Blank world map for labeling

Maps

2008.06.17 00:20 Maps

Beautiful, interesting, and informative maps.
[link]


2017.01.26 21:23 hornbook1776 D&D Maps

A catalog for user created maps and links to maps by other artists suitable for use in any D&D campaign, adventure, or encounter.
[link]


2008.10.20 04:58 Geography

The study of the Earth and its features, inhabitants, and phenomena.
[link]


2024.05.17 01:43 Mightus3000 Probably won't work on it but I was thinking about a mod (but I am not like the others, guys I swear!)

Probably won't work on it but I was thinking about a mod (but I am not like the others, guys I swear!)
Hey, so I am still on the fence about commiting to that, but I was thinking about making some *kinda* "reverse" world mod; and what I mean by that is (roughly):
  • Socialist Germany, Italy and (moderately socialist) US
  • Tsarist Russia
  • France lead by Doriot, or something like that (so fascist, by irl terms, although ambiguously I suppose?)
  • Right-Authoritarian (military dictatorship?) UK
  • Democratic Japan (?)
The main points of divergence would be: Spartakus Revolution succeeding, Russia averting its own revolution, and brief Civil War in the US (caused by the harsher Great Depression).
The potential WW2 catalyst would be Trotsky and Ernst Rohm stirring trouble in the Rheinland.
Maybe kinda cliche ideas but I don't think any mod of this kind actually came to fruition... and I honestly think that any mod that actually releases would be welcomed at this point, lol.
I know that Red Flood has kinda similar premise, but although cool in its own right, I would like to make something less "wacky".
It would be cool if anyone would like to help cause making big mods by oneself is kinda hard, obviously. Any role would honestly be helpful, but the most needed rn would probably be GFX-artist and writing-"lore" support.
Personally I made some submods for Kaiserredux, so I can do a little bit of everything. (btw I promised to make a monarchist path for my mod, but I am kinda tired with that rn, heh)
I also made some basic preliminary work by copying and cleaning essential vanilla files, although I started doing it before latest patch so it may need some adjustments (but the error log has been largely cleared). Ah, and I don't have "Arms Against Tyrany" yet, so I should probably get that one soon...
I also want to mention some general principles I would like for the mod and its development to adhere to:
  • Designing the mod to be "Kaiserreich/Kaiserredux style".
  • Somewhat reasonable alt-history (believable developments, even with some "unrealistic" starting conditions).
  • Keeping the mod's scope within reason, mainly by limiting the ammount of tags present on the map (at least initially).
  • Not trying to reinvent the wheal (not making overcomplicated mechanics).
  • Making different countries feel interconnected, and gearing the game towards one bigger conflict, rather than many smaller ones.
  • Keeping mod development public by using github.
  • Keeping Discord server small (probably closed to the devs), so that 90% of time is not spent on managing it. (But there could probably be a subreddit for the mod, to interact with the - potential - players.)
  • Not stirring any hysteria witin the HoI4 community (what's fucking wrong with some of you guys!)
Some "Toozers" (and stuff):
Ideologies Setup
Starting Situation in Western Europe (all gfx is either wip/placeholder)
Not good at making portraits but Sinclair came out nice
Bonus Wiki-style box I made for fun (I am not normal)
Not much actual content done beyond the teasers tho...
idk if anything will come out of it, cause 99.999% of HoI4 mods is never finished (number confirmed by certified sources), but I have seen someone on this subreddit having a flair along the lines of: "Maybe the HoI4 mods were the friends we made along the way" (lol); and honestly that’s kinda true, many people make mods cause they find doing it fun and the actual release is a secondary concern... Although it would certainly be cool if it were actually released in "full"... eventually...
btw my bigest concern with the potential mod development is that I actually have no idea how to manage a discord server, so it would be great if someone were up to the task with that :>
But honestly I am not realy convinced on working on it, so it is more of a probing post to see if anyone is interested, and than consider if I commit to it.
(And if there is some team already working on a similar premise, I might consider joining it...)
submitted by Mightus3000 to hoi4modding [link] [comments]


2024.05.17 01:31 meisjfudge Visit the world of Whiskerthorn!

Visit the world of Whiskerthorn!
Embark on an adventure in the enchanting world of Whiskerthorn! 🌟
Immerse yourself in a captivating low-poly universe with diverse landscapes and hidden gems waiting to be discovered. The expansive map allows you to traverse from one stunning location to another, but for a quicker journey, take advantage of the convenient teleports.
Whether you're on PC or Quest, Whiskerthorn offers a unique experience. While it's optimized for PC, Quest users can still explore, though the experience might differ. For the ultimate tour, including secret teleport spots, add or DM me on Discord at meisjfudge. Just let me know who you are and why you're reaching out, as I get a lot of spam.
Please note, my VRChat might crash every 30 minutes, but don't worry – only I will be affected, not you. Ready for the adventure? Click the link below to enter Whiskerthorn and start your journey:
Whiskerthorn on VRChat
submitted by meisjfudge to VRchat [link] [comments]


2024.05.17 01:29 JamFranz I’m calling about a past due balance on your account (Part 13) - That one time we went to Canada

I work for a ‘special collections’ agency and I don’t think our customers are human.
Part 1 Part 2 Part 3 Part 4 Part 5 Part 6 Part 7 Part 8 Part 9 Part 10 Part 11 Part 12 Part 13
I wasn’t exactly thrilled when, on the first night P’uy̓ám stayed with me, the moment we sat on the sofa he turned to me and asked, “Can we talk?”
I was tempted to sprint out the front door (like any perfectly reasonable and emotionally stable person would), but I’m proud to say that I managed to fight that instinct. The talk ended up basically being ‘did I mind that he wasn’t human’. I told him no, he’s the smartest, nicest person I know, and I think he’s amazing. I asked him if he minded that I am human, and he told me he didn’t care about that. He said I make him laugh, and spending time with me makes him happy and want to be the best version of himself. He did also say that I’m beautiful and a lot smarter than I claim I am, but I chalk up those last two to him being super nice, because if asked to describe myself, the two words I’d probably use would be, ‘loud’ and ‘confused’.
We just stared at each other awkwardly for a moment after that, neither of us seemed entirely sure what to do – it was the first time we’d actually been alone together since ‘the kiss’.
Just when we’d figured it out (and no, internet stranger, I’m not going to be sharing any more specific details, thanks), a knock on the door and the sound of Sandy’s voice outside interrupted us.
“Oh hey hon. I just wanted to make sure you were still alive.” She smiled once I jumped up to open it.
Her eyes drifted to P’uy̓ám who waved awkwardly from the couch, glasses askew.
“Well alrighty then, I guess I’ll be going.” She just stood there, looking a bit lost.
I realized that was the first night she’d come home to any empty house after having company for a month straight – I guess even unspeakable horrors get lonely too.
“Sandy, do you want to come in and watch a movie with us?” I offered after a moment.
“Oh, you betcha!” she brightened and then proceeded to choose the seat between us. I swear she’s got psychic chaperone powers or something.
I suggested that maybe the three of us could do a game night every month, since we figured it’d be nice to catch up outside of just when we were trying to prevent the world was ending. I must say though, I thought Sandy was intense as a supervisor but she is a thousand times more frightening as a poker player – and we don’t even play for money.
I joked that we needed to take her to a casino, but she very seriously replied, “Oh I’m banned from every one in the state.”
I moved apartments after a month had passed without hearing from Yyohn. I’d been waiting to be absolutely sure, because I didn’t want to saddle a new renter with the whole, ‘you might be pulled into a nightmare world and sacrificed to an interdimensional entity’ thing – that would’ve been really inconsiderate.
I was so appreciative that P’uy̓ám stayed with me for a while. I may write with bravado when describing things in retrospect, but the very real possibility of being dragged through a reflective surface silently in the night never to be seen again, did freak me out.
It was also nice to finally spend some time together where we weren’t worrying about the imminent demise of either myself or our plane of existence (well no more than we usually have to worry, at least).
We decided not to tell anyone at the office that we're dating, it's easier that way. Well, I mean, Sandy knows since she did witness our first kiss whilst they were burying me alive.
As the time approached for our trip, I just really hoped that after not seeing P’uy̓ám for decades, maybe his family would welcome him back this time, forgive him for the minor transgression of ‘leaving home’ (yes, I’m still salty that they pretty much disowned him for that.) I figured if he didn’t, maybe he could get some closure, he could at least see the places where he grew up – homesickness had very clearly been really eating at him ever since we went into the woods for team building.
When we were planning our trip, he told me he’s never liked planes and was hoping to avoid flying. Considering ‘traveling on business’ in our line of work isn’t exactly defined as moving across physical space, it made some sort of sense.
He said it was something about not having solid ground under his feet, but when we mapped it out, it was over 5,000 miles round trip – so we could either spend 40 hours in a car, or 6 hours on a plane, each way.
He decided to give flying a shot.
People sometimes struggle to pronounce my first and last names off my driver’s license or credit cards, but they’ll at least try. As we were checking in the lady at the desk ended with, “Thank you Mr….” and then after staring at his driver’s license in silence for a few moments just gave up and handed it back to him.
I get it though, I mean, if I hadn’t heard him pronounce his last name, I would’ve never guessed it on my own – I’d just never encountered a ‘7’ in a name before I met him.
The security guy at the airport spent a long time studying P’uy̓ám’s passport. He stared at P’uy̓ám, then the passport with narrowed eyes. Back to him, then the passport, several times before eventually shrugging and handing it back over. I peeked at it before he put it away and noticed it said he was born in 1960 – and he may be 233, but he looks like he’s in his early thirties at most, so that explained the look of disbelief written on the agent’s face.
When I asked him about it, he said it’s a lot of work to fake all the documents needed to make the date match his outward appearance.
“It was a lot easier before there were electronic records.” He smiled.
I warned him that he should probably update that soon – bureaucratic apathy would only get him so far.
As we waited in the security line, his eyes widened when he saw people go through the body scanner, and he asked me what it was. When I told him, he turned pale and said he couldn’t go through it.
That left me with some questions.
“P’uy̓ám, when was the last time you flew?”
He had to think about that for a moment. “1986?”
“Yeahhhh… I’m pretty sure you can ask not to, but they’ll probably pat you down if you skip it.”
He grew even paler at that.
“Do you want the scan, or the hands?”
He ran his fingers through his hair and shook his head, indicating that he wanted neither, which unfortunately for him was not an option.
I squeezed his hand, which helped calm him down – only letting go when it was time to show our IDs, and even then, only after the TSA officer glared at us
It’s a good thing we got there early, because when they asked if he’d emptied his pockets, he said no.
So, I watched him remove:
We both got out of line so he could check his bag and keep his tools – and I didn’t want him to have to go through it again by himself.
I hated seeing that look of misery on his face – I tried to maintain comforting eye contact with him as they patted him down.
They did let him keep the dirt with him, after scanning it since it’s apparently not prohibited, (just weird). He proceeded to stick it in one of his beat-up Converse before putting his shoes back on.
I understood the dirt – since he mentioned something about solid ground, I guessed it was as close as he was going to get on a plane – and even the multitool and knife.
But, when I asked him why he was trying to bring 16g of RAM into rural Canada in his pockets he just smiled, “You never know when you might need it.”
As soon as we boarded, I realized flying had been a terrible idea. He had a hard time fitting his legs in since he’s so tall – his knees were just jammed in there the whole time. Before we took off, some guy elbowed him in the face while trying to load a bag into the bin and P’uy̓ám said ‘I’m sorry’ to him. I glared at the guy until he apologized.
Everything freaked him out and he gripped the arm rests for dear life the entire flight. The sound of the wheels, staring out at the wings and the little flaps every time they moved (“Are those supposed to be doing that?” to which I could only unhelpfully shrug), the turbulence. I was just glad they let him keep the dirt.
He looked so absolutely horrified during the entire flight and I felt so bad for him. Before we even landed, I asked him if he wanted to drive on the way back instead of flying and he instantly said yes, relief written across his face.
We had to rent a car to get to his hometown, and it took us an extra two hours to get there because there were so many places he wanted to stop and show me, like this amazing waterfall off highway 99. I could’ve done without the constant feel of eyes on us despite us being alone, but it was definitely beautiful, at least.
We began to see signs for this little touristy shop. As we kept driving, the billboards seemed to multiply, until they were at almost every mile. At my insistence, we stopped.
I regretted that decision as soon as we walked in – the place was devoid of life, there were no other customers, no employees – and something about how the dim, blueish lights cast shadows across the shelves gave me a searing headache.
Not to mention the items on the shelves themselves – a mildewy hoodie, that had ‘Someone who loves me visited Oklahoma and bought me this sweatshirt!’ written in fading letters.
It seemed more like a second hand shop than a tourist trap.
I’d found a beaded purse, but it had a wallet and driver's license still in it.
As we wandered, a case of jewelry across the store caught my eye and drew me towards it – it was insane how beautiful each piece was – all so captivating, and each one was totally unique. They looked almost like blown glass – swirling golds and blues in one, sharp magentas with specs of green in another.
As I was leaning in closely, studying them – it almost looked as if they were moving a bit in their case – someone whispered directly into my ear from over my shoulder, “Thanks for stopping in”
The guy appeared out of nowhere to lean in over my shoulder, causing me to scream (just a reasonable amount).
Creeper dude walked around to position himself behind the counter, asked if I wanted to see anything, before pausing to study my face for a moment. His eyes drifted down to the pendant that P’uy̓ám made me, the one for ‘I’m totally not a human, please don’t eat me’ purposes.
“Oh, this is beautiful”, he whispered, before deciding to violate my personal space by lifting it up and holding it.
His demeanor instantly changed from a handsy salesperson to something else entirely – his grin widened and he looked a little too excited.
“Have you signed our guest book?” He gripped my left wrist tightly, shoved a pen into my right, and studied me in a way that told me he wouldn’t let go until I signed it.
“Can I switch hands please?”
He had the audacity to look at me as if I had mildly inconvenienced him, but did let me switch after I told him that was the only way he’d get actual, readable, words.
I flipped through the thick, yellowing pages to find a blank one and signed it ‘Mikayla G. and P’uy̓ám K.’
“Last names too.”
I sighed and wrote ‘Mikayla Garabedian and P’uy̓ám K--’ (I just wrote random letters after the K because I didn’t like how pushy he was being. )
“Exquisite, aren’t they?” he asked me with a smile, gesturing down at the jewelry. The small piece streaked with yellow and pinks was definitely shuddering in response to him pointing at it.
I nodded, but more out of politeness at that point, because he still had my wrist in a death grip.
“Mikayla, Wait.” I could hear P’uy̓ám call out in the distance, but I felt frozen there – it sounded like he was miles away
“Would you like to see how they’re made?”
Before I could answer, he leaned in and put a stone that resembled the others in shape and size, the only difference is that it was just plain, totally clear – into my hand, which he closed around it. It was like glass, but weightier, and where it touched my skin it burned slightly.
I could hear P’uy̓ám calling my name as he came sprinting over, right as the guy read my name off the guestbook.
P’uy̓ám gasped, but I didn’t understand why he was so freaked out.
Literally nothing happened.
P’uy̓ám helped me free my wrist from creepy guy’s crazy strong grip and sassily smacked the book out of his hands, before he could read it again.
And still, nothing happened.
The guy looked at us with narrowed eyes – a look P’uy̓ám returned, with even more intensity. The guy hissed at us as P’uy̓ám guided me out of the store.
Once we got to the parking lot, P’uy̓ám pulled me close to him and put his chin on the top of my head while quietly muttered that he wasn’t sure how I was unaffected – calling someone their true name is how all those other pendants got filled.
He hadn’t realized at first, but when he saw another collection of ‘items made from tourists’ (I made him repeat that to ensure I’d heard that correctly but he didn’t expound on what the ‘items’ were and I was a bit afraid to ask) in the back, he knew.
That was when P’uy̓ám ran over to me, but the guy already begun to read my name, so he was worried it was too late.
He was relieved when I saw that I didn’t provide either of our actual full names – I’ve learned that sharing your entire, true name isn’t a great idea, not with non-humans, probably not with the internet in general.
Mikayla is what I go by, but it’s my middle name – I mean, my sister’s name is ‘Hasmig’, so yeah, I have a fairly traditional first name, too. And no, I’m not sharing it here.
Look, I’m not saying that you’re going to come track me down and try to bind my soul to an inanimate object to then sell to tourists. But, after that ordeal, I’d rather not take that risk.
When I turned back around, the entire store was just … gone.
Apparently since I’m subletting a part of my soul (or as I like to say, ‘mildly possessed’), P’uy̓ám says mine was probably even more fascinating to the guy.
Due to our detours, it was getting dark by the time we reached P’uy̓ám’s family home.
Even in the low light, I could see the apprehension clearly written across his face. I wondered if he thought I was kidding about pummeling his family with my thousand page book if they were shitty to him. (Because I wasn’t)
The entire time, I’d thought that the worst thing that could happen would be that they rejected him – as we pulled up to the dark house, I realized just how very wrong I was. _
If you want me to let you know when the next part is posted, just comment that you want me to update you, and I'll tag your user name in a comment, when I post the next part :)
submitted by JamFranz to JamFranz [link] [comments]


2024.05.17 01:25 jaxmagicman Some things the game doesn't tell you that I've learned.

So I've been playing for a little bit and I found some things that I've discovered along the ways that are never in any type of guide. Figured I could share it with you all, most of it is probably common knowledge at this point, but maybe it helps a newbie. These aren't too advanced, I'm not going to talk about diminishing returns on protections or things like that:
  1. Some prefixes on the weapons work without you firing the weapon. For example, Instigating. If you have instigating weapon equipped and you throw a grenade, it benefits from the instigating prefix. Vampire prefix works as well. If you have Ricochete equipped and vampire prefix, the ricochettes heal you. I don't know if others do, those are the 2 I know for sure do.
  2. There is no penalty like dropping junk if you die in an event. If you are in a big event where you continue to mainline stimpacks, it might be better for you to just die. I know you want to help but you're basically killing your future self by going through all your stimpacks while others can pick up the slack. Of course ymmv on that, because stims are easy to come by. To each their own on that. Just know dying during an event isn't the biggest of deals. I am talking about world events.
  3. When they say prepare during events, you can prepare. Like for example, you can equip your lock pick perks and run around and open the jail cells in most wanted, then unequip. You will now have open cells when the event starts. Again, not a big deal, but you can prepare.
  4. Shoot assualtrons and the protectors in the legs. Makes them a cake walk.
  5. I've read here that if you are encumbered you can go into an expedition and then come back out at Whitespring, but I haven't been able to make that work yet. But if you can, saves a long journey with weighted down bags.
  6. Adding - or something to the weapons you use can keep you from trashing it by mistake.
  7. You can create BULK Junk and then scrap it to complete daily challenges like Scrap 15 items to make Ceramic and other types of junk. No need to run around find stuff you already have. Make a bulk pile at the tinkerer bench and then scrap it.
  8. You have a limit on your builds, but some things take up bigger parts of the allotments than others. Like turrets take up a lot of your budget. Crops too. If you want to have a crops, stick with minimum OR created a second C.A.M.P. just for that. Speaking of second C.A.M.P. s.
  9. You get 2 free C.A.M.P spots. You don't have to buy a second, just to have a different type of camp.
  10. And last but not least, if you are looking for your SCORE challenges, open your map and look in the top right. A lot of people I know have had a hard time finding their challenges and just complete then organically.
Thanks for reading. I know most of these are probably known, but when I started I went to a bunch of videos about beginner tips and nobody ever mentioned these things.
submitted by jaxmagicman to fo76 [link] [comments]


2024.05.17 01:22 DavidKroutArt 🎲 Clicks for Clicks 🎩 - David K?

