End Times Truth

Prophecies of the Second Coming of Christ

  • Home
  • About
  • Contact
  • Search
  • End Times News
    • Israel News
    • Middle East News
    • Terrorism News
    • New World Order and Globalism
    • European Union News
    • Smart Card News
    • Biometrics & Identification Technology
    • RFID & Surveillance Technology
    • Nuclear Weapons and Advanced Military Systems
  • Escape to Safety
  • The Bible
  • Principles of Prophecy
    • The Test of a Prophet
    • The Purpose of a Prophet
    • Visions of the Future
  • Israel
    • The Blessing and Curse
    • The Scattering of Israel
    • The Scattering of Judah and Jerusalem
    • The Final Scattering of Israel
    • The Regathering of Israel
    • Gathered in Unbelief
    • Prophecies of 1948
    • Restored with Fury
    • Trembling and Fear
      • Wars and Battles of Israel
    • Success Teetering On the Brink of Disaster
    • The Palestinian Problem
    • Daniel’s Prophecy of the Seventy Weeks
      • The Start Date for the Seventy Weeks
      • Calculating the Time of Messiah
      • Daniel’s Seventieth Week
  • New World Order
    • Nebuchadnezzar’s Dream
    • The Final Empire
    • Daniel’s Four Beasts
    • The Dreadful and Terrible Beast
    • The Beast with Seven Heads and Ten Horns
    • The Empire-Beast Arises
    • The Empire-Beast Today
    • Rise of the European Community
    • A New World Order Arises
    • The Group of Seven
    • Globalist Movements
  • The Antichrist
    • The Persona of Pride
    • The Antichrist is Revealed
    • The Second Beast of Revelation
    • Power, Signs, and Wonders
  • Mark of the Beast
    • Branded for Death
    • The Cashless Society
    • Plastic Money
    • Electronic Funds Transfer
    • A Wired Society
    • ATM and POS
    • Rise of the Internet
    • The Identification Problem
    • Smart Cards
    • Biometrics
    • RFID
    • The Final Mark
    • Surveillance and Control
  • 666
    • The Number of the Beast
    • The Imagery of 666
    • Barcode Technology and 666
    • Security Permissions Setting 666
  • World War III
    • The Abomination of Desolation
    • The Time of the End
    • The Attack of Russia
    • The Battle Begins
    • The Attack of China
    • Nuclear War and the Great Tribulation
    • The Effects of Nuclear Weapons
      • The Mushroom Cloud
      • The Fireball and Thermal Pulse
      • Firestorms and Conflagrations
      • The Blast Wave
      • Radioactive Fallout and Clouds of Dust
      • Ozone Depletion
      • Collapse of the Ecosystem
  • Return of Christ
    • The Seventh Trumpet
    • Christ’s Predictions
    • The Sign of the Son of Man
    • The Testimony of the Disciples
    • In the Twinkling of an Eye
    • The Trumpet Sounds
    • Delivered from God’s Wrath
    • The Witness of the Old Testament
    • The Importance of Knowing When
    • Characteristics of Christ’s Return and the Rapture
  • Kingdom Age
    • The People of the Kingdom
    • The Redemption of Israel
    • Israel in the Kingdom
  • End Times Chronology
    • The Sign Posts of History
    • Israel in the Last Days
    • Events Signaling the End
    • The First Half of Daniel’s 70th Week; The Empire of the Beast
      • The Two Witnesses Arise
You are here: Home / 666 / Security Permissions Setting 666
post

Security Permissions Setting 666

Facebook Internet connections, Dec 2010The software security measures that have been developed for directory and file permissions on computers and servers connected to the global network may incredibly reveal one of the main applications in which the number 666 will be used in the economy of the Beast.  In fact, it is already being used even before the Antichrist and the Mark arrive.  The security setting sometimes referred to as chmod 666 (chmod means change mode) is a UNIX permissions setting that designates the level of access allowed to protected folders and files.  Derivatives of UNIX (particularly Linux but also the Mac OS X) are the most commonly used operating systems on servers that run the Internet and the World Wide Web today.  Permission settings are used as part of the server security measures to allow only authorized users to access certain locations in file system hierarchies, especially when connected to the Internet through computers or point of sale (POS) terminals.  When accessing commercial web sites or when using POS terminals in retail stores, the servers that control the processes behind the scenes contain important data to support the web experience and also provide security for electronic buying and selling of goods and services.  Using the correct security settings will permit access to only those files and information intended to be accessed and nothing else.  As we will see in this section, the security permissions setting 666 will soon be used alongside the Mark of the Beast and the 666-containing EAN/UPC barcode technology to allow a person to participate in electronic buying and selling in a cashless society, precisely as predicted in Revelation 13:18.

