Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "any key"
-
My girlfriends mom asked whether I could fix her coworkers laptop. She claimed that it had viruses installed and laptop is laggy..
So... I got that laptop just now, got home and turned it on. It doesn't have WiFi drivers installed and I do not have any free Ethernet cable right now.
About the lags... Well you won't believe how many custom tool bars and security programs there were. McAffe, AVG, ESET and some Russian made firewall which asks for license key every 5mins.
And she asked me to reinstall windows and keep every file of hers, and she didn't bother to point which files of 300gb of photos/videos/docs are worth keeping and which are not.. HDD is 300GB :A fuck me
P. S. Since it's my first rant I can say ranting helps a lot to calm down23 -
7 am. Dog wants out. I roll out of bed after trying to pretend I am dead.
Walk down the stairs to the side door. Half asleep and notice that the door has daylight shining through on the lock side. Didn't shut it all the way the night before. Walk outside. Dog does his thing. Turn around. Doors locked.
Fuck.
Go for my phone. In the house. Go for my keys. In the house. Fuck. Fuck a duck.
Start checking my windows. One opens a fraction of an inch. Doesn't do me any good. Dog is outside with me. Freezing his ass off. It's like 5 degrees here.
Both of my neighbors don't answer their door. Life flashes before my eyes. Put my dog in my jacket to warm him up. Little 15lb rat terrier. Not made for snow.
He's fine for now. I grab a piece of rebar from my backyard and lever my window a bit more open, busting one of the locks.
And then I yell "ALEXA. OPEN THE FRONT DOOR." The voice of an angel responds. "OK." Whirrr. Click. Door opens. Sweet warmth.
I need a fake rock with a key under it.
Great Sunday.18 -
And here comes the last part of my story so far.
After deploying the domain, configuring PCs, configuring the server, configuring the switch, installing software, checking that the correct settings have been applied, configuring MS Outlook (don't ask) and giving each and every user a d e t a i l e d tutorial on using the PC like a modern human and not as a Homo Erectus, I had to lock my door, put down my phone and disconnect the ship's announcement system's speaker in my room. The reasons?
- No one could use USB storage media, or any storage media. As per security policy I emailed and told them about.
- No one could use the ship's computers to connect to the internet. Again, as per policy.
- No one had any games on their Windows 10 Pro machines. As per policy.
- Everyone had to use a 10-character password, valid for 3 months, with certain restrictions. As per policy.
For reasons mentioned above, I had to (almost) blackmail the CO to draft an order enforcing those policies in writing (I know it's standard procedure for you, but for the military where I am it was a truly alien experience). Also, because I never trusted the users to actually backup their data locally, I had UrBackup clone their entire home folder, and a scheduled task execute a script storing them to the old online drive. Soon it became apparent why: (for every sysadmin this is routine, but this was my first experience)
- People kept deleting their files, whining to me to restore them
- People kept getting locked out because they kept entering their password WRONG for FIVE times IN a ROW because THEY had FORGOTTEN the CAPS lock KEY on. Had to enter three or four times during weekend for that.
- People kept whining about the no-USB policy, despite offering e-mail and shared folders.
The final straw was the updates. The CO insisted that I set the updates to manual because some PCs must not restart on their own. The problem is, some users barely ever checked. One particular user, when I asked him to check and do the updates, claimed he did that yesterday. Meanwhile, on the WSUS console: PC inactive for over 90 days.
I blocked the ship's phone when I got reassigned.
Phiew, finally I got all those off my chest! Thanks, guys. All of the rants so far remind me of one quote from Dave Barry:
7 -
Years ago I was an application developer at a medium sized corporation and was also responsible for support for an HR department. This occurred early one morning shortly after I arrived at work.
User: My app doesn't work.
Me: What's wrong with it?
User: I just get a blank screen.
Me: A blank screen? What happens when you hit a key?
User: Nothing.
Me: Do any apps work?
User: No, I just get a blank screen.
Me: Is your monitor on?
User: Yes, I turned it on.
This type of witty banter went on for several minutes when the answer suddenly hit me.
Me: Is your computer turned on?
User: Do I need to turn it on?
Me: Did you turn it off before you went home last night?
User: Yes.
Me: And do you normally turn it on in the morning when you come in?
User: Yes.
Me: Then why didn't you turn it on this morning when you came in?
User: I didn't know I needed to.
It was at this point I heard the programmer over the cubicle wall from me burst out laughing. He had been listening to the conversation and couldn't take it anymore.
The really sad part is that this was not an isolated incident. This kind of stuff occurred on a semi-regular basis with this individual's department.10 -
Da Fuck!?!
Yesterday I found some abnormal activity on my server, someone was trying to brute force my ssh as root since two days! Started raging and installed fail2ban (which automatically bans an IP if it fails to log X times and eventually sends me an email). Woke up this morning to find that a fucking Chinese guy/malware spent the whole night trying to brute Force me!
Fucking cunt! Don't you have any better to do!!
My key is a 32 characters long encrypted key, with the ban he can try 3 passwords /2 hours, good luck brute forcing it you bitch!
35 -
Working with a radio chip we selected because it had built-in encryption. Cannot make the encryption work, thus in contact with the manufacturer:
"- I cannot make the encryption work, it's like the chip doesn't want to take a key.
- which key do you use?
- does it matter?
- well yes, you can't just use any key!
- why not?
- you need to get an approved key from us.
- why is that?
- so that your competitors can't read your data!
- ...
- ...
- so the way to get working keys is to get them from you?
- of course!
- keys are 256 bits. Can we potentially use all of them?
- OF COURSE NOT!
- how many can we get from you?
- one! We reserve it from your company.
- are you telling me that all units within a company will need to have the exact same encryption key?
- yes!
- so anyone with our product could eavesdrop another same product?
- well yes, but it's all within your own products.
- ...
- ...
- that's not how encryption is supposed to work.
- but it's safe, your competitors cannot eavesdrop!
- I'm out of here."
(We finally found a satisfactory work-around, but i am still pissed at them)9 -
I work in a company where I'm the only developer, with everyone being designers or marketing or sales. Typically like the scene from Silicon Valley.
Moto was to create a ticket selling website for their products, and make sure they worked as well. It was all fine, until deadlines were discussed. They wanted it done within 2 weeks, the entire backend dashboard, API and front end.
I told them it's almost impossible to do it, but they insisted on it. So, I made a minimal dashboard and told them, I haven't completed a few things, such as if you edit data in one place, it won't reflect in other tables. So, be careful while editing the data.
They nodded their head for everything, yesterday was site launch and 2 hours before that one bastard decided to changed the product names to something "catchy" but failed to change the same in other places.
I had used the name as foreign key, so querying other DBs became a fuck all issue, and eventually API stopped giving any response to front end calls.
I got extremely pissed, and shouted at that dude, for fucking everything up. He said, you're the tech guy and you should've taken all this into account.
I sat and hardcoded all the data into database again, made sure site is live. Once it was live, these guys call a company meeting and fire me saying I was incompetent in handling the stressful situation.
At that moment, I lost my shit and blasted each of those people. The designer started crying since her absurd designs(though great) couldn't be realised in CSS that too within 2 weeks time.
One of the worst experience for working for a company. I could've taken the website down, and told them to buzz off if they'd called, I couldn't get myself to do it, hence ranting here.
I seriously feel, all these tech noob HRs need to get a primer course on how to deal with problems of a programmer before they get to hire one, most of these guys don't know what we're trying to tell in itself.
I find devRant to be the only place where I can get someone to understand the issues that I face, hence ranted.
TL;DR: Coded ticket selling site in 2 weeks. 3 hours to launch, data entry dude fucks up. I clean all the mess, get the site online. Get fired as soon as that happens.
Live long and prosper. Peace.16 -
Storytime!
Manager: Hey fullstackchris, the maps widget on our app stopped working recently...
Dev: (Skeptical, little did he know) Sigh... probably didn't raise quota or something stupid... Logs on to google cloud console to check it out...
Google Dashboard: Your bill.... $5,197 (!!!!!!) Payment method declined (you think?!)
Dev: 😱 WTF!?!?!! (Calls managers) Uh, we have HUGE problem, charges for $5000+ in our google account, did you guys remove the quota limits or not see any limit reached warnings!?
Managers: Uh, we didn't even know that an API could cost money, besides, we never check that email account!
Dev: 🤦♂️ yeah obviously you get charged, especially when there have literally been millions of requests. Anyway, the bigger question is where or how our key got leaked. Somewhat started hammering one of the google APIs with one of our keys (Proceeds to hunt for usages of said API key in the codebase)
Dev: (sweating 😰) did I expose an API key somewhere? Man, I hope it's not my fault...
Terminal: grep results in, CMS codebase!
Dev: ah, what do we have here, app.config, seems fine.... wait, why did they expose it to a PUBLIC endpoint?!
Long story short:
The previous consulting goons put our Angular CMS JSON config on a publicly accessible endpoint.
WITH A GOOGLE MAPS API KEY.
JUST CHILLING IN PLAINTEXT.
Though I'm relieved it wasn't my fault, my faith in humanity is still somewhat diminished. 🤷♂️
Oh, and it's only Monday. 😎
Cheers!11 -
The Orange Juice Saga ....
I've just come off one of the stupidest calls ever.
Firstly, I am not in tech support, I'm a software developer - read the below with this in mind.
My client called up to say the system I created as been compromised. When he attempts to login, he is logged off his Windows machine.
He'd also apparently taken his PC to ***insert large UK computer superstore here***, who took £100 plus to look at the machine and conclude his needs to buy a new PC.
I remoted into his computer to see WTF was going on.
As he described, visiting my login form did log you out. In fact, whenever you pressed the "L" key you were logged out. Press the "M" key, all windows were minimized. Basically, all Windows hotkeys appeared to be active, without the need to press the Windows key.
Whilst connected to his PC I spent a good 30 minutes checking keyboard settings and came up short.
After asking all the normal questions (has anything changed on your PC, have you installed stuff lately etc.) without any useful answers I got nothing.
I then came across an article stating several presses of the Windows in quick succession will solve the issue.
I got the client to try this, pressed the "L" key (which would have logged me off previously) and the issue was resolved.
Basically, the Windows key was "stuck", which oddly makes your PC kind of useless.
I asked the client if they'd split anything on the keyword whilst working. His exact word were simply lol:
"Oh yer, yesterday, I was trying to drink a glass of orange quickly and split some in the corner of keyboard. I did clean it up quickly though".
Yep, the issue was due to the client spilling orange juice on their keyboard , which in turn made the Windows key stick.
Disaster averted.
A call that started with the client stating I made a system that was easily compromised (i.e. my fault), morphed into a sorry saga of cold drinks.
The client did ask why the ***superstore name*** charged him money for that and recommended a new machine. That is a good question and demonstrated some the questionable tech support practices we see nowadays, even at very large stores.
To be fair to the client, he told me to bill him for half a days work as it was his own fault.
When I'm able to stop myself involuntarily face palming, I'm off for a swim to unwind :)
7 -
More sysadmin focused but y’all get this stuff and I need a rant.
TLDR: Got the wrong internship.
Start working as a sysadmin/dev intern/man-of-many-hats at a small finance company (I’m still in school). Day 1: “Oh new IT guy? Just grab a PC from an empty cubicle and here’s a flash drive with Fedora, go ahead and manually install your operating system. Oh shit also your desktop has 2g of ram, a core2 duo, and we scavenged your hard drive for another dev so just go find one in the server room. And also your monitor is broken so just take one from another cubicle.”
Am shown our server room and see that someone is storing random personal shit in there (golf clubs propped against the server racks with heads mixed into the cabling, etc.). Ask why the golf clubs etc. are mixed in with the cabling and server racks and am given the silent treatment. Learn later that my boss is the owners son, and he is storing his personal stuff in our server room.
Do desktop support for end users. Another manager asks for her employees to receive copies of office 2010 (they’re running 2003 an 2007). Ask boss about licensing plans in place and upgrade schedules, he says he’ll get back to me. I explain to other manager we are working on a licensing scheme and I will keep her informed.
Next day other manager tells me (*the intern*) that she spoke with a rich business friend whose company uses fake/cracked license keys and we should do the same to keep costs down. I nod and smile. IT manager tells me we have no upgrade schedule or licensing agreement. I suggest purchasing an Office 365 subscription. Boss says $150 a year per employee is too expensive (Company pulls good money, has ~25 employees, owner is just cheap) I suggest freeware alternatives. Other manager refuses to use anything other than office 2010 as that is what she is familiar with. Boss refuses to spend any money on license keys. Learn other manager is owners wife and mother of my boss. Stalemate. No upgrades happen.
Company is running an active directory Windows Server 2003 instance that needs upgrading. I suggest 2012R2. Boss says “sure”. I ask how he will purchase the license key and he tells me he won’t.
I suggest running an Ubuntu server with LDAP functionality instead with the understanding that this will add IT employee hours for maintenance. Bosses eyes glaze over at the mention of Linux. The upgrade is put off.
Start cleaning out server room of the personal junk, labeling server racks and cables, and creating a network map. Boss asks what I’m doing. I show him the organized side of the server room and he says “okay but don’t do any more”.
... *sigh* ...20 -
Jesus and Satan have an argument as to who is the better programmer. This goes on for a few hours until they come to an agreement to hold a contest with God as the judge. They set themselves before their computers and begin. They type furiously, lines of code streaming up the screen, for several hours straight.
