Aladdin jr script online

[For Hire] Experienced Front-End Web Developer - JavaScript, HTML, CSS, WordPress

2024.05.15 04:55 DEFCOMDuncan [For Hire] Experienced Front-End Web Developer - JavaScript, HTML, CSS, WordPress

Hi Reddit!
I'm Duncan, a Junior Front-End Web Developer with a love for building custom websites and web solutions. With my background in JavaScript, HTML, CSS, and WordPress, I make l complex projects and collaboration with design teams to deliver brand-aligned updates my business.
Budget: $15 an hour
Experience Highlights:
Front-End Web Development:
Created and maintained company websites using WordPress, MySQL, and Sendgrid API. Developed custom features with JavaScript, Web Hooks, and NodeJS. Collaborated with graphic design teams and stakeholders for brand-aligned updates. Optimized sites for speed and performance, including mobile layout auditing. Managed email services using Pardot and SendGrid API. Ecommerce Web Development & Marketing:
Developed and maintained multiple e-commerce websites generating over $3 million in annual revenue. Created custom features using Liquid HTML5, CSS3, and JavaScript. Optimized site speed and performance, resulting in a 25% increase in speed on average. Managed SEO strategies, resulting in a 40% increase in organic traffic and a 20% increase in online sales. Freelance Web Development:
Worked with clients from various industries on user-facing front-end development projects. Developed websites and themes in WordPress and Shopify. Managed high-pressure projects and met tight deadlines. Skills & Expertise:
HTML, CSS, JavaScript WordPress, Shopify, Magento API integration (e.g., Google Analytics, Salesforce) SEO optimization Graphic design (Photoshop, Adobe XD) I'm seeking new opportunities to apply my skills and contribute to exciting projects. Whether you need a new website, updates to an existing site, or assistance with API integrations, I'm here to help.
Feel free to reach out via email at duncanjreyneke@gmail.com or through LinkedIn. I'm looking forward to discussing how we can work together to bring your web projects to life!
submitted by DEFCOMDuncan to forhire [link] [comments]


2024.05.15 03:38 TheMangyMoose82 QuickBooks Desktop Enterprise 22.0/23.0 Management Guide

QuickBooks Desktop Enterprise 22.0/23.0 Management Guide

Overview

I have been maintaining QuickBooks Desktop Enterprise for several years now and have put together this guide on how to deploy the base app and the webpatches to users using Intune. I hope someone else finds this information useful.
Before you build your installation and patching packages you will want to make sure you have some necessary tools ready and that you are familiar with how to use them.

Required Tools

PSAppDeployToolkit (PSADT)

You will be using PSADT to do the bulk of the deployment work. You will want to get familiar with this tool if you are not already.

Microsoft Deployment Toolkit (MDT)

For managing QuickBooks with Intune, we are after a specific tool within this toolkit. We will be using the **ServiceUI.exe** tool.

Microsoft Win32 Content Prep Tool

You should already be familiar with this tool. If not, it is a simple tool to understand and use, so do not feel intimidated. This is what you will be using to package everything into a single **.intunewin** file that will be uploaded to Intune.

Building The Deployment Package

Download QuickBooks Installer

We need to download a current installer for our QuickBooks application. Visit the QuickBooks download center at [https://downloads.quickbooks.com/app/qbdt/products\](https://downloads.quickbooks.com/app/qbdt/products)
Select your version and download. This is also where you will download the QBwebpatch.exe patch installer that you need for installing updates.
![Image](https://scsim4ges.blob.core.windows.net/guides/2024-05-14\_11\_50\_28.jpg)

Prepare PSADT

If you haven't already, download the current version of PSADT, extract, and stage the files to repackage for Intune.
Place the **QuickBooksEnterprise2X.exe** into the **Files** folder of the PSADT structure.
![Image](https://scsim4ges.blob.core.windows.net/guides/2024-05-14\_13\_08\_14.jpg)

Modify Deploy-Application.ps1

You need to make some modificatons to the deploy script of PSADT. Enter the following commands under each corresponding section of the script.

Installation Tasks

Here you need to enter the following installation command for the **QuickBooksEnterprise23.exe** installer.
```

Execute-Process -Path "$dirFiles\QuickBooksEnterprise22.exe" -Arguments "-s", "-a", "QBMIGRATOR=1", "MSICOMMAND=/s", "QB_PRODUCTNUM=XXXXXX", "QB_LICENSENUM=XXXXXXXXXXXXXX"
```

Post-Installation Tasks

Here we will enable the XPS document writer with the following command.
```

Enable-WindowsOptionalFeature -FeatureName “Printing-XPSServices-Features” -Online -NoRestart
```

Uninstallation Tasks

Enter the following command to trigger the uninstall script.
```

Execute-Process -Path "$dirFiles\uninstall.cmd"
```

Post-Uninstallation Tasks

Enter the following command to disable the XPS document writer.
```

Disable-WindowsOptionalFeature -FeatureName "Printing-XPSServices-Features" -Online -NoRestart
```
You may make any other modifications you choose if you are comfortable working with the deploy script. Depending on your environment, there may be other tasks you need to perform to get the install to complete successfully.

Create Uninstall Script

You will need to navigate through the registry to get the uninstallation string that is used during the uninstall process for your version of QuickBooks.
Install QuickBooks on a computer temporarily if you do not have it installed somewhere already.
The uninstall string for QuickBooks Desktop Enterprise can be found at:
`HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall`
The registry entry for it will have a product ID for its name. Look through them until you find the one for QuickBooks.
![Image](https://scsim4ges.blob.core.windows.net/guides/2024-05-14\_13\_22\_44.jpg)
Copy the **UninstallString** entry value and paste it onto a notepad editor to build the script.
Use the "/passive" parameter at the end of the uninstall string. This will present the user with a small progress bar during the uninstallation process, but requires no additional interaction.
Your complete uninstall command should look something like this below. Save it as a .cmd file to the **Files** fold of the PSADT structure.
```
msiexec.exe /x {B9BE758E-50B5-4BA7-987B-63184123AA1A} UNIQUE_NAME="belcontractor" QBFULLNAME="QuickBooks Enterprise Solutions: Contractor Edition 22.0" ADDREMOVE=1 /passive
```

Add ServiceUI.exe

This package will be running the the SYSTEM context. In order for the uninstall process to work properly the **ServiceUI.exe** tool needs to be added to the root of your PSADT structure.
This tool is part of **MDT** and can be downloaded from the link provided at the top of this guide.
After you download and install the MDT, you will find the **ServiceUI.exe** in `C:\Program Files\Microsoft Deployment Toolkit\Templates\Distribution\Tools\x64`
Copy and paste it into your PSADT pacakge where your **Deploy-Application.ps1** script is.
![Image](https://scsim4ges.blob.core.windows.net/guides/2024-05-14\_16\_59\_01.jpg)

Wrap with Win32 Content Prep Tool

Now you are ready to wrap it all up into the .intunewin file format so it can be uploaded to Intune.
Select the **Deploy-Application.exe** as the setup file when packaging with the tool. Depending on your computers hardware, it can take a few minutes for it to complete and the app to be ready to upload.