USA By: David K?
Please ask me before doing the trade. EDIT: For some reason my full thread is not loading messages so I have to read them from clicking notifications.
C4C Game List Code
🌾Farm Land 203390830
Please tell me-
  1. Temu Game you used my code on.
  2. Temu Game your code is on.
  3. Your username inside Temu.
Click Map -
Available
Unavailable
Unlimited ♾️
Click Availability -
🐠 Fish Land
🌾 Farm Land
🎩 Hat Trick
🎁 Free Gifts
🌴 Temu Tree ♾️?
🍵 Free Coffee ♾️?
🍀Lucky Flip
Easter Eggs Ineligible C4C Note
🎩 Trick 234806837 5/20
🎩 Trick 229115516 0/5
🎁 Gifts 229514788 blank
🎁 Gifts 233463494 blank
🎁 Gifts blank blank
Game Name Non-C4C Code Information
📦 Daily dailybox777 Daily Gift Box
🐠 Land 204281763 Friends
🌾 Land 203390830 Friends
🌴 Tree temutree0326228 Plant real trees
🍵 Fert cof0996693 Free coffee fertilizer
Game Name Extra Information
🍵 Water cof0567796 Free coffee water
🍀Flip N/A N/A
Notes:
  1. For Hat Trick and Free Gifts you can do both eligible and ineligible clicks to help get either of us easter eggs. But please let me know which ones you gave it to and give me your codes.
  2. For new users, you can only do one click a day per game. One click a week per game of someone you've already given a click to. I will check records to make sure you have given one. Hat Trick is also known as Freebies.
  3. Free Coffee has two codes. One for water and one for fertilizer. I prefer fertilizer.
Reddit Post Explaining Clicks Search for: TemuThings - "Code Exchanging (Clicks)"
submitted by DavidKroutArt to TemuThings [link] [comments]


2024.05.17 01:22 DavidKroutArt 🎲 Clicks for Clicks 🎩 - David K?

USA By: David K?
Please ask me before doing the trade.
C4C Game List Code
🌾Farm Land 203390830
Please tell me-
  1. Temu Game you used my code on.
  2. Temu Game your code is on.
  3. Your username inside Temu.
Click Map -
Available
Unavailable
Unlimited ♾️
Click Availability -
🐠 Fish Land
🌾 Farm Land
🎩 Hat Trick
🎁 Free Gifts
🌴 Temu Tree ♾️?
🍵 Free Coffee ♾️?
🍀Lucky Flip
Easter Eggs Ineligible C4C Note
🎩 Trick 234806837 5/20
🎩 Trick 229115516 0/5
🎁 Gifts 229514788 blank
🎁 Gifts 233463494 blank
🎁 Gifts blank blank
Game Name Non-C4C Code Information
📦 Daily dailybox777 Daily Gift Box
🐠 Land 204281763 Friends
🌾 Land 203390830 Friends
🌴 Tree temutree0326228 Plant real trees
🍵 Fert cof0996693 Free coffee fertilizer
Game Name Extra Information
🍵 Water cof0567796 Free coffee water
🍀Flip N/A N/A
Notes:
  1. For Hat Trick and Free Gifts you can do both eligible and ineligible clicks to help get either of us easter eggs. But please let me know which ones you gave it to and give me your codes.
  2. For new users, you can only do one click a day per game. One click a week per game of someone you've already given a click to. I will check records to make sure you have given one. Hat Trick is also known as Freebies.
  3. Free Coffee has two codes. One for water and one for fertilizer. I prefer fertilizer.
Reddit Post Explaining Clicks Search for: TemuThings - "Code Exchanging (Clicks)"
submitted by DavidKroutArt to TemuCodesUSA [link] [comments]


2024.05.17 01:19 Far-War-3804 A18 DELTA FORCE STRIKE TEAM ARRESTED 86-YEAR-OLD WORLD ECONOMIC FORUM (WEF) FOUNDER KLAUS SCHWAB. April 15, 2024.

A18 DELTA FORCE STRIKE TEAM ARRESTED 86-YEAR-OLD WORLD ECONOMIC FORUM (WEF) FOUNDER KLAUS SCHWAB. April 15, 2024.
https://preview.redd.it/ugx0mkq4gv0d1.jpg?width=500&format=pjpg&auto=webp&s=7e092532cbb94803a8530bff1acd85360ca7609c
A18
DELTA FORCE STRIKE TEAM ARRESTED 86-YEAR-OLD WORLD ECONOMIC FORUM (WEF) FOUNDER KLAUS SCHWAB. April 15, 2024.
A Delta Force strike team arrested 86-year-old World Economic Forum (WEF) founder Klaus Schwab Friday following a deadly firefight that started at the fortified gate at his 7,770-square-foot, six-acre compound in Switzerland and ended in his bed-chamber, where the death-bringing geezer lay in bed hooked up to a self-dispensing Adrenochrome infusion machine, a source in General Eric M. Smith’s office told Real Raw News.
The overdue arrest came after White Hats formally labeled Schwab an international war criminal based on undisclosed evidence showing that he helped orchestrate the Covid plandemic and the Great Reset—the dismantlement of capitalism, the dissolution of private property rights, and the enslavement or eradication of all resistance, globally.
According to our source, White Hats also had a grudge against Schwab. After the WEF spent 32 hours discussing Disease X—a deadly, emerging, manufactured contagion for which COVID-19 was a practice run—at January’s “rebuilding trust” (the irony) conference in Davos, White Hats obtained credible intelligence suggesting that a shipment of a Disease X “component” would arrive at the Port of San Francisco, aboard an Iberian-flagged freighter, on February 6. When the vessel arrived, White Hats were waiting. They raided the ship and found in the hold coolers of a glassy, viscous liquid stored in beakers and flasks. Suspended in the liquid were shimmering silver flecks no larger than a piece of dandruff. The ship’s crew claimed ignorance, saying they were merely transporting “engine lubricant,” per the ship’s manifest. A White Hat Chemical, Biological, Radiological, and Nuclear (CBRN) team seized the shipment, rushing it to Fort Leonard Wood for chemical analysis. The liquid turned out to be soapy water, and the flecks were micro-fine cosmetic glitter used by women to accentuate their eyes. One cooler held a typewritten note: “Fooled you.”
The duping, our source admitted, enraged General Smith, for it consumed time and resources, but was only a tertiary reason for pursuing “one of the most prolific criminals in human history.”
“On April 5 the general and his allies at Army Special Operations Command planned Schwab’s capture. Intelligence, and we hoped it was more solid than the boat intel, said Schwab was pretty much bedridden but protected by a massive security force. There was no sneaking in—the general had blueprints to his home-fortress—and a gunfight seemed certain, and reaching Schwab before his people hustled him into his panic room,” our source said.
He wouldn’t say how or when Delta arrived in Switzerland or whether Swiss authorities participated in the operation, as fusillades of gunfire would certainly alert local authorities and, perhaps, the federal police.
“We knew it would be a run-and-gun op. And the decision was to do it this weekend,” he said. “I’m not going to bullet point our tech, but we can, from a distance, temporarily disable pretty much any alarm system on the planet, and his was no exception.”
The operation commenced in the predawn hours, the window of circadian low, defined as the hours of 2 a.m. to 6 a.m., when physiological sleepiness is greatest and performance capabilities—such as reacting to an armed incursion–are lowest. Delta hoped to find some guards asleep or drowsily unvigilant.
Delta snipers with suppressor-equipped rifles shot three gate and five perimeter guards in the head. Eight shots, eight confirmed kills. Meanwhile, more Delta scaled the stone wall surrounding Schwab’s fortress and engaged a gaggle of armed goons, killing seven and grievously wounding five more. One Delta was shot in the arm and leg but kept fighting. Another got zipped by a ribbon of submachine gun fire and died.
The phalanx of gunfire continued as Delta fought their way to the front door; two soldiers set charges while six others covered them, rippling off lethal controlled bursts that dropped four more approaching guards. The door splintered into countless shards of hardwood and twisted metal—the explosion disemboweled three interior guards who were standing behind it. Delta stepped over their guts and pressed forward, clearing the house room by room and shooting dead all opposition. Four guards came wheeling around a spiral staircase face-first into a Delta barrage of bullets.
Delta’s precisely placed shots eviscerated a pair of sentries guarding the master bedroom and perforated two more standing at the foot of Schwab’s bed.
Schwab had fear in his watery eyes and an IV line running from his wrist to what looked like a morphine pump. When a soldier tore the line from his wrist, Schwab murmured, “No, I need it. Help me.”
“If it were up to me, I’d help put you out of your misery right now,” the Delta operator told him, per a debriefing report.
Delta heaved Schwab from his bed and hurriedly ushered him downstairs and outside. As Delta Force was exfiltrating the property, four guards wielding AR-15-style rifles met them at the gate, lowering their weapons at seeing Schwab in Delta’s clutches.
“Don’t shoot, we might hit the boss,” one had said.
Delta hosed them down. No survivors.
“We have four wounded and one KIA. They retrieved their fallen brother’s body. He died a hero. I won’t say where we have Schwab right now, but I will say where he’s going—GITMO. Unfortunately, ending Schwab doesn’t end WEF. We still have a lot of work to do. And we confirmed he was taking Adrenochrome—that’s what was in the machine next to his bed,” our source said.
He added that President Trump was informed about the operation and that the hospitalization trope is a Deep State cover story.
submitted by Far-War-3804 to CourtofAges [link] [comments]


2024.05.17 01:19 kitkat2742 Dasher doing 4 deliveries at one time?

Since when can a dasher do 4 deliveries at once, because the most I’ve ever had a dasher do was 2? Low and behold, I placed an order for a few groceries around 5:30 tonight at a store 1.6 miles away, and my dasher was taking an abnormally long time shopping. They finally finished around 6:45, only for me to then see on the map that my dasher had 4 deliveries to complete, and of course I was the last one. I thought I was tripping, but nope they sure enough did 4 deliveries, and my food wasn’t delivered until 7:15. When did this begin, and who in the world at DoorDash thought this was a good idea!?
submitted by kitkat2742 to doordash [link] [comments]


2024.05.17 01:17 Affectionate_Care669 how many beads do i need for 300 friendship bracelets taylor swift

This is the list of what bracelets I’m going to make. How many colored beads would I need approximately? I’m going to color code each album to its color.
Taylor Swift 1. Tim McGraw 2. Picture To Burn 3. Teardrops On My Guitar 4. A Place In This World 5. Cold As You 6. The Outside 7. Tied Together With A Smile 8. Stay Beautiful 9. Should’ve Said No 10. Mary’s Song 11. Our Song 12. I’m Only Me When I’m With You 13. Invisible 14. A Perfectly Good Heart
Fearless (Taylor’s Version) 15. Fearless 16. Fifteen 17. Love Story 18. Hey Stephen 19. White Horse 20. You Belong With Me 21. Breathe 22. Tell Me Why 23. You’re Not Sorry 24. The Way I Loved You 25. Forever & Always 26. Come In With The Rain 27. Superstar 28. The Other Side Of The Door 29. Today Was A Fairytale 30. You All Over Me 31. Mr Perfectly Fine 32. We Were Happy 33. That’s When 34. Don’t You 35. Bye Bye Baby 36. If This Was A Movie 37. Change
Speak Now (Taylor’s Version) 38. Mine 39. Sparks Fly 40. Back To December 41. Speak Now 42. Dear John 43. Mean 44. The Story Of Us 45. Never Grow Up 46. Enchanted 47. Better Than Revenge 48. Innocent 49. Haunted 50. Last Kiss 51. Long Live 52. Ours 53. Superman 54. Electric Touch 55. When Emma Falls In Love 56. I Can See You 57. Castles Crumbling 58. Foolish One 59. Timeless
Red (Taylor’s Version) 60. State Of Grace 61. Red 62. Treacherous 63. I Knew You Were Trouble 64. All Too Well 65. 22 66. I Almost Do 67. We Are Never Ever Getting Back Together 68. Stay Stay Stay 69. The Last Time 70. Holy Beautiful 71. Sad Beautiful Tragic 72. The Lucky One 73. Everything Has Changed 74. Starlight 75. Begin Again 76. The Moment I Knew 77. Come Back…Be Here 78. Girl At Home 79. Ronan 80. Better Man 81. Nothing New 82. Babe 83. Message In A Bottle 84. I Bet You Think About Me 85. Forever Winter 86. Run 87. The Very First Night 88. All Too Well (10 Minute Version) 89. Eyes Open 90. Safe & Sound
1989 (Taylor’s Version) 91. Welcome To New York 92. Blank Space 93. Style 94. Out Of The Woods 95. All You Had To Do Was Stay 96. Shake It Off 97. I Wish You Would 98. Bad Blood 99. Wildest Dreams 100. How You Get The Girl 101. This Love 102. I Know Places 103. Clean 104. Wonderland 105. You Are In Love 106. New Romantics 107. Slut 108. Say Don’t Go 109. Now That We Don’t Talk 110. Suburban Legends 111. Is It Over Now
Reputation 112. Ready For It 113. Endgame 114. I Did Something Bad 115. Don’t Blame Me 116. Delicate 117. Look What You Made Me Do 118. So It Goes 119. Gorgeous 120. Getaway Car 121. King Of My Heart 122. Dancing With Our Hands Tied 123. Dress 124. This Is Why We Can’t Have Nice Things 125. Call It What You Want 126. New Year’s Day
Lover 127. I Forgot That You Existed 128. Cruel Summer 129. Lover 130. The Man 131. The Archer 132. I Think He Knows 133. Miss Americana & The Heartbreak Prince 134. Paper Rings 135. Cornelia Street 136. Death By A Thousand Cuts 137. London Boy 138. Soon You’ll Get Better 139. False God 140. You Need To Calm Down 141. Afterglow 142. Me 143. It’s Nice To Have A Friend 144. Daylight 145. All Of The Girls You Loved Before
Folklore 146. The 1 147. Cardigan 148. The Last Great American Dynasty 149. Exile 150. My Tears Ricochet 151. Mirrorball 152. Seven 153. August 154. This Is Me Trying 155. Illicit Affairs 156. Invisible String 157. Mad Woman 158. Epiphany 159. Betty 160. Peace 161. Hoax 162. The Lakes
Evermore 163. Willow 164. Champagne Problems 165. Gold Rush 166. Tis The Damn Season 167. Tolerate It 168. No Body No Crime 169. Happiness 170. Dorothea 171. Coney Island 172. Ivy 173. Cowboy Like Me 174. Long Story Short 175. Marjorie 176. Closure 177. Evermore 178. Right Where You Left Me 179. It’s Time To Go
Midnights 180. Lavender Haze 181. Maroon 182. Anti Hero 183. Snow On The Beach 184. You’re On Your Own Kid 185. Midnight Rain 186. Question 187. Vigilante Shit 188. Bejeweled 189. Labyrinth 190. Karma 191. Sweet Nothing 192. Mastermind 193. The Great War 194. Bigger Than The Whole Sky 195. Paris 196. High Infidelity 197. Glitch 198. Would’ve Could’ve Should’ve 199. Dear Reader 200. Hits Different
The Tortured Poets Department 201. Fortnight 202. The Tortured Poets Department 203. My Boy Only Breaks His Favorite Toys 204. Down Bad 205. So Long London 206. But Daddy I Love Him 207. Fresh Out The Slammer 208. Florida 209. Guilty As Sin 210. Who’s Afraid Of Little Old Me 211. I Can Fix Him No Really I Can 212. LOML 213. I Can Do It With A Broken Heart 214. The Smallest Man Who Ever Lived 215. The Alchemy 216. Clara Bow 217. The Black Dog 218. I’mGonnaGetYouBack 219. The Albatross 220. Chloe or Sam or Sophia or Marcus 221. How Did It End 222. So High School 223. I Hate It Here 224. Thank You Aimee 225. I Look In People’s Windows 226. The Prophecy 227. Cassandra 228. Peter 229. The Bolter 230. Robin 231. The Manuscript
Other 232. Taylor Swift 233. Debut 234. Fearless TV 235. Speak Now TV 236. Red TV 237. 1989 TV 238. Reputation 239. Folklore 240. Evermore 241. Midnights 242. TTPD 243. Eras Tour 244. 123 LGB 245. Fuck The Patriarchy 246. Ur Gay 247. Taylor’s Version 248. 13 249. Junior Jewels 250. You’ll Be The Prince 251. I’ll Be The Princess 252. Wonderstruck 253. Loving Him Was Red 254. Losing Him Was Blue 255. Missing Him Was Dark Grey 256. Sad Girl Autumn 257. Who’s Taylor Swift Anyway 258. ATWTMVFTVSGAVRALPS (All Too Well Ten Minute Version From The Vault Sad Girl Autumn Version Recorded At Long Pond Studios) 259. Ratatata 260. I ❤️ TS 261. Me Hee Hee 262. Karma Is The Guy On The Chiefs 263. Screaming Crying Throwing Up 264. Jan Ravnik 265. I’m Having A Menty B Hee Hee 266. Benjamin Button 267. Meredith Grey 268. Olivia Benson 269. Errors Tour 270. Died Dead 271. TSwizzle 272. YFYFBYNLIT (you forgive you grifter but you never let it go) 273. Take us to church 274. Swiftie 275. I’ll Be 87 You’ll Be 89 276. LVIII Super Bowl Champions 277. Tayvis 278. Folkmore 279. Everlore 280. It’s Been a Long Time Coming 281. What If I Told You I’m Back 282. It’s Fearless 283. Big Reputation 284. And They Said Speak Now 285. Into Folklore 286. My Name Is Taylor And I Was Born In 1989 287. Meet Me At Midnight 288. This Isn’t The One I Wanted 289. Ever Needy Ever Lovely Jewel 290. Alls Well It Ends Well 291. I Hate All Kanyes 292. El Travador 293. My Brain Is Alive 294. Who’s Taylor Swift Anyway 295. Not A Lot Going On At The Moment 296. A Lot Going On At The Moment 297. Blue Jays 298. Toronto N6 299. I’m The Problem 300. Welcome To The Eras Tour
submitted by Affectionate_Care669 to TrueSwifties [link] [comments]


2024.05.17 01:15 RomanG6Reddit 1931-1933 map of the world

1931-1933 map of the world submitted by RomanG6Reddit to Maps [link] [comments]


2024.05.17 01:07 champagnepapi111 CHANCE A LOW GPA BIOLOGY MAJOR TO COLUMBIA

Demographics: Male, Asian, Public School
Intended Major(s): Biology
ACT/SAT/SAT II: 1570
UW/W GPA and Rank: 3.6, no rank
Coursework: 8 APS/3 DE/2 Honors (All 5s)
Awards:
Extracurriculars:
Biotechnology and Research Sequencing at the University of Michigan (501c3 research organization) - Explored Nucleotide Hybridization, and led group research linking it to a real-world disease. Analyzed related Thermodynamics, PCR, Advanced Linux, and mapping genomes. Presented a business plan on Biotechnology and Next Generation Sequencing Technology (showing how genetic variation could lead to disease).
11th and 12th grade, 12hrs/wk, 4wk/yr
Medical Student Shadowing and Cardiac Medicine Exploration at the University of Brown Alpert Medical School - Completed a Medical Interview, a Cardiopulmonary Physical Exam with a patient, reviewed different medical careers, learned about the pathophysiology of the heart, and completed an ethics course on heart transplants.
11th and 12th grade, 10hrs/wk, 4wk/yr
Shadowed Primary Care Physician - Pediatrician has experience for 20+ years and ranked the #1 Care Physician out of 45 in my city. Worked in the Biomedical Lab analyzing samples and results for patients (in real-time). I shadowed the actual checkups as well
11th and 12th grade, 10hrs/wk, 3wk/yr
HOSA (Health Occupations Students of America) Competitor (all 50 states + 11 countries competed) (2yrs) - State Champion (1st out of 40 teams) in my 1st year, Only three teams are sent to ILC from Michigan, Qualified for ILC (International Leadership Conference), and placed Top 3 at ILC. Posted on 10+ nationwide news sites, as well as covered by the media. 260,000 members nationwide.
11th and 12th grade, 10hrs/wk, 30wk/yr
Co-Founder of Biomed Club (Only Student-Made Medical Club @ School) (4yrs) - Led in-school Biomedical-Based Medical Club focused on healthcare careers, connecting with licensed doctors and current medical students to inspire youth and teach them about the experience through the medical process. Expanded membership from 4 to 150 in 4 years by organizing talks for younger classmen about life as a doctor.
9th, 10th, 11th, 12th grade, 8hrs/wk, 35wk/yr
Joined SAT/Tutoring Help - Helps students increase their chances for college applications, as well as earn significant amounts of scholarship money. Was able to empower high school students through hackathons, college seminars, and a Cranbrook HUB Program which helped struggling students increase their SAT scores.
10th, 11th, 12th grade, 6hrs/wk, 10wk/yr
Swim Instructor (paid) - Worked for ~1 year, over 400 hours of work, about 8-10 hours weekly on school weeks, and closer to 15 hours during summer, CPR and Lifeguard Certified. Had several classes, weekly, with kids with disabilities, such as Down Syndrome, Autism, and ADHD.
11th, 12th grade, 8-10hrs/wk, 40wk/yr
Swim Instructor Summer Volunteer connected w/Hospital's Children’s Care Center (most vulnerable kids) - Instructed and taught children who have been impaired with neurological, social, and developmental challenges, as well as kids that have dealt with major trauma at a very young age to swim. Participated in a 3-week long program teaching them the basics of swimming.
11th, 12th grade, 8-10hrs/wk, 4wk/yr
Michigan Ref Certified - Participated in overall 50+ hours of ref-related activities, played soccer for 13 years and competed in competitive/travel soccer for 10 years.
9th, 10th, 11th, 12th grade, 2hrs/wk, 13wk/yr (for reffing)
9th, 10th grade, 8hrs/wk, 50wk/yr (for soccer)
VolunteeTutor Work - Volunteer Monthly at an Indian Cultural Program (10hrs/month), Math Tutor for struggling students (3hrs/week), Volunteer Monthly for Key Club (3hrs/month)
Essays/LORs/Other:
APES (7/10)
STEM Teacher (9/10)
Schools (in state for MSU/UMich):
MSU
UMich (EA)
Rice
JHU
BU
Brown
Cornell
Columbia (ED + Legacy)
submitted by champagnepapi111 to chanceme [link] [comments]


2024.05.17 00:59 ApoKun Is Elden ring your favourite or the best soulsborne game?