As the world moves closer to an economy designed around the Mark of the Beast several critical technologies are being developed and merged together to allow the final system to operate.  As we have seen in previous sections on the topic of the Mark, this includes the advent of computer technology; the elimination of cash through the use of credit cards, debit cards, and smart cards; the development of the global electronic network which forms the basis for the Internet, the World Wide Web, and electronic funds transfer (EFT); and the advent of biometrics to eliminate fraud by positively confirming identities.  In all of these inventions and developments, security has become the principal requirement and driving force for the creation of a cashless society that allows people to make purchases electronically without the physical exchange of money and also while preventing fraud.  The security permissions setting 666 has become a vital part in this system.

The development of the Internet and the Web also required important security considerations to be designed into the software to protect the files and information on the servers that contain data used to create web pages.  This data might contain information that gets displayed when a site is visited or it might contain the personal confidential information of members or people who have accounts with a company.  People who visit web sites want to view the pages and information that the sites have available; however, the owners of the web sites don’t want people to be able to access the raw databases and programs that support their sites on the hosting servers.  They also want to prevent visitors from accessing the account information of people who have registered with their site or have done business with them in the past.  Financial information, tax documents, social security numbers, account numbers, names, addresses, and other private information must be maintained in complete security for the system to work with confidence.  For this reason, the operating systems that control the servers all have security levels that can be set for directory (folder) and file access.  Web sites use data and executable programs on their servers to create and present finished web pages to visitors, but their security systems also prevent anyone from actually accessing or changing the data and programs so that no malicious activity can occur.   Unless the system allows for specific access to particular directories or files on a web server, a visitor cannot see them merely by visiting a web site or entering an Internet address, even if that Internet address happens to refer to an actual folder or file on the server.  With the proper security in place, any attempt to access a restricted part of a server without the appropriate permissions will result in an error message or a “page not found” response.  As we will see, this is where the security permissions setting 666 comes into play.

The majority of Internet servers now run a version of Linux as their operating system, which is an open source derivative of UNIX.  The Linux family uses the same permissions settings originally developed for UNIX systems decades ago.  The permissions can be set on an individual directory (folder) or at the file level using either a set of letters or numbers representing the type of security desired.  Three different types of users are recognized within Linux permission settings and each type can be given different levels of security access for folders or files.  The three types of potential users are: (1) the owner of the file or directory (i.e., the administrator or controller of the folder or file), (2) the group that is associated with the directory or file (for instance, an accounting group within a company’s network or members registered on a web site), and (3) all other users (often simply called “others”).

In addition, four levels of security are available for each of these different types of users when providing directory or file access and the last three of these levels can be combined in any way.  The four options for security access to users are: (1) no access, (2) read-only access, (3) write access (which includes modifying or deleting files), and (4) execute access (or the ability to run programs or search within folders).  UNIX and Linux systems assign letters and numbers that are associated with each of these security settings according to the following table:

Security Setting Letter Code Number Code
No access – 0
Read-only r 4
Write w 2
Execute x 1

 

 

 

 

As the diagram shows, there also is another set of indicators before the permission settings that refers to whether the location is a directory (d) or simply a file (-).  These occur before the security settings to let the operating system know whether they apply to an entire folder with all its contents or to just an individual file within a folder.  If we consider the various types of users and the possible levels of security that can be defined for each one, we can illustrate any possible permissions setting using this diagram as a guide.  In the convention of UNIX or Linux operating systems, the list of permission settings for each type of user is presented as a linear sequence of letters.  Therefore, if the owner, group, and other users all are given equal access as well as the higheUNIX file permissions, rwxst (total) access credentials the permissions would be indicated by:

rwxrwxrwx

This highest level security setting indicates read (r), write (w), and execute (x) rights for each type of user.  The first three letters correspond to the settings for the owner or administrator of the file or folder, the middle three letters indicate the settings for the group level users, and the last three letters are the security settings for all other users.  Using this format, if the owner wanted to be the only one designated with total access but wanted to prevent other types of users from executing programs, then the security settings might become:

rwxrw-rw-.