Upload to Intune

Configure Application

Navigate to the Intune portal to create a new Windows application and upload the freshly packaged app.
Enter details to name the application and give it a description. Included with this guide is a description markdown file that you can use if you wish. I have also included an app logo .png image file.
When configuring the app make sure to set install behavior to **System**.
![Image](https://scsim4ges.blob.core.windows.net/guides/2024-05-14\_19\_32\_54.jpg)
Use the following Install and uninstall commands.
```

Install Command

Deploy-Application.exe -DeploymentType "Install" -DeployMode "Silent"

Uninstall command

.\ServiceUI.exe -Process:explorer.exe Deploy-Application.exe -DeploymentType "Uninstall" -DeployMode "Silent"
```

Detection Method

The detection method can be done a number of ways. For ease and reliability I have only provided the basic detection of the .exe after installation/uninstallation.
That's it. You're all set to assign the app and test installing it on a computer.
Please note, depending on your bandwidth and network environment, it can take several minutes for the package to download and install.
If you run into failures, make sure you have logging enabled for PSADT to make troubleshooting failures a breeze.

QBWebpatch.exe

Prepare Files

I came up with a simpe file creation command that places a "log" file on the computer after successfully running the update installer.
This can be used for future detections if you ever update the app with a newer QBwebpatch.exe. Simply set your detection to look for the log file and its last modified date.
```
u/echo off
for /f "tokens=2 delims==" %%I in ('wmic os get localdatetime /format:list') do set datetime=%%I
set datetime=%datetime:~0,4%-%datetime:~4,2%-%datetime:~6,2% %datetime:~8,2%:%datetime:~10,2%:%datetime:~12,2%
echo Update installed %datetime% > "C:\Users\Public\qbupdate.log"
```
Intuit offers the **QBwebpatch.exe** installer that installs all updates for that version that are availalbe at time of installation.
This .exe can be downloaded from the QuickBooks downloads page mentioned at the beginning of this guide.
You will package it the same way we did the parent app. Use the below commands for the **Deploy-Application.ps1** script and **Intune** install/uninstall tasks and commands.
```

Install tasks

Execute-Process -Path "en_qbwebpatch.exe" -Parameter "/silent" -IgnoreExitCodes "1"

Execute-Process -Path "log.cmd"
```

Upload to Intune

Create another app for the update installer. Make sure to set it to System install.
Use the following install/uninstall commands and detection method.
```

Install command

.\ServiceUI.exe -Process:explorer.exe Deploy-Application.exe -DeploymentType "Install" -DeployMode "Silent"

Uninstall Command

Deploy-Application.exe -DeploymentType "Uninstall" -DeployMode "Silent"
```
**File Detection Method**
You're ready to test. The update installer has a "silent" mode, but it is not truly silent. Running it with the `/silent` parameter will hide the first screen, but the user still needs to click on a prompt to install the update when it's ready.
submitted by TheMangyMoose82 to Intune [link] [comments]


2024.05.15 02:50 SquatchHNTR Komado Joe Warrenty

I’ve had my KJ for a few months now and it’s been awesome. I’ve been worried though because I keep seeing people have bad experiences with customer service and warranty and hope I never had to deal with any of that.
Well I’ve always noticed my top gasket doesn’t create the greatest seal with my control tower but never thought too much about it because I don’t see smoke coming out the bottom of the control tower. It spins around easily when my vent gets sticky and it comes off often when I take my grill cover off. It also tilts heavily to one side when the top half is fully open cooking a pizza. I did some looking around online to see if that’s normal and apparently it’s not.
So I went to KJs website and submitted a warranty claim, within 3 days I got an email back saying they are sending me a new top mesh gasket even though I never even registered my warranty. There was no hastle and they were quick to respond. It was honestly a relieving experience to know they in fact do have some customer service and they are so quick to help out. I honestly didn’t have much hope, thinking I would just have new buy new gasket material myself judging by all the customer service horror stories I’ve heard.
I used offset smokers and normal charcoal grills for years but I have to say I love the KJ. I’ll be buying the Joe Jr sometime this year as well.
submitted by SquatchHNTR to KamadoJoe [link] [comments]


2024.05.15 02:47 tempmailgenerator Integrating Email Addresses into Website URLs with the PARAMS Method

Enhancing Web Navigation through PARAMS

Understanding how to seamlessly incorporate email addresses into a website's URL represents a significant leap towards advanced web development and user interaction. This method, primarily achieved through the use of URL parameters (PARAMS), allows for a more dynamic and personalized web browsing experience. It enables developers to create more engaging, user-centric websites that can effectively communicate with visitors by utilizing their email addresses for various purposes, such as customization, pre-filled forms, or personalized greetings. This approach not only simplifies the user journey but also opens up new avenues for marketing strategies and customer engagement.
The technical execution of appending email addresses to URLs involves a nuanced understanding of web development practices, particularly in the manipulation of the query string. By leveraging the PARAMS element within a URL, developers can pass user-specific information, such as an email address, between web pages or to server-side scripts. This process requires careful consideration of URL encoding to ensure that special characters in email addresses do not interfere with the URL structure. Understanding these technicalities is essential for developers looking to enhance website functionality and offer a more tailored browsing experience to their users.
Command/Feature Description
window.location.href JavaScript property to get or set the URL of the current page
encodeURIComponent() JavaScript function to encode a URI component, including email addresses, to ensure special characters do not interfere with the URL structure

Expanding the Use of URL Parameters for Email Integration

Integrating email addresses into website URLs using parameters is a powerful technique for personalizing the user experience and enhancing data tracking capabilities. This method involves appending email addresses or other user-specific data to URLs as query parameters, which can then be accessed and utilized by the web page or server-side scripts. For example, by including an email address as a URL parameter, a website can offer a personalized welcome message to the user or pre-fill forms with their information, reducing the effort required for form submissions and improving user satisfaction. Additionally, this approach can significantly benefit marketing efforts, allowing for the tracking of user engagement and the effectiveness of email marketing campaigns by monitoring how users interact with the website after clicking on a link embedded in an email.
The technical aspect of adding email addresses to URLs involves careful encoding to ensure that special characters in email addresses do not disrupt the URL structure. The JavaScript function encodeURIComponent is essential in this context, as it makes email addresses safe to include in URLs by encoding characters such as '@' that could otherwise be misinterpreted by web browsers. Moreover, developers must also consider security and privacy implications, ensuring that sensitive information transmitted via URL parameters is protected, for example, by using HTTPS to encrypt data in transit. Implementing these techniques requires a balance between enhancing user experience and maintaining data security, emphasizing the need for best practices in web development and design.

Appending an Email to a URL

JavaScript Example
const email = "user@example.com"; const baseUrl = "http://www.example.com"; const encodedEmail = encodeURIComponent(email); window.location.href = `${baseUrl}/?email=${encodedEmail}`; 

Enhancing User Experience Through URL Parameters

Embedding email addresses into URLs using parameters is a sophisticated approach aimed at customizing the user's online journey. This technique enables websites to deliver a more personalized experience by using the information transmitted through URL parameters. For instance, a website could automatically fill in a user's email address on a subscription form based on the parameters passed in the URL, thereby simplifying the process for users and increasing the likelihood of form submission. This method not only improves user engagement but also provides a seamless transition for users following links from emails, directly impacting the efficiency of email marketing campaigns by offering tailored content or special offers based on the user's previous interactions with the website.
However, the utilization of email addresses in URL parameters necessitates a thorough understanding of web security practices. Given the potential for sensitive information to be exposed in URLs, it's paramount that developers implement measures to safeguard this data. This includes ensuring that any webpage handling URL parameters over HTTPS to encrypt the data transmitted between the client and server. Additionally, developers should be cautious about how this data is stored or logged to prevent unintended disclosure of personal information. Adhering to these security measures can mitigate risks while harnessing the benefits of personalized web experiences through URL parameter integration.

