Satan (שָׂטָן Standard Hebrew Satan, Greek and Latin Sátanas (Σατανάς), Tiberian Hebrew Ś�?ṭ�?n; Aramaic שִׂטְנָ�? Śaṭanâ; Arabic شيطان Shaitan: both words mean "Adversary; accuser"; derived from the Semitic root šṭn, which carries the semantics of opposing, obstructing, and of being adverse) is a Judeo-Christian term which is, together with the Islamic term Shaitan, traditionally applied to an angel, demon, or minor god in many religions.
Different uses of the word "Satan" in the Tanakh
The Hebrew word "Satan" is used in the Hebrew Bible with the general connotation of "adversary," being applied to:
- An enemy in war and peace (1 Kings 5:4; 11:14, 23, 25)
- An accuser before the judgment-seat (Psalm 109:6)
- An antagonist who puts obstacles in the way, as in Book_of_Numbers 22:22, where the angel of God is described as opposing Balaam as an adversary.
- As a prosecuting attorney against mankind (the Book of Job) in the heavenly court of God. Other angels are not mentioned by name.
The Strong's Concordance number for the Hebrew word "Satan" is 07854. This can be used to research the Biblical usage of this word.
The belief that Satan is in Hell has its roots in Christian literature rather than in the Bible. The Bible states that he still roams heaven and earth. Job 1:6 states that Satan appeared with other angels "before the Lord," presumably in heaven. When God asked Satan where he had been, Satan replied, "From roaming through the earth and going back and forth in it." Satan has not been and is not in Hell.
Aleister Crowley wrote (in Magick in Theory and Practice, Chap. 21) that The Devil does not exist, and also, "The Devil" is, historically, the God of any people that one personally dislikes.
Excerpts from Wikipedia:Satan
- "Adversary", the devil, Lucifer, Bilial, Beelzebub, the Prince of darkness, the serpent.
Satan is also Security Administrator Tool for Analyzing Networks - A tool for remotely probing and identifying the vulnerabilities of systems on IP networks. A powerful freeware program which helps to identify system security weaknesses.