Text translator

r/translator - the Reddit community for translation requests

2011.08.26 03:38 smokeshack r/translator - the Reddit community for translation requests

translator is *the* community for Reddit translation requests. Need something translated? Post here! We will help you translate any language, including Japanese, Chinese, German, Arabic, and many others. If you speak more than one language - especially rare ones - and want to put your multilingual skills to use, come join us!
[link]


2008.12.19 04:56 A community for students of German and discussions pertaining to the German language.

/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /German/wiki/faq
[link]


2012.07.21 00:40 A community for professional translators.

A community for professional translators about translation.
[link]


2024.05.17 01:51 OldandBlue [Poem] Pierre de Ronsard (16th century) - last sonnet.

Translation https://www.lieder.net/liedeget_text.html?TextId=13871
submitted by OldandBlue to Poetry [link] [comments]


2024.05.17 01:24 thetopthrow What I learned coding a Voice Transcription app using only LLMs

(link to app intentionally excluded per self-promotion policies, this isn't that kind of post)
I often find that my voice is faster than my typing, but I've been really frustrated with Siri/Apple's transcriptions and a few of the other products on the market felt overbuilt for my exact workflow: say something to put it into copyable text on my desktop. This was built in the most minimal way possible for that outcome - you log in, record a voice note, get a transcription. To make it a little more useful, I wanted to add summarization, grammatical formatting, and translation.
The problem? I don’t know how to code. I have only built one website ever in my life (also via LLM coding). I write SQL for my day job, but am familiar with Replit and some technical aspects of web development, but I have never formally learned to code. This was an experiment in trying to test the boundaries of LLMs, and it gave me a great lens into the near future of better LLMs and coding tools.
How I built this:
This started when I saw an open-source app drop on Twitter (NotesGPT) - I liked the app, but I hated the action items workflow and thought it was a little clunky. Then, I wondered if I could create something of my own to play with. So I of course went to chatGPT and asked how. The very short summary:
In the backend, it is using
I checked the number of versions of files, and I made somewhere over 500 deploys to get to the final product - it was a lot of nights/weekends hacking.
What I learned
I would say this experiment was successful for the intended purpose of being able to create an app I really wanted and we are at the frontier of non technical people being able to unlock programming/life customization in a way that I hadn't realized before. A few specific observations:
  1. End to end building is empowering -- Knowing the core architecture here of how Auth providing some service, I am pretty confident I can self-build an MVP of most the other app ideas I’ve had. I am not trying to be an expert, but this unlocks a new way of thinking for me as I’ve run into problems and I now see the power of being a developer in a way I haven’t before - an end to
  2. this took me about a month of free time - probably 20-30 hours of nights/weekend work? Might have taken me a shorter time period if I had setup a local chat with APIs instead of running into usage limits, but it was helpful to have breaks forced upon me
  3. Claude Opus launching largely enabled this project to be possible and is clearly a technical step forward with LLMs - chatGPT 4 had been struggling, and regularly re-wrote major pieces of the code. GPT-4-Turbo launched in ChatGPT and that was a noticable improvement in reasoning, but still lazy on writing full blocks of code (which I needed to be able to edit what I wanted. ). Right before wrapping up, ChatGPT4o came out and I can definitively say Claude is still better at Coding
  4. Claude also has way better UX for regular use - fastesmoother. But the web limits on messages sucked
  5. The things LLM struggled with the most was frontend <> backend connection. When just doing things in either, it excelleced (frontend was probably more straightforward / more available training data, so it was almost 100% accurate vs backend hitting typescript errors regularly)
  6. This may seem simple, but I had no idea how approachable it is to actually purchase a domain and put up a website. I assumed there was some alchemy, but it turns out its just putting the right variables in the right tools and it just works — the internet is awesome
  7. The ecosystem of tools for this sort of thing is great right now - Replit + Together + Replicate + Clerk + Convex were all super easy to pick up as someone not that technical.
  8. This cost in total $200 - about $100 for replit/claude/chatgpt subscriptions, most of the rest for domain. Marginal cost of hundreds of voice notes I tested with is closer to 0 than $0.01
submitted by thetopthrow to ChatGPTCoding [link] [comments]


2024.05.17 00:58 neoazenec New Caledonia Azərbaycandır! 🇳🇨🤝🇦🇿

New Caledonia Azərbaycandır! 🇳🇨🤝🇦🇿 submitted by neoazenec to 4caucasus6you [link] [comments]


2024.05.17 00:47 birdandsheep The Qingjing Jing, Part 2

Hello again friends. I wasn't kidding when I said this was a slow process for me. Plus the end of the semester and life getting in the way, I have not had anywhere near enough time for studying. But it's summer now! So I expect to make some quicker progress.
Today I have the next section of this seemingly underappreciated Daoist text along with my amateur translation, which I'd like to present for your enjoyment and feedback. First part is here.
夫道者有清有濁有動有靜
Those which Dao are clear, are opaque, are active, are still. ^1
男清女濁男動女靜
Male is clear, female is opaque. Male is active, female is still ^2.
降本流末而生萬物
Descending from the beginning, flowing to the end ^3 , and all the myriad things are born.
清者濁之源
Clarity is the origin of opacity.
動者靜之基
Activity is the root of stillness.
人能常清靜天地悉皆歸
When people are always able to be clear and still, heaven and earth will certainly revert. ^4
Comments and Questions:
  1. I don't think "those which Dao" is a completely natural way of speaking, but I found it hard to capture what this means. I venture to guess it means something like "act in accordance with," or "act as" in the same way that in English you can say "horsing around," but you don't literally mean being a horse. You mean acting as a horse acts. This is something like "Dao-ing," or so. Rouzer's book has taught me the character 順 for "to act in accordance with," or maybe more concisely, just "follows, "but this is not what the text says. I won't speculate on why the author chose what characters they were, but I found it interesting to not say "follows the Dao." Dao is not a monarch you obey.
  2. I've read Dao De Jing (DDJ) in English in college, and I've seen many antilogies presented in the text as conceptual opposites. I think this is more of these. If so, then we might stretch some of the meanings of these characters. I picked "opaque" for 濁 but I think really it literally means like "muddy." The opacity of water that is polluted. But since it's in contrast with "clear," which could be either literally clear like transparent or also conceptually clear, I just picked the broadest English word I could find that could handle all these usages.
  3. This sentence has no subject?
  4. I'm not sure I've got this part completely right. I just had to make up the word "when" for the beginning because I couldn't make sense of it otherwise. I'm also not sure about the word "certainly." My dictionary tells me that 悉 means "in all cases" or "to know," and 皆 means "all" or "everyone." So it seems a little redundant to have them both, but I interpreted the relationship between the two uses of 悉 to be sort of like when you know P is true because one of either A or B is true, and they both imply P. Does that make sense? Like when you know something because it's true no matter what. If that's right, then I think "certainly" might be a good fit, but I'm guessing.
I'm pretty sure "revert" is right here. In DDJ, you see references to reversion to one's original state, seeing one's true nature, going back to being undifferentiated, etc.
So how did I do? I crossed 100 characters while studying these and I feel like I'm improving, but the road ahead is very long, and I appreciate guidance from everyone more experienced than me.
submitted by birdandsheep to classicalchinese [link] [comments]


2024.05.17 00:17 joshua_7_7 Someone, please tell me what I'm doing wrong. ZWave JS UI entity discovery

Someone, please tell me what I'm doing wrong. ZWave JS UI entity discovery
Hello
I have my Z Wave devices connected to Home Assistant OS through the Z Wave JS UI add-on. In the settings menu under Home Assistant, I enabled the WebSocket server and kept the default port of 3000. (Provided an image).
Now, in Home Assistant when I try to set up Z-Wave not to use Z-Wave JS integration, and I enter the port (image), it says it failed to connect. Need some help, please
https://preview.redd.it/4sqn0j655v0d1.png?width=1913&format=png&auto=webp&s=47850c452059c0f6f66b024f1756f9c2229339ac
https://preview.redd.it/jg5qmj655v0d1.png?width=1904&format=png&auto=webp&s=352b052ce78d24930b6c42a60b489bb6bce92de7
submitted by joshua_7_7 to homeassistant [link] [comments]


2024.05.17 00:01 MtHoodlum Admiral Platform provides centralized management for MikroTik network operators worldwide, helping them streamline and optimize their operations