FAQs on Integrating Email Addresses into URLs

  1. Question: Is it safe to include email addresses in URLs?
  2. Answer: Including email addresses in URLs can be safe if transmitted over HTTPS and if proper encoding is used. However, developers must be cautious of privacy concerns and ensure that sensitive information is handled securely.
  3. Question: How do you encode email addresses for URL parameters?
  4. Answer: Email addresses can be encoded using the JavaScript function encodeURIComponent() to ensure that special characters, such as the '@' symbol, are properly formatted for URL inclusion without breaking the structure.
  5. Question: Can email parameters in URLs improve user experience?
  6. Answer: Yes, by using email parameters, websites can offer personalized experiences, such as greeting users by name or pre-filling forms, enhancing the overall user experience.
  7. Question: What are the privacy concerns with using email addresses in URLs?
  8. Answer: The primary concern is the potential exposure of email addresses in server logs, browser history, or through referral headers, risking the user's privacy.
  9. Question: How can I secure email information passed in URLs?
  10. Answer: To secure email information, ensure that your website uses HTTPS to encrypt data transmitted between the client and server, and avoid storing sensitive information in URLs whenever possible.

Final Thoughts on URL Parameter Integration

Utilizing URL parameters to include email addresses in website URLs offers a unique opportunity to personalize the user experience and streamline interactions. This technique enables a direct and customized approach to web navigation, where users are greeted with content that resonates with their preferences and needs. Despite its benefits, the practice requires a nuanced understanding of web security and privacy considerations to protect user data effectively. Secure practices, such as using HTTPS and proper data encoding, are essential to prevent potential data breaches and ensure user trust. As the digital landscape continues to evolve, leveraging URL parameters for email integration represents a forward-thinking approach to web development. It underscores the importance of creating user-centric websites that prioritize security, privacy, and personalized experiences, marking a significant step towards more engaging and responsive web environments.
https://www.tempmail.us.com/en/params/integrating-email-addresses-into-website-urls-with-the-params-method
submitted by tempmailgenerator to MailDevNetwork [link] [comments]


2024.05.15 02:36 majoroofboys A Guide on What to Do At College if You Want To Succeed

Introduction

There was a post that was recently posted and it's been asked a ton: "How do I get a computer science related job after I graduate from KSU?". I thought I'd share this with everyone because I've been down this path and managed to make it on the other side. This will be a long explanation and hopefully, can serve as some sort of guide for students. That being said, things are subjective and this is not the holy grail of how to make it. You might find all, some or none of it useful. I encourage testimonials and whatnot in the comments. Can be applied to all majors but, this primary for technology-based majors since I am in tech field. YMMV

About Me

I've been around here for a while. I was a student not too long ago, studied computer science for my bachelors. After graduating, I work in FAANG and have worked in big tech for a while. No, I don't work at Amazon. I am a senior software engineer. I touch frontend & backend technologies. I participate in hiring frequently.

Starting Out

Over the years and while attending here, there's been a weird disconnect between students, goals and how to achieve them in tech. Goals can be anywhere from learning new technologies, getting internships to securing a full time job before or after you graduate. As much as I would love for there to be a path where you can do minimum effort and still succeed, there isn't. A lot of you seem to not realize that. Getting a degree in this field is not enough. Doing projects that show no passion / interests is not enough. Being stuck on tutorials for years is not enough.
This field is much like a sport. There are very few people that can just be great without any effort. You have to be consistent. Four years is not a lot of time. It goes by super fast. If you constantly push things back and you do not take the time to learn the fundamentals outside the classroom, you will not succeed in this field. This field is at a point where there's so many of you. Every post on LinkedIn and news articles said "hey, this field is a gold mine and you'll make six figures out the gate". For a time, maybe that was somewhat true. As of writing this, it's not. You're going against people who have: better schools, better experience, etc. You have to find a way to diversify yourself early. If you can't diversify, you're going to be in a tough place later down the road. Knowledge not something you can just consume in less than an hour and pass an interview. You have to know it well. If you don't, there's someone else who will.
There's an interesting connotation in life that you're either born super smart or an absolute idiot and that you have to be smart to do computer science / programming. There are people with raw IQ that can consume things like no one you've ever met but, that's such a rarity that there's no realistic use in using that as a data point. If you ever took the time to ask someone who you thought was really good at something, they would tell you something along the lines of: I love what I do and I spent a lot of time doing this. There are hours and hours of time people put into passions that you don't / will never see. Meaning that they can no-life this shit for days on end and still come back and do it some more. It doesn't mean that you can't succeed if don't do that but, computing / programming is a very boring field if you do not enjoy it. I would seriously contemplate why you're going through this. If you're doing it for money and only money, you're going to end up miserable. No amount of money can make you do something you hate. It'll wear you down both mentally and physically. If you're doing this because it's a mix of passion and money, you're like everyone else and you gave yourself a better shot. It's a mental thing. Don't climb uphill if you rather sit at the bottom. Don't complain if you're at the bottom and you rather be at the top. There's nothing wrong with that. But, don't do it. For what it's worth, I am not the smartest person. I graduated high school with a low GPA and took college seriously because I wanted to do more with my life. Plus, being on hourly forever sounds horrible imo. Use the opportunities that life has given to you and run with it. Run far, run smart and run in a direction that you can see yourself going long-term.
Additionally, college is what you make of it. Blaming professors or the program (while I do agree sometimes) is not a solution. Blaming professors that don't speak English is a cop out. If you work in tech, you'll be interacting with a lot of people from other countries. Suck it up. Work with it instead of against it. Professors and TAs can only teach you so much. Classes are meant to give you a taste of what it's like in that domain / space. It's not meant to fix all your issues and show you the way. That's for you to do on your own time. Take accountability of your own success, explore the internet (it's free) and lock in. Stop looking for opportunities to find you. Actively seek them out yourself.

Networking

Make connections with people. I cannot stress how important this is. Especially on the Marietta campus, there's a lot of you that go to class, stingers / food, run to class and immediately start gaming and think that when your classes are over, you're done for the day. That's a bad mindset. Make connections with people. Sit with random people at stingers or wherever. Have a conversation. Find a common interest. Don't harass men / women for a date while you're at it. Keep it cool. A lot of people say "there's nothing to do at KSU and there's no life on campus". That's not true at all. It's true if you choose to put your head in a box and refuse to look up. Join a club that interests you. Get close to the people in that club who actively attend and build a personal relationship. If there's no club with your interest, make a club. Fuck it, lead one. You can make one officially through KSU or add a discord server to the student hub and go from there. You'll meet some really cool like-minded people. Lots of my connections have come from randomly showing up to a club, getting out of my comfort zone and weirdly enjoying it.

Interviewing

Brush up on your interview skills. Technical and behavioral abilities matter. Culture fit matters. A lot of you seem to walk around with almost zero personal hygiene. Clean yourself up, practice talking to people and get places. There's been this stigma that culture fit doesn't matter as much as technical and if I have great technical abilities, they'll just accept me. I can tell you for an absolutely fact that I have thrown out / tossed out resumes from highly technical individuals that had zero people skills. If you can't communicate and clean up, you're more of a risk than someone who does all those things and has a bit less technical ability. I can teach someone how to code. I can't teach someone how to take a shower or brush their teeth. Know more than just Leetcode. Learn system design. Take a course / watch a video on Linux and bash. Do not be afraid of the command line interface. Understand how things work at a deeper level. Take feedback seriously. Do not argue with people. If you future manager / colleague tells you that you need to work on things, work on those things. There's nothing worse than a co-worker in denial.