In this case, both the group and other users categories have only read and write access capability, but no execute permissions (indicated by the dashes in the execute position).  Similarly, the administrator could deny anyone else from access to a file or directory by using the following settings:

rwx——

This setting indicates that the group and other users have no access rights to the file or directory at all (three dashes for groups and three dashes for other users).  As can be seen, these security settings in UNIX or Linux (and also present in the Mac OS X operating system) are very powerful and allow an administrator to set unique permissions for every folder or file on a server (or on any computer for that matter running one of these operating systems).  Now, how does all of this relate to the security permissions setting 666?  We have to learn one additional aspect of these security settings to find out.

Another way of looking at permissions settings is to use the corresponding number code for each security level.  This is where it gets very interesting for students of end times prophecy.  According to the previous table, a security setting of no access is equal to the number 0; a setting of read-only access equals 4; a setting of write access is equal to 2; and a setting to allow execution of programs equals 1.  In UNIX or Linux, these number values are additive for each type of user, and the end result of adding these number values together represents a quick way to summarize the security levels for any file or folder.  Thus, for a security setting where every type of user has all possible access rights (rwxrwxrwx), the corresponding number designation would be calculated as seen in the neighboring illustration.

UNIX file permissions, number designations, 777Since the owner of the file or folder is given the complete permissions of read, write, and execute, the number value for this setting is calculated by adding the numerical values of each permission setting, or r+w+x = 4+2+1 = 7.  In the same manner, the permissions settings for the group and other users categories are also added together to give a final permissions setting of 777 for the given file or folder.  The designation of 777 is sometimes called “God-mode”, since it allows total access and control over a file or directory by anyone.  It is curious that the number 7 is often associated with God in the Bible, too.  As you can imagine, however, it is not likely that any directory or file on an Internet server would ever be given the 777 permissions setting, because that would result in any visitor to the web site being able to do whatever they want with it, including accessing confidential information, changing the site, or even deleting it from the server.

To make the Internet work properly and maintain security against malicious activity, most files and folders are restricted in their access except to a valid owner or administrator of the site, who would be given a higher level of control (at the 7 level) only through the secure access to a special administrator page.  Most of the time, when a web site is just visited from an external computer the permissions for all users would be restricted to the read-only level, which is especially suited for the browsing and reading of web pages.  Therefore, an appropriate security setting for a web server would be 444, which indicates that every type of user has only read capabilities, but not write or execute permissions.  This allows visitors to browse the web pages and access information, but not make changes to the site itself.  Only a valid administrator of the web site could gain a greater permission level through signing into a special admin control panel using a password.

However, many Internet sites allow users to fill out forms, post comments, register to become members, or make purchases and transfer money.  Under these circumstances the permissions settings for certain files or folders must be temporarily set higher than read-only and are typically set at the read and write level.  In fact, the default level for the creation of a new file in UNIX or Linux is at the read and write permissions setting for all users, because otherwise the file could not be created and saved on the server.  Therefore, in order to use the Internet for interactive services or for buying and selling, the initial permissions settings must be at the read and write level for all users.  If this were not the case, then no records of the users’ interactions could take place.  If a web site visitor was making a purchase, for instance, the server would have to maintain a record of what was purchased and the prices associated with the purchase.  The only way to do this would be to have read and write capability within a file or folder associated with the user so that a permanent record could be created.  The web page on which the transaction takes place also must have read and write capabilities to allow a user to document the items purchased, enter details on their personal identity, and perform payment transfers with some form of currency.  During online purchases or when using cards at POS terminals, one or more servers somewhere in the electronic global network must be able to accept the purchase and make a record of it.  In addition, the issuing card company or bank has to make a record of the purchase information in the background.  All of these activities run behind the scenes during an Internet purchase session and are typically transparent to the customer.  Thus, for the Internet to function as it does today, when any of these interactive or commercial activities take place the operating system permissions have to be set at the read and write level for the appropriate folders or files.  This is where the security permissions setting 666 comes into play.