Seconds before the end of the competition, a bolt of lightning strikes, taking out the electricity. Moments later, the power is restored, and God announces that the contest is over. He asks Satan to show his work. Visibly upset, Satan cries and says, “I have nothing. I lost it all when the power went out.”
“Very well,” says God, “let us see if Jesus has fared any better.”
Jesus presses a key, and the screen comes to life in vivid display, the voices of an angelic choir pour forth from the speakers.
Satan is astonished. He stutters, “B-b-but how?! I lost everything, yet Jesus’ program is intact! How did he do it?”
God chuckles, “Everybody knows… Jesus saves.”4 -
My first experience with Swift ended in me infecting myself with a virus (kinda). I wanted to create a macOS app that would listen for a global key event, catch it and then type a word.
During development I set it up to listen for ANY key event and to type "BALLS". So what happened? I compiled the code, everything looked good, I started the app and pressed a key which emitted a key event. The event was caught by my app and it typed "BALLS", just as expected. However, the typing of the word caused a NEW key event to be emitted, which the app also caught. The infinite loop was a fact. FUCK!
I tried closing down XCode but all I could see was "BALLS BALLS BALLS" everywhere. I tried everything I knew but it just kept typing "BALLS". I had to hold down my power button to make it stop.
I finally finished the app (which I named "The Balls App", I kept the word "BALLS"). I solved this issue by only listening for KeyUp and when emitting the "BALLS" word I just used KeyDown.7 -
Juniors are a fun bunch to work with.
Over confident, hero complex of that fresh graduate high, and then thrown in to the real world! Where there hopes and dreams are crushed in minutes when they see what monolithic applications really look like!!
But don't let that overwhelm you, your not going to be changing all of it any time soon, hell some of this code hasn't been touched in 5+ years and still works without fail.
Don't stress about the work load, you can only write 1 line of code at a time anyway, and hell, even seniors make mistakes.
The key about being able to manage this beast is simple, break it! Because the more you break it, the more you'll understand how a project is put together, for better or worse. Learn from the examples in front of you, and learn what not to do in the future 😎
But more importantly, plan your changes, whiteboard the high level logic of what it is you want to add, then whiteboard in the current codebase and determine where to slice this bitch up, then when it all looks well and good, take out your scalpel and slice and dice time.
Don't worry, your changes aren't going to production anytime soon, hell, you'll be lucky to get past the first pull request with this working 100% the first time, and that's a good thing, learn from tour short comings and improve your own knowledge for the next time!2 -
Paypal Rant #3
One day I'll go to Paypal HQ and...
... change all the toilet rolls to face the wrong way
... remap all the semicolons to be the Greek equivalent character
... change all the door signs so they say "pull" instead of "push" and vice versa
... modify all the stairs to have variable heights
... programmatically shuffle the elevator buttons and randomly assign the alarm key to any of the most visited floors
... pour cocoa onto all the keyboards and wipe them off cleanly
... attach clear duct tape over their mouse sensors and insert really weak batteries or mess with their cables
I'll wait a day or two until they experience a sudden shortage of developers, then bombard them with thousands of fake applications from seemingly amazing candidates, then write an AI bot to continue argumentation with HR.
I'll wait another week or so until the company dissolves and with them, all my issues in life.
No need to be overly vulgar this time because you all know the deal. I hate this fucking company. Please Paypal do us all a favor and go fuck yourself.9 -
Buckle up kids, this one gets saucy.
At work, we have a stress test machine that trests tensile, puncture and breaking strength for different materials used (wood construction). It had a controller software update that was supposed to be installed. I was called into the office because the folks there were unable to install it, they told me the executable just crashed, and wanted me to take a look as I am the most tech-savvy person there.
I go to the computer and open up the firmware download folder. I see a couple folders, some random VBScript file, and Installation.txt. I open the TXT, and find the first round of bullshit.
"Do not run the installer executable directly as it will not work. Run install.vbs instead."
Now, excuse me for a moment, but what kind of dick-cheese-sniffing cockmonger has end users run VBScript files to install something in 2018?! Shame I didn't think of opening it up and examining it for myself to find out what that piece of boiled dogshit did.
I suspend my cringe and run it, and lo and behold, it installs. I open the program and am faced with entering a license key. I'm given the key by the folks at the office, but quickly conclude no ways of entering it work. I reboot the program and there is an autofilled key I didn't notice previously. Whatever, I think, and hit OK.
The program starts fine, and I try with the login they had previously used. Now it doesn't work for some reason. I try it several times to no avail. Then I check the network inspector and notice that when I hit login, no network activity happens in the program, so I conclude the check must be local against some database.
I browse to the program installation directory for clues. Then I see a folder called "Databases".
"This can't be this easy", I think to myself, expecting to find some kind of JSON or something inside that I can crawl for clues. I open the folder and find something much worse. Oh, so much worse.
I find <SOFTWARE NAME>.accdb in the folder. At this point cold sweat is already running down my back at the sheer thought of using Microsoft Access for any program, but curiosity takes over and I open it anyway.
I find the database for the entire program inside. I also notice at this point that I have read/write access to the database, another thing that sent my alarm bells ringing like St. Pauls cathedral. Then I notice a table called "tUser" in the left panel.
Fearing the worst, I click over and find... And you knew it was coming...
Usernames and passwords in plain text.
Not only that, they're all in the format "admin - admin", "user - user", "tester - tester".
I suspend my will to die, login to the program and re-add the account they used previously. I leave the office and inform the peeps that the program works as intended again.
I wish I was making this shit up, but I really am not. What is the fucking point of having a login system at all when your users can just open the database with a program that nowadays comes bundled with every Windows install and easily read the logins? It's not even like the data structure is confusing like minified JSON or something, it's literally a spreadsheet in a program that a trained monkey could read.
God bless them and Satan condemn the developers of this fuckawful program.8 -
It goes like this.
I have one final task to solve before starting in a new job at a different company. This guy, which is also a board member in the company in which I'm currently hired, is also an IT consultant and project manager in a fairly large company. This said person is also a key person for me being able to solve this last issue. I send him a complete guide on what he has to do before I can move on and wrap it all up.
First conflict arises because he doesn't follow the guide and tells me something is not working. I kindly inform him why and the response I get is very personal and not kind in any way, telling me and my boss that I am bad at my job and that he will bill us for 1000 USD for the 5 hours he used "debugging" and testing. This should have taken him 30 minutes and I have no idea what he spent those 5 hours doing.
It comes down to that my boss sides with this asshole and tells me that I have to do the task all over and test the system for the 4th time (yes I tested it 3 times beforehand to make sure nothing could go wrong) What my boss and the asshole doesn't know is that my uncle is vice president in the firm the asshole is working for. After kindly reminding this asshat that he has to follow the guide and that I can confirm everything is working, he keeps on attacking me. It's very rare that I fuck up and I have consulted 2 colleagues and got them to test it as well. They found no issues at all. The asshole ignored my request of documentation that something was not working.
I'm so full of being treated as an idiot so I send my uncle the email correspondence with the asshole to confirm that this is not how any of their employees should behave independant of my ability to do my job.
He will speak with this fucker tomorrow at work as first thing in the morning. I'm not proud of the way I went about this, but that was like the last drop, if you know what I mean.
Sorry for the long rant.20 -
With all the people showing off their setup and input devices i thought it's time to show you my keyboard...
Key features:
- mechanical keys
- sturdy af; best for ranting (survived more angry fist strokes than any device should ever receive)
- older than me and outlived 5 (!) mice
- awesome retro look
- would beat a nokia in hunger games
- best code buddy ever (and propably oldest, too)
Hope i'll be able to continue coding on it another 20 years... Someday i may gift it to my grandchildren.
18 -
How my keyboard evolves:
0. Like any normal man, I started with a cheap standard Qwerty keyboard. As I began learning programming, I wanted something more elegant, so...
1. I've been using layout Dvorak (and then Programmer Dvorak) for like 5 years+ now. Anyone has intention to type on my machine soon gives up or even is blocked by me from the very start. It always takes a couple of minutes to explain to them what's going on here. They think I'm weird. I feel untouchable :)
2. My first mechkey was a 104-key Filco. Time flew by and I wanted my thing to be more compact so I went for a 66% and a TKL.
3. Recently I find out that though my keyboard is not a full-sized, there're yet some keys I've never touched (the bottom right modifiers, scroll lock, etc), so I look for a leaner one: HHKB and its alike but with slight remappings. Now I'm satisfied with the tiny, corners-trimmed keyboard but others look at it and ask how it is even possible to scroll the web page using the thing.
Prob 1: my boss can never type on my keyboard. Sometimes he still grumbles when he cannot correct my fouls right on my machine.
Prob 2: my keyboards at home and at work are not the same and some keymapping cannot applied to one of the two. That's async.
21 -
Worst WTF dev experience? The login process from hell to a well-fortified dev environment at a client's site.
I assume a noob admin found a list of security tips and just went like "all of the above!".
You boot a Linux VM, necessary to connect to their VPN. Why necessary? Because 1) their VPN is so restrictive it has no internet access 2) the VPN connection prevents *your local PC* from accessing the internet as well. Coworkers have been seen bringing in their private laptops just to be able to google stuff.
So you connect via Cisco AnyConnect proprietary bullshit. A standard VPN client won't work. Their system sends you a one-time key via SMS as your password.
Once on their VPN, you start a remote desktop session to their internal "hopping server", which is a Windows server. After logging in with your Windows user credentials, you start a Windows Remote Desktop session *on that hopping server* to *another* Windows server, where you login with yet another set of Windows user credentials. For all these logins you have 30 seconds, otherwise back to step 1.
On that server you open a browser to access their JIRA, GitLab, etc or SSH into the actual dev machines - which AGAIN need yet another set of credentials.
So in total: VM -> VPN + RDP inside VM -> RDP #2 -> Browser/SSH/... -> Final system to work on
Input lag of one to multiple seconds. It was fucking unusable.
Now, the servers were very disconnect-happy to prevent anything "fishy" going on. Sitting at my desk at my company, connected to my company's wifi, was apparently fishy enough to kick me out every 5 to 20 minutes. And that meant starting from step 1 inside the VM again. So, never forget to plugin your network cable.
There's a special place in hell for this admin. And if there isn't, I'll PERSONALLY make the devil create one. Even now that I'm not even working on this any more.8 -
*tries to SSH into my laptop to see how that third kernel compilation attempt went*
… From my Windows box.
Windows: aah nope.
"Oh God maybe the bloody HP thing overheated again"
*takes laptop from beneath the desk indent*
… Logs in perfectly. What the hell... Maybe it's SSH service went down?
$ systemctl status sshd
> active (running)
Well.. okay. Can I log in from my phone?
*fires up Termux*
*logs in just fine*
What the fuck... Literally just now I added the laptop's ECDSA key into the WSL known_hosts by trying to log into it, so it can't be blocked by that shitty firewall (come to think of it, did I disable that featureful piece of junk yet? A NAT router * takes care of that shit just fine Redmond certified mofos).. so what is it again.. yet another one of those fucking WanBLowS features?!!
condor@desktop $ nc -vz 192.168.10.30 22
Connection to 192.168.10.30 22 port [tcp/ssh] succeeded!
ARE YOU FUCKING FOR REAL?!
Fucking Heisen-feature-infested piece of garbage!!! Good for gaming and that's fucking it!
Edit: (*) this assumes that your internal network doesn't have any untrusted hosts. Public networks or home networks from regular users that don't audit their hosts all the time might very well need a firewall to be present on the host itself as well.16 -
Whenever im programming in Python it seems like my finger naturally presses the semicolon key after any statement😂5
-
We are on a roll here people (side note, if You are joining the site, thank you but if you are using disposable email accounts at least wait for the verification code to arrive to said account):
So our most well know and belowed CMS that brings lots of love and feels to those that have to (still) deal with it, had some interesting going on:
Oh Joy! "Backdoor in Captcha Plugin Affects 300K WordPress Sites", well arent You a really naughty little boy, eh?
https://wordfence.com/blog/2017/...
Remember that "little" miner thingy that some users here has thought about using for their site? Even Yours truly that does make use of Ads Networks (fuck you bandwidth is not free) even I have fully condenmed the Miner type ads for alot of reasons, like your computer being used as a literal node for DDoSing, well... how about your "Antivirus" Android phone apps being literally loaded with miner trojans too?
https://securelist.com/jack-of-all-...
"When You literally stopped giving any resembles of a fuck what people think about Your massive conglomerate since You still literally dominate the market since alot of people give zero fucks of how Orwellian We are becoming at neck-breaking speed" aka Google doesnt want other webbrowsers to get into market, Its happy with having MemeFox as its competitor:
https://theregister.co.uk/2017/12/...
Talking about MemeFox fucking up again:
https://theregister.co.uk/2017/12/...
And of course here at Legion Front we cant make finish a report without our shitting at Amazon news report:
"French gov files €10m complaint: Claims Amazon abused dominance
Probe found unfair contracts for sellers"
More News at:
https://legionfront.me/page/news
And for what you may actually came and not me reporting stuff at Legion's Orwell Hour News™ ... the free games, right?:
Oxenfree is free in GoG, its a good game, I played like 2 months after its release and I think I heard they wanted to make a Live Action movie or some sort of thing after it:
https://www.gog.com/game/oxenfree
Kingdom Classic is also free:
http://store.steampowered.com/app/...
