Daily web proxy groupsm

Full Movies found on Sockshare

2013.06.26 22:39 Full Movies found on Sockshare

A place for Sockshare links
[link]


2017.02.25 18:42 Open Source Investigations and Evidence-Based Working Theories

Open Source Investigations related to George Webb's Thesis
[link]


2024.05.22 01:55 0902panda0902 Doctors thought I had MS due to my symptoms but now I’ve been diagnosed with FND instead.

UK based.
TLDR: ongoing symptoms of MS for the last 4 weeks but I have now been diagnosed with FND.
It all started 4 weeks ago when I felt extremely fatigued and light headed. I drove home after work at 5pm and suddenly I had lost all control of the movement in my arms. It was like a partial paralysis. An ambulance was called and they took me to the stroke unit where they did a CT scan of the brain and kept me in overnight. The use of my arms came back at around 10pm.
The next day, they carried out MRI scans on my brain and in my spine, all of which ruled out a stroke. They referred me for an urgent neurology appointment (which was 4 weeks later).
Since then, I have experience at least one or more of the following symptoms daily: - loss of control in my arms - loss of control in my right leg - stabbing pains in my thigh - extreme fatigue - vertigo and dizziness - numbness of the muscles in my face - tingling and cold sensations through my upper body - muscle spasms and tremors in my hand
These symptoms can last between 30mins to 6hours.
When I was younger, I had optic neuritis which lasted just over a week and the scan showed small lesions of MS. They had mentioned if I have other spells in the future that it would likely be diagnosed as MS. With this information and all the symptoms I have experienced we all assumed this would be the case. Every symptom I had is a symptom of MS, and in all honesty, I was waiting for the neurology appointment to confirm this.
Anyway, I had the appointment this morning and to my surprise he said the scans are clear and it is not MS (he was also an MS specialist). He told me that I have Functional Neurological Disorder. I was shown a web page that outlined this and not much further advice was able to be given in terms of how to manage my symptoms on a daily basis, particularly with work.
I am being sent for further bloods to check my vitamin levels and have a catch up appointment in a month’s time.
Having researched this throughout the day, I can see what a broad spectrum FND covers. Is it just a diagnosis they give when they don’t know what is wrong with the signals to your nervous system? Has anyone had a similar experience? Is it worth going private and getting a second opinion? Will the symptoms get better?
submitted by 0902panda0902 to MultipleSclerosis [link] [comments]


2024.05.22 01:48 0902panda0902 Newly diagnosed with FND - has anyone had a similar experience?

UK based.
TLDR: ongoing symptoms of MS for the last 4 weeks but I have now been diagnosed with FND.
It all started 4 weeks ago when I felt extremely fatigued and light headed. I drove home after work at 5pm and suddenly I had lost all control of the movement in my arms. It was like a partial paralysis. An ambulance was called and they took me to the stroke unit where they did a CT scan of the brain and kept me in overnight. The use of my arms came back at around 10pm.
The next day, they carried out MRI scans on my brain and in my spine, all of which ruled out a stroke. They referred me for an urgent neurology appointment (which was 4 weeks later).
Since then, I have experience at least one or more of the following symptoms daily: - loss of control in my arms - loss of control in my right leg - stabbing pains in my thigh - extreme fatigue - vertigo and dizziness - numbness of the muscles in my face - tingling and cold sensations through my upper body - muscle spasms and tremors in my hand
When I was younger, I had optic neuritis which lasted just over a week and the scan showed small lesions of MS. They had mentioned if I have other spells in the future that it would likely be diagnosed as MS. With this information and all the symptoms I have experienced we all assumed this would be the case. Every symptom I had is a symptom of MS, and in all honesty, I was waiting for the neurology appointment to confirm this.
Anyway, I had the appointment this morning and to my surprise he said the scans are clear and it is not MS (he was also an MS specialist). He told me that I have Functional Neurological Disorder. I was shown a web page that outlined this and not much further advice was able to be given in terms of how to manage my symptoms on a daily basis, particularly with work.
I am being sent for further bloods to check my vitamin levels and have a catch up appointment in a month’s time.
Having researched this throughout the day, I can see what a broad spectrum FND covers. Is it just a diagnosis they give when they don’t know what is wrong with the signals to your nervous system? Has anyone had a similar experience? Is it worth going private and getting a second opinion? Will the symptoms get better?
submitted by 0902panda0902 to FND [link] [comments]


2024.05.22 01:24 thesayke PSA: Palestinian-ism is a fascist ideology. Biden not embracing it shouldn't be surprising. Here's why