Admiral Platform provides centralized management for MikroTik network operators worldwide, helping them streamline and optimize their operations
The interview features Marc Perea, CEO of Admiral Platform, which was formerly known as Remote WinBox. Admiral Platform provides centralized management for MikroTik network operators worldwide, helping them streamline and optimize their operations. Marc introduces various MikroTik devices and explains that their platform supports all devices running RouterOS version 6 or 7. However, they currently do not support devices running SwitchOS.
One of the primary features of the Admiral Platform is network automation, which includes daily backups retained for 30 days to assist with disaster recovery. The platform also offers features such as change configuration emails and daily summaries. In case of a device failure, users can retrieve the configuration from the backup and apply it to a new MikroTik device. The firmware manager allows users to schedule firmware updates for one or multiple devices with just a few clicks.
The Fleet Commander is a mass configuration and command utility that can handle a variety of tasks across numerous MikroTik devices. For example, users can generate reports on routers or switches with specific VLAN IDs, update DNS settings, add firewall rules, or manage network address translations (NAT). This tool significantly simplifies network management by enabling bulk actions, eliminating the need to configure each device individually.
Router management is the core framework of Admiral Platform, offering real-time and historical statistics for interfaces, including bandwidth consumption. The system provides alerts and notifications for various issues, such as SFP port problems, speed and duplex mismatches, or device disconnections. Notifications can be delivered via text message, Slack, or Telegram. Remote access, initially the primary feature of Remote WinBox, remains a crucial part of the platform. It allows users to manage MikroTik devices on private networks without needing public IPs.
Admiral Platform also offers several customer support tools, including speed tests, Wi-Fi scanning, and bandwidth utilization tracking. Customer service representatives can quickly check the status of routers, run speed tests, and manage Wi-Fi settings, such as SSIDs and passphrases. The platform includes features for managed Wi-Fi and parental controls, which Marc has been involved with since 2015 through various software, including Aerez. These features allow users to set rate limits for specific devices, ensuring that high-bandwidth activities do not interfere with other network tasks.
For example, Marc describes how he groups gaming systems like Xbox, Switch, and PlayStation into a category called "Gaming Systems" and limits their bandwidth to 10 Mbps. This prevents gaming devices from monopolizing the network bandwidth during updates or downloads, ensuring other devices on the network remain unaffected. The subscriber app also provides charts and graphs to help users identify which devices consume the most bandwidth.
Guest Wi-Fi is another feature that Admiral Platform supports, allowing users to set up separate networks for visitors or IoT devices. This ensures that guests or less secure devices do not share the same network as more critical devices, such as work laptops. The guest Wi-Fi can be easily turned on and off as needed.
Marc concludes the interview by expressing his appreciation for the opportunity to discuss Admiral Platform and its features, highlighting its usefulness and versatility for MikroTik network operators. Additionally, IsoHorns antennas are compatible with radios from MikroTik, including NetBox, BaseBox, and NetMetal, making them suitable for outdoor Wireless Internet Service Provider (WISP) Point-to-Multipoint (PTMP) Fixed Wireless Access (FWA) applications.
submitted by MtHoodlum to outdoorwireless [link] [comments]


2024.05.17 00:00 Mental_Badger_6156 Difficult web dev or difficult asks?

I'm working with a web dev on a wordpress.org site.
They are telling me the site cannot feature a widget like option to translate blog posts and articles. Instead, they would need to manually translate everything moving forward since we can't afford Translate Press.
They are also telling me that alt text for low-vision readers is an incredibly difficult task that would require completely refreshing every image on the website. I just wanted to use alt-text on images moving forward, but they says this requires some back-end adjustment that would mess with all images for the past 10+ years.
Is this true?
TIA.
submitted by Mental_Badger_6156 to Wordpress [link] [comments]


2024.05.16 23:56 TooMuchVanced [RVX PLAYBACK ISSUE FIX] Latest ReVanced, RVX, ReX and RVX Android 5-7 Builds [Last updated: 16.05.24]

Important:

To use the new builds you need to use new Micro G versions. First you need to uninstall your old Micro G version. Then you need to install one of the 3 versions listed below:
After you've done that make sure to disable Battery Optimizations.

Builds:

RVX (recontinued & experimental playback fix):
Compiled on RVX Manager v1.20.2 (inotia00) with Revanced Extended patches v4.8.0-dev.6. You can also patch the apps yourself but if you don't have time for it, simply don't want to do it or don't know how to do it you can use my builds.
Youtube RVX v19.16.39:
To fix the playback issues use the latest YouTube RVX Build and try to enable the following features:
YT Music RVX v6.51.52:
In version 6.31.55 YouTube removed the Old Layout Code so any version over 6.29.58 can't revert to the old Layout anymore
YT Music RVX v6.29.58 (Old-Layout)
Reddit RVX v2024.07.0 (temporarily discontinued because of APKTool issues):
RVX Manager v1.20.2 (Arm64-v8a only):
ReVanced:
Compiled on ReVanced Manager v1.20.1 with Revanced patches v4.7.0.
Youtube ReVanced v19.11.43:
YT Music 6.50.51:
ReVanced Manager v1.21.0-dev.3 (Arm64-v8a only):
ReX (discontinued):
Compiled on RVX Manager v1.18.1 with ReX-Patches v2.220.10.
Youtube v19.05.36:
YT Music v6.41.49:
Reddit v2024.14.0:
RVX Android 6-7 (nothing updated):
Compiled on Revancify with revanced-patches-android6-7 v2.160.9.
Youtube v17.34.46:
RVX Android 5 (nothing updated)
Compiled on ReVanced Manager A5-7 v1.17.1 (kitadai31) with ReVanced Patches Android 5 v2.161.4.
YouTube v16.40.36
Known Issues:
ReVanced Manager A5-7 v1.18.0 (Some Armeabi-v7a devices don't work):

Changelogs:

RVX:
YouTube:
YouTube Music:
I may automate the builds over GitHub Actions in the future to provide updates faster. If I do this Armeabi-v7a will most likely be discontinued and the sub will be opened for all members to discuss issues, features and news.
For prebuilts for all ReVanced, RVX, YT-Advanced Patchable apps join my TG Channel: @TooMuchVancedBuilds
submitted by TooMuchVanced to revancedextendedapks [link] [comments]


2024.05.16 23:51 Delicious_Glass1797 I think this is the correct translation

I think this is the correct translation submitted by Delicious_Glass1797 to lookismcomic [link] [comments]