Close Order Steam Key: HWRMI-2V3PQ-ZQX8B
More Free Keys at:
https://legionfront.me/ccgr
4 -
One of our newly-joined junior sysadmin left a pre-production server SSH session open. Being the responsible senior (pun intended) to teach them the value of security of production (or near production, for that matter) systems, I typed in sudo rm --recursive --no-preserve-root --force / on the terminal session (I didn't hit the Enter / Return key) and left it there. The person took longer to return and the screen went to sleep. I went back to my desk and took a backup image of the machine just in case the unexpected happened.
On returning from wherever they had gone, the person hits enter / return to wake the system (they didn't even have a password-on-wake policy set up on the machine). The SSH session was stil there, the machine accepted the command and started working. This person didn't even look at the session and just navigated away elsewhere (probably to get back to work on the script they were working on).
Five minutes passes by, I get the first monitoring alert saying the server is not responding. I hoped that this person would be responsible enough to check the monitoring alerts since they had a SSH session on the machine.
Seven minutes : other dependent services on the machine start complaining that the instance is unreachable.
I assign the monitoring alert to the person of the day. They come running to me saying that they can't reach the instance but the instance is listed on the inventory list. I ask them to show me the specific terminal that ran the rm -rf command. They get the beautiful realization of the day. They freak the hell out to the point that they ask me, "Am I fired?". I reply, "You should probably ask your manager".
Lesson learnt the hard-way. I gave them a good understanding on what happened and explained the implications on what would have happened had this exact same scenario happened outside the office giving access to an outsider. I explained about why people in _our_ domain should care about security above all else.
There was a good 30+ minute downtime of the instance before I admitted that I had a backup and restored it (after the whole lecture). It wasn't critical since the environment was not user-facing and didn't have any critical data.
Since then we've been at this together - warning engineers when they leave their machines open and taking security lecture / sessions / workshops for new recruits (anyone who joins engineering).26 -
You know, I am getting really fucking irate posting them rants about how shitty my job is.
I'm more than fucking competant, but this company is turning me into a blithering, raging, frothing maniac.
I am sitting doing my devOps at the moment. On top of that I am the network admin, the sys admin, the sec admin, the fucking fuck admin (you get the point) and now I am being told to go out and work in the field because "The technician is busy with calls, and doesn't have time". These calls are ALL FUCKING PRINTER CALLS. SET UP USERS TO PRINT AND FUCKING SCAN.
I am not being a shithead by saying no. I have spent the last year or so doing favours for these bastards, I don't get any compensation in any form for it, and it is just making my life hell. The reason I went into devOps is so that I don't have to fucking deal with shit like this. I spent years in the field, and I fucking hated it. I was good at what I did, but I fucking hated it.
Now I am back there. They earn more than i do, those printer techs, but I am doing their fucking work for them. I have even made them simple little fucking scripts so that 90% of their work is done in two clicks.
Fucksakes. Now my motherfucking right shift key doesn't want to operate properly. Been using this keyboard for about 6 years now, and now it decides to fuck out. Fuck.
As standing, I am fucking sick and fucking tired. I am drinking energy drinks and mass amounts of coffee just to stay functional (because I sit up until 12AM trying to get through all my work - everyday of the week). Reported to tech director, doesnt give a single fuck. "Stick around, things will get better".
Yeah, fuck you.
Seriously thinking about freelancing.
Don't know if it pays well though.3 -
I hate access. I wish I could use literally any other program. But they're not authorized.
I'm the only one working on this, and everything is closed. How the fuck is the object in use somewhere else? And where the fuck did my primary key go???7 -
.. for the first time I permanently lost access to one of my GPG keys that were actually in use. No revocation certificates, nothing in the keychains on any of my hosts... Keychain flash drive that got stolen had a copy of both, my fileserver used to have a copy of that flash drive until I deleted it to make room for a filesystem migration, and my laptop used to have one.. until I decommisioned it and shredded its hard drive to be deployed somewhere else...
fuck
I can't sign my git commits anymore, and I can't revoke the key either.
(╯°□°)╯︵ ┻━┻15 -
Inspired by the comment I posted on another rant.
My uni decided to be one of those progressive tech schools that start people with Python. Mind you, I had prepared myself with studying as much as I could with math and programming by automating things and similar stuff in our computer when I was at my previous job, so I had a better idea as to what i could expect.
Introduction to computer science and programming with Python or some shit like that was the name of the class, and the instructor was a fat short ugly woman with a horrible attitude AND a phd in math, not comp sci and barely any industrial knowledge of the field.
She gave us the "a lot of you will fail" speech, which to me is code for "I suck and have no clue what I am doing"
One assignment involved, as per the requirements the use of switch cases. Now, unless someo knew came about, Python does not have swio cases. Me and a couple of less newbie like students tried to point out that switch cases were non existent and that her switch case example was in Javascript, not python, curly braces and everything. She told us to make it work.
We thought that she meant using a function with a dictionary and we pass the key and shit, a simple way of emulating the switch case.
NOPE she took points and insisted that she meant the example. We continuously pointed out that her example was in JS and that at the time Python did not have switch cases. The nasty woman laughed out and said that she didn't expect anyone to finish the assignment with full points.
Out of 100 points everyone got a 70. No problem. Wrote a detailed letter to the dean. Dean replied and talked to her (copied her in the email because fuck you bitch) and my grade was pulled up to full mark.
Every other class I had with her she did not question me. Which was only another class on some other shit I can't remember.
Teachers are what make or break a degree program. What make or break the experience, going to college is putting too much faith on people. If you ask me, trade certification, rigorous training is the future of computer science, or any field really. Rather than spending 4+ years studying a whoooole lotta shit for someone to focus on one field and never leave it.16 -
Ten Immutable Laws Of Security
Law #1: If a bad guy can persuade you to run his program on your computer, it's not solely your computer anymore.
Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore.
Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore.
Law #4: If you allow a bad guy to run active content in your website, it's not your website any more.
Law #5: Weak passwords trump strong security.
Law #6: A computer is only as secure as the administrator is trustworthy.
Law #7: Encrypted data is only as secure as its decryption key.
Law #8: An out-of-date antimalware scanner is only marginally better than no scanner at all.
Law #9: Absolute anonymity isn't practically achievable, online or offline.
Law #10: Technology is not a panacea.3 -
I just lost faith in the entire management team of the company I'm working for.
Context: A mid sized company with
- a software engineering departmant consisting of several teams working on a variety of products and projects.
- a project management department with a bunch of project managers that mostly don't know shit about software development or technical details of the products created by engineering.
Project management is unhappy about the fact that software engineering practically never sticks to the plan regarding cost, time and function that was made at the very beginning of the project. Oh really? Since when does waterfall project management work well? As such they worked out a great idea how to improve the situation: They're going to implement *Shopfloor Management*!
Ever heared about Shopfloor Management? Probably not, because it is meant for improving repetitive workflows like assembly line work. In a nutshell it works by collecting key figures, detecting deviation in these numbers and performing targeted optimization of identified problem areas. Of course, there is more to Shopfloor Management, but that refers largely to the way the process just described is to be carried out (using visualisation boards, treating the employee well, let them solve the actual problem instead of management, and so on...). In any case, this process is not useful for highly complex and hard-to-predict workflows like software development.
That's like trying to improve a book author's output by measuring lines of text per day and fixing deviations in observed numbers with a wrench.
Why the hell don't they simply implement something proven like Scrum? Probably because they're affraid of losing control, affraid of self managed employees, affraid of the day everybody realizes that certain management layers are useless overhead that don't help in generating value but only bloat.
Fun times ahead!8 -
It was my first ever hackathon. Initially, I registered with my friend who is a non coder but want to experience the thrill of joining a hackathon. But when we arrived at the event, someone older than us was added to our team because he was solo at that time. Eventually, this old guy (not too old, around his 20s) ( and let’s call him A) and I got close.
We chose the problem where one is tasked to create an ML model that can predict the phenotype of a plant based on genotypic data. Before the event, I didn’t have any background in machine learning, but A was so kind to teach me.
I learned key terms in ML, was able to train different models, and we ended up using my models as the final product. Though the highest accuracy I got for one of my model was 52%, but it didn’t discouraged me.
We didn’t won, however. But it was a great first time experience for me.
Also, he gave me an idea in pitching, because he was also taking MS in Data Science ( I think ) and he had a great background in sales as well, so yeah I got that too.2 -
!rant
!!pride
I tried finding a gem that would give me a nice, simple diff between two hashes, and also report any missing keys between them. (In an effort to reduce the ridiculous number of update api calls sent out at work.)
I found a few gems that give way too complicated diffs, and they're all several hundred lines long. One of them even writes the diff out in freaking html with colors and everything. it's crazy. Several of the simpler ones don't even support nesting, and another only diffs strings. I found a few possibly-okay choices, but their output is crazy long, and they are none too short, either.
Also, only a few of them support missing keys (since hashes in Ruby return `nil` by default for non-defined keys), which would lead to false negatives.
So... I wrote my own.
It supports diffing anything with anything else, and recurses into anything enumerable. It also supports missing keys/indexes, mixed n-level nesting, missing branches, nil vs "nil" with obvious output, comparing mixed types, empty objects, etc. Returns a simple [a,b] diff array for simple objects, or for nested objects: a flat hash with full paths (like "[key][subkey][12][sub-subkey]") as top-level keys and the diff arrays as values. Tiny output. Took 36 lines and a little over an hour.
I'm pretty happy with myself. 😁6 -
My life could get worse, but it's really shitty now.
Suffering from a serious back injury since last year, my health has been not so positieve lately.
It put a toll on my mood, which in turn asked it's price regarding my relationship. Needless to say that did not go well. Already a fe months single but we kept in touch.
Three days ago my back injury returned, and was unable to lead a normal life. Constant pain, coyld not even move in the house. Even going to the toilet was a terrible experience because when you move, you're in a world of pain.
I asked my ex girlfriend to help me, since she was the only one having a key to my house.
When she arrived i hoped to have some moral support and to help me mive around, ensuring i would not injure myself any more.
Instead i received the cold shoulder. When she wanted to help pe up she did it a bit too hard and the pain sheered thrpughout my body. Screaming in pain.
She promptly left, leaving keys behind.
The hardest part is that she just left without me being able to explain clearly why i screamed. She thought i was yelling at her while in reality i was yelling due to the immense pain.
After that i had to cut ties forever. Tabula rasa. So i removed everything that is related to that time and locked it in my vault.
Since then i can hardly focus, my mibd is numb and i cannot think straight. The alcohol and other sedatives are probably also involved, but still i feel my life is a mountain of depressing shit.
Needed to vent. And yes i post this because i have a need for some understanding, yes for now i crave for some attention and some encouraging, supportive words. I'm left With no other options since the person i wanted it from the most has simply left... And the fact i am unable to actually be social outside...
Fuck friends and relationships, right?13 -
Jesus and Satan have an argument as to who is the better programmer. This goes on for a few hours until they come to an agreement to hold a contest with God as the judge. They set themselves before their computers and begin. They type furiously, lines of code streaming up the screen, for several hours straight.
Seconds before the end of the competition, a bolt of lightning strikes, taking out the electricity. Moments later, the power is restored, and God announces that the contest is over. He asks Satan to show his work. Visibly upset, Satan cries and says, "I have nothing. I lost it all when the power went out."
"Very well," says God, "let us see if Jesus has fared any better."
Jesus presses a key, and the screen comes to life in vivid display, the voices of an angelic choir pour forth from the speakers.
Satan is astonished. He stutters, "B-b-but how?! I lost everything, yet Jesus' program is intact! How did he do it?"
God chuckles, "Everybody knows... Jesus saves."2 -
TLDR: There’s truth in the motto “fake it till you make it”
Once upon a time in January 2018 I began work as a part time sysadmin intern for a small financial firm in the rural US. This company is family owned, and the family doesn’t understand or invest in the technology their business is built on. I’m hired on because of my minor background in Cisco networking and Mac repair/administration.
I was the only staff member with vendor certifications and any background in networking / systems administration / computer hardware. There is an overtaxed web developer doing sysadmin/desktop support work and hating it.
I quickly take that part of his job and become the “if it has electricity it’s his job to fix it” guy. I troubleshoot Exchange server and Active Directory problems, configure cloudhosted web servers and DNS records, change lightbulbs and reboot printers in the office.
After realizing that I’m not an intern but actually just a cheap sysadmin I began looking for work that pays appropriately and is full time. I also change my email signature to say “Company Name: Network Administrator”
A few weeks later the “HR” department (we have 30 employees, it’s more like “The accountant who checks hiring paperwork”) sends out an email saying that certain ‘key’ departments have no coverage at inappropriate times. I don’t connect the dots.
Two days later I receive a testy email from one of the owners telling me that she is unhappy with my lack of time spent in the office. That as the Network Administrator I have responsibilities, and I need to be available for her and others 8-5 when problems need troubleshooting. Her son is my “boss” who is rarely in the office and has almost no technical acumen. He neglected to inform her that I’m a part time employee.
I arrange a meeting in which I propose that I be hired on full time as the Network Administrator to alleviate their problems. They agree but wildly underpay me. I continue searching for work but now my resume says Network Administrator.
