has been dispatched to Yellowstone Park to save the planet from deadly biological weapons that were accidentally...
Bloodfist IV: Die Trying(1992) - In this martial arts thriller, a repo man accidentally brings back the wrong car and finds himself in deep trouble with the LAPD, both national security organizations, and a ring of international gun runners. When someone kidnaps the repo man's daughter, he uses his fists of fury to get bloody reven...
Bloodfist III: Forced to Fight(1992) - Action hero Don "The Dragon" Wilson appears in this third, quickie sequel to Bloodfist. Wilson plays Jimmy Boland, who has been sentenced to a California maximum-security prison for a murder that he didn't commit. When he sees some black prison inmates sodomizing his friend, he flies into a rage and...
Tapeheads(1988) - In this high-energy satire of the music biz, Ivan Alexov (John Cusack) and Josh Tager (Tim Robbins) lose their jobs as security guards, and they decide to start their own video production company. Their first gigs are less than inspiring, including a rappin' commercial for a chicken-and-waffle place...
New World Disorder(1999) - In this high-tech thriller, David Marx (Rutger Hauer), a take-no-prisoners homicide detective, is teamed with computer expert Kris Paddock (Tara Fitzgerald) to track down Kurt Bishop (Andrew McCarthy), a software pirate who has been trying to steal a valuable encryption security program. Bishop will...
The Set Up(1995) - When Charlie Thorpe, an MIT-educated security systems expert and convicted cat-burglar, gets out of prison, he promises himself to go straight. Yet when a psycho he knew from prison kidnaps his girlfriend, he is forced back into the crime game.
Sniper(1993) - In this fast-paced military thriller, Tom Berenger is Thomas Beckett, a tough, grizzled, U.S. Marine Corps veteran sharpshooter who goes through target-spotter partners faster than bullets on his ultra-dangerous missions. The National Security Council secretly assigns Beckett to assassinate a Panama...
Fear of a Black Hat(1994) - Basically a rap version of "This is Spinal Tap." It is set around a fictitious rap group called NWH. The main characters in this moc-umentary include Tone Def, Tasty Taste, and Ice Cold. Hilarity ensues as they battle security guards, and a rap group call R.A.V, or Rappers Against Violence, in a sch...
Stir Crazy(1980) - Two guys:Skip Donahue(Gene Wilder) and Harry Monroe (Richard Pryor) are framed for a bank robbery they did not commit and are sentenced to 125 years in prison.Now they must learn to survive in the harsh world of a maximum-security prison while their lawyers try to get them off.
Man Trouble(1992) - Actor Jack Nicholson, writer Carole Eastman, and director Bob Rafelson re-team 22 years after their classic Five Easy Pieces, for this romantic comedy. Nicholson plays Harry Bliss, a small potatoes security expert unhappily married to a Japanese woman (he sarcastically calls her Iwo Jima during ther...
Crimewave(1985) - Two crazy exterminators(Paul Smith and Brion James)kill the owners of security company,and a loser(Reed Birney)takes the blame for it.
The Stud(1978) - Fontaine Khaled is the wife of a wealthy but boring businessman. She spends his money on her nightclub, the hobo, and partying. She hires a manager, Tony, to run her club, but it is understood that his job security is dependent on him satisfying her nymphomaniac demands. Tony loses interest in Fonta...
13 Hours: The Secret Soldiers of Benghazi(2016) - It is September 11, 2012. The Islamic militants are attacking the U.S Consultate located in Benghazi, Libya, causing the fatalities of J. Christopher Stevens and Sean Smith, an officer for the Foreign Service. Nearly under a mile away, members of the Annex Security Team (James Badge Dale, John Krasi...
Ghost in the Shell: The New Movie(2015) - In the year 2027, a year following the end of the non-nuclear World War IV, a bomb has gone off in Newport City, killing a major arms dealer who may have ties with the mysterious 501 Organization. Public Security official Daisuke Aramaki hires full-body cyber prosthesis user and hacker extraordinair...
Looney Tunes: Back In Action(2003) - Tired of playing Bugs Bunny's second fiddle, Daffy Duck demands his own movie only to be fired from Warner Bros. Studios. Security guard DJ Drake, son of an action movie star, is fired when trying to banish him from the studio. Later, Bugs' director Kate Houghton is fired for removing Daffy Duck. Th...
Fit To Kill(1993) - Chinese businessman Chang owns the fabulous Alexa diamond, stolen from Russia during WWII. He intends to return it to Russia during a gala dinner, but the diamond is stolen by Kane, assisted by his lethal and seductive partner Blu Steele. The Agency, in charge of security at the event, go into high...
Bad Santa(2003) - Willie T. Stokes and Marcus are professional heistmen, that take on the Santa Claus routine for the children at a different shopping mall every year as a front for the opportunity to disable the mall security system, clean out the safe, and then flee on Christmas Eve. Willie is an alcoholic, a sex a...
The Osterman Weekend(1983) - The host of an investigative news show is convinced by the CIA that the friends he has invited to a weekend in the country are engaged in a conspiracy that threatens national security in this adaptation of the Robert Ludlum novel.
Two Hands(1999) - A security guard who is employed at a Sydney strip club is offered a job as a courier by a local gangster in which he is to deliver $10,000 to a woman, only to have the money stolen from him by two street children while he is at the beach. He must then somehow find a way to get the money back.
The Protector(1985) - Billy Wong is a New York City cop whose partner is gunned down during a robbery. Billy and his new partner, Danny Garoni, are working security at a fashion show when a wealthy man's daughter, Laura Shapiro, is kidnapped. The Federal authorities suspect that Laura's father is involved with Mr. Ko, a...
Night at the Museum: Battle of the Smithsonian(2009) - Three years after the events of the previous film, Larry Daley is now the CEO of Daley Devices, a direct response television company that sells inventions based on his night security guard job. His rich new job has prevented him from seeing his museum friends for a while, but when he returns he find...
Night at the Museum(2006) - Larry Daley is divorced, unable to keep a steady job, and has failed at many business ventures including his dream job of being an inventor. His ex-wife fears his lifestyle is a bad influence on his eleven-year-old son Nick. One day, an elderly nigh security guard at the American Museum of Natural H...
Paul Blart: Mall Cop(2009) - Single dad Paul Blart is a mild-mannered but overweight man who takes his job of security guard at the Orange Pavilion Mall very seriously. He wants to become a member of the New Jersey State Police but his hypoglycemic condition prevents him. He also becomes acquainted with Amy, the owner of a new...
Paranormal Activity 2(2010) - After experiencing what they think are a series of "break-ins", a family sets up security cameras around their home, only to realize that the events unfolding before them are more sinister than they seem.
They Went That-A-Way And That-A-Way(1978) - Two inept cops(Tim Conway and Chuck McCann) go undercover,posing as criminals,to retrieve stolen money from a maximum security prison.
Da Wan(2001) - Yankie director Don Tyler faces mounting insecurity and declining health while on location in Beijing, so his assistant hires down-and-out camerman YoYo to take the reins. Scrambling, studio boss sells the sagging picture to a Japanese media company. But YoYo is determined to upstage the whole produ...
Tenacious D in The Pick Of Destiny(2006) - To become the greatest band of all time, two slacker, wannabe-rockers set out on a quest to steal a legendary guitar pick that gives its holders incredible guitar skills, from a maximum security Rock and Roll museum.
Night at the Museum: Secret of the Tomb(2014) - Security guard Larry Daley must travel to London to return the tablet of Ahkmenrah, an Egyptian artifact which causes the exhibits to come to life, before the magic disappears. The last film ever starring Robin Williams before his death.
Night Eyes(1990) - A security guard is hired to gather evidence of adultery against the wife of the rock star and ends up getting involved with her.
Night Eyes II(1991) - Security expert Will Griffith has been hired to secure the mansion of South American expatriate Hector Mejenes, who has had attempts made on his life, upon the insistance of his American wife, Marilyn. Now the neglected wife finds herself attracted to the security guard and vice versa.
Night Eyes III(1993) - A security guard falls for a famous TV actress he is hired to protect while dealing with mobsters who want him to sell out his business to them.
13 Hours (2016) ::: 7.3/10 -- R | 2h 24min | Action, Drama, History | 15 January 2016 (USA) -- During an attack on a U.S. compound in Libya, a security team struggles to make sense out of the chaos. Director: Michael Bay Writers: Chuck Hogan (screenplay), Mitchell Zuckoff (book)
Above the Rim (1994) ::: 6.7/10 -- R | 1h 36min | Crime, Drama, Sport | 23 March 1994 (USA) -- Story of a promising high school basketball star and his relationships with two brothers, one a drug dealer and the other a former basketball star fallen on hard times and now employed as a security guard. Director: Jeff Pollack Writers:
Alien (1992) ::: 6.5/10 -- R | 1h 54min | Action, Horror, Sci-Fi | 22 May 1992 (USA) -- After her last encounter, Ellen Ripley crash-lands on Fiorina 161, a maximum security prison. When a series of strange and deadly events occur shortly after her arrival, Ripley realizes that she has brought along an unwelcome visitor. Director: David Fincher Writers:
Beats (2019) ::: 6.4/10 -- TV-MA | 1h 49min | Drama | 19 June 2019 (USA) -- A reclusive teenage musical prodigy forms an unlikely friendship with a down-on-his-luck high school security guard. United by their mutual love of hiphop, they confront the demons of their past and try to break into Chicago's music scene. Director: Chris Robinson Writer:
Born to Kill (1947) ::: 7.2/10 -- Approved | 1h 32min | Crime, Drama, Film-Noir | 3 May 1947 (USA) -- A calculating divorce risks her chances at wealth and security with a man she doesn't love by getting involved with the hotheaded murderer romancing her foster sister. Director: Robert Wise Writers: Eve Greene (screen play), Richard Macaulay (screen play) | 1 more credit
Breaking In ::: TV-14 | 30min | Comedy, Crime | TV Series (20112012) -- A high-tech security firm takes extreme, and often questionable, measures to sell their protection services. Creators: Adam F. Goldberg, Seth Gordon
City of Life and Death (2009) ::: 7.7/10 -- Nanjing! Nanjing! (original title) -- City of Life and Death Poster -- In 1937, Japan occupied Nanjing, the Chinese capital. There was a battle and subsequent atrocities against the inhabitants, especially those who took refuge in the International Security Zone. Director: Chuan Lu Writer:
Escape from New York (1981) ::: 7.2/10 -- R | 1h 39min | Action, Adventure, Sci-Fi | 10 July 1981 (USA) -- In 1997, when the U.S. president crashes into Manhattan, now a giant maximum security prison, a convicted bank robber is sent in to rescue him. Director: John Carpenter Writers:
Escape Plan (2013) ::: 6.7/10 -- R | 1h 55min | Action, Sci-Fi, Thriller | 18 October 2013 (USA) -- When a structural-security authority finds himself set up and incarcerated in the world's most secret and secure prison, he has to use his skills to escape with help from the inside. Director: Mikael Hfstrm Writers:
Flawless (1999) ::: 6.5/10 -- R | 1h 52min | Comedy, Crime, Drama | 24 November 1999 (USA) -- An ultraconservative security guard suffers a debilitating stroke and is assigned to a rehabilitative program that includes singing lessons, with the drag queen next door. Director: Joel Schumacher Writer:
Ghost in the Shell 2: Innocence (2004) ::: 7.5/10 -- Inosensu: Innocence (original title) -- Ghost in the Shell 2: Innocence Poster -- In the year 2032, Bat, a cyborg detective for the anti-terrorist unit Public Security Section 9, investigates the case of a female robot--one created solely for sexual pleasure--who slaughtered her owner. Director: Mamoru Oshii Writers:
Ghost in the Shell Arise: Border 2 - Ghost Whisper (2013) ::: 7.3/10 -- TV-MA | 57min | Animation, Action, Sci-Fi | November 2013 (USA) -- Witness the formation of the legendary Public Security Section 9. When a clandestine organization hacks every car in the city, Kusanagi recruits a lethal team of cyber operatives to clamp down on the chaos and make the city safe again. Directors: Atsushi Takeuchi, Kazuchika Kise Writers: Shirow Masamune (manga) (as Masamune Shirow), Tow Ubukata (screenplay)
Glass (2019) ::: 6.7/10 -- PG-13 | 2h 9min | Drama, Sci-Fi, Thriller | 18 January 2019 (USA) -- Security guard David Dunn uses his supernatural abilities to track Kevin Wendell Crumb, a disturbed man who has twenty-four personalities. Director: M. Night Shyamalan Writer: M. Night Shyamalan
Import Export (2007) ::: 7.1/10 -- Not Rated | 2h 21min | Drama | 18 October 2007 (Germany) -- A nurse from Ukraine searches for a better life in the West, while an unemployed security guard from Austria heads East for the same reason. Director: Ulrich Seidl Writers: Veronika Franz, Ulrich Seidl Stars:
Intelligence -- 42min | Action, Drama, Sci-Fi | TV Series (2014) ::: A high-tech intelligence operative, enhanced with a super-computer microchip in his brain, aids an elite government cyber-security agency in special missions. Creator:
Joint Security Area (2000) ::: 7.8/10 -- Gongdong gyeongbi guyeok JSA (original title) -- (South Korea) Joint Security Area Poster After a shooting incident at the North/South Korean border/DMZ leaves 2 North Korean soldiers dead, a neutral Swiss/Swedish team investigates, what actually happened. Director: Chan-wook Park Writers: Seong-san Jeong, Hyun-seok Kim | 4 more credits
Killing Eve ::: TV-14 | 42min | Action, Adventure, Drama | TV Series (2018 ) -- After a series of events, the lives of a security operative and an assassin become inextricably linked. Creator: Phoebe Waller-Bridge
Killing Eve ::: TV-14 | 42min | Action, Adventure, Drama | TV Series (2018- ) Season 4 Premiere 2021 Episode Guide 26 episodes Killing Eve Poster -- After a series of events, the lives of a security operative and an assassin become inextricably linked. Creator:
Land of the Pharaohs (1955) ::: 6.6/10 -- Approved | 1h 46min | Adventure, Drama, History | 24 June 1955 (USA) -- A captured architect designs an ingenious plan to ensure the impregnability of the tomb of a self-absorbed Pharaoh, obsessed with the security of his next life. Director: Howard Hawks Writers: William Faulkner, Harry Kurnitz | 1 more credit Stars:
Lock Up (1989) ::: 6.4/10 -- R | 1h 49min | Action, Crime, Drama | 4 August 1989 (USA) -- With only six months left of his sentence, inmate Frank Leone is transferred from a minimum security prison to a maximum security prison by a vindictive warden. Director: John Flynn Writers:
Lovely & Amazing (2001) ::: 6.7/10 -- R | 1h 31min | Comedy, Drama, Romance | 2 August 2002 (USA) -- Self-esteem and insecurity are at the heart of this comedy about the relationship between a mother and her three confused daughters. Director: Nicole Holofcener Writer: Nicole Holofcener
LSD: Love, Sex Aur Dhokha (2010) ::: 7.1/10 -- Not Rated | 2h 35min | Comedy, Crime, Drama | 19 March 2010 (India) -- A video camcorder, a store security camera, and concealed cameras candidly expose lives in three loosely-linked tales. Director: Dibakar Banerjee Writers: Dibakar Banerjee, Kanu Behl
Mr. Robot ::: TV-MA | 49min | Crime, Drama, Thriller | TV Series (20152019) -- Elliot, a brilliant but highly unstable young cyber-security engineer and vigilante hacker, becomes a key figure in a complex game of global dominance when he and his shadowy allies try to take down the corrupt corporation he works for. Creator:
Museo (2018) ::: 6.9/10 -- 2h 8min | Crime, Drama | 26 October 2018 (Mexico) -- In 1985, a group of criminals mock the security of the National Museum of Anthropology in Mexico City to extract 140 pre-Hispanic pieces from their showcases. Directors: Alonso Ruizpalacios (as Alonso Ruiz Palacios), Alonso Ruizpalacios Writers:
Neighboring Sounds (2012) ::: 7.2/10 -- O Som ao Redor (original title) -- Neighboring Sounds Poster -- The lives of the residents of a Brazilian apartment building and the security guards who get the job guarding the surrounding streets. Director: Kleber Mendona Filho Writer:
Next ::: TV-14 | Crime, Drama, Sci-Fi | TV Series (2020) -- A former tech CEO joins an FBI Cybersecurity Agent to stop the emergence of a rogue Artificial Intelligence. Creator: Manny Coto
Night at the Museum (2006) ::: 6.4/10 -- PG | 1h 48min | Adventure, Comedy, Family | 22 December 2006 (USA) -- A newly recruited night security guard at the Museum of Natural History discovers that an ancient curse causes the animals and exhibits on display to come to life and wreak havoc. Director: Shawn Levy Writers:
Official Secrets (2019) ::: 7.3/10 -- R | 1h 52min | Biography, Crime, Drama | 30 August 2019 (USA) -- The true story of a British whistleblower who leaked information to the press about an illegal NSA spy operation designed to push the UN Security Council into sanctioning the 2003 invasion of Iraq. Director: Gavin Hood Writers:
Olympus Has Fallen (2013) ::: 6.5/10 -- R | 1h 59min | Action, Thriller | 22 March 2013 (USA) -- Secret Service agent Mike Banning finds himself trapped inside the White House in the wake of a terrorist attack and works with national security to rescue the President from his kidnappers. Director: Antoine Fuqua Writers:
Paranoid Park (2007) ::: 6.7/10 -- R | 1h 25min | Crime, Drama, Mystery | 24 October 2007 (France) -- A teenage skateboarder's life begins to fray after he is involved in the accidental death of a security guard. Director: Gus Van Sant Writers: Gus Van Sant (screenplay), Blake Nelson (novel)
Red Sparrow (2018) ::: 6.6/10 -- R | 2h 20min | Action, Drama, Thriller | 2 March 2018 (USA) -- Ballerina Dominika Egorova is recruited to 'Sparrow School,' a Russian intelligence service where she is forced to use her body as a weapon. Her first mission, targeting a C.I.A. agent, threatens to unravel the security of both nations. Director: Francis Lawrence Writers:
Richard Jewell (2019) ::: 7.5/10 -- R | 2h 11min | Biography, Crime, Drama | 13 December 2019 (USA) -- Security guard Richard Jewell is an instant hero after foiling a bomb attack at the 1996 Atlanta Olympics, but his life becomes a nightmare when the FBI leaks to the media that he is a suspect in the case. Director: Clint Eastwood Writers:
Route Irish (2010) ::: 6.4/10 -- 1h 49min | Action, Drama, Thriller | 16 March 2011 (France) -- The story of a private security contractor in Iraq who rejected the official explanation of his friend's death and sets out to discover the truth. Director: Ken Loach Writer:
Shaft (2019) ::: 6.4/10 -- R | 1h 51min | Action, Comedy, Crime | 14 June 2019 (USA) -- JJ Shaft, a cyber security expert with a degree from MIT, enlists his family's help to uncover the truth behind his best friend's untimely death. Director: Tim Story Writers:
Sherlock Holmes and the Voice of Terror (1942) ::: 6.6/10 -- Passed | 1h 5min | Crime, Mystery, Thriller | 18 September 1942 (USA) -- When a Nazi saboteur jeeringly predicts to the nation new depredations via the radio 'Voice of Terror', the Homeland Security Inner Council summons Sherlock Holmes (Basil Rathbone) to help ... S Director: John Rawlins Writers: Lynn Riggs (screenplay), John Bright (screenplay) | 2 more credits Stars:
Sneakers (1992) ::: 7.1/10 -- PG-13 | 2h 6min | Comedy, Crime, Drama | 11 September 1992 (USA) -- A security pro finds his past coming back to haunt him, when he and his unique team are tasked with retrieving a particularly important item. Director: Phil Alden Robinson Writers: Phil Alden Robinson, Lawrence Lasker | 1 more credit
Superjail! ::: TV-MA | 10min | Animation, Comedy, Crime | TV Series (20072014) In a surreal world, a large maximum security prison, which houses thousands of dangerous inmates is run by an eccentric warden and his equally odd staff. Creators: Christy Karacas, Ben Gruber, Stephen Warbrick Stars:
Tenacious D in the Pick of Destiny (2006) ::: 6.8/10 -- Tenacious D in The Pick of Destiny (original title) -- Tenacious D in the Pick of Destiny Poster -- To become the greatest band of all time, two slacker, wannabe-rockers set out on a quest to steal a legendary guitar pick that gives its holders incredible guitar skills, from a maximum security Rock and Roll museum. Director: Liam Lynch
The Great Train Robbery (1978) ::: 6.9/10 -- The First Great Train Robbery (original title) -- The Great Train Robbery Poster -- England, 1850s. A master criminal aims to rob a train of a large sum of gold. Security is incredibly tight and the task seems an impossible one. However, he has a plan and just the right people to carry it out. Director: Michael Crichton Writers:
The Informer (2019) ::: 6.6/10 -- R | 1h 53min | Action, Crime, Drama | 10 January 2020 (Canada) -- An ex-convict working undercover intentionally gets himself incarcerated again in order to infiltrate the mob at a maximum security prison. Director: Andrea Di Stefano Writers:
The Player ::: TV-14 | 1h | Action, Crime, Drama | TV Series (2015) -- A former intelligence and FBI officer, who now works as a security expert in Las Vegas, is recruited by mysterious pit boss Mr. Johnson to, based on his tips, try to prevent crimes, while the rich place bets on his chances of success. Creators:
TRON (1982) ::: 6.8/10 -- PG | 1h 36min | Action, Adventure, Sci-Fi | 9 July 1982 (USA) -- A computer hacker is abducted into the digital world and forced to participate in gladiatorial games where his only chance of escape is with the help of a heroic security program. Director: Steven Lisberger Writers:
Waar (2013) ::: 7.9/10 -- 2h 10min | Action, Crime, Drama | 16 October 2013 (Pakistan) -- The efforts of the Pakistani security forces in their fight against terrorism and how the lives of security officials are affected. A retired security officer returns to save Pakistan from a major terrorist attack. Director: Bilal Lashari Writer:
Walking and Talking (1996) ::: 6.7/10 -- R | 1h 26min | Comedy, Drama, Romance | 17 July 1996 (USA) -- Just as Amelia thinks she's over her anxiety and insecurity, her best friend announces her engagement, bringing her anxiety and insecurity right back. Director: Nicole Holofcener Writer: Nicole Holofcener Stars:
https://mitamasecurity.fandom.com
https://mitamasecurity.fandom.com/
https://ahatintime.fandom.com/wiki/Security_Breach
https://althistory.fandom.com/wiki/Collective_Security_Treaty_Organization_(1983:_Doomsday)
https://althistory.fandom.com/wiki/D.C._Security_Zone_Campaign_(American_Crisis)
https://among-us.fandom.com/wiki/Security_(ability)
https://batman.fandom.com/wiki/High_Security_Henchman
https://batman.fandom.com/wiki/Shreck_Security_Guard_no.1
https://batman.fandom.com/wiki/Shreck_Security_Guard_no.2
https://bgdcmc.fandom.com/wiki/Security_Guard
https://characters.fandom.com/wiki/Syndrome's_Security_Guards
https://choroq.fandom.com/wiki/Security_Robot
https://citiesxl.fandom.com/wiki/Security_(Police)
https://colony.fandom.com/wiki/Homeland_Security
https://colony.fandom.com/wiki/Homeland_Security_HQ
https://community-sitcom.fandom.com/wiki/Basic_Email_Security
https://computersecurity.fandom.com/wiki/
https://concord.fandom.com/wiki/Fictional_Security_Agencies
https://darkerthanblack.fandom.com/wiki/French_Department_Of_National_Security
https://databasemanagement.fandom.com/wiki/Database_Security
https://dc.fandom.com/wiki/American_Security_Agency_(New_Earth)
https://dc.fandom.com/wiki/Young_Justice_(TV_Series)_Episode:_Insecurity
https://dc.fandom.com/wiki/Young_Justice_(TV_Series)_Episode:_Private_Security
https://deusex.fandom.com/wiki/SP69/75_Aero_security_bot
https://dothack.fandom.com/wiki/Sophia_Security_System
https://dreamfiction.fandom.com/wiki/El_Kadsre_Special_Security_Committee
https://dreamfiction.fandom.com/wiki/Lethal_Security
https://dreamfiction.fandom.com/wiki/Security_and_Intelligence_Agency_of_Tseng
https://dreamfiction.fandom.com/wiki/Security_Patrol
https://dreamfiction.fandom.com/wiki/Special_Security_Committee_of_the_Vlokozu_Union
https://dreamfiction.fandom.com/wiki/Total_Security_(1997_video_game)
https://dreamfiction.fandom.com/wiki/Vortex_Security:_War_of_the_Raiders
https://education.fandom.com/wiki/National_School_Saftey_and_Security_Services
https://elderscrolls.fandom.com/wiki/Breaching_Security
https://elderscrolls.fandom.com/wiki/Ensuring_Security
https://elderscrolls.fandom.com/wiki/Security_Details
https://elderscrolls.fandom.com/wiki/Security_(Morrowind)
https://elderscrolls.fandom.com/wiki/Security_(Oblivion)
https://eq2.fandom.com/wiki/Darkness_Ascending:_Scarstone_Security
https://eq2.fandom.com/wiki/Gnomeland_Security_Headquarters
https://finalfantasy.fandom.com/wiki/Shinra_Public_Security_Division
https://finalfantasy.fandom.com/wiki/Shinra_Public_Security_Forces
https://freddy-fazbears-pizza.fandom.com/wiki/Five_Nights_at_Freddy's:_Security_Breach
https://freeware.fandom.com/wiki/Lists_of_freeware_security_services
https://freeware.fandom.com/wiki/Lists_of_Freeware_Security_Software
https://freeware.fandom.com/wiki/SECURITY
https://gameideas.fandom.com/wiki/Artistic_Forces/Security_Defense_Alliance
https://gamicus.fandom.com/wiki/Five_Nights_at_Freddy's:_Security_Breach
https://github.com/Wikia/unified-platform/tree/master/extensions/fandom/ContentSecurityPolicy
https://harrypotter.fandom.com/wiki/DISASTROUS_OPENING_CEREMONY_LEADS_TO_QUESTIONS_ABOUT_QUIDDITCH_WORLD_CUP_SECURITY
https://honorverse.fandom.com/wiki/Office_of_State_Security
https://humanscience.fandom.com/wiki/Computer_Security_and_Viruses
https://java.fandom.com/wiki/Spring_security
https://lastmanstanding.fandom.com/wiki/Home_Security
https://logos.fandom.com/wiki/GE_Security
https://logos.fandom.com/wiki/Somali_National_Intelligence_and_Security_Agency
https://marvel.fandom.com/wiki/Maximum_Security
https://marvel.fandom.com/wiki/Maximum_Security_Vol_1_1
https://marvel.fandom.com/wiki/Maximum_Security_Vol_1_3
https://marvel.fandom.com/wiki/National_Security_Council_(Earth-616)
https://marvel.fandom.com/wiki/United_Nations_Security_Council_(Earth-616)
https://marvel.fandom.com/wiki/World_Security_Council_(Earth-616)
https://matrix.fandom.com/wiki/The_Security_Guard
https://memory-alpha.fandom.com/wiki/Akritirian_maximum_security_detention_facility
https://memory-alpha.fandom.com/wiki/Alhambra_security_officer_001
https://memory-alpha.fandom.com/wiki/Auto-initiating_security_grid
https://memory-alpha.fandom.com/wiki/Bajoran_Security
https://memory-alpha.fandom.com/wiki/Bell_(security)
https://memory-alpha.fandom.com/wiki/Bolian_DS9_ops_security_002
https://memory-alpha.fandom.com/wiki/Cardassian_Terok_Nor_security_001
https://memory-alpha.fandom.com/wiki/Casey_(security)
https://memory-alpha.fandom.com/wiki/Central_Security_(Rigel_X)
https://memory-alpha.fandom.com/wiki/Cerritos_security_001
https://memory-alpha.fandom.com/wiki/Chief_of_Security
https://memory-alpha.fandom.com/wiki/Chief_of_security
https://memory-alpha.fandom.com/wiki/Chief_of_Starfleet_Security
https://memory-alpha.fandom.com/wiki/Chief_security_officer
https://memory-alpha.fandom.com/wiki/Class_A_security
https://memory-alpha.fandom.com/wiki/Discovery_security_guard_001
https://memory-alpha.fandom.com/wiki/Discovery_security_guard_003
https://memory-alpha.fandom.com/wiki/Dominion_Security
https://memory-alpha.fandom.com/wiki/Eminian_security_001
https://memory-alpha.fandom.com/wiki/Emotional_security
https://memory-alpha.fandom.com/wiki/EnterpriseNX_engineer_security_crewman_001
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_001
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_002
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_004
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_005
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_006
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_007
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_008
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_009
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_010
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_011
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_012
https://memory-alpha.fandom.com/wiki/Federation_Security
https://memory-alpha.fandom.com/wiki/Federation_Security_Number
https://memory-alpha.fandom.com/wiki/Franklin_(security)
https://memory-alpha.fandom.com/wiki/Global_Security_Net
https://memory-alpha.fandom.com/wiki/Grant_(security)
https://memory-alpha.fandom.com/wiki/Human_32nd_holo_security_001
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_003
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_004
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_005
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_006
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_007
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_008
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_009
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_010
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_011
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_013
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_015
https://memory-alpha.fandom.com/wiki/Illusion_security_001
https://memory-alpha.fandom.com/wiki/Kelly_(security)
https://memory-alpha.fandom.com/wiki/Kes_Security_Relation_Station_One
https://memory-alpha.fandom.com/wiki/Level_1_security_clearance
https://memory-alpha.fandom.com/wiki/Level_5_security_field
https://memory-alpha.fandom.com/wiki/Level_5_security_protocol
https://memory-alpha.fandom.com/wiki/Minister_of_Security
https://memory-alpha.fandom.com/wiki/Ministry_of_Security
https://memory-alpha.fandom.com/wiki/Mirror_Discovery_security_001
https://memory-alpha.fandom.com/wiki/Mirror_Discovery_security_002
https://memory-alpha.fandom.com/wiki/Multi-regenerative_security_field
https://memory-alpha.fandom.com/wiki/Murphy_(security)
https://memory-alpha.fandom.com/wiki/National_Security_Agency
https://memory-alpha.fandom.com/wiki/Nygean_security_officers_001
https://memory-alpha.fandom.com/wiki/Nyrian_security_001
https://memory-alpha.fandom.com/wiki/Nyrian_security_003
https://memory-alpha.fandom.com/wiki/Pathfinder_security_001
https://memory-alpha.fandom.com/wiki/Planetary_security
https://memory-alpha.fandom.com/wiki/Quarren_security_001
https://memory-alpha.fandom.com/wiki/Quarren_security_002
https://memory-alpha.fandom.com/wiki/Quarren_security_003
https://memory-alpha.fandom.com/wiki/Security
https://memory-alpha.fandom.com/wiki/Security_alert
https://memory-alpha.fandom.com/wiki/Security_alert_3
https://memory-alpha.fandom.com/wiki/Security_alert,_condition_three
https://memory-alpha.fandom.com/wiki/Security_alert_yellow
https://memory-alpha.fandom.com/wiki/Security_anklet
https://memory-alpha.fandom.com/wiki/Security_authorization
https://memory-alpha.fandom.com/wiki/Security_bypass_module
https://memory-alpha.fandom.com/wiki/Security_Chief
https://memory-alpha.fandom.com/wiki/Security_chief
https://memory-alpha.fandom.com/wiki/Security_clearance
https://memory-alpha.fandom.com/wiki/Security_code
https://memory-alpha.fandom.com/wiki/Security_Condition_Four
https://memory-alpha.fandom.com/wiki/Security_Condition_Three
https://memory-alpha.fandom.com/wiki/Security_confinement
https://memory-alpha.fandom.com/wiki/Security_cover
https://memory-alpha.fandom.com/wiki/Security_detail
https://memory-alpha.fandom.com/wiki/Security_Directorate
https://memory-alpha.fandom.com/wiki/Security_field
https://memory-alpha.fandom.com/wiki/Security_force_field
https://memory-alpha.fandom.com/wiki/Security_grid
https://memory-alpha.fandom.com/wiki/Security_guard
https://memory-alpha.fandom.com/wiki/Security_lockout
https://memory-alpha.fandom.com/wiki/Security_log
https://memory-alpha.fandom.com/wiki/Security_log,_USS_Voyager
https://memory-alpha.fandom.com/wiki/Security_net
https://memory-alpha.fandom.com/wiki/Security_office
https://memory-alpha.fandom.com/wiki/Security_Officer
https://memory-alpha.fandom.com/wiki/Security_officer
https://memory-alpha.fandom.com/wiki/Security_override_code
https://memory-alpha.fandom.com/wiki/Security_protocol
https://memory-alpha.fandom.com/wiki/Security_Relay_Station_One
https://memory-alpha.fandom.com/wiki/Security_restraint
https://memory-alpha.fandom.com/wiki/Security_room
https://memory-alpha.fandom.com/wiki/Security_screen
https://memory-alpha.fandom.com/wiki/Security_seal
https://memory-alpha.fandom.com/wiki/Security_sensor
https://memory-alpha.fandom.com/wiki/Security_station
https://memory-alpha.fandom.com/wiki/Security_team
https://memory-alpha.fandom.com/wiki/Security_two_alert
https://memory-alpha.fandom.com/wiki/Shenzhou_security_officer_001
https://memory-alpha.fandom.com/wiki/Starbase_28_security_001
https://memory-alpha.fandom.com/wiki/Starfleet_22nd_NX_security_001
https://memory-alpha.fandom.com/wiki/Starfleet_22nd_security_001
https://memory-alpha.fandom.com/wiki/Starfleet_22nd_security_002
https://memory-alpha.fandom.com/wiki/Starfleet_23rd_Federation_Council_security_001
https://memory-alpha.fandom.com/wiki/Starfleet_24th_alt_security_001
https://memory-alpha.fandom.com/wiki/Starfleet_24th_alt_security_002
https://memory-alpha.fandom.com/wiki/Starfleet_24th_alt_security_003
https://memory-alpha.fandom.com/wiki/Starfleet_24th_alt_security_004
https://memory-alpha.fandom.com/wiki/Starfleet_24th_Earth_security_001
https://memory-alpha.fandom.com/wiki/Starfleet_24th_Earth_security_003
https://memory-alpha.fandom.com/wiki/Starfleet_24th_Earth_security_004
https://memory-alpha.fandom.com/wiki/Starfleet_24th_Earth_security_005
https://memory-alpha.fandom.com/wiki/Starfleet_24th_head_of_security_001
https://memory-alpha.fandom.com/wiki/Starfleet_24th_security_officer_001
https://memory-alpha.fandom.com/wiki/Starfleet_alt_security_001
https://memory-alpha.fandom.com/wiki/Starfleet_Security
https://memory-alpha.fandom.com/wiki/Starfleet_security_personnel
https://memory-alpha.fandom.com/wiki/Straleb_security_vessel
https://memory-alpha.fandom.com/wiki/USS_Enterprise_alternate_operations_security_lieutenant_1
https://memory-alpha.fandom.com/wiki/USS_Enterprise_alternate_operations_security_officer_1
https://memory-alpha.fandom.com/wiki/USS_Enterprise_alternate_operations_security_officer_2
https://memory-alpha.fandom.com/wiki/USS_Enterprise_alternate_operations_security_officer_3
https://memory-alpha.fandom.com/wiki/USS_Enterprise_alternate_operations_security_officer_4
https://memory-alpha.fandom.com/wiki/USS_Enterprise_alternate_operations_security_team
https://memory-alpha.fandom.com/wiki/USS_Enterprise_alternate_operations_security_team_002
https://memory-alpha.fandom.com/wiki/USS_Enterprise-A_security_crewman_1
https://memory-alpha.fandom.com/wiki/USS_Enterprise-A_security_team
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_Bajoran_security_001
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_ensign_001
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_ensign_002
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_001
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_002
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_003
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_004
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_005
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_006
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_007
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_009
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_015
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_017
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_019
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_021
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_022
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_027
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_028
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_030
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guards_001
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_lieutenant_001
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_001
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_002
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_003
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_004
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_005
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_006
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_007
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_008
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_009
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_010
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_011
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_012
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_013
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_crewman_1
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_crewman_2
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_1
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_10
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_11
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_18
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_19
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_2
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_20
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_21
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_22
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_23
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_24
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_25
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_27
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_28
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_29
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_3
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_30
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_4
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_5
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_6
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_7
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_8
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_9
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_landing_party
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_lieutenant_1
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_lieutenant_11
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_lieutenant_13
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_lieutenant_2
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_lieutenant_4
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_lieutenant_5
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_lieutenant_6
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_lieutenant_9
https://memory-alpha.fandom.com/wiki/USS_Excelsior_security_001
https://memory-alpha.fandom.com/wiki/USS_Excelsior_security_002
https://memory-alpha.fandom.com/wiki/USS_Excelsior_security_003
https://memory-alpha.fandom.com/wiki/USS_Excelsior_security_004
https://memory-alpha.fandom.com/wiki/Vengeance_security_001
https://memory-alpha.fandom.com/wiki/Yorktown_security_001
https://memory-beta.fandom.com/wiki/Chief_of_Security
https://memory-beta.fandom.com/wiki/Chief_of_security
https://memory-beta.fandom.com/wiki/Coalition_of_Planets_Security_Council
https://memory-beta.fandom.com/wiki/Federation_Security
https://memory-beta.fandom.com/wiki/Federation_Security_Advisor
https://memory-beta.fandom.com/wiki/Federation_Security_Agency
https://memory-beta.fandom.com/wiki/Federation_Security_Council
https://memory-beta.fandom.com/wiki/Federation_Security_Office
https://memory-beta.fandom.com/wiki/Richardson_(Security_Chief)
https://memory-beta.fandom.com/wiki/Security
https://memory-beta.fandom.com/wiki/Security_Chief
https://memory-beta.fandom.com/wiki/Security_chief
https://memory-beta.fandom.com/wiki/Security_division
https://memory-beta.fandom.com/wiki/Security_(eBook)
https://memory-beta.fandom.com/wiki/Security_Officer
https://memory-beta.fandom.com/wiki/Security_officer
https://memory-beta.fandom.com/wiki/Special_Security_Division
https://memory-beta.fandom.com/wiki/Starfleet_Security
https://memory-beta.fandom.com/wiki/Tarsus_IV_Security_Force
https://metalgear.fandom.com/wiki/Maverick_Security_Consulting,_Inc.