You don't have to read the entire post as I realize it's quite long. You can just answer the question in the title if you want.
I'm asking this because I've seen a lot of people say that ER is the greatest soul game ever made. I'm curious on your guys' opinion. I asked here cause I think I'll get the least biased answers. Also, this includes Sekiro too.
For me ER would be number 4 on my favourite soulsborne games list. 1st is sekiro for the gameplay and an actual narrative for once, 2nd is Bloodborne for the setting, the design and number 3rd is dark souls 3 cause of its tight experience and having my second favourite boss (Nameless king) with 5th being DS2 SotFS and last being DS1 solely cause I lose interest in the second half. If I was just going by the first half it would be number 5.
While I love ER I do have some issues with it (this is all my opinion)
I don't really like the open world. It was great the first time but the second time the open world felt a bit tedious. It was like if you took the world of dark souls and stretched it out so it would take you longer to reach Point A to Point B. This is for subsequent playthroughs btw since souls games are kinda meant to be played again (you'll come back anyways, you always do) Everything past the first playthrough felt like an empty map. And if you like to do fresh playthroughs instead of NG+ you would have to pull out the wiki to see which cave has which upgrade material. It loses it's magic.
I loved the linear experience of Dark souls and Bloodborne where every area felt connected with its shortcuts. It felt like a rougelike in a sense. You knew everything about the map but you could play differently this time in a reasonable amount of time.
The mountaintop was just a straight run to the fire giant.
The legacy dungeons fixed this issue but doesn't help when 70% of the map is open world.
Also, the enemy recycling. Seriously, how many dragons do we need. And those watchdogs, magma wyrms, the erdtree avatar, Beastmen, fucking ulcerated tree spirits I understand open world games need to recycle enemy and to have an enemy drop an important upgrade material (why the rotten lizard?!) but it feels like 50% of the enemies we have are the one's mentioned above.
The Boss scaling was another issue for me. I would say I'm pretty good at souls games but still struggle. I beat Isshin, Nameless King, Midir and Gael in my 3rd, 4th, 2nd and 4th try respectively while Friede, Father, Ludwig, Maria and Orphan took me close to 10, 8, close to 15, close to 5 and around 35 tries respectively. Did Gehrman and Moon presence first try. I have also completed Shura and Divine heir gauntlets.
The point is the bosses in ER have such a weird balance. Where you can solo bosses easily in the other games if you practice or fall into a rhythm, in ER bosses are designed around summons and sometimes summons break the game. I haven't been able to solo Malenia, Radahn (who is basically a raid boss) or Maliketh yet (after close to 50+ to 100 tries each). They feel designed to be beaten with summons while bosses like Margot, Placidusax, Fortisax, Godfrey and Horah Loux (who is Actually my favourite boss) felt so much more fun to play against and felt way more fair. Every death was my mistake and it didn't feel like I jumped from ER into Sekiro all of a sudden.
I know I probably suck with those three bosses and everyone has different experience (I died to the crystal sage nearly 10 times) but you can't deny that they play differently than other bosses.
I love ER and while I appreciate the open world and this experiment I really hope they don't make another open world right after this and instead go back to their tried and true linear formula. I know the DLC will be amazing as FS has a track record of delivering absolutely amazing DLCs.
Also, all of these issues I had were my own personal opinion. Feel free to share your own.
submitted by ApoKun to fromsoftware [link] [comments]


2024.05.17 00:54 ar_david_hh $2 billion refugee housing \\ Tavush border 1976 map; Armenian village regains "buffer" lands unreachable since 1990s \\ EU candidacy?; European Commission visit \\ Grigoryan scolds Moscow \\ Middle Corridor \\ Lake Sevan rising; Rains & tunnel flow \\ Green transition \\ Lukash spills beans \\ More

16-minute read.

the AM-AZ border delimitation in Tavush is drawn with 1976 maps; village Kirants gains access to lands unreachable since the 1990s; loses 4 properties

On May 15 the border commissions of Armenia and Azerbaijan held a meeting to discuss the continuation of the Tavush-Gazakh delimitation. They confirmed the completed work and agreed to continue.
The statement says that parties are using the 1976 maps by Soviet CoGS [the one that Armenia wanted].
A Protocol was signed on the meeting results. The sides agreed to set the date and the place of the next meeting of the Commissions.
REPORTER: What does this mean?
PASHINYAN OFFICE: The commissions had installed several border posts to locate the coordinates on the ground. These coordinates were taken from the 1976 maps. Now the cartographers have agreed on the border lines between the posts, again based on the same maps. In other words, the reproduction of the border in these areas is complete and signed, and the border is considered delimited in these sections.
REPORTER: Why the 1976 maps?
PASHINYAN OFFICE: It's the map with de jure power at the time of the collapse of the USSR. The Armenian government announced that we were not drawing a new border, but rather reproducing the existing border at the time of the collapse of the USSR.
REPORTER: The commissions' statement says that these 1976 maps went through legal procedures in 1979. What does it mean, and why didn't we use the 1990 maps?
PASHINYAN OFFICE: In 1979 the relevant USSR authority verified the 1976 maps and their legal basis. These maps were used until the collapse of USSR. These are the most recent maps verified by authorized state agencies of USSR.
REPORTER: Not all border posts have been installed in the convoluted section of Kirants. How will this be resolved? Will you build new roads or houses?
PASHINYAN OFFICE: The 3 remaining coordinates of Kirants were pinpointed with the use of a computer and the border posts will be installed later. The rest [another 8 posts in Kirants] are already there. The good news for Kirants is that around 25 hectares of land that have been unreachable for 33 years will be returned to the village. The border resembles the 1976 line. As we said earlier, yes, there is a need to build a bypass road, which can be accomplished in 2-3 months. We will also rebuild the road between H-26 and Acharkut and Kirants, which is an alternative road for Kirants. As for property issues, the volumes are small and the government will compensate in such situations.
REPORTER: What about Baghanis, Berkaber, and Voskepar?
PASHINYAN OFFICE: The most sensitive topic in Voskepar was the fate of the church, and on the Voskepar-Baghanis section, it was the Soviet-era road. Both issues received the best resolution: the road is fully within Armenia and so is the church, and the border line is quite far from the road and the church. As for Berkaber, there were no such sensitive topics.
REPORTER: When will the sides deploy border guards?
PASHINYAN OFFICE: Within 8-9 days, and a bit later in the 3 sensitive areas of Kirants after further clarifications. //
On Thursday, PM Nikol Pashinyan spoke about the May 15 border commission.
PASHINYAN: This is a major success for two reasons: (1) A very important cornerstone was placed for the future development of Armenia as an independent and sovereign state, (2) for the first time since independence, we have an officially delimited border, which will significantly increase the level of stability and security in that section and along the entire border. I'd like to thank the border commission leader Deputy PM Mher Grigoryan and all members, and every member of the National Security Council.
I'll provide further details. As you recall from the May 15 statement, it says the borders are delimited based on the 1976 maps that underwent the legal procedures in 1979. As you know, our principle was to reproduce the existing border with de jure power instead of drawing a new one. To accomplish this, we made a reference to the 1991 Almaty Declaration in the April 19 agreement, and it became the basis for the entire delimitation process. On May 15 we specified the 1976 maps; these are the most up-to-date USSR maps with de jure power.
In USSR, a map could be granted a de jure power by a special state agency that collected maps and legal processes and verified their accuracy and legitimacy before confirming the administrative border of Soviet republics. In the area where these delimitations are taking place, in 1979 this USSR state agency verified the 1976 map and it's the most recent map with de jure power.
This was a very important principle for us. We must accept wherever this border passes through. If we chose to draw new borders, that would create a ground for future military conflicts and escalations. The ongoing process, which should not be underestimated or overestimated, abides by the principle of adhering to the legal border and significantly reduces or eliminates possible escalations. This agreement was a major success.
Berkaber: there were no issues here.
Baghanis & Voskepar: at first we thought that some issues could arise here, around the church and, as the locals say, the "old road". If you've ever been there you have seen this road sign, when you pass Baghanis, the sign warns you that the road is being observed [under Azeri scope] and it was not advised to use this road during tense periods. Now, as a result of border delimitation, this road is not only confirmed within Armenia, but it will be safer for travel as a result of the new circumstances [border guards replacing the militarized armed forces, less dispute = less conflicts]. As for the church, we don't have a problem here because the border passes significantly further away from it.
So to recap, we recorded no problems in Berkaber, Baghanis, and Voskepar because we chose to follow the de jure border line and we did so. Following this principle is also why we will have certain problems in Kirants because we don't want to draw an entirely new border. We must use this principle for the entire AM-AZ border, with no exceptions. Not only we are creating a precedence for delimitation, but also a formula to be used for the future entire delimitation process and to make it predictable. If parties decide to make mutual concessions in certain areas, we could discuss the launch of legislative processes to authorize them, but for now, we have agreed on a principle to be used for the entire AM-AZ border. On each section of the border, we will use the most recent USSR maps that hold de jure power.
MHER GRIGORYAN: On May 15 the border commissions also discussed the Regulation and it appears we have an agreement to reflect these principles in the Regulation. Efforts are underway to prepare the Regulation. Azerbaijan wants to continue the border delimitation with the same framework and algorithm used thus far.
PASHINYAN: We should implement the reached agreements in full within 8-10 days. The border guards were deployed in Baghanis-Voskepar around 10 days ago. They were deployed alongside the installation of the white border markers. They are currently studying the terrain to launch the permanent service there. The same will be done in other sections.
source, source, source, source, video,

the list of properties that fall under the Azeri side of the border in Kirants after the delimitation of the 3 problematic sections

1 house, 1 lodging, 1 trailer-shop that doesn't operate, and 1 garage. The government plans to compensate for them and will build a new section of this road that passes fully through Armenia.
source, source, see the map here,

opposition MP from ARF/Kocharyan faction got fed up with protesters' road blocks in Tavush villages

Gegham Nazaryan, a father of a fallen soldier and an opposition MP who - unlike his colleagues - doesn't always engage in toxic exchanges with the ruling party, decided to visit the border village Kirants, where he asked the road blockers to open it.
He engaged in an argument with a protester from another region who came to Kirants to block the road. The MP complained that blocking the road is what Azeris would want.
The MP also engaged with an activist-reporter from an opposition outlet who was covering the road blockings. The MP accused the reporter of "having bad intentions" and of "manipulations". The activist-reporter accused the MP of having secret ties with Pashinyan during an intense yelling match. "Great speech. You call yourself a journalist?", rhetorically asked the opposition MP.
ARF leaders responded saying their MP was not speaking/acting on behalf of the party.
STYOPA SAFARYAN (pro-West figure): MP Gegham Nazaryan also senses that some forces are attempting to carry out Artsakh 2.0 in Armenia by attempting to derail the border delimitation process. //
In related news. The protesters pressured the mayor of Kirants who gave an interview last week and admitted that the delimitation went much better than he expected. On Thursday he offered to resign from his position during a confrontation with an opposition media outlet reporter who was unhappy about the mayor's positive portrayal of the delimitation process.
longer video, video, video, video, source, source,

Armenian government approves a $2 billion permanent housing assistance program for Nagorno-Karabakh refugees; rollout in stages

SOCIAL MINISTRY: We need to provide long-term housing to allow the forcefully displaced persons to socially and economically integrate into Armenia. The program has three components: (1) Obtaining a house or an apartment with a subsidy, (2) building a house with a subsidy, (3) subsidizing the mortgage if the refugee has already purchased a house.

... The size of the subsidy varies depending on the geographical location and the size of the family

(1) ֏5 million ($12,900) per family member to obtain housing in one of the 242 towns or villages.
(2) ֏4 million ($10,300) per family member to obtain housing in one of 148 towns or villages.
(3) ֏3 million ($7,700) per family member for all other settlements except Yerevan's 1st and 2nd Zones.
(4) and ֏2 million ($5,200) if you already have a mortgage.

... Conditions to qualify

(a) Families forcefully displaced after 27 September 2020.
(b) Refugees who accept Armenian citizenship.
(c) The living space cannot be smaller than 12 m2 per family member.
(d) The property's value cannot exceed ֏55 million ($141,000).

... If you buy a house cheaper than the subsidy amount, you can use the remaining balance to...

(1) buy agricultural land worth up to ֏5 million
(2) renovate the newly purchased house if necessary, worth up to ֏4 million
(3) buy furniture and appliances, up to ֏2 million

... Which forcefully displaced families do NOT qualify?

(a) If they are already a recipient of another housing program that began immediately after the 2020 war.
(b) If one of the family members owned a house or apartment in Armenia as of 2023-09-19 or at the time of application.

... Conditions if you want to receive aid to build your own house

(a) Select one of the preapproved projects/plans.
(b) The construction company must be licensed in Armenia.

... The assistance will stop if

(a) If two family members under the age of 55 are absent from Armenia for >180 days per year unless they leave Armenia to receive education in one of the top 400 international universities, aviation training, or military training.

... The housing assistance will roll out in phases

The first phase will include families with 3 or more children if they want an apartment or 2+ children if they want a house, low-income families, those who already have a mortgage, families who lost a member in war, and creditworthy families who can take out a separate loan amounting 50% of the assistance size.
The second phase, starting 2026-01-01, will include families with 2 children if they want an apartment or families with 1 child if they want a house.
The third phase, starting 2027-01-01, will include everyone else.

... PM Pashinyan about the refugee housing program

PASHINYAN: The working group has done a lot of work to get here, thank you. Spread the word so people will know the details of this assistance program. No one should be forced to visit or call an office to receive basic details.
We have decided not to adopt a "flat" approach; the amount of aid increases based on the family size and the location of the house. We had to exclude the [expensive and crowded] central parts of Yerevan. We also have to ensure a proportional load on the educational facilities.
If the refugee has an active mortgage loan taken in Armenia, let's say taken in 2016, each family member will receive ֏2 million towards that mortgage. So if you have a family of 6 [Nagorno-Karabakh families are often larger than Armenia-based families], you receive $31,000 to pay off your mortgage.
On the other hand, our brothers and sisters from Nagorno-Karabakh who are well-off and already own a house without an outstanding mortgage balance, won't receive assistance because the goal of this program is to help those who don't have a house.

... How much will this cost?

FINANCE MINISTER: There will be up to 25,000 recipient families, and if we use the averages, it amounts to [voice is starting to crackle] ֏500 billion ($1.3 billion) for the housing costs alone. There will be additional expenses associated with this program. Every year, for the next 10-12 years, we will confirm the annual expenditures. So the overall costs will amount to ֏700-800 billion.
PASHINYAN: So that's roughly a $2 billion investment program in Armenia. Also, by becoming citizens of Armenia to take advantage of this housing program, the refugees won't lose any refugee rights or privileges, and they will not lose the ongoing monthly cash [40+10] assistance programs.
FINANCE MINISTER: We have launched a new line in the migration services to handle the expected uptick in applications in the coming months so people won't face long lines. The passport departments in provinces will begin to handle citizenship applications just for refugees; today this is only possible in Yerevan.
video,

EU's EBRD and US's USAID to develop connectivity in the South Caucasus

During the EBRD forum held in Yerevan, the two signed a Memorandum of Understanding to develop the Trans-Caspian International Transport Route, also known as the Middle Corridor, to further enhance connectivity between Asia and Europe via the South Caucasus.
It's about expanding trade, green energy, investment, as well as transport and digital infrastructure in Armenia, Azerbaijan, and Georgia.
The MoU seeks to enhance the planning, design and construction of critical energy, transport, digital and agricultural infrastructure in the region. It also aims to: improve the efficiency of customs, tariff and border operations; attract private capital investment into the South Caucasus economies for the development of the Middle Corridor; and adopt the highest international standards to promote economic connectivity with Europe and among South Caucasus countries.
source,

other EBRD projects were announced

source,

Lake Sevan is back to 2021 levels after the heavy precipitation in May: VIDEO

OFFICIAL: As of May, the level was 1900.46, which is 2 cm higher than the 2021 mark and 29 cm higher than January 1.
2021 was a harmful year for Sevan because of unprecedented heat waves. In June 2021 there was an evaporation of 153M m3 water, which was a historical high, while the precipitation on the surface was only 4.8M m3, which was 4x lower than the previous historical low [WTF?]. Also, the river flow was at 40%. As a result of all this, instead of the usual 7 cm increase for June, we observed a 10 cm decline.
This year the conditions have been much better. We are finally back to the May 2021 levels. The rains filled it up from above, and the Arpa-Sevan tunnel from below the rocks. This tunnel has already brought 89M m3 this year, which is 2x more than last year.
Another contributing factor is the reduced reliance on Sevan for irrigation because the agricultural fields are still wet. Last year we had to tap into Sevan starting May 14. This year the government hasn't even summoned a meeting to authorize a release of water.
The 5 largest reservoirs currently hold 605M m3, up by 240M. Only the Aparan reservoir is lacking. In Ketchut reservoir the water is above the famous "flowers" (margaritka). This is the first time in 5 years that the water is above the margaritkas. When the water rises above margaritkas, it drops down and flows into Lake Sevan. Overall, 90% of the water entering Sevan is wasted by evaporation.
REPORTER: Rains will return starting May 22.
video,

EBRD will provide $10 million to finance the Armenian private sector’s investments in growth, competitiveness, and greener and more sustainable practices

upgrading their production facilities and processes to EU standards. At least 70 per cent of the loans will go to support the green transition. Borrowers will receive incentive grants and technical advice funded by the European Union
source,

anti-corruption: former MP from Gagik Tsarukyan's BHK party is arrested under the suspicion of defrauding several homebuyers through real estate machinations

AUTHORITIES: Ex-MP Aragats Akhoyan's construction companies collected ֏274 million from several prospective apartment buyers in 2010-2014. He pocketed the funds.
source, source, video,

Armenia signs Council of Europe's Bioethics Convention

The Oviedo Convention is the only international legal instrument that defines the principles for the protection of human rights in the field of medicine and biological medicine.
FM Mirzoyan met Marija Burić on Thursday in Strasbourg to sign it.
source,

Armenia will open an embassy in Cyprus

Currently, Armenia’s Ambassador to Greece also serves as Ambassador to Cyprus. The seat of the Cypriot Embassy in Armenia is in Moscow.
In March Cyprus said it would open an embassy in Yerevan.
source,

Belarus leader Lukashenko suggests he and Ilham Aliyev discussed the 2020 war before it began