UNIX file permissions, number designations, 666Therefore, for buying and selling in a cashless society the operating protocols are associated with permission settings for owners, groups, and other users at the read/write level, or “rw-rw-rw-” in the syntax of UNIX or Linux.  And what does “rw-rw-rw-” correspond to in the numbering system of UNIX permissions?  In the shorthand numerical format of presenting permission settings, the designation “rw-rw-rw-” also can be numerically added together as 4+2+0, 4+2+0, 4+2+0, which equals a security setting of 666!

This is incredible!  Even before the Antichrist arises, the Empire-Beast has developed the electronic network and protocols necessary to allow the Mark of the Beast to function in a cashless system.  Yes, the Number of the Beast or 666 is now being associated with every commercial activity done over the Internet, the World Wide Web, or through EFT networks today.  It is also associated with every interactive activity, such as leaving comments on web sites or filling out registration forms or surveys.  However, the most important aspect related to Biblical prophecy is how the security permissions setting 666 is being used to allow buying and selling in an electronic world.  As the Empire-Beast moves forward toward a cashless society where money substitutes such as smart cards and validated identities will replace the exchange of physical currency, the security permissions setting 666 will make all of these transactions possible!

How close to you think we are to the Return of Christ seeing that all of these things are taking place in our world today?

Note: A minor percentage of the Internet server systems currently are run using the Windows Server operating system, which uses a security system with similar capabilities, but it does not have the 666 designation as part of it.  The prophecy of the Number of the Beast may indicate that the final system will standardize on the Linux operating system to make the Antichrist’s economy function at the end.

 

Recent News and Posts on End Times Prophecy

The Great Reset, from The World Economic Forum data, 2020

The Great Reset

The Globalist Plot to Change the World System In the wake of the Wuhan virus and the disruptions caused to the health, political, and economic systems of the world, many powerful leaders are now taking advantage of the pandemic in an attempt to bring about a New World Order. The advocates of globalism are calling […]

Social distancing app showing red & green labels around people

Chinese Coronavirus Fears Lead to Greater Surveillance and Control

In 2020, the world suddenly moved closer to a global surveillance system under the auspices of public “health and safety”.  The Chinese coronavirus fears stemming from a global pandemic has provided all the excuse that leaders needed to increase societal controls and implement high tech solutions to monitor entire populations. Even in countries with relative […]

Coronavirus 3D Illustration, Wikipedia

The Coronavirus Pandemic and the End Times

The novel coronavirus COVID-19 [also called Severe Acute Respiratory Syndrome Coronavirus 2 (or SARS-CoV-2)] is continuing to spread around the globe from its origin in the Wuhan region in China. It is now threatening the health and the economy of all countries, as normal life shuts down to contain the infection. Thousands of people have […]

Surveillance collage, Pixabay images

The Tyranny of Technocracy

A new type of global governance is taking form, and it’s threatening to become a monster. It is based not upon traditional political theories such as capitalism, socialism, communism, or fascism. This new system transcends all previous political systems to create something far more dangerous. Instead of being based upon a ruling class operating within […]

Israeli and Palestinian access in the West Bank

Israeli Sovereignty in Judea and Samaria

News reports from Israel on Sunday, May 12, 2019, indicated that the US won’t oppose Israeli sovereignty in Judea and Samaria, which would involve Israeli annexation of the Jewish settlements in the West Bank. This region has been known to the Jews as the territories of Judea and Samaria, and it has been a hot […]

Destruction in Raqqa from the Syrian conflict

Russia, Iran, and Israel Battle for Military Advantage in Syria

The very nations that are predicted in the Bible to fight within the Middle East at the Time of the End now battle for military advantage in Syria.  Throughout 2018, Iranian forces have been setting up bases in Syria, and several times they have prompted Israel to respond militarily. On May 10th, during the early […]

The Flag of Israel

Israel’s 70th Anniversary

Israel’s 70th anniversary has occurred, which memorialized and celebrated their sudden rebirth as a nation on May 14, 1948.  Israel’s rebirth was the most momentous prophetic fulfillment in recent history as they became an independent nation again in their former homeland against all odds. After being scattered throughout the world since their rejection of Christ […]