Fascism has a number of essential characteristics but the most distinct is palingenetic ultranationalism: The myth that the nation is an organic body composed of a downtrodden but authentic "common people" who have been betrayed, victimized, and derived of land and money by out-groups (especially Jews, LGBT folks, immigrants, and liberals), and the nation must be reborn and grown larger, phoenix-like, from the ashes of its downtrodden state through the cleansing fire of violence against those out-groups and their allies (especially their allies among the "common people") and the seizure of their land and property, regardless of how many "common people" must be sacrificed in this process of violent "purification"
https://en.wikipedia.org/wiki/Palingenetic_ultranationalism
Palestinian nationalism has all these definitional features. Its central myth is that "the Palestinians" (whose language, Arabic, lacks the letter P) have been betrayed, oppressed, and deprived of their land and money by Jews, and "Palestine" must be reborn and grown larger, phoenix-like, from the ashes of its current corrupt theocracy through the cleansing fire of violence against Jews, LGBT people, and liberals (especially liberal Arabs who believe in co-existence with Jews and LGBT people), and all those who support them, regardless of how many human shields, child soldiers, and hospitals with bunkers underneath them must be sacrificed in this process of purification
This Palestinian ideological mythos entirely reverses victim and perpetrator
In the real world, there is an extensive and well corroborated archeological record (starting with the Merneptah Stele) showing the continuous residence of the indigenous Jewish inhabitants in the land between the river and the sea, but that Stele alone independently establishes their presence for at least the last 3200 years
https://en.wikipedia.org/wiki/Merneptah_Stele
In contrast, the Arab-Israeli conflict started relatively recently, with the battle of Tel Hal on March 1st 1920, when an Arab militia attacked the Jewish-owned farms at Tel Hal in an attempt to find French soldiers, eventually burning it to the ground. Prior to that there was no organized violence between Arabs and Israelis in the region:
https://en.wikipedia.org/wiki/Battle_of_Tel_Hai
The next incident in the Arab-Israel conflict was the Nebi Musa riots a month later, on April 8th 1920, when Amin al-Husayni (who later allied with the Nazis and was a big fan of Hitler) gave an incendiary speech from the balcony of the Arab Club, kicking off what resulted in an Muslim mob of around 60,000 ransacking of the Jewish quarter of Jerusalem:
https://www.palquest.org/en/historictext/6709/palin-commission-report
That's what started the war. It started with Arab people committing mob violence against Jewish people and that has never stopped to this day. Genocide is what Nazi and Communist-inspired Arab mobs and armies have repeatedly tried to do to the indigenous Jewish people of the land between the river and the sea, starting from the 1920 Nebi Musa riots, and continuing on through 1948, 1967, 1973, 1982, 1987, 2000, and most recently on October 7th
They keep trying to eradicate Jewish people off the land their ancestors lived in continuously for thousands of years, they keep getting their asses kicked every time they try it, and they deserve it every time they do
This makes sense when you understand the history of the region, and how Arab-ness was imposed by force (along with Islam) by multiple relatively historically recent waves of conquering Muslim settler-colonists
The Ottoman Empire was the culmination of those waves of Muslim settler-colonists, and after World War I it collapsed and in much of the Middle East was followed by Pan-Arab nationalism, which was a remarkably Nazi project. The founder of modern Palestinian religious nationalism (Amin al Husseini) was a close ally and personal friend of Hitler
https://time.com/4084301/hitler-grand-mufi-1941/
https://www.timesofisrael.com/full-official-record-what-the-mufti-said-to-hitle
After waging and escalating series of genocidal pogroms against the indigenous Jewish people (culminating in their alliance with the Nazis in World War II) and getting their asses kicked, Palestinian nationalism (as distinct from pan-Arab nationalism) emerged a fundamentally Soviet project
That is not an exaggeration. 100 years ago most people in the region defined themselves as Ottoman, by their village, or by their religion. Arab nationalism is a relatively new socially constructed weapon, made up by unambiguous fascists (like Sati Al-Husri, Abdulrahman Badawi, and Amin al-Husseini) and communists (like Fawaz Taraboulsi or Suhayl Idris) to mobilize hate against and justify the murder of their imperfect but much more reasonable democratic enemies (who also happened by the enemies of the Nazis and Soviets)
https://www.tabletmag.com/sections/israel-middle-east/articles/liberation-arabs-global-left
Palestinian nationalism, as opposed to Arab nationalism, was created by the KGB after the repeated defeats of the USSR's Arab-nationalist proxies in 1948 and 1967. The blueprint for the PLO Charter was drafted in Moscow in 1964 and was approved by 422 Palestinian representatives hand-selected by the KGB. At that time, the USSR was in the business of creating "people’s liberation" fronts. The KGB founded the PLO as well as the National Liberation Army of Bolivia in 1964 led by Ernesto "Che" Guevara, and the National Liberation Army of Colombia in 1965
The “Palestinian Liberation Army” was contrived by the KGB, much like the KGB devised the Bolivian National Liberation Army, Greek People's Liberation Army, Malayan National Liberation Army, etc etc. It created this Arab army in the early 1960s following the failure of the troops of various Soviet-puppet-ruled Arab states to destroy Israel. The KGB drafted the Palestinian National Charter and handpicked the 422 members of the PLO council that approved it. As the KGB's director said at the time, "We needed to instill a Nazi-style hatred for the Jews throughout the Islamic world, and to turn this weapon of the emotions into a terrorist bloodbath against Israel". Likewise, both the Palestine National Covenant and Palestinian Constitution were drafted in Moscow
https://stanfordreview.org/deception-palestinian-nationalism/
https://en.wikipedia.org/wiki/Soviet_involvement_in_regime_change
The most popular Palestinian faction currently, Hamas, pointedly opposes multi-ethnic pluralistic democracy. That's what Israel already is and they hate it. Hamas also explicitly opposes a two-state solution, wants to expel and murder Jews, and impose an Islamic theocracy by force
The founding covenant of Hamas, which they created their terrorist organization around in 1988, opens with a message that precisely encapsulates Hamas’s master plan. Quoting Hassan al-Banna, the Egyptian founder of the Muslim Brotherhood, of which Hamas is a constituent member (Article 2), the document proclaims, “Israel will exist and will continue to exist until Islam will obliterate it, just as it obliterated others before it.”
After some general explanatory language about Hamas’s religious foundation and noble intentions, the covenant comes to the Islamic Resistance Movement’s raison d’être: the slaughter of Jews. “The Day of Judgement will not come about,” it proclaims, “until Moslems fight the Jews, when the Jew will hide behind stones and trees. The stones and trees will say O Moslems, O Abdulla, there is a Jew behind me, come and k-ll him.”
Article 11 spells out why this annihilation of Jews is required. Palestine is described as an “Islamic Waqf”—an endowment predicated on Muslim religious, education, or charitable principles and therefore inviolate to any other peoples or religions. Accordingly, the territory that now encompasses Israel, Gaza, and the West Bank is:
consecrated for future Moslem generations until Judgement Day. It, or any part of it, should not be squandered: it, or any part of it, should not be given up … This Waqf remains as long as earth and heaven remain. Any procedure in contradiction to Islamic Sharia, where Palestine is concerned, is null and void.
In sum, any compromise over this land, including the moribund two-state solution, much less coexistence among faiths and peoples, is forbidden.
https://web.archive.org/web/20231010215457/https://www.theatlantic.com/international/archive/2023/10/hamas-covenant-israel-attack-war-genocide/675602/
And Hamas has the support of somewhere between 65-80% of the Palestinian people
https://www.awrad.org/en/article/10719/Wartime-Poll-Results-of-an-Opinion-Poll-Among-Palestinians-in-the-West-Bank-and-Gaza-Strip
To understand the Palestinian strategy in this latest phase of their forever war, see here:
How Hamas Uses Civilians as a Weapon - The Dark Side of Clausewitzian War
https://deadcarl.substack.com/p/how-hamas-uses-civilians-as-a-weapon
Both Palestinian leadership and street have repeatedly acting as willing pawns, first of the Nazis, then of the Soviets, and now of the contemporary fascist Axis that includes Russia, China, and Iran. The historical Palestinian embrace of Nazi, Soviet, Islamist, and modern Axis fascism (and their rejection of democracy and equal rights) only makes their rationale for doing do so, and the nature of their project, more clear
In this context, Biden's support for Israel should not be surprising. Palestinian-ism is fascist, and everyone who understands and opposes fascism should oppose it
submitted by thesayke to conservativeterrorism [link] [comments]


2024.05.22 00:02 legitmaxwu Generate surprisingly good (90% accuracy) Radar rules using Sigma reports

If you frequently see fraud slip through your Radar ML/rule protections, this is for you!
My cofounder and I are building in the fraud space right now, and we noticed for some of our customers, some pretty blatant fraud cases get through with low to medium risk scores.
We looked into their historical transaction data via Stripe Sigma (which includes all the features passed into Stripe's ML model!), and through some super simple techniques, were able to come up with a list of rules that identified fraud with a 90%+ rate on the historical data. As in, 90% of transactions that the rule flagged either resulted in a fraudulent chargeback, or an early fraud warning. We quickly set up these rules so that future cases would not happen.
Example rules:
:email_count_for_ip_weekly: >= 10
:total_charges_per_card_number_daily: >= 15
:authorized_charges_per_billing_address_hourly: >= 5
Shockingly simple, right? And interesting that these transactions got away with low to medium scores. My best guess is that Stripe's ML model has to fit across all of their customers, so some things that would be suspicious for your business might not be for another one.
For that same reason, I can't guarantee our methods will work for everyone. But if anyone here is interested in trying our tool, DM me! It's really simple-- just 3 steps. Probably would take like 5 minutes.
  1. Run a Stripe Sigma query I give you, get a csv file
  2. Open our web app and input the csv file (the data never leaves your computer, everything is done in the browser)
  3. See if there's any rules you can add!
The tool is probably very buggy since we quickly spun it up, so I would LOVE to hop on call to walk you through the steps and debug any issues as they come along. Would also love a chance to learn more about your fraud stories, and we're happy to share what we know and give general tips on using Stripe Radar.
But if that's too much, happy give you a link to the tool to try out. Just DM! Again, the tool runs entirely on your browser so your data will never leave your computer.
If enough people find value in this, I'd love to polish it up and release it publicly later on :)
submitted by legitmaxwu to stripe [link] [comments]


2024.05.21 23:22 terceiroassum Mycelium hatsu

Main: transmutation Sprinkled: conjuration (for clusters), manipulation (for sap)
User: Andororororo Hunter objectives: understand life, environmentalist, go to the dark continent
Hatsu name: Mycelium Network
(Transmutation) Mycelium Nodes: The user transforms their aura into mycelium (fungus) like web that can be controles freely and has special properties like transport people and things, sap nen and give information like smell, taste, texture (just enough to distinguish and feel things).
Limit1: 5 square meters a day with current aura output. Limit2: a node got to be 1 cm wide Limit3: destroyable by focused nen damage (you can focus nen on your thingers to destroy them)
(Main: Transmutation, sub: Conjuration, Manipulation) Mycelium Cluster: It's nodes, but instead of being his aura they are separate from him. This extends effects of and the Mycelium Nodes when connected, doubles effective spread, but are stationary on things or beings. They also sap nen to grow, sap and growth rate can be set by user when aura in contact with them.
Limit1: they use the daily 5 square meters amount. Limit2: sapping and growing potential, at maximum rate it would take about 6 hours for a sap to totally drain an average nen user begining with 1 square cm. 15 minutes if whole body. Limit3: it vanishes overtime if it's not sapping nen or sapping enough nen. Depends on how much aura to create (not related to area)
(Transmutation) Mycelium Reabsorption: The Mycelium Cluster can be reabsorbed by the original user as nen.
Limit1: reabsorption nen rate is half of original cost because it was doubled originally. Limit2: gotta be connected to Mycelium Nodes, can be extended through Mycelium Cluster.
(Main: Transmutation, Sub: manipulation) Mycelium transport: If a thing is covered enough then it can be transported through the network.
Limit1: The thing has to be "encapsulated" which means 1/3 of the total area has to be covered. Limit2: has to be connected to Mycelium Nodes, it can be through extension using Mycelium Clusters.
What do you guys think? Did I stretch too much? (Ba-dum-tss)
Are the nen types appropriates? Is the ability fair and efficient?
I tried creating a character that would be close to Hinrig power level.
submitted by terceiroassum to HatsuVault [link] [comments]