2024.05.16 23:49 HarryPudding careldindiabloleague

Cisco Router Security
What are the two access privilege modes of the Cisco router?
User EXEC Mode: This is the initial access mode for a router. In this mode, the user can access only a limited set of basic monitoring commands.
Privileged EXEC Mode: This mode provides access to all router commands, such as debugging and configuration commands. It requires a password for access to ensure security.
What is the approach for password for the privileged mode of the router?
enable secret [password]
uses hashing algorithm so that the password is not in plain text but encrypted
How to ensure that all passwords in the router are stored in the encrypted form?
service password-encryption
What is the difference between the Cisco router’s startup and running configurations?
How to save the running configuration into start up configuration?
Startup Configuration: Stored in the NVRAM, this configuration is used to boot the router. It remains unchanged until an administrator explicitly saves the running configuration to it.
Running Configuration: Held in the router’s RAM, this configuration is active on the router. Changes to the router’s configuration are made here and are effective immediately.
Know and be able to configure all aspects of the Cisco router covered in class. For example,
configuring the router interfaces, setting the router OSPF ID, etc.
enable
configure terminal
hostname MyRouter
interface GigabitEthernet0/0
ip address 192.168.1.1 255.255.255.0
no shutdown
exit
interface Serial0/0/0
ip address 10.0.0.1 255.255.255.252
clock rate 64000
no shutdown
exit
router ospf 1
router-id 1.1.1.1
network 192.168.1.0 0.0.0.255 area 0
exit
enable secret mysecretpassword
line console 0
password myconsolepassword
login
exit
line vty 0 4
password myvtypassword
login
exit
crypto key generate rsa
ip ssh version 2
ip ssh time-out 60
ip ssh authentication-retries 2
ip route 0.0.0.0 0.0.0.0 192.168.1.254
access-list 10 permit 192.168.1.0 0.0.0.255
access-list 10 deny any
Practical Routing, OSPF, and Security
What is the difference between static and dynamic routing?
Static Routing: Involves manually setting up routes in the router's routing table through configuration commands. These routes do not change unless manually updated or removed. Static routing is simple, secure, and uses less bandwidth but lacks scalability and flexibility.
Dynamic Routing: Automatically adjusts routes in the routing table based on current network conditions using routing protocols. This approach allows for more flexibility, scalability, and fault tolerance, but consumes more resources and can be complex to configure.
What is the difference between link state and distance vector routing?
Distance Vector Routing: Routers using distance vector protocols calculate the best path to a destination based on the distance and direction (vector) to nodes. Updates are shared with neighboring routers at regular intervals or when changes occur. This approach can lead to slower convergence and issues like routing loops.
Link State Routing: Each router learns the entire network topology by exchanging link-state information. Routers then independently calculate the shortest path to every node using algorithms like Dijkstra’s. This results in quicker convergence and fewer routing loops.
Distance Vector Routing: Each router computes distance from itself to its next immediate neighbors. (RIP, EIGRP, & BGP)
-Does not build a full map of the network
-Focuses more on the next hop towards the destination
Link State Routing: Each router shares knowledge of its neighbors with every other router in the network. (OSPF and IS-IS)
-Builds a full map of the network
-Each router shares information
-Maintains a database of the entire network.
Give an example of the distance vector and link state algorithms.
Distance = RIPLink State = OSPF
What type of protocol is Routing Information Protocol (RIP)? Be able to understand
examples and solve problems.
Example of a distance vector protocol
dynamic protocol
-shares routing info with neighboring routers
-an interior gateway protocol that operates within autonomous system
-oldest of all dynamic protocol; RIPv1
-widely used open standard developed by IETF
-a distance vector routing protocol
-limited to maximum 15 hops;
 how rip works -rip sends regular update message (advertisements to neighboring routers) 
-every 30 seconds that resets after each successful ack
-route becomes invalid if it has not received a message for 180 seconds
-RIPv1 (obsolete) uses broadcast, while RIPv2 uses a multicast address -Update message only travel to a single hop
downside : limitations, each router in its table can only have one entry per destination. Have to wait for advertisement for an alternative path, cannot reach hops 15 paths away, little to no security.
What type of protocol is Open Shortest Paths First (OSPF) protocol? Be able to under-
stand examples and solve problems.
-a link state routing protocol
 intra as routing with RIP 
What is the Link State Advertisement (LSA) in OSPF? What is the Link State Database
(LSDB)?
-LSA contains data about a router, its subnets, and some other network information.-OSPF puts all the LSAs from different routers into a Link-State Database (LSDB)
The goal of OSPF is to be able to determine a complete map of the interior routing path to be able to create the best route possible.
The way this is done is that OSPF finds all the routers and subnets that can be reached within the entire network. The result is that each router will have the same information about the network by sending out LSA.
How does each router in OSPF create a map of the entire network?
Step 1 : Acquire neighbor relationship to exchange network information.
Step 2: Exchange database information, neighboring routers swap LSDB information with each other
Step 3: Choosing the best routes, each router chooses the best routes to add to its routing table based on the learned LSDB information.
What is the process for two OSPF routers to become neighbors?
A. a neighbor sends out a Hello packet including the router ID along with subnets that it routes to the given multicast address to a given OSPF area ID.
this is also a way for routers to tell neighbors that they are still on and good to go. 
B. Once other routers receive this packet, they run some checks. The neighboring routers must match the following requirements:
-area id needs to be the same (also used when scaling up OSPF)
-the shared or connecting link should be on the same subnet.
-The Hello and dead timer must be the same.
-the dead timer is having enogh time before the sending router assumes that the neighbor is down.
-this timer is typically 10 secs for point-to-point and broadcast networks.
C. If all is fine, the receiving router will go into Init stage and sends a hello message of its own. This Hello packet list its own network info along with the known neighbor R1. This puts R1 into a 2-way communication status.
D. R1 sends another Hello message to R2 with the information as a known neighbor. This allows the R2 now with a 2-way communication status as well.E. We now have a 2-way neighboring routers
What is the difference between point-to-point and multi-access networks? How does OSPF
handle each case?
Point-to-Point: A network setup where each connection is between two specific nodes or devices. OSPF treats these links with straightforward neighbor relationships since there are only two routers on each segment. 
Multi-Access Networks: Networks where multiple routers can connect on the same segment, such as Ethernet. OSPF uses a Designated Router (DR) and a Backup Designated Router (BDR) on these types of networks to reduce the amount of OSPF traffic and the size of the topological database.
DR selected by the highest OSPF prio.
Be able to configure OSPF routing given a topology.

Example:
Consider a topology with three routers R1, R2, and R3. The routers
are connected R1 =⇒R2 =⇒R3 =⇒R1.
R1 has interface f0/0 connected to the
interface f0/0 of R2. R2 has interface f0/1 connecting to the interface f0/0 of R3.
Finally R3 has interface 1/0 connecting to the interface 1/0 of R3. Assuming all
routers are Cisco 7200 routers, configure them to use OSPF to dynamically route in
this topology (you will be given the Cisco router manual for such questions).

R1enable
configure terminal
hostname R1
interface FastEthernet0/0
ip address 192.168.12.1 255.255.255.0
no shutdown
exit
interface FastEthernet1/0
ip address 192.168.31.1 255.255.255.0
no shutdown
exit
router ospf 1
router-id 1.1.1.1
network 192.168.12.0 0.0.0.255 area 0
network 192.168.31.0 0.0.0.255 area 0
exit
end
write memory
R2enable
configure terminal
hostname R2
interface FastEthernet0/0
ip address 192.168.12.2 255.255.255.0
no shutdown
exit
interface FastEthernet0/1
ip address 192.168.23.1 255.255.255.0
no shutdown
exit
router ospf 1
router-id 2.2.2.2
network 192.168.12.0 0.0.0.255 area 0
network 192.168.23.0 0.0.0.255 area 0
exit
end
write memory
R3enable
configure terminal
hostname R3
interface FastEthernet0/0
ip address 192.168.23.2 255.255.255.0
no shutdown
exit
interface FastEthernet1/0
ip address 192.168.31.2 255.255.255.0
no shutdown
exit
router ospf 1
router-id 3.3.3.3
network 192.168.23.0 0.0.0.255 area 0
network 192.168.31.0 0.0.0.255 area 0
exit
end
write memory
How does OSPF authenticate packets to protect against packet spoofing and tempering?
Be able to enable it a Cisco router.
OSPF (Open Shortest Path First) can authenticate packets to protect against packet spoofing and tampering using several methods. The two main types of authentication are:
Plain Text Authentication: This is simple and provides minimal security. It sends the password in clear text.
Message Digest 5 (MD5) Authentication: This provides stronger security by using cryptographic hash functions to authenticate OSPF packets.
Plain textenable
configure terminal
interface FastEthernet0/0
ip address 192.168.12.1 255.255.255.0
ip ospf authentication
ip ospf authentication-key cisco123
no shutdown
exit
router ospf 1
router-id 1.1.1.1
network 192.168.12.0 0.0.0.255 area 0
area 0 authentication
exit
write memory
MD5enable
configure terminal
interface FastEthernet0/0
ip address 192.168.12.1 255.255.255.0
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 securepassword
no shutdown
exit
router ospf 1
router-id 1.1.1.1
network 192.168.12.0 0.0.0.255 area 0
area 0 authentication message-digest
exit
write memory
Network Defense Fundamentals

What is IP spoofing? Explain.
-The ip packet contains the source and destination Ip addresses.-Is it straightforward to modify the ip address of the packet.
-IP Spoofing: sender chagrin his source address to something other than his real address.
How can IP spoofing be used in security attacks?
-If the attacker sends an Ip packet with a spoofed IP, they will not receive a response form the destination: the machine with the IP matching the spoofed IP will receive the response.Ip spoofing operation - the sender spoofs the source IP address to point to another target. The receiver system replies to the spoofed IP.

What are the countermeasures to IP spoofing?
Ingress and Egress Filtering: Network operators should implement filtering rules on routers and firewalls to block packets with source IP addresses that should not originate from those networks. Ingress filtering blocks incoming packets with a source IP address that is not valid for the network, while egress filtering blocks outgoing packets with an invalid source IP address.
Reverse Path Forwarding (RPF): This technique ensures that the incoming packets are received on the same interface that the router would use to send traffic back to the source. If the path does not match, the packet is discarded, preventing spoofed packets from passing through.
IPsec (Internet Protocol Security): IPsec can be used to authenticate and encrypt IP packets, ensuring that they come from legitimate sources and have not been tampered with. This makes spoofing attacks significantly more difficult.
How can IP spoofing be used to perform DoS attacks?
IP spoofing is often used in Denial of Service (DoS) attacks to obscure the attacker's identity and to overwhelm the target with traffic from what appears to be multiple sources. One common type of DoS attack that utilizes IP spoofing is a Smurf Attack. In a Smurf Attack, the attacker sends ICMP (Internet Control Message Protocol) echo requests to broadcast addresses of networks, with the source IP address spoofed to that of the victim. The devices on the network respond to the echo requests, sending replies back to the victim's IP address. This amplifies the traffic directed at the victim, potentially overwhelming their network and causing a DoS condition.