Two weeks ago I accepted a job offer for double my current salary at a local software development firm as a junior automation engineer. They said they hired me on with so little experience specifically because of my networking background, which their ops dept is weak in. I highlighted my 6 months experience as Network Administrator during my interviews.
My take away: Perception matters more than reality. If you start acting like something, people will treat you like that.2 -
There's this junior I've been training. We gave him a bigger task than we usually do
"How do I link an object in table X with the corresponding object in table Y?"
"How are objects in two tables usually linked? How did you link Y with Z in the first place?"
"Em... Foreign Keys?"
"Yup"
"But there's not foreign key from X to Y."
"Well, create one. You've got full creative freedom over this task."
I sometimes feel like Juniors are either completely careless about past code or overly carefuly with not editing any past code. Frustrating but adorable2 -
My first job was not exactly a job but a freelance project. The guy that I delivered the website to thought that I'd charge money each time I pressed a key on my laptop when we met.
Had to explain to the guy that that's not how it works. That's not how any of it works.4 -
Deleted a servers crontab by executing crontab -r instead of crontab -e (typo mistake)
crontab -r deletes the users crontab without any confirmation and, just to top it off, the e key is located right next to r. WTH
At least we have backups.3 -
So I have seen this quite a few times now and posted the text below already, but I'd like to shed some light on this:
If you hit up your dev tools and check the network tab, you might see some repeated API calls. Those calls include a GET parameter named "token". The request looks something like this: "https://domain.tld/api/somecall/..."
You can think of this token as a temporary password, or a key that holds information about your user and other information in the backend. If one would steal a token that belongs to another user, you would have control over his account. Now many complained that this key is visible in the URL and not "encrypted". I'll try to explain why this is, well "wrong" or doesn't impose a bigger security risk than normal:
There is no such thing as an "unencrypted query", well besides really transmitting encrypted data. This fields are being protected by the transport layer (HTTPS) or not (HTTP) and while it might not be common to transmit these fields in a GET query parameter, it's standard to send those tokens as cookies, which are as exposed as query parameters. Hit up some random site. The chance that you'll see a PHP session id being transmitted as a cookie is high. Cookies are as exposed as any HTTP GET or POST Form data and can be viewed as easily. Look for a "details" or "http header" section in your dev tools.
Stolen tokens can be used to "log in" into the website, although it might be made harder by only allowing one IP per token or similar. However the use of such a that token is absolut standard and nothing special devRant does. Every site that offers you a "keep me logged in" or "remember me" option uses something like this, one way or the other. Because a token could have been stolen you sometimes need to additionally enter your current password when doings something security risky, like changing your password. In that case your password is being used as a second factor. The idea is, that an attacker could have stolen your token, but still doesn't know your password. It's not enough to grab a token, you need that second (or maybe thrid) factor. As an example - that's how githubs "sudo" mode works. You have got your token, that grants you more permissions than a non-logged in user has, but to do the critical stuff you need an additional token that's only valid for that session, because asking for your password before every action would be inconvenient when setting up a repo
I hope this helps understanding a bit more of this topic :)
Keep safe and keep asking questions if you fell that your data is in danger
Reeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee5 -
I'M BACK TO MY WEBDEV ADVENTURES GUYS! IT TOOK ME LIKE 4 MONTHS TO STOP BEING SO FUCKING DEPRESSED SO I CAN ACTUALLY STAND TO WORK ON IT AGAIN
I learned that the linear gradient looks cool as FUCK. Honestly not too fond of the colors I have right now, but I just wanted to have something there cause I can change it later. The page has evolved a bunch from my original concept.
My original concept was the bar in the middle just being a URL bar and having links on the sides. If I had kept that, it would have taken me a few hours to get done. But as time went on when I was working on it, my idea kept changing. Added the weather (had a forecast for a while but the code was gross and I never looked at the next days anyways, so I got rid of it and kept the current data). I wanted to attempt an RSS reader, but yesterday I was about to start writing the JavaScript to parse the feeds, then decided "nah", ended up making the space into a todo list.
The URL bar changed into a full command bar (writing the functions for the commands now, also used to config smaller things, such as the user@hostname part, maybe colors, weather data for city and API key, etc)....also it can open URLs and subreddits (that part works flawlessly). The bar uses a regex to detect if it's a legit URL (even added shit so I don't need http:// or https://), and if it's not, just search using duckduckgo (maybe I'll add a config option there too for search engines).
At this very moment it doesn't even take a second to fully load. It fetches weather data from openweathermap, parses it, and displays it, then displays the "user" name grabbing a localstorage value.
I'm considering adding a sidebar with links (configurable obviously, I want everything to be dynamic, so someone else could use my page if they wanted), but I'm not too sure about it.
It's not on git yet because I was waiting until I get some shit finished today before I commit. From the picture, I want to know if anyone has any suggestions for it. Also note that I am NOT a designer. I can't design for shit.
12 -
A Bank Account Number is like a public encryption key. Any random person needs it to send me money. Why does it seem like banks treat it as a secret or even use it to confirm my identity? It's literally printed in plain text on every check.2
-
They laugh at me when I'm still using windows batch scripts.
I ask them how to check the cpu architecture within a batch, to check whether administrator rights are present and if not, enabling the default windows admin and create another admin over the default admin. I ask them how they'd set a registry key within a batch...
They don't have any idea...3 -
I just had the most surreal email discussion I think I've ever had...
I spent over two hours going back-and-forth over email with an enterprise DBA, trying to convince them I needed a primary key for a table. They created the table without a primary key (or any unique constraints... or indexes... but that's another discussion). I asked them to add one. Then had to justify why.
If you ever find yourself justifying why you need a primary key on a table in an RDBMS, that's the day you find yourself asking "is this real life?"
I want the last two hours of my life back. And a handful of Advil.1 -
I've been a part of this industry for over two decades, found myself scraping and clawing my way up, recently leaving a high paying position to create my own company; in an attempt to fix the things I feel are severely broken within the ones I've worked for in the past.
Sometimes, we are challenged in ways we never thought we would be. And, it should always result in the improvement of something we never thought would be possible to improve.
There's a certain beauty of hitting a personal impasse. Because it allows you to choose a better path for yourself - which is a key element in accepting and conquering any one of life's many challenges.
So, just remember, we are - by nature - problem solvers. So what the fuck would we do, without a problem to solve?5 -
So I have too many posts for wk110. It's sad. Here we go. I got a bad grade on an assignment for a hello world program in college. How do you write a hello world program that successfully prints hello world and not get 100 percent?
The teacher insisted that we write a console "hello world" program in C++, on windows. If he can't read hello world, you fail. So you must add `system("pause")` at the end so the window stays open. One problem: system() is horribly insecure and im stubborn. I refused to write exactly what he wanted, like everyone else did, because I try to not write code I know is unsafe. So I ended my script with cin.get() which also pauses for input. Unlike pause however it can't be any key, it reads a line, so you must hit enter. This was "unfavorable behavior" and ultimately I got something like a high C, low B grade. Only person to not get 100%8 -
Any thoughts on whether my alternative keyboard layout will lower my risk for wrist pain? I map each key to an Amazon dash button on each edge of a large bookshelf in my office. It's lots of exercise, and I'm almost back up to my old typing speed.1
-
FML
brought my children to the childcare, went home and I am faced with A FUCKING CLOSED DOOR OF MY HOME WITHOUT ANY KEY and MY COMPANY NOTEBOOK, WALLET AND KEYS INSIDE!!! 😬7 -
Mac keyboard and mouse.
Fuck no right mouse button.
Fuck that prolapsed ass key. Why not ctrl or shift instead like any other system?23 -
On Monday i have a Skype Interview.
Now i've bought a green screen because i thought that would be fun for showing my design stuff live as a virtual webcam. But this stupid Java 6 SE "Chroma Key Live" programm does not recognise any camera... and it's so ugIy... I hate java gui's.... :-/
5 -
Wanna hear a story? The consultancy firm I work for has been hired to work on a WPF project for a big Fashion Industry giant.
We are talking of their most important project yet, the ones the "buyers" use to order them their products globally, for each of the retail stores this Fashion giant has around the world. Do you want to know what I found? Wel, come my sweet summer child.
DB: not even a single foreign key. Impossibile to understand without any priopr working experience on the application. Six "quantity" tables to keep aligned with values that will dictate the quantities to be sent to production (we are talking SKUs here: shoes, bags..)
BE: autogenerated controllers using T4 templates. Inputs directly serialized in headers. Async logging (i.e. await Logger.Error(ex)). Entities returned as response to the front end, no DTOs whatsoever.
WPF: riddled with code behind and third party components (dev express) and Business Logic that should belong to the Business Layer. No real api client, just a highly customized "Rest Helper". No error reporting or dealing with exceptions. Multiple endpoints call to get data that would be combined into one single model which happens to be the one needed by the UI. No save function: a timer checks the components for changes and autosaves them every x seconds. Saving for the most critical part occurring when switching cells or rows, often resulting in race conditions at DB level.
What do you think of this piece of shit?6 -
Just another big rant story full of WTFs and completely true.
The company I work for atm is like the landlord for a big german city. We build houses and flats and rent them to normal people, just that we want to be very cheap and most nearly all our tenants are jobless.
So the company hired a lot of software-dev-companies to manage everything.
The company I want to talk about is "ABI...", a 40-man big software company. ABI sold us different software, e.g. a datawarehouse for our ERP System they "invented" for 300K or the software we talk about today: a document management system. It has workflows, a 100 year-save archive system, a history feature etc.
The software itself, called ELO (you can google it if you want) is a component based software in which every company that is a "partner" can develop things into, like ABI did for our company.
Since 2013 we pay ABI 150€ / hour (most of the time it feels like 300€ / hour, because if you want something done from a dev from ABI you first have to talk to the project manager of him and of course pay him too). They did thousand of hours in all that years for my company.
In 2017 they started to talk about a module in ELO called Invoice-Module. With that you can manage all your paper invoices digital, like scan that piece of paper, then OCR it, then fill formular data, add data and at the end you can send it to the ERP system automatically and we can pay the invoice automatically. "Digitization" is the key word.
After 1.5 years of project planning and a 3 month test phase, we talked to them and decided to go live at 01.01.2019. We are talking about already ~ 200 hours planning and work just from ABI for this (do the math. No. Please dont...).
I joined my actual company in October 2018 and I should "just overview" the project a bit, I mean, hey, they planned it since 1.5 years - how bad can it be, right?
In the first week of 2019 we found 25 bugs and users reporting around 50 feature requests, around 30 of them of such high need that they can't do their daily work with the invoices like they did before without ELO.
In the first three weeks of 2019 we where around 70 bugs deep, 20 of them fixed, with nearly 70 feature requests, 5 done. Around 10 bugs where so high, that the complete system would not work any more if they dont get fixed.
Want examples?
- Delete a Invoice (right click -> delete, no super deep hiding menu), and the server crashed until someone restarts it.
- missing dropdown of tax rate, everything was 19% (in germany 99,9% of all invoices are 19%, 7% or 0%).
But the biggest thing was, that the complete webservice send to ERP wasn't even finished in the code.
So that means we had around 600 invoices to pay with nearly 300.000€ of cash in the first 3 weeks and we couldn't even pay 1 cent - as a urban company!
Shortly after receiving and starting to discussing this high prio request with ABI the project manager of my assigned dev told me he will be gone the next day. He is getting married. And honeymoon. 1 Week. So: Wish him luck, when will his replacement here?
Deep breath.
Deep breath.
There was no replacement. They just had 1 developer. As a 40-people-software-house they had exactly one developer which knows ELO, which they sold to A LOT of companies.
He came back, 1 week gone, we asked for a meeting, they told us "oh, he is now in other ELO projects planned, we can offer you time from him in 4 weeks earliest".
To cut a long story short (it's to late for that, right?) we fought around 3 month with ABI to even rescue this project in any thinkable way. The solution mid February was, that I (software dev) would visit crash courses in ELO to be the second developer ABI didnt had, even without working for ABI....
Now its may and we decided to cut strings with ABI in ELO and switch to a new company who knows ELO. There where around 10 meetings on CEO-level to make this a "good" cut and not a bad cut, because we can't afford to scare them (think about the 300K tool they sold us...).
01.06.2019 we should start with the new company. 2 days before I found out, by accident, that there was a password on the project file on the server for one of the ELO services. I called my boss and my CEO. No one knows anything about it. I found out, that ABI sneaked into this folder, while working on another thing a week ago, and set this password to lock us out. OF OUR OWN FCKING FILE.
Without this password we are not able to fix any bug, develop any feature or even change an image within ELO, regardless, that we paid thausend of hours for that.
When we asked ABI about this, his CEO told us, it is "their property" and they will not remove it.
When I asked my CEO about it, they told me to do nothing, we can't scare them, we need them for the 300K tool.
No punt.
No finish.
Just the project file with a password still there today6 -
In a world of password managers that can generate complex passwords of any length, please for the love of God include why my chosen password was rejected.
Don't decide to truncate the password without informing the user because, and this is key, they won't be able to use your service.
Looking at you GoDaddy.4 -
So I have the new Mac book pro for 8 months now, always thought that the butterfly keyboard issue will never happen to me.
Until three days ago I noticed my space key is kinda sticky.
I have an external monitor so I don’t recall any time I spill water or food directly on the keyboard.
So I made an appointment for a walk in.