2024.05.21 22:20 Goldentesla69420ape Cheat Sheet for abbreviations: CompTIA Security+ (Plus) Certification

Here are all of the relevant keywords/abbreviations for the CompTIA sec+ exam.
Comment below if you have any questions, if I made a mistake, or if I missed something!
AAA: Authentication, Authorization, and Accounting ABAC: Attribute-Based Access Control ACL: Access Control List AD: Active Directory AES: Advanced Encryption Standard AES256: Advanced Encryption Standard with a key size of 256 bits AH: Authentication Header AI: Artificial Intelligence AIS: Automated Information System ALE: Annual Loss Expectancy AP: Access Point API: Application Programming Interface APT: Advanced Persistent Threat ARO: Annualized Rate of Occurrence ARP: Address Resolution Protocol ASLR: Address Space Layout Randomization ASP: Application Service Provider ATT&CK: Adversarial Tactics, Techniques, and Common Knowledge AUP: Acceptable Use Policy AV: Antivirus BASH: Bourne Again Shell BCP: Business Continuity Plan BGP: Border Gateway Protocol BIA: Business Impact Analysis BIOS: Basic Input/Output System BPA: Business Process Automation BPDU: Bridge Protocol Data Unit BSSID: Basic Service Set Identifier BYOD: Bring Your Own Device CA: Certificate Authority CAPTCHA: Completely Automated Public Turing test to tell Computers and Humans Apart CAR: Corrective Action Report CASB: Cloud Access Security Broker CBC: Cipher Block Chaining CBT: Computer-Based Training CCMP: Counter Mode with Cipher Block Chaining Message Authentication Code Protocol CCTV: Closed-Circuit Television CERT: Computer Emergency Response Team CFB: Cipher Feedback CHAP: Challenge-Handshake Authentication Protocol CIO: Chief Information Officer CIRT: Computer Incident Response Team CIS: Center for Internet Security CMS: Content Management System CN: Common Name COOP: Continuity of Operations COPE: Corporate-Owned, Personally-Enabled CP: Control Plane CRC: Cyclic Redundancy Check CRL: Certificate Revocation List CSA: Cloud Security Alliance CSIRT: Computer Security Incident Response Team CSO: Chief Security Officer CSP: Cloud Service Provider CSR: Certificate Signing Request CSRF: Cross-Site Request Forgery CSU: Central Service Unit CTM: Content Threat Management CTO: Chief Technology Officer CVE: Common Vulnerabilities and Exposures CVSS: Common Vulnerability Scoring System CYOD: Choose Your Own Device DAC: Discretionary Access Control DBA: Database Administrator DDoS: Distributed Denial of Service DEP: Data Execution Prevention DER: Distinguished Encoding Rules DES: Data Encryption Standard DHCP: Dynamic Host Configuration Protocol DHE: Diffie-Hellman Ephemeral DKIM: DomainKeys Identified Mail DLL: Dynamic Link Library DLP: Data Loss Prevention DMARC: Domain-based Message Authentication, Reporting, and Conformance DNT: Do Not Track DNS: Domain Name System DNSSEC: Domain Name System Security Extensions DoS: Denial of Service DPO: Data Protection Officer DRP: Disaster Recovery Plan DSA: Digital Signature Algorithm DSL: Digital Subscriber Line EAP: Extensible Authentication Protocol ECB: Electronic Codebook ECC: Elliptic Curve Cryptography ECDHE: Elliptic Curve Diffie-Hellman Ephemeral ECDSA: Elliptic Curve Digital Signature Algorithm EDR: Endpoint Detection and Response EFS: Encrypting File System EIP: Enterprise Information Portal EOL: End of Life EOS: End of Support ERP: Enterprise Resource Planning ESN: Electronic Serial Number ESP: Encapsulating Security Payload ESSID: Extended Service Set Identifier FACL: File Access Control List FDE: Full Disk Encryption FIM: File Integrity Monitoring FPGA: Field-Programmable Gate Array FRR: Fast Reroute FTP: File Transfer Protocol FTPS: FTP Secure GCM: Galois/Counter Mode GDPR: General Data Protection Regulation GPG: GNU Privacy Guard GPO: Group Policy Object GPS: Global Positioning System GPU: Graphics Processing Unit GRE: Generic Routing Encapsulation HA: High Availability HDD: Hard Disk Drive HIDS: Host-based Intrusion Detection System HIPS: Host-based Intrusion Prevention System HMAC: Keyed-Hash Message Authentication Code HOTP: HMAC-based One-Time Password HSM: Hardware Security Module HSMaaS: Hardware Security Module as a Service HTML: Hypertext Markup Language HTTP: Hypertext Transfer Protocol HTTPS: Hypertext Transfer Protocol Secure HVAC: Heating, Ventilation, and Air Conditioning IaaS: Infrastructure as a Service IAM: Identity and Access Management ICMP: Internet Control Message Protocol ICS: Industrial Control System IDEA: International Data Encryption Algorithm IDF: Intermediate Distribution Frame IdP: Identity Provider IDS: Intrusion Detection System IPS: Intrusion Prevention System IEEE: Institute of Electrical and Electronics Engineers IKE: Internet Key Exchange IM: Instant Messaging IMAP4: Internet Message Access Protocol version 4 IoC: Indicator of Compromise IoT: Internet of Things IP: Internet Protocol IPSec: Internet Protocol Security IR: Incident Response IRC: Internet Relay Chat IRP: Incident Response Plan ISA: Interconnection Security Agreement ISFW: Integrated Security and Firewalls ISO: International Organization for Standardization ISP: Internet Service Provider ISSO: Information Systems Security Officer ITCP: Information Technology Contingency Plan IV: Initialization Vector KDC: Key Distribution Center KEK: Key Encryption Key L2TP: Layer 2 Tunneling Protocol LAN: Local Area Network LDAP: Lightweight Directory Access Protocol LEAP: Lightweight Extensible Authentication Protocol MaaS: Monitoring as a Service MAC: Media Access Control MAM: Mobile Application Management MAN: Metropolitan Area Network MBR: Master Boot Record MD5: Message Digest Algorithm 5 MDF: Main Distribution Frame MDM: Mobile Device Management MFA: Multi-Factor Authentication MFD: Multi-Function Device MFP: Multi-Function Printer ML: Machine Learning MMS: Multimedia Messaging Service MOA: Memorandum of Agreement MOU: Memorandum of Understanding MPLS: Multiprotocol Label Switching MSA: Master Service Agreement MSP: Managed Service Provider MSSP: Managed Security Service Provider MTBF: Mean Time Between Failures MTTF: Mean Time To Failure MTTR: Mean Time To Repair MTU: Maximum Transmission Unit NAC: Network Access Control NAT: Network Address Translation NDA: Non-Disclosure Agreement NFC: Near Field Communication NFV: Network Functions Virtualization NGFW: Next-Generation Firewall NG-SWG: Next-Generation Secure Web Gateway NIC: Network Interface Card NIDS: Network Intrusion Detection System NIPS: Network Intrusion Prevention System NIST: National Institute of Standards and Technology NOC: Network Operations Center NTFS: New Technology File System NTLM: New Technology LAN Manager NTP: Network Time Protocol OCSP: Online Certificate Status Protocol OID: Object Identifier OS: Operating System OAI: OpenID Authentication OSINT: Open Source Intelligence OSPF: Open Shortest Path First OT: Operational Technology OTA: Over-the-Air OTG: On-The-Go OVAL: Open Vulnerability and Assessment Language OWASP: Open Web Application Security Project P12: Personal Information Exchange Format P2P: Peer-to-Peer PaaS: Platform as a Service PAC: Proxy Auto-Configuration PAM: Privileged Access Management PAP: Password Authentication Protocol PAT: Port Address Translation PBKDF2: Password-Based Key Derivation Function 2 PBX: Private Branch Exchange PCAP: Packet Capture PCI DSS: Payment Card Industry Data Security Standard PDU: Protocol Data Unit PE: Protected Extensible Authentication Protocol PEAP: Protected Extensible Authentication Protocol PED: Portable Electronic Device PEM: Privacy Enhanced Mail PFS: Perfect Forward Secrecy PGP: Pretty Good Privacy PHI: Protected Health Information PII: Personally Identifiable Information PIN: Personal Identification Number PIV: Personal Identity Verification PKCS: Public Key Cryptography Standards PKI: Public Key Infrastructure PoC: Proof of Concept POP: Post Office Protocol POTS: Plain Old Telephone Service PPP: Point-to-Point Protocol PPTP: Point-to-Point Tunneling Protocol PSK: Pre-Shared Key PTZ: Pan-Tilt-Zoom PUP: Potentially Unwanted Program QA: Quality Assurance QoS: Quality of Service RA: Recovery Agent RAD: Rapid Application Development RADIUS: Remote Authentication Dial-In User Service RAID: Redundant Array of Independent Disks RAM: Random Access Memory RAS: Remote Access Service RAT: Remote Access Trojan RC4: Rivest Cipher 4 RCS: Remote Control System RFC: Request for Comments RFID: Radio-Frequency Identification RIPEMD: RACE Integrity Primitives Evaluation Message Digest ROI: Return on Investment RPO: Recovery Point Objective RSA: Rivest-Shamir-Adleman RTBH: Remote Triggered Black Hole RTO: Recovery Time Objective RTOS: Real-Time Operating System RTP: Real-Time Transport Protocol S/MIME: Secure/Multipurpose Internet Mail Extensions SaaS: Software as a Service SAE: Simultaneous Authentication of Equals SAML: Security Assertion Markup Language SCADA: Supervisory Control and Data Acquisition SCAP: Security Content Automation Protocol SCEP: Simple Certificate Enrollment Protocol SDK: Software Development Kit SDLC: Software Development Life Cycle SDLM: Software Development Lifecycle Management SDN: Software-Defined Networking SDP: Session Description Protocol SDV: Software-Defined Vehicle SED: Self-Encrypting Drive SEH: Structured Exception Handler SFTP: Secure File Transfer Protocol SHA: Secure Hash Algorithm SIEM: Security Information and Event Management SIM: Subscriber Identity Module SIP: Session Initiation Protocol SLA: Service Level Agreement SLE: Single Loss Expectancy SMB: Server Message Block SMS: Short Message Service SMTP/S: Simple Mail Transfer Protocol/Secure SNMP: Simple Network Management Protocol SOAP: Simple Object Access Protocol SOAR: Security Orchestration, Automation, and Response SoC: Security Operations Center SOC: System-On-Chip SPF: Sender Policy Framework SPIM: Spam Over Instant Messaging SQL: Structured Query Language SQLi: SQL Injection SRTP: Secure Real-Time Transport Protocol SSD: Solid-State Drive SSH: Secure Shell SSID: Service Set Identifier SSL: Secure Sockets Layer SSO: Single Sign-On STIX: Structured Threat Information eXpression STP: Spanning Tree Protocol SWG: Secure Web Gateway TACACS+: Terminal Access Controller Access-Control System Plus TGT: Ticket Granting Ticket TKIP: Temporal Key Integrity Protocol TLS: Transport Layer Security TOTP: Time-Based One-Time Password TPM: Trusted Platform Module TSIG: Transaction Signature TTP: Tactics, Techniques, and Procedures UAT: User Acceptance Testing UDP: User Datagram Protocol UEBA: User and Entity Behavior Analytics UEFI: Unified Extensible Firmware Interface UEM: Unified Endpoint Management UPS: Uninterruptible Power Supply URI: Uniform Resource Identifier URL: Uniform Resource Locator USB: Universal Serial Bus USB OTG: USB On-The-Go UTM: Unified Threat Management UTP: Unshielded Twisted Pair VBA: Visual Basic for Applications VDE: Virtual Desktop Environment VDI: Virtual Desktop Infrastructure VLAN: Virtual Local Area Network VLSM: Variable Length Subnet Masking VM: Virtual Machine VoIP: Voice over Internet Protocol VPC: Virtual Private Cloud VPN: Virtual Private Network VTC: Video Teleconferencing WAF: Web Application Firewall WAP: Wireless Access Point WEP: Wired Equivalent Privacy WIDS: Wireless Intrusion Detection System WIPS: Wireless Intrusion Prevention System WORM: Write Once, Read Many WPA: Wi-Fi Protected Access WPS: Wi-Fi Protected Setup XaaS: Anything as a Service XSRF: Cross-Site Request Forgery
submitted by Goldentesla69420ape to CompTIA [link] [comments]