Know how to use
hping3
for performing ping floods.
Using hping3 to perform ping floods involves sending a high volume of ICMP Echo Request packets to a target to overwhelm it.basic ping floodsudo hping3 -1 --flood [target_IP]
Using spoofed source ipsudo hping3 -1 --flood -a [spoofed_IP] [target_IP]
Controlling the Packet Sending Rateo hping3 -1 --flood -i u1000 [target_IP]Combining sudo hping3 -1 --flood -a 10.0.0.1 -i u1000 192.168.1.1
Firewalling
What is a firewall?
a filtering device on a network that enforces network security policy and protects the network against external attacks.
According to NIST SP 800-41, what are the characteristics of a firewall?
NIST standard defines the possible characteristics that a firewall can use to filter traffic.
-(IP Address and Protocol type) filtering based on source/destination IP address/ports, traffic direction and other transport layer characteristics.
-(Application Protocols)controls access based on application protocol data
-(User identity) controls access based on user identity
-(Network activity)
What are the limitations of the firewall?
Firewall capabilities: -Define a traffic chokepoint in the network and protects against IP spoofing and routing attacks
-Provide a location for monitoring the security events -Provide non-security functions: loggin internet usage, network address translation-Serve as platform for VPN/IPSec
Firewall limitations:-protect against attacks bypassing the firewall, connections from inside the organization to the outside that do not go through the firewall.-protect against internal threats such as disgruntled employees.
What is a packet filter firewall? Be able to write and interpret rules and to spot configu-
rationflaws.
Packet filtering firewall : applies a set of rules to each packet based on the packet headers.Filters based on: source/destination IP, source/destination port numbers, IP Protocol Field:defines the transport protocol, Interface : for firewalls with 3+ network interfaces, the interface from which the packet came from/going to

What is the difference between the default and allow and default deny policies? Which
one is the more secure one?
-when no rules apply to a packet, a default rule is applied: default deny : what is not explicitly permitted is denied default forward : what is not explicitly denied is allowed
default deny is more secure, you dont have to identify all of the cases that needs to be blocked, if one is missed, default deny will deny it.
Port 0-1023 reserved
1024-2**17 ephemeral
source port used by the system initialiatizng a connection is always chosen from the ephemeral ports
Be able to configure the packet filtering functions of iptables.

Example:
Write iptables rules to block all ICMP traffic to and from the system.
iptables -A INPUT -p icmp -j DROP
iptables -A OUTPUT -p icmp -j DROP
Example:
Write iptables rules to block all traffic on port 22
iptables -A INPUT -p tcp --sport 22 -j DROP
iptables -A OUTPUT -p tcp --dport 22 -j DROP

Example:
Write iptables rules to block traffic to host 192.168.2.2
iptables -A OUTPUT -p tcp --dest 192.168.2.2 -j DROP
iptables -A INPUT -p tcp --src 192.168.2.2 -j DROP
What are the limitations of the packet filter firewall?
-does not examine upper layer data : cannot prevent attacks that employ application specfic vulnerabilities or functions.cannot block application specific commands.

What is the stateful firewall and how does it compare to a packet filter?
A stateful firewall is a network security device that monitors and tracks the state of active connections, making decisions based on the context of the traffic. Unlike a simple packet filter, which examines individual packets in isolation based on predetermined rules, a stateful firewall keeps track of connections over time, distinguishing between legitimate packets that are part of an established session and potentially malicious ones. This contextual awareness allows it to block unauthorized connection attempts and prevent attacks such as spoofing and session hijacking. While packet filters, or stateless firewalls, operate faster and consume fewer resources by applying static rules to each packet independently, they lack the sophisticated traffic pattern handling and enhanced security provided by stateful firewalls.

What is the application-level firewall? What are its advantages and limitations?
An application-level firewall, also known as an application firewall or proxy firewall, operates at the application layer of the OSI model. It inspects and filters traffic based on the specific application protocols (e.g., HTTP, FTP, DNS) rather than just IP addresses and port numbers. limitations : increased communications overhead due to two separate TCP connections
 and not transparent to the client 
Application-level gateways are also known as application-level proxies.
-act as a relay for the application-level traffic.
-runs at the application layer, and examines application-layer data
Supported ProtocolsFTPSTMPHTTP
What is a circuit-level firewall? What are its advantages and limitations?
-Similar to the application-level gateway, but only tracks the state of the TCP/UDP sessions.
-Does not examine application data , simply relays TCP segments
-Allow/deny decisions based on whether a packet belongs to an established and trusted connection
Advantage of circuit-level firewall -do not filter individual packets(simplifies rules)
-fast and efficient 
Disadvantages:
-do not filter individual packets -require frequent updates: traffic is filtered with rules and policies that need regular updates for new threats and risks -the vendor needs to modify the TCP/IP implementation for thor applications to use the circuit-level proxy. 
What are the different approaches to basing the firewall?
-stand-alone machines -software modules in roosters, switches, or servers, or pre-configured security appliances. 
What are the host-based firewalls?
Host-based firewalls: a firewall software module used to secure a single host.
What are the network device firewalls?
Network device firewall = routers and switches often have firewall functions, like packet filtering and stateful inspection, to check and filter packets
What are the virtual firewalls?
-in a virtualized environment, servers, switches, and routers can be virtualized and share physical hardware. The hypervisor that manages the virtual machines can also have firewall capabilities.
What is the DMZ? How is it used for securing networks?
A Demilitarized Zone (DMZ) in network security is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, typically the internet. The primary purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN). By isolating these externally accessible services, the DMZ ensures that if an attacker gains access to the public-facing systems, they do not have direct access to the rest of the network.
How the DMZ Secures Networks
Isolation of Public Services: Services that need to be accessible from the outside, such as web servers, mail servers, FTP servers, and DNS servers, are placed in the DMZ. These services are isolated from the internal network, which helps protect the internal systems from attacks that may exploit vulnerabilities in the public-facing services.
Controlled Access: Firewalls are used to create boundaries between the internet, the DMZ, and the internal network. The firewall rules are configured to allow only specific types of traffic to and from the DMZ. For example, incoming web traffic might be allowed to reach a web server in the DMZ, but not to access internal systems directly.
Minimal Exposure: Only the necessary services are exposed to the internet. This minimizes the attack surface, reducing the number of entry points that an attacker can exploit. Internal systems and data remain protected behind the additional layer of the firewall.
Layered Security: The DMZ provides an additional layer of defense (defense-in-depth). Even if an attacker manages to compromise a server in the DMZ, the internal network is still protected by another firewall, making it harder for the attacker to penetrate further.
Monitoring and Logging: Activities within the DMZ can be closely monitored and logged. Any suspicious behavior can be detected early, and appropriate actions can be taken to mitigate potential threats before they impact the internal network.
Traffic Filtering: The firewalls between the internet and the DMZ, as well as between the DMZ and the internal network, can filter traffic based on IP addresses, ports, and protocols. This filtering ensures that only legitimate traffic is allowed and that malicious traffic is blocked.
-if attacker compromises a server on the network, they will be able to pivot to other systems on the network.
What are the advantages and disadvantages of having the two DMZ firewalls be from
different vendors?
Using different firewall manufacturers for the two firewalls maybe a good idea, avoids possibility of both having the same vulnerability but introduces more complexity and management overhead.
Be able to write pfSense firewall rules
Penetration Testing

What is penetration testing?
-legal and suthorzied attempt to locate and exploit vulnerable systems for the purpose of making those systems more secure.
pen testing, pt, hacking, ethical hacking, whitehate hacking, offensive security, red teaming 
What is the objective of the penetration testing?
Use tools and techniques used by the attackers in order to discover security vulnerabilities before the attackers do. 
What is the BAD pyramid?
The purpose of a red team is to find ways to improve the blue team, so purple teams should not be needed in an organization where the red/blue teams interaction is healthy and functioning properly. 
red attack
purple defender changes based off attack knowledge
blue defend
green builder changes based on defender knowledge
yellow build
orange builder changes based on attacker knowledge
Why are the penetration tests conducted?
-a company may want to have a stronger understanding of their security footprint.
-system policy shortcomings -network protocol weaknesses -network/software misconfigurations -software vulnerabilities 
What is the difference between penetration testing and vulnerability assessment?
-two terms often incorrectly ,interchangeably used in practice.
-vulnerability assessment : review of systems services to find potential vulnerabilities-penetration testing: finding an exploiting system vulnerabilities as proof-of-concept
What is the difference between black-box, white-box, and grey-box testing.
Black-Box Testing
Tester Knowledge: The tester has no knowledge of the internal structure, code, or implementation details of the system.
-lack knowledge of system
White-Box Testing
Tester Knowledge: The tester has full knowledge of the internal structure, code, and implementation details of the system.
-very thorough , but not completely realistic
Grey-Box Testing
Tester Knowledge: The tester has partial knowledge of the internal structure, code, or implementation details of the system.
What is the difference between ethical and unethical hackers?
-penetration testers, with proper authorization of the company, help improve the security of the company.
-unethical hackers, personal gain through extortion or other devious methods, profit, revenge, fame, etc. No authorization to conduct the attacks
•Ethical vs unethical hacking, penetration testers: obtain the authorization from the organization whose systems they plan to attack unethical hackers: attack without authorization.
Know the stages of penetration testing and the importance of following a structured ap-
proach.

