UNDERSTANDING PURPOSE | THE HACKER
In the previous essay, I made a parallel of man and a computer, and established the many things they share in common, which are mainly designer, operating system (OS), purpose, etc. I further explain that the OS of man is Life, which was hacked and certain malwares introduced that have left him stuck in himself.
The hacker introduced a malware into the operating system of man called SELF, which when installed and ran leads to every form of selfish acts as can be observed in our world today. The impact of this malware is such that it forces man to measure the outcomes of his actions on the plane of good and evil. So individuals who have been hacked could be categorized into being extremely good, extremely evil, and just there in middle, which is where many fall into.
When your life has been hacked, being good (molarity) is just the same as being evil (immorality) because all your actions emanate from the same source – the hacker. The hacker, in order not to expose his activities, reprograms the OS to mimic the original design so that he could conceal his identity, leading to the invention of counterfeits, which is why some people may think that being good and doing good means that they are doing the will of the original designer, which in itself is a lie.
The questions that must be answered is: Who is this hacker? How did he get access into the OS of man to introduce the malware, SELF, into the core of his activities? I shall endeavor to help you understand who this hacker is and in the subsequent essays, answers to the other questions will be clarified. His name is The Evil One who was once Good, hence, the tree knowledge of good and evil. And because his predominant activities are evil, hence, the contraption, The-Evil, which when pronounced together sounds like this: Devil.
So, in the subsequent essays, I shall be discussing the impact of SELF in the activities of man and the entire society. Be on the lookout for more essay.
Elvis C. Umez
Purpose and Leadership Consultant
IDB Consult
Comments
Post a Comment