https://mirrorsedge.fandom.com/wiki/Silvine_Security_Systems
https://mitamasecurity.fandom.com/wiki/
https://mitamasecurity.fandom.com/wiki/Blog:Recent_posts
https://mitamasecurity.fandom.com/wiki/Chapter_1
https://mitamasecurity.fandom.com/wiki/Chapter_20
https://mitamasecurity.fandom.com/wiki/Chapter_21
https://mitamasecurity.fandom.com/wiki/Chapter_22
https://mitamasecurity.fandom.com/wiki/Chapter_23
https://mitamasecurity.fandom.com/wiki/Chapter_24
https://mitamasecurity.fandom.com/wiki/Joh_Mitama
https://mitamasecurity.fandom.com/wiki/Local_Sitemap
https://mitamasecurity.fandom.com/wiki/Main_Page
https://mitamasecurity.fandom.com/wiki/Mitama_Security
https://mitamasecurity.fandom.com/wiki/Mitama_Security_Wiki
https://mitamasecurity.fandom.com/wiki/Mitama_Wiki
https://mitamasecurity.fandom.com/wiki/Rena_Haze
https://mitamasecurity.fandom.com/wiki/Tsurun_Hatomune
https://newlooneytunes.fandom.com/wiki/Airpork_Security
https://ninjago.fandom.com/wiki/Security_guards
https://ninjago.fandom.com/wiki/Security_guards_(Borg_Industries)
https://ninjago.fandom.com/wiki/Security_guards_(Explorers_Club)
https://omikron.fandom.com/wiki/Security_HQ
https://orville.fandom.com/wiki/Chief_Security_Officer
https://overwatch.fandom.com/wiki/Helix_Security_International
https://peanuts.fandom.com/wiki/Linus'_security_blanket
https://peanuts.fandom.com/wiki/Security_Is_an_Eye_Patch
https://powerless.fandom.com/wiki/Wayne_Security
https://quake.fandom.com/wiki/Data_Networking_Security
https://quantumbreak.fandom.com/wiki/Monarch_Security_Station
https://rageofbahamut.fandom.com/wiki/Account_Security
https://rebeccaparham.fandom.com/wiki/Disney_security_guard
https://rebeccaparham.fandom.com/wiki/The_Curious_Disney_Security_Guard_(animation)
https://rebeccaparham.fandom.com/wiki/The_curious_Disney_security_guard_(character)
https://residentevil.fandom.com/wiki/Bioterrorism_Security_Assessment_Alliance
https://robocop.fandom.com/wiki/Security_Concepts
https://shodan.fandom.com/wiki/Level_8_-_Security
https://sidekicks.fandom.com/wiki/Humankind_Security_Committee
https://sleepingdogs.fandom.com/wiki/Security_Cameras
https://small-town-security.fandom.com/wiki/
https://starwarscardtrader.fandom.com/wiki/Captain_Panaka_-_Naboo_Security_-_Base_Series_1
https://starwarscardtrader.fandom.com/wiki/Captain_Tarpals_-_Gungan_Security_-_Base_Series_1
https://starwarscardtrader.fandom.com/wiki/Captain_Typho_-_Naboo_Security_-_Base_Series_1
https://starwars.fandom.com/wiki/Alderaanian_consular_security
https://starwars.fandom.com/wiki/Bastatha_security_forces
https://starwars.fandom.com/wiki/Casino_Security_(Canto_Casino)
https://starwars.fandom.com/wiki/Chief_of_Security
https://starwars.fandom.com/wiki/Cloud_City_Security_Tower
https://starwars.fandom.com/wiki/Commerce_Guild_Punitive_Security_Forces
https://starwars.fandom.com/wiki/Corellian_Security_Forces
https://starwars.fandom.com/wiki/Coruscant_Security_Force
https://starwars.fandom.com/wiki/Coruscant_Security_Force_Divisional_Headquarters_(ISB_technology_center)
https://starwars.fandom.com/wiki/Coruscant_Security_Force_Divisional_Headquarters_(Quadrant_A-89)
https://starwars.fandom.com/wiki/Coruscant_Security_Force_Headquarters
https://starwars.fandom.com/wiki/Coruscant_Security_Force_incident_support_vessel
https://starwars.fandom.com/wiki/Coruscant_Security_Force/Legends
https://starwars.fandom.com/wiki/Coruscant_Security_Force_Senior_Command
https://starwars.fandom.com/wiki/Coruscant_Security_Force_Staff_and_Social_Club
https://starwars.fandom.com/wiki/Coruscant_Security_Special_Investigation_Panel
https://starwars.fandom.com/wiki/First_Order_Security_Bureau
https://starwars.fandom.com/wiki/Goddess_of_security_and_safekeeping
https://starwars.fandom.com/wiki/Guavian_Death_Gang_security_soldier_armor
https://starwars.fandom.com/wiki/Guavian_security_soldier
https://starwars.fandom.com/wiki/Head_of_Security
https://starwars.fandom.com/wiki/Hetzal's_security_division
https://starwars.fandom.com/wiki/Homeworld_Security_Command
https://starwars.fandom.com/wiki/Imperial_Intelligence_and_Security_Bureau_offices
https://starwars.fandom.com/wiki/Imperial_Office_of_Security
https://starwars.fandom.com/wiki/Imperial_Security_Bureau
https://starwars.fandom.com/wiki/Imperial_Security_Bureau_headquarters
https://starwars.fandom.com/wiki/Imperial_Security_Bureau/Legends
https://starwars.fandom.com/wiki/Imperial_security_complex
https://starwars.fandom.com/wiki/InterGalactic_Banking_Clan_Collections_and_Security_Division
https://starwars.fandom.com/wiki/Internal_Security_Bureau
https://starwars.fandom.com/wiki/Jedi_Temple_central_security_station
https://starwars.fandom.com/wiki/Jinata_Security
https://starwars.fandom.com/wiki/Kamino_security
https://starwars.fandom.com/wiki/KPR_security_droid
https://starwars.fandom.com/wiki/KX-series_security_droid
https://starwars.fandom.com/wiki/Ogden's_Hope_security
https://starwars.fandom.com/wiki/Ogden's_Hope_security_station
https://starwars.fandom.com/wiki/OOM_security_battle_droid
https://starwars.fandom.com/wiki/Orbital_Security_Station_Six
https://starwars.fandom.com/wiki/Orto_Plutonia_clone_security_force
https://starwars.fandom.com/wiki/Outland_Regions_Security_Force
https://starwars.fandom.com/wiki/Peace_and_Security_Headquarters
https://starwars.fandom.com/wiki/Planetary_Security_Forces
https://starwars.fandom.com/wiki/Republic_Domestic_Security
https://starwars.fandom.com/wiki/Royal_Naboo_Security_Forces
https://starwars.fandom.com/wiki/Royal_Naboo_Security_Forces/Legends
https://starwars.fandom.com/wiki/Security_camera
https://starwars.fandom.com/wiki/Security_collar
https://starwars.fandom.com/wiki/Security_Council
https://starwars.fandom.com/wiki/Security_council
https://starwars.fandom.com/wiki/Security_droid
https://starwars.fandom.com/wiki/Security_Guard
https://starwars.fandom.com/wiki/Security_Guard/Legends
https://starwars.fandom.com/wiki/Security_guard/Legends
https://starwars.fandom.com/wiki/Security_officer
https://starwars.fandom.com/wiki/Unidentified_Bothan_(Coruscant_Security_Force)
https://starwars.fandom.com/wiki/Unidentified_Coruscant_Security_officer_(akk_handler)
https://starwars.fandom.com/wiki/Unidentified_Coruscant_Security_officer_(Organa_staffer's_sister)
https://starwars.fandom.com/wiki/Unidentified_Imperial_Security_Bureau_major
https://starwars.fandom.com/wiki/Unidentified_OOM_security_battle_droid_(Saak'ak;_corporal)
https://starwars.fandom.com/wiki/Unidentified_orbital_security_station
https://starwars.fandom.com/wiki/Unidentified_Security_Battle_Droid
https://starwars.fandom.com/wiki/Unidentified_security_guard
https://starwars.fandom.com/wiki/Utapaun_Security_Forces
https://starwars.fandom.com/wiki/Vault_security_contingent
https://starwars.fandom.com/wiki/Vil_(Coruscant_Security_Force)
https://swfanon.fandom.com/wiki/Imperial_State_Security_Committee
https://swfanon.fandom.com/wiki/Ombaria_Security
https://swfanon.fandom.com/wiki/Unidentified_Fallline_security_officer
https://swg.fandom.com/wiki/Royal_Security_Forces
https://tardis.fandom.com/wiki/Interstitial_Insecurity_(short_story)
https://tardis.fandom.com/wiki/Lord_President's_personal_security_sidearm
https://tardis.fandom.com/wiki/Maximum_security_facility
https://tardis.fandom.com/wiki/Republican_Security_Forces
https://tardis.fandom.com/wiki/Sara_Kingdom:_Space_Security_Agent_(comic_story)
https://tardis.fandom.com/wiki/Security
https://tardis.fandom.com/wiki/Security_Bot_(video_game)
https://tardis.fandom.com/wiki/Security_guard_(Day_Zero)
https://tardis.fandom.com/wiki/Security_Protocol_712
https://tardis.fandom.com/wiki/Space_Security_Service
https://tardis.fandom.com/wiki/Unispace_Security
https://terraformars.fandom.com/wiki/Ichi_Security
https://twit.fandom.com/wiki/Security_Now
https://twit.fandom.com/wiki/Security_Now_121:_Is_Privacy_Dead?
https://twit.fandom.com/wiki/Security_Now_133:_TrueCrypt_5
https://typemoon.fandom.com/wiki/Chaldea_Security_Organization
https://warriorscharacters.fandom.com/wiki/Warriors_Characters_Wiki:Project_Security
https://whitewolf.fandom.com/wiki/Adam_(security_officer)
https://whitewolf.fandom.com/wiki/National_Security_Agency
https://wowwiki-archive.fandom.com/wiki/Peacekeeper_Security_Suit
https://youngjustice.fandom.com/wiki/Insecurity
https://youngjustice.fandom.com/wiki/Private_Security
Active Raid: Kidou Kyoushuushitsu Dai Hachi Gakari 2nd -- -- Production IMS -- 12 eps -- Original -- Sci-Fi Comedy Police Mecha -- Active Raid: Kidou Kyoushuushitsu Dai Hachi Gakari 2nd Active Raid: Kidou Kyoushuushitsu Dai Hachi Gakari 2nd -- Set in a part of Tokyo that has descended into a quagmire, the story follows Unit 8 of the 5th Special Public Security Section's 3rd Mobile Assault Division, popularly called "The Eighth," who don powered armor "Willwear" exoskeletons to counter the rise in crime. -- -- (Source: ANN) -- 18,434 6.37
Angel Cop -- -- D.A.S.T. -- 6 eps -- Original -- Action Sci-Fi Police -- Angel Cop Angel Cop -- Sometime in the future, terrorism in Japan has become commonplace, and the police have become almost as brutal as criminals. A member of the Special Security Force known as Angel, is the best of the best, stopping at nothing in her fight for justice. -- -- Things get interesting for Angel and her partner, Raiden, when they begin investigating a series of murders in which the victims were known criminals, killed in very unpleasant ways. This trio of killers known as Hunters, is a group of psychics that have banded together to hunt down the lowest scum in the city and bring them to justice. -- -- After a couple of encounters between the cops and the psychics, two of the psychics begin to think that maybe they're not the good guys after all; but the third prefers killing to morality. Augmented by cybernetics from a mysterious source, this third hunter heads out on a killing spree, with the Special Security Force as the first target. -- -- Even with help from the other two psychics and her newly cyborged partner (after an unfortunate accident), Angel is going to have her work cut out trying to find the rogue psychic and the organization behind the Hunters. -- -- Licensor: -- Discotek Media, Manga Entertainment -- OVA - Sep 1, 1989 -- 13,655 5.94
Baldr Force Exe Resolution -- -- Satelight -- 4 eps -- Visual novel -- Action Drama Mecha Sci-Fi -- Baldr Force Exe Resolution Baldr Force Exe Resolution -- Any network runs all over the world, and the development of the information network reaches its acme. In this age, there are two developed worlds; "the real world" and "wired", or the virtual network world. -- -- Soma Toru belongs to a hacking group, Steppen Wolf, which runs around the network world freely. They attack the database of the UN forces as their last work. During this attack, he loses Nonomura Yuya, his friend as well as the team leader. Toru is arrested by the army. In exchange for letting him free, he has to work for an anti-hacker organization, the first squad of the UN Security Force Information Administration Bureau. -- -- Working for them, he is looking for the person who killed his friend, while the other members also have their own reason to fight. -- -- The three-way fights of the terrorist group, the security enterprise, and the army, continue every day. The various events occurred during the fight seem to be independent of each other at the first glance, but they're converging on one event as if they were attracted by something. -- -- Based on the game by GIGA. -- -- (Source: ANN) -- -- Licensor: -- Funimation -- OVA - Nov 10, 2006 -- 15,668 6.46
Black Bullet -- -- Kinema Citrus, Orange -- 13 eps -- Light novel -- Action Sci-Fi Mystery Seinen -- Black Bullet Black Bullet -- In the year 2021, a parasitic virus known as "Gastrea" infects humans and turns them into monsters. What is left of mankind now lives within the Monolith walls, walls that are made of Varanium, the only material that can hurt Gastrea. -- -- To counter the threat that the Gastrea pose, "Cursed Children"—female children whose bodies contain trace amounts of the virus which grant them superhuman abilities—officially called Initiators by the Tendo Civil Security, are given partners called Promoters, people who work to guide and protect the young Initiators. These teams of two are sent out on missions to fight the monsters created by the Gastrea virus and keep them at bay. -- -- Black Bullet revolves around the team of Enju Aihara, an Initiator, and Satomi Rentaro, a Promoter, as they go on missions to fight the growing threat of Gastrea in their hometown of Tokyo. -- -- -- Licensor: -- Sentai Filmworks -- 740,190 7.15
Burn Up Excess -- -- Magic Bus -- 13 eps -- Original -- Action Adventure Comedy Ecchi Police Sci-Fi Shounen -- Burn Up Excess Burn Up Excess -- Follows the exploits of Team Warrior, a special anti-terror wing of the Neo-Tokyo Police force. Team Warrior is comprised of the habitually broke Rio, gun-crazy Maya, computer specialist Lillica, tech-expert Nanvel, piliot/voyeur Yuji, and is led by the enigmatic Maki. The team faces a number of missions, ranging from bodyguard duty, breaking up robbery and arms rackets, and providing security for a very powerful tank. Rio and company continually thwart the terrorist aims of Ruby, an operative for a shadowy cabal of powerful men. Before the final showdown, the circumstances behind the formation of Team Warrior, how the precocious Rio came to join it, and Maki's painful past will be revealed. -- -- (Source: ANN) -- -- Licensor: -- ADV Films -- TV - Dec 12, 1997 -- 9,423 6.54
Burn Up Scramble -- -- AIC -- 12 eps -- Original -- Action Comedy Drama Ecchi Police Sci-Fi Shounen -- Burn Up Scramble Burn Up Scramble -- AD. 2023, Tokyo. Because of the change of the society such as internationalization and enlargement of the trading, the dark side of the society also continues changing. The criminals are getting deep, and their organizations are increasing its size, then the peace and security is getting worse. -- -- The government takes it seriously, and decides to introduce an innovative system. In order to cope with the special criminals, an extralegal police is founded. -- -- It is a special criminal team, Warriors, which consists of a few elite members. -- -- (Source: AnimeNfo) -- -- Licensor: -- Geneon Entertainment USA -- TV - Jan 12, 2004 -- 8,302 6.18
Chikyuu Bouei Kigyou Dai-Guard -- -- Xebec -- 26 eps -- Original -- Military Sci-Fi Adventure Comedy Mecha -- Chikyuu Bouei Kigyou Dai-Guard Chikyuu Bouei Kigyou Dai-Guard -- Thirteen years after their sudden disappearance, an alien race known as the Heterodyne resurface without warning. To combat the Heterodyne, three office workers from the 21st Century Security Corporation operate Dai-Guard - a giant robot no longer regarded as an oversized paperweight. Unfortunately, Dai-Guard is somewhat obsolete and in disrepair. It's a tough job, but salarymen can also save the world. -- -- (Source: ANN) -- -- Licensor: -- ADV Films, Discotek Media -- 7,817 7.12
Danganronpa 3: The End of Kibougamine Gakuen - Mirai-hen -- -- Lerche -- 12 eps -- Game -- Action Mystery Horror Psychological -- Danganronpa 3: The End of Kibougamine Gakuen - Mirai-hen Danganronpa 3: The End of Kibougamine Gakuen - Mirai-hen -- After Makoto Naegi and his fellow survivors escaped Hope's Peak Academy to the world beyond, they soon join the Future Foundation, an organization dedicated to combating despair. Just when all seems to be looking up, Naegi is arrested and tried for betrayal due to defending a malicious group of Remnants of Despair. Standing before all of the Future Foundation executives, he finds himself, along with Kyouko Kirigiri and Aoi Asahina, facing an unknown fate. -- -- The matter at hand only escalates when the organization's supposedly impenetrable security is hacked into by a -- familiar face: Monokuma. Much to Naegi's horror, the mechanical bear immediately announces the beginning of a new killing game, as moments later, the first victim appears as a signal for despair to resume its brutal conquest. -- -- In the conclusion to Danganronpa's gripping tale of hope and despair, Naegi, the Super High School-Level Lucky Student, must once again unravel the mystery as his colleagues and friends begin falling around him. However, there are no more class trials; among the 16 desperate participants, there is only one killer—and their death means the end of this infernal game. -- -- -- Licensor: -- Funimation -- 269,450 7.33
Detective Conan Movie 14: The Lost Ship in the Sky -- -- Tokyo Movie Shinsha -- 1 ep -- Manga -- Action Mystery Police Shounen -- Detective Conan Movie 14: The Lost Ship in the Sky Detective Conan Movie 14: The Lost Ship in the Sky -- One night, the Tokyo National Institute of Microorganisms is attacked by a mysterious organization calling themselves the "Red Siamese Cats." The group causes the explosion of a high-security lab storing a virus—said to have a mortality rate of 80% with no known cure. This act of terror dominates the headlines, overshadowing the unveiling of the world's biggest airship developed under Jirokichi Suzuki. Peculiarly, the unveiling has a note attached for Kaito "Kaitou Kid" Kuroba, challenging him to steal the jewel on display—the illustrious Lady Sky. -- -- Conan Edogawa is permitted to board the airship along with Kogorou Mouri, Ran Mouri, Sonoko Suzuki, Professor Agasa, and the Detective Boys. However, their fun comes to a halt when an unknown caller contacts Jirokichi and declares that they have released a certain virus in the smoking room. Soon after, symptoms begin to appear among the passengers and chaos ensues. Seizing the opportunity, the Red Siamese Cats suddenly appear and hijack the airship! -- -- To stop the assailants, Conan and Kaitou Kid, along with their allies, must work together to decipher the clues and discover the Red Siamese Cats' real objective before time runs out. -- -- Movie - Apr 17, 2010 -- 44,019 8.14
Detective Conan Movie 22: Zero the Enforcer -- -- TMS Entertainment -- 1 ep -- Manga -- Action Mystery Police Drama -- Detective Conan Movie 22: Zero the Enforcer Detective Conan Movie 22: Zero the Enforcer -- In the film's story, there is a sudden explosion at Tokyo Summit's giant Edge of Ocean facility. The shadow of Tooru Amuro, who works for the National Police Agency Security Bureau as Zero, appears at the site. In addition, the "triple-face" character is known as Rei Furuya as a detective and Kogorou Mouri's apprentice, and he is also known as Bourbon as a Black Organization member. Kogorou is arrested as a suspect in the case of the explosion. Conan conducts an investigation to prove Kogorou's innocence, but Amuro gets in his way. -- -- (Source: ANN) -- -- Licensor: -- Discotek Media -- Movie - Apr 13, 2018 -- 19,320 7.81
Detective Conan: The Magician of Starlight -- -- D & D Pictures -- 1 ep -- Manga -- Space -- Detective Conan: The Magician of Starlight Detective Conan: The Magician of Starlight -- The Japan Aerospace Exploration Agency (JAXA) has planned a huge exhibition to present current progress in space exploration, as well as showcase a set of large, beautiful celestial jewels. But then, a message arrives from infamous Kaitou Kid, who plans to steal the treasure. Conan and the Detective Boys are brought in as added security. Everything is going well... until the power cuts out. With limited time, Conan and company must protect the jewels from Kaitou Kid. -- Movie - ??? ??, 2012 -- 2,088 6.53
Fate/Grand Order: First Order -- -- Lay-duce -- 1 ep -- Game -- Action Supernatural Magic Fantasy -- Fate/Grand Order: First Order Fate/Grand Order: First Order -- In 2015, the Chaldea Security Organization draws on experts of both the magical and mundane fields to observe the future of mankind for possible extinction events. Humanity's survival seems assured for the next century—until the verdict suddenly changes, and now eradication of the species awaits at the end of 2016. The cause is unknown, but appears to be linked with the Japanese town of Fuyuki and the events of 2004 during the Fifth Holy Grail War. -- -- In response, Chaldea harnesses an experimental means of time travel, the Rayshift technology. With it, Ritsuka Fujimaru, a young man newly recruited to the organization, and the mysterious girl Mash Kyrielight, can travel back to 2004 and discover how to save humanity. A grand order to fight fate has been declared—an order to change the past and restore the future. -- -- -- Licensor: -- Aniplex of America -- Special - Dec 31, 2016 -- 144,880 6.77
Fate/Grand Order: First Order -- -- Lay-duce -- 1 ep -- Game -- Action Supernatural Magic Fantasy -- Fate/Grand Order: First Order Fate/Grand Order: First Order -- In 2015, the Chaldea Security Organization draws on experts of both the magical and mundane fields to observe the future of mankind for possible extinction events. Humanity's survival seems assured for the next century—until the verdict suddenly changes, and now eradication of the species awaits at the end of 2016. The cause is unknown, but appears to be linked with the Japanese town of Fuyuki and the events of 2004 during the Fifth Holy Grail War. -- -- In response, Chaldea harnesses an experimental means of time travel, the Rayshift technology. With it, Ritsuka Fujimaru, a young man newly recruited to the organization, and the mysterious girl Mash Kyrielight, can travel back to 2004 and discover how to save humanity. A grand order to fight fate has been declared—an order to change the past and restore the future. -- -- Special - Dec 31, 2016 -- 144,880 6.77
