Submit your work, meet writers and drop the ads. Become a member
anastasiad Nov 2016
Program web developers typically apply style of security technologies to guard the application in order to avoid against the law work with. Also need computer software encrypted sheild software packages are authorized to obtain written content, in order to increase the income profit.

Software encrypted sheild technologies are divided according to perhaps the by using a dedicated hardware-based file encryption hardware as well as software-based layer. Hardware-based layer, encryption have to emergency having a specific computer hardware device, this computer hardware encrypted sheild encrypted sheild hair, often called the dongle. Software-based file encryption, file encryption doesn't involve devoted computer hardware, common joining digital camera license while using the actual airport terminal device software and hardware details, also referred to as your automated acceptance sorts.

Just imagine drive-based appliance security safety in comparison with software-based encrypted sheild isn't right, because the much more included in program safety, which include layer goods, safety measures, encrypted sheild insurance plan design and style, software, operating systems, , appliance, data marketing communications, etc, is a extensive complex areas, besides by way of to ascertain no matter if safety.

In other countries, industry promote of your automated authorization and encryption tresses are consistently coordinated. Patterns and also famous explanations, this encryption head of hair additionally occupy a clear market share. File encryption a lock, nevertheless, could be the multi-level developed products with the moments, can be a natural customer technological innovation, deficit of control in addition to exact features, a good appliance creation, scheduling details, drivers installing irritation, but not only the high cost, and may stop achieved system circulation and purchasers from the software, is usually slowly decline.

The development of a electronic authorization that is certainly in the ascendant. Digital license safeguards procedures are becoming an increasing number of built into the world wide web know-how, cloud-computing in addition to SaaS strategy it isn't just easier to work with along with cope with software package digital situation and also accomplish, but will also according to present day environment friendly low-carbon advancement notion, possesses changed the shield of encryption hair Distinctive the software program encrypted sheild industry developments. The greater well-known organizations in the world, 'microsoft', Sun microsystems, Autodesk, SIEMENS, Adobe as well as other software package will be digital consent safety method.

In the united states, the utilization of layer application builders shut greater fees, with foreign behavior and historical causes of your continuation with the pursuing a couple reasons:

1 every day companies commonly deemed security encrypted sheild hair electronic agreement.

There are no longer just about any accessible digital license goods exorbitant, the price tag on foreign automated acceptance.

The truth is, with the expanding improvement of your circle surroundings, a community initial for many of us domestic users is not an difficulty. And also mentioned prior, how the viewpoint of your basic safety connected with encrypted sheild head of hair electrical permission sided incorrect. Coming from a authentic perspective, the shield of encryption curly hair as a result of components burning better to fracture, but accomplished piracy marketplace company has become produced. Instead, electrical consent since the electronics should not be cloned, but additionally must multi-level service in addition to affirmation, in fact, currently have excellent safeguard outcome. Moreover, your residential in addition has showed up in many registered goods supply automated 2-3 organization ought to improve while using the advancement of China's software field and also be upwards.

Hence, this encryption software package marketplace developments electronics, marketing, and details engineering. Down below, most people look at, through the software file encryption system distinct for you to elaborate program encrypted sheild establishment and also progression trend of this marketplace.

Primary, the program shield of encryption technique

As mentioned earlier, it shield of encryption technologies are divided into encrypted sheild hardware-based plus software-based file encryption.

A hardware-based encryption

Hardware-based file encryption encryption locks, many material, including layer fundamentals for vulnerable data, acceptance paperwork, made to order methods, and so on. could be trapped in a dongle.

Your security fastener interface style is divided directly into 2 kinds of parallel dock plus Flash harbour. The particular concurrent harbour would be the early on technique variety, because propagation inconvenient plus struggle together with the laser printer, and already has got much less employ. Almost all coders use are generally Flash user interface dongle.

Encryption hair on the two kinds of Computer kind, a microcontroller to get Cpu and another using a clever unit card processor for the reason that Pc the microcontroller appliance per se very easily trouble area or perhaps duplicate, so a lot more high-end security a lock utilizing a wise card processor Pc, to forestall computer hardware fracture. But a growing number of intelligent greeting card dongle split, primary, because processor chip is a bit more and a lot more sophisticated investigative methods along with resources; sensible greeting card method being composed to your chip manufacturing area to make within this program application could problem; file encryption hair of the exact same brand name the particular Cpu method is the identical, merely diverse builders facts along with critical, in the event that these types of data files are passed out and about, you can easily replicate.

Dongle carries a certain a higher level safety toughness, nonetheless in addition there are many drawbacks:

One) apply at the standard one-time constant permit, are unable to aid your results on the tryout release along with on-demand buy

A pair of) the use of hardware creation, scheduling details, installment in addition to routine maintenance charges

Three or more) is not realized the issue regarding Internet-based electronic enhancements, pursuing in addition to administration

Some) As soon as chipped, is usually ripped large quantities, it is hard to treat

A couple software-based shield of encryption

Software-based shield of encryption, electric endorsement, and certain as well separated into two types of registration plate along with permission file:

Enrollment rule is additionally referred to as the sequential range or perhaps permission rule, received by way of modification in the the software customer computer systems plus software program information and facts, the available hardware and software information, like: Computer successive number, BIOS serialized quantity, cards amount, disk drive sequential variety, computer title, and many others. . Completely transform algorithm employed your custom algorithm criteria or even normal layer algorithm formula. Customer and also first utilisation of the software package installing course of action, you might want to type in the enrollment value to make sure. Immediately after certification, software program may be used usually. The actual technique contains the advantage of your in order to register signal defense isn't hard to implement, the downside is usually that stability will not be large, struggle to achieve complicated consent needs.

Licence report and the subscription value for you to bind a similar computer hardware as well as software information, a subscription value time-span limits by using each hardware and software facts, a permission data file will use various hardware and software details. Additionally, the actual certificate file can contain details, so you're able to get the difficult authorization requirements, and might also retailer a number of end user information and facts. The typical certificate submit method to utilize the non-public major on the asymmetric protocol to help signal the permission record, as you move the general public key's baked into software program code. Uneven layer as well as decryption course of action, in which you crucial agreement hosting server is out there, it is not easy to break into throughout the study associated with acceptance docs.

What's so great about the particular digital agreement security does not require supplemental hardware, and as a consequence does not need to deploy the driver plus buyer components, electrical hardware issue. The disadvantage on the electric licenses safeguards method is just not networked people really need to manually remove your computer details, after which manually transfer subscription codes or even licenses, may not be convenient to use. On top of that, the actual domestic automated endorsement several of the designers with the products, which also limits a popularization and also campaign with electronic permission safeguard technological know-how.

