Also found in: Dictionary, Thesaurus, Medical, Financial.
Related to Computers: Best Buy, Desktop computers


(religion, spiritualism, and occult)

Spiritualists and others communicating with spirits used to work with slates, but the modern trend today is toward computers. Messages purporting to come from the spirit world have been received on personal computers. The origin is difficult to prove, however, because of the ability of some to “hack” into other’s computers.

A common practice since the earliest days of séances was to tie two blank slates together and place them in the circle. At the end of the séance these would be separated and writing would be discovered on one or both of the slates. This writing was often identified as being in the handwriting of the departed spirit and was often a message from that spirit to one of the sitters.

A modern form of slate writing might be experienced using a laptop computer. This could be set to a word processing program, with a new blank file opened. Closing up the computer (which usually turns it off), it could then be left in the center of the séance circle. At the end of the sitting the laptop could be turned on again and the file accessed. It is possible that the file would no longer be empty but would contain a message from spirit.

“Ghost writing” has appeared on computer screens in the past. In The Vertical Plane (1988), Ken Webster tells of his experience after he had moved into an old cottage in North Wales. His old Acorn desktop computer suddenly started to display messages on its screen when it was left unattended. Over a period of two years close to 300 such messages appeared, attested to by Webster’s family and friends. This was before the Internet, so there was no connection with other computers. The messages appeared to come from various sources, including a man named Tomas Harden who claimed to have lived in the cottage in the sixteenth century. The Society for Psychical Research has reportedly investigated this case but no results have been forthcoming.


Buckland, Raymond: Buckland’s Book of Spirit Communications. St. Paul: Llewellyn, 2004
Randles, Jenny & Peter Hough: The Afterlife: An Investigation into the Mysteries of Life after Death. London: Piatkus, 1993
Webster, Ken: The Vertical Plane. London: Grafton, 1988
References in periodicals archive ?
So why is it that schools persist in believing they must expose children to computers early?
Computer users perform common tasks every day that can compromise the security of their computers and networks.
For this reason, you may find it convenient to burn CD-RW discs only for your own use or for students who intend to play them in computers.
Students using computers are able to improve skills more rapidly than those who do not (Hitchcock & Noonan, 2000).
Districts sometimes refurbish computers in-house, but more likely they secure them from outside agencies that sell or donate the units to schools.
And wherever there are computers, there have to be computer programmers who write the instructions that tell the computers what to do, step by painstaking step.
Despite those differences, there are some very clear trends in computer use on campuses large and small, religious and secular, upper- and middle-class: Mobile computers such as personal digital assistants (PDAs), cell phones, laptops, and tablets are taking over as school staff and students use them to create mobile lifestyles.
Physical security relates to the physical barriers that may be in place to prevent unauthorized access to computers.
Grad notes that, because the computers and Internet devices are so enjoyable, finding staff to help out hasn't been a problem.
Unlike biological worms (which spread slowly), computer worms spread rapidly and without much user interaction between computers of a network, including the Internet.
System administrators did not detect the majority of attacks against DoD computers.
Worms, unlike most viruses, do not infect other programs, but they infect other computers.

Full browser ?