Heppoko Jikken Animation Excel♥Saga -- -- J.C.Staff -- 26 eps -- Manga -- Comedy Parody Sci-Fi Shounen -- Heppoko Jikken Animation Excel♥Saga Heppoko Jikken Animation Excel♥Saga -- It's hard to take over the world, and the enigmatic Il Palazzo, head of the ACROSS organization, knows this, so he aims to start small by conquering the city of Fukuoka. Two young officers, the Excel and her partner Hyatt, are tasked with executing this plan, but standing in their way are the City Security workers, a group consisting of three (mostly) normal guys, a very severe girl, and some robots. Regardless of simplicity, Excel and Hyatt always manage to screw up their missions, which usually result in death and lots of destruction. -- -- Heppoko Jikken Animation Excel♥Saga chronicles the elaborate troubles that the ACROSS officers get themselves into, as Excel and Hyatt never fail to do their jobs improperly. -- -- 94,521 7.50
Heppoko Jikken Animation Excel♥Saga -- -- J.C.Staff -- 26 eps -- Manga -- Comedy Parody Sci-Fi Shounen -- Heppoko Jikken Animation Excel♥Saga Heppoko Jikken Animation Excel♥Saga -- It's hard to take over the world, and the enigmatic Il Palazzo, head of the ACROSS organization, knows this, so he aims to start small by conquering the city of Fukuoka. Two young officers, the Excel and her partner Hyatt, are tasked with executing this plan, but standing in their way are the City Security workers, a group consisting of three (mostly) normal guys, a very severe girl, and some robots. Regardless of simplicity, Excel and Hyatt always manage to screw up their missions, which usually result in death and lots of destruction. -- -- Heppoko Jikken Animation Excel♥Saga chronicles the elaborate troubles that the ACROSS officers get themselves into, as Excel and Hyatt never fail to do their jobs improperly. -- -- -- Licensor: -- ADV Films, Funimation -- 94,521 7.50
Inu x Boku SS -- -- David Production -- 12 eps -- Manga -- Comedy Supernatural Romance Shounen -- Inu x Boku SS Inu x Boku SS -- Ririchiyo Shirakiin is the sheltered daughter of a renowned family. With her petite build and wealthy status, Ririchiyo has been a protected and dependent girl her entire life, but now she has decided to change all that. However, there is just one problem—the young girl has a sharp tongue she can't control, and terrible communication skills. -- -- With some help from a childhood friend, Ririchiyo takes up residence in Maison de Ayakashi, a secluded high-security apartment complex that, as the unsociable 15-year-old soon discovers, is home to a host of bizarre individuals. Furthermore, their quirky personalities are not the strangest things about them: each inhabitant of the Maison de Ayakashi, including Ririchiyo, is actually half-human, half-youkai. -- -- But Ririchiyo's troubles have only just begun. As a requirement of staying in her new home, she must be accompanied by a Secret Service agent. Ririchiyo's new partner, Soushi Miketsukami, is handsome, quiet... but ridiculously clingy and creepily submissive. With Soushi, her new supernatural neighbors, and the beginning of high school, Ririchiyo definitely seems to have a difficult path ahead of her. -- -- -- Licensor: -- Sentai Filmworks -- TV - Jan 13, 2012 -- 416,781 7.45
Inu x Boku SS -- -- David Production -- 12 eps -- Manga -- Comedy Supernatural Romance Shounen -- Inu x Boku SS Inu x Boku SS -- Ririchiyo Shirakiin is the sheltered daughter of a renowned family. With her petite build and wealthy status, Ririchiyo has been a protected and dependent girl her entire life, but now she has decided to change all that. However, there is just one problem—the young girl has a sharp tongue she can't control, and terrible communication skills. -- -- With some help from a childhood friend, Ririchiyo takes up residence in Maison de Ayakashi, a secluded high-security apartment complex that, as the unsociable 15-year-old soon discovers, is home to a host of bizarre individuals. Furthermore, their quirky personalities are not the strangest things about them: each inhabitant of the Maison de Ayakashi, including Ririchiyo, is actually half-human, half-youkai. -- -- But Ririchiyo's troubles have only just begun. As a requirement of staying in her new home, she must be accompanied by a Secret Service agent. Ririchiyo's new partner, Soushi Miketsukami, is handsome, quiet... but ridiculously clingy and creepily submissive. With Soushi, her new supernatural neighbors, and the beginning of high school, Ririchiyo definitely seems to have a difficult path ahead of her. -- -- TV - Jan 13, 2012 -- 416,781 7.45
Joukamachi no Dandelion -- -- Production IMS -- 12 eps -- 4-koma manga -- Slice of Life Comedy Super Power Seinen -- Joukamachi no Dandelion Joukamachi no Dandelion -- The Sakurada siblings live a normal life in a typical Japanese household. Well, that's what their father, the king, wants for them at least. As members of the royal family, each sibling possesses a unique ability, and over two thousand security cameras have been placed around town to make sure the children are safe and sound. Moreover, all nine of them have been designated as a potential successor to the throne with the decision that the next ruler will be selected through an election. -- -- However, for the timid Akane Sakurada, the third eldest daughter who wields the power to manipulate gravity, all of this attention is a complete nightmare. With all the cameras constantly monitoring the candidates and even broadcasting their actions on the Sakurada-dedicated news channel, she decides that if she becomes king, the cameras have got to go. But just how will she convince the public that she is the most suited to rule if she can't even overcome her own shyness?! Election season is in full swing as the search for the next king begins in Joukamachi no Dandelion. -- -- 136,789 7.20
Joukamachi no Dandelion -- -- Production IMS -- 12 eps -- 4-koma manga -- Slice of Life Comedy Super Power Seinen -- Joukamachi no Dandelion Joukamachi no Dandelion -- The Sakurada siblings live a normal life in a typical Japanese household. Well, that's what their father, the king, wants for them at least. As members of the royal family, each sibling possesses a unique ability, and over two thousand security cameras have been placed around town to make sure the children are safe and sound. Moreover, all nine of them have been designated as a potential successor to the throne with the decision that the next ruler will be selected through an election. -- -- However, for the timid Akane Sakurada, the third eldest daughter who wields the power to manipulate gravity, all of this attention is a complete nightmare. With all the cameras constantly monitoring the candidates and even broadcasting their actions on the Sakurada-dedicated news channel, she decides that if she becomes king, the cameras have got to go. But just how will she convince the public that she is the most suited to rule if she can't even overcome her own shyness?! Election season is in full swing as the search for the next king begins in Joukamachi no Dandelion. -- -- -- Licensor: -- Funimation -- 136,789 7.20
Kimera -- -- animate Film -- 1 ep -- Manga -- Action Horror Sci-Fi Shounen Ai Supernatural Vampire -- Kimera Kimera -- Osamu and Jay are two cereal salesmen traveling for work when they encounter a barricade. Curious as to what is going on, they step out of their car and enter into a government secret. Two mysterious demon-like men have been terrorizing the military, who came to respond to a car crash involving a vehicle carrying government research material. Inside the car wreckage, Osamu finds a beautiful hermaphrodite with gold and crimson eyes trapped in a frozen chamber. Osamu shares a kiss with them through the glass before he is forced to flee the scene. -- -- Osamu and Jay interrogate Jay's father, a top researcher at a government laboratory, who reveals that what Osamu and Jay saw was top-secret, and they would likely be sitting in prison if it weren't for his influence. While Jay is ready to forget everything that happened, Osamu cannot let it go that easily. After stealing a security badge, Osamu finds where the person he kissed is being kept, and learns that their name is Kimera. Osamu wants to run away with the beautiful Kimera, though he does not know why Kimera is being held captive or what a relationship with them means for the future of humanity. -- -- -- Licensor: -- ADV Films -- OVA - Jul 31, 1996 -- 6,184 5.12
Kimera -- -- animate Film -- 1 ep -- Manga -- Action Horror Sci-Fi Shounen Ai Supernatural Vampire -- Kimera Kimera -- Osamu and Jay are two cereal salesmen traveling for work when they encounter a barricade. Curious as to what is going on, they step out of their car and enter into a government secret. Two mysterious demon-like men have been terrorizing the military, who came to respond to a car crash involving a vehicle carrying government research material. Inside the car wreckage, Osamu finds a beautiful hermaphrodite with gold and crimson eyes trapped in a frozen chamber. Osamu shares a kiss with them through the glass before he is forced to flee the scene. -- -- Osamu and Jay interrogate Jay's father, a top researcher at a government laboratory, who reveals that what Osamu and Jay saw was top-secret, and they would likely be sitting in prison if it weren't for his influence. While Jay is ready to forget everything that happened, Osamu cannot let it go that easily. After stealing a security badge, Osamu finds where the person he kissed is being kept, and learns that their name is Kimera. Osamu wants to run away with the beautiful Kimera, though he does not know why Kimera is being held captive or what a relationship with them means for the future of humanity. -- -- OVA - Jul 31, 1996 -- 6,184 5.12
Koukaku Kidoutai Arise: Ghost in the Shell - Border:1 Ghost Pain -- -- Production I.G -- 1 ep -- Manga -- Sci-Fi Police Psychological Mecha -- Koukaku Kidoutai Arise: Ghost in the Shell - Border:1 Ghost Pain Koukaku Kidoutai Arise: Ghost in the Shell - Border:1 Ghost Pain -- The anime's story is set in 2027, one year after the end of the fourth non-nuclear war. New Port City is still reeling from the war's aftermath when it suffers a bombing caused by a self-propelled mine. Then, a military member implicated in arms-dealing bribes is gunned down. -- -- During the investigation, Public Security Section's Daisuke Aramaki encounters Motoko Kusanagi, the cyborg wizard-level hacker assigned to the military's 501st Secret Unit. Batou, a man with the "eye that does not sleep," suspects that Kusanagi is the one behind the bombing. The Niihama Prefectural Police detective Togusa is pursuing his own dual cases of the shooting death and a prostitute's murder. Motoko herself is being watched by the 501st Secret Unit's head Kurutsu and cyborg agents. -- -- (Source: ANN) -- -- Licensor: -- Funimation -- Movie - Jun 22, 2013 -- 53,787 7.46
Koukaku Kidoutai Arise: Ghost in the Shell - Border:2 Ghost Whispers -- -- Production I.G -- 1 ep -- Manga -- Sci-Fi Police Psychological Mecha -- Koukaku Kidoutai Arise: Ghost in the Shell - Border:2 Ghost Whispers Koukaku Kidoutai Arise: Ghost in the Shell - Border:2 Ghost Whispers -- Second movie of Ghost in the Shell: Arise. -- -- Freed of her responsibilities with the 501 Organization, Motoko Kusanagi must now learn how to take orders from Aramaki. Someone hacks the Logicomas, and Batou enlists the help of former army intelligence officer Ishikawa and former air artillery expert Borma. Kusanagi also seeks to enlist ace sniper Saito and undercover cop Paz into the new Public Security Section 9. The two groups rival each other in a case involving a man who receives false memories of a refugee transport operation. -- -- (Source: Wikipedia) -- -- Licensor: -- Funimation -- Movie - Nov 30, 2013 -- 43,612 7.51
Koukaku Kidoutai -- -- Production I.G -- 1 ep -- Manga -- Action Mecha Police Psychological Sci-Fi Seinen -- Koukaku Kidoutai Koukaku Kidoutai -- In the year 2029, Niihama City has become a technologically advanced metropolis. Due to great improvements in cybernetics, its citizens are able to replace their limbs with robotic parts. The world is now more interconnected than ever before, and the city's Public Security Section 9 is responsible for combating corruption, terrorism, and other dangerous threats following this shift towards globalization. -- -- The strong-willed Major Motoko Kusanagi of Section 9 spearheads a case involving a mysterious hacker known only as the "Puppet Master," who leaves a trail of victims stripped of their memories. Like many in this futuristic world, the Puppet Master's body is almost entirely robotic, giving them incredible power. -- -- As Motoko and her subordinates follow the enigmatic criminal's trail, other parties—including Section 6—start to get involved, forcing her to confront the extremely complicated nature of the case. Pondering about various philosophical questions, such as her own life's meaning, Motoko soon realizes that the one who will provide these answers is none other than the Puppet Master themself. -- -- -- Licensor: -- Manga Entertainment -- Movie - Nov 18, 1995 -- 482,343 8.29
Koukaku Kidoutai: SAC_2045 -- -- Production I.G, Sola Digital Arts -- 12 eps -- Manga -- Action Military Sci-Fi Police Mecha Seinen -- Koukaku Kidoutai: SAC_2045 Koukaku Kidoutai: SAC_2045 -- The year is 2045, and artificial intelligence has undergone tremendous developments. Governments use them as weapons, engaging in never-ending warfare to sustain their economies. The mercenary group GHOST, headed by Major Motoko Kusanagi, is no stranger to this landscape. However, the rapid innovation of this technology causes a new threat to loom over the horizon. -- -- Having left Public Security Section 9, Kusanagi and her group are involved in many operations worldwide related to these proxy wars. But a seemingly simple job of locating an arms dealer drags GHOST into a hidden conflict against cybernetically enhanced individuals, who have inexplicably gained extreme intelligence and physical abilities. Dubbed "post-humans," their emergence sets off a chain of events leading to the reunion of Section 9. Armed with a new mission, it is up to Kusanagi and her reestablished team to prevent global chaos at the hands of these post-humans. -- -- ONA - Apr 23, 2020 -- 26,133 6.67
Koukaku Kidoutai: Shin Movie -- -- Production I.G -- 1 ep -- Manga -- Action Sci-Fi Police Psychological Mecha -- Koukaku Kidoutai: Shin Movie Koukaku Kidoutai: Shin Movie -- In the year 2027, a year following the end of the non-nuclear World War IV, a bomb has gone off in Newport City, killing a major arms dealer who may have ties with the mysterious 501 Organization. Public Security official Daisuke Aramaki hires full-body cyber prosthesis user and hacker extraordinaire, Motoko Kusanagi, to investigate. -- -- (Source: Wikipedia) -- -- Licensor: -- Funimation -- Movie - Jun 20, 2015 -- 40,670 7.47
Lupin III: Dead or Alive -- -- Tokyo Movie Shinsha -- 1 ep -- Manga -- Action Adventure Mystery Comedy Seinen -- Lupin III: Dead or Alive Lupin III: Dead or Alive -- Lupin, Goemon, and Jigen take a mini-helicopter and head to the mysterious “Drifting Island” looking for a treasure rumored to be hidden somewhere on it. Through their exploration of the island, the trio encounters the lethal “Nanomachine,” the island’s security system. The trio triggers the alarm, springing “the Nanomachine” to life. The key to solving the island’s mystery lies in the small nation of Zufu. This once prosperous nation is now ruled by the ruthless, knife-collecting, General Headhunter. Fujiko does her usual probing and hacks into General Headhunter’s computer hoping to find some crucial information. Zenigata has received a video message from Lupin in which Lupin announces his desire for the priceless treasure. Oleander, a fiery blond officer with some hidden secrets of her own, steps in to help Zenigata. Armed with their newly found information, Lupin, Goemon, Jigen, and Fujiko go back to “Drifting Island,” but this time they are followed by General Headhunter. -- -- (Source: ANN) -- -- Licensor: -- Funimation -- Movie - Apr 20, 1996 -- 8,836 7.16
Maken-Ki! Two -- -- Xebec -- 10 eps -- Manga -- Action Harem Super Power Ecchi Martial Arts School -- Maken-Ki! Two Maken-Ki! Two -- Takeru continues his education at Tenbi Academy as part of the newly formed Security Committee. As a team with the other members, they battle unscrupulous individuals who use their Maken for evil purposes. In the meantime, his libido and the conflicting romantic interests of the girls surrounding him complicate matters considerably. -- -- (Source: ANN) -- -- Licensor: -- Funimation -- TV - Jan 16, 2014 -- 118,148 6.17
Michiko to Hatchin -- -- Manglobe -- 22 eps -- Original -- Action Adventure -- Michiko to Hatchin Michiko to Hatchin -- Under the unrelenting heat of the South American sun, hardened criminal Michiko Malandro breaks out of a high security prison for the fourth time in search of a man from her past. Michiko finds a clue in the form of Hana Morenos, a young girl trapped under the fists of her abusive foster family. In her powerlessness, Hana fantasizes about the day when she is finally whisked away from her captors by her very own Prince Charming. Little does she know that her fated prince would turn out to be the buxom and husky convict who charges in atop a stolen motorbike, claiming to be her mother. -- -- The unlikely duo chase down their dreams in the sun-drenched land of Diamandra, navigating through the cacophony of betrayal, poverty, and child exploitation rings hiding in plain sight. However, wind of Michiko's manhunt soon reaches the ears of criminal syndicate Monstro Preto, and a storm of gang warfare begins brewing over the horizon… -- -- Michiko to Hatchin is the story of vibrant people and their clashing agendas, and of all the unlikely human connections drawn together by one elusive man. -- -- -- Licensor: -- Funimation -- TV - Oct 16, 2008 -- 153,950 7.85
Mobile Suit Gundam: Iron-Blooded Orphans -- -- Sunrise -- 25 eps -- Original -- Action Drama Mecha Sci-Fi Space -- Mobile Suit Gundam: Iron-Blooded Orphans Mobile Suit Gundam: Iron-Blooded Orphans -- Over three hundred years have passed since the Calamity War, the great conflict between Earth and its outer space colonies. Now Earth is ruled over by four economic blocs, and the military organization Gjallarhorn is responsible for keeping the peace. Mars, on the other hand, depends heavily on Earth's economy. -- -- Horrified by the appalling living conditions that Mars' inhabitants have to bear, Kudelia Aina Bernstein, a young aristocrat from the Chryse Autonomous Region, gets involved in the Red Planet's independence movement. She hires the services of a local company, Chryse Guard Security (CGS), to escort her on the journey to Earth to negotiate economic conditions with the earthly bloc that controls the region. The Third Army Division—consisting of Mikazuki Augus, Orga Itsuka, and many other child soldiers—are chosen to protect her. -- -- When Gjallarhorn attacks the CGS facilities to assassinate the young revolutionary threatening their interests, Orga and his comrades must not let the attackers accomplish their goal—in fact, Gjallarhorn's actions might turn out to be the unintentional catalyst that leads the children to be the forgers of their own destiny. -- -- -- Licensor: -- Funimation -- 172,819 8.03
Naruto: Shippuuden Movie 5 - Blood Prison -- -- Studio Pierrot -- 1 ep -- Manga -- Action Adventure Martial Arts Mystery Shounen Super Power -- Naruto: Shippuuden Movie 5 - Blood Prison Naruto: Shippuuden Movie 5 - Blood Prison -- During their discussion of a sensitive investigation A, the Fourth Raikage, and his subordinates are ambushed by a cloaked intruder. As the Kumogakure leader repels the assault, he is shocked to discover that the culprit is Naruto Uzumaki! -- -- However, the assassination attempt is not the only crime attributed to the young ninja, who vigorously denies the accusations. To avoid a diplomatic conflict, Tsunade forcibly sends him to Kusagakure's Houzuki Castle—a maximum-security penitentiary dedicated to ninja criminals—until the situation is resolved. -- -- Despite his powers being immediately suppressed by Mui, the prison's warden who possesses the ability to seal chakra, Naruto recklessly engages in futile escape attempts. But with the help of two fellow inmates, he realizes that there is more to this legendary detention facility than meets the eye. Uncovering a terrible secret, the trio embarks on a dangerous operation that may be Naruto's only chance to break free and prove his innocence. -- -- -- Licensor: -- VIZ Media -- Movie - Jul 30, 2011 -- 169,645 7.45
Naruto: Shippuuden Movie 5 - Blood Prison -- -- Studio Pierrot -- 1 ep -- Manga -- Action Adventure Martial Arts Mystery Shounen Super Power -- Naruto: Shippuuden Movie 5 - Blood Prison Naruto: Shippuuden Movie 5 - Blood Prison -- During their discussion of a sensitive investigation A, the Fourth Raikage, and his subordinates are ambushed by a cloaked intruder. As the Kumogakure leader repels the assault, he is shocked to discover that the culprit is Naruto Uzumaki! -- -- However, the assassination attempt is not the only crime attributed to the young ninja, who vigorously denies the accusations. To avoid a diplomatic conflict, Tsunade forcibly sends him to Kusagakure's Houzuki Castle—a maximum-security penitentiary dedicated to ninja criminals—until the situation is resolved. -- -- Despite his powers being immediately suppressed by Mui, the prison's warden who possesses the ability to seal chakra, Naruto recklessly engages in futile escape attempts. But with the help of two fellow inmates, he realizes that there is more to this legendary detention facility than meets the eye. Uncovering a terrible secret, the trio embarks on a dangerous operation that may be Naruto's only chance to break free and prove his innocence. -- -- Movie - Jul 30, 2011 -- 169,645 7.45