BUT this morning, I was like: man, fuck this shit and smashed the space key.
Now it’s fixed.
Good1 -
Get an email from a client, who has been stringing me along for about 6 months, but ringing me up for advice on tonnes of different shit for free. Basically did his original website but his business model has changed to make his existing site irrelevant. Suggested months back doing a simple one pager as a stop gap with key messages. The bastard said no to that "just take it down for now and redirect to my LinkedIn page". He keeps saying we are getting stuff together and we hope to get together in September. However, yesterday he sends an email "we are getting a student in over the summer (not a Dev or designer or anything). Could you recommend any "web builders" so we can get on with the website in August. By that he means those drag and drop fucking pieces of shit website templates full of wysiwyg editors for creating shit typography. I give them free help and guidance and they think that I'm not going to want to smash him in his fucking face for his last email. The cunt.
I have an idea for 'having the last laugh' but I am open to suggestions from some devRanters, all legal of course.
P.S. I post quite a bit here about shitty clients, but I do have a number of really good clients who value my work and experience and have been with me for many years. It's just some that treat the profession with disdain and that they can easily do it themselves if only they had the time. These fuckers then wonder why their businesses fail.1 -
Forms with autofocus. What are your opinions on that?
My boss keeps asking us to always give autofocus to the first input of a form, without any UX study to support it, just his opinion ("I think it makes sense"). I fucking hate it. He says it's nice for keyboard users, but I'm a keyboard user myself and I say that's what the tab key is for. To fucking focus stuff.
It really annoys me to no end when things like this are requested, but it's ok to have buttons, checkboxes, etc without fucking :focus and :active styles. Just :hover is not enough ffs.
And "links" that work with "onclick". Damn how I want to kill anyone that does that.5 -
!dev && rant
Can we talk about banks? Those fuckers! Suposed to keep our money save and be competent... They today gave me the biggest scare of my live and I've run one an update query on a prod db without a where clause! (Okay I knew we had a backup but still pretty scarry moment!)
As a few know, besides being a dev I help to organize a small openair music festival here in Switzerland. The openair was this weekend. Every thing wen't well, until I checked our ebanking account today. There was only 2/3 of the money that should be there. A quick call to the bank and they told me, nope they never received it. As we've thrown it in a secure locker during the night, we didn't receive any receipt or something like that. It took those fuckers 3.5 hours to actually go and check the looker, just to find the remaining money in the corner of it. What the fuck people, can't you open your fucking eyes and not give me a fucking heartatack? I thought you guys are professionals!
Note locker: we get a key to open it from the outside, place our payment during the night, as soon as we close it, it falls inside a vault, so there it's a pay in only system, for lack of a better word, I called it locker.
My heart is still beating like mad, because of them.4 -
The company I work at sends their developers out to other companies to help them work on projects and help them in other ways (advice when communicating to customers of on demand software for example).
While not on a project you are working in house training trainees and interns. Part of that is teaching them to show initiative and treating them as full developers. The 30 interns all discussed a git flow and code format.
During the third sprint (two weeks sprints) a team messaged me if I wanted to check their merge request for the sprint.
It took me a glance at the first file to know they didnt do any review themselves. I used my flywheel to check all their changes and without being able to read the code I saw indentation was all over the place, inconsistent bracket placements etc. I let them know I wouldnt check their code until it was according to their own standards.
Two days later I got the message to check it again. At first glance the indentation was fine so I started reading the code. Every single thing was hardcoded, not made to support mobile (or any resolution other than 1920×1080).
A week later they improved it and still not good. Gave them a few pointers like I would for any colleague and off they went to fix things. The code became worse and indentation was all over the place.
I told them the next time it shouldnt be a quick glance to be able to reject it again. By this time other teams came to me asking why it wasnt merged yet and I explained it to them. One of the teams couldnt do anything u til this was merged so I told them to implement it themselves. I was surprised that 4 teams came to me asking about a merge request, that was every team except the team whose pull request it was.
4 weeks after the intitial sprint the other team made a merge request and I had three small comments and then an hour later it was merged.
The other team messaged me why their merge request did went through (still havent seen any of their team in person, Im sitting 10 meters away from them behind a wall)
They also said that it was easier for them because they started from scratch. Thats when I called them in to discuss it all and if they were not interns but full time developers they would have been fired. I told them communication is key and that if you dont understand something you come in person to ask about it. They all knew I like teaching and have the patience to explain a single thing ten times, but the initiative should be theirs.
One of the team members is my current coworker and he learned his lesson by that. The others stopped with their study and started doing something completely else.
TL;DR
Merge request is open for 4 weeks, in the end another team started from scratch and finished it within a week. The original team didnt ask me questions or come to me in person, where other teams did.
DISCLAIMER: some of you might find it harsh, but in our experience it works the best for teaching and we know when people don't dare to ask questions and we help them in that too. It's all about the soft skills at our company.4 -
Development world is always changing and evolving... It changes before you know it...
So, having the ability to quickly adapt and learn is a must for any Developer... And, this is the one thing that I am sure that everyone knows about or heard about..
But, my advice is quite simple:
"Don't rush into participating in a race, just because everyone else is doing so.
The trick is not to move quickly.. But, to move one step at a time, at the pace in which you are at your most comfortable...
It might seem counterintuitive and a contradiction to what I have said earlier.. But, I hope that by the end of this rant, you will be able to understand my perspective..
This advice is especially useful for people still finding and searching for their place in our world..
Charles Darwin, very wisely understood the philosophy behind 'Survival of the Fittest'..
By 'fittest', he didn't refer to the ones considered to be the strongest or having the most intelligence, but the ones that had mastered the ability to adapt to changing circumstances..
Adaptability is important, but not at the cost of understanding and learning about the fundamental pillars on which this world stands..
Don't rush because when you run, your visions starts to become more narrow.. In your pursuit to reach your goal, you lose the ability to look at the macro details surrounding your goal..
Learning new technology is important, but that doesn't mean that you don't learn about various approaches or how to design a more logical or efficient solution...
Refactoring the code, developing good Testing procedures, learning to interact with your fellow developers are as crucial as learning about the changing trends...
Even, in this ever-changing world, understand that some things will always remain the same, like the adrenaline that course through your veins when you finally solve a long-standing problem...
Curiosity, Discovery and Exploration are the key pillars and hence, when we rush in, we might stop exploring and lose curiosity to discover new and exciting ways to reach our goal..
Or, we might also end up losing the drive that grips us and motivates to continue moving forward inspite of the challenges standing between us and our destination..
And, believe me, once you lose this quality, you might still succeed but the contentment and the satisfaction that you feel will be lost..
And, then, you will remain a developer only through your designation... And, that in my personal opinion, the worst punishment.3 -
I somehow managed to turn on overtype with the insert key.
Welp, guess it's time to get a new laptop. Any recommendations?
5 -
Fun fact!
Xiaomi has a restriction where you're only allowed a bootloader unlock key one week after you've requested it. No, not a week after you've bought the phone. Not a week after you created an account and generated so much usage data that it would be stupid to doubt you're a genuine user.
No, you have to wait one week after installing their fucking desktop app and getting past some arbitrary point in the process.
Seriously, how much shit can this company pull with a straight face? At this point they're just sabotaging me, it's not even for any reason.16 -
Everyone and their dog is making a game, so why can't I?
1. open world (check)
2. taking inspiration from metro and fallout (check)
3. on a map roughly the size of the u.s. (check)
So I thought what I'd do is pretend to be one of those deaf mutes. While also pretending to be a programmer. Sometimes you make believe
so hard that it comes true apparently.
For the main map I thought I'd automate laying down the base map before hand tweaking it. It's been a bit of a slog. Roughly 1 pixel per mile. (okay, 1973 by 1067). The u.s. is 3.1 million miles, this would work out to 2.1 million miles instead. Eh.
Wrote the script to filter out all the ocean pixels, based on the elevation map, and output the difference. Still had to edit around the shoreline but it sped things up a lot. Just attached the elevation map, because the actual one is an ugly cluster of death magenta to represent the ocean.
Consequence of filtering is, the shoreline is messy and not entirely representative of the u.s.
The preprocessing step also added a lot of in-land 'lakes' that don't exist in some areas, like death valley. Already expected that.
But the plus side is I now have map layers for both elevation and ecology biomes. Aligning them close enough so that the heightmap wasn't displaced, and didn't cut off the shoreline in the ecology layer (at export), was a royal pain, and as super finicky. But thankfully thats done.
Next step is to go through the ecology map, copy each key color, and write down the biome id, courtesy of the 2017 ecoregions project.
From there, I write down the primary landscape features (water, plants, trees, terrain roughness, etc), anything easy to convey.
Main thing I'm interested in is tree types, because those, as tiles, convey a lot more information about the hex terrain than anything else.
Once the biomes are marked, and the tree types are written, the next step is to assign a tile to each tree type, and each density level of mountains (flat, hills, mountains, snowcapped peaks, etc).
The reference ids, colors, and numbers on the map will simplify the process.
After that, I'll write an exporter with python, and dump to csv or another format.
Next steps are laying out the instances in the level editor, that'll act as the tiles in question.
Theres a few naive approaches:
Spawn all the relevant instances at startup, and load the corresponding tiles.
Or setup chunks of instances, enough to cover the camera, and a buffer surrounding the camera. As the camera moves, reconfigure the instances to match the streamed in tile data.
Instances here make sense, because if theres any simulation going on (and I'd like there to be), they can detect in event code, when they are in the invisible buffer around the camera but not yet visible, and be activated by the camera, or deactive themselves after leaving the camera and buffer's area.
The alternative is to let a global controller stream the data in, as a series of tile IDs, corresponding to the various tile sprites, and code global interaction like tile picking into a single event, which seems unwieldy and not at all manageable. I can see it turning into a giant switch case already.
So instances it is.
Actually, if I do 16^2 pixel chunks, it only works out to 124x68 chunks in all. A few thousand, mostly inactive chunks is pretty trivial, and simplifies spawning and serializing/deserializing.
All of this doesn't account for
* putting lakes back in that aren't present
* lots of islands and parts of shores that would typically have bays and parts that jut out, need reworked.
* great lakes need refinement and corrections
* elevation key map too blocky. Need a higher resolution one while reducing color count
This can be solved by introducing some noise into the elevations, varying say, within one standard div.
* mountains will still require refinement to individual state geography. Thats for later on
* shoreline is too smooth, and needs to be less straight-line and less blocky. less corners.
* rivers need added, not just large ones but smaller ones too
* available tree assets need to be matched, as best and fully as possible, to types of trees represented in biome data, so that even if I don't have an exact match, I can still place *something* thats native or looks close enough to what you would expect in a given biome.
Ponderosa pines vs white pines for example.
This also doesn't account for 1. major and minor roads, 2. artificial and natural attractions, 3. other major features people in any given state are familiar with. 4. named places, 5. infrastructure, 6. cities and buildings and towns.
Also I'm pretty sure I cut off part of florida.
Woops, sorry everglades.
Guess I'll just make it a death-zone from nuclear fallout.
Take that gators!
5 -
Subaru's Symmetrical AWD is the best thing in the world at the moment. Also, warning: !dev
Tl;dr: I'm getting another RPi3 thanks to awesome engineering.
Got a couple of inches of light snow here, and on my way home I came across a GMC Sierra dually stuck at the bottom of a moderately sized ditch. Naturally, I stopped by in my Forester and offered to tow it out.
With my 20ft tow rope stretched to its full length I was barely touching the road. He signalled that he was ready, and I gunned it. Slowly but surely the truck crawled out of the 6ft deep trench. She crested the hill with much applause (from me and the driver of the truck). As a thanks, he gave me $30.
Looks like I'm gonna get a new Raspberry Pi to play with. I think I'll turn this one into a countertop MAME arcade machine.
And for those of you wondering why I'm praising Symmetrical AWD as opposed to AWD in general, here's a quick lesson in drivetrains:
Most all wheel drive cars power the front wheels most of the time. This saves on fuel economy. The thing is, power is only transmitted to the rear wheels when the front wheels start to lose traction. At that point you're already screwed; only two wheels at any one time are putting useful power to the road.
Symmetrical AWD systems, like you'll find in all Subarus and most performance cars, distribute the vehicle's torque eaqually front-rear at all times. So instead of waiting until the front wheels start slipping, all of the wheels are powered right off the bat.
To make this more devvy: grrrr php, vim is best, I configured the tab key to enter four spaces, js has too many damn frameworks and they're still being pumped out faster than rabbits in a bunny farm.3 -
It is said that the number of programmers doubles every five years with fresh CS, CE, and EE grads. Assuming that's true, then at any one time over half the developer community are novices in the early stages of their career.
My entire life's been spent in software and I've been in it now for about 15 years and I've seen a lot of people make alot of things and I've seen a lot of people fail at alot of things. My observation is that the doers are the major thinkers, the people that really create the things that change this industry are both the thinker doer in one person. It's very easy to take credit for the thinking the doing is more concrete. It's very easy for somebody say "oh, I thought of this three years ago" but usually when you dig a little deeper you find that the people that really did it. Were also the people that really worked through the hard intellectual problems.
Many people falsely believe that a great idea constitutes 90% of the work. However, there is a significant amount of craftsmanship required to bridge the gap between a great idea and a great product. As you evolve that great idea it changes and grows it never comes out like it starts because you learn a lot more as you get into the subtleties of it and you also find there's tremendous amount of trade-offs that you have to make.