Planning and Reconnaissance:
Planning: Define the scope and goals of the test, including the systems to be tested and the testing methods.
Reconnaissance: Gather information about the target, such as IP addresses, domain names, and network infrastructure, to understand how to approach the test.
Scanning:
Purpose: Identify potential entry points and vulnerabilities in the target system.
Methods: Use tools to scan for open ports, services running on those ports, and known vulnerabilities.
Gaining Access:
Purpose: Attempt to exploit identified vulnerabilities to gain unauthorized access to the system.
Techniques: Use techniques like password cracking, SQL injection, or exploiting software vulnerabilities.
Maintaining Access:
Planning and Reconnaissance:
Purpose: Ensure continued access to the compromised system to understand the potential impact of a prolonged attack.
Methods: Install backdoors or use other methods to maintain control over the system.
Analysis and Reporting:
Scanning
Purpose: Document the findings, including vulnerabilities discovered, methods used, and the level of access achieved.
Report: Provide a detailed report to the organization, highlighting the risks and recommending steps to mitigate the vulnerabilities.
Remediation:
Gaining Access
Purpose: Address and fix the identified vulnerabilities to improve the security of the system.
Action: Implement the recommended security measures from the report to protect against future attacks.
Retesting:
Maintaining Access
Purpose: Verify that the vulnerabilities have been successfully remediated.
Process: Conduct a follow-up test to ensure that the fixes are effective and no new issues have been introduced.
Importance of Following a Structured Approach
Consistency: A structured approach ensures that each stage is systematically followed, making the testing thorough and reliable.
Comprehensiveness: Following each stage helps identify and address all potential vulnerabilities, leaving no gaps in the security assessment.
Documentation: A structured method produces detailed documentation, which is crucial for understanding the security posture and for future reference.
Effectiveness: It ensures that the penetration test effectively mimics real-world attack scenarios, providing valuable insights into how an actual attacker might exploit vulnerabilities.
Risk Management: By identifying and addressing vulnerabilities, organizations can proactively manage security risks and protect their assets from potential attacks.
Example:
What is the difference between the passive and active reconnaissance?

Passive Reconnaissance
Definition: Gathering information about the target without directly interacting with the target system or network. The aim is to collect data without alerting the target.
Methods:
Publicly Available Information: Searching for information that is freely available on the internet, such as social media profiles, company websites, and news articles.
DNS Queries: Looking up domain registration information (WHOIS data), DNS records, and IP address ranges.
Network Traffic Analysis: Capturing and analyzing network traffic without sending packets to the target (e.g., using tools like Wireshark in a non-intrusive manner).
Search Engines: Using search engines to find information about the target, such as employee names, email addresses, and technical details.
Advantages:
Low Risk: Minimizes the chance of detection by the target because no direct interaction occurs.
Stealth: Suitable for the early stages of reconnaissance when the goal is to remain undetected.
Disadvantages:
Limited Information: May not provide as much detailed or specific information about vulnerabilities or configurations as active reconnaissance.
Active Reconnaissance
Definition: Actively engaging with the target system or network to gather information. This involves direct interaction, such as sending packets or probing the target.
Methods:
Network Scanning: Using tools like Nmap to scan for open ports, running services, and network topology.
Vulnerability Scanning: Running vulnerability scanners (e.g., Nessus, OpenVAS) to identify known weaknesses in the target systems.
Social Engineering: Directly interacting with individuals (e.g., phishing attacks) to gather information.
Probing and Enumerating: Sending specific queries or packets to the target to elicit responses that reveal information about the system (e.g., banner grabbing).
Advantages:
Detailed Information: Provides more detailed and specific information about the target's vulnerabilities, configurations, and active services.
Identification of Weaknesses: More effective in identifying exploitable vulnerabilities that can be used in subsequent attack phases.
Disadvantages:
Higher Risk: Increases the risk of detection by the target, which could alert them to the reconnaissance activity.
Potential Legal Issues: Unauthorized active reconnaissance can lead to legal repercussions if done without permission.
Summary
Passive Reconnaissance: Involves gathering information without direct interaction with the target, resulting in lower risk of detection but potentially less detailed information.
Active Reconnaissance: Involves direct interaction with the target to gather detailed information, but carries a higher risk of detection and potential legal consequences.
Both types of reconnaissance are essential in penetration testing to understand the target's environment and identify potential vulnerabilities while balancing the need for stealth and detailed information.
Be able to use the penetration testing tools discussed in class
nmap 192.168.1.1
nmap -sS -sV -O -A 192.168.1.1-sS: Perform a stealth SYN scan.
-sV: Detect service versions.
-O: Detect operating system.
-A: Perform aggressive scan (includes OS detection, version detection, script scanning, and traceroute).
submitted by HarryPudding to u/HarryPudding [link] [comments]


2024.05.16 23:24 Mirreat Anti piracy screen after finishing 1st The Great Ace Attorney Adventures

Anti piracy screen after finishing 1st The Great Ace Attorney Adventures
So, yeah After this message credits are different than usual Black background and red text
submitted by Mirreat to oddheader [link] [comments]


2024.05.16 23:09 mudda-hello Crunchyroll is seemingly rolling out auto-generated captions for English Dubs on their main platform.

So it's been quite some time that Crunchyroll has added support for Closed Captions/SDH for English dubs with its slow rollout starting with shows that's aired on TV before, and now they've started to add more CCs for their newest seasonals and making their way through the backlog, which is great for accessibility.
However in their quest of adding CCs to their backlog, it seems they're running content through an auto speech-to-text which can get stuff quite wrong and hallucinate some words. This used to be an issue for those watching dubbed content off of CR's channel on Prime Video where it was assumed Amazon themselves were doing it as everything on there needed CCs of sorts. Like this example on Prime from One Piece where the line is supposed to be "Face me, Jack the Drought! For there is no man I fear."
But now these auto-generated captions have made their way onto the actual platform with mixed results. Take this example from the OP of Gundam WfM where it tries to transcribe the lyrics. Other examples include the name "Eri" being transcribed as "Arie" or "Harry", but at least it gets Gundam correct.
This situation is a bit bizarre, as Witch from Mercury does have properly made CC if you purchase the show off of iTunes/Apple TV that CR themselves publish. Here's a snippet of an episode where ATV is the top and CR is the bottom, where it gets some stuff completely off. Another example where some lines are completely absent.
It's not exclusive to WfM, it gets a bit worse in other shows where you'll get proper captions but get the generated ones in later episodes. For example in Solo Leveling, majority of the season has the same captions as what they provided to Apple. Then later on encounter this with mistranscribed lines and misinterpreted yells/grunts as lines.
This all seems to stem a few months ago when the Crunchyroll CEO said in an interview that they were looking into AI generated solutions. It's only a matter of time before we start to widely see this in actual subtitles for Japanese, where we get the worst of both camps of auto-transcription & AI translations. (Discounting the Yuzuki incident, as those were licensor provided subs, & vast majority of Chinese content as CR gets Bilibili subs)
submitted by mudda-hello to anime [link] [comments]


2024.05.16 22:58 MansoppLongnose I can't get over the language

I was really excited to play this game when it got added to Playstation plus, and I have to say, it's a massive understatement to say that this game is not made for me.
I absolutely CANNOT STAND the fact that this game is in a fake language and that short of hand translating every single text box (which takes several minutes per rune absolutely rips me out of the immersion), there is no way for me to enjoy the game. I don't skip text boxes unless I have already read them in any game ever. Text boxes for GAME MECHANICS? Text boxes with CHOICES? These NEED to be readable.
There are plenty of games with little to no text that are intuitive and need no instruction, things like limbo or even animal well. Tunic is not one of those games.
There are entire cutscenes, whole dialogs, a manual, and COUNTLESS TEXT BOXES ALL OVER THE GAME that are unreadable without translation. I can't overlook these. I don't play games in languages I don't read or speak for a reason, and dyslexia makes translating the runes nigh impossible. If there was some function where I could instantly translate an entire text box with like a Google lens, I could maybe feasibly play this game, but as it stands, there is no way for me to get past this.
I quit about 20 minutes in, after using some kind of disposable item and not even understanding what it did, which really frustrated me. The game either needs everything to be context sensitive and intuitive, or it needs actual readable instructions. There is no in between.
I love zelda-likes, and my heart hurts that this game has such an unnecessary wall in front of it. I am only glad I didn't pay money for it directly. If anyone ever makes a mod to translate the entire game into English, I'll come back to it, but I'm not going to hold my breath.
submitted by MansoppLongnose to TunicGame [link] [comments]


2024.05.16 22:52 Paperchain-s Research and reading in another language? Need advice.