Minute, it layer sector growth standing

A person. Security a lock

The main unusual dongle professional SafeNet, Inc. in the country as well as Australia Wibu.

Security tresses provider deep Supposrr que Luoke as well as Feitian. Both businesses due to the discount prices, the first one to create your intelligent minute card encryption tresses nearby well to be able to undertake a clear market place in the nation.

Only two. Digital acceptance

International business certified products and solutions to give electronic Flexera Application and also SafeNet which often, Flexera Applications are devoted to the realm of electronic digital agreement, this product's simplicity of use plus usefulness are accomplishing far better, though the expense of the item can also be very good.

A residential electric permission merchandise firm this China Biteansuo (BitAnswer), Shenzhen-use the actual (Euse) Safengine Corporation.

There are few companies will acquire his or her electrical consent plan, although the developers to cultivate their own programs normally are present the subsequent inquiries:

One) enhancing non-professionals, there are several loopholes inside stability

Two) is tough to obtain variable accreditation manage, management and mathematical functions very simple or virtually no

Several) could be introduced as a way to address the fast issue of short-term method, create far more than predicted in the future as a consequence of protection, stability along with scalability difficulties ongoing to pay

Four) are unable to fulfill market variations brought about by the revolutionary demands about software accreditation product

Application file encryption market developments

The program shield of encryption field developments is actually carefully involving the increase tendency with the software program business. Together with the interest in cloud computing and also Software, service of software package products and solutions will be alter in the way of the circle along with foundation. Used by the vast majority of software package builders, SaaS solutions will not solely save a great deal of hardware and software pay for and also servicing charges, you can also get requirement, although reducing the using chance, driving foundation providers to help continually develop solutions in addition to boost services for you to sustain shoppers.

For the roll-out of community in addition to system advancement can be another application shield of encryption technology fads. The scene about the present-day growth pattern, the actual shield of encryption secure technologies have created very experienced publication rack drawing near vividness, slowly growth. The lifetime and make use of in the hardware practice helps make shield of encryption curly hair are not able to take care of the velocity of development of online years, will be replaced by a electrical permit.

Electric agreement licence from very early sign up computer code sort to your feature-rich documents as modifications in technologies are considering authentication strategy coming from off-line yourself validate the growth of programmed community validation. Accepted control considering particularly, the electric licenses know-how from a single software package licence qualification development just as one authorized certification, consent management plus stats facts, along with other aim of equally, considerably elevated this sanctioned degree of details pertaining to program web developers.

Might forecast not able to consumer electronics accredited merchandise should have the subsequent principal features:

Good authorized managing podium: made available from third-party protection skilled software package programmers, in accordance with the Web's one-stop software package security and also permission operations foundation, without the need to install and sustain, affordable, easy-to-use.

Two Adaptable Licence: support the agreement of the purchaser software program as well as the cloud-computing model standard software package permission; approved press occasion, how many sensible web template modules; accepted so that you can hole the computer hardware and software data, encrypted sheild hair, and also using a user name and also private data verification way for consent.

Easy and warm and friendly buyer experience: in line with the World wide web, everywhere entry; Users could self serve buffet pay for, stimulate rrmprove the application, you can purchase their own software program to keep up-to-date with info; software program builders might discover more about application account activation details in addition to individual facts is usually synergies because of the individuals this company in order to complete the design of software licenses, implementation, supervision in addition to upkeep operate.

Five. Clouds licensing type: This is the cloud computing model of software program certification. Traditional software is natural purchaser rendering, permission can also be a purchaser. Whilst cloud computing could be the movement, though the transition difficult for common application will be a wonderful way for the certain amount of cloud-computing transformation. This definite realization regarding strategies, a common software program sanctioned shift in the buyer towards the cloud on the acceptance server, to make sure that small adjustments towards the software package, nevertheless, you can easily instantaneously have fun with the benefits associated with cloud-computing: higher security energy requirement to order foriegn safe-keeping .


http://www.passwordmanagers.net/products/Windows-Password-Recovery-Software-1.html Windows Password Recovery Software
anastasiad Dec 2016
Software program designers ordinarily apply certain types of layer technological know-how to shield their software to avoid illegitimate apply. In addition need software layer software is permitted to obtain articles, to be able to boost product sales profit.

Software package encryption technology is split in accordance with whether or not the by using a devoted hardware-based encrypted sheild hardware as well as software-based security. Hardware-based layer, layer have to bind having a focused hardware unit, the particular electronics shield of encryption layer head of hair, typically referred to as the dongle. Software-based layer, encryption does not need focused electronics, typical executed digital camera permission while using the your fatal unit hardware and software data, also referred to as this electronic digital endorsement styles.

Simply consider drive-based electronics encryption stability when compared with software-based shield of encryption will not be suitable, as the more linked to program security, like encrypted sheild products and solutions, stability, encrypted sheild plan style, software, systems, , equipment, details marketing and sales communications, and the like, is really a detailed technological spots, not alone by a to discover whether protection.

Far away, the market industry promote of the digital permission along with security tresses are evenly coordinated. Behavior and also fantastic factors, the actual layer hair likewise enjoy a certain share of the market. File encryption hair, however, will be the network produced merchandise in the instances, can be a pure consumer technology, insufficient operations and also record capabilities, the inclusion of appliance manufacturing, strategic planning, driver installation annoyance, but not only the high cost, and might stop obtained multilevel submission and sales of your computer software, is definitely gradually diminish.

Enhancing the electronic acceptance that is certainly while in the ascendant. Electrical certificate protection approaches are getting to be progressively more included in the Internet technology, cloud computing and also SaaS thought is not just easier to make use of along with cope with computer software electric situation and be able to accomplish, but according to present day natural low-carbon improvement strategy, has got supplanted the encryption curly hair Outstanding software program encryption market trends. The more well-known businesses on the planet, Microsoft, Sun microsystems, Autodesk, SIEMENS, Adobe and various computer software are electronic consent safeguards function.

In the nation, using file encryption software package coders fasten greater premiums, along with international routines and also historic causes of the actual continuation with the next 2 reasons:

One particular every day producers typically regarded security encrypted sheild a lock electronic digital authorization.

There's not just about any readily available electronic digital licence products and solutions too big, the asking price of foreign electronic digital permission.