There are certain things you can't make electrons do, certain things you can't make plastic or glass, certain things you can't make factories or robots do. and as you get into all these things, Designing a product involves juggling 5,000 different concepts, fitting them together like puzzle pieces, and exploring new ways to combine them. Every day brings new challenges and opportunities to push the boundaries of what's possible, and it's this ongoing process that is the key to successful product development. That process is the "magic"3 -
I thought of posting this as a comment to @12bit float' post, but then decided it better goes out as a post by itself.
https://devrant.com/rants/5291843/...
My second employer, where I am on my last week of notice currently, is building a no code/low code tool.
Since this was my first job switch, I was in a dreamy phase and was super excited about this whole space. I indeed got to learn like crazy.
Upon joining, I realised that an ideal user persona for this product was a developer. Wow! No code tool for developer. sO cOoL...
We started building it and as obvious as it could get, the initial goal was adoption because we were still at top of the funnel.
We launched an alpha release shortly followed by a beta.
Nobody used it. Tech XLT/LT kept pushing product and design team to run a feature factory so that their teams can use this tool.
The culture set by those two leaders was toxic as fuck.
Now, I decided to do some research and some more product discovery to understand why folks were not using it. Mind you, we were not allowed to do any research and were forced to build based on opinions of those two monkeys.
Turns out that the devs were really happy with their existing tools and our tool was another tool being forcefully added into their toolbox by the said XLT/LT.
Not only that, even if they decide to use our tool, out of pressure, they still cannot because the product was missing key capabilities like audit control and promotion from one environment to another.
Building those would essentially mean reinventing Github aka version control and Spinnaker aka CI/CD pipeline.
My new boss (I got 3 managers in 4 months because of high attrition across levels due to the toxic culture), thinks that tech XLT/LT are doing great and we all suck as a product and design team.
He started driving things his own way without even understanding or settling down for first 90 days.
Lol, I put in my resignation got out of that mess.
So agreeing to what our boy said here, no code tools are a complete waste, especially for a developer, and even as a non tech person, I prefer keyboard over mouse.2 -
Fuck everything about Microsoft Dynamics. I'm supposed to use the REST API to make a web front-end. I notice all of the data comes back codified.
null == 0.
boolean true == 100000000
boolean false == 100000001
except sometimes when
boolean false == 100000000
boolean true == 100000001
or other times
string "Yes" == 100000000
string "No" == 100000001
string "Maybe" == 100000003
Hang on. Is the system representing a 1 bit value with base 10 numbers? Did the client set this up like this? Holy crap every number corresponds to a unique record in a table somewhere. That means it only returns numeric values instead of strings and I have to figure out what the number means in the context of the table.
A "key" is user typed? So every time someone starts to make a new record it saves a new "key" without a record? So I can pull a bunch of "0" records if I pull sequentially? So basically I need to see all of the data in Dynamics to have any context at all for what is returned from the Dynamics API? Fuuuuuuuuuu10 -
Watched an action hack movie
Then designed a scenario to sniff around a bank and get the encrypted key and finally extract the key and omg!
I've broke into the bank !!!
But seriously, is it worth trying?
I'm not going to do any thing stupid like even taking a dollar , but is it just the way I thought it is?
Will anything unexpected happen?16 -
Is it wrong to expect some widespread documentation from a $350 billion company to properly document a key part of their upgrade path for a new SDK version? beware any Android devs upgrading from API 3.X to 4.X on the Facebook SDK.......you'll want FacebookSdk.setLegacyTokenUpgradeSupported(true); before your call to initialize.....
-
Got to scratch of one of three remaining old (14years and counting) design mistakes this week.
Together with a colleague we replaced a 1.5 billion row table that I out of ignorance then designed with a 3 column composite primary key instead of an identity column.
Moving the data while keeping all synchronized (the table gets up towards 2 million new rows and 2 million updates a day while constantly being queried) took 1 week.
Just 2 skeletons left to clean out, any year now ;).1 -
tl;dr Do you think we will any time soon move from editing raw source code? Will IDE or other interfaces allow us to change the code in graphic representation or even through voice?
---
One thing I found funny watching Westworld is how they depicted the "programming" - it is more like swiping on a smartphone, a bit maybe like Tom Cruise's investigations in Minority report. Or giving certain commands and key words by voice.
There was one quote from Uncle Bob's "Clean Code" I could never find again, where he said something along the lines, that back in the seventies or eighties they thought they would soon raise programming languages to such a high level they would use natural language interfaces, and look at us now, still the same "if's".
So I feel uncomfortable without my shell and having tried a graphical programming language once this particular (Labview) seemed clumsy to me at best. But maybe there are a lot of web devs here and it seems with them frameworks you might be able to abstract away a lot of the pesky system programming... so do you feel like moving to some new shiny programming experience or do you think it will stay the same for more decades as the computer is that stupid machine where you have to spill it out instruction by instruction anyways?7 -
That's it, where do I send the bill, to Microsoft? Orange highlight in image is my own. As in ownly way to see that something wasn't right. Oh but - Wait, I am on Linux, so I guess I will assume that I need to be on internet explorer to use anything on microsoft.com - is that on the site somewhere maybe? Cause it looks like hell when rendered from Chrome on Ubuntu. Yes I use Ubuntu while developing, eat it haters. FUCK.
This is ridiculous - I actually WANT to use Bing Web Search API. I actually TRIED giving up my email address and phone number to MS. If you fail the I'm not a robot, or if you pass it, who knows, it disappears and says something about being human. I'm human. Give me free API Key. Or shit, I'll pay. Client wants to use Bing so I am using BING GODDAMN YOU.
Why am I so mad? BECAUSE THIS. Oauth through github, great alternative since apparently I am not human according to microsoft. Common theme w them, amiright?
So yeah. Let them see all my githubs. Whatever. Just GO so I can RELAX. Rate limit fuck shit workaround dumb client requirements google can eat me. Whats this, I need to show my email publicly? Verification? Sure just go. But really MS, this looks terrible. If I boot up IE will it look any better? I doubt it but who knows I am not looking at MS CSS. I am going into my github, making it public. Then trying again. Then waiting. Then verifying my email is shown. Great it is hello everyone. COME ON MS. Send me an email. Do something.
I am trying to be patient, but after a few minutes, I revoke access. Must have been a glitch. Go through it again, with public email. Same ugly almost invisible message. Approaching a billable hour in which I made 0 progress. So, lets just see, NO EMAIL from MS, Yes it appears in my GitHub, but I have no way to log into MS. Email doesnt work. OAuth isn't picking it up I guess, I don't even care to think this through.
The whole point is, the error message was hard to discover, seems to be inaccurate, and I can't believe the IRONY or the STUPIDITY (me, me stupid. Me stupid thinking I could get working doing same dumb thing over and over like caveman and rock).
Longer rant made shorter, I cant come up with a single fucking way to get a free BING API Key. So forget it MS. Maybe you'll email me tomorrow. Maybe Github was pretending to be Gitlab for a few minutes.
Maybe I will send this image to my client and tell him "If we use Bing, get used to seeing hard to read error messages like this one". I mean that's why this is so frustrating anyhow - I thought the Google CSE worked FINE for us :/
-
- A girl asks on FB how to deal with a problem in her Windows computer: the system is asking her to introduce the serial key.
- I comment her the possibility of using Linux in case her use cases are simple enough (web, music, videos).
- First reactions are even enthusiastic, some people who had good experiences join the thread to express their delight with Linux.
- Then a guy arrives to tell us how irresponsible we are, telling a poor girl who does not even know how to introduce the serial key... to use Linux (a super complex system!)
- So I tell the guy that Windows is not simple at all, and that most of the times, people just rely o knowing someone else with higher expertise than them, who always end up paying the price of solving the problems caused by Windows, so the users don't really feel how painful is Windows compared to other systems.
- The girl, who was enthusiastic at first, and seems to be not very bright, to say the least, completely misunderstands my answer. She interprets that I'm insulting the poor guys that act as IT service for free, and calls me a "know-all/smartass" (those words are not even close to their Spanish counterpart on pushing down people who know stuff, we are experts on that there, we didn't loose an empire in the 17th century by respecting the wise ones).
This is, in part, why I stopped helping those dumbasses 18 years ago. I forbid myself to learn anything new about Windows (at user level) so I couldn't help these ungrateful and ignorant people who don't make any effort to learn anything by themselves.19 -
Jesus and Satan have an argument as to who is the better programmer. This goes on for a few hours until they come to an agreement to hold a contest with God as the judge. They set themselves before their computers and begin. They type furiously, lines of code streaming up the screen, for several hours straight.
Seconds before the end of the competition, a bolt of lightning strikes, taking out the electricity. Moments later, the power is restored, and God announces that the contest is over. He asks Satan to show his work. Visibly upset, Satan cries and says, “I have nothing. I lost it all when the power went out.”
“Very well,” says God, “let us see if Jesus has fared any better.”
Jesus presses a key, and the screen comes to life in vivid display, the voices of an angelic choir pour forth from the speakers.
Satan is astonished. He stutters, “B-b-but how?! I lost everything, yet Jesus’ program is intact! How did he do it?”
God chuckles, “Everybody knows… Jesus saves.” -
I find it funny that as soon as I disable password authentication on my server and enable key auth then all of the bots spamming my server with incorrect login requests instantly stop when they realise that they aren’t getting through any time soon. Also don’t ask why I don’t have Fail2Ban and a firewall set up.5
-
Been getting a lot of troll / clown / clueless (?) comments on my posts recently. Select favorites include:
"Why do you have a login form on your website?" wut
"Why didn't you throw away that API key?" wut
"Why do you even need to access your apps' servers?" wut
There are just SO many amazing devs here who have NEVER had do any of those things, I'm quite literally an idiot and don't know what I'm doing, sorry for my ignorance. I'd forgotten that there is only exactly one way to build software, I wish I'd done it "that" way sooner! Foolish me.
Really not sure if trolls, clowns, or clueless. Don't care. 🤡🤡🤡9 -
Welp, this made my night and sorta ruined my night at the same time.
He decided to work on a new gaming community but has limited programming knowledge, but has enough to patch and repair minor issues. He's waiting for an old friend of his to come back to start helping him again, so this leads to me. He needed a custom backend made for his server, which required pulling data from an SQL/API and syncing with the server, and he was falling behind pace and asked for my help. He's a good friend that I've known for a while, and I knew it wouldn't take to long to create this, so I decided to help him. Which lead to an interesting find, and sorta made my night.
It wasn't really difficult, got it done within an hour, took some time to test and fix any bugs with his SQL database. But this is where it get's interesting, at least for me. He had roughly a few hundred people that did beta testing of the server, anyways, once the new backend was hooked in and working, I realized that the other developer he works with had created a 'custom' script to make sure there are no leaks of the database. Well, that 'custom' script actually begins wiping rows/tables (Depends on the sub-table, some get wiped row by row, some just get completely dropped), I just couldn't comprehend what had happened, as rows/tables just slowly started disappearing. It took me a while of checking, before checking his SQL query logs (At least the custom script did that properly and logged every query), to realize it just basically wiped the database.
Welp, after that, it began to restrict the API I was using, and due to this it identified the server as foreign access (Since it wasn't using the same key as his plugin, even though I had an API key created just so it could only access ranks and such, to prevent abuse) and begin responding not with denied, but with a lovely "Fuck you hacker!" This really made my night, I don't know why, but I was genuinely laughing pretty hard at this response.
God, I love his developer. Luckily, I had created a backup earlier, so I patched it and just worked around the plugin/API to get it working. (Hopefully, it's not a clusterfuck to read, writing this at 2 am with less than an hour of sleep, bedtime! Goodnight everyone.)7 -
Ok now I'm gonna tell you about my "Databases 2" exam. This is gonna be long.
I'd like to know if DB designers actually have this workflow. I'm gonna "challenge" the reader, but I'm not playing smartass. The mistakes I point out here are MY mistakes.
So, in my uni there's this course, "Databases 2" ("Databases 1" is relational algebra and theoretical stuff), which consist in one exercise: design a SQL database.
We get the description of a system. Almost a two pages pdf. Of course it could be anything. Here I'm going to pretend the project is a YouTube clone (it's one of the practice exercises).
We start designing a ER diagram that describes the system. It must be fucking accurate: e.g. if we describe a "view" as a relationship between the entities User and Video, it MUST have at least another attribute, e.g. the datetime, even if the description doesn't say it. The official reason?
"The ER relationship describes a set of couples. You can not have two elements equal, thus if you don't put any attribute, it means that any user could watch a video only once. So you must put at least something else."
Do you get my point? In this phase we're not even talking about a "database", this is an analysis phase.
Then we describe the type dictionary. So far so good, we just have to specify the type of any attribute.
And now... Constraints.
Oh my god the constraints. We have to describe every fucking constraint of our system. In FIRST ORDER LOGIC. Every entity is a set, and Entity(e) means that an element e belongs to the set Entity. "A user must leave a feedback after he saw a video" becomes like
For all u,v,dv,df,f ( User(u) and Video(v) and View(u, v, dv) and feedback(u, v, f) ) ---> dv < df
provided that dv and df are the datetimes of the view and the feedback creation (it is clear in the exercise, here seems kinda cryptic)
Of course only some of the constraints are explicitly described. This one, for example, was not in the text. If you fail to mention any "hidden" constraint, you lose a lot of points. Same thing if you not describe it correctly.
