Showing posts with label Other Pubs. Show all posts

 IT Security & Ethical Hacking Handbook

Stefano Novelli

Authors and Collaborators
Testi, Progettazione ed Esecuzione
Stefano Novelli
Translator
Marco Stefano Doria
Proofreader
Marco Silvestri
Audio (web series)
Mirko Marcattili
Distributed and promoted by
inforge.net - your hacks community

e-books shop

Purchase Now !
Just with Paypal



Book Details
 Price
 2.00 USD
 Pages
 230 p
 File Size
 2,372 KB
 File Type
 PDF format
 Original Text 
 2017, in Italy
 Copyright   
The textual content and the images of Hacklog: Volume ebook are released under Creative Commons 4.0 license – non-replicable, no derived works, commercialization. The owner of the rights for this document is Stefano Novelli, and its distribution is by inforge.net.

Foreword
Welcome to Hacklog, the Cyber Security and Ethical Hacking course. My
name is Stefano Novelli, and I am the author of this course – I decided to write
this document to give anybody the chance to approach cyber security in a more
accessible way, compared to traditional channels.
Hacklog is the result of many years of study in the Hacking and IT Security
fields: it encompasses testimonies, techniques and considerations, collected from
documents, training courses and first-hand experience in the Security industry.
As a course, Hacklog is designed for who wishes to learn and have an insight
over Cyber Security; this manual is not aimed to offer professional training to IT
Security experts, and is not intended to replace any University-grade guide book.
This course has been designed for you – as a student or a self-taught reader –
who wish to familiarize with Ethical Hacking and Cyber Security, learn the main
techniques to run security tests on your machines and protect yourself from the
intruders buzzing in the dark world of cyber-crime.
I would be a liar if I told you that you can start over without any IT
knowledge. However, I don’t mean to discourage you, but it’s quite the contrary:
the fact that you’re here is a very good start! This means you want to learn, and I
can tell you this is a very important, if not crucial, fact.
While you read this document, I will demand you to:
Have a positive attitude towards the course, don’t get discouraged soon!
Learn more about what is not too clear for you.
Take notes, with pen and paper if you wish!
Get in touch with other people if you can’t understand any part of it.
Please, keep in mind that the IT basics will be taken for granted, such as the
difference between hardware and software, what is an operative system, how to
download programs, and so on. Let’s begin already! Enjoy your reading.

Anonymity
Over the years, anonymity on Internet became one of the most crucial issues,
to the point that nowadays a huge range of tools is out there to help us leaving no
traces around. The need for being invisible online is not only a prerogative of
cyber-criminals: in some parts of the world (such as China, Saudi Arabia, Iran
or North Korea), government censorship is so strong that anonymity is necessary
not to be tracked by public or private spy services and to avoid penalties in those
country where Death Penalty is still inflicted. In the rest of the world, anonymity
can be useful for other scenarios, i.e. to report poor working conditions or
questionable internal policies of a given company, as well as to be free to use the
net outside a strongly analytical system, refraining from sharing information
about what we buy or sell, what we like or dislike with the Internet Big
Companies, thus escaping the mass social experiment run by the major global
powers.
Anonymity is also a fundamental feature for hacktivists, namely those who
practice digital activism. One example is the Anonymous movement, and such
name clearly reflects the need to be untraceable during online protests.
If you need to secure your IT structure, you should actually consider another
good reason: to be anonymous as a means of prevention, avoiding any
exposition to the Internet, where you can potentially be attacked by anyone.
Instead, if you work in the IT investigation field, you may be interested in
knowing the tools used by cyber-criminals to execute their attacks staying
anonymous and avoiding controls.