In reality, while using the rising betterment of your multi-level surroundings, your system triggering for the majority of home end users 's no trouble. And even brought up previously, which the point of view from the safety of layer head of hair electric permission on the sides completely wrong. From your reasonable mindset, this file encryption hair as a result of computer hardware copying much easier to crack, but accomplished piracy business sequence has been made. In its place, electronic digital endorsement because appliance is not replicated, but in addition should system arousal plus approval, in reality, have good safety outcome. Additionally, your every day has showed up in some accredited goods give electric 2-3 enterprise will have to improve while using growth of China's software package sector and grow up.

As a result, your layer computer software market styles hardware, web 2 ., and details technologies. Below, we speak about, in the application encryption approach specific to be able to detailed application encrypted sheild establishment plus progress craze of the marketplace.

Very first, the software encryption approach

As mentioned previously, it encrypted sheild technologies are divided into security hardware-based as well as software-based security.

Your hardware-based shield of encryption

Hardware-based encryption shield of encryption locks, many important info, like shield of encryption secrets to vulnerable information, consent paperwork, tailor made sets of rules, etcetera. can be stored in this dongle.

The layer fastener screen variety is split in to 2 kinds of synchronised slot and also Flash interface. This simultaneous port could be the very early technique type, because the propagation troublesome plus clash while using the printer's, and after this has less apply. A lot of builders employ tend to be USB slot dongle.

File encryption hair from the two kinds of CPU form, the microcontroller to get Pc and another with a clever minute card processor for the reason that Pc a microcontroller computer hardware by itself conveniently trouble area or content, therefore an increasing number of high-end file encryption a lock employing a intelligent credit card chips Central processing unit, to stop hardware break. Although a growing number of clever card dongle crack, initially, because processor might be more and even more leading-edge analytic techniques and devices; sensible card program to be written to the chips manufacturing unit to make during this time method may possibly trickle; encrypted sheild tresses of the identical manufacturer your Processor process is the same, merely various designers facts as well as major, in case most of these records are passed out there, you can easily clone.

Dongle features a specific level of security power, but you can also find a number of drawbacks:

One) apply at the regular one-time never ending license, can't assist in the achievements of your trial model along with on-demand invest in

3) the presence of electronics generation, logistics, assembly as well as upkeep charges

Three) is not achieved the issue with Internet-based electronic digital improvements, tracking along with control

Several) Once broke, may be burned huge, it is sometimes complicated to remedy

A pair of software-based encryption

Software-based encrypted sheild, digital acceptance, and certain in addition separated into home equity loans number plate along with licenses document:

In order to register code can be referred to as successive number or consent computer code, acquired using a alteration in the the program end user computer systems along with program facts, possible software and hardware facts, including: Cpu serial number, BIOS sequential amount, greeting card amount, harddisk sequential number, computer system brand, etc. . Completely transform formula made use of your customized protocol or maybe conventional shield of encryption algorithm formula. Customer as well as primary utilisation of the computer software installment practice, you might want to type in the enrollment value to confirm. Following verification, it can be employed typically. The particular strategy has got the good thing about this subscription computer code defense is easy to use, the downside is always that security is not really higher, not able to attain complicated endorsement demands.

Permission submit as well as the signing up code in order to situation the same computers plus software information, simply a registration signal period confines utilization of both software and hardware information, a permission record can use numerous hardware and software info. Also, the actual permission report can contain more info, to help you obtain the difficult agreement demands, and may perhaps retail outlet several customer facts. The average permission report way is to implement the private key in the asymmetric algorithm to hint your certificate data file, while the general public secret is embedded in the application value. Asymmetric shield of encryption plus understanding course of action, the private computer essential consent hosting server exists, it is hard to compromise from the investigation regarding endorsement paperwork.

Some great benefits of this electric endorsement safeguard doesn't require further electronics, and for that reason doesn't have to mount the motive force as well as buyer elements, electronic digital hardware issue. The disadvantage from the automated certificate safety mode just isn't networked buyers really need to hand remove your computer information, and then personally significance registration constraints or even permission, is not very easy to use. Additionally, the particular domestic electronic digital acceptance a few of the programmers from the product or service, that also limits your popularization and promotion connected with electric permit safeguard technology.

Subsequent, it encrypted sheild field advancement status

A single. File encryption curly hair

The main unusual dongle professional SafeNet, Corporation. in the usa in addition to Germany Wibu.

Security head of hair service deeply Supposrr que Luoke and also Feitian. The 2 main organizations due to the affordable prices, the first person to introduce the actual good minute card shield of encryption curly hair nearby perfectly so that you can enjoy some market place in the nation.

A pair of. Electric permission

Unfamiliar company certified merchandise to supply electronic digital Flexera Software and also SafeNet which will, Flexera Software program is focused entirely on the joy of digital permission, the actual device's ease of use along with features are doing superior, though the valuation on the item is additionally quite high.

This home-based electrical authorization goods enterprise a Beijing Biteansuo (BitAnswer), Shenzhen-use this (Euse) Safengine Organization.

There are only a few companies will acquire their very own electronic digital consent structure, even so the builders to cultivate their own plans commonly occur this inquiries:

One particular) the introduction of non-professionals, there are numerous loopholes while in the security

A pair of) is actually difficult to realize accommodating accreditation control, management and also precise functions simple or maybe simply no

Three) are often unveiled to be able to address the particular fast problem connected with short-term method, create far more than predicted in the foreseeable future as a result of protection, balance and also scalability challenges continued to get

Several) can not meet up with sector variations as a result of the modern demands on program certification model

Software program security marketplace movements

The software security field developments is closely connected with the increase development with the computer software marketplace. With the rise in popularity of cloud-computing plus Software, service with application products will be change in the direction of the multilevel plus system. Used in nearly all software programmers, Software items can not only spend less a great deal of hardware and software buy plus servicing charges, you can also get demand from customers, when decreasing the use of possibility, driving program vendors in order to consistently strengthen items plus improve services to be able to sustain consumers.

To the development of system and program improvement can also be a software package encrypted sheild technologies movements. The view around the present-day growth trend, the encryption locking mechanism technologies have designed really develop fully information mill approaching vividness, slower advancement. The actual everyday living and make use of on the equipment practice creates security head of hair are not able to conserve the speed regarding advancement of the Internet period, are going to be substituted with the particular automated certificate.

Automated authorization permission through earlier subscription program code type on the feature-rich records available as modifications to technologies are considering verification process out of offline yourself confirm the introduction of computerized system authorization. Permitted administration contemplating particularly, your electrical licence technological innovation collected from one of software licence qualifications growth just as one authorized official certifications, agreement management and exact information and facts, and also other objective of each, significantly improved this permitted volume of details regarding computer software coders.