2024.05.21 22:14 Celes_Monterres127 New Algorand App

Hey fellow Algorand users and developers,
Allow me to intro myself. My name is Celestino, been around the blockchain space from 2017. Started by building on NEAR, went to Celo, Polkadot, and Ethereum for sometime, but finally committed to Algorand in late 2021.
So, my team and I came up with an Algorand-based platform called Jasiri.
Jasiri is a simple-to-use platform that allows anyone to tokenize their most valuable purchases, and experience their full economic value as fungible digital assets and unique legal property titles.
Think of how you can own NVIDIA stock or partial real estate stock(e.g through Lofty AI). It's the same with Jasiri, only that you get to unlock, own, and do De-Fi with the 'stock' in your recently purchased smartphone, laptop, smartwatch, and more! We have a name for these types of new assets we are enabling on Algorand — ‘dead capital’. They are 'dead capital' because they are unrecognized assets by modern financial institutions in the real world, making it hard for you to experience their full value, even though they have so much utility in our daily lives, and are built off of valuable minerals(Gold, Cobalt etc.).
Jasiri's property titles are NFTs, but of a different kind, we built them so you can actually own and protect your assets in the real-world as well. In some jurisdictions(e.g Kenya, US), it helps us use existing legal frameworks to do so.
In order for you to start tokenizing your purchases, we built an e-commerce add-on here , that you can easily add to your browser as you go shopping on Amazon.com , Alibaba.com , Aliexpress.com , with more stores still on our waitlist.
It doesn't stop there. To lock your assets for maintenance(like locking your assets on Folks Finance), and trade your ownership rights(like how you trade NFDs using NFDomain, or property tokens using Lofty AI) , we built a web console here , you can also track asset prices in real-time on the console.
Lastly, to safe-keep your assets, you can use:
  1. Jasiri wallet(currently available for Android) - best if you are a non-technical person, or you would just love to support us ;) .
  2. Pera wallet
  3. Defly wallet
  4. Daffi wallet
All wallets connect using a single QR Code, instead of multiple QR Codes, on the extension and on the console. I had a rough experience during my early days building Jasiri trying to get wallet support in the ecosystem, and so I made it so.
We've been using Whatsapp, email, and X to onboard, and engage with our community(currently small).
We share product updates on our X account here. we are going to be launching on Product Hunt very soon(Will share on our X account as well) .
Jasiri was developed with the support of the Algorand Foundation Grant Program(back in 2021-2022), under its 'Access' category.
Thank you!
submitted by Celes_Monterres127 to AlgorandOfficial [link] [comments]


2024.05.21 21:41 pagirios cat food ranked by cost efficiency and nutritional value

Hi everyone! Not sure if this falls under “no advertising” rule or not, if so, forgive me and delete the post. I just wanted to share a website/tool that I’ve built for myself and thought that maybe it would be useful for someone else too.
Like many of you, I'm constantly trying to find appropriate food for my cats that has the correct nutrition (as suggested by my vet) and won’t break the bank. What I want is to have an up-to-date list of products sorted by their cost per kcal with the ability to filter by nutritional values (dry matter). Since I couldn’t find exactly this, I built this: https://foodrank.pet/cat
Currently, it holds over 450 Amazon listings, and ~1500 more are waiting to be added (it takes time as I have to manually review each new product to make sure that the nutritional values and calories are correctly scraped from the web). Existing listings are auto-updated daily. Even if you’re not buying from Amazon, this should be still a good source to look for the product names.
Disclaimer: I’m not sure how sustainable this is going to be but those Amazon links are affiliate links, so I could potentially keep running this server & daily data scraper forever(?). And of course, the information provided may be incorrect, so you should always verify. ✌️
submitted by pagirios to catfood [link] [comments]


2024.05.21 21:25 turtleindeed Help networking isnt networking!