Table of Contents
Translator's Foreword
Foreword
Anonymity
1. Operative System
1.1 Which distro?
1.1.1 Virtual Machines
1.1.2 Live Distros
1.1.3 The Terminal
2. Data Traces
2.1 MAC Address
2.1.1 Identifying the MAC Address
2.1.2 MAC Spoofing
2.2 Hostname
2.2.1 Changing the Hostname
2.3 Domain Name System
2.3.1 Choosing DNS
2.3.2 Changing DNS
2.3.3 Cache DNS
2.4 IP Address
2.4.1 Determining the IP in use
2.4.2 Proxy
2.4.2.1 Proxy types
2.4.2.2 Where you can find Proxies
2.4.2.3 How to use Proxies
2.4.2.4 How safe are Proxies?
3. Secure communications
3.1 VPN (Virtual Private Network)
3.1.1 VPN Types
3.1.1.1 PPTP, for the speed seekers
3.1.1.2 L2TP/IPsec, for the security and responsiveness enthusiasts
3.1.1.3 OpenVPN, for top security users
3.1.1.4 SSTP, for Windows users
3.1.2 Which VPN?
3.1.3 How to choose a VPN
3.1.3.1 Avoid Free VPNs
3.1.3.2 No Logs Policy
3.1.3.3 If they haven’t got your data, they can’t catch you
3.1.3.4 International Data Retention Laws
3.1.3.5 Payment Methods
3.1.3.6 DMCA Notices
3.1.4 VPN List
3.1.4.1. Multi Hop (cascading) VPNs
3.1.5 Using the VPN
3.1.6 Testing the quality of a VPN
3.1.6.1 Torrent Test
3.1.6.2 DNS Leak Test
3.1.6.3 Kill Switch (protection against disconnections)
4. Clearnet and Deep Web
4.1 TOR
4.1.1 What’s the TOR network
4.1.2 TOR Projects
4.1.3 TOR installation
4.1.4 TOR use cases
4.1.4.1 TOR as a Browser
4.1.4.2 TOR as a P2P
4.1.4.3 TOR as Chat
4.1.4.4 TOR as a Proxy Software
4.1.5 TOR Relay
4.1.6 TOR Bridges
4.1.6.1 Bridges advanced use
4.1.7 Pluggable Transports
4.1.7.1 MEEK & Scramblesuit Protocols
4.1.8 Testing the quality of TOR
4.1.8.1 TOR Test via Browser
4.1.9 TOR and Deep Web
4.1.9.1 Where to find .onion sites?
4.1.10 Is the TOR network really safe??
4.1.10.1 TOR and HTTP protocol
4.1.10.2 TOR and compromised exit-nodes
4.1.10.3 TOR Browser and the issues with “pre-built” products
4.1.10.4 TOR, Google & CO.
4.1.10.5 TOR is not idiot-proof
4.2 I2P
4.2.1 Using I2P
4.2.1.1 Installing I2P
4.2.1.2 First launch of I2P
4.2.1.3 Configuring a Browser with I2P
4.2.1.4 I2P useful resources
4.2.1.5 Anonymous navigation in Clearnet
4.2.1.6 Where to find I2P sites?
4.2.1.7 Difficulties with I2P
4.3 Freenet
4.3.1 Freenet installation
4.3.2 Configuring Freenet
4.3.3 Using Freenet
4.3.4 Freenet useful resource
4.3.5 Security in Freenet
5. Combo Network
5.1 TOR via VPN
5.1.1 How to perform TOR via VPN
5.2 VPN via TOR
5.2.1 How to perform VPN via TOR
5.3 TOR over TOR
5.3.1 Tortilla
5.3.2 Is TOR over TOR helpful?
6. Local Resources
6.1 Private browsing
6.1.1 How to enable the Private or Incognito mode
6.1.2 What the Private/Incognito mode does (and doesn’t do)
6.2 HTTPS
6.2.1 Controlling HTTPS protocols
6.3 Cookies
6.3.1 Cookies impact over security
6.3.2 Controlling cookies
6.4 “Special” Cookies
6.4.1 “Special” Cookies impact over security
6.4.2 How to block Flash Cookies
6.4.3 How to block DOM Storage
6.5 Javascript
6.5.1 JavaScript impact over security
6.5.2 Controlling JavaScript
6.6 Flash
6.6.1 Flash impact over security
6.6.2 Controlling Flash
6.7 Java
6.7.1 Java impact over security
6.7.2 Controlling Java
6.8 ActiveX
6.8.1 ActiveX impact over security
6.8.2 Controlling ActiveX
6.9 WebRTC
6.9.1 WebRTC impact over security
6.9.2 Controlling WebRTC
6.10 Browser Fingerprinting
6.10.1 Defining the Browser Fingerprinting
6.10.2 Defending yourself from Browser Fingerprinting
6.11 File Downloading
6.12 Browser Security Test
7. Data Security
7.1 Data Integrity
7.1.1 Checksum & Hash
7.1.1.1 Hash Types
7.1.1.2 Calculating a Checksum
7.1.1.3 Checksum in common use
7.2 Data Encryption
7.2.1 PGP, Pretty Good Privacy
7.2.2 GPG, GNU Privacy Guard
7.2.2.1 Understanding the public/private key
7.2.2.2 Creating your own PGP key
7.2.2.3 Importing, exporting and revoking a PGP/GPG key
7.2.2.4 PGP/GPG to encrypt and decrypt a file
7.2.2.5 PGP/GPG for data signature
7.2.2.6 PGP/GPG for data integrity
7.2.2.7 PGP/GPG for email encryption
7.2.3 Where to store the PGP/GPG keys
7.3 Disk Encryption
7.3.1 TrueCrypt
7.3.2 Veracrypt
7.3.2.1 Installing Veracrypt
7.3.2.2 Using Veracrypt
7.3.3 Zulucrypt, LUKS and family
7.4 Steganography
7.4.1 Steganography with LSB method
7.4.1.1 LSB Steganography Tools
7.4.1.2 Steghide
7.4.2 Cover Generation Steganography
7.4.2.1 Pure Steganography with SPAM method
7.4.2.2 Pure Steganography with PGP method
7.5 Data Backup
7.5.1 How many Backups do you need?
7.5.2 Rsync
7.5.2.1 Rsync installation
7.5.2.2 Local copy with Rsync
7.5.2.3 Remote copy with Rsync
7.6 Cold Boot RAM Extraction
7.6.1 How to perform CBRE
7.7 Metadata & EXIF Data
7.7.1 How to view the EXIF Data
7.7.1.1 MAT: Metadata Anonymisation Toolkit
7.7.1.2 Alternate software for Metadata
7.8 Camera sensors
7.9 Data Shredding
7.9.1 How to perform Data Shredding
7.9.1.1 Disk Cleaners
7.9.1.2 File Shredding
7.9.1.3 Physical Drive Destruction
8. Data Recovery
8.1 Post-Mortem Forensics
8.1.1 Which OS for P.M. Forensics?
8.1.2 Caine OS
8.1.2.1 TestDisk or PhotoRec, which one?
8.1.2.2 PhotoRec Mini Use Guide
9. Vulnerability
9.1 General Precautions
10. Enhanced OSs
10.1 Live OS
10.1.1 Tails OS
10.1.2 Live OS & Persistence: the risks
10.1.3 Live OS & Virtual Machines: the risks
10.2 Virtualized environments
10.2.1 Qubes OS
10.2.1.1 Virtualization logic
10.2.1.2 Network and Storage Domains
10.2.1.3 Why use Qubes and not Tails OS?
10.2.2 Qubes OS + Tais
10.2.3 Qubes OS + Whonix
10.2.4 Subgraph OS
10.2.4.1 Hardened like few others
10.2.4.2 Network and Anonymity
10.3 Pentest Distros
11. Online Identity
11.1 NEVER combine your identities
11.2 NEVER use the same data
11.3 Watch Out for your Habits
11.4 Disposable email
11.5 If you manage a Site/Blog/Forum
11.6 Things you should NEVER do
12. Online Payments
12.1 Buying in the Dark Net
12.1.1 Dark Net Markets
12.1.1.1 Types of Dark Net Markets
12.1.1.2 Where to find the Dark Net Markets?
12.2 Crypto-currencies
12.2.1 Precautions with Crypto-currencies
12.2.2 Bitcoin
12.2.2.1 How Bitcoins work
12.2.2.2 How to obtain Bitcoins
12.2.2.3 Making Bitcoins untraceable
12.2.3 Beyond Bitcoin
13. Be Free
Acknowledgments
Authors and Collaborators
Sources & Resources
Special Thanks
Donors