May forecast not able to electronic products certified solutions ought to have these most important properties:

Enlightening approved administration system: supplied by third-party safety measures specialized software designers, in line with the Net's one-stop software package safety plus endorsement management system, without having to deploy and observe after, low priced, easy-to-use.

Only two Bendable Certificate: offer the acceptance of the purchaser software as well as the cloud computing product common software package licenses; authorized touch time, the volume of sensible adventures; sanctioned in order to bind your computer software and hardware information and facts, encryption tresses, or by way of a username plus password validation way of agreement.

Simple and easy friendly buyer: in accordance with the WEB, at any place obtain; Users might food acquire, trigger boost the software, you can buy their unique software package to keep abreast of details; software package designers can certainly understand software initial information and facts plus individual data is often synergies through the people in the firm to finish the design of application license, enactment, supervision as well as maintenance operate.

5. Fog up accreditation unit: This is a cloud computing type of software program licensing. Standard application is genuine customer setup, endorsement can also be a buyer. Although cloud-computing could be the craze, although the move difficult for classic software package would be a wonderful way for the particular a higher level cloud computing modification. This definite awareness associated with tips, a common application approved move on the purchaser for the fog up on the endorsement remote computer, to ensure that small adjustments towards the application, but you can certainly instantly experience the great things about cloud computing: higher safety energy require to obtain clouds hard drive .

http://www.passwordmanagers.net/ Password Manager
Mateuš Conrad Aug 2018
i couldn't never write a book, sorry, a novel, i'd hate to become a puppeteer, someone who attempts to play chess, a fiddling and bothersome shadow-baron (schattenbaron)... imaginary "friends" is not my thing, plus... i don't have an exact elastic approach to heidegger's compliments concerning poets: i only like heidegger because he likes poets, **** me, he elevates poets to the stature of philosophers when language "things" are made necessary... i.e. (and verbatim) - language - only if speech has acquired the highest univocity of the word does it become strong for the hidden play of its essential multivocity (as withdrawn from all "logic"), of which poets and thinkers alone are capable... welcome! welcome! to plato's republic! Brennus & Alaric welcome you, quiet fondly depicted by Joseph-Noël Sylvestre... and when the Huns pushed the leaders Fritigern and Alavivus into the eastern empire to settle... and emperor Valens... that's history for you: a cascade of: and and and and and and... sometimes a p.s., but mostly the and and and of causality... facts come barging in, you forage... but thanks to heidegger: the poets have earned their graces... and can return to the republic... as wordsmiths... i mean, was i ever to think of myself as a french dada dandy? frivolous and superfulous raconteur / racketeer? poet or philosopher, that's beside the point, the point being: i'm not a novelist... i don't like dealing with language that chokes that i rely on mostly and that mostly being: i like the idea of a raw vocabulary... i'm more of a butcher than an artist... i like the rawness of an inverted crossword puzzle... in my "trade"... there are no clues, whether synonymous or antonymous, in this spaghetti of: ex nihil factum sermo (out of nothing came the word)... poetry, of all places, allows this form of unadulterated nibbling at raw vocabulary... bypassing the standard g.c.s.e.: overt-scrutiny of poetics... i never like that... a 5/ 7/ 5 syllable haiku poem should never be preserved for its essay-worthiness to extend into 2000 words in a school exam... poetry strapped to pedagogy is... less heavily censored, more... over-scrutinized... you're not supposed to think in terms of poetry: you're supposed to, feel... and since when has feeling become so overrated, so despsised? oh... when people "learned" to feel, prior to learning to think... you really have to learn to think, prior to learning how to feel... if you ask someone from the orient, they'd counter the western perception of placing thinking / "reason" on the top of the pyramid with horus' eye as emblem... to learn to feel: is to learn to how to not think, while to think? it's to learn how to not feel... pretty simple, no? not really... neither approaches should be underrated, they should be understood better... who the hell needs, or wants, to be an apathetic brain-in-a-pickle-jar zombie: constantly engaging with a dialectic? then again... who wants to be a heart in an electric chair constantly bamboozled into pointless reactions? so i'm more of a butcher than a "poet", i simply appreciate the raw realism of cutting pieces of the tongue that extends into the brain's fathomability - and that overrated visual ******* of dreaming most people associate themselves with... but that's beside the point... i really appreciate days akin to this one, humid as in the concrete basin of Beijing while europe is frying in the African plume... no thanks, no, me go to Greenland or the Faroes Islands... do i look like a ******* ******* / camel jockey? why do i have limited respect for islam? i once watched a video of a saudi with an european bride... sitting on oil was both a blessing... and a curse... muhammad would whip some of these saudi brats silly... but of all days... when i get to work my magic in the kitchen, and make the most superior food in the whole wide world? blue indian cuisine: i call them blue indians and not red soxs because: come on... the raj... and that polytheism that doesn't want to disappear... h'americans can boast all they want: the steak, the hamburger, the hot dog, the pizza... n'ah... n'ah mate... it's either curry or you're chewing chicken bones, ******* out the marrow... indian cuisine is superior... i love the days when i cook up two curries... it feels like being back in edinburgh, walking into the joseph black building, the perfumes of sulphur and wood, the 12 hour experiments it would take us to conjure up an ester... esters? bases for the perfume industry... that' the grand thing about cooking a curry... you start to feel like a chemist once more... the two curries? a tikka masala: sure, an easy adventure... marinating the chicken what not... the real fun came with the malvani... blitzing the masala up: a bay leaf, half a nutmeg, 4 / 5 cloves, 7 dried chillies, 10 peppercorns, a cinnamon stick, cumin seeds, coriander seeds, chilly powder, turmeric powder... and that's just the malvani masala... the cocunut masala... ****... only two green chillies... how to get the right colour? ah... blitz up some coriander stalks... garlic and ginger... milk to get the whizz-kid on the job... it's superior cuisine, indian cuisine... it reminds me of a being in a chemistry lab at edinburgh... doing organic experiments... mind you: it's more fun, the environment is less sterile... even my mother said: you're stinking up the place, you're worse than the sikhs two doors down... so... why would i visit an indian restaurant, or indulge myself in an indian take-away, if i can mimic? i see no point... there is no other cuisine on the planet as good as what could come from either Goa or New Delhi... the colours, the perfume of the spices... by now a hamburger, pizza or hot-dog are staples or both humble beginnings and even more humbled ends... i've found my 1st to none passion... and with a afghani naan bread... and with rice infused with turmeric... tiresome ponce schemes of duck a l'orange... spaghetti this that and the other... one bias... though... scandinavian treatment of raw herrings... in cream sauce... i'm a sucker for those herrings like i'm a sucker for pop music... the added zing of the herrings' rawness out-competes the bland sushi manifesto... eating one of these herrings in a cream sauce... has the complimentary sensation, very much akin to performing oral *** on a woman... oysters are beyond the marker of metaphor / literal association... well: hello today!