Jobs

As for internships and full time opportunities, there's a few classes at KSU that you really want to master: Data structures, Algorithm Analysis, Operating Systems and Discrete math. If you're in a major that doesn't have those classes, spend the extra money and take those classes. Do not take them online if you can afford to come in person. Take the hardest / best professors for those courses. Super important. Leetcode is quite literally, those classes merged together in a prompt-style format. If you do not understand those concepts, you will not make it in this field let alone pass an interview loop.
Data Structures - Varies. Rate my professor.
Algorithm Analysis - Varies. Rate my professor.
Operating Systems - Do not take Carla McManus if you want to learn the concepts fluently.
Discrete Math - Andy Wilson.
Having solid resume is super important. Many people who don't secure things and get automatically rejected, etc have horrible resumes. Spend the money (it's a lot) to get your resume professionally written. It's worth it. Invest in your long term career aspirations. Templates are cool but, they don't convey information well and come across as lazy. Don't put every achievement ever on there. I don't want to see a wall of text. No, I don't care if you're a Boy Scout. No, I don't care if you bussed tables in high school. You get the point. The rule of "only one page" is complete and total bullshit. If you have projects and prior work experience related to the role, list it down. Don't conserve space for the sake of keeping it one page. You're limiting yourself. I know the career center actively tells people on handshake to keep it to one page. They're wrong. I landed internships & full time roles consistently at big tech / FAANG for years with a 1.5 / 2 page resume. Do not lie on your resume. If you can't solve a leetcode hard consistently with the technology / language of choice, you don't know it well enough. I have interviewed a ton of students and people that list they know C or Python and can't write recursion or gives me a solution in O(N^2) or worse. Aim for O(N), use a hashmap / hash table when you can and do it in a language that doesn't make you fight the runtime / compiler. Trust me, we know when you're making shit up. If you don't know something say it and then, tell them to explain more. This way, you show that you have the capability to learn. Ask smart questions. Do not ask questions that have already been answered. Take notes.
On your resume, experience is only real experience if you get a W2. If you don't get a W2, you can't claim it as professional experience. A lot of background checks these days are drilling down on incorrect information. I have seen instances where people lie, get an offer, company finds out through a comprehensive background check and their offer is gone. Do not put the fate of your future income on a lie. I cannot stress this enough. A lot of students and people actively lie.
Secondly, the trick to getting a good internship is timing. A lot of you wait until Nov - Dec to find an internship and then, throw your hands up when no one responds. That's not a good mindset. Solid internships are recruiting in end of July to August. By September, the amount of open spots are extremely thin. Local companies tend to look for internships during this time. Internships are about luck after that. Reach out to people in your circle to increase your odds. A referral goes a long way. Prior experience through projects that are complex and unique go a long way. It's a numbers game. Don't aim for the highest thing ever without some sort of referral. You can still apply but, do not expect much from it. Start small and work your way up. It's extremely rare to go from KSU undergrad sophomore to Google. It takes a lot of outside work. If you happen to land the internship, make sure that you get recommendations at the end. Having real people who you worked with in a professional capacity that can vouch for you is huge. If you're in your junior year and you get an internship, make sure you try to secure a full time offer. Loop in your boss, mentor, etc. Make your expectations clear. Reach their expectations and beyond.
Thirdly, full time opportunities are rare and most new grads that get hired come from the previous year's intern pool. If you don't get converted, you have to make up that time searching for a job during your senior year. If you do get converted, keep looking because companies are flaky these days. Always have a Plan B & C. Never fully count on Plan A. If you don't have internships across four years, it's over for you. From a hiring manager perspective, it's an absolute red flag when we come across someone with a degree and no internships. That's effectively going against the point of college. You'll have to settle for crumbs and crawl your way up. Very few make it out of that hole. The bar is significantly higher. Especially, now.

Searching for an Opportunity

Do not wait until after you graduate to find a job. Jan - Early May are when most companies finalize budgets and hire. If you wait until after May, you'll might have to wait until after the Summer and possibly, October for hiring to pick up again. Proactivity is nothing but good for you. If you can't be proactive then, you won't succeed in this field. Referrals matter but, personal connections with the hiring manager / recruiter are much, much better. Work your way up. Don't discount an opportunity because it doesn't pay well. Get as much experience as you can and bounce around. Do not go into the gate thinking you're going to make $120K - $140K / yr out the gate. You're most-likely going to make $68K - $75K / yr depending on the location. Do not listen to LinkedIn posts that claim all this cool shit and how to do it. Trust me, it's bullshit. Don't pay attention to it. It's a brag-fest. It's a long road. Start walking on it early and you'll reach the other side when it matters most. Trust in it.
The reality of this economy is that highly experience people have been laid off. Those people are applying to entry level roles and those roles are being filled for cheap. In addition, watch out for fake postings and scam jobs. If you take a contract job, always keep looking. Avoid jobs that will providing "training" before you even start. Avoid jobs that are less than week old. You want things that are fresh. It's a numbers game. Apply for 300+ jobs every week until you get a response back. Don't be discouraged by employers who don't respond or ghost you. Keep at it. It's a mental game.

Conclusion

I think if you do these things, you'll end up at a great spot after four years. If you're just now coming across this and you've been slacking, use this an opportunity to wake the fuck up, light a fire under your ass and lock in. If you're still in denial after reading this post and you have yet to get anything, light a fire under your ass, come to terms with it and lock in.
If you're in it to do zero work, cheat on your classes, mess around for four years and somehow wing a high salary or a job in this field, good luck. You're fucked. You're so fucked, in-fact, that you'll be wondering "why me and why is it so hard" for a long ass time. Don't be that person.

Cool Resources

Git - https://www.youtube.com/watch?v=CvUiKWv2-C0
Github (use this as your portfolio; web devs should make an actual clean website) - https://github.com
Github Student Pack (tons of free resources) - https://education.github.com/pack
Linux Handbook - https://linuxhandbook.com/ Linux Quickguide - https://github.com/mikeroyal/Linux-Guide
Lots of subreddits geared around linux and programming. Great resources to find.
Understand: Kernel Space vs. User Space, Memory Allocation / Deallocation, Bitwise Operations, Memory blocks, processes and threads, context switching
System Design Primer - https://github.com/donnemartin/system-design-primer
Understand: Monolith vs. Micro-services, Tradeoffs between different approaches, Vertical vs. Horizontal Scaling, Load Balancers, Buckets, Data lakes, CI / CD Pipelines, Data Clusters, Client-Server Architecture, Synchronous vs. Asynchronous Context: System design is like a giant puzzle that has many forms. Create a basic design. It won't be perfect. Mix-and-match different services and know why, how and tradeoffs between each approach.
Programming language is dependent on the role and what the company favors. Common ones are Java, C++, Python, C#, JavaScript / TypeScript and C. You can look at jobs that you would like to work someday, look at the requirements and use that as a basis on where to start learning. Things constantly change. Fundamentals build up on each other. Start small. Work your way up. Do not dream big. Dream realistic. Everyone is different.
submitted by majoroofboys to KSU [link] [comments]


2024.05.15 02:16 Nebberlantis The Little Cobbler That Could: A Collaborative Timeline