Lukashenko is in Baku to strengthen the strategic AZ-BY relations.
LUKASHENKO: We are brothers and we have a common vision of the world and where it's headed. I remember our conversation before the 2020 war, your liberation war, when we had a philosophical debate at a dinner table. At the time we came to the conclusion that it's possible to win the war. That's important. It's very important to preserve that victory. I also agreed with you at the time that the most difficult period would come after the liberation of the lands. Today is that difficult period when we have to revive those lands and return people, while others will born there. It'll be difficult to revive these lands in 5-10 years; it requires extensive work. Belarus is ready to help Azerbaijan. //
Nikol should have greeted Putin at the airport to avoid the war.
source,

Luxembourg lawmakers urge government to act for implementation of World Court orders by Azerbaijan

Deputies have unanimously adopted a motion asking the government to act for the implementation of the ICC orders by Azerbaijan.
The MPs urge to demand from Azerbaijan an immediate release of all Armenian prisoners of war, support peace between Armenia and Azerbaijan, expand the partnership between Armenia and EU, support the normalization of relations between Armenia and Turkey, deepen the diplomatic relations between Armenia and Luxembourg.
source,

ranking member of Armenia's ruling party about EU membership

The MP Khandanyan says Pashinyan has already announced that Armenia wants to deepen ties with the EU as much as possible and that how soon Armenia submits a bid to become an EU candidate will depend on the signals coming from the EU. In general, today the EU is not ready to expand because some EU members oppose it, said Khandanyan. When the EU sends a signal that it's ready, Armenia will "accelerate" the steps, said Khandanyan, adding that Armenia itself has already sent that "signal" that it wants closer integration with the EU.
But first, Khandanyan says Armenia must improve its resilience because the transitional phase will be full of risks. Armenia expects the EU's assistance to improve the resilience [reduce reliance on Russia].
source,

Բրյուսելի հանդիպման արդյունքներով ԵՄ-ն կշարունակի նպաստել ՀՀ տնտեսական զարգացմանը

PM Pashinyan hosted EU's Trade Commissioner Valdis Dombrovskis to discuss the implementation of the economic agreements reached on April 5 in Brussels to improve Armenia's resilience.
Pashinyan also called for the EU's assistance in implementing the refugee housing program adopted by the Government this morning.
The EU Trade Commissioner said the EU will continue to assist Armenia's development, including in the areas of energy, infrastructure, diversification of markets, implementation of higher standards, improvement of business environment, etc.
source, other meeting, other meeting,

U.S. Ambassador Kvien is "optimistic about the opportunities offered by Armenia to U.S. and other foreign companies"

A meeting was held at the central bank building participated by Ambassador Kvien and other guests of the EBRD forum that's being held in Yerevan this year.
Ambassador Kvien also highlighted Armenia's high economic growth rate in recent years.
source,

Armenia's membership to EAEU is beneficial for Armenia: Moscow

DEPUTY FM of RUSSIA: I don't know what the Armenian leadership plans to do in the future, but EAEU is undoubtedly a mutually beneficial process. This is reflected in the economic growth figures of Armenia.
source,

Armenian government invites the head of Metsamor nuclear plant to join talks with European Commission officials

The infrastructure ministry and NPP chief met a delegation led by the European Commission's Deputy Director-General for International Cooperation and Development Marjeta Jager.
The European Commission official thanked for the invitation and welcomed the steps by the Armenian government towards the energy reforms in Armenia. They spoke about NPP's operation and future plans.
They discussed the exchange of experience and financial programs.
source,

Armenia and European Commission officials discussed the implementation of April 5 agreements reached in Brussels

The head of the European Commission's Neighbourhood and Enlargement Negotiations Adrienn Kiraly was hosted by foreign ministry on Thursday.
They discussed programs to improve Armenia's resilience under the April 5 agreement, the full implementation of CEPA and its expansion.
source,

Moscow released a somewhat misleading statement after the recent meeting between Pashinyan and Putin, according to National Security Council chief Armen Grigoryan

According to Grigoryan, Pashinyan did not "ask" Putin to maintain troops on the borders with Turkey and Iran. According to Grigoryan, Pashinyan asked Putin to remove the Russian guards from Yerevan's airport and AM-AZ border, and when Putin asked Pashinyan if he also wanted to remove them from TR and IR border, Pashinyan said "no", because those guards were installed under a different agreement. Context in Wednesday news digest.
Grigoryan also criticized Russia's attempts to stoke divisions between Armenia and Iran by presenting the EU observer mission as anti-Iranian. Grigoryan demanded Russia present evidence of the EU mission carrying out activities outside of their AM-AZ border monitoring mission. "Iran has already expressed its stance. I don't understand why Russia is attempting to use the EU's Monitoring Mission to cause issues," said Grigoryan.
source,

Armenia's NatSec chief Armen Grigoryan advised Russia to improve its own human rights conditions and freedom of speech before commenting on Armenia's internal affairs

Russia's foreign ministry spokeswoman Maria Zakharova recently complained about Armenian police using force to clear the roads blocked by pro-Russian party activists. Zakharova also complained that the West wasn't criticizing the Armenian government for it.
NatSec GRIGORYAN: Armenian protesters have been able to fully exercise their freedom of speech during legally organized rallies. Illegal actions are obviously countered by police. Perhaps Russia should first look at itself before criticizing us.
REPORTER: Look at what? Russia doesn't have opposition, how can they oppress something that doesn't exist?
ARMEN GRIGORYAN: Russia should discuss its own kitchen. The developments in Armenia are not related to Russia.... or are they? If these protests are tied to Russia, Moscow should directly say so. If Moscow sees a problem, they must say it directly, and not do so by dragging others like they did in the case of Iran and the EU Mission.
source,

during a meeting in Yerevan, Jordan's foreign ministry expressed concern over the attempted takeover of part of the Armenian district of Jerusalem

The Deputy FM of Jordan met his Armenian counterpart in Yerevan to discuss bilateral relations and regional issues. The parties criticized the attempts to change the status quo in Jerusalem.
source,

Pashinyan and Diaspora Office held a meeting about the iGorts professional repatriation program: VIDEO

source,

monkeys could soon become smarter than you

Are monkeys entering the stone age? Capuchin primates were filmed using tools to dig for food underground, days after an orangutan treated its own wound with plant.
The footage joins a growing number of studies looking into the tiny South American primate's use of stone and stick tools, an emerging field that some research universities now describe as 'documenting the Monkey Stone Age in real-time.'
video,
submitted by ar_david_hh to armenia [link] [comments]


2024.05.17 00:54 ReggaetonPartyMane1 Best Reggaeton-Latin Rap Albums of the 2010's (Top 10) [The Finale]


  1. Cosculluela “El Principe Ghost Edition” (2010) – Some may get mad at seeing this “El Principe” #1 when “Odisea” is at #8 especially because Coscu’s 200 thousand units sold is 10x less the amount of Ozuna’s “Odisea”. But unless you were there, you cannot fathom the fact that “El Principe” was the equivalent to “El Abayarde” during the “Back To The Underground Era” (2009-2014). Major labels dissed Rap & Reggaeton and most of it went back to the underground. And even if it did receive a release from a major like “El Principe”, unless you were Yankee or Don or signed a 360, you were not getting any promotional dollars invested in you. This album remained “underground” outside of Puerto Rico, but it became the hottest thing in the culture thus it did phenomenal numbers with no mainstream exposure. But the most important facet is the music. And this album is full of classics from beginning to end with much variety yet Cosculluela does not abandon his underground lyricism at any moment for commercial success. You have ballads with Zion & De La Ghetto, but hardcore songs like “Plaka Plaka” and “Un Pesito”. There is no doubt that when this album came out Cosculluela was the #1 Latin MC on planet earth and his career is now legendary thanks to “El Principe” in which every single song was good and a hit!
Listen on Spotify: https://open.spotify.com/album/6A6eSLDcS2r7qT9ZFYSJlL?si=-YBA4YGST0OIXn23ZU-XtQ


  1. Jowell & Randy “El Momento” (2010) – Wisin & Yandel’s “WY Records” joined forces with the legendary “White Lion Records” to present this masterpiece. Half the album is produced by Wisin & Yandel’s superstar team of Nesty, Victor & Gomez while the other half is done by Live Music (DJ Giann, Dexter, Mr. Greenz & DJ Blass). It is Jowell & Randy’s best album to date and their most successful one to date. People remember hits like “Un Booty Nuevo” feat. Yaviah, “Loco”, & “Solo Por Ti” but songs like “Amanece” and “Chica de Novela” are all time classics within the Reggaeton community. If you missed this one, do yourself a favor and save your life by hearing it.
Listen On Spotify: https://open.spotify.com/album/6JUteqYW61MphFHmJe5AAU?si=FPqrD5hmSpqvpHknPvmVzw

3. Ñengo Flow “Real G 4 Life” (2010) - Ñengo Flow became a superstar in Colombia with this album and later the rest of the world. “Real G 4 Life” has now become a mantra for Latinos raised in the barrio across the globe. The album was the best of both worlds. Half of it is Ñengo’s gritty, dark and violent tone with help of ultra underrated MC John Jay. The second half is club bangers with all tracks becoming hits in the Reggaeton world. This album is now one of the most influential in the history of Latin Music, not just Rap & Reggaeton.
Listen on YOUTUBE: https://youtube.com/playlist?list=OLAK5uy_lyv_kcReUgQuIS_13uattK3TJKVK8Dhsc&si=W7rdpwG7vj5QyeiH

4. Anuel AA “Real Hasta La Muerte mixtape version” (2016) – Anuel’s debut 13 track mixtape is a tour de force. Every song is either an underground hit or a commercial radio/club smash. He was just untouchable at this point. Lyrically he was also at his peak here as his lyrics kinda made more sense in their angst while recently he sounds kinda pointless. His punchlines were also much more clever in this era and he became a legend in the culture with this work alone which is much superior to the album version of 2018. Please don’t get them confused, one is much better than the other.
Listen Here: Anuel AA - Real Hasta La Muerte (The Mixtape) (2016) : Free Download, Borrow, and Streaming : Internet Archive

5. Kase.O “El Círculo” (2016) – “El Ciculo” by Kase.O is definitely the most sophisticated album on this list. For those not “in the know” Kase.O has been widely considered the undisputed best lyricist alive since Canserbero passed away. He was a member of the legendary Hip Hop group ‘Violadores Del Verso’ and presented a masterclass of a product with “El Círculo” in 2016. Apart from his supreme battle rap skills, we have songs with social content, R&B romance, and a variety of underground Rap sounds from R de Rhumba. If we were to rate on pure skill alone, this album may be #1.
Listen on Apple Music: https://music.apple.com/us/album/el-c%C3%ADrculo/1152540356

6. Yandel “Dangerous” (2015) - Yandel’s most commercially successful album as a solo artist is just a tour de force from beginning to end. This is Yandel translating his hitmaking abilities from “Quien Contra Mi” to the modern era. It is very commercial without losing the essence of the true Reggaeton sound. Most people remember “Encantadora” but even deep cuts like “Riversa” feat. De La Ghetto, “Loba”, “Dejame Explorar” feat. French Montana & “No Sales De Mi Mente” feat. Nicky Jam were among the best Reggaeton songs that decade.
Listen on Apple Music: https://music.apple.com/us/album/dangerous/1046026029

7. Los De La Nazza “Orion” (2015) - This is the finest produced Reggaeton album of the 2010’s and the one that launched today’s #1 label ‘RIMAS’. It has an all star list of participants including Farruko, Nicky Jam, De La Ghetto, Ozuna, Kendo Kaponi, Pusho, Angel & Khriz, Luigi 21 Plus, Alexio (RIP) Juanka & many more… It is a very street album and not recommended for all audiences. The beats still sound impressive almost a decade later.
Listen on Spotify: https://open.spotify.com/album/1qA8Q6vn2oYXBwiMb55HTu?si=jFgI2oecQNKTj_uB3UZU-w

8. Ozuna “Odisea” (2017) – Ozuna’s debut album is chock full of hits and the most successful album on the list. He had already about 5 or 6 international hits before the album’s release and added another 5 or 6 more after it. Super catchy and well produced album.
Listen on YOUTUBE: https://youtube.com/playlist?list=OLAK5uy_ncFovAV-r37ILWMjp65C285WwN3-5CSbw&si=ofFXc57ZnREL52nv

9. Baby Rasta & Gringo “Los Cotizados” (2015) – After a career that spanned over 20 years by the time of “Los Cotizados” release date, this is Baby Rasta & Gringo’s most successful album to date. The album is full of catchy songs and impressive features including Tito El Bambino, Nicky Jam & Farruko. Jumbo “El Que Produce Solo” does a fantastic job on the production end.
Listen on Apple Music: https://music.apple.com/us/album/los-cotizados/1361900453

10. Nico Canada “A Lo Under vol. 1 & 2” (2012) – Nico Canada brought an all star double album to the game in 2012. You have exclusive tracks from Plan B, Cosculluela, Nicky Jam, J Alvarez, Ñengo Flow, Maicol & Manuel, Alberto Style, Ivy Queen, Mexicano, Yomo, Tito El Bambino, J-King & Maximan, Voltio, Jowell & Randy and more… All produced by Nico Canada alongside Kronix Magical mostly with an old school 90’s feel translated to the modern era. Sadly, this album was not known outside the underground but is worth the listen as it is full of classic tracks.
Listen on Spotify: Vol. 1 https://open.spotify.com/album/6v6ie2iVsqY5HU0nYn9rgb?si=g6wVyDH-Qp6ZB98eLSbzhg
& Vol. 2 https://open.spotify.com/album/36McUo1zCJNAzHu7gmqfTG?si=ppYXTewfQiGWBqW4OPS-5Q

Honorable Mention: Shotta – Para Mi Gente/Flowesia (2014/2016), Plan B – House of Pleasure (2010), Cosculluela – Blanco Perla (2016), Alcolirykoz - Servicios Ambulatorioz (2017), Nicky Jam – Fenix (2017), Wisin & Yandel – Los Vaqueros El Regreso (2011), Daddy Yankee – King Daddy (2013) & Tito El Bambino – El Patron La Victoria Edition.
My personal Top 5: 1. King Daddy 2. Real Hasta La Muerte mixtape version 3. El Momento 4. Los Vaqueros El Regreso 5. El Principe
submitted by ReggaetonPartyMane1 to Reggaeton [link] [comments]


2024.05.17 00:49 zephyrjudge Voice dropping!!! (+ prescription question)

My mom and I love to sing along to doo wop on the radio. Skeeter Davis “end of the world” came on and I started singing and I just… couldn’t. I was trying to sing from my throat, like how I’ve been singing for 20 years, and I just… was unable to. I had to clear my throat and then start singing from my chest and that shit was RESONANT!!!!!!!!
Okay and now the question part: So, I started 2 weeks ago, 80mg every week (.4mL with 200mg/mL vials). When I picked up my prescription, I was given 4 needles, 4 syringes (with needles included), and two bottles of the 200mg/mL test cyp vials. I’m not supposed to go back to see my prescribing physician until August for a 3 month follow up. There is the issue: the vials are labeled as single dose/single use, so I of course discarded both vials after I was done dosing the past two weeks. Well, I’m due for my next dose tomorrow, and I have no test. Yes, I’ve already requested a refill online and sent a detailed message to my prescribing physician, so don’t inflate the comments with “go to your doctor not reddit!!!”. I just want to see if this is common, if anyone else has had an issue like this. Just curious!
submitted by zephyrjudge to TestosteroneKickoff [link] [comments]


2024.05.17 00:33 bartthetr0ll My Ukrainians neighbors newly turned 18 son is returning to Ukraine to serve.

A Ukrainian mom and her kids moved into a condo near me in mid 2022, they are mid priced units in my HCOL area so their family likely had above average means prior to the war and it could have been easy for them to keep him here on the other side of the world, but he wants to go and fight for his country, about a dozen other neighbors and I have pitched in to help him make sure he has the basic kit he will need. Moral of the story is I wanted to share this little example of a Ukranian who has lived in the west for a couple years, but still feels the need to go put his life on the line to defend his homeland and his family that is still out there.
To me this highlights why we all need to be doing more to harass our representatives to make sure Ukraine gets everything they need to fight from a position of strength, the Ukranians fighting for their freedom have all the will and capacity they need to win, all we need to do is equip them properly with our leftovers that would otherwise be either never used or sold for scrap.
Ruzzian propaganda tries to shove propaganda of Ukrainians being tired of fighting and the west being tired of paying(even though we are mostly just providing older weapons and not writing blank checks) I get nobody here falls for that crap, but it was heartwarming to see this young man's love of his country in person.
Anyway cheers to you all, and Slava Ukraini!
submitted by bartthetr0ll to NAFO [link] [comments]


2024.05.17 00:32 BigBookest- Minecraft Class_7196?