Noblesse -- -- Production I.G -- 13 eps -- Web manga -- Action School Supernatural Vampire -- Noblesse Noblesse -- The "Noblesse" Cadis Etrama di Raizel, also known as "Rai," is enrolled in Ye Ran High School by his servant Frankenstein to stay hidden from the sights of the Union, a mysterious organization out for Rai's blood. Rai commences his life as a student, making himself familiar with his classmates and the daily activities of humans. However, his new life is far from peaceful, and Rai is soon forced to save his new friends from the hands of the Union that had abducted them. --   -- Meanwhile, M-21—a Union agent gone rogue during Rai's rescue operation—joins the Ye Ran High School security staff after a proposition by the school's director, who happens to be none other than Frankenstein himself. On the surface, M-21 is a prim and proper employee, but in truth he is shackled by his former ties to the Union and the inevitable consequences of betraying the organization. --   -- To further complicate matters, Nobles Regis K. Landegre and Seira J. Loyard enroll in the same school to investigate the Noblesse. While the Union conducts a manhunt for M-21 to extract clues regarding their missing agents, Rai is forced to keep his identity hidden while protecting all that he holds dear. -- -- 177,212 6.82
Ou Dorobou Jing -- -- Studio Deen -- 13 eps -- Manga -- Adventure Comedy Fantasy Sci-Fi Shounen -- Ou Dorobou Jing Ou Dorobou Jing -- Jing may appear to be a young boy, but his remarkable skills make him one of the most feared thieves on the planet. Along with his feathered partner Kir, Jing travels from town to town, stealing anything of value regardless of the amount of security. But when he's in a pinch, he has one more trick up his sleeve: Kir bonds with Jing's right arm to perform the effectively deadly "Kir Royale" attack. And because of all this, Jing is infamously known by many as the "King of Bandits." -- -- Licensor: -- ADV Films -- TV - May 15, 2002 -- 33,425 7.22
Project Scard: Praeter no Kizu -- -- GoHands -- 13 eps -- Other -- Action Super Power -- Project Scard: Praeter no Kizu Project Scard: Praeter no Kizu -- Project Scard depicts the encounters and battles of those who have tattoos which possess the sealed powers of divine beasts and gods. The story is set in the Akatsuki Special Zone, a lawless zone in Tokyo. -- -- "Helios" are those who use the ability of the tattoos to protect the city, "Artemis" are committed to maintain security and control, whilst having a strong commercial motive, and the "Public Security Special Service" are Scard Staff of the metropolitan police department. They live through the turbulent days to keep on going. -- -- (Source: MAL News) -- -- Licensor: -- Funimation -- 22,414 5.78
Rakuen Tsuihou -- -- Graphinica -- 1 ep -- Original -- Action Sci-Fi Mecha -- Rakuen Tsuihou Rakuen Tsuihou -- In a future where a massive disaster has devastated Earth, most of humanity has abandoned their physical bodies and relocated in digital form to DEVA, an advanced space station orbiting the ravaged planet. Free from the limitations of traditional existence, such as death and hunger, the inhabitants of this virtual reality reside in relative peace until Frontier Setter, a skilled hacker, infiltrates the system and spreads subversive messages to the populace. -- -- Labeled a threat to security by authorities, Frontier Setter is pursued by Angela Balzac, a dedicated member of DEVA's law enforcement. When the hacker's signal is traced to Earth, Angela takes on physical form, transferring her consciousness to a clone body and traveling to the world below in order to deal with the menace. On Earth, she is assisted by Dingo, a charismatic agent, and during her journey to uncover the mystery behind Frontier Setter, she gradually discovers startling realities about the wasteland some of humanity still refers to as home, as well as the paradise above. -- -- -- Licensor: -- Aniplex of America -- Movie - Nov 15, 2014 -- 83,758 7.37
Rakuen Tsuihou -- -- Graphinica -- 1 ep -- Original -- Action Sci-Fi Mecha -- Rakuen Tsuihou Rakuen Tsuihou -- In a future where a massive disaster has devastated Earth, most of humanity has abandoned their physical bodies and relocated in digital form to DEVA, an advanced space station orbiting the ravaged planet. Free from the limitations of traditional existence, such as death and hunger, the inhabitants of this virtual reality reside in relative peace until Frontier Setter, a skilled hacker, infiltrates the system and spreads subversive messages to the populace. -- -- Labeled a threat to security by authorities, Frontier Setter is pursued by Angela Balzac, a dedicated member of DEVA's law enforcement. When the hacker's signal is traced to Earth, Angela takes on physical form, transferring her consciousness to a clone body and traveling to the world below in order to deal with the menace. On Earth, she is assisted by Dingo, a charismatic agent, and during her journey to uncover the mystery behind Frontier Setter, she gradually discovers startling realities about the wasteland some of humanity still refers to as home, as well as the paradise above. -- -- Movie - Nov 15, 2014 -- 83,758 7.37
RD Sennou Chousashitsu -- -- Production I.G -- 26 eps -- Original -- Action Sci-Fi -- RD Sennou Chousashitsu RD Sennou Chousashitsu -- 2061 AD. Fifty years have passed since mankind developed the Network society. It was anticipated that this new infrastructure would realize a utopia where people connected with each other at the level of consciousness. However, new social problems such as personal data leaks and proliferation of manipulated information began to surface. Nevertheless, people still relied on the Network to exchange information, and proved unable to opt to abandon it. -- -- In due course, a new Network realm with more effective security measures was developed. This was called Meta Real Network, usually abbreviated as "the Metal." -- -- The Metal accommodated personal memory data within protected virtual stand-alone organic cyber enclaves called bubble shells and eventually pervaded the everyday lives of people. -- -- However, people gradually learned to release and explode their instincts within the secure environment of the Metal. The unleashed instincts pushed each individual's consciousness to drown in the sea of information and to be exposed to the pressures of desire. Meanwhile, norms and regulations continued to bind their real world lives. Thus, strange friction between the two worlds began to manifest themselves as aberrations beyond the bounds of the imaginable. -- -- Experts who challenged the deep sea of the Metal to investigate and decipher such aberrations were called cyber divers. -- -- This is a story of a cyber diver, Masamichi Haru, who investigates the incidents that lie between Reality and the Metal. -- -- (Source: Production I.G) -- 23,293 7.12
Sakura Trick -- -- Studio Deen -- 12 eps -- 4-koma manga -- Slice of Life Comedy Romance School Seinen Shoujo Ai -- Sakura Trick Sakura Trick -- Having been best friends since middle school, Haruka Takayama and Yuu Sonoda plan to attend Misato West High School together. However, despite being assigned to the same class, a cruel twist of fate has them seated on the opposite ends of their classroom! To make matters worse, their school will shut down in three years, making them the final intake of first-year students. Undeterred by this chain of unfortunate events, Haruka is set on sticking with Yuu, striving to create many wonderful memories with her. -- -- Much to Haruka's jealousy however, Yuu's easygoing demeanor quickly attracts the attention of their female classmates. Sympathizing with her friend's growing insecurity, Yuu ends up sharing a deep, affectionate kiss with her in an empty classroom. The act intensifies their bond as "special friends," gradually revealing a different aspect to their unique friendship while also inviting new conflicts. -- -- -- Licensor: -- Sentai Filmworks -- TV - Jan 10, 2014 -- 215,977 7.00
Sakura Trick -- -- Studio Deen -- 12 eps -- 4-koma manga -- Slice of Life Comedy Romance School Seinen Shoujo Ai -- Sakura Trick Sakura Trick -- Having been best friends since middle school, Haruka Takayama and Yuu Sonoda plan to attend Misato West High School together. However, despite being assigned to the same class, a cruel twist of fate has them seated on the opposite ends of their classroom! To make matters worse, their school will shut down in three years, making them the final intake of first-year students. Undeterred by this chain of unfortunate events, Haruka is set on sticking with Yuu, striving to create many wonderful memories with her. -- -- Much to Haruka's jealousy however, Yuu's easygoing demeanor quickly attracts the attention of their female classmates. Sympathizing with her friend's growing insecurity, Yuu ends up sharing a deep, affectionate kiss with her in an empty classroom. The act intensifies their bond as "special friends," gradually revealing a different aspect to their unique friendship while also inviting new conflicts. -- -- TV - Jan 10, 2014 -- 215,977 7.00
Saredo Tsumibito wa Ryuu to Odoru -- -- Seven Arcs Pictures -- 12 eps -- Light novel -- Action Drama Fantasy Sci-Fi -- Saredo Tsumibito wa Ryuu to Odoru Saredo Tsumibito wa Ryuu to Odoru -- It is a world replete with dragons and Jushiki sorcerers. Jushiki is a devastatingly powerful formula that can alter the laws of physics, capable of creating enormous TNT explosives or poisonous gas through plasma and nuclear fusion. A down-on-his-luck sorcerer named Gayus joins forces with the beautiful but cruel Jushiki practitioner, Gigina, as bounty hunters pursuing dragons. Then one day, they are presented with an odd request: to serve as security guards for a grand festival put on by Mouldeen, the ruler of their kingdom. It is then that a mysterious serial killing of Jushiki sorcerers begins. -- -- (Source: TBS Global Business) -- -- Licensor: -- Funimation -- 47,289 5.81
Seihou Tenshi Angel Links -- -- Sunrise -- 13 eps -- Novel -- Action Adventure Space Comedy Romance Drama Sci-Fi -- Seihou Tenshi Angel Links Seihou Tenshi Angel Links -- Li Meifon is the head of a free, no expenses paid protection/security agency for escorting ships across outer space. Though only 16, she posesses great skill and leadership qualities while commanding her crew aboard their ship, the "Angel Links." However, some unpleasant memories begin to trouble her and she starts questioning her own past and reason for existence. Join Li Meifon and the rest of the Angel Links crew on their adventures through the Oracion star system as they battle pirates, government organizations, and a Tao master, all while finally uncovering Meifon's dark and mysterious past. -- -- Licensor: -- Bandai Entertainment, Funimation -- 7,571 5.96
Solty Rei -- -- Gonzo -- 24 eps -- Original -- Action Sci-Fi Super Power -- Solty Rei Solty Rei -- In a future-based disaster-ridden city with an enormous gap between the rich and the poor, it is hard to tell which humans are walking around with cybernetic body parts. This makes Roy Revant's job as a renegade bounty hunter/bodyguard-for-hire even more difficult. When a young girl with unbeliveable strength rescues him from a particularly dangerous criminal, Roy realizes that perhaps help can be found in the strangest of places. Joining together with a few others, they engage in a battle to find out the truth behind the giant conglomerates that are supposedly serving mankind and making life better. -- -- Solty, an android who has lost her memory, has escaped and is being hunted by the RUC Security Bureau. She encounters the bounty hunter Roy and he adopts her as his daughter after being hired as a bodygaurd for Miranda. -- -- (Source: ANN) -- -- Licensor: -- Funimation -- 25,949 7.27
Space Cobra -- -- Tokyo Movie Shinsha -- 31 eps -- Manga -- Action Adventure Sci-Fi Space -- Space Cobra Space Cobra -- Meek salaryman Johnson discovers that he is in fact the notorious (and reportedly dead) space pirate Cobra, with a new face and altered memories. Embedded in his left arm is Cobra's unique Psychogun, a famous weapon powered by his own will. Having recovered his past, his partner-in-crime Armaroid Lady, and his spaceship, he journeys across the galaxy seeking adventure. -- -- On his travels he will hunt for the galaxy's ultimate weapon, rob museums, break into and out of maximum-security prison, infiltrate a drug ring in the brutal and deadly sport of Rugball, engineer a coup on an alien world, confront the Pirate Guild's most fearsome leaders, and do much else besides—smoking cigars, chasing women and cracking jokes all the while. -- -- This, the 1982–83 Cobra TV anime, adapts the Cobra manga from the beginning, covering the first three major stories and building to a grand conclusion with some shorter one-off tales interspersed along the way. (The 1982 Cobra film has only a loose connection to the TV series—though it involved the same director and some of the same animators.) -- -- Licensor: -- Discotek Media, Nozomi Entertainment -- TV - Oct 7, 1982 -- 16,559 7.70
Summer Wars -- -- Madhouse -- 1 ep -- Original -- Sci-Fi Comedy -- Summer Wars Summer Wars -- OZ, a virtual world connected to the internet, has become extremely popular worldwide as a spot for people to engage in a large variety of activities, such as playing sports or shopping, through avatars created and customized by the user. OZ also possesses a near impenetrable security due to its strong encryption, ensuring that any personal data transmitted through the networks will be kept safe in order to protect those who use it. Because of its convenient applications, the majority of society has become highly dependent on the simulated reality, even going as far as entrusting the system with bringing back the unmanned asteroid explorer, Arawashi. -- -- Kenji Koiso is a 17-year-old math genius and part-time OZ moderator who is invited by his crush Natsuki Shinohara on a summer trip. But unbeknownst to him, this adventure requires him to act as her fiancé. Shortly after arriving at Natsuki's family's estate, which is preparing for her great-grandmother's 90th birthday, he receives a strange, coded message on his cell phone from an unknown sender who challenges him to solve it. Kenji is able to crack the code, but little does he know that his math expertise has just put Earth in great danger. -- -- -- Licensor: -- Funimation, GKIDS, Warner Bros. Japan -- Movie - Aug 1, 2009 -- 435,444 8.08
Wo de Tian Jie Nu You -- -- - -- 15 eps -- Web manga -- Adventure Super Power Supernatural Romance Fantasy -- Wo de Tian Jie Nu You Wo de Tian Jie Nu You -- In the modern cultivation world, everywhere is law of the jungle, everyone feels insecure. After saving a cultivatior girl, the security guard Ma Yingxiong accidentally starts the journey of practicing cultivation. -- -- (Source: Guodong Subs) -- ONA - Sep 20, 2017 -- 20,163 6.55
Wonderful Days -- -- - -- 1 ep -- Original -- Action Drama Romance Sci-Fi -- Wonderful Days Wonderful Days -- Set in 2142, Wonderful Days depicts a world that has been nearly destroyed by environmental pollution. Human life as we know it is almost extinct, and only a few were able to pull through the collapse of Earth's ecosystem. In order to deal with the chaos, a city named Ecoban was created. The city uses the very pollution that caused the disaster as an energy source. -- -- However, although the initial plan was successful to an extent, it didn't just create a new source of energy, but also an elite group of people. This prestigious faction believes that they are above the system, and are not willing to accept survivors from outside the city unless they are put to work as laborers. -- -- Among the people living in the wasteland outside Ecoban is a young man named Shua. He leads a very difficult life, but tries to make the most of it through the love that he feels for his childhood friend Jay. Unfortunately, Jay may be more interested in her security commander Cade than in Shua, and thus a love triangle is formed. Not only does Shua have to deal with the heartbreak, but he must also find a new way to survive in the crumbles left from the once-beautiful planet Earth. -- Movie - Jul 17, 2003 -- 31,680 7.04
https://wiki.archlinux.org/index.php/Arch_package_guidelines/Security
https://wiki.archlinux.org/index.php/Arch_package_security
https://wiki.archlinux.org/index.php/Arch_Security_Team
https://wiki.archlinux.org/index.php/ArchWiki:Privacy_policy#Our_commitment_to_data_security
https://wiki.archlinux.org/index.php/Category:Security
https://wiki.archlinux.org/index.php/Category:Security_testing
https://wiki.archlinux.org/index.php/Category_talk:Security
https://wiki.archlinux.org/index.php/Category:Transport_Layer_Security
https://wiki.archlinux.org/index.php/General_recommendations#DNS_security
https://wiki.archlinux.org/index.php/Getting_involved#Inform_about_security_issues
https://wiki.archlinux.org/index.php/List_of_applications#File_security
https://wiki.archlinux.org/index.php/List_of_applications#Network_security
https://wiki.archlinux.org/index.php/List_of_applications/Security
https://wiki.archlinux.org/index.php/List_of_applications#Security
https://wiki.archlinux.org/index.php/List_of_applications/Security#Cryptography
https://wiki.archlinux.org/index.php/List_of_applications/Security#Password_managers
https://wiki.archlinux.org/index.php/Network_Security_Services
https://wiki.archlinux.org/index.php/Security
https://wiki.archlinux.org/index.php/Security#Sandboxing_applications
https://wiki.archlinux.org/index.php/Special:Search?search="python-flask-security-too"
https://wiki.archlinux.org/index.php/Transport_Layer_Security
https://wiki.archlinux.org/index.php/Transport_Layer_Security#Implementations
https://commons.wikimedia.org/wiki/Category:Food_security
https://commons.wikimedia.org/wiki/Category:Media_from_Agriculture_&_Food_Security
https://commons.wikimedia.org/wiki/Commons:Copyright_tags/Country-specific_tags#Department_of_Homeland_Security
https://commons.wikimedia.org/wiki/File:National_Security_Adviser_Brent_Scowcroft_during_discussions_on_the_evacuation_of_Americans_in_Lebanon,_June_1976_-_NARA_-_7064956.jpg
https://commons.wikimedia.org/wiki/File:National_Security_Advisor_Brent_Scowcroft_at_a_meeting_following_the_assassinations_in_Beirut,_1976_-_NARA_-_7064964.jpg
https://commons.wikimedia.org/wiki/File:Public_Security_LLC_cruiser_in_Baltimore_during_Riot_on_May_1st_2015.jpg
102d Security Forces Squadron
1st Security Force Assistance Brigade
2006 transatlantic aircraft plot security reaction
2007 Latvian security laws referendum
2010 Nuclear Security Summit
2010 Rio de Janeiro security crisis
2012 Moldova security zone incident
2012 Nuclear Security Summit
2013 MSS Security V8 Supercars Challenge
2013 Wilson Security Sandown 500
2014 international conferences on Iraqi security
2014 Nuclear Security Summit
2014 Wilson Security Sandown 500
2015 Indian Border Security Force King Air crash
2015 Wilson Security Sandown 500
2016 Nuclear Security Summit
2016 Wilson Security Sandown 500
2017 Wilson Security Sandown 500
2018 Dutch Intelligence and Security Services Act referendum
20192020 Department of Homeland Security appointment disputes
201st Security Division (Wehrmacht)
203rd Security Division (Wehrmacht)
207th Security Division (Wehrmacht)
213th Security Division (Wehrmacht)
221st Security Division (Wehrmacht)
281st Security Division (Wehrmacht)
285th Security Division (Wehrmacht)
286th Security Division (Wehrmacht)
3D security
3rd Security Force Assistance Brigade
403rd Security Division
435th Security Forces Squadron
444th Security Division (Wehrmacht)
454th Security Division (Wehrmacht)
586th Expeditionary Security Forces Squadron
5th Security Force Assistance Brigade
6933d Electronic Security Squadron
732nd Expeditionary Security Forces Squadron
886th Expeditionary Security Forces Squadron
AAA (computer security)
Act of Security 1704
Administration for Security and Counterintelligence
Administrative Department of Security
Aetos Security Management
Afghan National Security Forces
African Security Review
Agency for Sustainable and Operational Social Security
Agency security
Aid Worker Security Database
Air Forces Northern National Security Emergency Preparedness Directorate
Airport security
Airport Security Police (Argentina)
Airport Security Police (Bermuda)
Airport security repercussions due to the September 11 attacks
Airport Security Unit
Airport Security Unit (Hong Kong)
Airports Security Force
Alaska Division of Homeland Security & Emergency Management
Albanian National Security Party
AMD Platform Security Processor
America's Climate Security Act of 2007
American Civil Liberties Union v. National Security Agency
American Clean Energy and Security Act
American Security and Trust Company Building
American Security Council Foundation
Americans for Job Security
Anti-terrorism, Crime and Security Act 2001