Bookscreen
e-books shop

Translator's Foreword
Marco S. Doria is a professional translator and proofreader, working in the
IT, Media and Marketing translation Industries since 2013. He loves computers,
music, books, technology and, especially, his wife Laura and his daughter
Penelope. He also wrote two short novellas in Italian. Contact:
marcostefanodoria@gmail.com
I first came across the Hacklog Project by chance. I was talking with a
colleague about how I wished to further explore the IT Security world, and he
mentioned the Hacklog Volume 1, a very interesting handbook written by Stefano Novelli.
Since I was looking for new materials to improve as a Technical Translator, I
immediately got my digital copy and started reading it.
I felt like captured! I couldn’t stop reading… every chapter ran away so fast
that I immediately felt to start over again.
Hacklog Volume 1 really opened my eyes about topics like Anonymity,
Navigation Safety… Freedom! Yes, freedom! Because I learned how to use the
Web more consciously; I learned how to be free from the control of big data
companies dwelling on our personal information and habits.
I felt I had to contribute to this incredible, open project! So why not translate it?
Immediately, I mailed Stefano about this idea, and we started this adventure quite soon!
Being the son of one of the first IT Consultants in my area, I was close
enough to the computer world to know the basic bits-and-bolts; therefore I really
can say that translating Hacklog Volume 1 has been my best professional
experience to date.
I really hope you enjoy it as much as I did working on the English version. I
would like to thank Stefano for this incredible opportunity and Marco Silvestri,
who really helped me out reviewing the whole translation and adding true value to it.
Now, don’t wait any further: enjoy your reading and… be free!
Marco Silvestri. Contact: marco.silvestri777@gmail.com
I already had the chance to work with Stefano as text reviewer for the Italian
edition of Hacklog and while I was doing that I felt it was a good opportunity for
me to learn something about the IT world I barely knew about. Internet security
is extremely useful even if you don't work with computers and I think it's really
important to have an idea of what happens every time you connect to the
network and what lies underneath it.
When Stefano told me he wanted to publish an English version of the book I
was really enthusiast cause I thought a lot of people could have enjoyed this
book as much as I did.
I had the chance to help Marco, the translator that made this English version
possible and Stefano Novelli, the mind behind the project, and I would like to
thank them both for giving me the opportunity to help with the book.

Marcus J. Carey 

Jennifer Jin


e-books shop

Purchase Now !
Just with Paypal



Book Details
 Price
 3.50
 Pages
 413 p
 File Size 
 12,932 KB
 File Type
 PDF format
 ISBN
 978-1-79346-418-7
 Copyright©   
 2019 by Marcus J. Carey 

Introduction
My mind is in a very peaceful and reflective mood. I’m
nearing the end of my first time away from work in at least
three years, most of which has been a blur as I founded my
own cybersecurity firm.

I’ve learned a lot about venture capital, investors, and
mentors—as well as what it takes to build a company from
just an idea. It’s been an amazing journey. My reputation
as a white hat hacker gave me the credibility to get this far,
and we’re just getting started.

I believe in giving as I go. In other words, instead of waiting
until I “make it” to give back to others, I have been trying
to mentor everyone I come across along the way. I have
always been the type to want to help others, so I mean
it when I say you’re welcome to email or meet me for
guidance about anything. I will always try my best to help.

Over the last year, I’ve listened to hundreds of hours
of audiobooks while going to and from work and while
walking the dogs. One of the books that really impressed
me was Tribe of Mentors by Timothy Ferriss, and it
stands as the inspiration for this book’s concept. I highly
recommend this thought-provoking read on life and
business, especially if you’re a fan of self-help books or entrepreneurship.

In his book, Ferriss asked famous people from his
impressive network eleven questions, and then the magic
just happens. For me, this immediately sparked the idea
that there should be a cybersecurity version of the book.
So, I compiled the most common questions people ask me
about cybersecurity and then narrowed it down to the list
you are about to see.