I.

i'm starting to suspect, that one of the...
"supposed" stars...
   is actually a planet - due to its colour -
      it's unlike all the other -
todkompf, metallic white
glitter...
      it's hued in a more orange
spectacle - more fire...
less distance...
                and on the canvas
of the night?
   sits lower than all the other stars,
which are more up -
   rather than on a horizon
to speak off...
   question is... is that *mars
,
or is that venus?

**** it: 'ere i go...
'n' buy me a *******
telescope to investigate further...

II.

did the ancient romans really
distinguish the arithmetic
quantity of I - or IX -
   or XII or...
                with a dot?
       not unless it was inscribed
in stone -
   where even upsilon had
to vacate the more easily chiseled
in:              YOVR POINT?
just wondering
   how only two diacritical marks
were applied to the encryption -
and both... not for orthographic
reasons, but for aesthetics -
    what's the actual difference
when the guillotine digestion
machine (like me) comes in and
says...
    
     ȷokιng around...
        what with the iPod...
   why shouldn't ι,
                    come ιn -
   and give a ȷester's ιnquιsιtιon?
out of... mere... curιosιty?
ιt's not lιke those two-heads
even make a dιfference...
come on! ιt's ιneffectιve,
there are no orthographιc reasons
for ιt!
        why, even, bother?
    and no fancy name eιther,
ιn the dιacrιtιcal famιly...
  dot... when compared to?
cιrcumflex, caron, macron,
      cedιlla,  ͅ (ιota subscrιpt)
...
you name ιt!
can someone, please,
ȷust gιve me, an approprιate reason?

III.

it's not like i can confuse,
i with I - since i have 1, and 2 instead
of II, and 3 instead of III,
and 4, instead of IV,
       and 6 instead of VI...
ah... L(l) -
              and the exodus of handwriting
in the digital age...
any schmuck can write
now... but... i'd love to see
them write with a pen, on paper...

personally - i couldn't write an intact
word with a pen...
   calligraphy: a bit like monkish
Gregorian chants... coming near
to extinction...
          i could sometimes write
out a intra-connectivity of syllables -
but... entire words?
    no chance... the digit system
came in... and i had to learn how
to position my arms before
the keyboard, to write, and not look
down...
   unlike my old G.P.,
who, bless him... nearing his retirement,
pecked, like a crow,
on the keyboard...
   looking down on it...

the ENTER key? right arm pinky finger...
SPACE BAR key? primarily
left hand thumb...
   unlike a piano, you don't actually
use all the fingers on both arms...
e.g.? ring ringer on the left hand?
rarely used... unless doing some
mental hand gymnastics...
  
stream of "consciousness" - no words,
just observations -

(0,0,) LH ******* A
    RH index finger N -
     that's - ah! ring finger of
the right arm is used, quiet a lot,
  notably?  SHIFT + (?/) key -
      *******...
   but for the apostrophe?
    the (@ ') key...
  which, on my machine translates
as the (" ') key...

IV.

     - interlude -
--- -- - - - -  - - - logic  -- - - -  -- - bomb -- - - --  -
- - -- computers -- -- - - & - -- microprocessors -
- - - --- -- - --- -- -(parasense ----- - - remix) -- -- -

V.

it is chiromancy in reverse,
only that i'm reading my hands...
facing down,
rather than staring on the reverse
side of the... where the girdle of venus
is situated,
   or the index finger skin folds
of the chokhmah, chesed,
    netzach
- respectively -
akin to reading mandarin:
   from the the head - to the base
               of a knuckle.
i read my hands - looking at a screen,
how else can you write anything,
distracted by looking down
onto the keyboard -
  no aware of the spacing?
        question: how fast is your typing?
don't know:
what sort of ******* am i to note
down, and how many amendment
will i have to make to the text,
as we plow along to your diatribe
monologue?
                  
VI.

why would anyone sit up all night,
drinking?
     ****** question, esp. given
yesterday's 5 / 6 am carnival of rain...
out of nowhere,
there i was, ready to call it a night
well spent (not working in a Stratford
casino) - dreading the heat of
the sunrise...
  boom!
   thunder, lightning...
    the air turned white from
the ferocity of the rain...
   literally...
                the ground was wriggling
with a meteor shower -
excited gnat fly like puddles
appearing and disappearing -
soon becoming lakes
  within the confines of a supposed
**** of worm parasites...
      probably your typical day
      on the Faroe Islands...
you know... on such occasions...
you really can't help, but stick
your head out of the window,
far enough to drench your head
and hair in regenwasser...
            i should have walked
into the garden and
cleansed my whole body...
   but...
guess all ι needed, was the head...
       god...
  there's nothing more **** than
listening to horror movie soundtracks
while it pours a mini-monsoon
outside your window,
  and there's thunder, and there's
lightning...
   and you're just about to fall asleep...
like a baby might...

VII.

oh god... the one time i don't take
a beer for a walk, coming back
from the supermarket...
and i pick up... this genius:
genius... tortilla wrap...
    falafel + hummus + a hint
of mango chutney (with a tease
of arugula leaves)?
            **** me... who needs
beer... if not a bottle of mineral
water... to accompany
taking a walk?
Jonny Angel Aug 2014
I could write
encryption
& who would understand
such hidden meanings?

Those dead dragonflies
littering a bamboo mat
& violent cracks appearing
on dangling crystals.
What of those ravens
sitting on elastic wires
bending in the wind,
cawing the sins
of their fathers.

And those proud faces,
those red-haird harpies
injecting salt,
singing long
into the night,
ballads of the brokenhearted.