I am making a 1.19.2 Mega mod pack and I was able to load into the Minecraft loading screen and everything but the game instantly crashes once I create a world. The crash report is below and the main error I get is "Mixin transformation of net.minecraft.class_7196 failed" I tried looking up what mod is under class 7196 but I can't seem to pinpoint the mod that is responsible.
---- Minecraft Crash Report ----
// Daisy, daisy...
Time: 2024-05-16 15:25:45
Description: mouseClicked event handler
java.lang.RuntimeException: Mixin transformation of net.minecraft.class_7196 failed
`at net.fabricmc.loader.impl.launch.knot.KnotClassDelegate.getPostMixinClassByteArray(KnotClassDelegate.java:427)` `at net.fabricmc.loader.impl.launch.knot.KnotClassDelegate.tryLoadClass(KnotClassDelegate.java:323)` `at net.fabricmc.loader.impl.launch.knot.KnotClassDelegate.loadClass(KnotClassDelegate.java:218)` `at net.fabricmc.loader.impl.launch.knot.KnotClassLoader.loadClass(KnotClassLoader.java:119)` `at java.base/java.lang.ClassLoader.loadClass(ClassLoader.java:525)` `at net.minecraft.class_525.method_2736(class_525.java:310)` `at net.minecraft.class_525.method_19922(class_525.java:260)` `at net.minecraft.class_4185.method_25306(class_4185.java:43)` `at net.minecraft.class_4264.method_25348(class_4264.java:16)` `at net.minecraft.class_339.method_25402(class_339.java:120)` `at net.minecraft.class_4069.method_25402(class_4069.java:27)` `at net.minecraft.class_312.method_1611(class_312.java:94)` `at net.minecraft.class_437.method_25412(class_437.java:489)` `at net.minecraft.class_312.method_1601(class_312.java:94)` `at net.minecraft.class_312.method_22686(class_312.java:165)` `at net.minecraft.class_1255.execute(class_1255.java:103)` `at net.minecraft.class_312.method_22684(class_312.java:165)` `at org.lwjgl.glfw.GLFWMouseButtonCallbackI.callback(GLFWMouseButtonCallbackI.java:43)` `at org.lwjgl.system.JNI.invokeV(Native Method)` `at org.lwjgl.glfw.GLFW.glfwWaitEventsTimeout(GLFW.java:3474)` `at com.mojang.blaze3d.systems.RenderSystem.limitDisplayFPS(RenderSystem.java:222)` `at net.minecraft.class_310.method_1523(class_310.java:1208)` `at net.minecraft.class_310.method_1514(class_310.java:768)` `at net.minecraft.client.main.Main.method_44604(Main.java:244)` `at net.minecraft.client.main.Main.main(Main.java:51)` `at net.fabricmc.loader.impl.game.minecraft.MinecraftGameProvider.launch(MinecraftGameProvider.java:470)` `at net.fabricmc.loader.impl.launch.knot.Knot.launch(Knot.java:74)` `at net.fabricmc.loader.impl.launch.knot.KnotClient.main(KnotClient.java:23)` 
Caused by: org.spongepowered.asm.mixin.transformer.throwables.MixinTransformerError: An unexpected critical error was encountered
`at org.spongepowered.asm.mixin.transformer.MixinProcessor.applyMixins(MixinProcessor.java:392)` `at org.spongepowered.asm.mixin.transformer.MixinTransformer.transformClass(MixinTransformer.java:234)` `at org.spongepowered.asm.mixin.transformer.MixinTransformer.transformClassBytes(MixinTransformer.java:202)` `at net.fabricmc.loader.impl.launch.knot.KnotClassDelegate.getPostMixinClassByteArray(KnotClassDelegate.java:422)` `... 27 more` 
Caused by: org.spongepowered.asm.mixin.injection.throwables.InjectionError: Critical injection failure: Redirector removeAdviceOnLoad(Lnet/minecraft/class_5219;)Lcom/mojang/serialization/Lifecycle; in disable_custom_worlds_advice.mixins.json:MixinIntegratedServerLoader from mod disable_custom_worlds_advice failed injection check, (0/1) succeeded. Scanned 1 target(s). Using refmap DisableCustomWorldsAdvice-refmap.json
`at org.spongepowered.asm.mixin.injection.struct.InjectionInfo.postInject(InjectionInfo.java:468)` `at org.spongepowered.asm.mixin.transformer.MixinTargetContext.applyInjections(MixinTargetContext.java:1384)` `at org.spongepowered.asm.mixin.transformer.MixinApplicatorStandard.applyInjections(MixinApplicatorStandard.java:1062)` `at org.spongepowered.asm.mixin.transformer.MixinApplicatorStandard.applyMixin(MixinApplicatorStandard.java:402)` `at org.spongepowered.asm.mixin.transformer.MixinApplicatorStandard.apply(MixinApplicatorStandard.java:327)` `at org.spongepowered.asm.mixin.transformer.TargetClassContext.apply(TargetClassContext.java:422)` `at org.spongepowered.asm.mixin.transformer.TargetClassContext.applyMixins(TargetClassContext.java:403)` `at org.spongepowered.asm.mixin.transformer.MixinProcessor.applyMixins(MixinProcessor.java:363)` `... 30 more` 
A detailed walkthrough of the error, its code path and all known details is as follows:
---------------------------------------------------------------------------------------
-- Head --
Thread: Render thread
Stacktrace:
`at net.fabricmc.loader.impl.launch.knot.KnotClassDelegate.getPostMixinClassByteArray(KnotClassDelegate.java:427)` `at net.fabricmc.loader.impl.launch.knot.KnotClassDelegate.tryLoadClass(KnotClassDelegate.java:323)` `at net.fabricmc.loader.impl.launch.knot.KnotClassDelegate.loadClass(KnotClassDelegate.java:218)` `at net.fabricmc.loader.impl.launch.knot.KnotClassLoader.loadClass(KnotClassLoader.java:119)` `at java.base/java.lang.ClassLoader.loadClass(ClassLoader.java:525)` `at net.minecraft.class_525.method_2736(class_525.java:310)` `at net.minecraft.class_525.method_19922(class_525.java:260)` `at net.minecraft.class_4185.method_25306(class_4185.java:43)` `at net.minecraft.class_4264.method_25348(class_4264.java:16)` `at net.minecraft.class_339.method_25402(class_339.java:120)` `at net.minecraft.class_4069.method_25402(class_4069.java:27)` `at net.minecraft.class_312.method_1611(class_312.java:94)` `at net.minecraft.class_437.method_25412(class_437.java:489)` `at net.minecraft.class_312.method_1601(class_312.java:94)` `at net.minecraft.class_312.method_22686(class_312.java:165)` `at net.minecraft.class_1255.execute(class_1255.java:103)` `at net.minecraft.class_312.method_22684(class_312.java:165)` `at org.lwjgl.glfw.GLFWMouseButtonCallbackI.callback(GLFWMouseButtonCallbackI.java:43)` `at org.lwjgl.system.JNI.invokeV(Native Method)` `at org.lwjgl.glfw.GLFW.glfwWaitEventsTimeout(GLFW.java:3474)` 
-- Affected screen --
Details:
`Screen name: net.minecraft.class_525` 
Stacktrace:
`at net.minecraft.class_437.method_25412(class_437.java:489)` `at net.minecraft.class_312.method_1601(class_312.java:94)` `at net.minecraft.class_312.method_22686(class_312.java:165)` `at net.minecraft.class_1255.execute(class_1255.java:103)` `at net.minecraft.class_312.method_22684(class_312.java:165)` `at org.lwjgl.glfw.GLFWMouseButtonCallbackI.callback(GLFWMouseButtonCallbackI.java:43)` `at org.lwjgl.system.JNI.invokeV(Native Method)` `at org.lwjgl.glfw.GLFW.glfwWaitEventsTimeout(GLFW.java:3474)` `at com.mojang.blaze3d.systems.RenderSystem.limitDisplayFPS(RenderSystem.java:222)` `at net.minecraft.class_310.method_1523(class_310.java:1208)` `at net.minecraft.class_310.method_1514(class_310.java:768)` `at net.minecraft.client.main.Main.method_44604(Main.java:244)` `at net.minecraft.client.main.Main.main(Main.java:51)` `at net.fabricmc.loader.impl.game.minecraft.MinecraftGameProvider.launch(MinecraftGameProvider.java:470)` `at net.fabricmc.loader.impl.launch.knot.Knot.launch(Knot.java:74)` `at net.fabricmc.loader.impl.launch.knot.KnotClient.main(KnotClient.java:23)` 
-- Last reload --
Details:
`Reload number: 1` `Reload reason: initial` `Finished: Yes` `Packs: Default, PFM-Runtime-RP, Fabric Mods, Everycomp Generated Pack, Snowyspirit Generated Pack, Essential (fabric_1.19.2).jar` 
Stacktrace:
`at net.minecraft.class_6360.method_36565(class_6360.java:49)` `at net.minecraft.class_310.method_1587(class_310.java:2348)` `at net.minecraft.class_310.method_1514(class_310.java:787)` `at net.minecraft.client.main.Main.method_44604(Main.java:244)` `at net.minecraft.client.main.Main.main(Main.java:51)` `at net.fabricmc.loader.impl.game.minecraft.MinecraftGameProvider.launch(MinecraftGameProvider.java:470)` `at net.fabricmc.loader.impl.launch.knot.Knot.launch(Knot.java:74)` `at net.fabricmc.loader.impl.launch.knot.KnotClient.main(KnotClient.java:23)` 
-- System Details --
Details:
`Minecraft Version: 1.19.2` `Minecraft Version ID: 1.19.2` `Operating System: Windows 10 (amd64) version 10.0` `Java Version: 17.0.8, Microsoft` `Java VM Version: OpenJDK 64-Bit Server VM (mixed mode), Microsoft` `Memory: 6762597352 bytes (6449 MiB) / 21474836480 bytes (20480 MiB) up to 21474836480 bytes (20480 MiB)` `CPUs: 16` `Processor Vendor: AuthenticAMD` `Processor Name: AMD Ryzen 7 5800X 8-Core Processor` `Identifier: AuthenticAMD Family 25 Model 33 Stepping 2` `Microarchitecture: Zen 3` `Frequency (GHz): 3.80` `Number of physical packages: 1` `Number of physical CPUs: 8` `Number of logical CPUs: 16` `Graphics card #0 name: AMD Radeon RX 6750 XT` `Graphics card #0 vendor: Advanced Micro Devices, Inc. (0x1002)` `Graphics card #0 VRAM (MB): 4095.00` `Graphics card #0 deviceId: 0x73df` `Graphics card #0 versionInfo: DriverVersion=31.0.24027.1012` `Memory slot #0 capacity (MB): 16384.00` `Memory slot #0 clockSpeed (GHz): 2.13` `Memory slot #0 type: DDR4` `Memory slot #1 capacity (MB): 16384.00` `Memory slot #1 clockSpeed (GHz): 2.13` `Memory slot #1 type: DDR4` `Virtual memory max (MB): 52209.99` `Virtual memory used (MB): 46311.93` `Swap memory total (MB): 19544.52` `Swap memory used (MB): 1083.90` `JVM Flags: 4 total; -XX:HeapDumpPath=MojangTricksIntelDriversForPerformance_javaw.exe_minecraft.exe.heapdump -Xss1M -Xmx20G -Xms19G` `Fabric Mods:` `additionaladditions: Additional Additions 5.1.0` `additionallanterns: Additional Lanterns 1.1.1a` `adorn: Adorn 3.9.1+1.19.2` `advancementplaques: Advancement Plaques 1.4.6` `adventurez: AdventureZ 1.4.18` `alloy_forgery: Alloy Forgery 2.1.1+1.19` `amecs: Amecs 1.3.8+mc.1.19-rc2` `another_furniture: Another Furniture 1.19.2-2.1.4` `appleskin: AppleSkin 2.5.1+mc1.19` `architectury: Architectury 6.6.92` `artifacts: Artifacts 7.1.1+fabric` `expandability: ExpandAbility 6.0.0` `step-height-entity-attribute: Step Height Entity Attribute 1.0.0` `attributefix: AttributeFix 17.2.8` `auudio: Auudio 1.0.3` `azurelib: AzureLib 1.0.41` `badpackets: Bad Packets 0.2.3` `bakery: Bakery 1.0.6` `balm-fabric: Balm 4.6.0` `bclib: BCLib 2.1.8` `beachparty: Beachparty 1.0.12` `beaconoverhaul: Beacon Overhaul 1.7.3+1.19.2` `reach-entity-attributes: Reach Entity Attributes 2.3.0` `beautify: Beautify 1.1.1+fabric-1.19.2` `cardinal-components-base: Cardinal Components API (base) 5.0.2` `cardinal-components-entity: Cardinal Components API (entities) 5.0.2` `cardinal-components-world: Cardinal Components API (worlds) 5.0.2` `beekeeperhut: Friends&Foes - Beekeeper Hut 2.0.0` `betterchunkloading: Better chunk loading mod 1.19.2-4.2` `bettercombat: Better Combat 1.7.1+1.19` `betterdeserttemples: YUNG's Better Desert Temples 1.19.2-Fabric-2.2.2` `org_reflections_reflections: reflections 0.10.2` `betterdungeons: YUNG's Better Dungeons 1.19.2-Fabric-3.2.1` `betterend: Better End 2.1.7` `betterendisland: YUNG's Better End Island 1.19.2-Fabric-1.0` `betterfortresses: YUNG's Better Nether Fortresses 1.19.2-Fabric-1.0.6` `betterjungletemples: YUNG's Better Jungle Temples 1.19.2-Fabric-1.0.1` `bettermineshafts: YUNG's Better Mineshafts 1.19.2-Fabric-3.2.1` `betternether: Better Nether 7.1.5` `betteroceanmonuments: YUNG's Better Ocean Monuments 1.19.2-Fabric-2.1.1` `betterstats: Better Statistics Screen 2.9.3+1.19.2` `tcdcommons: TCD Commons API 2.9.1+1.19.2` `betterstrongholds: YUNG's Better Strongholds 1.19.2-Fabric-3.2.0` `betterwitchhuts: YUNG's Better Witch Huts 1.19.2-Fabric-2.1.0` `bobby: Bobby 4.0.1` `com_typesafe_config: config 1.4.2` `io_leangen_geantyref_geantyref: geantyref 1.3.13` `org_spongepowered_configurate-core: configurate-core 4.1.2` `org_spongepowered_configurate-hocon: configurate-hocon 4.1.2` `bookshelf: Bookshelf 16.3.20` `bosses_of_mass_destruction: Bosses of Mass Destruction (Beta) 1.4.8-1.19.2` `maelstrom_library: Maelstrom Library 1.3.1-1.19.2` `multipart_entities: MultipartEntities 1.2-1.19-pre1` `botanypots: BotanyPots 9.0.43` `botarium: Botarium 1.9.2` `team_reborn_energy: Energy 2.2.0` `bountiful: Bountiful 3.0.0` `brewery: Brewery 1.0.1` `brewinandchewin: Brewin And Chewin fabric-2.1.5+1.19.2` `mm: Manningham Mills 2.3` `bwncr: Bad Wither No Cookie Reloaded 3.14.1` `byg: Oh The Biomes You'll Go` [`2.0.1.6`](http://2.0.1.6) `bygonenether: Bygone Nether 1.3.2` `candlelight: Candlelight 1.1.9` `capybara: Capybara 2.0.1` `cardinal-components: Cardinal Components API 5.0.2` `cardinal-components-block: Cardinal Components API (blocks) 5.0.2` `cardinal-components-chunk: Cardinal Components API (chunks) 5.0.2` `cardinal-components-item: Cardinal Components API (items) 5.0.2` `cardinal-components-level: Cardinal Components API (world saves) 5.0.2` `cardinal-components-scoreboard: Cardinal Components API (scoreboard) 5.0.2` `carryon: Carry On` [`2.1.2.23`](http://2.1.2.23) `cave_enhancements: Cave Enhancements 1.19.2-2.1.12-fabric` `charm: Charm 4.4.4` `com_moandjiezana_toml_toml4j: toml4j 0.7.2` `charmofundying: Charm of Undying 6.2.1+1.19.2` `chat_heads: Chat Heads 0.10.32` `chipped: Chipped 2.1.5` `chunksending: Chunksending Mod 1.19.2-2.8` `cloth-api: Cloth API 4.0.65` `cloth-basic-math: cloth-basic-math 0.6.1` `cloth-client-events-v0: Cloth Client Events v0 4.0.65` `cloth-common-events-v1: Cloth Common Events v1 4.0.65` `cloth-scissors-api-v1: Cloth Scissors API v1 4.0.65` `cloth-utils-v1: Cloth Utils v1 4.0.65` `cloth-config: Cloth Config v8 8.3.115` `clumps: Clumps 9.0.0+14` `cobblemon: Cobblemon 1.3.1+1.19.2` `cobblemon_chaining: Cobblemon Chaining 1.3-fabric-1.1.3` `omega-config: OmegaConfig 1.3.0+1.19.2` `cobblemon_counter: Cobblemon Counter 1.3-fabric-1.5.0` `cobblemon_spawn_notification: Cobblemon Spawn Notification 1.4.0` `cobblepedia: Cobblepedia 0.4.4+1.19.2` `collective: Collective 7.57` `comforts: Comforts 6.0.7+1.19.2` `spectrelib: SpectreLib 0.12.8+1.19.2` `configured: Configured 2.0.0` `connectedglass: Connected Glass 1.1.11` `connectiblechains: Connectible Chains 2.1.4+1.19.2` `connectivity: Connectivity Mod 1.19.2-4.5` `controlling: Controlling For Fabric 10.0+7` `convenientdecor: Convenient Decor 0.2.0` `convenientnametags: Convenient Name Tags 1.0.0` `coolcat_lib: CoolCatLib 1.0.4` `corgilib: CorgiLib` [`1.0.0.34`](http://1.0.0.34) `com_electronwill_night-config_core: core 3.6.6` `com_electronwill_night-config_toml: toml 3.6.6` `cosmetic-armor: Cosmetic Armor 1.4.2` `crafttweaker: CraftTweaker 10.1.55` `org_javassist_javassist: javassist 3.29.0-GA` `create: Create 0.5.1-f-build.1416+mc1.19.2` `com_google_code_findbugs_jsr305: jsr305 3.0.2` `flywheel: Flywheel 0.6.10-8` `forge_tags: Porting Lib Tags 3.0` `milk: Milk Lib 1.0.51` 
dripstone_fluid_lib: Dripstone Fluid Lib 2.0.1
 `porting_lib_accessors: Porting Lib Accessors 2.1.1305+1.19.2` `porting_lib_base: Porting Lib Base 2.1.1305+1.19.2` 
porting_lib_attributes: Porting Lib Attributes 2.1.1305+1.19.2
porting_lib_common: Porting Lib Common 2.1.1305+1.19.2
porting_lib_constants: Porting Lib Constants 2.1.1305+1.19.2
porting_lib_lazy_registration: Porting Lib Lazy Register 2.1.1305+1.19.2
porting_lib_loot: Porting Lib Loot 2.1.1305+1.19.2
porting_lib_model_generators: Porting Lib Model Generators 2.1.1305+1.19.2
porting_lib_model_loader: Porting Lib Model Loader 2.1.1305+1.19.2
porting_lib_models: Porting Lib Models 2.1.1305+1.19.2