In total, I ended up with 14 questions. The questions
initially start with views of cybersecurity at-large and
then become more personal. I noticed that when I have
conversations at conferences, this is the normal flow. We
call these types of conversations “hallway-con,” because
some of the best learning happens between the scheduled
talks and events.

After compiling the questions, I started reaching out to
my network of friends and colleagues in the industry and
asked them to be a part of this book. I was humbled by
the response. In total, we ended up with 70 inspiring and
thought-provoking interviews with notable hackers—
including such luminaries as Lesley Carhart, David
Kennedy, and Bruce Potter.

But before we launch into the interviews, let’s take a quick
look at the questions:
1. If there is one myth that you could debunk in
cybersecurity, what would it be?
2. What is one of the biggest bang-for-the-buck
actions that an organization can take to improve
their cybersecurity posture?
3. How is it that cybersecurity spending is
increasing but breaches are still happening?
4. Do you need a college degree or certification
to be a cybersecurity professional?
5. How did you get started in the cybersecurity field,
and what advice would you give to a beginner
pursuing a career in cybersecurity?
6. What is your specialty in cybersecurity?
How can others gain expertise in your specialty?
7. What is your advice for career success when it
comes to getting hired, climbing the corporate
ladder, or starting a company in cybersecurity?
8. What qualities do you believe all highly successful
cybersecurity professionals share?
9. What is the best book or movie that can be
used to illustrate cybersecurity challenges?
10. What is your favorite hacker movie?
11. What are your favorite books for motivation,
personal development, or enjoyment?
12. What is some practical cybersecurity advice you
give to people at home in the age of social media
and the Internet of Things?
13. What is a life hack that you’d like to share?
14. What is the biggest mistake you’ve ever made,
and how did you recover from it?
Before we wrap up, a quick note about the book: We edited
every interview to improve flow and readability, and in
some cases, this meant abbreviating answers or deleting
non-responses. You’ll also notice that we’ve included
contact information at the end of each bio indicating where
you can find each hacker on the web, as well as on social
media. We’re an engaged and tight-knit group, and we
hope you’ll join us.

Creating this book has been an amazing journey, and I
hope the answers to these questions help guide you along your path.
Marcus J. Carey
CEO Threatcare
January 1, 2018

Table of Contents
Introduction 1
01 Marcus J. Carey 6
02 Ian Anderson 12
03 Andrew Bagrin 18
04 Zate Berg 24
05 Cheryl Biswas 28
06 Keirsten Brager 32
07 Evan Booth 38
08 Kyle Bubp 42
09 Lesley Carhart 48
10 Lee Carsten 54
11 Whitney Champion 60
12 Ming Chow 66
13 Jim Christy 72
14 Ian Coldwater 78
15 Dan Cornell 84
16 Kim Crawley 90
17 Emily Crose 96
18 Daniel Crowley 100
19 Winnona DeSombre 104
20 Ryan Dewhurst 110
21 Deidre Diamond 114
22 Ben Donnelly 118
23 Kimber Dowsett 130
24 Ronald Eddings 136
25 Justin Elze 140
26 Robert Graham 144
27 Claudio Guarnieri 150
28 Ron Gula 154
29 Jennifer Havermann 158
30 Teuta Hyseni 162
31 Terence Jackson 168
32 Ken Johnson 172
33 David Kennedy 178
34 Michelle Klinger 186
35 Marina Krotofil 192
36 Sami Laiho 200
37 Robert M. Lee 204
38 Kelly Lum 208
39 Tracy Z. Maleeff 212
40 Andy Malone 218
41 Jeffrey Man 224
42 Jim Manico 232
43 Kylie Martonik 236
44 Christina Morillo 240
45 Kent Nabors 244
46 Wendy Nather 252
47 Charles Nwatu 258
48 Davi Ottenheimer 264
Contents
49 Brandon Perry 274
50 Bruce Potter 280
51 Edward Prevost 284
52 Steve Ragan 288
53 Stephen A. Ridley 292
54 Tony Robinson 300
55 David Rook 306
56 Guillaume Ross 314
57 Brad Schaufenbuel 320
58 Chinyere Schwartz 326
59 Khalil Sehnaoui 330
60 Astha Singhal 338
61 Dug Song 342
62 Jayson E. Street 352
63 Ben Ten 358
64 Dan Tentler 362
65 Ben Tomhave 368
66 Robert "TProphet" Walker 374
67 Georgia Weidman 380
68 Jake Williams 384
69 Robert Willis 390
70 Robin Wood 394
Final Thoughts 399
Acknowledgments 400
Bibliography 401


Bookscreen
e-books shop

Further Lessons of don Juan

Carlos Castaneda


www.e-books.vip
Just with Paypal



Book Details
 Price
 3.00
 Pages
 204 p
 File Size 
 895 KB
 File Type
 PDF format
 ISBN
 -
 Copyright©   
 1987 by Carlos Castaneda

Foreword
My books are a true account of a teaching method that don Juan Matus,
a Mexican Indian seer, used in order to help me understand the Total
Freedom Warriors' world. In a sense, my books are the account of an ongoing
process which becomes more clear to me as time goes by.
It took years of training to teach you and I to deal intelligently with the
world of everyday life. Our schooling-whether in plain reasoning or formal
topics-is rigorous because the knowledge imparted to us is very complex.
The same criteria apply to the seers' world. Their schooling which relies
on oral instruction and the manipulation of awareness, although different
from ours, is just as rigorous because their knowledge is as, or perhaps
more, complex.
....