I would write
encryption,
and who could understand
such hidden meanings?
Steven Forrester Oct 2013
Sensation
Devastation
My body burns
Like radiation
Inflation
Damnation
My soul is lost
In this conflagration
No patience
In my station
And what did you do
You roped me
And broke me
Smoked me
And rolled me
There's no sense
In my defense
What's new is more
But what's more is less
There's no innocence
Any more
It's stranger than fiction
In a dark encryption
Mateuš Conrad Dec 2016
by simply watching 'don't call me crazy'
with regards to mental health... a bbc3 documentary.

i find a few pointers, apart from the fact that i've learned
English to a standard that i could
be misjudged as a native, what with african psychiatrists
   and the history of England as  a postcolonial nation...
     the problems of premature depression
and other divergences from the "norm"
  (or is that a tu-dum tss... "the norm"?
i never know how to tell the joke a proper
way, so many jokes are mothered
by punctuation, i don't know
how many there are that aren't) -
so aside from that... the fact that i'm
faking being British... if you have any grievances
against me: you'd better me Ukranian
or Lithuanian... otherwise? *******.
yes, i know the Poles did terrible things,
Vlad wasn't the only person ready to
do sadistic **** on people by impaling them
on sharpened-wooden poles...
   and you thought the crucifix was bad...
but oh look... the artists inserted a peddle-stool
so he could stand while on the cross...
rather than actually: hang from it.
talk about a woman faking an ******.
then again: he was all kissy-kissy with
a centurion having cured the ravaging libido
of his "demon possessed" daughter who
had a hot bagel flirt under her skirt for him...
or as i say: **** a prostitutes
           **** for an extra ten quid: the sigma
of how many ***** that thing has seen
turns your tongue into a dagger...
that's where i have seen my salvation:
   not in the eucharist or degrading symbols
of a godly stature.
       no, the point is:
this misapprehension of where the origin of
thinking resides...
  the true materialists posit the origin of thought
in the brain... but, honey-bee, the brain
is preoccupied with its materialistic responsibilities...
to shoot adrenaline when bungee jumping...
why think it isn't already preoccupied with anything
but thought? the brain doesn't think
no more than the heart might... or your *******
wetted or your phallus becoming *****...
there's no point in ascribing thought to the brain,
even if you abstract the source of thinking
toward the brain as a *mind
,
     the suggestion parallels what the brain does,
and what the brain isn't...
   as with the notion of god...
          ridiculous for most people:
or also ridiculous when man is taught to stress
his "individuality"...
                               both seem on equal footing
to be considered phantoms, but the individual is
more of a phantom than god...
                             and as Diogenes of Sinope found out:
you'll find god and the Archimedean eureka
quicker than finding an honest man -
who takes a candle at noon into a market square?
     ah: that famous lunacy...
but in the beginning the word was with god,
       yes, because when we started we only said ooh ooh!
and made those frightening monkey faces to
war off evil spirits and the Arabic third eye, evil.
   Darwinism created historical fiction...
           a bit like science fiction, but instead of looking
forward, historical fiction is looking back,
toward a time when people struggled against
the elements, and had no sense of having to think
given their actual pentagram equilibrium was tuned
into what was around them...
                   the senses could never deviate from
the world of shouting down a cave and hearing echo,
it's only when thought emerged and conceived words
   that the dubiousness of simple musing:
chicken or egg first? created auxiliary sense perceptions...
   we have left the sensual world...
           for we have "enriched" our lives with
thinking, the byproduct of which is what scared me
about this bbc3 documentary... that all mental
illness stems from allow thought to automate itself...
      in other words having no moral compass...
in other words: not having read a single book
   and learned a process of equating thinking with
narrating... as a sensible option to what others tend
to do (the innovators), and allow narration to be a void...
into which they pour all their thinking to
fill that void... with, say, Thomas Edison and the lightbulb...
Isaac Newton and gravity...
it's just scary that people can allow automated thinking,
     made even more evident that counters
the punitive transgender pronoun scenario
   that only focuses on the pronouns: he, it, she.
these youngsters in the documentary are dealing with
submitting to a pronoun focus of: i, it, you.
                      in some vague sense of a religiosity,
that they cannot allow cogito ergo sum into their minds,
a possessiveness of body, that later translates
into an identification with the mind: which is -
well, if you're going to posit the origin of thinking
in your brain, which isn't even there - you mind
as well posit the mind, seeing how the soul
is argued against primarily through our mortal condition.
   is the eye the window to the soul?
  and the brain merely a paraphrasing of that statement?
perhaps...
              but i wouldn't be too worried
             as Walter Benjamin was about art in the age
of mechanical reproduction... i'd be worried
that art is bound to the morgue of psychiatric institutions...
that art is not a term that suggest the origins of
   such ailments:
due the original lack of it in such places:
  but that that it was never there... and that finding
art can be therapeutic is why art can be scolded
               and establishment art is nothing more
than the pinnacle of us, having abused words,
waging fewer and fewer words, can't produce
    a work of beauty... merely a work that occupies
a space.
                art = space...
          that's the statement these days...
being oversaturated with scientific assurances has created
this insurgence of over-competence or making
art not art in a sense timelessness, as in Dante's
comedy isn't equal to space,
            but that it's equal to timelessness...
    or a statue by Donatello...
                          these days art = space...
because it's not going to be timeless... it was once
the iconoclasm in metaphor of: the lion of Judea...
          Lucifer as the morning star...
                         it will not be timeless because it
has been reduced to the establishment's aesthetic
of tracey emins' unmade bed... or
       damien hirst's the physical impossibility
of death in the mind of someone living -
i never said these things aren't art... some people
said cubism would never be art compared to
surrealism... but shove a triangle into Pythagoras'
head and you get some sort of mathematics...
              it's based on that principle...
what wouldn't work in the case of hirst would be
to put a cancerous tumour into a plastic cage...
people would associate it as some sort of atomist
representation of a nanometre worth's of some
larger thing... i do appreciate the fact that big
art works... it needs so much face to embody
the fact that you are to think about it...
                         and not to have a **** over it:
it's art that's anti-arousal and more and more
and more about how to juxtapose it in your mind,
always to abstract the brain as the mind
   and to never appreciate the idea of having
to source thinking as solely endemic to the brain...
the brain is busy, the heart is busy...
            we have perpetuated an outer-body
experience throughout our time since the time when
we first acquired the phonos of thought...
                 and it is a peculiar "sound", thought...
a dance memorable to actually having a hope in
possessing a soul... even after all sturdy things
shrink into the obsolete, and even vegetable.
but the piece i'm referring to?
     kinda paradoxical... given that a shark would
probably eat you... but then again counter-paradoxical
given the fact that most shark-attacks
     make the shark refrain from eating you,
but merely nibbling on you and leaving you alive
albeit nibbled on... maned... with scars...
so i get the part where the shark is in fact:
an impossible death to conceive... only for the lucky few.
  apart from the fact that the shark is caged
like a prehistoric mosquito lodged in amber...
              woodland gold, amber...
  that's the literal interpretation...
                                 but it's still a moving piece,
modern art isn't crap at all... it's just something you
don't get an ******* over...
            take any still life and apply a cognitively
based chemical reaction: stimulate a narrative...
in that famous phrasing, connect the: dot dot dot(s).
    become, in that almost ridiculous sense:
     a Sherlock Holmes... but all that died was about
a minute's worth of your attention...
this is what's fuelling revising a need for television,
big static things... my personal favourite?
that Tate Modern installation by richard holt -
hand on heart: about 3 times...
              i felt like a mosquito drawn into that:
ah the bright shiny light... 180º and a glass ceiling...
that's all it was...
                   art in the age of mechanical reproduction
has to almost ridicule man, or at least ridicule
the idea that he can become an individual,
    as was the ridicule of man that he could become
a god...
               sooner or later any attempt at individualism
becomes trendy, vogue, and magnetises and
monetises a need to mimic, replicate... one punk today:
20,000 punks tomorrow...
       /
           but that sort of mincing is mostly associated
by the bewilderment of our own success...
                           it's almost like a we're engaging with
a sabotage process: deliberately trying to undermine
ourselves by staging a variety of "anti-social" endeavours
we promised ourselves upon a belief in the "individual"...
      modern pieces of art debunk that myth,
it's that modern art pieces require so much space that
gave them the most adaptation prowess over, say,
a puritan's concept of art, as in a Turner painting...
           classical art can be put into a Florentine market
square and be passed by quiet casually,
because it provides an assurance - it forbids engaging
in an iconoclastic vigil, it's an assurance of the past
and how golden it was... but a modern sculpture
in a busy place where many people congregate
without first allowing it the asylum of an art gallery
and people will treat it as a chance to hone on it,
vandalise it, or steal it and sell it from scrap metal...
       modern art requires an asylum to be accepted,
an art gallery is an asylum where people with
good intentions enter and leave appreciating something
that, to the pleb, would get a rotten egg thrown at it.
    and as with regards to how i phrased something
earlier? how philosophy talks of the logos
     that doesn't see the phonos: or the dichotomy
between actual sound, and sound ascribed a
optically-phonetic disparity encryption:
deepened by a self-styled aesthetic of the "ruling elites"...
          and in the beginning the word was with god...
we're merely licking the toes of such a possibility...
         and just you try to bypass the orthodoxy of
encoding sounds with queer spelling...
                     you, in a sense, learn two-languages
with every single one you learn...
   how to say it and how to write it...
                              and then there the how you hear it
and how sometimes you hear different lyrics to
the ones sang...
                         a bit like the Chinese,
who, upon reading the English translation were
bothersome to get rich quickly after seeing
too many matchsticks in ideogram translated as merely
Li Po; i'd too go bananas and become frustrated
and retaliated by getting to Einsteinian grips with
the mathematical alphabet that bore Li Po... i.e. 1, 0
through to 9.
      ah yes... philosophy that doesn't appreciate
grammatical words, or in that sense credible for a biologist
not necessitating a genus to ease any argument,
to actually further it... or to play ping-pong...
   grammatical words are equivalent to the subconscious
given we tend to write some a sense of fluidity...
the unconscious? schematics akin to triangles...
  "images" or rather shapes...
                             beginning with Δ: isosceles...
later varied to the Γ triangle of Pythagoras...
          and as far as we got, a respectability to
not conjure up a square as worthy of encoding a sound...
nearest being the H... and that turned out to
be much ha ha ha.
                   still... i can't come to grips with these teenagers
in the bbc3 documentary talking about
automated thinking! i'm not denying it, i'm not
doubting it... it's just a question:
          how could such a pronoun muddle come about
that you discourage ownership of all your mental
activity? and instead leave a rampant kindred of an
abandoned snail's shell body to wreck havoc?
   it's almost like a a want to refuse to use words...
or encode words... rarely are people told
that the eyes are used as encoding organs...
                   but that the tongue knows no filters...
what the eye ingests... the tongue sometimes can't
digest... and vice-versus... that what the eyes digest
the tongue can't ingest: hence the rebellion
against contrary political ambitions -
   the ears? well: the ears are allocated the heart as
a partner... the tongue and eyes are entwined...
but the ears are allocated the heart...
                     you tend to feel words more than
hear them... because by the time the tongue
represses combining itself with the eyes to
that elevation of thought... your body becomes
autocratically synchronised to a sort of music
of heightened of unanimous response...
             well, it's not exactly a fetish watching such
documentaries.. iconoclasm in metaphor...
  i swear i wrote this before... how philosophy avoids
grammatical genuses... and how all too
ambivalent poetically equivalent nouns and verbs
are to hide our imperfections that precipitate from
art... iconoclasm / anamorphosis in metaphors...
                         camaïeu in allegory...
                   divisionism in pun...
                                       chiaroscuro in imagery...
gestural abstraction in onomatopoeia...
                     just some examples, and none necessarily
     convincing - as ever... this is my excuse
for i am always bound to say language is Alcatraz
   and my escape from Alcatraz is bound to metaphors,
fo
Kiri Nells Jun 2011
Two hearts floating
Drifting through chill air
High and anxious
Love their only care