 `porting_lib_entity: Porting Lib Entity 2.1.1305+1.19.2` `porting_lib_extensions: Porting Lib Extensions 2.1.1305+1.19.2` `porting_lib_fake_players: Porting Lib Fake Players 2.1.1305+1.19.2` `porting_lib_networking: Porting Lib Networking 2.1.1305+1.19.2` `porting_lib_obj_loader: Porting Lib Obj Loader 2.1.1305+1.19.2` `porting_lib_transfer: Porting Lib Transfer 2.1.1305+1.19.2` `registrate-fabric: Registrate for Fabric 1.1.58-MC1.19.2` `crittersandcompanions: Critters and Companions 1.19.2-2.0.2` `croptopia: Croptopia 2.2.2` `culturaldelights: Cultural Delights Fabric 0.14.10+1.19.2` `terraform-wood-api-v1: Terraform Wood API (v1) 4.2.0` `cupboard: cupboard 1.19.2-2.6` `darkpaintings: DarkPaintings 13.1.5` `darkutils: DarkUtilities 13.1.9` `darkwaters: Dark Waters 0.0.18` `debugify: Debugify 2.8.0` `decorative_blocks: Decorative Blocks 3.0.0` `deeperdarker: Deeper and Darker 1.2.5` `customportalapi: Custom Portal Api 0.0.1-beta63-1.19.X` `diagonalfences: Diagonal Fences 4.2.6` `diagonalwindows: Diagonal Windows 4.0.2` `doapi: Lets Do Api 1.1.0` `blue_endless_jankson: jankson 1.2.1` `dragonfight: Dragonfight Mod 1.19.2-4.4` `dragonloot: DragonLoot 1.1.2` `duckling: Duckling 2.0.8` `dummmmmmy: MmmMmmMmmMmm 1.19.2-1.7.1` `dungeon_difficulty: Dungeon Difficulty 2.0.5+1.19` `com_github_zsoltmolnarrr_tinyconfig: TinyConfig 2.3.2` `dungeon_now_loading: dungeon-now-loading-18.2 1.0.0` `dungeons_arise: When Dungeons Arise 2.1.54` `dungeons_arise_seven_seas: When Dungeons Arise: Seven Seas 1.0.2` `durabilitytooltip: Durability Tooltip 1.1.5+a` `easyanvils: Easy Anvils 4.0.11` `easymagic: Easy Magic 4.3.3` `eatinganimationid: Eating Animation 1.9.1` `ecologics: Ecologics 2.1.11` `elementa: Elementa 647` `elytraslot: Elytra Slot 6.1.1+1.19.2` `emeraldexpansion: Emerald Expansion 1.0` `emi: EMI 1.1.6+1.19.2+fabric` `emi_loot: EMI Loot 0.6.6+1.19` `enchdesc: EnchantmentDescriptions 13.0.14` `endermanoverhaul: Enderman Overhaul 0.0.0` `ends_delight: End's Delight 1.19.2-1.0` `essential: Essential 1.3.2.3+g6a2d13e09b` `essential-container: essential-container 1.0.0` `essential-loader: essential-loader 1.2.1` `everycomp: Every Compat 1.19.2-2.5.22` `exlinefurniture: Exline's Furniture 2.3.2` `expandeddelight: Expanded Delight` [`0.2.5.2`](http://0.2.5.2) `experiencebugfix: Experience Bug Fix 19` `explorify: Explorify v1.4.0` `extended_armor_bars: Extended Armor Bars 1.2.1` `extraalchemy: Extra Alchemy 1.9.0` `fabric-api: Fabric API 0.77.0+1.19.2` `fabric-api-base: Fabric API Base 0.4.15+8f4e8eb390` `fabric-api-lookup-api-v1: Fabric API Lookup API (v1) 1.6.14+93d8cb8290` `fabric-biome-api-v1: Fabric Biome API (v1) 9.1.1+16f1e31390` `fabric-block-api-v1: Fabric Block API (v1) 1.0.2+e415d50e90` `fabric-blockrenderlayer-v1: Fabric BlockRenderLayer Registration (v1) 1.1.25+cafc6e8e90` `fabric-client-tags-api-v1: Fabric Client Tags 1.0.5+b35fea8390` `fabric-command-api-v1: Fabric Command API (v1) 1.2.16+f71b366f90` `fabric-command-api-v2: Fabric Command API (v2) 2.2.1+413cbbc790` `fabric-commands-v0: Fabric Commands (v0) 0.2.33+df3654b390` `fabric-containers-v0: Fabric Containers (v0) 0.1.42+df3654b390` `fabric-content-registries-v0: Fabric Content Registries (v0) 3.5.2+7c6cd14d90` `fabric-convention-tags-v1: Fabric Convention Tags 1.3.0+4bc6e26290` `fabric-crash-report-info-v1: Fabric Crash Report Info (v1) 0.2.8+aeb40ebe90` `fabric-data-generation-api-v1: Fabric Data Generation API (v1) 5.3.9+413cbbc790` `fabric-dimensions-v1: Fabric Dimensions API (v1) 2.1.35+0d0f210290` `fabric-entity-events-v1: Fabric Entity Events (v1) 1.5.4+9244241690` `fabric-events-interaction-v0: Fabric Events Interaction (v0) 0.4.34+562bff6e90` `fabric-events-lifecycle-v0: Fabric Events Lifecycle (v0) 0.2.36+df3654b390` `fabric-game-rule-api-v1: Fabric Game Rule API (v1) 1.0.24+b6b6abb490` `fabric-item-api-v1: Fabric Item API (v1) 1.6.6+b7d1888890` `fabric-item-groups-v0: Fabric Item Groups (v0) 0.3.39+9244241690` `fabric-key-binding-api-v1: Fabric Key Binding API (v1) 1.0.25+5c4fce2890` `fabric-keybindings-v0: Fabric Key Bindings (v0) 0.2.23+df3654b390` `fabric-lifecycle-events-v1: Fabric Lifecycle Events (v1) 2.2.4+1b46dc7890` `fabric-loot-api-v2: Fabric Loot API (v2) 1.1.13+83a8659290` `fabric-loot-tables-v1: Fabric Loot Tables (v1) 1.1.16+9e7660c690` `fabric-message-api-v1: Fabric Message API (v1) 5.0.7+93d8cb8290` `fabric-mining-level-api-v1: Fabric Mining Level API (v1) 2.1.24+33fbc73890` `fabric-models-v0: Fabric Models (v0) 0.3.21+c6af733c90` `fabric-networking-api-v1: Fabric Networking API (v1) 1.2.12+def3f86d90` `fabric-networking-v0: Fabric Networking (v0) 0.3.29+df3654b390` `fabric-object-builder-api-v1: Fabric Object Builder API (v1) 4.2.2+d8ef690890` `fabric-particles-v1: Fabric Particles (v1) 1.1.0+ee641e7390` `fabric-recipe-api-v1: Fabric Recipe API (v1) 1.0.2+413cbbc790` `fabric-registry-sync-v0: Fabric Registry Sync (v0) 0.9.33+9244241690` `fabric-renderer-api-v1: Fabric Renderer API (v1) 1.2.1+1adbf27790` `fabric-renderer-indigo: Fabric Renderer - Indigo 0.8.0+1adbf27790` `fabric-renderer-registries-v1: Fabric Renderer Registries (v1) 3.2.25+df3654b390` `fabric-rendering-data-attachment-v1: Fabric Rendering Data Attachment (v1) 0.3.19+6e0787e690` `fabric-rendering-fluids-v1: Fabric Rendering Fluids (v1) 3.0.11+4d0d570390` `fabric-rendering-v0: Fabric Rendering (v0) 1.1.28+df3654b390` `fabric-rendering-v1: Fabric Rendering (v1) 1.13.0+526f2c6790` `fabric-resource-conditions-api-v1: Fabric Resource Conditions API (v1) 2.1.2+aae9039d90` `fabric-resource-loader-v0: Fabric Resource Loader (v0) 0.8.4+edbdcddb90` `fabric-screen-api-v1: Fabric Screen API (v1) 1.0.32+4d0d570390` `fabric-screen-handler-api-v1: Fabric Screen Handler API (v1) 1.3.8+1cc24b1b90` `fabric-sound-api-v1: Fabric Sound API (v1) 1.0.2+c4f28df590` `fabric-textures-v0: Fabric Textures (v0) 1.0.24+aeb40ebe90` `fabric-transfer-api-v1: Fabric Transfer API (v1) 2.1.6+413cbbc790` `fabric-transitive-access-wideners-v1: Fabric Transitive Access Wideners (v1) 1.3.3+08b73de490` `fabric-furnaces: Fabric Furnaces 2.2.0-1.19.2` `fabric-language-kotlin: Fabric Language Kotlin 1.10.20+kotlin.1.9.24` `org_jetbrains_kotlin_kotlin-reflect: kotlin-reflect 1.9.24` `org_jetbrains_kotlin_kotlin-stdlib: kotlin-stdlib 1.9.24` `org_jetbrains_kotlin_kotlin-stdlib-jdk7: kotlin-stdlib-jdk7 1.9.24` `org_jetbrains_kotlin_kotlin-stdlib-jdk8: kotlin-stdlib-jdk8 1.9.24` `org_jetbrains_kotlinx_atomicfu-jvm: atomicfu-jvm 0.24.0` `org_jetbrains_kotlinx_kotlinx-coroutines-core-jvm: kotlinx-coroutines-core-jvm 1.8.0` `org_jetbrains_kotlinx_kotlinx-coroutines-jdk8: kotlinx-coroutines-jdk8 1.8.0` `org_jetbrains_kotlinx_kotlinx-datetime-jvm: kotlinx-datetime-jvm 0.5.0` `org_jetbrains_kotlinx_kotlinx-serialization-cbor-jvm: kotlinx-serialization-cbor-jvm 1.6.3` `org_jetbrains_kotlinx_kotlinx-serialization-core-jvm: kotlinx-serialization-core-jvm 1.6.3` `org_jetbrains_kotlinx_kotlinx-serialization-json-jvm: kotlinx-serialization-json-jvm 1.6.3` `fabricloader: Fabric Loader 0.15.11` `mixinextras: MixinExtras 0.3.5` `fallingleaves: Falling Leaves 1.13.0+1.19.2` `fallingtree: FallingTree 3.10.1` `farmersdelight: Farmer's Delight 1.19.2-1.3.10.2` `farmersrespite: Farmer's Respite 2.2.5` `porting_lib: Porting Lib 2.1.815+1.19.2` 
serialization_hooks: Serialization Hooks 0.3.26
 `farsight: Farsight Mod 1.19.2-3.5` `org_jctools_jctools-core: jctools-core 4.0.1` `fastload: Fast Load 2.6.11` `faux-custom-entity-data: Faux-Custom-Entity-Data 2.0.2` `fdjei: Just Enough Farmer's Recipes 1.0.1` `findme: FindMe 3.1.0` `flowerymooblooms: Friends&Foes - Flowery Mooblooms 2.0.1` `forgeconfigapiport: Forge Config API Port 4.2.11` `friendlyfire: FriendlyFire 14.0.4` `friendsandfoes: Friends&Foes 2.0.10` `frostiful: Frostiful 0.5.8` `ftbchunks: FTB Chunks 1902.4.4-build.326` `ftblibrary: FTB Library 1902.4.1-build.236` `ftbpc: FTB Pack Companion 2.2.2+mc1.19.2` `ftbteams: FTB Teams 1902.2.14-build.123` `ftbultimine: FTB Ultimine 1902.4.1-build.90` `fusion: Fusion 1.1.1` `fwaystones: Fabric Waystones 3.0.8+mc1.19.2` `galosphere: Galosphere 1.19.2-1.3.0` `geckolib3: Geckolib 3.1.40` `com_eliotlash_mclib_mclib: mclib 20` `goated: You've Goat to be kidding me 1.19.2-1.3.1` `goblintraders: Goblin Traders 1.8.1` `goodall: Goodall 1.2.0` `goodending: Good Ending 1.19.2-1.0.2-fabric` `graveyard: The Graveyard 2.3.3` `handcrafted: Handcrafted 2.0.6` `harvestwithease: Harvest with ease` [`8.0.1.0`](http://8.0.1.0) `highlighter: Highlighter 1.1.4` `icarus: Icarus 1.14` `iceberg: Iceberg 1.0.46` `immersive_aircraft: Immersive Aircraft 0.7.9+1.19.2` `org_mariuszgromada_math_mathparser_org-mxparser: MathParser.org-mXparser 5.2.1` `immersive_armors: Immersive Armors 1.5.6+1.19.2` `incendium: Incendium 5.1.6` `indium: Indium 1.0.9+mc1.19.2` `ingredient-extension-api: Ingredient Extension API 3.0.6` `inmis: Inmis 2.7.1-1.19` `inmisaddon: InmisAddon 1.0.4` `ironbows: Iron Bows (Fabric) 1.4-FABRIC-1.19.2` `ironchests: Iron Chests 1.7.7` `libgui: LibGui 6.2.0+1.19` 
jankson: Jankson 4.1.1+j1.2.1
libninepatch: LibNinePatch 1.1.0
 `itemfilters: Item Filters 1902.2.9-build.51` `jade: Jade 8.7.3` `jadeaddons: Jade Addons 3.2.0` `jamlib: JamLib 0.6.1+1.19-1.19.2` `java: OpenJDK 64-Bit Server VM 17` `jeed: Just Enough Effects Descriptions 1.19.2-2.1.4` `jei: Just Enough Items 11.6.0.1019` `jeresources: Just Enough Resources` [`1.2.3.243`](http://1.2.3.243) `journeymap: Journeymap 5.9.8` `journeymap-api-fabric: JourneyMap API 1.19.1-1.9-fabric-SNAPSHOT` `justenoughbreeding: Just Enough Breeding 1.2.1` `kambrik: Kambrik 4.0-1.19.2` `konkrete: Konkrete 1.8.0` `lambdynlights: LambDynamicLights 2.2.0+1.19.2` `pride: Pride Lib 1.1.2+1.19` `spruceui: SpruceUI 4.1.0+1.19.2` `legendarytooltips: Legendary Tooltips 1.3.3` `letmedespawn: Let Me Despawn fabric-1.0.2` `lilwings: Lil' Wings 1.2.3` `limitedchunks: Limited Chunkloading Mod 1.19.2-3.8` `lithium: Lithium 0.11.1` `logprot: Logprot Mod 1.19-2.0` `lootintegrationaddonyung: Yung's Structures Lootintegration Addon 1.18-1.20.1-1.1` `lootintegrations: Loot integration Mod 1.19.2-3.4` `lootr: Lootr` [`0.4.28.69`](http://0.4.28.69) `luphieclutteredmod: Cluttered 2.1` `malilib: MaLiLib 0.13.0` `mavapi: More Axolotl Variants API 1.1.1` `mavm: More Axolotl Variants Mod 1.2.4` `mcda: MC Dungeons Armors 2.4.4` `mcdar: MC Dungeons Artifacts 1.5.3-1.19` `mcdw: MC Dungeons Weapons 5.0.13-1.19` `enchant_giver: Enchant Giver 1.3.0` `mcsa: MC Story Mode Armors 3.1.4+1.19` `mcwdoors: Macaw's Doors 1.1.0` `mcwfences: Macaw's Fences and Walls 1.1.1` `mcwfurnitures: Macaw's Furniture 3.2.2` `mcwfurnituresbyg: Macaw's Furnitures - BYG 1.19.2-1.1` `mcwholidays: Macaw's Holidays 1.1.0` `mcwlights: Macaw's Lights and Lamps 1.0.6` `mcwtrpdoors: Macaw's Trapdoors 1.1.2` `mcwwindows: Macaw's Windows 2.2.0` `meadow: Meadow 1.2.0` `mes: Moog's End Structures 1.3.1-1.19.2-fabric` `midnightlib: MidnightLib 1.0.0` `minecraft: Minecraft 1.19.2` `miskatonicmysteries: Miskatonic Mysteries 0.1.7` `satin: Satin 1.9.0` `mns: Moog's Nether Structures 1.0.1-1.19.2-fabric` `moblassos: Mob Lassos 4.0.0` `extensibleenums: Extensible Enums 4.0.0` `modernfix: ModernFix 5.17.0+mc1.19.2` `moonlight: Moonlight 1.19.2-2.3.6` `moremobvariants: More Mob Variants 1.0.1` `morevillagers: More Villagers 4.0.2` `mousetweaks: Mouse Tweaks 2.22` `mousewheelie: Mouse Wheelie 1.13.0+mc1.19.2` `amecsapi: Amecs API 1.5.1+mc22w17a` `coat: Coat 1.0.0-beta.20+mc22w17a` `tweed4_annotated: tweed4_annotated 1.3.1+mc22w17a` `tweed4_base: tweed4_base 1.7.1+mc22w17a` `tweed4_data: tweed4_data 1.2.1+mc22w17a` `tweed4_data_hjson: tweed4_data_hjson 1.1.1+mc22w17a` `tweed4_tailor_coat: tweed4_tailor_coat 1.1.3+mc22w17a` `tweed4_tailor_lang_json_descriptions: tweed4_tailor_lang_json_descriptions 1.1.0+mc22w17a` `tweed4_tailor_screen: tweed4_tailor_screen 1.1.4+mc22w17a` `mr_camps_castles_carriages: Camps. Castles. Carriages. 1.1.1` `mutantmonsters: Mutant Monsters 4.0.6` `mvs: Moog's Voyager Structures 4.1.2-1.19.2-fabric` `mythicmetals: Mythic Metals 0.17.3+1.19.2` `additionalentityattributes: Additionalentityattributes 1.2.0+1.19` `mythicmobs: Mythic Mobs 1.19.2-fabric-1.4.5` `mythicupgrades: Mythic Upgrades 1.5.1` `namepain: Name Pain 1.5.2` `naturalist: Naturalist 4.0.3` `naturescompass: Nature's Compass 1.19.2-2.1.0-fabric` `nears: Nears 1.2.3` `netherchested: Nether Chested 4.0.4` `nethersdelight: Nether's Delight 1.0.1` `disable_custom_worlds_advice: Disable Custom Worlds Advice 3.0` `nets: Not Enough Trinket Slots (NETS)` [`0.3.5.2`](http://0.3.5.2) `nochatreports: No Chat Reports 1.19.2-v1.13.12` `oceansdelight: Ocean's Delight fabric-1.0.2-1.19.2` `org_jetbrains_annotations: annotations 23.0.0` `owo: oωo 0.9.3+1.19` `oxidized: Oxidized 1.7.2` `paradise_lost: Paradise Lost 2.2.1-beta+1.19.2` `incubus_core: Outcubus Concern 2.0.0` `patchouli: Patchouli 1.19.2-77-FABRIC` `fiber: fiber 0.23.0-2` `paxi: Paxi 1.19.2-Fabric-3.0.1` `pfm: Paladin's Furniture 1.2.1` `piercingpaxels: Piercing Paxels 1.0.7` `pigpen: PigPen 11.1.2` `player-animator: Player Animator 1.0.2` `pling: Pling 1.5.0` `plushies: Plushie Mod 1.2` `polymer-all: Polymer (Packed) 0.2.28+1.19.2` `polymer: Polymer (Core) 0.2.28+1.19.2` 
polymer-registry-sync-manipulator: Polymer Registry Sync Manipulator 0.0.3+1.19.2
 `polymer-blocks-ext: Polymer Blocks 0.1.0-alpha.9+1.19.2` `polymorph: Polymorph 0.46.6+1.19.2` `powah: Powah! 4.0.11` `prism: Prism 1.0.3` `projectile_damage: Projectile Damage Attribute 3.2.1+1.19` `puzzleslib: Puzzles Lib 4.4.3` `randomium: Randomium 1.19.2-1.22` `repurposed_structures: Repurposed Structures 6.3.28+1.19.2` `resourcefulconfig: Resourcefulconfig 1.0.20` `resourcefullib: Resourceful Lib 1.1.24` `rftoleatherbynyte: RfToLeather 1.0.0` `rottencreatures: Rotten Creatures 1.0.1` `roughly_enough_trades: Roughly Enough Trades 1.19-1.0` `roughlyenoughitems: Roughly Enough Items 9.2.724` `error_notifier: Error Notifier 1.0.9` `runelic: Runelic 14.1.4` `runes: Runes 0.9.8+1.19` `sdrp: Simple Discord Rich Presence 3.0.6-build.39+mc1.19.2` `com_github_jagrosh_discordipc: DiscordIPC a8d6631` `com_kohlschutter_junixsocket_junixsocket-common: junixsocket-common 2.6.2` `com_kohlschutter_junixsocket_junixsocket-native-common: junixsocket-native-common 2.6.2` `org_json_json: json 20210307` `shulkerboxslot: Shulker Box Slot 5.0.0-beta.1+1.19.2` `simplylight: Simply Light 1.19-1.4.3` `simplyswords: Simply Swords 1.47.0-1.19.2` `smartbrainlib: SmartBrainLib 1.9` `smarterfarmers: Smarter Farmers 1.19.2-1.7.2` `smoothboot: Smooth Boot 1.19-1.7.1` `smoothchunk: Smooth chunk save Mod 1.19.2-3.5` `snowyspirit: Snowy Spirit 1.19.2-2.2.0` `sodium: Sodium 0.4.4+build.18` `org_joml_joml: joml 1.10.4` `sodium-extra: Sodium Extra 0.4.16+mc1.19.2-build.90` `caffeineconfig: CaffeineConfig 1.0.0+1.17` `soulsweapons: Marium's Soulslike Weaponry 1.1.3-1.19.2-fabric` `spark: spark 1.10.37` `spirit: Spirit 2.2.7` `splash_milk: Splash Milk 1.2.0` `starlight: Starlight 1.1.1+fabric.ae22326` `starterkit: Starter Kit 6.7` `strawgolem: Strawgolem 2.0.1-alpha` `structory: Structory 1.0.1` `structory_towers: Structory: Towers 1.0.0` `supermartijn642configlib: SuperMartijn642's Config Lib 1.1.8+a` `supermartijn642corelib: SuperMartijn642's Core Lib 1.1.17` `t_and_t: Towns and Towers 1.9` `takesapillage: Takes a Pillage 1.0.4` `terrablender: TerraBlender` [`2.0.1.136`](http://2.0.1.136) `terralith: Terralith 2.3.12` `thermoo: Thermoo 1.4.1` `things: Things 0.3.0+1.19` `thonkutil: ThonkUtil 2.15.4+1.19` `thonkutil-base: ThonkUtil Base 1.13.2+4a8c408a57` `thonkutil-capes-v1: ThonkUtil Capes (v1) 1.4.2+3eb2749857` `thonkutil-coords-v1: ThonkUtil Coords (v1) 1.1.2+8ff533c957` `thonkutil-customization-v1: ThonkUtil Customization (v1) 1.1.2+8ff533c957` `thonkutil-legacy: ThonkUtil Legacy 1.1.2+5d4263f557` `thonkutil-modchecker-v1: ThonkUtil ModChecker (v1) 1.1.3+bd4b387957` `thonkutil-potions-v0: ThonkUtil Potions (v0) 1.5.2+8ff533c957` `thonkutil-titlescreen-v1: ThonkUtil TitleScreen (v1) 1.2.2+8ff533c957` `thonkutil-trades-v1: ThonkUtil Trades (v1) 1.2.2+8ff533c957` `tipthescales: Tip The Scales 6.0.10` `tlib: Tenzin Lib 0.3.11-alpha` `toms_storage: Tom's Simple Storage Mod 1.5.10` `toofast: TooFast 1.0.0` `totw_additions: Towers of the Wild: Additions 1.2.4` `trade_cycling: Trade Cycling 1.19.2-1.0.5` `tradingpost: Trading Post 4.2.0` `tramplenomore: TrampleNoMore 9.0.1` `trashcans: Trash Cans 1.0.18` `travelersbackpack: Traveler's Backpack 1.19.2-8.2.33` `travelerstitles: Traveler's Titles 1.19.2-Fabric-3.1.0` `trinkets: Trinkets 3.4.2` `ultris_mr: Ultris: Boss Expansion 5.6.7f` `universal-graves: Universal Graves 2.1.3+1.19.2` `common-protection-api: Common Protection API 1.0.0` `fabric-permissions-api-v0: fabric-permissions-api 0.1-SNAPSHOT` `hologram-api: Hologram API 0.2.2+1.19` `placeholder-api: Placeholder API 2.0.0-pre.1+1.19.2` `server_translations_api: Server Translations API 1.4.18+1.19.2` 
packet_tweaker: Packet Tweaker 0.3.0+1.18.2
 `sgui: sgui 1.1.5+1.19.1` `universalcraft: UniversalCraft 337` `vanilla-hammers: Vanilla Hammers 3.5.0-1.19.2` `magna: Magna 1.8.0-1.19.2` `static-content: Static Content 1.0.2-1.16.2` 
staticdata: Static Data 1.1.2
 `various_update: various_update 1.0.6.5-1.19-1.19.2` `vigilance: Vigilance 297` `visualworkbench: Visual Workbench 4.2.4` `vitalize: Vitalize 1.1.1` `voicechat: Simple Voice Chat 1.19.2-2.5.14` `voidtotem: Void Totem 2.1.0` `wands: Building Wands 2.6.9-release` `winterly: Winterly 0.8.3` `wmitaf: WMITAF 3.1.1` `wondrouswilds: Wondrous Wilds 1.19.2-1.1.6` `xlpackets: XLPackets 1.19.2-4` `yacg: Yet Another Cobblestone Generator 2023.7.3` `modmenu-badges-lib: ModMenu Badges Lib 2023.4.1` `yet-another-config-lib: YetAnotherConfigLib 2.2.0-for-1.19.2` `yungsapi: YUNG's API 1.19.2-Fabric-3.8.10` `yungsbridges: YUNG's Bridges 1.19.2-Fabric-3.1.0` `yungsextras: YUNG's Extras 1.19.2-Fabric-3.1.0` `z_mcwfencesbyg: Macaw's Fences - BYG 1.19.2-1.1` `zoomify: Zoomify 2.9.0` `dev_isxander_settxi_settxi-core: settxi-core 2.10.5` `dev_isxander_settxi_settxi-gui: settxi-gui 2.10.5` `dev_isxander_settxi_settxi-kotlinx-serialization: settxi-kotlinx-serialization` 
submitted by BigBookest- to fabricmc [link] [comments]