Introduction
At various times don Juan attempted to name his knowledge for my
benefit. He felt that the most appropriate name was 'nagualism', but that
the term was too obscure. Calling it simply 'knowledge' made it too vague,
and to call it 'witchcraft' was debasing. 'The mastery of intent' was too
abstract, and 'the search for total freedom' too long and metaphorical.
Finally, because he was unable to find a more appropriate name, he called it
'sorcery', although he admitted it was not nearly accurate.
Over the years, he had given me different definitions of sorcery, but he
had always maintained that definitions change as knowledge increases.
Toward the end of my apprenticeship, I felt I was in a position to appreciate
a clearer definition. So I asked him once more.
"From where the average man (or woman) stands," don Juan said,
"sorcery is nonsense; an ominous mystery beyond his reach. And he is right,
not because this is an absolute fact, but because the average man lacks the
energy to deal with sorcery."
He stopped for a moment before he continued. "Human beings are
born," don Juan said, "with a finite amount of energy; an energy that is
systematically deployed, beginning at the moment of birth, in order that it
may be used most advantageously by the modality of the time."
"What do you mean by the modality of the time?" I asked.
"The modality of the time is the precise bundle of energy fields being
perceived," he answered.
"I believe man's perception has changed through the ages. The actual
time decides the mode. The time decides which precise bundle of energy
fields are to be used; out of an incalculable number.
"Handling the modality of the time-those select few energy fields-takes all
our available energy; and thus leaves us no extra energy that would help us
use any of the other energy fields."
He urged me with a subtle movement of his eyebrows to consider all this.
"This is what I mean," he went on, "when I say that the average man
lacks the energy needed to deal with sorcery. If he uses only the energy he
has, he can't perceive the worlds sorcerers do.
"To perceive sorcery worlds, sorcerers need to use a cluster of energy
fields not ordinarily used.
"Naturally, if the average man is to perceive sorcery worlds and
understand sorcerers' perception, he must use the same energy cluster
sorcerers have used. And this is just not possible, because all of the average
man's energy is already deployed on the cluster of the times."
He paused as if searching for the appropriate words to make his point.
"Think of it this way," he proceeded. "It isn't that as time goes by you're
learning sorcery. Rather, what you're learning is to save energy. This energy
will enable you to handle some of the energy fields which are inaccessible to you now.
"Sorcery, properly speaking, is simply the ability to use energy fields that
are not employed in perceiving the ordinary world we know. Sorcery is a
state of awareness and the ability to perceive something which ordinary perception cannot.
"Everything I've put you through," don Juan went on, "and each of the
things I've shown you was only a device to convince you that there's more to
us than meets the eye.
We don't need anyone to teach us sorcery because there is really nothing
to learn. What we need is a teacher to convince us that there is incalculable
power at our fingertips. What a strange paradox!
"Every warrior on the path of knowledge thinks, at one time or another,
that he (or she) is learning sorcery. However, all he's really doing is allowing
himself to be convinced of the power hidden in his being, and that he can reach it."
"Is that what you're doing, don Juan-convincing me?"
"Exactly. I'm trying to convince you that you can reach that power.
"I went through the same thing, and I was as hard to convince as you are."
"Once we have reached it," I asked, "what exactly do we do with it, don Juan?"
"Nothing. Once we have reached that understanding, it will by itself
make use of energy fields which are available to us but were inaccessible.
"Access to formerly unavailable energy fields, as I have said, is sorcery in a nut shell.
"But then we begin to 'see', that is, to perceive something else; not as
imagination, but as real and concrete. And then we begin to know without
having to use words. And what any of us does with that increased
perception and with that silent knowledge depends on our own temperament."
On another occasion, he gave me another kind of explanation. We were
discussing an unrelated topic when he abruptly changed the subject and
began to tell me a joke. He laughed and very gently patted my back between
the shoulder blades; as if he were shy and it was too forward of him to touch
me. He chuckled at my nervous reaction.
"You're skittish," he said teasingly, and slapped my back with greater force.
My ears buzzed. For an instant I lost my breath. It felt as though he had
hurt my lungs. Every breath brought me great discomfort. Yet, after I had
coughed and choked a few times, my nasal passages opened and I found
myself taking deep, soothing breaths.
I had such a feeling of well-being that I was not even annoyed at him for
his blow; which had been as hard as it was unexpected.
Then don Juan began a most remarkable explanation. Clearly and
concisely, he gave me a different and more precise definition of sorcery.
I had entered into a wondrous state of awareness! I had such clarity of
mind that I was able to comprehend and assimilate everything don Juan was saying.
He said that in the universe there is an unmeasurable, indescribable force
which sorcerers call intent, and that absolutely everything that exists in the
entire cosmos is attached to intent by a connecting link. Sorcerers, or
warriors, as he called them, were concerned with discussing, understanding,
and employing that connecting link.
They were especially concerned with cleaning it of the numbing effects
brought about by the ordinary concerns of their everyday lives. Sorcery at
this level could be defined as the procedure of cleaning one's connecting link
to intent. Don Juan stressed that this 'cleaning procedure' was extremely
difficult to understand, or to learn to perform.
Sorcerers, therefore, divided their instruction into two categories.
One was instruction for the everyday-life state of awareness, in which the
cleaning process was presented in a disguised fashion.
The other was instruction for the states of heightened awareness, such as
the one I was presently experiencing, in which sorcerers obtained
knowledge directly from intent, without the distracting intervention of
spoken language.
Don Juan explained that by using heightened awareness over thousands
of years of painful struggle, sorcerers had gained specific insights into
intent. They passed these nuggets of direct knowledge on from generation to
generation to the present. He said that the task of sorcery is to take this
seemingly incomprehensible knowledge and make it understandable by the
standards of awareness of everyday life.
Then he explained the role of the guide in the lives of sorcerers. He said
that a guide is called 'the nagual', and is a man or a woman with
extraordinary energy; a teacher who has sobriety, endurance, and stability;
someone seers see as a luminous sphere having four compartments as if four
luminous balls have been compressed together.
Because of their extraordinary energy, naguals are intermediaries. Their
energy allows them to channel peace, harmony, laughter, and knowledge
directly from the source-from intent-and transmit intent to their companions.
Naguals are responsible for supplying what sorcerers call 'the minimal
chance'; the awareness of one's connection with intent.
I could understand everything on Juan was saying about his world easily,
and yet he had described the process of understanding as very difficult.
I told him that my mind was grasping everything he was telling me, but
that the only part of his explanation still unclear to me was why two sets of
teachings were needed.
"You will need a lifetime to remember the insights you've had today," he
said, "because most of them were silent knowledge. A few moments from
now you will have forgotten them. That's one of the unfathomable mysteries
of awareness."
Don Juan then made me shift levels of consciousness by striking me on