Now it's time for use cases.
You start with the usual stickman diagram. So far so good.
Then you have to describe their main functions.
In first order logic. Yes.
So, if you got the point, you may think that the following is correct to get "the average amount of feedback values on a single video" (1 to 5, like the old YT).
(let's say that feedback is a relationship with attribute between User and Video
getAv(Video v): int
Let be F = { va | feedback(v, u, va) } for any User u
Let av = (sum forall f in F) / | F |
return av
But nope, there's an error here. Can you spot it (I didn't)?
F is a set. Sets do not have duplicates! So, the F set will lose some feedback values! I can not define that as a simple set!
It has to be a set of couples, like (v, u), where v is the value and u the user; this way we can have duplicate feedback values in our set.
This concludes the analysis phase. Now, the design.
Well we just refactor everything we have done until now. Is-a relations become relationships, many-to-many relationships get an "association entity" between them, nothing new.
We write down on paper every SQL statement to build any table, entity or not. We write down every possible primary key or foreign key. The constraint that are not natively satisfied by SQL and/or foreign keys become triggers, and so on.
This exam is considered the true nightmare at our department. I just love it.
Now my question is, do actually DB designers follow this workflow? Or is this just a bloody hard training in Pai Mei style?6 -
During one of our visits at Konza City, Machakos county in Kenya, my team and I encountered a big problem accessing to viable water. Most times we enquired for water, we were handed a bottle of bought water. This for a day or few days would be affordable for some, but for a lifetime of a middle income person, it will be way too much expensive. Of ten people we encountered 8 complained of a proper mechanism to access to viable water. This to us was a very demanding problem, that needed to be sorted out immediately. Majority of the people were unable to conduct income generating activities such as farming because of the nature of the kind of water and its scarcity as well.
Such a scenario demands for an immediate way to solve this problem. Various ways have been put into practice to ensure sustainability of water conservation and management. However most of them have been futile on the aspect of sustainability. As part of our research we also considered to check out of the formal mechanisms put in place to ensure proper acquisition of water, and one of them we saw was tree planting, which was not sustainable at all, also some few piped water was being transported very long distances from the destinations, this however did not solve the immediate needs of the people.We found out that the area has a large body mass of salty water which was not viable for them to conduct any constructive activity. This was hint enough to help us find a way to curb this demanding challenge. Presence of salty water was the first step of our solution.
SOLUTION
We came up with an IOT based system to help curb this problem. Our system entails purification of the salty water through electrolysis, the device is places at an area where the body mass of water is located, it drills for a suitable depth and allow the salty water to flow into it. Various sets of tanks and valves are situated next to it, these tanks acts as to contain the salty water temporarily. A high power source is then connected to each tank, this enable the separation of Chlorine ions from Hydrogen Ions by electrolysis through electrolysis, salt is then separated and allowed to flow from the lower chamber of the tanks, allowing clean water to from to the preceding tanks, the preceding tanks contains various chemicals to remove any remaining impurities. The whole entire process is managed by the action of sensors. Water alkalinity, turbidity and ph are monitored and relayed onto a mobile phone, this then follows a predictive analysis of the data history stored then makes up a decision to increase flow of water in the valves or to decrease its flow. This being a hot prone area, we opted to maximize harnessing of power through solar power, this power availability is almost perfect to provide us with at least 440V constant supply to facilitate faster electrolysis of the salty water.
Being a drought prone area, it was key that the outlet water should be cold and comfortable for consumers to use, so we also coupled our output chamber with cooling tanks, these tanks are managed via our mobile application, the information relayed from it in terms of temperature and humidity are sent to it. This information is key in helping us produce water at optimum states, enabling us to fully manage supply and input of the water from the water bodies.
By the use of natural language processing, we are able to automatically control flow and feeing of the valves to and fro using Voice, one could say “The output water is too hot”, and the system would respond by increasing the speed of the fans and making the tanks provide very cold water. Additional to this system, we have prepared short video tutorials and documents enlighting people on how to conserve water and maintain the optimum state of the green economy.
IBM/OPEN SOURCE TECHNOLOGIES
For a start, we have implemented our project using esp8266 microcontrollers, sensors, transducers and low payload containers to demonstrate our project. Previously we have used Google’s firebase cloud platform to ensure realtimeness of data to-and-fro relay to the mobile. This has proven workable for most cases, whether on a small scale or large scale, however we meet challenges such as change in the fingerprint keys that renders our device not workable, we intend to overcome this problem by moving to IBM bluemix platform.
We use C++ Programming language for our microcontrollers and sensor communication, in some cases we use Python programming language to process neuro-networks for our microcontrollers.
Any feedback conserning this project please?
8 -
So about two months ago in my consulting firm I was asked to replace a colleague on a project (node and Angular). The project is only a few months old but it’s already a total clusterfuck. DB is very poorly designed. It’s supposed to be a relational database but there’s not a trace of a foreign key or any key for that matter and I’ve seen joins like tableA.name = tableB.description (seriously, that’s your relation??). The code is a mess with entire blocks of code copied from another project and many parts of the code aren’t even used. He didn’t even bother renaming variables so they would make sense in the context they were shamelessly thrown into. The code is at best poorly typed if not typed at all.
During our dailies I sometimes express my frustration with my other colleagues as I very politely allude to my predecessor’s code as being hard to work with. (They are all “good friends" with him). I always get the same response from my colleagues: "yeah but you’ve gotta understand Billybob was under a lot of pressure. The user stories were not well defined. He didn’t have time to do a proper job". That type of response just makes me boil inside.
Because you think I have time to deal with this shit? You don’t think I’m working with the same client and his user stories that are barely intelligible? How long does it take to write type definitions for parameters going into a function? That’s right, 30 seconds at most? Maybe a minute if it’s a more elaborate object? How much time do you think you’ll save yourself with a properly typed function or better yet an interface? Hard to tell but certainly A LOT MORE than those 30 seconds you lost (no, the 30 seconds you INVESTED) in writing that interface!!!
FUCK people with their excuses! Never tell me you don’t have time to do a proper job! You’ve wasted HOURS of my time just because you were too fucking lazy to type your functions, too lazy to put just a little more thought into designing your tables, too lazy to rename a variable so that it’s name actually makes sense where it’s being used. It’s not because you were short on time. You’re just lazy!
FUCK!!!!!!3 -
So recently I installed Windows 7 on my thiccpad to get Hyperdimension Neptunia to run (yes 50GB wasted just to run a game)... And boy did I love the experience.
ThinkPads are business hardware, remember that. And it's been booting Debian rock solid since.. pretty much forever. There are no hardware issues here. Just saying.
With that out of the way I flashed Windows 7 Ultimate on a USB stick and attempted to boot it... Oh yay, first hurdle to overcome. It can't boot in UEFI mode. Move on Debian, you too shall boot in BIOS mode now! But okay, whatever right. So I set it to BIOS mode and shuffled Debian's partitions around a bit to be left with 3 partitions where Windows could stick in one more.
Installed, it asks for activation. Now my ThinkPad comes with a Windows 7 Pro license key, so fuck it let's just use that and Windows will be able to disable the features that are only available for Ultimate users, right? How convenient would that be, to have one ISO for all the half a dozen editions that each Windows release has? And have the system just disable (or since we're in the installer anyway, not install them in the first place) features depending on what key you used? Haha no, this is Microsoft! Developers developers developers DEVELOPERS!!! Oh and Zune, if anyone remembers that clusterfuck. Crackhead Microsoft.
But okay whatever, no activation then and I'll just fetch Windows Loader from my webserver afterwards to keygen my way through. Too bad you didn't accept that key Microsoft! Wouldn't that have been nice.
So finally booted into the installed system now, and behold finally we find something nice! Apparently Windows 7 Enterprise and Ultimate offer a native NFS driver. That's awesome! That way I don't have to adjust my file server at all. Just some fuckery with registry keys to get the UID and GID correct, but I'll forgive it for that. It's not exactly "native" to Windows after all. The fact that it even has a built-in driver for it is something I found pretty neat already.
Fast-forward a few hours and it's time to Re Boot.. drivers from Lenovo that required reboots and whatnot. Fire the system back up, and low and behold the network drive doesn't mount anymore. I've read that this is apparently due to Windows (not always but often) mounting the network drive before the network comes up. Absolutely brilliant! Move out shitstaind, have you seen this beauty of an init Mr. Poet?
But fuck it we can mount that manually after every single boot.. you know, convenient like that. C O P E.
With it now manually mounted, let's watch a movie! I've recently seen Pyro's review on The Platform and I absolutely loved it. The movie itself is quite good too. Open the directory on my file server and.. oh. Windows.. you just put db.thumb on it and db.thumb:encryptable. I shit you not, with the colon and everything. I thought that file names couldn't contain colons Windows! I thought that was illegal in NTFS. Why you doing this in NFS mate? And "encryptable", am I already infected with ransomware??? If it wasn't for the fact that that could also be disabled with something as easy as a registry key, I would've thought I contracted ransomware!
Oh and sound to go with that video, let's pair up some Bluetooth headphones with that Bluetooth driver I installed earlier! Except.. haha nope. Apparently you don't get that either.
Right so let's just navigate the system in its Aero glory... Gonna need to flick the mouse for that. Except it's excruciatingly slow, even the fastest speed is slower than what I'm used to on Linux.. and it's jerky as hell (Linux doesn't have any of that at higher speed). But hey it can compensate for that! Except that slows down the mouse even more. And occasionally the mouse driver gets fucked up too. Wanna scroll on Telegram messages in a chat where you're admin? Well fuck you mate, let me select all these messages for you and auto scroll at supersonic speeds! And God forbid that you press delete with that admin access of yours. Oh maybe I'll do it for you, helpful OS I am!
And the most saddening part of it all? I'd argue that Windows 7 is the best operating system that Microsoft ever released. Yeah. That's the best they could come up with. But at least it plays le games!10 -
Protip: proposing a "simple yet beautiful" login form on Bootsnip with absolutely no knowledge of Bootstrap whatsoever, making it not responsive and centering it with hardwritten margins (such as: 'margin-left: 170px'), AND THEN proudly display "theme developed by WhoGives AShit" at the bottom won't make you any publicity at best. At worst, I'm gonna travel to India and won't leave before I erased the code you wrote by smashing your face on the "erase" key.1
-
Any IDE that doesn't go to the end of line when you press the down arrow key on the last line of the file, should be burned with hell fire.2
-
When a bunch of unit tests start failing locally because the AWS secret key got rotated.
oh wait...
THOSE AREN’T UNIT TESTS!!!
Unit tests do not depend on any external system, that includes AWS...
AAARRGHHHHH1 -
For hours I spent my time debugging my code, trying different approach to the same code function. Looking for one simple invisible mistake, that is when I want to make a delete request to the IndexedDB.
The request are fine without running a single error, the success event fires perfectly. But one thing which is unexpected, the object inside IndexedDB did not vanish at all. The data stay the same without any flaws (but how can that be, when the 'delete success' event fired? IT SHOULD BE GONE BY NOW!). No kidding, for hours I debug my code, yet found nothing's wrong!
Until one moment I found out the datatype of key I gave the request are different from the object I wanted to delete, the object has a key of 4 and I gave the request "4". I'm so pissed at this moment making me googled 'developer rant' and found this site.
Really! God Bless 1 !== '1'.5 -
Am I the only developer in existence who's ever dealt with Git on Windows? What a colossal train wreck.
1. Authentication. Since there is no ssh key/git url support on Windows, you have to retype your git credentials Every Stinking Time you push. I thought Git Credential Manager was supposed to save your credentials? And this was impossible over SSH (see below). The previous developer had used an http git URL with his username and password baked in for authentication. I thought that was a horrific idea so I eventually figured out how to use a Bitbucket App password.
2. Permissions errors
In order to commit and push updates, I have to run Git for Windows as Administrator.
3. No SSH for easy git access
Here's where I confess that this is a Windows Server machine running as some form of production. Please don't slaughter me! I am not the server admin.
So, I convinced the server guy to find and install some sort of ssh service for Windows just for the off times we have to make a hot fix in production. (Don't ask, but more common than it should be.)
Sadly, this ssh access is totally useless as the git colors are all messed up, the line wrap length and window size are just weird (seems about 60 characters wide by 25 lines tall) and worse of all I can't commit/push in git via ssh because Permissions. Extremely aggravating.
4. Git on Windows hangs open and locks the index file
Finally, we manage to have Git for Windows hang quite frequently and lock the git index file, meaning that we can't do anything in git (commit, push, pull) without manually quitting these processes from task manager, then browsing to the directory and deleting the .git/index.lock file.
Putting this all together, here's the process for a pull on this production server:
Launch a VNC session to the server. Close multiple popups from different services. Ask Windows to please not "restart to install updates". Launch git for Windows. Run a git pull. If the commits to be pulled involve deleting files, the pull will fail with a permissions error. Realize you forgot to launch as Administrator. Depending on how many files were deleted in the last update, you may need to quit the application and force close the process rather than answer "n" for every "would you like to try again?" file. Relaunch Git as Administrator. Run Git pull. Finally everything works.