So i recently got into self hosting and all that, i have managed to do lots and learned lots, now i have a problem. So when i first started using nextcloud it was wierd i didnt use docker compose i only used docker, everything was a mess i didnt figure out how to do stuff. After a while i got everything working started with docker compose and others. i managed to host seafile, filebrowser, nextcloud, ownfile and probaly another. Everything works im using ubuntu server on a proxmox vm. though i have this one issue which is not game breaking its just very limiting. the reason i switch and tried so many hosting services was because i didnt manage to get over one problem even though how hard i look and i think it might be a problem on my network part. So when i upload and download for that matter on local ip its about as fast as i want it but i could be faster, though i think this is because of my internett speed 300 mbps or my usb 3.0 externall ssd. upload is about 450 mpbs i though download was always higher but i guess not, my router is connected via 10 gpbs fiber connection.
it download and uploads at about 30 mb/s which is ok and i can work with, though when i port forward and use a reverse proxy like nginx proxy manager web ui, i get like 10 mb/s which is not good considiring im planning on uploading files as big as 50 GB or more, download is even slower, im using a seagate external ssd with usb 3.0 i am using ethernet though it is connect to a wifi extender. this is mighty annoying and i have tuckeld with chunk size and its not helping. i tried to only port forward and not use proxy, same slow downlaod and upload i have a domain and everything. the pc im uplaodin and dowlnoad from has fast enough internett. it seems like the only time where speed is decreased is when i port forward local network is just fine. On my router i changed dns and i feel like i have done everything i can execpt for isp provider talk which i am not keen on doing. im using postgres, and it seems like every service once forwarded get limited to 10 mb/s though it slowly climbs up, takes a good 7 to 15 sec
submitted by turtleindeed to NextCloud [link] [comments]


2024.05.21 21:06 CampingWorld What Are The Best RV Trips for Beginners?

There’s a lot to learn when you’re new to RVing. After purchasing your RV and equipping it with the right gear, the last thing you want is to feel overwhelmed trying to select where to camp. So we asked the question: what are the best RV trips for beginners?
Of course, we have our own opinions, but we wanted to see what the RV community felt. We asked experienced RVers which destinations or campgrounds they would recommend for beginners. With over 150 replies, here are the top five answers:
  1. Somewhere close to home
  2. State parks
  3. Good Sam Campgrounds
  4. Your backyard
  5. National parks
(Runner-up: Wal-Mart parking lot).

Why Stay Close to Home on Your First RV Trip as a Beginner?

The overwhelming majority of experienced RVers recommended sticking to somewhere close to home as a beginner. Their reasons were practical:
Boondocking in your backyard is a great way to learn about your RV and its systems. Just remember: Depending on your RV, you’ll need potable water, a way to empty your holding tanks, and a proper power supply – 30 or 50 amps.

Which Locations Make For The Best RV Trips for Beginners?

We collected specific recommendations for those who want to venture out while staying close to home. These came directly from experienced RVers nationwide who were willing to share their favorite destinations for RV newbies.
Because we don’t know where home is for you, we organized this list of the best RV trips for beginners and organized them by region.

The Best RV Trips for Beginners in the Northeast

Bayley’s Camping Resort – Scarborough, Maine

Park Features:
Learn more or Book now.

Kennebec River Campground – The Forks, Maine

Park Features:
Learn more or Book now.

Gettysburg Battlefield RV Resort – Gettysburg, Pennsylvania

Park Features:
Learn more.

Quechee / Pine Valley – Hartford, Vermont

Park Features:
Learn more or Book now.

Cherrystone Campground – Cape Charles, Virginia

Park Features:
Learn more.

Holiday Trav-L-Park – Virginia Beach, Virginia

Why They Recommended: “The place is pretty big (but tight, please know HOW to drive). It has seven pools, a bar, a restaurant, laundry, concerts, and a little trolley that will take you to the beach for even more entertainment.”
Park Features:
Learn more or Book now.

Virginia Beach Holiday – Virginia Beach, Virginia

Why They Recommended: “They just put in a lazy river and a brand new pool. It’s state-of-the-art!”
Park Features:
Learn more or Book now.

New River Gorge Campground – Lansing, West Virginia

Park Features:
Learn more.

The Best RV Trips for Beginners in the Southeast

Wind Creek State Park – Alexander City, Alabama

Park Features:
Learn more or Book now.

Everglades Isle – Everglades City, Florida

Park Features:
Learn more or Book now.

Orlando / Kissimmee – Kissimmee, Florida

Why They Recommended: “Orlando has the best prices all year round! It’s in close proximity to Universal Studios, Disney, Disney Springs, lots of attractions, several grocery stores, and restaurants. Target even ships deliveries there.”
Park Features:
Learn more or Book now.

Fisheating Creek Outpost – Palmdale, Florida

Why They Recommended: “The lots have much more space than most parks. You are not three feet from your neighbor.”
Park Features:
Learn more or Book now.

Big Lagoon State Park – Pensacola, Florida

Park Features:
Learn more or Book now.

Jetty Park Campground – Port Canaveral, Florida

Park Features:
Learn more or Book now.

Smith Ridge Campground – Campbellsville, Kentucky

Park Features:
Learn ore.

Mountain Stream RV Park – Marion, North Carolina

Park Features:
Learn more or Book now.

North Myrtle Beach RV Resort – Little River, South Carolina

Park Features:
Learn more or Book now.

Myrtle Beach State Park – Myrtle Beach, South Carolina

Park Features:
Learn more or Book now.

PirateLand Family Camping Resort – Myrtle Beach, South Carolina

Park Features:
Learn more or Book now.

Ocean Lakes Family Campground – Myrtle Beach, South Carolina

Park Features:
Learn more or Book now.

Anchor Down RV Resort – Dandridge, Tennessee

Park Features:
Learn more or Book now.

Cherokee Dam Campground – Jefferson City, Tennessee

Park Features:
Learn more or Book now.

Melton Hill Dam Campground – Lenoir City, Tennessee

Park Features:
Learn more or Book now.

Camp Margaritaville RV Resort and Lodge – Pigeon Forge, Tennessee

Park Features:
Learn more or Book now.

Little Arrow Outdoor Resort – Townsend, Tennessee

Park Features:
Learn more or Book now.

The Best RV Trips for Beginners in the Midwest

Sycamore Springs Park – English, Indiana

Park Features:
Learn more or Book now.

Lake Rudolph Campground and RV Resort – Santa Claus, Indiana

Park Features:
Learn more.

Grand Haven State Park – Grand Haven, Michigan

Park Features:
Learn more or Book now.

Otsego Lake State Park – Gaylord, Michigan

Park Features:
Learn more or Book now.

Itasca State Park – Park Rapids, Minnesota

Park Features:
Learn more or Book now.

Silver Dollar City Campground – Branson, Missouri

Park Features:
Learn more or Book now.

Lake Mcconaughy State Recreation Area – Brule, Nebraska

Park Features:
Learn more or Book now.

Mt. Gilead Holiday – Mt. Gilead, Ohio

Park Features:
Learn more or Book now.

The Best RV Trips for Beginners in the South

The Woodlands RV Resort – Heber Springs, Arkansas

Park Features:
Learn more or Book now.

Sarah’s Seaside RV Oasis – Grand Isle, Louisiana

Why They Recommended: It’s the most laid back!
Park Features:
Learn more.

The Best RV Trips for Beginners in the Southwest

Mather Campground – Grand Canyon Village, Arizona

Park Features:
Learn more.