my left side, at the edge of my ribcage.
Instantly I lost my extraordinary clarity of mind and could not remember
having ever had it...
Don Juan himself set me the task of writing about the premises of
sorcery. Once, very casually in the early stages of my apprenticeship, he
suggested that I write a book in order to make use of the notes I had always taken.
I had accumulated reams of notes and never considered what to do with
them. I argued that the suggestion was absurd because I was not a writer.
"Of course, you're not a writer," he said, "so you will have to use sorcery.
First, you must visualize your experiences as if you were reliving them, and
then you must see the text in your dreaming. For you, writing should not be
a literary exercise, but rather an exercise in sorcery."
I have written in that manner about the premises of sorcery just as don
Juan explained them to me within the context of his teaching.
In his teaching scheme, which was developed by sorcerers of ancient
times, there were two categories of instruction.
One was called "teachings for the right side," and was carried out in the
apprentice's ordinary state of awareness.
The other was called "teachings for the left side", and was put into
practice solely while the apprentice was in states of heightened awareness.
These two categories allowed teachers to school their apprentices toward
three areas of expertise: the mastery of awareness, the art of stalking, and
the mastery of intent.
These three areas of expertise are the three riddles sorcerers encounter in
their search for knowledge.
The mastery of awareness is the riddle of the mind; the perplexity
sorcerers experience when they recognize the astounding mystery and scope
of awareness and perception.
The art of stalking is the riddle of the heart; the puzzlement sorcerers feel
upon becoming aware of two things: first that the world appears to us to be
unalterably objective and factual because of the peculiarities of our
awareness and perception; and second, that if different peculiarities of
perception come into play, the very things about the world that seem so
unalterably objective and factual change.
The mastery of intent is the riddle of the spirit; the paradox of the
abstract; sorcerers' thoughts and actions projected beyond our human
condition.
Don Juan's instructions on both the art of stalking and the mastery of
intent depended upon his instruction on the mastery of awareness.
The mastery of awareness was the cornerstone of his teachings, and
consists of the following basic premises:
1. The universe is an infinite mass of energy fields resembling threads of light.
2. These energy fields, called the Eagle's emanations, radiate from a
source of inconceivable proportions metaphorically called The Eagle.
3. Human beings are composed of an incalculable number of the Eagle's
emanations in an encased mass. Seers perceive this mass as a ball of light,
like a giant luminous egg, the size of the person's body with the arms extended laterally.
4. Only a very small group of the emanations inside this luminous egg are
lit up by a point of intense brilliance located near the egg's surface. This
point is where perception is assembled; 'the assemblage point'.
5. Perception occurs when the emanations lit by the assemblage point
extend their light to illuminate identical matching emanations outside the
egg. Only the emanations lit by the assemblage point are perceived.
6. The assemblage point can move from its usual position to another on
the surface or into the interior. It then lights up a new group of emanations
making them perceivable and cancelling the former perceptions.
7. When the assemblage point shifts far enough, it makes possible the
perception of an entirely different world as objective and factual as the one
we normally perceive. Sorcerers go into those other worlds to get energy,
power, solutions to general and particular problems, or to face the unimaginable.
8. Intent is the pervasive force that causes us to perceive. We do not
become aware because we perceive; rather, we perceive as a result of the
pressure and intrusion of intent.
9. The aim of the new seers is to reach a state of total awareness in order
to experience all the possibilities of perception available to man. This state
of awareness even implies an alternative way of dying.
A level of practical knowledge was included as part of teaching the
mastery of awareness. On that practical level don Juan taught the
procedures necessary to move the assemblage point. The two great systems
devised by the sorcerer seers of ancient times to accomplish this were:
dreaming, the control and utilization of dreams; and stalking, the control of behavior.
Moving one's own assemblage point was an essential maneuver that every
sorcerer had to learn.
The naguals, also learned to move it for others. The naguals dislodge
others' assemblage point from its customary position by pushing it. This
push is experienced as a smack on the right shoulder blade-although the
body is never touched-and results in a state of heightened awareness.
In compliance with his tradition, it was exclusively in these states of
heightened awareness that don Juan carried out the most important and
dramatic part of his teachings: the instructions for the left side.
Because of the extraordinary quality of these states, don Juan demanded
that I not discuss them with others until we had concluded everything in the
sorcerers' teaching scheme. That demand was not difficult for me to accept.
In those unique states of awareness my capabilities for understanding the
instruction were unbelievably enhanced, but at the same time my
capabilities for describing or even remembering them were impaired.
I could function in those states with proficiency and assuredness, but I
could not recollect anything about them once I returned to my normal consciousness.
It took me years to be able to make the crucial conversion of my
enhanced awareness into plain memory. My reason and common sense
delayed this moment because they were colliding head-on with the
preposterous, unthinkable reality of heightened awareness and direct
knowledge. For years the resulting cognitive disarrangement forced me to
avoid the issue by not thinking about it.
Whatever I have published about my sorcery apprenticeship, up to now,
has been a recounting of how don Juan taught me the mastery of awareness.
I have not yet described the art of stalking or the mastery of intent.
Don Juan taught me their principles and applications with the help of two
of his sorcerer companions, Vicente Medrano, and Silvio Manuel. But
whatever I learned from them still remains clouded in what Don Juan called
the intricacies of heightened awareness.
Until now it had been impossible for me to write or even to think
coherently about the art of stalking and the mastery of intent. My mistake
has been to regard them as subjects for normal memory and recollection.
They are, but at the same time they are not. In order to resolve this
contradiction, I have not pursued the subjects directly-a virtual
impossibility-but have dealt with them indirectly through the concluding
topic of don Juan's instruction: the stories of the sorcerers of the past.
He recounted these stories to make evident what he called the abstract
cores of his lessons.
His way of talking made me believe for many years that his explanations
of the abstract cores were like academic dissertations. I was, however,
intellectually incapable of grasping the nature of the abstract cores despite
his comprehensive explanations. All I was able to do under these
circumstances was to take his explanations as given.
And even without a thorough rational assessment which I believed was
essential to understanding them, the abstract cores became part of my tacit
acceptance and understanding of his teachings.
I know now that the stories of the sorcerers of the past, were intended
more to open my mind than to explain anything in a rational manner.
Don Juan presented three sets of six abstract cores each, arranged in an
increasing level of complexity.
I have dealt here with the first set, which is composed of the following:
the manifestations of the spirit, the knock of the spirit, the trickery of the
spirit, the descent of the spirit, the requirements of intent, and handling intent.