1993: The Thief and the Cobbler, an epic animated film by Warner Bros. Pictures, is released. Directed by Richard Williams, fresh from the success of Who Framed Roger Rabbit, it had been known for being in production since the 1960s, with Richard and a lot of other animators painstakingly working to created what Richard said to be “the greatest animated film of all time”.
Despite going over budget, the film being almost cancelled due to likely comparisons to Disney’s Aladdin, as well as threats of booting Richard off, he was able to stand his ground and get the film fully completed to his vision. Although it wasn’t a huge box office success, it would gain universal acclaim from critics and audiences. The Thief and the Cobbler was compared to the likes of Beauty and the Beast for being one of the animation world’s modern classic films, as well as being hailed by some critic as being one of the greatest animated films of all time.
Siskel & Ebert’s review made many audiences agree, as Ebert put it best: “The Thief and the Cobbler is to Warner Bros. as Beauty and the Beast is to Disney. Never in my life have I seen an animated film so brimming with complexity, comedy, and a sense of true, honest life. This is easily one of the 1990s’ best films.”
It would win the Annie Award for Best Animated Feature (ironically beating out Aladdin), the BAFTA Award for Best Visual Special Effects, the LA Film Critics Association Award for Best Animated Feature and the Saturn Award for Best Fantasy Film.
1994: At the 66th Academy Awards, The Thief and the Cobbler wins the award for Best Visual Effects, beating out Jurassic Park.
2003: The Online Film Critics Society named The Thief and the Cobbler the 21st greatest animated film of all time.
2011: The Thief and the Cobbler is selected for preservation in the National Film Registry by the Library of Congress for being "culturally, historically, and aesthetically significant", becoming the first non-Disney animated feature to be inducted.
In this timeline, you can add events to this timeline to further flesh it out!
submitted by Nebberlantis to AlternateHistory [link] [comments]


2024.05.15 02:14 Wad2k Koday progressive lenses any good?

9 months post cataract surgery with Vivity EDOF IOL'S. I tried a pair of progressives from Sam's Club and they aren't working out for me. My single vision distance Cr39 with older prescription (1 month after surgery) are way clearer. So I'm just getting the new ones I just just replaced with single vision in my new script.
I'm not giving up on progressives just yet. I see eybuydirect has new Kodak progressives. Since they seem to have a good return policy, I think I'll give them a try.. Hoping the Kodak progressive lenses are better quality than the Sam's club lenses.
Anyone try the Kodak ones??I don't mind spending the coin, and looking for the best. But I'm looking online now since the return policy seems like a no risk thing.
submitted by Wad2k to glasses [link] [comments]


2024.05.15 01:59 Mainestrone [Online] [2000s-2010s] Extremly weird game about shrunk guy killing insects

Platform(s): Online (might be Flash)
Genre: First person, puzzle game, action
Estimated year of release: Late 2000s, early-to-mid 2010s at the latest
Graphics/art style: Intro sequence was 2D animated, cartoony, pretty simplistic. Rest of the game looked kinda like a mix of 2D and 3D animation. The insects looked like cartoon characters with big eyes. (I THINK they were mosquitoes, but I'm not so sure anymore. They also could've been wasps or hornets.) They floated around and would fly directly towards the player to attack. During their attacks, they narrowed their eyes and buzzed loudly. Their death animation was just them falling down with their eyes closed and a weak buzz. The backgrounds consisted of photos (or photorealistic drawings) of an ordinary house interior (e.g. a bathroom with a toilet, a living room with a table and a kitchen with cooking tools). It only took place in the house AFAIK.
Notable characters: Guy with glasses and black hair (only in the intro), giant insects, no other characters
Notable gameplay mechanics: Mouse only, you could use different "weapons" to shoot with. You built them by combining different household items with each other. I remember a toothpick crossbow, a can of spray deodorant and a thingy that shot soy beans. You moved forward by clicking on arrows.
Other details: This is a repost since I remember much more details about this weird-ass game since last time. THIS IS IMPORTANT: I think the game was Asian. In the main menu, you could choose between English and one other language. Now, since I was just a dumb, uneducated teenager, I didn't recognize the script. In hindsight, it might have been Chinese, Japanese or Korean. The MC also kind of looked Asian if that makes sense.
In the intro, the MC was brushing his teeth in his bathroom when an insect started swirling around him. He ignored it at first, but it kept bothering him and even buzzed sort of mockingly. When he tried to smack it, he was shrunk, no idea why or how. He has to navigate through his house and get rid of an army of hostile insects to return to his normal size. To do so, he has to shoot them with the aforementioned weapons.
submitted by Mainestrone to tipofmyjoystick [link] [comments]


2024.05.15 01:44 Open_Egg_475 Why is one game so different to the next?

I am nearly 40. Been playing football games since the Snes. Played every PES and every Fifa that has ever come out. Now since (about) Fifa 16 I have the issue which makes me not enjoy playing. One game to the next is just so different and I don't understand why. I thought maybe connection but that using what network tools I can as an overlay it doesn't coincide.
I'll just explain tonight instead of the last 6 years....
FUT rivals and I have won 6 in a row. My players are playing like they should. Doing as my input on my control. Then the next game I feel it in the first mins on the ball.
The touches are heavy
5 yard pass goes astray
My players feel like the have 50-75% pace they had the last game
My shots go miles wide or straight at the keeper even though I use manual shooting
Then my keeper will parry weak shots. Or a shot will be straight at them and they will push it into the net
This happeend for the next 5 games and I then turned off.
I am not talking about the opposition. I am talking about my players. Yes I could be facing better opposition but I have been palying online football games since they began. I can tell when I am palying better players.
I am not saying it's 'scripting'. I don't really care if I lose every game if I am bad - I am bad but I just want consitencey. I want my players to do the same most matches.
What I am asking is what is the logical explanation? Could it be my internet? I am with Virgin Media - They have great download speeds but ping is shocking on any game. This does tie in with how long this issues has been happening. If it could be that then I could look at switching.
I don't want to stop playing. I have stopped playing plenty of times but there is no competition. Fifa is the only football game and I love playing football games. I am not ranting as yes it is fustrating but it's been happening for years and this is my first post about it.
I would just like to know the logical explanation and can it be fixed? Do others have this issue?
Sorry about the essay and probably grammer too. Thanks for your time.
submitted by Open_Egg_475 to fut [link] [comments]


2024.05.15 01:38 Open_Egg_475 Why is one game so different to the next?

I am nearly 40. Been playing football games since the Snes. Played every PES and every Fifa that has ever come out. Now since (about) Fifa 16 I have the issue which makes me not enjoy playing. One game to the next is just so different and I don't understand why. I thought maybe connection but that using what network tools I can as an overlay it doesn't coincide.
I'll just explain tonight instead of the last 6 years....
FUT rivals and I have won 6 in a row. My players are playing like they should. Doing as my input on my control. Then the next game I feel it in the first mins on the ball.
The touches are heavy
5 yard pass goes astray
My players feel like the have 50-75% pace they had the last game
My shots go miles wide or straight at the keeper even though I use manual shooting
Then my keeper will parry weak shots. Or a shot will be straight at them and they will push it into the net
This happeend for the next 5 games and I then turned off.
I am not talking about the opposition. I am talking about my players. Yes I could be facing better opposition but I have been palying online football games since they began. I can tell when I am palying better players.
I am not saying it's 'scripting'. I don't really care if I lose every game if I am bad - I am bad but I just want consitencey. I want my players to do the same most matches.
What I am asking is what is the logical explanation? Could it be my internet? I am with Virgin Media - They have great download speeds but ping is shocking on any game. This does tie in with how long this issues has been happening. If it could be that then I could look at switching.
I don't want to stop playing. I have stopped playing plenty of times but there is no competition. Fifa is the only football game and I love playing football games. I am not ranting as yes it is fustrating but it's been happening for years and this is my first post about it.
I would just like to know the logical explanation and can it be fixed? Do others have this issue?
Sorry about the essay and probably grammer too. Thanksf for your time.
submitted by Open_Egg_475 to EASportsFC [link] [comments]


2024.05.15 00:18 pocketchange2247 Trying to create a script to run once a week to copy the result of an IMPORTXML function, then paste it in the cell.