Tucson Lazydays – Tucson, Arizona

Park Features:
Learn more or Book now.

Caballo Lake State Park – Caballo, New Mexico

Park Features:
Learn more or Book now.

The Best RV Trips for Beginners in the Northwest

Coloma Resort – Coloma, California

Park Features:
Pro Tip: You must cross the Mt. Murphy Bridge to reach this campground. Here are the height and weight restrictions for that bridge:
Learn more or Book now.

Arrowhead RV Park – Cascade, Idaho

Park Features:
Learn more or Book now.

St. Mary / East Glacier – St. Mary, Montana

Why They Recommended: “Beautiful views right from the park!”
Park Features:
Learn more or Book now.

Cape Blanco State Park – Port Orford, Oregon

Park Features:
Learn more or Book now.

Seven Feathers RV Resort – Canyonville, Oregon

Park Features:
Learn more or Book now.
Want to add your advice to our poll? Click below to join the conversation!
https://www.facebook.com/story.php?story_fbid=776034604566862&id=100064809877965&mibextid=WC7FNe
Which destinations would you recommend for first-time RVers? Share your tips in the comments below.
submitted by CampingWorld to campingworld [link] [comments]


2024.05.21 20:48 Omnizoa Desktop Linux's 2 Biggest Missed Opportunities

I've been daily driving Linux for about 2-3 years now and there are two things that I feel like should be OBVIOUS Linux "features", but aren't:
1.) P2P PACKAGE MANAGEMENT - Literally why. Torrents are already a popular and trusted means of distributing Linux distros, why not packages? It decentralizes the burden to host, and therefor protects the package catalog from localized outages, attacks, and the maintainer simply fucking off. I don't trust a nameless, faceless repo maintainer any more than I trust a random download off CNET. If repositories were trackers with verified uploaders instead, you could accomplish the same thing with less trust lavished on a select few privileged (and/or burdened) individuals. Users wouldn't be left out in the cold if their distro experiences an outage, or a harddrive failure, or is DDoSed, or is simply discontinued.
2.) SELF-CONTAINED PACKAGES - In the same vein of independece, I am incredibly disappointed that projects like Appimage are maligned in favor of Flatpak or even native system packages. Admittedly, these formats can reduce disk space by consolidating libraries or runtime environments, but the biggest issue with these sorts of packages is that they cannot be run alone, independently of either their package manager, or a complicated web of dependencies you may or may not have and may or not still be available in your repo.
As an example, when the Citra project was pulled down in response to legal threats from Nintendo, the Flatpak suddenly stopped working, but the Appimage didn't. Your local offline apps shouldn't have to dial home to run, I think Windows has made a perfectly good case for why this is fundamentally a bad thing. On the other hand, Windows has also made a perfectly good case that a single file is a practical format for software distribution. Whether it be an .exe, or an .app, or an .apk, if you have the hardware to run it, it should run, I don't want to have to download a dozen other packages to run one package. If for no other reason that for the sake of software preservation, Linux should normalize self-contained apps. And even if you don't like Appimage for whatever reason, there are other means of distributing programs in self-contained files, just look at Itch.io, and you'll see .run or .x86_64 files that can run a game, out of the box, on Linux, without ever having to query a repository server or a laundry list of external dependencies.
These may be unpopular opinions, but I don't really understand why, especially considering how much the Linux userbase harps on independence and decentralization. I want MORE independence, MORE decentralization, I want a distro I can just as easily run and install software on regardless of whether the project devs and/or repo maintainers are alive, dead, asleep at the wheel, under attack, experiencing an outage, just rm rf'd a server, or decided to pull a [insert evil fuckery here].
submitted by Omnizoa to linux [link] [comments]


2024.05.21 20:26 budoucnost Cing Bopilot is having a stronk, call a bingbulance

Cing Bopilot is having a stronk, call a bingbulance submitted by budoucnost to ChatGPT [link] [comments]


2024.05.21 20:05 shiftingsmith Feedback for Anthropic: please give people the chance to try out Opus

I interact daily with a lot of people within and outside of the "AI world." A glaring 80% have no idea that Anthropic even exists. The remaining 20% is convinced that all "Claude.ai" has to offer is Sonnet.
They go to the web chat, create an account, try a few prompts with the free models, and decide that's more or less ChatGPT 3.5/4 level so doesn't worth a subscription. They have never heard of Opus, or the fact that "Claude 3" is a family of models with very different capabilities. Even professors and software engineers.
I think that the fact that Opus is behind a paywall and there's no trial whatsoever, and it's not advertised, is keeping a lot of people away. Sonnet is good for many tasks but absolutely not on par with Opus, with what Anthropic really has to offer.
I think you would benefit immensely from giving general public at least some free prompts with your flagship model, and maybe post way more demos spanning a lot of use cases that might be of interest (and generally better advertising for the company.) Please give them the opportunity to know you, really know you. You deserve it.
submitted by shiftingsmith to ClaudeAI [link] [comments]