2024.05.17 00:26 Slow_Pangolin_1420 My new campaign map (the Relma region)

My new campaign map (the Relma region)
Hey guys! I just made a new map for my campaign. Each hexagon represents 30 km, so it's a day long travel by foot. I'm not super-focused on making a realistic world, but I spent quite some hours making it, and it's actually the expansion of a small region that went from the big lake to the eastern coasts. My party is playing in this setting since 2 years ago, and we had a lot of fun. Even though D&d is very different from LOTR, I love the dea of very long travels by foot (in true LOTR style), so in my homebrew D&d world and campaign, teleport has not been discovered yet. What do you think of it?
https://preview.redd.it/t57ji91n5v0d1.jpg?width=6144&format=pjpg&auto=webp&s=c3536f81f412c8bd101a4e10918e0cfe3ec2a3ba
submitted by Slow_Pangolin_1420 to inkarnate [link] [comments]


2024.05.17 00:05 Zeddblidd Two for 1993 - The Adventures of Huck Finn (1993) / The Sandlot (1993)

2024-187 / Zedd MAP: 67.42 / MLZ MAP: 73.84 / Score Gap: 6.42
Wikipedia?wprov=sfti1#) / IMDb / Official Trailer / Our Collection
From IMDb - Adventures of Huck Finn - In Missouri, during the 1840s, young Huck Finn fearful of his drunkard father and yearning for adventure, leaves his foster family and joins with runaway slave Jim in a voyage down the Mississippi River toward slavery free states.
2024-188 / Zedd MAP: 55.68 / MLZ MAP: 40.50 / Score Gap: 15.18
Wikipedia / IMDb / Official Trailer / Our Collection
From IMDB - The Sandlot - In the summer of 1962, a new kid in town is taken under the wing of a young baseball prodigy and his rowdy team, resulting in many adventures.
I rolled out of bed, took a few minutes to wipe the sleep out of my eyes, get that cup of coffee every new sunrise offers, and sat down in my trusted armchair - Mrs. Lady Zedd pushed play and The Adventures of Huck Finn hit the screen. I guess we’re doing this now - Morning Movies, well - I can bring the movie on whenever.
MLZ is a woman possessed - she’s been driving the big numbers we’ve been making this month: these two make #30 and #31 for the month ((damn)), we’re moving right along. If I’m being honest, I always associated movie watching with myself but Mrs. Lady Zedd is a cinephile’s cinephile. You’d have to get up pretty early in the morning to actively engage motion pictures like she does. She’s interested in any genre and I can’t even make that claim.
Neither of us had seen this incarnation of Huck Finn and it’s pretty much a pedestrian look at the life and times of a kid from a very different walk of life and time… but aren’t we just the same? That seems to be the message of any movie pushing Americana at its core. Nothing wrong with that (per se) but my “propaganda” button goes off at times like these.
“I don’t know why,” I say, “but this movie feels like *The Sandlot - the way it’s put together, the syrupy dialog and the clarity of the picture.” MLZ hmms and ya, see thats as I’m talking. It’s not about the story but the way the story is being told. Wide-eyed look back - that overwhelming feeling that the good old days were then, not now. Maybe it’s just me but I suggest we watch The Sandlot next and she readily agrees.
It’s while I’m filling in The Sandlot’s particulars that I spy (with my little eye) both films are from 1993. Ain’t that just the way. I’m filling in my form and am halfway through the cast when I wonder when each were in the theater? If I had to guess, I’d say Sandlot is pure early summer - Huck Finn could be fall?? I check: Sandlot is April 1, 1993 / Huck Finn is April 2, 1993. ((Blink-blink)) I just stare off in space… guess we picked well, from a date standpoint.
I pull up 1993 in the MCC because I wonder - there’s another motion picture I’d throw into a “feels like this” pile, and there it is: Matinee. “Huh” I say out loud - MLZ says, “Sounds about right.” and that’s when all hell broke loose.
The doorbell rang (despite all sorts of signs asking delivery drivers not to) and the dogs straight up go berserk. There are scratch marks above the top of the door - these pups are serious where the doorbell is concerned. The delivery? The very last Disney Movie Club order (this time for real). I’ll post pictures.
As we come to the end of the second film, I have to ask myself - how would either of these movies landed on me if I was 8 in 1993 (instead of 1979). I’m not sure - both movies share an insipid “the way we were” element, a fake history that I’ve always had a mild allergic reaction too. The kids in ‘79 were all hopped up on the future - NASA, and men walking on the moon, and Star Wars, and Tron… everyone I knew couldn’t hardly wait for what the future would hold… if I could broadcast a message from now to then, I’d simply say, “Live for the moment, the future is pretty shit.”
I asked Mrs. Lady Zedd what she thought and she said, “I think you get way too philosophical about everything.” A long blank stare later, I say about the movies. She said both were “fine”. Elijah Wood was more that cute as Huck, you can see he was already developing as an actor.
As for The Soundlot she gave me that fake smile she gives when something didn’t sit well with her. “The over the top of the movie narration just popped my movie bubble - every - damn - time.” She said it was so awkwardly done, so poorly written, so defectively slapped in there, it’s a brown patch in an otherwise “meh” apple.
I’m left to scratch my head. Things can change over time and my MAP dropped significantly since our last viewing in 2021. I normally look up past write ups to make sure I’m not just restating what’s already been said but I know for a fact that won’t be the case. I’d developed some nostalgia for the movie based on our neighborhood’s regular July 4th block party. The guy down the street played The Sandlot on his garage door every year before the fireworks got started.
Our neighborhood had changed a great deal since the pandemic. People moved on, new (less friendly) people moved in. I hate to say it but politics have transformed things as well. I think many of you will recognize what I’m saying. No more 4th of July (or any other) block parties.
What’s the opposite of nostalgia? Sad sentiments, I guess. We’ll be gone from here sooner than later, I hope something positive will come of our time in Texas - some hidden cause to smile, later, when I think back.
Movie on.
submitted by Zeddblidd to 500moviesorbust [link] [comments]


2024.05.17 00:00 Ultim8_Lifeform Respect Clover! (Undertale Yellow)

Clover

Five humans, missing...
Spoilers for all of Undertale Yellow's main routes below
Undertale Yellow is a fan-made prequel to the hit indie game Undertale. While Undertale follows the story of Frisk, the seventh human child to fall into the monster ruled Underground, Undertale Yellow follows the story of their immediate predecessor. Meet Clover, the sixth human. Unlike the humans that fell before, this gun-toting cowboy is unique in the sense that their journey to the Underground was no accident. Clover entered the Underground voluntarily in order to investigate the disappearances of the previous five humans and, if it turned out they perished at some point after their fall, hoped to avenge their deaths. See, while Frisk possessed a red SOUL that embodied Determination, Clover's SOUL is yellow for the trait of Justice. Clover's journey would lead them all throughout the Underground, meeting some monsters that will be familiar to those who have played Undertale and some brand new faces as well.
Like Undertale before it, Undertale Yellow's story can be altered significantly depending on the player's actions. Perhaps Clover befriends the monsters they meet and determines they were unfairly trapped underground, deciding to sacrifice themselves to bring monster kind closer to freedom. Or maybe Clover will blame the monsters for the deaths of the previous human children, avenging them with swift cruelty. Either way, Clover will act in the way they believe they can best embody Justice.

So How Do the Fights Work Anyway?

Like its predecessor, Undertale Yellow tends to treat RPG mechanics as literal aspects of the game's world. Due to the abstract nature of fights in both Undertale and Undertale Yellow, with enemy monsters targeting Clover's SOUL rather than their physical body, it's understandable that there may be some confusion about how Clover actually scales to certain monsters. Luckily, this is a bit more clear in Undertale Yellow than it was in the original game, as the reveal trailer shows that the attacks of monster are things that Clover physically has to react to and dodge (we even see this same attack utilized in game) even though the battle menu only shows their SOUL.
But this is just for when encounters have already begun, what about before that? And what triggers encounters anyway? There's an area in the Wild East where boulders are falling onto the path that Clover needs to dodge. If they fail to avoid them, this begins an encounter too, where Clover is given the opportunity to avoid the "attacks" in the battle menu to negate damage. Other examples include Clover escaping damage from hot steam after touching it and avoiding damage from Axis' energy balls after they hit them. What this means for standard versus fights is a little vague, but it likely means that any attack that would deal meaningful damage starts an encounter and that it would be impossible to simply kill Clover with a sneak attack. Even if it hit them, Clover would still get the opportunity to dodge before the proper fight begins. That said, there is one example of Clover dying without triggering an encounter at the end of the Neutral Route. It's possible this is because it was an unescapable situation but the mechanics of it are still vague and unclear.
As seen with the previous examples such as the falling boulders and steam, it seems that attacks that hit Clover's SOUL and their physical body are more or less interchangeable. Or rather, it isn't possible to circumvent the SOUL to only hit the physical body because even attacks that hit Clover's physical body will trigger an encounter that can then be dodged or endured by the SOUL.
Finally, it's worth noting that the sizes of objects can vary from their appearances in the battle to what they look like in the overworld. We see Clover's SOUL alongside their physical body a few times throughout the game and it's pretty consistently a little larger than their torso. So this thread will describe feats with that scale in mind.

Other Things To Note

  • At the end of certain routes, Clover acquires certain abilities/powerups that don't necessarily apply to the rest of the game. Feats or items that are limited to those routes will be marked with the corresponding route.
    • [Pacifist] Feat
  • Like your standard RPG's, Undertale Yellow possesses a leveling system that will increase the more enemies that Clover kills, with certain abilities being unlocked after certain levels are achieved. However, in the Genocide route Clover showed off the ability to level up rapidly simply by being filled with enough righteous fury. Abilities that are locked behind certain levels will also be marked accordingly.
    • FeatLV 19
  • The majority of feats will come from Undertale Yellow, but occasionally clips from trailers and other promotional material on the director of the game's Youtube channel will be used, which will be labeled with a T like so:
    • FeatT

Physicals

Strength
Speed/Agility
Durability
Blunt
Falling
Heat
Other

Skill

Justice SOUL

Gear

Note that while Clover can store excess items in boxes they find around the Underground, they can only carry eight items in their inventory not including their current Weapon, Ammo, Armor, and Accessory. Later in the game they discovered the Dimensional Satchel which allows them to access the boxes from anywhere, but they still only have eight slots to bring into an encounter.
Weapons
Guns
Feats
Note that cutscenes will always play out the same regardless of whether the Toy Gun or Wild Revolver is being used, so while the Revolver is obviously the more powerful of the two the Toy Gun is much more powerful than it's name would suggest and the following feats apply to both weapons.
Ammo
Rather amusingly, Clover will jam whatever odd materials they can find into their weapon which somehow works perfectlyT
Armor
Accessories
Food/Healing Items
Note that at their weakest (LV 1), Clover has 20HP and at their strongest (LV20), Clover has 100HP
Single Use
Two Uses
Unlimited Supply

Misc

Somebody calls for help
You answer the call
submitted by Ultim8_Lifeform to respectthreads [link] [comments]


2024.05.16 23:56 Killotaur Can anyone help me figure this error code out?

Exception ticking Lev (at (170, 0, 113)): System.NullReferenceException: Object reference not set to an instance of an object
[Ref 4D13D77F]
at RimWorld.FoodUtility.AcceptableCarnivore (Verse.ThingDef def, RimWorld.FoodKind sourceKind, RimWorld.FoodKind defKind)
at RimWorld.FoodUtility.AcceptableCarnivore (Verse.Thing source, Verse.ThingDef def)
at RimWorld.FoodUtility.AcceptableCarnivore (Verse.Thing food)
at RimWorld.SpecialThingFilterWorker_Vegetarian.Matches (Verse.Thing t)
at Verse.ThingFilter.Allows (Verse.Thing t)
at RimWorld.StorageSettings.AllowedToAccept (Verse.Thing t)
at RimWorld.StorageSettings.AllowedToAccept (Verse.Thing t)
at RimWorld.StoreUtility.TryFindBestBetterStoreCellForWorker (Verse.Thing t, Verse.Pawn carrier, Verse.Map map, RimWorld.Faction faction, RimWorld.ISlotGroup slotGroup, System.Boolean needAccurateResult, Verse.IntVec3& closestSlot, System.Single& closestDistSquared, RimWorld.StoragePriority& foundPriority)
at RimWorld.StoreUtility.TryFindBestBetterStoreCellFor (Verse.Thing t, Verse.Pawn carrier, Verse.Map map, RimWorld.StoragePriority currentPriority, RimWorld.Faction faction, Verse.IntVec3& foundCell, System.Boolean needAccurateResult)
at RimWorld.StoreUtility.TryFindBestBetterStorageFor (Verse.Thing t, Verse.Pawn carrier, Verse.Map map, RimWorld.StoragePriority currentPriority, RimWorld.Faction faction, Verse.IntVec3& foundCell, RimWorld.IHaulDestination& haulDestination, System.Boolean needAccurateResult)
at Verse.AI.Pawn_JobTracker.TryOpportunisticJob (Verse.AI.Job finalizerJob, Verse.AI.Job job)
at Verse.AI.Pawn_JobTracker.StartJob (Verse.AI.Job newJob, Verse.AI.JobCondition lastJobEndCondition, Verse.AI.ThinkNode jobGiver, System.Boolean resumeCurJobAfterwards, System.Boolean cancelBusyStances, Verse.ThinkTreeDef thinkTree, System.Nullable`1[T] tag, System.Boolean fromQueue, System.Boolean canReturnCurJobToPool, System.Nullable`1[T] keepCarryingThingOverride, System.Boolean continueSleeping, System.Boolean addToJobsThisTick, System.Boolean preToilReservationsCanFail)
at Verse.AI.Pawn_JobTracker.TryFindAndStartJob ()
at Verse.AI.Pawn_JobTracker.EndCurrentJob (Verse.AI.JobCondition condition, System.Boolean startNewJob, System.Boolean canReturnToPool)
at Verse.AI.Pawn_JobTracker.JobTrackerTick ()
at Verse.Pawn.Tick ()
at Verse.TickList.Tick ()
submitted by Killotaur to RimWorld [link] [comments]


2024.05.16 23:49 HarryPudding careldindiabloleague

Cisco Router Security
What are the two access privilege modes of the Cisco router?
User EXEC Mode: This is the initial access mode for a router. In this mode, the user can access only a limited set of basic monitoring commands.
Privileged EXEC Mode: This mode provides access to all router commands, such as debugging and configuration commands. It requires a password for access to ensure security.
What is the approach for password for the privileged mode of the router?
enable secret [password]
uses hashing algorithm so that the password is not in plain text but encrypted
How to ensure that all passwords in the router are stored in the encrypted form?
service password-encryption
What is the difference between the Cisco router’s startup and running configurations?
How to save the running configuration into start up configuration?
Startup Configuration: Stored in the NVRAM, this configuration is used to boot the router. It remains unchanged until an administrator explicitly saves the running configuration to it.
Running Configuration: Held in the router’s RAM, this configuration is active on the router. Changes to the router’s configuration are made here and are effective immediately.
Know and be able to configure all aspects of the Cisco router covered in class. For example,
configuring the router interfaces, setting the router OSPF ID, etc.
enable
configure terminal
hostname MyRouter
interface GigabitEthernet0/0
ip address 192.168.1.1 255.255.255.0
no shutdown
exit
interface Serial0/0/0
ip address 10.0.0.1 255.255.255.252
clock rate 64000
no shutdown
exit
router ospf 1
router-id 1.1.1.1
network 192.168.1.0 0.0.0.255 area 0
exit
enable secret mysecretpassword
line console 0
password myconsolepassword
login
exit
line vty 0 4
password myvtypassword
login
exit
crypto key generate rsa
ip ssh version 2
ip ssh time-out 60
ip ssh authentication-retries 2
ip route 0.0.0.0 0.0.0.0 192.168.1.254
access-list 10 permit 192.168.1.0 0.0.0.255
access-list 10 deny any
Practical Routing, OSPF, and Security
What is the difference between static and dynamic routing?
Static Routing: Involves manually setting up routes in the router's routing table through configuration commands. These routes do not change unless manually updated or removed. Static routing is simple, secure, and uses less bandwidth but lacks scalability and flexibility.
Dynamic Routing: Automatically adjusts routes in the routing table based on current network conditions using routing protocols. This approach allows for more flexibility, scalability, and fault tolerance, but consumes more resources and can be complex to configure.
What is the difference between link state and distance vector routing?
Distance Vector Routing: Routers using distance vector protocols calculate the best path to a destination based on the distance and direction (vector) to nodes. Updates are shared with neighboring routers at regular intervals or when changes occur. This approach can lead to slower convergence and issues like routing loops.
Link State Routing: Each router learns the entire network topology by exchanging link-state information. Routers then independently calculate the shortest path to every node using algorithms like Dijkstra’s. This results in quicker convergence and fewer routing loops.
Distance Vector Routing: Each router computes distance from itself to its next immediate neighbors. (RIP, EIGRP, & BGP)
-Does not build a full map of the network
-Focuses more on the next hop towards the destination
Link State Routing: Each router shares knowledge of its neighbors with every other router in the network. (OSPF and IS-IS)
-Builds a full map of the network
-Each router shares information
-Maintains a database of the entire network.
Give an example of the distance vector and link state algorithms.
Distance = RIPLink State = OSPF
What type of protocol is Routing Information Protocol (RIP)? Be able to understand
examples and solve problems.
Example of a distance vector protocol
dynamic protocol
-shares routing info with neighboring routers
-an interior gateway protocol that operates within autonomous system
-oldest of all dynamic protocol; RIPv1
-widely used open standard developed by IETF
-a distance vector routing protocol
-limited to maximum 15 hops;
 how rip works -rip sends regular update message (advertisements to neighboring routers) 
-every 30 seconds that resets after each successful ack
-route becomes invalid if it has not received a message for 180 seconds
-RIPv1 (obsolete) uses broadcast, while RIPv2 uses a multicast address -Update message only travel to a single hop
downside : limitations, each router in its table can only have one entry per destination. Have to wait for advertisement for an alternative path, cannot reach hops 15 paths away, little to no security.
What type of protocol is Open Shortest Paths First (OSPF) protocol? Be able to under-
stand examples and solve problems.
-a link state routing protocol
 intra as routing with RIP 
What is the Link State Advertisement (LSA) in OSPF? What is the Link State Database
(LSDB)?
-LSA contains data about a router, its subnets, and some other network information.-OSPF puts all the LSAs from different routers into a Link-State Database (LSDB)
The goal of OSPF is to be able to determine a complete map of the interior routing path to be able to create the best route possible.
The way this is done is that OSPF finds all the routers and subnets that can be reached within the entire network. The result is that each router will have the same information about the network by sending out LSA.
How does each router in OSPF create a map of the entire network?
Step 1 : Acquire neighbor relationship to exchange network information.
Step 2: Exchange database information, neighboring routers swap LSDB information with each other
Step 3: Choosing the best routes, each router chooses the best routes to add to its routing table based on the learned LSDB information.
What is the process for two OSPF routers to become neighbors?
A. a neighbor sends out a Hello packet including the router ID along with subnets that it routes to the given multicast address to a given OSPF area ID.
this is also a way for routers to tell neighbors that they are still on and good to go. 
B. Once other routers receive this packet, they run some checks. The neighboring routers must match the following requirements:
-area id needs to be the same (also used when scaling up OSPF)
-the shared or connecting link should be on the same subnet.
-The Hello and dead timer must be the same.
-the dead timer is having enogh time before the sending router assumes that the neighbor is down.
-this timer is typically 10 secs for point-to-point and broadcast networks.
C. If all is fine, the receiving router will go into Init stage and sends a hello message of its own. This Hello packet list its own network info along with the known neighbor R1. This puts R1 into a 2-way communication status.
D. R1 sends another Hello message to R2 with the information as a known neighbor. This allows the R2 now with a 2-way communication status as well.E. We now have a 2-way neighboring routers
What is the difference between point-to-point and multi-access networks? How does OSPF
handle each case?
Point-to-Point: A network setup where each connection is between two specific nodes or devices. OSPF treats these links with straightforward neighbor relationships since there are only two routers on each segment. 
Multi-Access Networks: Networks where multiple routers can connect on the same segment, such as Ethernet. OSPF uses a Designated Router (DR) and a Backup Designated Router (BDR) on these types of networks to reduce the amount of OSPF traffic and the size of the topological database.
DR selected by the highest OSPF prio.
Be able to configure OSPF routing given a topology.