I'm not very good or understanding of scripts. I've looked at a bunch of scripts online that say they can do it, but when I try to add them I get errors, or don't know exactly how to make it work to do what I want. The coding of it confuses me and I really need a simple one, or an explanation of what I need to change to make it work.
I'm basically trying to find a way to have a sheet with permit expiration dates autofill and update only once a week to get around the loading times and upload limits. Right now, my IMPORTXML function for each permit tries to fetch the info too often and after a while every cell ends up as "Loading..." or "#N/A" because of the upload limits. I really only need them updated once a week since they expire every two years.
I have about 80 employees, so 80 rows. Each employee has two different permits. The below examples are just for one of the permits, but would need to update both columns, so about 160 different cells. People get added and removed often, so there is a good amount of shuffling and could be more or less than 80 people at any given time.
The setup for the sheet is basically this:
I have column named "Permit Number" which has a hyperlink to the webpage of the person's permit that has the expiration date.
=HYPERLINK("website.com", Permit Number) 
Then I have another column called "Expiration" which displays the expiration date. The IMPORTXML function pulls the webpage from the Permit Number hyperlink cell (C3 in the below example), then gets the date from that. Also note that each permit has its own webpage and unique URL.
=IMPORTXML(INDEX(SPLIT(FORMULATEXT("C3"),""""),2),"/html/body/div[2]/div/article/headediv[2]/p[4]","en_US") 
As I said, this works perfectly at first, but unfortunately it tries to update too often and leads to errors. I want to find a way to have the script just fetch the dates, then instead of providing that information, actually copy and paste it so that there is no constant fetching of data.
I also acknowledge that trying to run more than like 20 IMPORTXML functions at once usually leads to delays, so if there is anyway around that, I would love to know.
submitted by pocketchange2247 to googlesheets [link] [comments]


2024.05.14 23:55 jopesak Triggers: Online Health Care

I have been trying to make all of my appointments after 4 months sober to get all of my stuff checked out. My dad has diabetes and drank like I did and I desperately don’t want it. I also let go of my dental and mental health but booking online has turned into a multi-conglomerate nightmare fest of bad apps, bad phone service, wrong coverage details and late high bills. Finding definitive coverage where doctors don’t switch out when you book feels impossible right now.
I am in sales / customer service so when I get someone who is apologizing with no solution or going off a script forever I want to drink so bad I could scream.
I just got off the phone while practically eating a cigarette and did my best to not yell or curse. I am finding strength in sobriety but MAAAAAANNNN does this hit a trigger.
Looked a bottle of my wife’s vodka dead in the eyes. Not today Satan. Even US healthcare won’t make me drink today.
submitted by jopesak to stopdrinking [link] [comments]


2024.05.14 23:46 alexior41100 [DnD5e][LFP][Beginner and 🏳‍🌈 Friendly][Free Session Zero][Tue/Wed][FoundryVTT][PAID] Vecna: Eve of Ruin - Who will save existence?

Vecna: Eve of Ruin🎲

The evil lich-god Vecna has unearthed secrets he can use to unravel and remake the multiverse. Stopping Vecna will require working with three of the multiverse's most famous archmages, traveling to far-flung locales, and rebuilding the legendary Rod of Seven Parts.
Vecna: Eve of Ruin is a high-stakes adventure in which the fate of the multiverse hangs in the balance. The heroes begin in the Forgotten Realms and travel to Planescape, Spelljammer, Eberron, Ravenloft, Dragonlance, and Greyhawk as they race to save existence from obliteration.
A level 10 to 20 adventure.
🤓 About me
👉 What am I paying for?
📖 Content details
🐲 Rules
📞 How can I contact you?
submitted by alexior41100 to lfgpremium [link] [comments]


2024.05.14 23:46 alexior41100 [DnD5e][LFP][Beginner and 🏳‍🌈 Friendly][Free Session Zero][Tue/Wed][FoundryVTT][PAID] Vecna: Eve of Ruin - Who will save existence?

Vecna: Eve of Ruin🎲

The evil lich-god Vecna has unearthed secrets he can use to unravel and remake the multiverse. Stopping Vecna will require working with three of the multiverse's most famous archmages, traveling to far-flung locales, and rebuilding the legendary Rod of Seven Parts.
Vecna: Eve of Ruin is a high-stakes adventure in which the fate of the multiverse hangs in the balance. The heroes begin in the Forgotten Realms and travel to Planescape, Spelljammer, Eberron, Ravenloft, Dragonlance, and Greyhawk as they race to save existence from obliteration.
A level 10 to 20 adventure.
🤓 About me
👉 What am I paying for?
📖 Content details
🐲 Rules
📞 How can I contact you?
submitted by alexior41100 to FoundryLFG [link] [comments]


2024.05.14 23:46 alexior41100 [DnD5e][LFP][Beginner and 🏳‍🌈 Friendly][Free Session Zero][Tue/Wed][FoundryVTT][PAID] Vecna: Eve of Ruin - Who will save existence?

Vecna: Eve of Ruin🎲

The evil lich-god Vecna has unearthed secrets he can use to unravel and remake the multiverse. Stopping Vecna will require working with three of the multiverse's most famous archmages, traveling to far-flung locales, and rebuilding the legendary Rod of Seven Parts.
Vecna: Eve of Ruin is a high-stakes adventure in which the fate of the multiverse hangs in the balance. The heroes begin in the Forgotten Realms and travel to Planescape, Spelljammer, Eberron, Ravenloft, Dragonlance, and Greyhawk as they race to save existence from obliteration.
A level 10 to 20 adventure.
🤓 About me
👉 What am I paying for?
📖 Content details
🐲 Rules
📞 How can I contact you?
submitted by alexior41100 to roll20LFG [link] [comments]


2024.05.14 23:37 tempmailgenerator Implementing Backend-Only Access Token Generation in ASP.NET Core

Exploring Backend Authentication Strategies

In the realm of web development, particularly within the ASP.NET Core framework, the need for secure and efficient user authentication mechanisms cannot be overstated. One of the more advanced techniques involves generating access tokens on the backend, solely based on a user's email address. This method offers a streamlined approach to authentication, reducing the need for traditional login forms and enhancing the overall user experience. By focusing on backend processes, developers can ensure a higher level of security, as sensitive user information, such as passwords, are not required to be transmitted or stored in the frontend, thus minimizing potential vulnerabilities.
The process of generating access tokens in the backend leverages the power of ASP.NET Core's robust security features and its flexible architecture. This approach not only simplifies the authentication flow but also provides a foundation for implementing more complex security models, such as role-based access control (RBAC) and multi-factor authentication (MFA). Understanding how to effectively generate and manage these tokens is crucial for developers looking to build secure and scalable web applications that prioritize user privacy and data protection.
Command / Function Description
UserManager.FindByEmailAsync Finds a user object based on the provided email.
SignInManager.CheckPasswordSignInAsync Verifies a user's password and returns a SignInResult.
TokenHandler.CreateToken Creates a new token based on the provided security token descriptor.