I'm starting research for my undergraduate honors thesis in art history this summer. I'll be writing it in the fall, and revising it next spring before graduating. My research area is Renaissance and Reformation Spain, and I'm discovering more and more than not only are primary sources in Spanish, but a majority of the secondary literature is as well. I'm a native English speaker, and I have some slight proficiency in Spanish (as in, taken several high school classes and one in college, but none were very good) and in German (three good college classes, though its been a while). I really don't want my scholarship to be limited to exclusively what Anglophone research has been done, and I know that for my graduate degrees, I will need to demonstrate multiple language proficiencies anyway. So, I've been trying to figure out how to incorporate more non-English scholarship without being very good at the other language yet. But I need some advice! Here are my questions listed below for ease of reading and answering:
  1. Are there any specific resources or tips anyone has for getting access to more scholarship in other languages, particularly Spanish (from Spain, not Latin America)? I've done one paper citing several Spanish articles already, but it was extremely difficult to find them, and many times, they cited sources that I literally could not access-- not even by purchasing a physical book.
  2. What are things I can do to help with reading/translating sources I do find? I've been using ChatGPT to tediously translate articles page by page, and the translation is pretty good, but its not the most elegant system. I have to store my English-translated copy and cross-reference it. And, of course, this method won't work on anything that isn't digital.
  3. Similarly, what can I do to get better at my reading comprehension and speed in another language? I don't have room in my schedule to take any more language classes at my university, and even if I did, those classes are geared towards improving your conversation skills. I really just need to be able to skim essays written in other languages and understand key points without having to translate. Eventually, primary source analysis abilities will certainly be needed. Are there any structured ways to learn this? Or, if all I can do is teach myself, what strategies and methods do you recommend?
  4. And for a bit of an unrelated question, when you write papers citing a language other than English (assuming you are writing in English), how do you handle direct quotations? If you read the article through an AI translation, should you quote in the original language or English? Or both? I always dislike when papers include long excerpts of other languages without a translation, but if you want to include one, can it be your own translation? Or should you only include one if there is an official, published translation of the text?
  5. For primary sources, is it best to read them in the original language if at all possible? Obviously, reading the original language would get me more access, but I'm wondering what the feeling on translated primary sources is amongst academics.
Thanks for taking the time to answer, feel free to address as many or as few of these questions as you'd like, I'm all ears!
submitted by Paperchain-s to ArtHistory [link] [comments]


2024.05.16 22:47 tcoil_443 Japanese reading assistant - quick update

Japanese reading assistant - quick update
Just quick update on free open source Japanese text parser that is being developed for hanabira.org
So far we have text tokenization, dictionary lookups, kanji lookups, word audio, Free translations via DEEPL API, furigana injection, sentence mining functionality and custom flashcard creation.
We might implement GPT integration in the future, should be easy, can serve for example as grammar tutor.
Current prototype (it is ugly, but at least it works):
https://preview.redd.it/ccwo82v2pu0d1.png?width=2851&format=png&auto=webp&s=35c2c894e890395887c230fc00c56be77f80f16c
submitted by tcoil_443 to hanabira [link] [comments]


2024.05.16 22:46 Huge_Belt_4350 I wrote a letter to my mom addressing all the hurts of my childhood expecting a response that never came

I (27F) last last winter (2022) wrote a long letter to my mom. I poured my heart into it, I cried the whole time writing it. I showed it to my husband to make sure I wasn’t being too mean in my writing towards my mom. I showed it to my stepsister to again make sure it was okay and made sense and to get emotional support (I’m Mexican and I didn’t want to push too far because i understand how deep generational trauma is and the parent child dynamic) I even showed it to my stepdad who immediately called me apologizing for the things I wrote in the letter (which I will get into in a moment) and was telling me about how he will divorce her (I didn’t want that and made me feel shitty) and explained why some scenarios ended up the way they did. Everyone encouraged me to send it. I was so confident that my mom was going to read it and drive over ? Write back? Call me. Something ! So I mailed it. (I mailed it because I instantly cry every time I try talking to her in person about not surface level things, it would of been easier getting words out especially when having to translate to Spanish)
In the letter I wrote about:
-Feeling emotionally neglected -the name calling my mom would do (calling me “retarded” and mimicking noises and movements of people with disability towards me among other things -My uncle being a pedo and scaring me into not saying anything to them, i later said something to a friend in HS who went to the counselor who called the police and I made up a person to protect my uncle, I was then grounded for over a year. -the carpet in my bedroom always being wet when it rained which is a lot where I live ruining my feet with a fungal infection that was just ignored (i understand it was a money issue but the hurt remains) -being yelled at for not cleaning everyday (I was the only child who would clean the kitchen and pick up leaves in the fall and stuff), sometimes she would clean again after I would do it. when asking to teach me how to do it better I would be ignored -asking her a question and being ignored -being blamed for high utility bills n being expensive for needing braces -my boyfriend in high school being suicidal when I would try to break up with him and hurting that I couldn’t go to them for help -saying that I tried to hit her to my step dad when I moved out of the way of her too quickly and making a scene about it leaving me confused -about the time she grabbed me by the hair and dragged me to the shower because I forgot to pick up the hairs I left in there after my shower -understanding that i understand she probably had a rough childhood and that all I wanted was a normal mother daughter relationship
That’s pretty much the gist among a bunch of other little things that really hurt me and I explained that it was hard to form a relationship with her in my adulthood and trust her with my kids until we addressed these things. I wanted to be acknowledged. Not even an apology really. But a conversation. I wanted to understand her more because I literally don’t know anything about her. We would never talk unless it was to eat dinner or clean something. I was always in my room during that time.
I waited a few weeks, my stepsister would visit them here and there and tell me how my mom appears sad? And maybe she needed more time.
A few months pass by I see my mom smiling in Hawaii having a good time.
At this point I’m in therapy because I’m losing hair from the stress of this and severely depressed.
Fall comes around and I finally go to visit with the encouragement of my husband, stepsister and stepdad. She acts like I’m not even there. This makes me angry. At one point my mom goes outside to smoke a cigarette im at the table with everyone and I start just talking about the hurts again, I say my mom is a narcissistic. My mom comes back inside. And for an hour. I’m complaining and she’s in the living room a few feet away saying absolutely nothing.
I leave feeling so weird. So lonely? We are now I’m 2024. I don’t have a relationship with her or my step dad really. I had to block her because she would go to Hawaii again and just living her life having a great time I was trying not to be bitter. Or angry. My step sister and step dad eventually started to question how legitimate my statements were (a lot of the meanness was when it was just my mom and I) it was so painful being misunderstood. Being told that that’s just the mom that I have. Being told that things were maybe my fault for having a problem with everything (I would always speak up when my parents would be racist and things)
I few months ago I did send her a text as a final effort. I asked why she never responded. If she wants to just leave this alone that’s okay and I will move on. And she told me that all that was on the letter were complaints. And told me about how when I was 20 I made a comment on a Facebook post about bad parenting and how everyone saw. About how embarrassed she was when people reached out to her. About how I wrote that I felt like I was in a dark environment. I didn’t know everyone saw it. I apologized for that. She told me to come over to talk because she personally has some complains about me. But she never acknowledged me. I didn’t want to go, to feel yelled at and again taken back to being a child getting yelled at.
I’m currently feeling grief. Mistrust to my family. Lonely. Jealous? About how my other siblings seem to be having a better time. How do I move on from feeling misunderstood. I feel like everyone is okay and I’m abandoned. I feel guilt for pulling my small family away from them from how hurt I am. Most times I’m okay until I see my stepsister at a family gathering that I’m never invited to. And then I’m back again to being a lonely child.
submitted by Huge_Belt_4350 to raisedbynarcissists [link] [comments]


2024.05.16 22:46 Double_Ostrich_5851 Can someone translate something for me ?

Can someone translate something for me ?
Googel translate isn't helping me, that's why I thought I'll ask here.
It's about the following 3 texts:
submitted by Double_Ostrich_5851 to Morocco [link] [comments]


2024.05.16 22:36 LongNet6174 Translation Discrepancy

Hello everyone, I have a question about a specific Quran verse and how it translates into english. Specifically 24:43:
أَلَمۡ تَرَ أَنَّ ٱللَّهَ يُزۡجِي سَحَابٗا ثُمَّ يُؤَلِّفُ بَيۡنَهُۥ ثُمَّ يَجۡعَلُهُۥ رُكَامٗا فَتَرَى ٱلۡوَدۡقَ يَخۡرُجُ مِنۡ خِلَٰلِهِۦ وَيُنَزِّلُ مِنَ ٱلسَّمَآءِ مِن جِبَالٖ فِيهَا مِنۢ بَرَدٖ فَيُصِيبُ بِهِۦ مَن يَشَآءُ وَيَصۡرِفُهُۥ عَن مَّن يَشَآءُۖ يَكَادُ سَنَا بَرۡقِهِۦ يَذۡهَبُ بِٱلۡأَبۡصَٰرِ
The translations seem to significantly differ towards the end however:
Do you not see that Allah drives clouds? Then He brings them together, then He makes them into a mass, and you see the rain emerge from within it. And He sends down from the sky, mountains [of clouds] within which is hail, and He strikes with it whom He wills and averts it from whom He wills. The flash of its lightening almost takes away the eyesight. -Sahih International
Seest thou not that Allah makes the clouds move gently, then joins them together, then makes them into a heap? – then wilt thou see rain issue forth from their midst. And He sends down from the sky mountain masses (of clouds) wherein is hail: He strikes therewith whom He pleases and He turns it away from whom He pleases, the vivid flash of His lightning well-nigh blinds the sight. - Yusuf Ali
There are multiple examples of each of these translations from multiple translators. The discrepancy seems to be between whether or not the lightning is being referred to as belonging to god (his) or to the cloud (it). I am wondering if there is a conclusive most accurate translation? Is it possible that "it" in this circumstance could also be referring to god, is there any precedent for god being referred to in that manner throughout the text?
submitted by LongNet6174 to AcademicQuran [link] [comments]