2024.05.21 19:44 Calledinthe90s 14: Revenge on my Grade Nine English Teacher

This was originally posted to pettyrevenge, but for some reason got taken down. So here goes:
The revenge I took on my grade nine English teacher was so petty that I hesitate to write about it. But Mrs. Bristle (for that is the name I will give her) was cruel to me every chance she got, and she made my first year in high school a misery. So when a file with her name on it arrived at my office, my first thought was not that I would beat her (for I was certain that I would) but rather, of the revenge I would take along the way.
I was pushing forty when Mrs. Bristle’s file hit my desk, some estate litigation where a mother’s last will and testament left my clients next to nothing, and gave their sister, Mrs. Bristle, pretty well the entire estate. When I saw the defendant’s name it looked familiar, and after a bit of Googling, I confirmed what I suspected: the defendant, Mrs. Bristle, was my former grade nine English teacher.
I remembered Mrs. Bristle very well. She was supposed to be teaching us the wonders of English literature, but what she really taught us were her rules, by which she meant her arbitrary whims, expressed in vague language, backed up by petty punishments for non-compliance. There was an art to getting along with Mrs. Bristle, and while most of the other kids learned it easily enough, somehow I did not. I have trouble learning unwritten rules, and in Mrs. Bristle’s class where unwritten and constantly changing rules were the order of the day, I didn’t stand a chance. Mrs. Bristle admonished me almost daily for ‘not paying attention’. I did detentions, re-wrote assignments, and made visits to the principal’s office, all because I apparently wasn’t listening, wasn’t doing what I was told.
Many was the time when Mrs. Bristle took me to task for missing some obvious but unstated part of an assignment. One time I handed in a sonnet, and received an “F” because the rhyming pattern was Petrarchan, not Shakespearean. But she would be nice to me, Mrs. Bristle would always say when she tossed my work back at me. She would give me another chance to hand the assignment in with the arbitrary changes she required, in the end giving me a good mark, but then heavily downgraded for being late.
Mrs. Bristle's case worked its way through the early stages, and every time I exchanged an email with her (for she was a self-rep, no need for counsel, she claimed) I thought about the unpleasant time I’d spent in her class. I had a rough time in high school, and I always resent anything that makes me dwell on it.
After a few months, the case was ready for the next stage. It was time to examine Mrs. Bristle, to find out why she thought her mother wanted to disinherit most of the family and enrich Mrs. Bristle alone. I showed up at the court reporter’s office early as usual, to get set up.
“What’s that shit eating grin on your face?” Adam asked. He was a lawyer colleague, about my vintage, and we were sitting in the lounge for lawyers only, the room that most court reporter’s offices have, a place for the lawyers to hang out and shoot the shit, no clients allowed.
“I’m going to examine my grade nine English teacher today,” I said, “and it's going to be fun.” I explained how she’d hated me back in the day, and had done her best to make my life hell.
“What’s the case about?” Adam said. Adam had been around the block, same as me, and it took only a few words for me to summarize everything that mattered in the file. “Estate fight, one sibling against four, undue influence, holograph will cutting out most of the siblings, competing with an older will, a formal one, where the shares are equal.”
Adam nodded appreciatively. “Nice fees, if the estate’s got the cash.”
“It does,” I said. We chatted for a bit, and then sat there in silence as we each did the last bit of prep for the cases we had that day, making notes, reading documents and drinking coffee. My alarm dinged just before ten, and I made my way to the examination room, and Mrs. Bristle, the teacher who’d greatly disliked the grade nine version of Calledinthe90s. I was curious to see if she would like the older version any better.
* * *
The examination started, and Mrs. Bristle and I sparred for a while, me tossing vague questions her way, and criticizing her when she did not understand. I kept her on the defensive for close to three hours, until it was getting on to one p.m.
“Aren’t you in a conflict or something?” she said to me just before the lunch break, when she’d finally made the connection, and understood that the lawyer asking her questions was a former student.
“No conflict,” I said, dismissing her concerns with a wave of my hand. “During the lunch break, there’s something I need you to do.”
“I don’t want to answer questions during lunch. I need a break.” The examination had been rough on Mrs. Bristle. She was not used to being asked questions, to being held to account, to being constantly challenged, and even having her grammar corrected now and again.
“You’ll get your lunch break. But while you’re eating a sandwich or whatever, keep this copy of the holograph will next to you.” The will on which Mrs. Bristle’s case relied was a holograph will, meaning that Mrs. Bristle’s mother had written the will entirely in hand from start to finish. The mother, or more likely, Mrs. Bristle herself, had downloaded a holograph will form from the web, and had completed it in accordance with the website’s instructions. Holograph wills are special. You can do a holograph will without a witness, without a lawyer, without anything at all, so long as you did it right. But if you got anything wrong, if you messed up in any way, it was invalid.
“You want me to read the will again over lunch?” Mrs. Bristle said.
“No. Instead, I want you to make a handwritten copy of it.”
“You want me to write it out? Whatever for?”
“There’s an allegation that the will wasn’t written by your mother, and that you wrote it up instead.” An allegation that I’d made up myself, that morning, while I was sitting in the lawyer's lounge, drinking coffee and munching on a muffin. My clients had not challenged the will’s handwriting; it was obviously their mother’s, totally different from Mrs. Bristle’s own writing. But I had decided otherwise.
Mrs. Bristle was appropriately outraged at being unjustly accused of forgery. Said she could prove it wasn’t her handwriting, could absolutely prove it.
“Then let’s settle the forgery issue once and for all,” I said, “write out the will in your own hand, so that our document experts can examine it, compare it with the original, and make a determination.”
“I don’t need the entire lunch break for that,” Mrs. Bristle said, “and I’d rather eat lunch at the restaurant downstairs.” The will was barely a page long, at most three hundred words, that being all it took for the mother to allegedly disinherit most of her children, and inexplicably leave everything to Mrs. Bristle. The mother had written up the will herself, but she’d been ninety at the time, while living in Mrs. Bristle’s house, and very much under her influence.
“I’ve retained five different experts,” I said, “and each of them will need copies.”
Five experts? Why so many experts?”
“Each expert needs ten samples, for comparison purposes. It’s going to take you a while, Mrs. Bristle. I suggest you get started.” I overrode her protests and once she started to write, I left her in the room, and went to the lawyer’s lounge to eat their small sandwiches and drink more of the excellent coffee. After a while I stopped by the examination room to look in on Mrs. Bristle. I wanted to check in on her progress.
Mrs. Bristle asked for more time, complained of writer’s cramp, and asked me again if it was really necessary for her to write out the holograph will fifty times in her own hand, and I assured her that there was nothing for it, that it was absolutely necessary. I returned to the lounge to check my emails, leaving her hard at the homework I’d given her.
After a while my colleague, Adam, popped into the lounge. He asked me how it was going, the examination with the teacher, the teacher who had treated me so badly.
“I’m making her write lines.” Adam laughed, and laughed harder when I explained that I wasn’t kidding, that I really was making Mrs. Bristle write lines, and how I was doing it. His laughter attracted attention, and a few other lawyers asked what was up. “He’s making his teacher witness write lines,” Adam said, and the lawyer’s lounge hooted with laughter when I told everyone what was up.
It was one of the pettiest things I’ve ever done to anyone, making my grade nine teacher write lines. But the writing lines thing was just a warmup. The real revenge had yet to come. I returned to the examination room after a while, to check up on Mrs. Bristle, see how she was doing.
“This is taking forever,” she said, “and I really don’t get why you need it.” She had writer’s cramp, and was shaking her hand to get the kinks out. I picked up the stack of holograph wills she’d created, and flipped through it. She was nowhere near finished.
“On second thought,” I said, “maybe it isn’t necessary. I think you’re right. I don’t need any handwriting samples from you.”
“Why not?” she said.
“The will is invalid,” I explained, adding that because her mother had used a pre-printed form off the web, the law would not recognize the will. “A holograph will has to be entirely in the testator's handwriting,” I explained, “every single word entirely in handwriting from start to finish. This will doesn’t qualify, because your mother used a standard form, a form printed off the web, with instructions and boxes and questions and so on, and when you do that, then the will is no longer a holograph will. It’s a regular will, and regular wills need to be properly witnessed. This one isn’t witnessed, and that means it’s not a will. It’s just a piece of paper.”
“Are you trying to tell me that you only figured that out now? What kind of lawyer are you, anyways?”
“What kind of lawyer am I? I’m a lawyer who makes a witness skip lunch, and sit in a small room all alone, and write lines. Sound familiar, Mrs. Bristle?” She said nothing, and just stared at me. I closed the door on her, leaving her alone once more, and left for the Middle Temple Tavern where the lawyers all hung out. It was time to hoist a Guinness and enjoy my petty triumph.
submitted by Calledinthe90s to Calledinthe90s [link] [comments]


2024.05.21 19:17 AshamedADHD Updated list of resources for executive dysfunction !!!!!!!!

Hey everyone, I just wanted to share an updated list of resources that people on the ADHD subs use to manage their executive dysfunction. I’m going to update this list once a week.

Recommended Apps

Goblin.tools

rsdgpt

focusmate

OWaves

Finch

Character.ai

Sweepy

Tody

1Password

Lifeat

Anylist

Alarmy

[ThinkDivergent](thinkdivergent.com)

Last Updated: 5/19/24
Let me know if there is something you want me to add for next week! Thanks
submitted by AshamedADHD to ADHD_Programmers [link] [comments]


2024.05.21 18:57 CeasarChimpanzee Is GameStop Investing In GameStop Stocks?