Sweet, innocent
Young and fresh
Hearts bursting
Genuine and nothing less

Euphoria rivers
Pulse through living veins
Soaring while defenseless
To Love's reins

Magic yet mortal
Designed for this feeling
Meant to be, supposed to be
I'm at Enchantment's feet, kneeling

Light and elite
No good description
For what can decipher
Love's great encryption?
Andrew Rueter  Oct 2017
EMP
Andrew Rueter Oct 2017
EMP
I can't compute and become mute
When you walk by
My circuitry is fried
Because your program is an encryption
And your pulse is electromagnetic
My car dies, so does my phone, so does my home
I'm immobilized
And demoralized
By immoral ties
To temporary generators
They're validating veneraters
Ultimately unsatisfying
When you're still not buying
I'm attracted to your charge
Until there's a battery
Yet you're the cure to your lure
The EMT for your EMP

Your negative charge casts a cloud around my nucleus
But if you could be positive for a change
We could meet in the middle
And feel energy in our synergy
But as soon as I feel electricity between us
You shut me down
With your EMP
I can't get free
Jonny Angel Feb 2014
I am the original renegade,
was crazy before I was born.
I never play the status quo game,
it was I who invented
the tune of a different drummer,
even the Marlboro Man
took cues from me.

There's no reason for me
to write with any encryption,
'cause I have no superstitions,
I just wanna tell it,
give to you straight,
harden your resolve.

Some might call that ego,
but whenever I've fallen,
I've gotten back up.
Once I ran with the bulls
& they have bigger ***** than me,
I won the race.

Like you 'lil darling,
I'm the dangerous type,
you can ask Cleo,
she sings the words.
blankpoems Nov 2013
Lungs burning with affliction, no prayer can help you realize that you are on fire.
Help me, open my ribcage and read the encryption that is my heart.
This is where my ideas form; this is where the magic happens.
This is where trees become homes when I turn to prose.
This is where love becomes tangible.
Take the helm from my chest cavity and steer me home.
Sew me back up and pretend you didn’t figure out how my mind works from studying my heartbeat.
You can keep my memories there, keep my stanzas there.
But you cannot lock up an idea.

Do you realize that every single time you open your mouth I’m wishing I could have a lobotomy?
I don’t want my brain to miss you when you leave.
I don’t want my heart to miss you when it realizes that it no longer beats in sync with yours.
You can take yourself away from me.
You can make me cry so the salt water stings my face like it’s a burning map.
You can take my poems from my veins and scatter them in the river.
But you cannot lock up an idea.

Oh Captain my captain, I think we are going down.
But everyone is just an arm’s length from drowning.
When life preservers are anchors and every single thing is whispering for you to sink.
The Bermuda triangle is just another place where sailors go to pray and what kind of god ***** you in and tests you with a tempest?
You and I are so much more than child’s play.
Tell me to stay.
Tell me my ideas do not belong on the ocean floor.
Because you cannot lock up an idea.

If the sun shines through your blinds, think of me.
Think of the morning.
But without all your leaving.
Don’t think of the bags packed, of the plane tickets bought.
Of the ferry setting off its horn for you in the middle of the night.
Think of the morning.
Without all your leaving.
With the coffee, with the metaphors that were leaking through the walls as you blinked.
You wanted to keep them for yourself, hold them hostage in your bones.
But you cannot lock up an idea.

So next time you think of leaving, think of taking the ferry across the ocean.
Next time you think of whispering my secrets into the waves that kiss the rocks like they are not hurting anyone, think of me first.
Without the poems.
Before I even started writing.
Remember how I chased butterflies and the sunset.
How I begged you to let me climb up on the roof to watch the sun rise again.
Remember that my ideas are my prayers to a god I have not yet found in the curve of your spine.
Remember that I want nothing more than to not have to miss you.
Remember that every time you dismiss my words, my art, my need to chase the sunset; you are diminishing my creativity.
Remember that you cannot lock up an idea.
this was for my creative writing class.
We are each our own moon.
Charismatic souls reflecting sunlight,
As if to illuminate a room,
We glow against black, void; an endless night.
Like a caterpillar to a butterfly, emerging from a tight knit cocoon,
Spreading each wing, confidently slicing the evening air…taking flight.
Or even a flower freshly bloomed on a midsummer’s afternoon.
The moon: a flower, silently smiling despite the plight.

Aside from what each day shuffles in; each night simmers out
No matter how often we feel we have lost ourselves…
Or leave way to fill our heads with doubt.
With recurring assumptions of a worldwide redemption:omnipotent stealth.
Needn't some take longer than others to sprout?
Staring blankly into a mirror, or a moonless night sky: hungry for answers, yet facing an empty shelf.
However, that doesn't infer we embark on a divergent route.
Simply due to lack of clarity, lack of reasoning behind each card dealt.

With that in mind,
Just as the moon,true colors may dwindle…they may fade, yet in essence are always there.
Even on a cloudy day, or when the sunshine is at its peak…and just as well for the blind.
Full moon, half moon, new moon…waxing, waning: dynamic phases the night sky shares.
Moon phases;moody faces…natures way of emphasizing personality defined.
Notwithstanding the dark side, each moon may wear.
Like a guilty pleasure manifesting in a secret shrine,
We all suppress a certain side; to pompous to face reality genuinely bare.

Fragments of our faces may always be hidden,
But there’s one thing that will never absorb into the eclipse: emotion.
Some figure each phase, each wave of vibes … simply fate already written.
Devils advocate begs to differ… let your mind emit all distraction and harmonize with the ocean.
Effervescent rays,warm barrels in which emotions, old and new, have ridden.
Chaotically contradicting thoughts, pulling and pushing, creating the paradox of serene commotion.
A world of words from each moon face: a beautiful encryption.
We are each our own moon, written in the waves, compelled by life’s devotion.
July 24, 2013
poeticalamity Mar 2014
Lying beneath trees in the heat of the day cannot possibly be compared to any other pastime: to watch the light toy with the leaves, shining bright and brighter in the ever-changing gaps in the leaves turned dark by the shadow. The interplay between the light and the leaves in ever-ongoing banter and they hate to quit their game when the sun moves too far beneath the horizon for the light to reach above the boughs and must return to its source. The wind plays a part in the sport as well, when it rustles the leaves and causes a sparkle in the variance of illumination. Tortoiseshell patterns scatter along your  limbs and features and tumble off the cliffs of your sides into the grass you recline on. The filter of light casts playful interlocking patterns of light and dark impossible to decode without the proper encryption, forever lasting while the world speeds past their lazy game.
I wish I could explain it
To the ppl that have never
Been restricted, or afflicted
By being addicted, but forever

I'm left alone, not seen as clever
And the only time I feel better
Depression seized and Anxiety free,
That plagues me, is whenever

I get high, and deny I'll ever
Be able to function or cope
With sobriety in society,
Cuz to numb pain, I need dope

Otherwise I only get false hope
Causing me only to relapse
If not, my nerves are shot,
But deep down I always ask

If I really want to be controlled
By a drug, and never heal
I wanna be happy without feeling
Like I need drugs to not feel

The pain stained on my brain
But I just can't take the stress
The drug sickness, mood swings
Withdrawals, with cold sweats

I don't wanna to be a slave but
I don't want to stop the only
Thing that gives me salvation
From feeling pain, or when lonely

And maybe the truth is,
Deep down, and hard to admit
.. But in all honesty, I say i want to
Stop, when truth is I won't quit

But lie to myself and say
Maybe one day, I will
I just hope that one day isn't the
Same day I am killed

Cuz maybe only death can stop
The addiction that I fight
If I really want to stop I would
Wouldn't i... Why can't I right

What seems to be wrong
Why can't I be strong
.. Maybe I've been the only thing
Stopping me from quitting all along

— The End —