Example:
Consider a topology with three routers R1, R2, and R3. The routers
are connected R1 =⇒R2 =⇒R3 =⇒R1.
R1 has interface f0/0 connected to the
interface f0/0 of R2. R2 has interface f0/1 connecting to the interface f0/0 of R3.
Finally R3 has interface 1/0 connecting to the interface 1/0 of R3. Assuming all
routers are Cisco 7200 routers, configure them to use OSPF to dynamically route in
this topology (you will be given the Cisco router manual for such questions).

R1enable
configure terminal
hostname R1
interface FastEthernet0/0
ip address 192.168.12.1 255.255.255.0
no shutdown
exit
interface FastEthernet1/0
ip address 192.168.31.1 255.255.255.0
no shutdown
exit
router ospf 1
router-id 1.1.1.1
network 192.168.12.0 0.0.0.255 area 0
network 192.168.31.0 0.0.0.255 area 0
exit
end
write memory
R2enable
configure terminal
hostname R2
interface FastEthernet0/0
ip address 192.168.12.2 255.255.255.0
no shutdown
exit
interface FastEthernet0/1
ip address 192.168.23.1 255.255.255.0
no shutdown
exit
router ospf 1
router-id 2.2.2.2
network 192.168.12.0 0.0.0.255 area 0
network 192.168.23.0 0.0.0.255 area 0
exit
end
write memory
R3enable
configure terminal
hostname R3
interface FastEthernet0/0
ip address 192.168.23.2 255.255.255.0
no shutdown
exit
interface FastEthernet1/0
ip address 192.168.31.2 255.255.255.0
no shutdown
exit
router ospf 1
router-id 3.3.3.3
network 192.168.23.0 0.0.0.255 area 0
network 192.168.31.0 0.0.0.255 area 0
exit
end
write memory
How does OSPF authenticate packets to protect against packet spoofing and tempering?
Be able to enable it a Cisco router.
OSPF (Open Shortest Path First) can authenticate packets to protect against packet spoofing and tampering using several methods. The two main types of authentication are:
Plain Text Authentication: This is simple and provides minimal security. It sends the password in clear text.
Message Digest 5 (MD5) Authentication: This provides stronger security by using cryptographic hash functions to authenticate OSPF packets.
Plain textenable
configure terminal
interface FastEthernet0/0
ip address 192.168.12.1 255.255.255.0
ip ospf authentication
ip ospf authentication-key cisco123
no shutdown
exit
router ospf 1
router-id 1.1.1.1
network 192.168.12.0 0.0.0.255 area 0
area 0 authentication
exit
write memory
MD5enable
configure terminal
interface FastEthernet0/0
ip address 192.168.12.1 255.255.255.0
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 securepassword
no shutdown
exit
router ospf 1
router-id 1.1.1.1
network 192.168.12.0 0.0.0.255 area 0
area 0 authentication message-digest
exit
write memory
Network Defense Fundamentals

What is IP spoofing? Explain.
-The ip packet contains the source and destination Ip addresses.-Is it straightforward to modify the ip address of the packet.
-IP Spoofing: sender chagrin his source address to something other than his real address.
How can IP spoofing be used in security attacks?
-If the attacker sends an Ip packet with a spoofed IP, they will not receive a response form the destination: the machine with the IP matching the spoofed IP will receive the response.Ip spoofing operation - the sender spoofs the source IP address to point to another target. The receiver system replies to the spoofed IP.

What are the countermeasures to IP spoofing?
Ingress and Egress Filtering: Network operators should implement filtering rules on routers and firewalls to block packets with source IP addresses that should not originate from those networks. Ingress filtering blocks incoming packets with a source IP address that is not valid for the network, while egress filtering blocks outgoing packets with an invalid source IP address.
Reverse Path Forwarding (RPF): This technique ensures that the incoming packets are received on the same interface that the router would use to send traffic back to the source. If the path does not match, the packet is discarded, preventing spoofed packets from passing through.
IPsec (Internet Protocol Security): IPsec can be used to authenticate and encrypt IP packets, ensuring that they come from legitimate sources and have not been tampered with. This makes spoofing attacks significantly more difficult.
How can IP spoofing be used to perform DoS attacks?
IP spoofing is often used in Denial of Service (DoS) attacks to obscure the attacker's identity and to overwhelm the target with traffic from what appears to be multiple sources. One common type of DoS attack that utilizes IP spoofing is a Smurf Attack. In a Smurf Attack, the attacker sends ICMP (Internet Control Message Protocol) echo requests to broadcast addresses of networks, with the source IP address spoofed to that of the victim. The devices on the network respond to the echo requests, sending replies back to the victim's IP address. This amplifies the traffic directed at the victim, potentially overwhelming their network and causing a DoS condition.

Know how to use
hping3
for performing ping floods.
Using hping3 to perform ping floods involves sending a high volume of ICMP Echo Request packets to a target to overwhelm it.basic ping floodsudo hping3 -1 --flood [target_IP]
Using spoofed source ipsudo hping3 -1 --flood -a [spoofed_IP] [target_IP]
Controlling the Packet Sending Rateo hping3 -1 --flood -i u1000 [target_IP]Combining sudo hping3 -1 --flood -a 10.0.0.1 -i u1000 192.168.1.1
Firewalling
What is a firewall?
a filtering device on a network that enforces network security policy and protects the network against external attacks.
According to NIST SP 800-41, what are the characteristics of a firewall?
NIST standard defines the possible characteristics that a firewall can use to filter traffic.
-(IP Address and Protocol type) filtering based on source/destination IP address/ports, traffic direction and other transport layer characteristics.
-(Application Protocols)controls access based on application protocol data
-(User identity) controls access based on user identity
-(Network activity)
What are the limitations of the firewall?
Firewall capabilities: -Define a traffic chokepoint in the network and protects against IP spoofing and routing attacks
-Provide a location for monitoring the security events -Provide non-security functions: loggin internet usage, network address translation-Serve as platform for VPN/IPSec
Firewall limitations:-protect against attacks bypassing the firewall, connections from inside the organization to the outside that do not go through the firewall.-protect against internal threats such as disgruntled employees.
What is a packet filter firewall? Be able to write and interpret rules and to spot configu-
rationflaws.
Packet filtering firewall : applies a set of rules to each packet based on the packet headers.Filters based on: source/destination IP, source/destination port numbers, IP Protocol Field:defines the transport protocol, Interface : for firewalls with 3+ network interfaces, the interface from which the packet came from/going to

What is the difference between the default and allow and default deny policies? Which
one is the more secure one?
-when no rules apply to a packet, a default rule is applied: default deny : what is not explicitly permitted is denied default forward : what is not explicitly denied is allowed
default deny is more secure, you dont have to identify all of the cases that needs to be blocked, if one is missed, default deny will deny it.
Port 0-1023 reserved
1024-2**17 ephemeral
source port used by the system initialiatizng a connection is always chosen from the ephemeral ports
Be able to configure the packet filtering functions of iptables.

Example:
Write iptables rules to block all ICMP traffic to and from the system.
iptables -A INPUT -p icmp -j DROP
iptables -A OUTPUT -p icmp -j DROP
Example:
Write iptables rules to block all traffic on port 22
iptables -A INPUT -p tcp --sport 22 -j DROP
iptables -A OUTPUT -p tcp --dport 22 -j DROP

Example:
Write iptables rules to block traffic to host 192.168.2.2
iptables -A OUTPUT -p tcp --dest 192.168.2.2 -j DROP
iptables -A INPUT -p tcp --src 192.168.2.2 -j DROP
What are the limitations of the packet filter firewall?
-does not examine upper layer data : cannot prevent attacks that employ application specfic vulnerabilities or functions.cannot block application specific commands.

What is the stateful firewall and how does it compare to a packet filter?
A stateful firewall is a network security device that monitors and tracks the state of active connections, making decisions based on the context of the traffic. Unlike a simple packet filter, which examines individual packets in isolation based on predetermined rules, a stateful firewall keeps track of connections over time, distinguishing between legitimate packets that are part of an established session and potentially malicious ones. This contextual awareness allows it to block unauthorized connection attempts and prevent attacks such as spoofing and session hijacking. While packet filters, or stateless firewalls, operate faster and consume fewer resources by applying static rules to each packet independently, they lack the sophisticated traffic pattern handling and enhanced security provided by stateful firewalls.

What is the application-level firewall? What are its advantages and limitations?
An application-level firewall, also known as an application firewall or proxy firewall, operates at the application layer of the OSI model. It inspects and filters traffic based on the specific application protocols (e.g., HTTP, FTP, DNS) rather than just IP addresses and port numbers. limitations : increased communications overhead due to two separate TCP connections
 and not transparent to the client 
Application-level gateways are also known as application-level proxies.
-act as a relay for the application-level traffic.
-runs at the application layer, and examines application-layer data
Supported ProtocolsFTPSTMPHTTP
What is a circuit-level firewall? What are its advantages and limitations?
-Similar to the application-level gateway, but only tracks the state of the TCP/UDP sessions.
-Does not examine application data , simply relays TCP segments
-Allow/deny decisions based on whether a packet belongs to an established and trusted connection
Advantage of circuit-level firewall -do not filter individual packets(simplifies rules)
-fast and efficient 
Disadvantages:
-do not filter individual packets -require frequent updates: traffic is filtered with rules and policies that need regular updates for new threats and risks -the vendor needs to modify the TCP/IP implementation for thor applications to use the circuit-level proxy. 
What are the different approaches to basing the firewall?
-stand-alone machines -software modules in roosters, switches, or servers, or pre-configured security appliances. 
What are the host-based firewalls?
Host-based firewalls: a firewall software module used to secure a single host.
What are the network device firewalls?
Network device firewall = routers and switches often have firewall functions, like packet filtering and stateful inspection, to check and filter packets
What are the virtual firewalls?
-in a virtualized environment, servers, switches, and routers can be virtualized and share physical hardware. The hypervisor that manages the virtual machines can also have firewall capabilities.
What is the DMZ? How is it used for securing networks?
A Demilitarized Zone (DMZ) in network security is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, typically the internet. The primary purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN). By isolating these externally accessible services, the DMZ ensures that if an attacker gains access to the public-facing systems, they do not have direct access to the rest of the network.
How the DMZ Secures Networks
Isolation of Public Services: Services that need to be accessible from the outside, such as web servers, mail servers, FTP servers, and DNS servers, are placed in the DMZ. These services are isolated from the internal network, which helps protect the internal systems from attacks that may exploit vulnerabilities in the public-facing services.
Controlled Access: Firewalls are used to create boundaries between the internet, the DMZ, and the internal network. The firewall rules are configured to allow only specific types of traffic to and from the DMZ. For example, incoming web traffic might be allowed to reach a web server in the DMZ, but not to access internal systems directly.
Minimal Exposure: Only the necessary services are exposed to the internet. This minimizes the attack surface, reducing the number of entry points that an attacker can exploit. Internal systems and data remain protected behind the additional layer of the firewall.
Layered Security: The DMZ provides an additional layer of defense (defense-in-depth). Even if an attacker manages to compromise a server in the DMZ, the internal network is still protected by another firewall, making it harder for the attacker to penetrate further.
Monitoring and Logging: Activities within the DMZ can be closely monitored and logged. Any suspicious behavior can be detected early, and appropriate actions can be taken to mitigate potential threats before they impact the internal network.
Traffic Filtering: The firewalls between the internet and the DMZ, as well as between the DMZ and the internal network, can filter traffic based on IP addresses, ports, and protocols. This filtering ensures that only legitimate traffic is allowed and that malicious traffic is blocked.
-if attacker compromises a server on the network, they will be able to pivot to other systems on the network.
What are the advantages and disadvantages of having the two DMZ firewalls be from
different vendors?
Using different firewall manufacturers for the two firewalls maybe a good idea, avoids possibility of both having the same vulnerability but introduces more complexity and management overhead.
Be able to write pfSense firewall rules
Penetration Testing

What is penetration testing?
-legal and suthorzied attempt to locate and exploit vulnerable systems for the purpose of making those systems more secure.
pen testing, pt, hacking, ethical hacking, whitehate hacking, offensive security, red teaming 
What is the objective of the penetration testing?
Use tools and techniques used by the attackers in order to discover security vulnerabilities before the attackers do. 
What is the BAD pyramid?
The purpose of a red team is to find ways to improve the blue team, so purple teams should not be needed in an organization where the red/blue teams interaction is healthy and functioning properly. 
red attack
purple defender changes based off attack knowledge
blue defend
green builder changes based on defender knowledge
yellow build
orange builder changes based on attacker knowledge
Why are the penetration tests conducted?
-a company may want to have a stronger understanding of their security footprint.
-system policy shortcomings -network protocol weaknesses -network/software misconfigurations -software vulnerabilities 
What is the difference between penetration testing and vulnerability assessment?
-two terms often incorrectly ,interchangeably used in practice.
-vulnerability assessment : review of systems services to find potential vulnerabilities-penetration testing: finding an exploiting system vulnerabilities as proof-of-concept
What is the difference between black-box, white-box, and grey-box testing.
Black-Box Testing
Tester Knowledge: The tester has no knowledge of the internal structure, code, or implementation details of the system.
-lack knowledge of system
White-Box Testing
Tester Knowledge: The tester has full knowledge of the internal structure, code, and implementation details of the system.
-very thorough , but not completely realistic
Grey-Box Testing
Tester Knowledge: The tester has partial knowledge of the internal structure, code, or implementation details of the system.
What is the difference between ethical and unethical hackers?
-penetration testers, with proper authorization of the company, help improve the security of the company.
-unethical hackers, personal gain through extortion or other devious methods, profit, revenge, fame, etc. No authorization to conduct the attacks
•Ethical vs unethical hacking, penetration testers: obtain the authorization from the organization whose systems they plan to attack unethical hackers: attack without authorization.
Know the stages of penetration testing and the importance of following a structured ap-
proach.

Planning and Reconnaissance:
Planning: Define the scope and goals of the test, including the systems to be tested and the testing methods.
Reconnaissance: Gather information about the target, such as IP addresses, domain names, and network infrastructure, to understand how to approach the test.
Scanning:
Purpose: Identify potential entry points and vulnerabilities in the target system.
Methods: Use tools to scan for open ports, services running on those ports, and known vulnerabilities.
Gaining Access:
Purpose: Attempt to exploit identified vulnerabilities to gain unauthorized access to the system.
Techniques: Use techniques like password cracking, SQL injection, or exploiting software vulnerabilities.
Maintaining Access:
Planning and Reconnaissance:
Purpose: Ensure continued access to the compromised system to understand the potential impact of a prolonged attack.
Methods: Install backdoors or use other methods to maintain control over the system.
Analysis and Reporting:
Scanning
Purpose: Document the findings, including vulnerabilities discovered, methods used, and the level of access achieved.
Report: Provide a detailed report to the organization, highlighting the risks and recommending steps to mitigate the vulnerabilities.
Remediation:
Gaining Access
Purpose: Address and fix the identified vulnerabilities to improve the security of the system.
Action: Implement the recommended security measures from the report to protect against future attacks.
Retesting:
Maintaining Access
Purpose: Verify that the vulnerabilities have been successfully remediated.
Process: Conduct a follow-up test to ensure that the fixes are effective and no new issues have been introduced.
Importance of Following a Structured Approach
Consistency: A structured approach ensures that each stage is systematically followed, making the testing thorough and reliable.
Comprehensiveness: Following each stage helps identify and address all potential vulnerabilities, leaving no gaps in the security assessment.
Documentation: A structured method produces detailed documentation, which is crucial for understanding the security posture and for future reference.
Effectiveness: It ensures that the penetration test effectively mimics real-world attack scenarios, providing valuable insights into how an actual attacker might exploit vulnerabilities.
Risk Management: By identifying and addressing vulnerabilities, organizations can proactively manage security risks and protect their assets from potential attacks.
Example:
What is the difference between the passive and active reconnaissance?

Passive Reconnaissance
Definition: Gathering information about the target without directly interacting with the target system or network. The aim is to collect data without alerting the target.
Methods:
Publicly Available Information: Searching for information that is freely available on the internet, such as social media profiles, company websites, and news articles.
DNS Queries: Looking up domain registration information (WHOIS data), DNS records, and IP address ranges.
Network Traffic Analysis: Capturing and analyzing network traffic without sending packets to the target (e.g., using tools like Wireshark in a non-intrusive manner).
Search Engines: Using search engines to find information about the target, such as employee names, email addresses, and technical details.
Advantages:
Low Risk: Minimizes the chance of detection by the target because no direct interaction occurs.
Stealth: Suitable for the early stages of reconnaissance when the goal is to remain undetected.
Disadvantages:
Limited Information: May not provide as much detailed or specific information about vulnerabilities or configurations as active reconnaissance.
Active Reconnaissance
Definition: Actively engaging with the target system or network to gather information. This involves direct interaction, such as sending packets or probing the target.
Methods:
Network Scanning: Using tools like Nmap to scan for open ports, running services, and network topology.
Vulnerability Scanning: Running vulnerability scanners (e.g., Nessus, OpenVAS) to identify known weaknesses in the target systems.
Social Engineering: Directly interacting with individuals (e.g., phishing attacks) to gather information.
Probing and Enumerating: Sending specific queries or packets to the target to elicit responses that reveal information about the system (e.g., banner grabbing).
Advantages:
Detailed Information: Provides more detailed and specific information about the target's vulnerabilities, configurations, and active services.
Identification of Weaknesses: More effective in identifying exploitable vulnerabilities that can be used in subsequent attack phases.
Disadvantages:
Higher Risk: Increases the risk of detection by the target, which could alert them to the reconnaissance activity.
Potential Legal Issues: Unauthorized active reconnaissance can lead to legal repercussions if done without permission.
Summary
Passive Reconnaissance: Involves gathering information without direct interaction with the target, resulting in lower risk of detection but potentially less detailed information.
Active Reconnaissance: Involves direct interaction with the target to gather detailed information, but carries a higher risk of detection and potential legal consequences.
Both types of reconnaissance are essential in penetration testing to understand the target's environment and identify potential vulnerabilities while balancing the need for stealth and detailed information.
Be able to use the penetration testing tools discussed in class
nmap 192.168.1.1
nmap -sS -sV -O -A 192.168.1.1-sS: Perform a stealth SYN scan.
-sV: Detect service versions.
-O: Detect operating system.
-A: Perform aggressive scan (includes OS detection, version detection, script scanning, and traceroute).
submitted by HarryPudding to u/HarryPudding [link] [comments]


http://swiebodzin.info