Understanding Backend Token Generation

In the landscape of modern web applications, security is paramount, and the method of generating access tokens in the backend is a testament to this focus. This approach, especially when implemented in ASP.NET Core, provides a seamless and secure way of authenticating users without the need to interact directly with their credentials on the client side. By relying on a user's email address to initiate the token generation process, the system minimizes exposure to phishing attacks and reduces the surface area for potential security breaches. This process involves validating the email against the database, and upon successful verification, issuing a token that grants the user access to the application. The token, typically a JWT (JSON Web Token), contains claims about the user and is signed by the server to prevent tampering.
The elegance of this method lies not only in its security but also in its adaptability and ease of integration with other services. For instance, the generated tokens can be used to interact with APIs, enabling a microservices architecture where services require authentication but do not need to manage or store user credentials. Furthermore, this token-based system facilitates the implementation of Single Sign-On (SSO) solutions, improving the user experience by allowing one set of credentials to access multiple applications. However, it's crucial for developers to ensure that the tokens are securely stored and transmitted over encrypted channels to maintain the integrity of the authentication process. Implementing token expiration and refresh mechanisms also helps in mitigating the risk of token theft and unauthorized access.

Generating Access Token for User Authentication

Using ASP.NET Core Identity and JWT
var user = await _userManager.FindByEmailAsync(email); if (user != null) { var result = await _signInManager.CheckPasswordSignInAsync(user, password, false); if (result.Succeeded) { var key = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(_config["Jwt:Key"])); var creds = new SigningCredentials(key, SecurityAlgorithms.HmacSha256); var expiry = DateTime.Now.AddDays(2); var claims = new[] { new Claim(JwtRegisteredClaimNames.Sub, user.Email), new Claim(JwtRegisteredClaimNames.Jti, Guid.NewGuid().ToString()), new Claim(ClaimTypes.NameIdentifier, user.Id) }; var token = new JwtSecurityToken(_config["Jwt:Issuer"], _config["Jwt:Audience"], claims, expires: expiry, signingCredentials: creds); return new JwtSecurityTokenHandler().WriteToken(token); } } 

Advanced Authentication Techniques in ASP.NET Core

The backend-only access token generation strategy, particularly within ASP.NET Core applications, marks a significant shift towards more secure and efficient user authentication mechanisms. This method, which leverages the user's email to generate access tokens without direct interaction with passwords or other sensitive credentials, offers an enhanced layer of security. By abstracting the authentication process to the server side, developers can mitigate common vulnerabilities associated with client-side authentication, such as cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks. The adoption of this strategy is indicative of the evolving landscape of web security, where minimizing the attack surface is paramount.
Moreover, the utilization of JWTs (JSON Web Tokens) in this context underscores the versatility of this authentication approach. JWTs facilitate not only the secure transmission of user information but also the seamless integration with Single Page Applications (SPAs) and microservices. This compatibility with modern web architectures makes backend-only token generation particularly appealing. However, it necessitates a thorough understanding of token management practices, such as secure storage, token expiration, and the handling of refresh tokens, to prevent unauthorized access and ensure the continued security of the application and its users.

Frequently Asked Questions on Token-Based Authentication

  1. Question: What is a JWT and why is it used in authentication?
  2. Answer: JWT, or JSON Web Token, is a compact, URL-safe means of representing claims to be transferred between two parties. It is used in authentication to securely transmit user information and verify the user's identity without needing to repeatedly access the database.
  3. Question: How does ASP.NET Core manage token security?
  4. Answer: ASP.NET Core uses token-based authentication, typically with JWTs, ensuring security by signing tokens with a secret key and optionally encrypting them. It also supports HTTPS to protect the transmission of tokens over the network.
  5. Question: Can tokens be refreshed in ASP.NET Core?
  6. Answer: Yes, ASP.NET Core supports token refresh mechanisms, allowing expired tokens to be replaced with new ones without requiring the user to re-authenticate, thus maintaining the security and user experience.
  7. Question: What are the main advantages of using token-based authentication?
  8. Answer: Token-based authentication offers several advantages, including scalability by being stateless, flexibility in accessing protected resources from multiple domains, and enhanced security through limited lifetime of tokens and HTTPS.
  9. Question: How do you prevent token theft in ASP.NET Core?
  10. Answer: To prevent token theft, it's crucial to use HTTPS for secure communication, store tokens securely in the client side, implement token expiration, and consider using refresh tokens to limit the lifespan of access tokens.

Securing Web Applications with Token-Based Authentication

In conclusion, the strategy of generating access tokens in the backend using a user's email in ASP.NET Core represents a significant advancement in web application security and efficiency. This approach not only simplifies the authentication process but also significantly enhances security by reducing the exposure of sensitive user information. The use of JWTs further adds to this method's appeal by offering a flexible, secure way to manage user sessions and access controls. For developers, understanding and implementing this strategy means building web applications that are not only secure against various threats but also provide a seamless user experience. As web technologies continue to evolve, adopting such advanced authentication methods will be crucial in maintaining the trust and safety of users online.
https://www.tempmail.us.com/en/aspnet-core/implementing-backend-only-access-token-generation-in-asp-net-core
submitted by tempmailgenerator to MailDevNetwork [link] [comments]


2024.05.14 23:29 smartybrome List of FREE and Best Selling Discounted Courses for 15 May 2024

submitted by smartybrome to udemyfreeebies [link] [comments]


2024.05.14 23:28 smartybrome List of FREE and Best Selling Discounted Courses for 15 May 2024

submitted by smartybrome to udemyfreebies [link] [comments]


2024.05.14 23:26 Logansfury Need a subroutine to play corresponding mp3 in script please

Hello everyone,
I have a .lua in progress that is now successfully randomizing a number from 1-51 inclusive and displaying the corresponding .png from a directory of numbered pngs. I also have numbered .mp3's in the directory /home/logansfury/Music/eyego I need the script to immediately after displaying the $random_number image, to use the app mpg123 to play the corresponding $random_number .mp3.
Here is the script so far: https://dpaste.org/dhVj4
Can anyone help code a working os.execute for the mpg123? All my attempts to get such a script from online resources either broke the script outright, or errored and launched three instances of mpg all playing the mp3 on top of each other with reverb and echo. It sounded horrible >.<
Thanks for reading,
Logan
submitted by Logansfury to lua [link] [comments]


2024.05.14 23:20 theChillestThem Have you used any weird, cool online interpreters? Tell me about them!

I quit programming about 11 years ago due to abuse in school. I'm trying to get back into it, but I don't have a pc at the moment, and my phone storage is bursting at the seams, so I'm trying to find some online code/scripting interpreters/emulators to play with, preferably ones that are relatively easy to use on mobile. Would love to get some recommendations on any such tools you've used & think are neat or worth mentioning!
submitted by theChillestThem to learnprogramming [link] [comments]


2024.05.14 23:18 Yuhaino I'm putting together a b̶o̶o̶t̶l̶e̶g̶ slime tutorial of the musical, if you have footage please read!