2024.05.16 22:23 fite4self Funny stories about in laws 3

Dealing with the mother in law is hard enough, but can you imagine if you also need to deal with his sisters?
His oldest sister is living next door with her husband and her parent in laws. Her husband has a little bro. According to what she said, the brother is spoiled by the parents and she dislike him. Therefore, her front door uses key because she doesn’t want the brother to come so easily and so often. But our front door uses passcode, and she came over to our house every weekends at that time. She stayed the whole day in our house on weekends.
My husbands father has diabetes and needs kidney dialysis. Most of the time, his second sis is the one who took him to the doctor or hospital. But she needs to work, so my husband also needs to help from time to time. However, whenever they ask the oldest sis to help with the dad, she would say, I am married out already. In my memory, she seldom took the dad to the doctor or the kidney dialysis. I am not good at driving, and was pregnant at that time, I picked his dad up from the hospital once (what is ironic here is that his second sis thought it was their oldest sis picked them up from the hospital even though she is the one also complained the biggest never helped), helped his second sis to send his dad to the kidney dialysis ( because she needs people to help the dad get out or in the car), and helped with translation for his dad’s physical therapy when his second sis was not available. In January of 2021, his dad’s situation is very bad and the nurse asked them to make a decision if the hospital should save his life if ….. the chance is only 50/50, and even though he was saved, he would have to do kidney dialysis for the rest of his life, and he also would have to have his leg amputation. Considering his life quality and the care taking part, his mom and second sis agreed to let him passed away naturally if that really happens. My husband had a hard time making the decisions. The oldest sister kept crying over there, and said we should not give up his life. Suddenly, she turned to me and asked about my opinion. Then I expressed my opinion, if you guys decide to save his life then you guys should share the responsibility of taking care of him and help with doctor visit and kidney dialysis, but you guys also need to think about his life quality and the fact that he would lose his legs. His second sis agreed with what I said, and my husband agreed with his mum and second sis at the end The oldest sis also agreed with then after her husband s persuasion. After his dad passed away, the oldest sis is the one cried the hardest, and the mum told one of their aunt on the phone how sad the oldest daughter is, and asked her not to cry so much, otherwise her health might be affected. Mam, you should show your love and contribute more to your father when he s still alive.
After I had my first kid, especially my relationship with my mother in law was like freezing at that time, my husband and I would go to visit my parents every weekend, one reason is that I could escape that prison like house, the other reason is that my parents could help me with the baby there so that I can rest a little bit. However, I accidentally found out she complained to my husband about me in the message why I always showed them bitchy face at home and why would I go back to my parents house every weekend. But the fact is she came over to our house more often when their dad’s situation was bad. And after the dad passed away, she still came over very often, which lead to her mother in law yelling at her at one time(when her father in law was in hospital because of Covid), saying no daughter in law would go back to her mums house so frequently. She’s lucky to have her husband to back her up by then. And she came over to our house to complained about it, and said I was married to her son but not selling myself to his family. My mother in law told her to keep quiet then the situation would become better.
Talking about the message, how I found out she bitched about me and my family is also very interesting. Thats like when my son was like about 8 months old, my husband told me to let his mum to watch the baby a little bit and would go grocery shopping with me after that meeting. I was waiting for my husband in his office room, and his mom was holding the baby to nap. I left my phone in the living room, so I played with my husband s phone. I accidentally went to the message, and saw that the last msg his oldest sis said is if you go bankrupt don’t expect me to help you. I was wondering what would make her say this. Then I went into their msg. The first time I found out that actually she had so many complaints about my family and me. So my husband got my dad a free tablet through promotion and he shipped it to our house for setup. She saw that package with my dad’s name on it. Second sis said it might be sending here for set up. In the text she told my husband that she wanted to get a tablet and ask for suggestion. My husband asked why would u need that, you don’t use that. Then she said is this your father in law s Xmas gift? My husband explained that’s through a promotion, not he buying it. Then she said, I guess he would not get a Christmas gift since you already got him a house! lol my dad paid half of that retirement house. And because my sis and I could not get a good rate, my husband said he could help, but my sis s side will be responsible for half of the mortgage. My husband s name is also on that title! How come this house would become my dad’s Christmas gift? And in the message, she also said she s not as lucky as me, no need to wash dishes at home. But the fact is I am the one who cooked most in our house and did most of the dish cleaning before my baby came out, I am the one who cleaned the house all the time. I didn’t do so many dishes wash after the baby was born because I needed to take care of the baby and power pump is very exhausting for me at that time. For her, she doesn’t cook much at her house, because either her father in law cook or the parent in laws bring food home when they are off work or her mum would cook and ask the second sis to bring food over! And her parents in laws would clean the whole house every Wednesday at that time! Reading this I felt super angry, my face was burning and my heart was about to jump out of my breast! I directly replied bitch to her! I hung up on her when she called my husband s phone. After my husband finished the meeting , I said, “ u r in trouble now, because I just called your sis bitch!” She called my mother in law saying the brother curse her. And MIL came knocking at the door, disregarding if my husband is still in the meeting or my son was napping in her arm. She asked my husband why cursed his sis! I couldn’t stand any more, then I exploded, and questioned her why every time you defend your daughter no matter shes right or not. Do you know what she said about my parents and me in the message. I also directly called her bitch and claimed that it's her who kicked my mom out of our house when she was here to help me! That became a big arguement and I took my son back to my parents house right after the arguement.
Because of my husband, I tried to fix the relationship after half a year, and also we have our own house now.
However, just two days ago (5/14), his oldest sis called him around 10:30pm using second sis s phone because her husband got her a new phone and would like my husband to set it up for her. Her old phone is still usable, why the new phone must be set up now? And my husband is wondering why she’s not using the her husband’s phone to call but second sister’s phone. My husband went to check and found out she moved into our house, where his mom and second sis are living, with her 18 month son . And He traced that she was living there since 3/16. Not sure about exactly when as the history can only go back to two or three months. My husband and his second sis are the owners, and my husband is helping paying the mortgage ( before we moved out, he is the only one paying the mortgage). Why no one telling us about her move in. And we are sure she has no issue with her husband and parents in law because the husband just bought her the new iPhone and she s living in our house on weekdays, but on weekends she would go back to her own house. How hypocritical it is! When my son was about 8 months old she complained we went back to my parents house every weekend. But now she moved into our house even though her house is next door !!! My husband called the second sis and told her about this, expressed his disappointment about not letting him knowing this, telling her this whole shit is basically slapping my face. And also told them we are not going to NC trip with them. BTW, a few days ago, his oldest sister texted my husband asked him to go back to that house help clean the doggie this week, before the NC trip. Why the heck you live there , eat there, free baby sitter there, you can’t clean the dog with your sister?!!!
submitted by fite4self to motherinlawsfromhell [link] [comments]


2024.05.16 22:06 CuriousAnachronism 24 [M4F] Germany/Europe/Online - Fiat iustitia, et pereat mundus

Prologue

Hello and welcome to my post. I will subdivide this into two large parts. One will cover my thoughts, feelings, my hopes and dreams...While the other will tell you the specifics of how I pass the time, what topics interest me, what passions do I posses. I believe that at the end of this leap into my inner world, you dear reader, will have all the necessary information to judge whether we are compatible or not.

Part I
I am writing this in the hopes of finding something that I lack. Lately I have had this feeling, this tinge of melancholy within the dephts of my being, this yearning to find a kindred spirit, another Soul, much like mine, to form a bond with. Perhaps Loneliness is the right word for what is bothering me, but to use it seems to carry with it a connotation of ungratefulness. Ungratefulness for the people that I do have in my life, although none of them, of course, have the connection to me that I seek here.

I have found it increasingly necessary to seek in this Life a sort of purity of thought. What I mean is, I have began to undestand what ideas and concepts are ultimately compatible with my inner most Self, ergo what guidelines I have to follow to feel the most whole. Naturally I have likewise realised what I cannot add to my Self and what I will henceforth reject with all the power that I posses.