Screenbook
The Power of Silence- Further Lessons of don Juan
....

The Secret of Yoga

Gopi Krishna

Published by F.I.N.D. Research Trust & Kundalini Research Foundation, Ltd.


www.e-books.vip
Just with Paypal



Book Details
 Price
 3.00
 Pages
 222 p
 File Size 
 862 KB
 File Type
 PDF format
 ISBN
 06-064787-6
 Copyright©   
 1972-Gopi Krishna

About the Author
Gopi Krishna was born in 1903 to parents of Kashmiri Brahmin extraction. His birthplace was a small village about twenty miles from the city of Srinagar, the summer capital of the Jammu and Kashmir State in Northern India. He spent the first eleven years of his life growing up in this beautiful Himalayan valley.
In 1914, his family moved to the city of Lahore in the Punjab which, at that time, was a part of British India. Gopi Krishna passed the next nine years completing his public school education. Illness forced him to leave the torrid plains of the Punjab and he returned to the cooler climate of the Kashmir Valley. During the succeeding years, he secured a post in the Public Works Department of the state, married and raised a family.
In 1946 he founded a social organization and with the help of a few friends tried to bring about reforms in some of the outmoded customs of his people. Their goals included the abolition of the dowry system, which subjected the families of brides to severe and even ruinous financial obligations, and the strictures against the remarriage of widows. After a few years, Gopi Krishna was granted premature retirement from his position in the government and devoted himself almost exclusively to service work in the community.
In 1967, he published his first major book in India, Kundalini — The Evolutionary Energy in Man. Shortly thereafter it was published in Great Britain and the United States and has since appeared in eleven major languages. The book presented to the Western world for the first time a clear and concise autobiographical account of the phenomenon of the awakening of Kundalini, which he had experienced in 1937. This work, and the sixteen other published books by Gopi Krishna have generated a steadily growing interest in the subjects of consciousness and the evolution of the brain. He also travelled extensively in Europe and North America, energetically presenting his theories to scientists, scholars, researchers and others.
Gopi Krishna’s experiences led him to hypothesize that there is a biological mechanism in the human body which is responsible for creativity, genius, psychic abilities, religious and mystical experiences, as well as aberrant mental states. He asserted that ignorance of the working of this evolutionary mechanism was the main reason for the present dangerous state of world affairs. He called for a full scientific investigation of his hypothesis and believed that such an objective analysis would uncover the secrets of human evolution. It is this knowledge, he believed, that would give mankind the means to progress in peace and harmony.
Gopi Krishna passed away in July 1984 of a severe lung infection and is survived by his wife, three children and grandchildren. The work that he began is currently being carried forward through the efforts of a number of affiliated foundations, organizations and individuals around the world.
....