The Destruction in Aleppo, Syria

The War in Syria and the End Times

The war in Syria that began in 2011 as a civil war between government forces and various factions seeking to overthrow the Assad regime, has now become a battleground for many opposing forces. The Israeli Ambassador to the United Nations, Danny Danon, previously revealed to the UN Security Council that Iran had amassed a surrogate […]

President Trump, statement on Jerusalem, 12-7-2017, Wikipedia image

Chaos in Wake of Trump’s Recognition of Jerusalem

A massive, Hezbollah-inspired protest involving tens of thousands of Lebanese and Palestinians occurred in Beirut shortly after Trump announced he would move the U.S. Embassy to Jerusalem. The protesters could be heard chanting that America was “the Great Satan” and Israel “the little Satan”. The Hezbollah leader Hassan Nasrallah gave a speech at the rally […]

Trump to Recognize Jerusalem as Israel’s Capital

President Trump said this week that the U.S. for the first time now fully recognizes Jerusalem as the capital of Israel, and he also said that he will order the State Department to move the U.S. Embassy to Jerusalem from Tel Aviv.  Trump had promised since the presidential campaign in 2016 that he would move […]

Recent In-Depth Articles on End Times Prophecy

Events Signaling the End

Events Signaling the End

Bible prophecy predicts that there will be several significant events signaling the End of the Age. These seminal events will occur just prior to the beginning of a period … [more]

Great Day of His Wrath, by John Martin, artist

Collapse of the Ecosystem

The final aspect of the prophecies that relate to the effects of nuclear war is the widespread pollution of land and water by radioactive fallout, dust from the explosions and … [more]

Chronology of Israel in the Last Days

Israel in the Last Days

The incredible prophecies of Israel in the Last Days are the key to understanding just how close we are to the End of the Age.  The Bible predicts virtually everything that … [more]

Painting of the Temple, by the Temple Institute

Israel in the Kingdom

One of the first events predicted to occur in the early years of the Kingdom Age is the fulfillment of the final ingathering of all the scattered Jews back to the land of … [more]

resurrection, end times, last days, Israel, redemption of Israel, raising the dead

The Redemption of Israel

Two of the most important events for the Jewish people that are predicted to occur near the start of the Kingdom Age include the redemption of Israel and the restoration of … [more]

Largest ozone hole over Antarctica, NASA and NOAA image, Wikipedia

Ozone Depletion

In the previous sections, we have seen that everything the Bible describes as being a characteristic of the Great Tribulation also correlates precisely to what is now expected … [more]

Chagan Nuclear test, Russia

Radioactive Fallout and Clouds of Dust

Scorpions of Death As we have seen in previous sections, one of the main consequences of a nuclear explosion happening at or near ground level is that millions of tons of … [more]

Firestorms and Conflagrations

The Trumpet Judgments In the book of Revelation, the Apostle John records terrible visions of nuclear weapons causing vast destruction at the end of the age through the … [more]

The Tsar Bomba nuclear fireball

The Fireball and Thermal Pulse

Although the formation of a mushroom cloud has become the most recognizable feature of a nuclear explosion (see previous section), it is actually not the generation of smoke … [more]

Truckee Nuclear Explosion

The Mushroom Cloud

The effects of nuclear weapons have been studied extensively since the initial use of atomic bombs upon Japan in 1945. As the pillars of smoke rose above the decimated cities … [more]

Licorne Nuclear Explosion, French Polynesia test site

Nuclear War and the Great Tribulation

Fire, Smoke, and Brimstone The Battle of Armageddon is predicted to be the last and greatest conflict of mankind. Even the non-believing world has adopted this Biblical term … [more]