With this new context in mind, I now follow on the path of self improvement. I will now begin to mold my Self into my perfected idea of how the Self should be. This is certainly a significant undertaking, one that will not be easy to follow through on but one that I ultimately have to do. To me such context is essential. It is akin to a Guiding Star shining in the night. I will follow this Star for without it I am lost in the vast Darkness.

Looking back at my life, it was suboptimal, especially if one compares the way it molded me to how I will now mold myself. I suppose I must look on with a hint of regret at all that time which one might consider to be lost. Still... I try to stave off such decisively negative interpretations, after all, I have ultimately came to these conclusions. That means that somewhere along the line I had to have picked up on enough of such ideas for them to become so cemented in my consciousness. Well, either that or I was always like this, but in that case I can at least thank my life up to this point for not being able to supress such manifestations of my inner most Self.

To add to the topic of my life, I must admit that not all the battles have yet been won, not all the Demons vanquished, not every Mountain climbed. I want you to keep such things in mind when deciding whether or not to approach me. Many will shy away, I undestand that much, but the pursuit of true Companionship is just another such battle. Having said all that I do believe that being able to overcome hurdles together carries with it a certain appeal. That is to say, what's the fun in joining once the Game is already over?

I don't shy away from such challenges, perhaps to a fault. Certain troubles that I faced in the past carry with them a long shadow over my current health and well being. Still, I intend to change little in this regard other than the proficiency with which I will clash the current of my Will against the cliffs of Life.
Part II
In this part of my post I will tell you about my interests and hobbies, I will try to be thorough, commonality in this regard is rather important to build a relationship
History. I have had an interest in history for almost a decade now, it started back in school and developed from there. Well, now that I think about it one could argue that it started even earlier in my life as I liked watching the odd historic documentary or film aired on television but it wasn't regular back then, I never actively sought it out. I am mostly interested in European history in the period between the 18th-20th century but I sometimes branch out to other time periods and other parts of the world. I watch various channels related to history and read articles and sometimes books. I have recently got a few books on the German revolution of 1848/1849 and a historical magazine on the Thirty Years' War. Besides that I try to visit museums sometimes.
Literature. Especially old novels. I like to immerse myself in the Worlds of these books, I tend to read them while listening to thematically fitting music and take my time with them. One time you are following a troubled Youth in his quest for spiritual understanding of the world, another you see the aged and decrepit Doctor gambling his very Soul on the promises of abtaining satisfaction in earthy pleasures, then again your olfaction notices the most pleasant scent known to man even as the one eminating it has the appearance of a revolting Frog. These and many other stories open up to you once you decide to set foot into the literary World.
Languages. I know three, with one being a bit rusty. I am currently working intently on strengthening it. I believe that if I continue to apply myself in this regard then I should be able to finally conquer it. What language am I working on? Well, if you were to stack all the major works in it they would be as tall as a house... It is fun to go through different works in multiple languages, the same goes for film, games and such.
Games. I recently played Cyberpunk 2077. Well as recently as I played any major story centric game. Now that the dust has settled and the bugs mostly removed...It's not that bad. The main questline at least. Besides that I tried Fallout 76 (Very average, I'm dissapointed with what they made the "RPG" system) and I might give Deus Ex Manking Divided another spin (since it's somewhat similar to Cyberpunk when it comes to its aesthetics). Dark Souls is one of my favorite series, I still haven't beaten Elden Ring though. When it came out I wasn't in the right mindset to invest a hundred hours into it, with all those bosses and difficult locations. I think I'll only consider playing it if I am streaming it to someone. I am generally interested in either streaming games or having the person I am talking to stream them to me. To be specific I mean streaming to a single person while being on call. Besides that I'm a big fan of Paradox strategy games, especially Europa Universalis IV and Heats of Iron IV, I tend to only play single player since I find multiplayer with many people to be rather stressful but on the other hand I have nothing against a co-op game. I'm not the best player though, despite the ammount of hours I have in them. Another great game I would mention would be Dragon's Dogma. A very underrated RPG. I recently beat it again and it was an atmospheric and interesting experience. It is one of those games that feel like they have an endless ammount of depth and constant new secrets to discover.
Anime and Manga. In recent times my interest in them has waned but I still watch the occasional series here and there. Like Cyberpunk Edgerunners (Which I found to be rather mediocre) and the very good first season from the new arc of Bleach. Some of my favourite series include: Fullmetal Alchemist Brotherhood, Death Note, Fate;Zero, Psycho Pass, Code Geass and Attack on Titan. I wouldn't mind if you were to introduce me to some new series, maybe based on the ones I mentioned. My favourite Manga is Berserk which I still follow, althought I am still not certain on the direction that the new author is taking. I suppose it really is a matter of contention whether a somewhat (or considerably warped) vision is better than an unfinished work. One could argue that a few novels remain unfinished and possess a macabre appeal to them as such.
Music. Classical music has a very special place in my heart. A few of my favourite pieces would be: Clair de Lune, Nocturne Op. 9 No.2, Devil's Trill Sonata, Danse Macabre, Valse Sentimentale, Symphony No. 7 in A Major, Op. 92: II. Alegreto (by Beethoven) and Suite from Swan Lake, Op. 20a: I. Scene. Moderato. There are more but these ones always invoke something in me when I listen to them. Besides Classical I also enjoy listening to Synthwave, old Western pop and J-pop, both modern and from the 20th century.
Esotericism. I am interested in things spiritual, mystical, magical and esoteric. I have read religios texts, magical grimoires, introductions to various schools of thought. It is interesting to me.
Epilogue
Hopefully I was able to cast the spotlight upon my inner World in a clear and unequivocal manner. I feel the need to add to the aforementioned that I am rather introverted, which means that I tend to dislike large social gatherings. I managed to condition myself to be able to endure the presense of large groups of people but it isn't something that I would seek out in most cases. Besides that I am neurodivergent and suffer from certain issues with mental health. I have to take medication to keep myself under control. They work well enough but certain days are harder than others. I respect the struggle that others have with mental health but in the context of a relationship I have my limits, no one with BDP for instance. I am also not looking for anything casual. I understand than one cannot demand depth and meaning from a conversation with an absolute stranger, that is akin to trying to build a sand castle right before the waves strike but I ask at least that you enter with a mindset that this might become something of significance. I also do want to say that I am completely Monogamous. My preference? The sickly, pale, intellectual who watches rain droplets slide down the window in Autumn. Lastly, if I enjoy the company of a person I tend to not want to let them go.
Thank you for taking the time to read my post and have a good day. I ask that you send a DM instead of a chat and that you give the English translation of my title in the opening of your message.
Goodbye...Or perhaps untill we meet again
submitted by CuriousAnachronism to ForeverAloneDating [link] [comments]


2024.05.16 22:06 Hashi856 Which version of the Torah was used to translate the original Septuagint into Greek?

If the masoretic texts didn't exist, from what version of the Torah was the text being translated?
submitted by Hashi856 to AskBibleScholars [link] [comments]


2024.05.16 21:38 Tex_True_Crime_Nut ODD CODED POST

On March 19, a Reddit user named u/Nomanisanisland8 posted a message titled "Delphi" with only the following content:
"54 68 65 20 6f 6e 65 20 72 65 73 70 6f 6e 73 69 62 6c 65 20 77 65 61 72 73 20 61 20 72 65 64 20 73 68 69 72 74 2e 20 49 66 20 79 6f 75 20 61 72 65 20 65 76 65 6e 20 72 65 61 64 69 6e 67 20 74 68 69 73 20 74 68 65 6e 20 49 20 63 61 6e 20 67 75 61 72 61 6e 74 65 65 20 79 6f 75 20 61 6c 72 65 61 64 79 20 6b 6e 6f 77 20 68 69 73 20 6e 61 6d 65 2e 20 4c 6f 6f 6b 20 66 6f 72 20 74 68 65 20 6f 6e 65 20 77 69 74 68 20 74 68 65 20 67 6f 6c 64 65 6e 20 63 75 70 2c 20 75 73 69 6e 67 20 68 69 73 20 68 61 6e 64 73 20 74 6f 20 66 6f 72 6d 20 61 20 68 65 61 72 74"
This looked like hexadecimal characters to me, so I translated it to text using an online converter.
The resulting decoded message was this:
"The one responsible wears a red shirt. If you are even reading this then I can guarantee you already know his name. Look for the one with the golden cup using his hands to form a heart"
This is the only post from this particular user. It was not attached to any subreddit (i.e. it was a stand-alone post). Here is a link to the post:
https://www.reddit.com/useNomanisanisland8/comments/1bj4t18/delphi/
There is user who posts a lot on various Delphi-related subs with a very similar username (one number off from the 8). Does this message resonate with anyone?
submitted by Tex_True_Crime_Nut to Delphi_Knot [link] [comments]


http://swiebodzin.info