I'm putting together a b̶o̶o̶t̶l̶e̶g̶ slime tutorial of the musical, if you have footage please read!
PSA: This is my proper post regarding this, I have went through and compiled most of the London clips of Death Note the Musical available online. I still need to sort through some audio, but I'm hoping to put together some kind of b̶o̶o̶t̶l̶e̶g̶ slime tutorial!
If someone with extra clips that they've never published somehow finds me please dont be afraid to contact. I likely won't put this together fully until i have more footage/audio.
99% of the clips I have access to are from tiktok with text plastered all over, and all the footage I have is in 360p. So it definitely won't be an ideal way to view it. This is intended to be consumed as supplementary material to enjoy the musical and is being put together for archival purposes.
The colors in the sheet represent the sources i gathered the clips from. I have went through what I believe to be all the available clips online.
I still need to sort through several curtain call clips + audio i found last minute. I also need to compile together listings people have made regarding selling/trading clips and see if anyone is up to kindly give clips of portions that im at the very least missing.
I have access to 2 semi-complete scripts made by other fans to track what is missing from the clips i've found, but i'm taking caution in guessing what is missing so basically im overestimating what I'm missing.
The musical itself is a really well made adaption, and although I don't personally enjoy how the london adaptation went I believe its still worth putting together to make an archival of. Hoping this may bring in more people to enjoy this piece of media!
Note: I haven't personally seen the musical live so I don't have my own clips. Hell, I only properly watched death note itself a bit over a month ago, but i really want to contribute to the fandom's archival work in some way with what I can. I do hope this can progress somewhat from the help of others in order to put this together for more people to enjoy it!
Thank you for reading. I'd appreciate any clip or audio, or sharing this around to someone who might. Cheers!
submitted by Yuhaino to deathnote [link] [comments]


2024.05.14 23:16 cyberprincessqq What is Cryptojacking?

What is Cryptojacking?
https://preview.redd.it/08skvfu9kg0d1.png?width=1500&format=png&auto=webp&s=db2e289ffb43017d7ef087b460e4382c9a65e830
Cryptojacking, a cyberattack type, occurs when hackers leverage a device’s computational power without the owner’s consent. It is deployed through malicious software (malware) that infects your devices, aiming to utilize them for cryptocurrency mining. The prevalence of this issue surged during the 2017 crypto surge, with bitcoin and other cryptocurrencies’ values soaring, turning crypto mining into a lucrative venture.
The goal of cryptojacking is to utilize a device’s computational resources (usually processors or graphic processors) for cryptocurrency mining without the owner’s consent. Attackers aim to earn cryptocurrency through the resources consumed in the mining process, which can potentially become a lucrative source of income for them in the long term.
Let’s consider how this process typically works:
Infection: The attacker inserts malicious code into a website, online advertisement, or email attachment. Upon clicking on the infected content, the code activates and infects the user’s device.
Mining Script: The inserted code includes a mining script, typically for a cryptocurrency like Monero, which uses the device’s processing power to mine coins.
Resource Utilization: The mining script operates discreetly, utilizing the device’s CPU or GPU resources to solve complex mathematical problems necessary for cryptocurrency mining.
Mining Rewards: Any cryptocurrency mined is directed to the attacker’s wallet, providing them with a revenue stream while consuming the victim’s resources and electricity.
Detection: Detecting cryptojacking can be challenging as it often doesn’t cause noticeable performance issues. However, victims might observe slower device performance, increased heat generation, or higher energy bills.
Cryptojacking is an integral part of modern cyberthreats, and understanding its mechanisms and defenses is key to staying safe in the digital world.

Types of Cryptojacking

There are several main types of cryptojacking, each using different methods to execute the attack and profit from cryptocurrency mining without the device owner’s consent. Some of the most common types of cryptojacking include:

Browser-based Cryptojacking:

  • JavaScript Mining: Hackers embed malicious JavaScript code directly into web pages or advertisements. Visitors to these pages automatically start the mining process on their devices when they open such pages.
  • Browser Extension Usage: Attackers create malicious browser extensions that can automatically initiate the mining process on the user's device.

Malware-based Cryptojacking:

  • Using Malware: Attackers infect computers and other devices with viruses or malware that then initiate the mining process without the owner's knowledge.
  • Script Execution at Startup: Some malware automatically launches the mining process upon device startup, thereby concealing its activity from the user.
Both forms of cryptojacking pose risks to victims, potentially resulting in higher energy costs, diminished device functionality, and, in certain instances, lasting hardware impairment caused by excessive heat.

The Impact of Cryptojacking on Infected Computers

Cryptojacking can have several negative impacts on an infected computer.
Increased Energy Consumption: Cryptojacking significantly increases the energy consumption of infected computers. The mining process requires substantial computational resources, leading to higher electricity bills for users.
Decreased Performance: The malicious code executing the mining process consumes the device’s computational power, resulting in decreased overall performance. Users may experience slower application response times and general system sluggishness.
Overheating and Hardware Damage: Intensive resource usage without adequate ventilation and cooling can cause components to overheat. This poses a risk of hardware damage, including processors, graphic cards, and other critical elements.
Loss of Confidentiality and Security: Certain forms of cryptojacking may open backdoors for additional attacks or enable the theft of confidential information. This jeopardizes user data security and privacy.
Financial Losses: Besides increased energy consumption, cryptojacking can lead to financial losses due to higher electricity bills and potential costs for repairing or replacing damaged hardware.
The comprehensive impact of cryptojacking on a computer depends on various factors, including the intensity of the attack, the device’s resource capabilities, and the security measures taken by the user.
https://preview.redd.it/xd8jozudkg0d1.jpg?width=1024&format=pjpg&auto=webp&s=7b25c85f9880942068ebee1719bfe545f159026f

Security for Miners: detecting and preventing cryptojacking

Detection and prevention of cryptojacking require a combination of technical measures and user awareness. Here are some methods for detecting and preventing cryptojacking:
Use Antivirus Software: Install reliable antivirus software with capabilities to detect malicious scripts and programs associated with cryptojacking. Regularly update virus signature databases.
Monitor Resources: Track the resource usage of your computer or device. If there is an unexplained increase in CPU or GPU load, check the system for malicious scripts.
Block Unauthorized Domains: Use software to block access to known domains and IP addresses associated with cryptojacking. This helps prevent the loading of malicious scripts.
Update Software: Regularly update operating systems, browsers, and other software to the latest versions. Vulnerabilities in outdated software versions can be exploited by attackers to inject cryptojacking scripts.
Beware of Phishing: Be cautious when opening emails, files, and links from unknown sources. Phishing attacks can be used to distribute malicious scripts.
Use Ad-Blocking Extensions: Consider using ad-blocking extensions in your browsers. Some of them can automatically block scripts used for cryptojacking.
Enhance Cloud Security: If you use cloud resources, ensure enhanced security measures. Use strong passwords, enable two-factor authentication, and monitor activity to detect suspicious actions
Following these tips will help miners strengthen their protection against potential security threats and keep their assets and data safe. Remember the importance of being vigilant and responding to threats in the cryptocurrency environment.

Conclusion

In summary, cryptojacking remains a major concern in 2024, with cybercriminals persistently taking advantage of unaware users’ devices for mining cryptocurrencies. The development of this harmful activity highlights the critical need for strong cybersecurity protocols. With attackers adopting more advanced methods like fileless malware and precise attacks, it’s crucial for users to stay alert and enforce solid security practices. This involves keeping software updated, utilizing trusted antivirus software, and exercising caution when encountering dubious links or downloads. Use only proven mining software, customize your miners according to the guides to make sure they work properly.

Have a safe mining!

submitted by cyberprincessqq to MiningOcean_Pool [link] [comments]


http://rodzice.org/