Application security
Area 25 (Nevada National Security Site)
Area 27 (Nevada National Security Site)
Area 2 (Nevada National Security Site)
Area of freedom, security and justice
Area Police/Private Security Liaison
Argenbright Security
Argentine Interior Security System
Argus Cyber Security
Arrow security
Asgaard German Security Group
Asia-Pacific Center for Security Studies
Asset-backed security
Asset (computer security)
Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs
Assistant Secretary of Defense for Indo-Pacific Security Affairs
Assistant Secretary of Defense for International Security Affairs
Assistant to the President and Deputy National Security Advisor for Iraq and Afghanistan
AT&T Cybersecurity
Auction rate security
AustraliaIndonesia Security Agreements
Australian Security Intelligence Organisation
Aviation and Transportation Security Act
Aviation Security Operational Command Unit
Aviation Security Stakeholder Participation Act of 2013
Awards of the Federal Security Service of the Russian Federation
AzerbaijanOrganization for Security and Co-operation in Europe relations
Badge of the Communications Security Establishment
Ballot Security Task Force
Bangladesh Institute of Peace & Security Studies
Beijing Municipal Public Security Bureau
Belgian General Information and Security Service
Beyond Fear: Thinking Sensibly About Security in an Uncertain World
Biologically Inspired Tactical Security Infrastructure
Biosecurity
Biosecurity Act 1993
Biosecurity Act 2015
Biosecurity in Australia
Biosecurity in New Zealand
Blacker (security)
Black hat (computer security)
Black Sea Security
BlueBorne (security vulnerability)
Boeing Defense, Space & Security
Border Security
Border Security: Canada's Front Line
Border Security, Economic Opportunity, and Immigration Modernization Act of 2013
Border Security Force
Border Security Zone of Russia
Border Service of the Federal Security Service of the Russian Federation
BPO security
Brian Lord (cyber security expert)
BrickHouse Security
Brinks Home Security
British Security Co-ordination
British security forces
British Security Industry Association
Browser security
BT Managed Security Solutions
Budapest Memorandum on Security Assurances
Bureau of Civil Aviation Security
Bureau of Diplomatic Security
Bureau of Diplomatic Security bibliography
Bureau of Industry and Security
Bureau of International Security and Nonproliferation
Business Executives for National Security
Cabinet Committee on National Security (Pakistan)
Cabinet National Security Committee (New Zealand)
Cabinet Secretary for Social Security and Older People
Canadian Air Transport Security Authority
Canadian Centre for Cyber Security
Canadian Security Intelligence Service
Capability-based security
Card security code
Carmichele v Minister of Safety & Security
Cebu Declaration on East Asian Energy Security
Center for Advanced Security Research Darmstadt
Center for a New American Security
Center for Borderless Security Doctrinal Analysis
Center for Health and Homeland Security
Center for Homeland Defense and Security
Center for International Maritime Security
Center for International Security and Cooperation
Center for Internet Security
Center for Research and Security Studies
Center for Research in Security Prices
Center for Security Policy
Center for Security Studies
Centigon Security Group
Central Directorate of Public Security
Central European Journal of International and Security Studies
Central Industrial Security Force
Central Industrial Security Force Act
Central Office for Information Technology in the Security Sector
Central Oregon Jobs and Water Security Act
Central Public Security Comprehensive Management Commission
Central Registry of Securitisation Asset Reconstruction and Security Interest
Central Registry of War Criminals and Security Suspects
Central Security Bureau of the Chinese Communist Party
Central Security Forces
Central Security Service
Centre for Cybersecurity & Cybercrime Investigation
Centre for Defence and International Security Studies
Centre for Research on Energy Security
Centre of Excellence for Biosecurity Risk Analysis
Centre of Excellence on Public Security
Certificate Authority Security Council
Certified Information Systems Security Professional
Certified Payment-Card Industry Security Auditor
Certified Payment-Card Industry Security Manager
Certified Wireless Security Professional
Chartered Security Professional
Charter of the Australian Security Intelligence Organization
Chhattisgarh Special Public Security Act
Chicago Project on Security and Threats
Chief information security officer
Chief security officer
China Fire and Security Group
Christopher Boyd (IT security)
Chronicle Security
Chubb Fire & Security
CIA Security International SA v Signalson SA and Securitel SPRL
Cipher security summary
Cisco Security Monitoring, Analysis, and Response System
Citizen Advisors on the Mutual Security Program
Climate security
C-list (computer security)
Cloud access security broker
Cloud computing security
Cloud Security Alliance
Coalition for Peace through Security
Code Access Security
Collective security
Collective Security Treaty Organization
Colombian National Police Directorate for Citizens Security
Combined Security Transition Command Afghanistan
Commercial mortgage-backed security
Commissioner v. First Security Bank of Utah, N.A.
Commission on Security and Cooperation in Europe
Committee for Peace and Security in the Gulf
Committee of General Security
Committee on International Security and Arms Control
Committee on National Security Systems
Committee on World Food Security
Common Foreign and Security Policy
Common Security and Defence Policy
Common Security and Defence Policy Service Medal
Commonwealth Security Services
Communications security
Communications Security Establishment
Community food security
Community of interest (computer security)
Community Security Trust
Comodo Cybersecurity
Comodo Internet Security
Compartmentalization (information security)
Comprehensive National Cybersecurity Initiative
Comprehensive Social Security Assistance
Computer Law & Security Review
Computer security
Computer Security Act of 1987
Computer security conference
Computer security incident management
Computer security model
Computer security software
Concrete security
Conference on Security and Co-operation in Europe
Conference on Security, Stability, Development, and Cooperation
Connecticut Department of Emergency Management and Homeland Security
Conservation Security Program
Content security
Control system security
Convertible security
Cooperative security location
Coordinating Minister for National Security (Singapore)
Coordinating Ministry for Political, Legal, and Security Affairs (Indonesia)
Core Security Technologies
Corporate security
Costa Rican Social Security Fund
Council for National Defense and Security (Vietnam)
Council for National Security
Council for Security Cooperation in the Asia Pacific
Council of Political and Security Affairs (Saudi Arabia)
Counter-Terrorism and Security Act 2015
Court security officer
Covered security
CREW and National Security Archive v. Trump and EOP
Critical security parameter
Critical security studies
Croatian security and intelligence system
Croma Security
Crown Agents Philatelic and Security Printing Archive
Cyberbiosecurity
Cyber Security and Crime Division
Cyber Security and Information Systems Information Analysis Center
Cybersecurity and Infrastructure Security Agency
Cybersecurity and Infrastructure Security Agency Act
Cyber security awareness
Cyber Security Collaborative Research Alliance
Cybersecurity Information Sharing Act
Cybersecurity information technology list
Cybersecurity Law of the People's Republic of China
Cybersecurity rating
Cyber-security regulation
Cybersecurity standards
D3 Security Management Systems
Danish Security and Intelligence Service
Data center security
Datagram Transport Layer Security
Data security
Data Security Threats Database
DBS National Security Vetting
D-Day Daily Telegraph crossword security alarm
DEA Office of National Security Intelligence
Defence & Security Organisation
Defence and Internal Security Volunteer Reservists Medal
Defence and Security Media Advisory Committee
Defence Security and Vetting Service
Defence Security Corps
Defending American Security from Kremlin Aggression Act
Defense Counterintelligence and Security Agency
Defense Security Command
Defense Security Cooperation Agency
Delegation (computer security)
Delivering Security in a Changing World
Democracy and Security
Democratic security
Department for Protection and Security
Department of Health and Social Security
Department of Health and Social Security (Isle of Man)
Department of Homeland Security Appropriations Act, 2007
Department of Homeland Security Appropriations Act, 2014
Department of Homeland Security Interoperable Communications Act
Department of Homeland Security Office of Inspector General
Department of Homeland Security Port Security Grant
Department of Homeland Security (Spain)
Department of Homeland Security v. Regents of the University of California
Department of Homeland Security v. Thuraissigiam
Department of Social Security (United Kingdom)
Deputy Director of the National Security Agency
DHS Border and Maritime Security Division
Digital Security Agency
Digital Transition Content Security Act
Diplomatic Security Service
Directive for the Establishment and Maintenance of a Security Service
Directorate-General for External Security
Directorate-General for Human Resources and Security
Directorate General for the Public Security
Directorate of Carabineers and Rural Security
Directorate of General Security
Director for Security Liaison
Director-General of Security
Director General of the National Security Guard
Director of Military Intelligence and Security
Director of Security of the Defense Establishment
Director of the Cybersecurity and Infrastructure Security Agency
Director of the Federal Security Service
Director of the National Security Agency
Discrimination and National Security Initiative
Distributed System Security Architecture
Domain Based Security
Domain Name System Security Extensions
Domestic Security Enhancement Act of 2003
Door security
Draft:Bond (personal security platform)
Draft:Cybersecurity Maturity Model Certification
Draft:Internet security with Linux
Draft:Joe Sullivan (computer security)
Draft:Maritime security in the Black Sea
Drug Quality and Security Act
Dutch Military Intelligence and Security Service
Dynamic application security testing
Eastern Sabah Security Command
Eastern Sabah Security Zone
Economics of security
Economists for Peace and Security
ELearnSecurity
Electricity Security and Affordability Act
Elements of national security
Emotional security
Employee Benefits Security Administration
Employee Retirement Income Security Act of 1974
Employees' Pension Security Act
Endpoint security
Energy Independence and Security Act of 2007
Energy security
Energy Security Act
Energy security of the People's Republic of China
Enhanced Border Security and Visa Entry Reform Act of 2002
Enterprise information security architecture
Environmental security
Equality of Treatment (Social Security) Convention, 1962
ERP security
Estonian Academy of Security Sciences
Estonian Internal Security Service
Estonian Security Police and SD
Eternal security
European Association of Bodies and Public Organizations of Security and Defense
European Forum for Urban Security
European Parliament Subcommittee on Security and Defence
European Security
European Security and Defence College
European Security Strategy
European Strategic Intelligence and Security Center
European Union Agency for Cybersecurity
European Union Institute for Security Studies
European Union Maritime Security Strategy
Experimental Security University
Exploit (computer security)
Fake security camera
Farm Security Administration
Farm Security and Rural Investment Act of 2002
FBI National Security Branch
Federal Academy for Security Policy
Federal Information Security Management Act of 2002
Federal Information Security Modernization Act of 2014
Federal Lands Jobs and Energy Security Act
Federal Office for Information Security
Federal Public Service Social Security
Federal Security Force (Pakistan)
Federal Security Service
Feminist security studies
Fidelis Cybersecurity
Financial security
Finnish Security Intelligence Service
First Security Bank
First Security Bank (Missoula, Montana)
First Security Bank Montana
Food security
Food Security Act of 1985
Food security during the COVID-19 pandemic
Food security in Ethiopia
Food security in Madagascar
Food security in Malawi
Food security in Mozambique
Food security in the Central Valley, California
Ford Institute for Human Security
Foreign Investment and National Security Act of 2007
Foreign Policy and Security Research Center
Fortune Brands Home & Security
Foundation for Ecological Security
Fred Burton (security expert)
Full disclosure (computer security)
Galmudug Security Force
Garda Crime and Security Branch
Gendarmerie Special Public Security Command
Gender and food security
Gender and security sector reform
General Directorate for Internal Security
General Directorate for National Security
General Directorate of General Security
General Directorate of National Security
General Directorate of Public Security
General Directorate of Security (Turkey)
General Intelligence and Security Service
Generalized TTL security mechanism
General Security Directorate
General Security Directorate (Iraq)
General Security Service
Generic Security Service Algorithm for Secret Key Transaction
Generic Security Services Application Program Interface
Geneva Centre for Security Policy
Gentle Man Security
George C. Marshall European Center for Security Studies
Georgia Emergency Management and Homeland Security Agency
Gerardo Hernandez Airport Security Act of 2014
German Institute for International and Security Affairs
Ghost Security
Global Center on Cooperative Security
Global Change, Peace & Security
Global Food Security Index
Global Security Contingency Fund
Global Security Institute
GlobalSecurity.org
Global Security Review
Goatse Security
Government Communications Security Bureau
Government Communications Security Bureau Act 2003
Grid Security Infrastructure
GRIPS-Security and International Studies Program, Tokyo
Guard (information security)
Hardware security module
Hash function security summary
Helvenston v. Blackwater Security
High-Level Conference on World Food Security
High Representative of the Union for Foreign Affairs and Security Policy
High Tech Gays v. Defense Industrial Security Clearance Office
High-water mark (computer security)
History of the Common Security and Defence Policy
Homeland security
Homeland Security Act of 2002
Homeland Security Advisor
Homeland Security Advisory Council
Homeland Security Advisory System
Homeland Security Centers of Excellence
Homeland Security Committee
Homeland Security Cybersecurity Boots-on-the-Ground Act
Homeland Security Distinguished Service Medal
Homeland Security (film)
Homeland Security Grant Program
Homeland Security Information Network
Homeland Security Presidential Directive 7
Homeland Security Presidential Directive 8
Homeland Security Presidential Directive 9
Homeland Security USA
Home security
Honduran Social Security Institute
Hong Kong national security law
HP Application Security Center
HRU (security)
HTTP Strict Transport Security
Humancomputer interaction (security)
Human security
Human Security Act
Human Security Report 2005
Human Security Report Project
IBM Internet Security Systems
Identity-based security
IEEE Transactions on Information Forensics and Security
IET Information Security
Ila Detention and Security Prison
Indigenous food security in Canada
Indonesian Maritime Security Agency
Information and Security Service of the Republic of Moldova
Information security
Information security audit
Information security awareness
Information Security Forum
Information security management
Information security operations center
Information Security Oversight Office
Information Systems Security Association
Information technology security assessment
Information-theoretic security
Infrastructure security
InSecurity
Insecurity
Inspector-General of Intelligence and Security
Institute for Law, Science and Global Security
Institute for National Defense and Security Research
Institute for National Security Studies
Institute for National Security Studies (Israel)
Institute for Peace and Security Studies
Institute for Science and International Security
Institute for Security Studies
Institute for the Protection and Security of the Citizen
Institute of Information Security Professionals
Institutional Security Office of Brazil
Integrated Food Security Phase Classification
Integrated Security Unit
Intelligence and National Security
Intelligence and National Security Alliance
Intelligence and Security Committee of Parliament
Inter-Con Security
Internal security
Internal Security Act
Internal Security Act 1960
Internal Security Act (Singapore)
Internal Security Assessor
Internal Security Corps
Internal Security Department
Internal Security Department (Singapore)
Internal Security Forces
Internal Security Operations Command
Internal Security Organisation
Internal Security Unit
Internal security vehicle
International Centre for Sport Security
International Computer Security Association
International Conference on Availability, Reliability and Security
International Conference on Information Systems Security and Privacy
International Forum on Energy Security for the Future
International security
International Security Assistance Force
International Security (journal)
International Security Research and Intelligence Agency
International Ship and Port Facility Security Code
International Social Security Association
International Social Security Review
Internet Provider Security
Internet security
Internet Security Association and Key Management Protocol
Iranian Security Police
Iraqi security forces
Iraqi Special Security Organization
Irish security forces
Israeli security forces
Israeli Security Zone
Issues in retirement security
ITF Enhancing Human Security
ITIL security management
James Kennedy (security guard)
Jamie Foxx: I Might Need Security
Java security
Jewish Institute for National Security of America
Job security
Johns Hopkins Center for Health Security
Joint Security Area
Joint Security Area (film)
Journal of Asian Security and International Affairs
Journal of Cybersecurity
Justice and Security Act 2013
Kamiti Maximum Security Prison
Kaspersky Internet Security
Kensington Security Slot
King Fahd Security College
Knightsbridge Security Deposit robbery
Knight Security Systems
Korea Internet & Security Agency
Korea Minting and Security Printing Corporation
Kosovo Security Force
Kratos Defense & Security Solutions
Labeled Security Protection Profile
Language-based security
LebaneseSyrian Security Apparatus
Levels of identity security
Lightweight Portable Security
Linguistic insecurity
Linux Security Modules
List of Afghan security forces fatality reports in Afghanistan
List of Chiefs of the General Directorate of Security (Turkey)
List of computer security certifications
List of Iraqi security forces fatality reports in Iraq
List of members of the United Nations Security Council
List of post-war social security reforms in Italy
List of private security companies
List of rogue security software
List of Scientology security checks
List of security hacking incidents
List of United Nations Security Council Resolutions 1001 to 1100
List of United Nations Security Council Resolutions 101 to 200
List of United Nations Security Council Resolutions 1101 to 1200
List of United Nations Security Council Resolutions 1201 to 1300
List of United Nations Security Council Resolutions 1301 to 1400
List of United Nations Security Council Resolutions 1401 to 1500
List of United Nations Security Council Resolutions 1501 to 1600
List of United Nations Security Council Resolutions 1601 to 1700
List of United Nations Security Council Resolutions 1701 to 1800
List of United Nations Security Council Resolutions 1 to 100
List of United Nations Security Council Resolutions 201 to 300
List of United Nations Security Council Resolutions 2101 to 2200
List of United Nations Security Council Resolutions 2401 to 2500
List of United Nations Security Council Resolutions 2501 to 2600
List of United Nations Security Council Resolutions 301 to 400
List of United Nations Security Council Resolutions 401 to 500
List of United Nations Security Council Resolutions 501 to 600
List of United Nations Security Council Resolutions 601 to 700
List of United Nations Security Council Resolutions 701 to 800
List of United Nations Security Council Resolutions 801 to 900
List of United Nations Security Council Resolutions 901 to 1000
List of United Nations Security Council resolutions concerning Cyprus
List of United Nations Security Council resolutions concerning Iraq
List of United Nations Security Council resolutions concerning North Korea
List of United Nations Security Council resolutions on the Nagorno-Karabakh conflict
List of United Nations Security Council Resolutions related to the conflicts in former Yugoslavia
List of vetoed United Nations Security Council resolutions
List of White House security breaches
Lithuanian Security Police
Live at Chelmsford Top Security Prison
Li Zhen (Minister of Public Security)
Local Security Authority Subsystem Service
Logical security
Logjam (computer security)
Lookout (IT security)