End Times Truth Site Map

  • 666
    • The Number of the Beast
    • The Imagery of 666
    • Barcode Technology and 666
    • Security Permissions Setting 666
  • Cart
  • Checkout
  • Contact
  • End Times News
    • Israel News
    • Middle East News
    • New World Order and Globalism
    • European Union News
    • Smart Card News
    • Biometrics & Identification Technology
    • RFID & Surveillance Technology
    • Nuclear Weapons and Advanced Military Systems
    • Terrorism News
  • End Times Truth Home
  • My account
  • Privacy Policy
  • Search
  • Shop
  • The Bible
  • About
  • Kingdom Age
    • The People of the Kingdom
    • The Redemption of Israel
    • Israel in the Kingdom
  • Principles of Prophecy
    • The Test of a Prophet
    • The Purpose of a Prophet
    • Visions of the Future
  • Israel
    • The Blessing and Curse
    • The Scattering of Israel
    • The Scattering of Judah and Jerusalem
    • The Final Scattering of Israel
    • The Regathering of Israel
    • Gathered in Unbelief
    • Prophecies of 1948
    • Restored with Fury
    • Wars and Battles of Israel
    • Trembling and Fear
    • Success Teetering On the Brink of Disaster
    • The Palestinian Problem
    • Daniel’s Prophecy of the Seventy Weeks
    • The Start Date for the Seventy Weeks
    • Calculating the Time of Messiah
    • Daniel’s Seventieth Week
  • New World Order
    • Nebuchadnezzar’s Dream
    • The Final Empire
    • Daniel’s Four Beasts
    • The Dreadful and Terrible Beast
    • The Beast with Seven Heads and Ten Horns
    • The Empire-Beast Arises
    • The Empire-Beast Today
    • Rise of the European Community
    • A New World Order Arises
    • The Group of Seven
    • Globalist Movements
  • The Antichrist
    • The Persona of Pride
    • The Antichrist is Revealed
    • The Second Beast of Revelation
    • Power, Signs, and Wonders
  • Mark of the Beast
    • Branded for Death
    • The Cashless Society
    • Plastic Money
    • Electronic Funds Transfer
    • A Wired Society
    • ATM and POS
    • Rise of the Internet
    • The Identification Problem
    • Smart Cards
    • Biometrics
    • RFID
    • The Final Mark
    • Surveillance and Control
  • World War III
    • The Abomination of Desolation
    • The Time of the End
    • The Attack of Russia
    • The Battle Begins
    • The Attack of China
    • Nuclear War and the Great Tribulation
    • The Mushroom Cloud
    • The Fireball and Thermal Pulse
    • Firestorms and Conflagrations
    • The Blast Wave
    • Radioactive Fallout and Clouds of Dust
    • Ozone Depletion
    • Collapse of the Ecosystem
  • Return of Christ
    • The Seventh Trumpet
    • Christ’s Predictions
    • The Sign of the Son of Man
    • The Testimony of the Disciples
    • In the Twinkling of an Eye
    • The Trumpet Sounds
    • Delivered from God’s Wrath
    • The Witness of the Old Testament
    • The Importance of Knowing When
    • Characteristics of Christ’s Return and the Rapture
  • End Times Chronology
    • The Sign Posts of History
    • Israel in the Last Days
    • Events Signaling the End
    • The First Half of Daniel’s 70th Week; The Empire of the Beast
    • The Two Witnesses Arise
  • Escape to Safety

Escape to Safety in the End Times

The Bible provides the only solution to the evil of this world. While the world is heading for a judgment day as a result of sin and rejecting God's love through Christ, an individual can escape that fate through a simple act of faith. In fact, you can be as certain of making it through the end times and of being saved from judgment as the Lord's predictions are assured of coming true. For those that can see the truth in God's Word through prophecy, know also that the Bible provides a simple and guaranteed alternative to judgment, which is vital for every person to understand. Read more...

   

Michelangelo, Christ at the final judgmentPrivacy Policy

Bible Copyright Notices

Biblical quotations used throughout this web site may come from one of several authoritative translations:

1. THE HOLY BIBLE, NEW INTERNATIONAL VERSION®, NIV® Copyright © 1973, 1978, 1984, 2011 by Biblica, Inc.™ Used by permission. All rights reserved worldwide.

2. The New Scofield Reference Bible, Authorized King James Version, Copyright 1967 by Oxford University Press, Inc. Bible text in public domain.

3. The King James Version of the Bible, in the public domain.

4. NEW AMERICAN STANDARD BIBLE®, Copyright © 1960, 1962, 1963, 1968, 1971, 1972, 1973, 1975, 1977, 1995 by The Lockman Foundation. Used by permission.

 

Back to top Arrow, white

 

Copyright © 2021 End Times Truth