Introduction
There are few subjects relating to spiritual development so critically important and yet so incompletely understood as Yoga. Although the interest in Yoga that started in the West during the 1960’s has abated to some degree, the teaching of the various forms of the discipline has become well-established. In many cases, those who practise Yoga as it is generally taught in the West do so primarily as a means to improve health, reduce stress or maintain physical fitness.
The other aspect of Yoga given much attention is the control over the physical body that can be gained by long practice of its physical disciplines. Sensational accounts of yogis who can perform amazing feats of bodily control, such as suspension of breathing for extended periods of time, conscious control of the heartbeat and the ability to increase body heat in freezing temperatures get wide publicity. There are stories of yogis who can fly, live to an advanced age or perform amazing psychic feats. Although these stories are, for the most part, never properly verified, the general impression exists, both in the East and West, that Yoga can bestow magical or occult powers on those who learn its deepest secrets.
But, as Gopi Krishna points out, there is much more to Yoga than its benefits to health, control over the body and potential for developing paranormal abilities. The significance of Yoga, and the purpose for which the discipline as a whole was really designed, lies in its potential for enabling the practitioner to actually experience expanded states of consciousness and
to verify the existence of levels of creation other than the one we perceive with our material senses. The other benefits are minor when compared with the real goal.
Part of the reason for this lack of understanding is that in the West, Yoga is rarely presented in its complete form. Aspects of the disciplines which are critical to achieve real success, i.e., a balanced lifestyle, self-discipline and control of the senses, are not always emphasized, or if emphasized, they are not followed. Because the primary goal of Yoga is understood in such a limited way, few people who take up the discipline are willing to make the effort essential to real success and the potential for attaining highly enhanced states of perception remains largely untapped.
Another important aspect of Yoga is that if Kundalini, which Gopi Krishna claims is at the heart of the discipline, is the energy responsible for spiritual experience and mystical states of consciousness, then two logical conclusions can be drawn: 1) all religious experience owes its origin to this source and 2) the systematized discipline of Yoga corroborates the basic beliefs of religion which heretofore could only be accepted on faith. They are verifiable by personal experience. So, Yoga can provide a method that alleviates the discord and rivalry that exists between the adherents of the major faiths and also a foundation for the development of a more broadly-based scientific method that could reduce the long-standing conflict between science and religion.
Another reason for the need to properly study and understand Yoga is the occurrence of what is currently known as ‘Spiritual Emergence.’ This term is generally used to describe a set of physical and psychological symptoms which are experienced for varying periods of time and, if handled in a proper way, can result in enhanced levels of awareness, creativity and mental well-being. But some of the symptoms experienced in these cases resemble common forms of psychosis, and treatments done on this basis can be detrimental both to the process and to the mental and physical health of the individual.
For those who approach these processes with an open mind and who attempt to help the people who experience them there can be no doubt about the reality of the suffering that many of them endure, often unnecessarily. But until the physiological basis for this condition is actually determined and understood, it will not be possible to make substantial progress either in helping the people suffering from severe problems related to these processes or in making Spiritual Emergence a valid and accepted branch of medical study.
It was Gopi Krishna’s belief that the only way to establish the reality of spiritual experience on a firm scientific basis is to conduct research into the biological factors that are responsible for it. The discipline of Yoga, with its systematized and highly developed methods for enhancing the processes that lead to higher levels of consciousness, is the natural centre around which this research can proceed.
Although not a Yoga teacher by profession, Gopi Krishna’s more than 45 years of experience with the effects of a fully awakened Kundalini and the thorough research of the subject done during his lifetime gave him the insight and knowledge necessary for the understanding of this vast subject. The meticulous study of his own condition and the information that he gathered can be of invaluable help in undertaking a project of this kind.
If his theories about the nature of spiritual experience are verified by the research that he recommended, it will bring about a revolution in our understanding of the human condition and of the goal towards which the human race is currently evolving.
Michael Bradford
....


Table of Contents

Introduction ( i )

1 The Aim of Yoga 1
2 How This Aim Is Achieved 21
3 Kundalini, Fact and Fiction 44
4 Yoga, True and False 67
5 The Discipline of Yoga 91
6 Kundalini, the Key to Cosmic Consciousness 113
7 The Biological Aspect of Kundalini 134
8 The Physiology of Yoga 157
9 The Harvest: Transcendence, Genius, and Psychic Powers 180

Appendix 204
About the Author 208
Index 209


Screenbook
Secret of Yoga-Gopi Krishna
....
First printing 1972
Second printing 1990

Published by:
F.I.N.D. Research Trust
R.R. 5 Flesherton
Ontario, Canada
NOC lEO

The Kundalini Research Foundation, ltd.
P.O. Box 2248
Noroton Heights
CT. 06820
U.S.A.

Published in association with:
Kundalini Research Association International
Kundalini Research and Publication Trust
Kundalini Research Association
Gemsenstrasse 7,
8006 Zurich, Switzerland

Bioenergy Research Foundation
1187 Coast Village Road, 1-186 Santa Barbara
CA. 93108., U.S.A.

First F.I.N.D. Research Trust edition
Second Kundalini Research Foundation, Ltd. edition

Cover painting:
A New Jewel by D. Joan Woo
Loading...
DMCA.com Protection Status