Is GameStop Investing In GameStop Stocks?
Good Morning Everyone,
I've been spending too much of my spare time for the last 84 years in my basement eating crayons while wearing my tinfoil hat. I got nothing better to do so I just sit around waiting and waiting and waiting for my investment print some bananas. Suddenly something happened on May 17, 2024. On that day, GameStop uncharacteristically announced the preliminary-results of their 2024 Q1 earnings, something that GameStop has not done in a long time or at all. Since my tinfoil hat was still on, I started reading the preliminary 2024 Q1 earnings release from GameStop.
After reading the preliminary earnings report I noticed that GameStop's Cash, Cash Equivalents and Marketable securities decreased by about $200 Million.
GameStop's Preliminary 2024 A1 Quarterly Earnings Result
For the young apes that have not learnt math yet, see the napkin math I did in the picture below. I call the $200 Millions "Net Cash In Use".
My napkin math
Now, I asked, what happened to that $200 Million? Could they invest those $200 Millions in GameStop's common stock? Since my tinfoil hat was still on, I would say they could have. If that's the case, how many shares of GameStop's common stock could that $200 Millions buy? Assuming that GameStop spent the $200 millions throughout April to purchase GameStop stocks (This is totally legal and GameStop is still compliant with the SEC insider trading policy of two trading days after the earnings release and that last for 20 trading days. See the picture below from the SEC's website.) So how many shares can GameStop buy? Let's take a look.
SEC Insider Trading Policy
All throughout the SEC's Insider Trading Policy period (see the picture below), the highest trading price of GME was $13.19/share. Based on that price, GameStop should be able to buy at least 15,000,000 ( = $200,000,000 / $13.19 ) shares of GameStop Common stocks with $200 Millions. Why did GameStop invest in their common stock you may ask? Because they wanted to create value for their shareholders. So how do they do that? Continue reading apes.
GameStop's Highest daily trading price during the SEC insider trading policy period
Let's go back to May 17, 2024 and take a look. On that day, GameStop not only announced their preliminary-results for Q1 of 2024, they also announce a "mixed securities shelf offering." This offering allowed them to sell common stocks, prefer stocks, Depository shares, warrants, stock purchase contracts, units and subscription rights (See picture below from their SEC filing.)
GameStop's mixed securities shelf offering
To reward their shareholders, GameStop can issue one warrant to shareholders for each share of common stock that those shareholders owned. This warrant is not tradeable on the public exchange and it allows the holder to purchase a "Depository share" of GameStop for $69/share some time in the future. Now you may ask, how does this create value for shareholders? Hold on to your bananas, I am getting there.
Based the latest data from a source familiar with the finance website in the screenshot, the amount of GameStop's common shares shorted as of April 20, 2024 was 64.37 million shares.
https://preview.redd.it/owte3vup9t1d1.png?width=446&format=png&auto=webp&s=4930d735e3fa7559fc090c19dc0cf531ca434a7d
When GameStop announces the Record Date (to be determined) for shareholders, if you own GameStop's common stock, you'll get the warrant to buy the depository share. So the short sellers will have two choices from now till the Record date.
  1. Not close their short positions so they will have to deliver the 64.37 million warrants to the owner of the stock that they borrowed
or
2) close their short position so they don't have to be liable for the warrant
After wearing my tinfoil hat for 84 years now, my brain capacity had diminished a bit and I only have enough brain capacity and attention to cover the first scenario. If the short sellers did not close their short positions, then it meant that they'll need to buy 64.37 million warrants to deliver to the owners of the GameStop common shares that they borrowed from. Now the short sellers have the following choices to obtain the warrants.
I) Buy the 64.37 million warrants from GameStop
Remember the $200 million that GameStop used to invest in 15,000,000 GameStop common shares? Those 15,000,000 share will get 15,000,000 warrant. When the short sellers come knocking on GameStop's door offering to buy the warrants, this is what I think GameStop can potentially offer to the short sellers.
a) buy the depository share from GameStop @ $69/share. For each depository share that you buy, you'll get one warrant to deliver to the shareholders that you borrow the common stocks from
- this is a potential cash proceed that GameStop will get from selling 64.37 millions depository shares ($4,441,530,000.00 = 69 \* 64.37 Millions) - Now GameStop's enterprise value is increased by $4.4 Billions - With the $1.07 Billions still in the bank, GameStop now has $5.47 Billions in cash - GameStop will now have $17.80/share in cash ($5.47 Billions / 306 million common shares) this should theoretically be the floor price of GameStop's common stock. If the common stock drops below this price, GameStop can buy more shares again. - GameStop can continuously issue any of the 7 securities that they filed with the SEC and beef up their balance sheet to protect themselves against short sellers - Short sellers still need to close their 64.37 millions short positions of the common stock and GME did not dilute their common shareholders 
b) buy the 15,000,000 warrants from GameStop and the other 40 million warrants from the current shareholders
- this is a potential cash proceed that GameStop will get from selling 15 million warrants ($1,035,000,000 = 69 \* 15 Million) - Now GameStop's enterprise value is increased by $1.03 Billions - With the $1.07 Billions still in the bank, GameStop now has 2.10 Billions in cash - GameStop will now have $6.80/share in cash (2.10 Billions / 306 million common shares) this should also be the floor price of GameStop's common stock. If the common stock goes below this price, GameStop can buy more shares again. - For this offer, will the short sellers be able to buy the warrant for $69/warrant from shareholders? I guess they'll have to find out. - GameStop can continuously issue any of the 7 securities that they filed with the SEC and beef up their balance sheet to protect themselves against short sellers - Short sellers still need to close their short positions and GME did not dilute their common shareholders 
II) Buy the 64.37 million warrants from shareholders
- have fun shopping my short seller friend. 
For full discloser, I am a GameStop shareholder and I like the stock. A lot!
submitted by CeasarChimpanzee to Superstonk [link] [comments]


2024.05.21 18:16 soiledboy Do personal projects with real world users give you any advantages in career search?

Hey everyone,
I've been self-learning coding for the past 4-5 years. My favorite project, which I've been building for the past 3 years, is a web app that supports a hobby I'm really passionate about. It is a full-stack Flask application that collects, transforms, and stores data from a large e-commerce site API, allowing users to analyze this data. I have roughly 20-50 daily users with an average engagement time of 2.5 minutes.
I'm curious if this would be interesting or unique to interviewers. For the first time, I'm seriously considering changing careers (currently in finance), building a resume, and diving into SWE interview prep. Do many people have personal projects like this that are actively used in the real world? Is this something that will help me in interviews or on my resume more than random cookie-cutter portfolio projects?
Right now, I'm looking at data engineer positions that develop ETL pipelines. I've noticed that all of my projects usually involve building processes to analyze public data, and I think this could be a good place to start.
Would love to hear your thoughts as i don't really have any reference points for myself
Thanks!
submitted by soiledboy to cscareerquestions [link] [comments]


2024.05.21 17:32 azmixedup How to stack plug-ins in side panel?

How to stack plug-ins in side panel?
I'm new to Obsidian. As I was watching YouTube videos on how to use it, I noticed a neat customization that allows you to see Calendar and Day Planner stacked in the right panel at the same time.
How is this done?
submitted by azmixedup to ObsidianMD [link] [comments]


2024.05.21 17:32 amerpie Using Obsidian as a Life Record

There a lot of posts on this sub about using Obsidian for academic and business purposes but my own use case leans more towards using it as a life record. I'm interested in finding out more about how other people use it that way, particularly anything that is automated. I wrote a full blog post with links and more information and with workflow info if you are interested.
Daily Note A lot of that info is centered around my daily note. That's where I record: - Wake time - Status (work, home, travel) - Daily weather - Appointments - Things I learned - A chronological record of the day - Gratitude list - Notes created that day - Notes modified that day - Tasks completed from my task manager (Things 3)
Media Consumption
I've automated recording books, TV series, movies and music using RSS.. I'm not much of a game player so I haven't tried doing anything in that area, although I know the MediaDB plugin has the ability to do manual imports on both video and board games.
Web Content
I primarily rely on Omnivore for automated imports and MarkDownload for manual imports of web content. I use a shortcut on iOS.
Email
I know a couple of ways to get email into Obsidian, through Readwise and my own method using IFTTT and Hazel.
Other Info
I also have templates for restaurants where I eat and a workflow for people in my life. For places I visit, I use either the MapView plugin or a Drafts action that captures geolocation
submitted by amerpie to ObsidianMD [link] [comments]


2024.05.21 17:29 deathdramon666 What is this?

https://preview.redd.it/d8ic9ftyss1d1.png?width=1597&format=png&auto=webp&s=c77df7e58feaaeb01cecd974fc2f2f2062c612c7
I tried opening the options of a chrome extension and this was what opened.
submitted by deathdramon666 to uBlockOrigin [link] [comments]


2024.05.21 16:48 gretchens Recommend a display for an MBP!

My beloved 27" thunderbolt display is showing signs that it may not be long for this world, so I am looking into a replacement. I dock a MacBook pro to it daily, and the MBP is getting upgraded this summer. My IT department told me to look at 30" range monitors for when the TB dies. I am doing mostly web/ spreadsheet stuff (so I don't need perfect color rendering etc like someone else might, and the studio seems like overkill for my needs) but is there any decent replacement?
I love the size but also that the camera and speakers are great, too, so I would probably also need a recommendation on replacing those items since the all in one concept is about as old as my display - I also do a lot of zoom/google meet each day. I'd say the one thing I don't love about the TB is the glare as I am back to a window.
Thanks for any tips!
submitted by gretchens to mac [link] [comments]


2024.05.21 16:28 Jazzlike_Tonight_982 proxy mode breaking https

I have a basic rule for outgoing traffic using AV, a web filter, some application control...nothing really fancy. however in proxy mode, my users are having issues getting to HTTPS sites (especially with any redirects). When switching to flow-based, the issue resolves.
Has anybody else seen this before?
submitted by Jazzlike_Tonight_982 to fortinet [link] [comments]


http://rodzice.org/