Los Alamos National Security
M1117 Armored Security Vehicle
M86 Security
Macau national security law
Mace Security International
Macro and security
Managed security service
Marine Corps Security Force Battalion Bangor
Marine Corps Security Force Regiment
Marine Security Belt
Marine Security Guard
Maritime Civil Affairs and Security Training Command
Maritime Security Agency
Maritime security operations
Maritime Security Regimes
Maritime Security Risk Analysis Model
Maritime security (USCG)
Maritime Transportation Security Act of 2002
Market Investigations Ltd v Minister for Social Security
Massachusetts Executive Office of Public Safety and Security
Master of Science in Cyber Security
Masters Security FC
Maximum Security
Maximum Security (comics)
Maximum Security (horse)
Maximum Security (novel)
Maximum security prison
Maximum Security Prison, Robben Island
Maximum Security (TV series)
Max Planck Institute for Security and Privacy
Max Planck Institute for the Study of Crime, Security and Law
McCarran Internal Security Act
McMaster University Security Service
Meltdown (security vulnerability)
Mershon Center for International Security Studies
Messaging Layer Security
Metrocom Intelligence and Security Group
Mexican Social Security Institute
Microsoft Baseline Security Analyzer
Microsoft Security Development Lifecycle
Microsoft Security Essentials
Miles Taylor (security expert)
Military Intelligence and Security Service
Military Security Agency
Military Security and Intelligence Agency (Croatia)
Military Security Command of the Korean People's Army
Military Security Shield Forces
Minister for International Security Strategy
Minister for Security
Minister for Social Security
Minister of Internal Security
Minister of Justice and Public Security
Minister of Safety & Security v Hamilton
Minister of Safety & Security v Van Duivenboden
Ministry for National Security (Turkmenistan)
Ministry of Agriculture, Food Security and Cooperatives
Ministry of Agriculture, Forestry and Food Security
Ministry of Defence and National Security (Sierra Leone)
Ministry of Defence, Justice and Security (Botswana)
Ministry of Home Security
Ministry of Human Resources and Social Security
Ministry of Inclusion, Social Security and Migration
Ministry of Internal Security
Ministry of Internal Security (Malaysia)
Ministry of Justice and Public Security
Ministry of Justice and Public Security (Brazil)
Ministry of Justice and Public Security (Haiti)
Ministry of Justice and Security
Ministry of Labour and Social Security
Ministry of Labour and Social Security (Jamaica)
Ministry of Labour, Employment and Social Security
Ministry of Labour, Employment and Social Security (Myanmar)
Ministry of Labour, Employment and Social Security (Nepal)
Ministry of Labour, Solidarity and Social Security
Ministry of Manpower and Income Security (Quebec)
Ministry of National Food Security & Research
Ministry of National Security
Ministry of National Security (Bahamas)
Ministry of National Security (Jamaica)
Ministry of National Security of Azerbaijan
Ministry of Public Safety and Security
Ministry of Public Security
Ministry of Public Security (China)
Ministry of Public Security (Israel)
Ministry of Public Security (Laos)
Ministry of Public Security (Poland)
Ministry of Public Security (Quebec)
Ministry of Public Security (Vietnam)
Ministry of Security and Public Administration
Ministry of Social Development and Human Security (Thailand)
Ministry of Social Security
Ministry of Social Security and Labour (Lithuania)
Ministry of Social Security (Brazil)
Ministry of Social Security (North Korea)
Ministry of the Interior and Public Security (Chile)
Ministry of the Interior and Security (Democratic Republic of the Congo)
Ministry of the Public Security (Brazil)
Ministry of Welfare and Social Security
Ministry of Women & Child Affairs and Social Security
Ministry of Work, Employment, and Social Security
Minnesota Security Hospital
MIRACL (security firm)
Mitama Security: Spirit Busters
Mobile security
Mobile Security Deployment
ModSecurity
Mortgage-backed security
Multilevel security
Multi-National Security Transition Command Iraq
Munich Security Conference
Napco Security Technologies
National College of Cyber Security
National Committee to Preserve Social Security and Medicare
National Council for Social Security Fund
National Counterintelligence and Security Center
National Counter Terrorism Security Office
National Cybersecurity and Communications Integration Center
National Cybersecurity and Critical Infrastructure Protection Act of 2013
National Cybersecurity Center
National Cybersecurity Center of Excellence
National Cyber Security Centre
National Cyber Security Centre (Ireland)
National Cyber Security Centre (United Kingdom)
National Cyber Security Division
National Cyber Security Hall of Fame
National Cyber Security Policy 2013
National Directorate of Security
National Food Security Act, 2013
National Health Security Strategy
National Industrial Security Program
National Infrastructure Security Co-ordination Centre
National Institute on Retirement Security
National Intelligence and Security Agency
National Nuclear Security Administration
National Organization of Social Security Claimants' Representatives
National People's Congress decision on Hong Kong national security legislation
National Police Agency Security Bureau (Japan)
National Public Security Force
National Science Advisory Board for Biosecurity
National security
National Security (2012 film)
National Security Act
National Security Act 2017 (Canada)
National Security Action Memorandum 263
National Security Action Memorandum 273
National Security Act of 1947
National Security Act (South Korea)
National Security Adviser (Nigeria)
National Security Adviser (United Kingdom)
National security advisor
National Security Advisor (Canada)
National Security Advisor (India)
National Security Advisor (Pakistan)
National Security Agency
National Security Agency academic publications
National Security Agency (Bahrain)
National Security Agency (Egypt)
National Security Agency in popular culture
National Security and Defense Council of Ukraine
National Security and Homeland Security Presidential Directive
National Security and Intelligence Committee of Parliamentarians
National Security and Intelligence Review Agency
National Security and Nuclear Diplomacy
National Security Archive
National Security Area
National Security Authority (Norway)
National Security Bureau
National Security Bureau of the Arab Socialist Ba'ath Party Syria Region
National Security Bureau (Slovakia)
National Security Bureau (Taiwan)
National Security Commission of the Chinese Communist Party
National Security Committee (Australia)
National Security Committee (Ireland)
National Security Committee (Kazakhstan)
National Security Coordination Secretariat
National Security Corps
National Security Council
National Security Council Act 2016
National Security Council (Croatia)
National Security Council (Czech Republic)
National Security Council (Georgia)
National Security Council (India)
National Security Council (Israel)
National Security Council (Pakistan)
National Security Council (Saudi Arabia)
National Security Council (Slovenia)
National Security Council (Sri Lanka)
National Security Council (Taiwan)
National Security Council (Turkey)
National Security Council (United Kingdom)
National security directive
National security (disambiguation)
National Security Division
National Security Education Program
National Security Entry-Exit Registration System
National security group
National Security Guard
National Security Higher Education Advisory Board
National Security Innovation Network
National Security Language Initiative
National Security Law
National Security Law Journal
National Security Law of the People's Republic of China
National security letter
National security of Bulgaria
National security of China
National security of Colombia
National security of Germany
National Security Operations Center
National Security Organization
National Security Resources Board
National Security Service
National Security Service (Armenia)
National Security Service (Greece)
National Security Service (Turkey)
National Security Space Launch
National Security Strategy
National Security Strategy (United Kingdom)
National Security Study Memorandum 200
National Security Surveillance Act
National Security Telecommunications and Information Systems Security Advisory Memoranda
National Security Whistleblowers Coalition
National Social Security Fund
National Social Security Fund (Uganda)
National Social Security Workers Union
National Special Security Event
NATO Science for Peace and Security
Nautilus Institute for Security and Sustainability
Naval Security Group
Naval Security Group Activity, Winter Harbor
Network interface layer security
Network security
Network security policy
Neurosecurity
New Jersey Cybersecurity and Communications Integration Cell
New Orleans security districts
New Zealand Security Intelligence Service
NHS Counter Fraud and Security Management Service Division
Nigerian Security Printing and Minting Company Limited
No. 1 Security Forces Squadron RAAF
No. 2 Security Forces Squadron RAAF
No. 3 Security Forces Squadron RAAF
North Africa Security and Order Operations Commemorative Medal
Northern Ireland Security Guard Service
Norton Internet Security
Norton Security
Norwegian Defence Security Department
Norwegian Government Security and Service Organisation
Norwegian Police Security Service
Nuclear safety and security
Nuclear Security Summit
Offensive Security
Offensive Security Certified Professional
Office for Safeguarding National Security of the CPG in the HKSAR
Office for Security and Counter-Terrorism
Office of the National Security Council
Officials Committee for Domestic and External Security Co-ordination
Offshore installation security
Oklahoma Employment Security Commission
Oklahoma Office of Homeland Security
Old Age Security
OpenBSD security features
Open security
Open Security Foundation
Open Source Security Foundation
Open-source software security
Operations security
Oppenheimer security hearing
Optiv (cybersecurity company)
Order of National Security Merit
Organizational Systems Security Analyst
Organization for Security and Co-operation in Europe
Organization for Security and Co-operation in Europe statistics
Pakistan Security Printing Corporation
Paladin Group (security company)
Palestinian National Security Forces
Palestinian Preventive Security
Palestinian Security Services
Panamanian Social Security Fund
Panda Security
Parliamentary Assembly of the Organization for Security and Co-operation in Europe
Parliamentary Joint Committee on Intelligence and Security
Parliament Security Services
Partnership for Peace Consortium of Defense Academies and Security Studies Institutes
Party for Life Security
Paul Whelan (security director)
Payment Card Industry Data Security Standard
Peace and Security Committee
Peace and Security Council
People's Public Security University of China
People's Security Agency
Permanent members of the United Nations Security Council
Personal Internet Security 2011
Personal Property Security Act (Canada)
Personnel Security Research Center
Peterson v Minister of Safety & Security
Philippine National Police Aviation Security Group
Physical information security
Physical security
Physical security information management
Physical Security Professional
Pindrop Security
Polar Security Cutter program
Police and Security News
Police custody and security officer
Police/Worlds: Studies in Security, Crime and Governance
Political and Security Committee
Political Movement for Social Security
Port security
PRAXIS: The Fletcher Journal of Human Security
Presidency of the United Nations Security Council
Presidential Assistant for Food Security and Agricultural Modernization
Presidential Security Force of Indonesia
Presidential Security Group
Presidential Security Service (Belarus)
Presidential Security Service (Russia)
Principal (computer security)
Prisoner security categories in the United Kingdom
Prison Security Act 1992
Privacy Office of the U.S. Department of Homeland Security
Private security industry in South Africa
Project on National Security Reform
Proliferation Security Initiative
Protective Security Command
Protective security units
Provable security
Public Facilities Privacy & Security Act
Public Health Security and Bioterrorism Preparedness and Response Act
Public security
Public security bureau
Public security bureau (China)
Public Security Directorate
Public Security Force
Public Security Forces
Public Security Intelligence Agency
Public Security Police Force of Macau
Public Security Section 9
Public Transport Security Command
Puntland Security Force
Purdue Homeland Security Institute
Quadrilateral Security Dialogue
RCCA security
RCMP Security Service
Reform of the United Nations Security Council
Regiment of Presidential Security
Regional security complex theory
Regional Security System
Regions and Powers: The Structure of International Security
Reich Main Security Office
Reich Security Head Office Referat IV B4
Residential mortgage-backed security
Rhodesian Security Forces
Richlin Security Service Co. v. Chertoff
RNZAF Security Forces
Robert S. Strauss Center for International Security and Law
Rogue security software
Royal Commission on Intelligence and Security
RSA Security
RTAF Security Force Command
Ruger Security-Six
Safety and security window film
Sandbox (computer security)
Saskatchewan Water Security Agency
Screen International Security Services
Secretariat-General for National Defence and Security (France)
Secretariat of Public Security
Secretary for Public Security
Secretary for Security
Securitisation and Reconstruction of Financial Assets and Enforcement of Security Interest Act, 2002
Security
Security Academy
Security Account Manager
Security Administration (FR Yugoslavia)
Security Administrator Tool for Analyzing Networks
Security Advisory Opinion
Security agency
Security agreement
Security Airster S-1
Security alarm
Security analysis
Security Analysis (book)
Security and Freedom Ensured Act
Security and Growth for All in the Region
Security and Human Rights
Security and Intelligence Agency (Croatia)
Security and Intelligence Division
Security and Intelligence Services (India)
Security and Maintenance
Security and Privacy in Computer Systems
Security and Prosperity Partnership of North America
Security and Public Order Division
Security and safety features new to Windows Vista
Security and Trust Services API for J2ME
Security appliance
Security AppScan
Security as a service
Security Assertion Markup Language
Security association
Security assurance
Security Attribute Modulation Protocol
Security bag
Security Bank
Security Bank (New Auburn, Wisconsin)
Security Belt
Security Branch
Security breach notification laws
Security bug
Security Building
Security Building (Los Angeles)
Security Building (Miami, Florida)
Security Building (Phoenix, Arizona)
Security Bureau
Security Bureau (Hong Kong)
Security Cabinet of Israel
Security categories in India
Security certificate
Security characteristic line
Security checkpoint
Security clearance
Security Commission
Security company
Security Control of Air Traffic and Air Navigation Aids
Security controls
Security convergence
Security Council of Belarus
Security Council of Russia
Security Council of the Soviet Union
Security culture
Security descriptor
Security Descriptor Definition Language
Security Detachment Iraq (Australia)
Security detail
Security Device Event Exchange
Security Dialogue
Security dilemma
Security (disambiguation)
Security Division of Tianjin Security Region
Security Division (Wehrmacht)
Security domain
Security engineering
Security-Enhanced Linux
Security event manager
Security (finance)
Security First Network Bank
SecurityFocus
Security-focused operating system
Security Force Assistance Brigade
Security Force Auxiliaries
Security forces
Security Forces Command
Security Forces Headquarters Central
Security Forces Headquarters East
Security Forces Headquarters Jaffna
Security Forces Headquarters Kilinochchi
Security Forces Headquarters Mullaitivu
Security Forces Headquarters Wanni
Security Forces Headquarters West
Security guard
Security hacker
Security hologram
Security identification display area
Security Identifier
Security incidents involving Barack Obama
Security incidents involving George W. Bush
Security increase
Security Industry Authority
Security information and event management
Security information management
Security Information Service
Security Insurance Company
Security Intelligence Agency
Security Intelligence Service
Security interest
Security level
Security locknut
Security log
Security management
Security market line
Security modes
Security Now
Security of Advanced Access Content System
Security of automated teller machines
Security of cryptographic hash functions
Security Offences (Special Measures) Act 2012
Security of Information Act
Security of person
Security of the Sovereign Act
Security of the Succession, etc. Act 1701
Security of Transport Layer Security
Security on the Mass Rapid Transit (Singapore)
Security operations center
Security Operations Group
Security Pacific Bank
Security pattern
Security perimeter
Security police
Security Police Department (Georgia)
Security policy
Security policy of the Enrique Pea Nieto administration
Security printing
Security Printing and Minting Corporation of India
Security Printing and Minting Organization
Security Protocols Open Repository
Security question
SecurityScorecard
Security Screenings
Security seal
Security sector governance and reform
Security segregation
Security Service
Security Service of Ukraine
Security service (telecommunication)
Security Shield
Security smoke
Security Strategy
Security studies
Security Studies (journal)
Security Support Provider Interface
Security switch
Security tape
Security Technical Implementation Guide
Security testing
Security theater
Security through obscurity
Security Through Regularized Immigration and a Vibrant Economy Act of 2007
Security token
Security token offering
Security token service
Security Trust Company of Rochester
Security.txt
Security vetting in the United Kingdom
Security vote in Nigeria
Security-Widefield, Colorado
Semantic security
Sensitive Security Information
Separation of protection and security
Shadows Are Security
Ship Security Alert System
Slovenian Intelligence and Security Agency
Slowloris (computer security)
SMBGhost (security vulnerability)
SOA security
Social engineering (security)
Social Security
Social Security Act
Social Security Act 1938
Social Security Act (disambiguation)
Social Security Administration
Social Security Advisory Board
Social Security Agency (Northern Ireland)
Social Security Amendments of 1965
Social Security and National Insurance Trust
Social Security Appeal Tribunal
Social Security Board
Social Security Board (Belize)
Social Security Board (Myanmar)
Social Security Contributions and Benefits Act 1992
Social Security Death Index
Social Security Disability Insurance
Social security in Australia
Social security in France
Social security in Germany
Social security in Spain
Social Security Institution
Social security in Sweden
Social Security (Minimum Standards) Convention, 1952
Social Security number
Social Security Organization
Social Security (Seafarers) Convention, 1946
Social Security (Seafarers) Convention (Revised), 1987
Social security system in Poland
Social security tribunal
Social Security Tribunal of Canada
Social Security Trust Fund
Social Security Wage Base
Software development security
Software security assurance
South African Security Police
South Lebanon security belt administration
South Pacific Manufacturing Co Ltd v New Zealand Security Consultants & Investigations Ltd
Spanish Aviation Safety and Security Agency
Spanish Cybersecurity Research Conference
Spanish Network of Excellence on Cybersecurity Research
Special Security and Protection Battalion
Special Security Directorate
Special Security Force
Special Security Force Command
Special Security Forces (Yemen)
Special Security Office
Special Security Unit
Spectra Cyber Security Solutions Trophy Handicap Chase
Spectre (security vulnerability)
Spoiler (security vulnerability)
Spring Security
Sri Lanka Civil Security Force
Stabilization, Security, Transition, and Reconstruction Operations
Standard of Good Practice for Information Security
Stanley Center for Peace and Security
Static application security testing
Strategic Defence and Security Review
Strategic Defence and Security Review 2015
Supplemental Security Income
Supply chain security
Supreme National Security Council
Supreme Security Committee
Suspicious Activity Report (justice and homeland security)
SWAPGS (security vulnerability)
Swedish Commission on Security and Integrity Protection
Swedish Military Intelligence and Security Service
Swedish Security Service
SwiftOnSecurity
System Security Services Daemon
Tactical Automated Security System
Tahnoun bin Zayed Al Nahyan (national security advisor)
Tamper-resistant security module
Tanzania's food security
Tanzania Intelligence and Security Service
Tennessee Department of Safety and Homeland Security
The Arctic Institute Center for Circumpolar Security Studies
The CIS Critical Security Controls for Effective Cyber Defense
The European Security Order Recast
The International Council on Security and Development
The Journal of International Security Affairs
The Security Institute
The Security Men
The Security Printing Corporation (Bangladesh) Ltd.
The William P. Clements Jr. Center for National Security
Thomas v. Review Board of the Indiana Employment Security Division
Total Security
Total security management
Trademark (computer security)
Transmission security
Transportable Port Security Boat
Transportation Security Acquisition Reform Act
Transportation Security Administration
Transport Layer Security
Transport Layer Security Channel ID
Trend Micro Internet Security
Truman National Security Project
Trust no one (Internet security)
Trust-preferred security
TBTAK Informatics and Information Security Research Center
Tyco Integrated Security
UK cyber security community
UMTS security
Undersecretariat of Public Order and Security
Under Secretary of Commerce for Industry and Security
Under Secretary of Energy for Nuclear Security
Underwater Port Security System
Unican Security Systems
Union and Security Act
Union security agreement
United Nations Department for Safety and Security
United Nations Interim Security Force for Abyei
United Nations Security Council
United Nations Security Council and the Iraq War
United Nations Security Council Counter-Terrorism Committee
United Nations Security Council resolution
United Nations Security Council Resolution 1
United Nations Security Council Resolution 10
United Nations Security Council Resolution 100
United Nations Security Council Resolution 101
United Nations Security Council Resolution 1013
United Nations Security Council Resolution 102
United Nations Security Council Resolution 1021
United Nations Security Council Resolution 1022
United Nations Security Council Resolution 103
United Nations Security Council Resolution 1037
United Nations Security Council Resolution 104
United Nations Security Council Resolution 1044
United Nations Security Council Resolution 105
United Nations Security Council Resolution 1052
United Nations Security Council Resolution 106
United Nations Security Council Resolution 107
United Nations Security Council Resolution 108
United Nations Security Council Resolution 1080
United Nations Security Council Resolution 1086
United Nations Security Council Resolution 109
United Nations Security Council Resolution 11
United Nations Security Council Resolution 110
United Nations Security Council Resolution 1101
United Nations Security Council Resolution 111
United Nations Security Council Resolution 112
United Nations Security Council Resolution 1127
United Nations Security Council Resolution 113
United Nations Security Council Resolution 1132
United Nations Security Council Resolution 114
United Nations Security Council Resolution 115
United Nations Security Council Resolution 1154
United Nations Security Council Resolution 1159
United Nations Security Council Resolution 116
United Nations Security Council Resolution 1160
United Nations Security Council Resolution 117
United Nations Security Council Resolution 1170
United Nations Security Council Resolution 1173
United Nations Security Council Resolution 118
United Nations Security Council Resolution 1181
United Nations Security Council Resolution 1189
United Nations Security Council Resolution 119
United Nations Security Council Resolution 1199
United Nations Security Council Resolution 12
United Nations Security Council Resolution 120
United Nations Security Council Resolution 121
United Nations Security Council Resolution 122
United Nations Security Council Resolution 123
United Nations Security Council Resolution 1234
United Nations Security Council Resolution 124
United Nations Security Council Resolution 1244
United Nations Security Council Resolution 125
United Nations Security Council Resolution 126
United Nations Security Council Resolution 1261
United Nations Security Council Resolution 1267
United Nations Security Council Resolution 127
United Nations Security Council Resolution 1272
United Nations Security Council Resolution 128
United Nations Security Council Resolution 1284
United Nations Security Council Resolution 129
United Nations Security Council Resolution 1295
United Nations Security Council Resolution 1298
United Nations Security Council Resolution 13
United Nations Security Council Resolution 130
United Nations Security Council Resolution 1306
United Nations Security Council Resolution 1308
United Nations Security Council Resolution 131
United Nations Security Council Resolution 1313
United Nations Security Council Resolution 132
United Nations Security Council Resolution 1325
United Nations Security Council Resolution 133
United Nations Security Council Resolution 1333
United Nations Security Council Resolution 134
United Nations Security Council Resolution 1343
United Nations Security Council Resolution 135
United Nations Security Council Resolution 136
United Nations Security Council Resolution 1368
United Nations Security Council Resolution 137
United Nations Security Council Resolution 1373
United Nations Security Council Resolution 138
United Nations Security Council Resolution 1386
United Nations Security Council Resolution 139
United Nations Security Council Resolution 1391
United Nations Security Council Resolution 1397
United Nations Security Council Resolution 14
United Nations Security Council Resolution 140
United Nations Security Council Resolution 1401
United Nations Security Council Resolution 141
United Nations Security Council Resolution 142
United Nations Security Council Resolution 1422
United Nations Security Council Resolution 143
United Nations Security Council Resolution 144
United Nations Security Council Resolution 1441
United Nations Security Council Resolution 145
United Nations Security Council Resolution 146
United Nations Security Council Resolution 147
United Nations Security Council Resolution 1478
United Nations Security Council Resolution 148
United Nations Security Council Resolution 1483
United Nations Security Council Resolution 1484
United Nations Security Council Resolution 149
United Nations Security Council Resolution 1495
United Nations Security Council Resolution 1496
United Nations Security Council Resolution 15
United Nations Security Council Resolution 150
United Nations Security Council Resolution 1502
United Nations Security Council Resolution 1509
United Nations Security Council Resolution 151
United Nations Security Council Resolution 152
United Nations Security Council Resolution 153
United Nations Security Council Resolution 1539
United Nations Security Council Resolution 154
United Nations Security Council Resolution 1540
United Nations Security Council Resolution 1544
United Nations Security Council Resolution 1546
United Nations Security Council Resolution 155
United Nations Security Council Resolution 1556
United Nations Security Council Resolution 1559
United Nations Security Council Resolution 156
United Nations Security Council Resolution 1564
United Nations Security Council Resolution 1566
United Nations Security Council Resolution 157
United Nations Security Council Resolution 1572
United Nations Security Council Resolution 158
United Nations Security Council Resolution 1583
United Nations Security Council Resolution 159
United Nations Security Council Resolution 1590
United Nations Security Council Resolution 1591
United Nations Security Council Resolution 1593
United Nations Security Council Resolution 16
United Nations Security Council Resolution 160
United Nations Security Council Resolution 161
United Nations Security Council Resolution 1612
United Nations Security Council Resolution 1617
United Nations Security Council Resolution 162
United Nations Security Council Resolution 1624
United Nations Security Council Resolution 1625
United Nations Security Council Resolution 163
United Nations Security Council Resolution 164
United Nations Security Council Resolution 1645
United Nations Security Council Resolution 165
United Nations Security Council Resolution 1658
United Nations Security Council Resolution 166
United Nations Security Council Resolution 167
United Nations Security Council Resolution 1672
United Nations Security Council Resolution 1674
United Nations Security Council Resolution 1675
United Nations Security Council Resolution 1679
United Nations Security Council Resolution 168
United Nations Security Council Resolution 1680
United Nations Security Council Resolution 169
United Nations Security Council Resolution 1690
United Nations Security Council Resolution 1695
United Nations Security Council Resolution 1696
United Nations Security Council Resolution 17
United Nations Security Council Resolution 170
United Nations Security Council Resolution 1700
United Nations Security Council Resolution 1701
United Nations Security Council Resolution 1704
United Nations Security Council Resolution 1706
United Nations Security Council Resolution 1718
United Nations Security Council Resolution 1737
United Nations Security Council Resolution 1738
United Nations Security Council Resolution 1781
United Nations Security Council Resolution 18
United Nations Security Council Resolution 1803
United Nations Security Council Resolution 1804
United Nations Security Council Resolution 1808
United Nations Security Council Resolution 181
United Nations Security Council Resolution 1820
United Nations Security Council Resolution 1834
United Nations Security Council Resolution 1835
United Nations Security Council Resolution 1851
United Nations Security Council Resolution 1858
United Nations Security Council Resolution 1859
United Nations Security Council Resolution 1860
United Nations Security Council Resolution 1861
United Nations Security Council Resolution 1862
United Nations Security Council Resolution 1863
United Nations Security Council Resolution 1864
United Nations Security Council Resolution 1865
United Nations Security Council Resolution 1866
United Nations Security Council Resolution 1867
United Nations Security Council Resolution 1868
United Nations Security Council Resolution 1869
United Nations Security Council Resolution 1870
United Nations Security Council Resolution 1871
United Nations Security Council Resolution 1873
United Nations Security Council Resolution 1874
United Nations Security Council Resolution 1887
United Nations Security Council Resolution 1888
United Nations Security Council Resolution 1889
United Nations Security Council Resolution 19
United Nations Security Council Resolution 1904
United Nations Security Council Resolution 1907
United Nations Security Council Resolution 1908
United Nations Security Council Resolution 1918
United Nations Security Council Resolution 1929
United Nations Security Council Resolution 1960
United Nations Security Council Resolution 1970
United Nations Security Council Resolution 1973
United Nations Security Council Resolution 1996
United Nations Security Council Resolution 20
United Nations Security Council Resolution 2031
United Nations Security Council Resolution 2033
United Nations Security Council Resolution 2061
United Nations Security Council Resolution 2077
United Nations Security Council Resolution 2085
United Nations Security Council Resolution 2087
United Nations Security Council Resolution 2094
United Nations Security Council Resolution 21
United Nations Security Council Resolution 22
United Nations Security Council Resolution 221
United Nations Security Council Resolution 2231
United Nations Security Council Resolution 2270
United Nations Security Council Resolution 23
United Nations Security Council Resolution 2337
United Nations Security Council Resolution 237
United Nations Security Council Resolution 2375
United Nations Security Council Resolution 24
United Nations Security Council Resolution 242
United Nations Security Council Resolution 25
United Nations Security Council Resolution 253
United Nations Security Council Resolution 26
United Nations Security Council Resolution 267
United Nations Security Council Resolution 27
United Nations Security Council Resolution 28
United Nations Security Council Resolution 29
United Nations Security Council Resolution 3
United Nations Security Council Resolution 30
United Nations Security Council Resolution 31
United Nations Security Council Resolution 32
United Nations Security Council Resolution 33
United Nations Security Council Resolution 338
United Nations Security Council Resolution 339
United Nations Security Council Resolution 34
United Nations Security Council Resolution 35
United Nations Security Council Resolution 350
United Nations Security Council Resolution 36
United Nations Security Council Resolution 37
United Nations Security Council Resolution 38
United Nations Security Council Resolution 39
United Nations Security Council Resolution 4
United Nations Security Council Resolution 40
United Nations Security Council Resolution 400
United Nations Security Council Resolution 41
United Nations Security Council Resolution 42
United Nations Security Council Resolution 425
United Nations Security Council Resolution 426
United Nations Security Council Resolution 43
United Nations Security Council Resolution 435
United Nations Security Council Resolution 44
United Nations Security Council Resolution 446
United Nations Security Council Resolution 45
United Nations Security Council Resolution 452
United Nations Security Council Resolution 46
United Nations Security Council Resolution 465
United Nations Security Council Resolution 47
United Nations Security Council Resolution 471
United Nations Security Council Resolution 476
United Nations Security Council Resolution 478
United Nations Security Council Resolution 48
United Nations Security Council Resolution 487
United Nations Security Council Resolution 49
United Nations Security Council Resolution 497
United Nations Security Council Resolution 5
United Nations Security Council Resolution 50
United Nations Security Council Resolution 502
United Nations Security Council Resolution 509
United Nations Security Council Resolution 51
United Nations Security Council Resolution 52
United Nations Security Council Resolution 520
United Nations Security Council Resolution 53
United Nations Security Council Resolution 54
United Nations Security Council Resolution 55
United Nations Security Council Resolution 56
United Nations Security Council Resolution 57
United Nations Security Council Resolution 58
United Nations Security Council Resolution 59
United Nations Security Council Resolution 6
United Nations Security Council Resolution 60
United Nations Security Council Resolution 61
United Nations Security Council Resolution 62
United Nations Security Council Resolution 63
United Nations Security Council Resolution 64
United Nations Security Council Resolution 65
United Nations Security Council Resolution 66
United Nations Security Council Resolution 660
United Nations Security Council Resolution 661
United Nations Security Council Resolution 662
United Nations Security Council Resolution 67
United Nations Security Council Resolution 672
United Nations Security Council Resolution 678
United Nations Security Council Resolution 68
United Nations Security Council Resolution 686
United Nations Security Council Resolution 687
United Nations Security Council Resolution 688
United Nations Security Council Resolution 69
United Nations Security Council Resolution 7
United Nations Security Council Resolution 70
United Nations Security Council Resolution 71
United Nations Security Council Resolution 713
United Nations Security Council Resolution 715
United Nations Security Council Resolution 72
United Nations Security Council Resolution 721
United Nations Security Council Resolution 724
United Nations Security Council Resolution 73
United Nations Security Council Resolution 731
United Nations Security Council Resolution 74
United Nations Security Council Resolution 746
United Nations Security Council Resolution 748
United Nations Security Council Resolution 757
United Nations Security Council Resolution 77
United Nations Security Council Resolution 78
United Nations Security Council Resolution 780
United Nations Security Council Resolution 781
United Nations Security Council Resolution 79
United Nations Security Council Resolution 794
United Nations Security Council Resolution 799
United Nations Security Council Resolution 8
United Nations Security Council Resolution 80
United Nations Security Council Resolution 81
United Nations Security Council Resolution 819
United Nations Security Council Resolution 82
United Nations Security Council Resolution 822
United Nations Security Council Resolution 825
United Nations Security Council Resolution 827
United Nations Security Council Resolution 83
United Nations Security Council Resolution 84
United Nations Security Council Resolution 85
United Nations Security Council Resolution 853
United Nations Security Council Resolution 86
United Nations Security Council Resolution 864
United Nations Security Council Resolution 87
United Nations Security Council Resolution 874
United Nations Security Council Resolution 88
United Nations Security Council Resolution 883
United Nations Security Council Resolution 884
United Nations Security Council Resolution 89
United Nations Security Council Resolution 9
United Nations Security Council Resolution 90
United Nations Security Council Resolution 91
United Nations Security Council Resolution 917
United Nations Security Council Resolution 918
United Nations Security Council Resolution 92
United Nations Security Council Resolution 928
United Nations Security Council Resolution 93
United Nations Security Council Resolution 94
United Nations Security Council Resolution 940
United Nations Security Council Resolution 949
United Nations Security Council Resolution 95
United Nations Security Council Resolution 955
United Nations Security Council Resolution 96
United Nations Security Council Resolution 97
United Nations Security Council Resolution 98
United Nations Security Council Resolution 984
United Nations Security Council Resolution 986
United Nations Security Council Resolution 99
United Nations Security Council veto power
University of Belgrade Faculty of Security Studies
Unix security
Unorganised Workers' Social Security Act 2008
USB flash drive security
U.S. Commission on National Security/21st Century
U.S. Department of Commerce Office of Security
U.S. National Action Plan on Women, Peace, and Security
US national security privatization
USS Security (AMc-103)
UTC Climate, Controls & Security
Valor Security Services
Vancouver Foreign Ministers' Meeting on Security and Stability on Korean Peninsula
Van Eeden v Minister of Safety & Security
Vasil Iliev Security
Vehicular Security Center
Vera Security
Veterans' Alliance for Security and Democracy
Vetoed United Nations Security Council resolutions on Syria
Virtual security appliance
Voluntary Principles on Security and Human Rights
WARP (information security)
Water security
Weapons Storage and Security System
Web API security
Web application security
Webroot Internet Security Essentials
Western Hemisphere Institute for Security Cooperation
White hat (computer security)
Wikipedia talk:Articles for deletion/Comparison of web browsers (security)
Wilson Security Racing
Wireless security
Wireless security camera
Witness Insecurity
Witness Insecurity (TV series)
Witness Security Programme (Ireland)
World Institute for Nuclear Security
World Security Institute
World Summit on Food Security 2009
Writ of security
WS-Security
Xavier's Security Enforcers
Y-12 National Security Complex



convenience portal:
recent: Section Maps - index table - favorites
Savitri -- Savitri extended toc
Savitri Section Map -- 1 2 3 4 5 6 7 8 9 10 11 12
authors -- Crowley - Peterson - Borges - Wilber - Teresa - Aurobindo - Ramakrishna - Maharshi - Mother
places -- Garden - Inf. Art Gallery - Inf. Building - Inf. Library - Labyrinth - Library - School - Temple - Tower - Tower of MEM
powers -- Aspiration - Beauty - Concentration - Effort - Faith - Force - Grace - inspiration - Presence - Purity - Sincerity - surrender
difficulties -- cowardice - depres. - distract. - distress - dryness - evil - fear - forget - habits - impulse - incapacity - irritation - lost - mistakes - obscur. - problem - resist - sadness - self-deception - shame - sin - suffering
practices -- Lucid Dreaming - meditation - project - programming - Prayer - read Savitri - study
subjects -- CS - Cybernetics - Game Dev - Integral Theory - Integral Yoga - Kabbalah - Language - Philosophy - Poetry - Zen
6.01 books -- KC - ABA - Null - Savitri - SA O TAOC - SICP - The Gospel of SRK - TIC - The Library of Babel - TLD - TSOY - TTYODAS - TSZ - WOTM II
8 unsorted / add here -- Always - Everyday - Verbs


change css options:
change font "color":
change "background-color":
change "font-family":
change "padding":
change "table font size":
last updated: 2022-05-05 08:11:08
119106 site hits