At this point, I'd be grateful for any tips, appreciate any sympathy, and understand any hatred. Windows Server is bad. Git on Windows is bad.9 -
An anti-rant: I just made some code and out of nowhere it suddenly had an awesome feature that I didn't even program. No, not a euphemism for "bug", an actual feature.
Here's the story: A few months ago I made a shortcut for "System.out.println(…)" called "print(…)". Then I developed it further to also print arrays as "[1,2,3]", lists as "{1,2,3}", work with nested arrays and lists and accept multiple arguments.
Today I wanted to expand the list printing feature, which previously only worked for ArrayLists, to all types of List. That caused a few problems, but eventually I got it to work. Then I also wanted to expand it to all instances of Collection. As a first step, I replaced the two references to "List" with "Collection" and magically, no error message. So I tested it with this code:
HashMap<Integer, String> map = new HashMap<>();
map.put(1, "1");
map.put(2, "");
map.put(3, "a");
print(map);
And magic happened! The output was:
{1=1, 2=, 3=a}
That's awesome! I didn't even think yet about how I wanted to display key-value pairs, but Java already gave me the perfect solution. Now the next puzzle is where the space after the comma comes from, because I didn't program that in either.
I feel a bit like a character in "The subtle knife", who writes a barebones program to communicate with sentient elementary particles (believe me, it makes sense in context) and suddenly there's text alignment on the left and right, without that character having programmed any alignment.3 -
Coding chalenge.
So... Spent almost two hours to put this little device to work with the keypad.
The device is a arduino micro, special one that can work as mouse /keyboard or any kind of input on most devices (pc, Android phone,...)
The objective is to make a macro keypad to:
- Fast insert text
- Play sounds in games over voice chat.
Think of it like this, you start a new html file, press one key and all the base code is inserted.
So... Why so long? Tought was the hardware, tought the keypad could be set differently that most, code mistakes...
My error was all here, masked from the debugger by a if:
char keys[ROWS][COLS] = {
{'1','2','3','4'},
{'5','6','7','8'},
{'9','10','11','12'},
{'13','14','15','16'}
};
Easy to figure right? Only saw it after reading all the code twice.
9 -
Probably a mathematician. I would be a very different person though, because a key element to my current lifestyle is that I never have to use my mathematical insight to the fullest and therefore I can work despite hangovers from nearly any substances. If I had to be sober to get anything done I'd need a level of self control which is very far from me at the moment.11
-
I've finally found a goldmine of accurate job listings that don't include Windows shit-administration... So I'm thinking of sending out applications to all of them. Problem is, as you might recall from my previous rants, I had a flash drive with my GPG keypair on it stolen from me. I still haven't fully replaced the key (I made another one and published it but I'm not using it yet), and because I'm fairly confident that this flash drive's data has never been used (so likely just plugged into Windows and formatted), it's unlikely that I'm gonna bother rotating all of the contents that were on that flash drive.
That said however, my emails now all have signatures underneath them as follows:
Met vriendelijke groet / Best regards,
[my name]
- My outbound email is usually signed with my private key. If not, please don't hesitate to ask me about it through a different communication platform.
IMPORTANT: My keys have possibly been compromised. An encrypted flash drive on which this GPG keypair was stored has been stolen from me. I'm in the process of phasing out and replacing this key. Please do not use it to encrypt any emails to me anymore.
Not entirely sure whether I should remove or keep that last bit. As a potential employer, would you see this as a red flag (he's got encrypted data stolen from him, wtf that's incompetent), or as a nice thing to know that it was properly disclosed (so no secrecy around potential data breaches)? Both seem equally likely so I'm a bit confused about what I should do.9 -
))| THE BEST AND WORST WAY|((
))| TO DELETE A LINE IN BASH |((
(Think you can do better? Vote
now on your phones!)
WORST: Hold backspace until satisfied
BEST: Using a pen or other pointing device capable of causing semi or permanent damage to your screen, count how many characters the line in question consists of. Write this down on a piece of paper (after all, your terminal is occupied) and using long division, or any other means, divide this number by two, rounding as you please. Press the "right arrow" key as many times as necessary to reach the end of the line. This might be 0 - if so, congratulations, you may skip this step! Once complete, refer to your piece of paper, and taking your newly calculated number, press the "left arrow" key exactly that many times. If you have a short attention span or are worried you will lose count, take a tally or use some other primitive count recording method. Once the key has been pressed the correct number of times, hold down either control key on your keyboard and take a deep breath - there's no going back now (!) - press the "k" key (you should still be holding a control key!) and take a sigh of relief. You're halfway there! If you need a break, take one. When you're ready to finish the task, hold a control key again and take another deep breath. When you are ready to complete the task (don't hold your breath too long!) press the "w" key. Congratulations!! Your line has been deleted!! Some may call you a fucking idiot for not just pressing ctrl-w at the start, but don't listen to those people! They probably delete stuff by accident all the time! Now, take a lie down, and give a moment's silence for the poor poor line you just brutally dissected and murdered.
Think you can do better? Vote now on your phones!9 -
Was just reading some of the OpenVPN scripts to renew a certificate where I forgot to source the vars file first (apparently OpenVPN stores those in a separate file that you always have to source first, and I tend to forget it sometimes).
Reading the revoke-full script that OpenVPN provides, it's just bash so I can read it no problem. But traversing through it and trying to understand it... Horrible! There's a test file in $RT named keys/revoke-test.pem. It's not used anywhere in OpenVPN for anything useful as far as I'm aware. The script however - the script that's running on a production server! - attempts to remove this file. It doesn't exist. Test files do (or at least should) not exist in production. They're not supposed to be there.
It exports empty variables. Some of them are set by the sourced vars file, some aren't. Not entirely sure why it's exporting variables as empty when they're uninitialized, or why it doesn't just unset the ones that are initialized.
And finally it goes ahead and revokes the key file that I'm actually concerned about through regular OpenSSL and verifies it.
Not to mention that the lack of the sourced vars file, which admittedly I should think about in the current status quo, if it *always* needs to be sourced anyway... Why doesn't the script do that itself then? One less thing to go wrong. But hey, proper design?
Gore. I don't have any other words for it.
And before anyone tells me that I should go and fix it if I'm so worried about it. Remember, I am not a developer. That's the job of the developers that made this in the first place.6 -
What retarded way of writing a json feed is this? what the fuck!
Each product in the feed is translatable, but instead of creating a new object in the feed with the translated content, there's an additional field pointing to a language code (this applies to all translateable fields).
Then each translatable field is appended the number which matches the number appended to the language field containing the desired language code.
In addition to that, the keys doesn't have any sensible meaning, but appearently they abide by som obscure "GS1 / GDSN" standard.
So for each "distinct" field I have to look up the definition of that key
If just the language code and the actual value keys was grouped together.. but no, the feed is ordered by the number after the 'D'.
Yeah for being stuck with something that looks like infinite scrolling, because one product object is fucking gigantic.
FUCKING INSANE MANIAC PIECE OF TRASH.
@#%!#€&
7 -
I started applying for jobs. As I have over 150 repos on GitHub and 10 years of relevant work experience, the company obviously had trouble validating if I had some basic coding skills. That's why they decided to send me a coding "homework" task to build an app in React Native.
Basically, the task was building an app with 2 screens and one bonus where they indicated "doesn't need a UI". I spent half a day spinning up their project, installing XCode, their specific versions of Ruby, and around half a day building the thing.
Obviously, I wanted to demonstrate my technical skills, so I added a few tests, proper typing, comments, and so on. The project was in a good state, and on the "bonus" screen I quickly added a few components. Since I have a lot of things going on, I capped the amount of time to one day of work. I felt it was good enough to demonstrate I can build something like this.
A few days later, I received a response from the recruiter telling me they wouldn't move forward. She in depth explained that this was because of a missing key property. I did indeed miss one key property on the "bonus" screen, in the part that was not even part of the core task. This was a list of very few static elements, and the entire list only got rerendered when changing routes. Basically in this case, there would not be any visible performance impact.
The recruiter explained in the email that I was missing the eye for detail they need, and that I should "educate" myself more about lists in React. I made one tiny silly mistake in a one-day project, that a linter would've taken out (if this project had one). I've contributed to React Native myself and worked with React for almost 7 years now? Yeah, it's a stupid thing, but what is the point of these types of tasks? I thought this was to demonstrate my skillset, not to be called out on.
Either way, my question here is this: at which point does it become appropriate to send an invoice for the time I wasted on this?5 -
Aren't you, software engineer, ashamed of being employed by Apple? How can you work for a company that lives and shit on the heads of millions of fellow developers like a giant tech leech?
Assuming you can find a sounding excuse for yourself, pretending its market's fault and not your shitty greed that lets you work for a company with incredibly malicious product, sales, marketing and support policies, how can you not feel your coders-pride being melted under BILLIONS of complains for whatever shitty product you have delivered for them?
Be it a web service that runs on 1980 servers with still the same stack (cough cough itunesconnect, membercenter, bug tracker, etc etc etc etc) incompatible with vast majority of modern browsers around (google at least sticks a "beta" close to it for a few years, it could work for a few decades for you);
be it your historical incapacity to build web UI;
be it the complete lack of any resemblance of valid documentation and lets not even mention manuals (oh you say that the "status" variable is "the status of the object"? no shit sherlock, thank you and no, a wwdc video is not a manual, i don't wanna hear 3 hours of bullshit to know that stupid workaround to a stupid uikit api you designed) for any API you have developed;
be it the predatory tactics on smaller companies (yeah its capitalism baby, whatever) and bending 90 degrees with giants like Amazon;
be it the closeness (christ, even your bugtracker is closed and we had to come up with openradar to share problems that you would anyway ignore for decades);
be it a desktop ui api that is so old and unmaintained and so shitty, but so shitty, that you made that cancer of electron a de facto standard for mainstream software on macos;
be it a IDE that i am disgusted to even name, xcrap, that has literally millions of complains for the same millions of issues you dont even care to answer to or even less try to justify;
be it that you dont disclose your long term plans and then pretend us to production-test and workaround-fix your shitty non-production ready useless new OS features;
be it that a nervous breakdown on a stupid little guy on the other side of the planet that happens to have paid to you dozens of thousands of euros (in mandatory licences and hardware) to actually let you take an indecent cut out of his revenues cos there is no other choice in a monopoly regime, matter zero to you;
Assuming all of these and much more:
How can you sleep at night with all the screams of the devs you are exploiting whispering in you mind? Are all the money your earn worth?
** As someone already told you elsewhere, HAVE SOME FUCKING PRIDE, shitty people AND WRITE THE FUCKING DOCS AND FIX THE FUCKING BUGS you lazy motherfuckers, your are paid more than 99.99% of people on earth, move your fucking greasy little fingers on that fucking keyboard. **
PT2: why the fuck did you remove the ESC key from your shitty keyboards you fuckshits? is it cos autocomplete is slower than me searching the correct name of a function on stackoverflow and hence ESC key is useless? at least your hardware colleagues had the decency of admitting their error and rolling back some of the uncountable "questionable "hardware design choices (cough cough ...magic mouse... cough golden charging cables not compatible with your own devices.. cough )?12 -
We are all about structures, clean code and many other things that make our life easier, right?
Well... It's not all white and black...
As talked many times, projects can be rushed... Client budgets can be low at the start and only then grow...
Let me take an example:
Client X needs a tool that helps his team perform jobs faster. They have a $500 budget. So... Testing, clean architecture and so on - are not really a viable option. Instead, you just make it work and perform that task as needed. So the code has minimal patterns, minimal code structure, a lot of repetitive parts and so on.
Now... Imagine that 3 months pass by without any notice and clients are ultra happy with the product. They want more things to be automated. They contact developers and ask for more things. This time they have a bigger budget but short timeframe.
So once again, you ignore all tests, structure and just make it work. No matter what. The client is happy again.
A year passes and the client realizes that their workflow changed. The app needs total refactoring. The previous developer has no time for adjustments at this point and hires a new company. They look at the code and rants spill out of their mouth along with suicidal thoughts.
So... What would you do? Would you rant about "messy project" or just fix it? Especially since people now have a bigger budget and timeframe to adapt to changes.
Would you be pissed on such a project?
Would you flame on previous devs?
Would you blame anyone for the mess?
Or would you simply get in and get the job done since the client has a "prototype" and needs a better version of it?
---
Personally, I've been in this situation A LOT. And I'm both, the old and new dev. I've built tons of crappy software to make things work for clients and after years - they come back for changes/new things. You just swallow the pill and do what is needed. Why? Well, because it's an internal system and not used by anyone outside their office. Even if it's used outside the office - prototyping is the key. They didn't know if the idea would work or be helpful in any way. Now they know and want it done correctly.6 -
I need to encrypt some large files at rest and then decrypt them immediately prior to processing.
App and files are on a Linux system (CentOS). App is in C. Machine is controlled by a third party.
What encryption libraries would you recommend? And, is there any clever way of managing the decryption key beyond compiling it in the code and doing some basic obfuscation?
Are they fancy obfuscation libraries out there, for example?
And, the reason I'm not going to SO (well, one reason) is that I don't want to have 50 answers that tell me that's it's impossible to 100% protect data on a machine you don't control. This I understand---just looking for "best effort" solution.7 -
I never liked YAML. But lately, I'm starting to dislike it more and more.
I mean, wtf is that?
- digest YAML input -- a valid YAML
- digest JSON input -- a valid YAML
A language that embeds another language.
Can it be any more confusing..?
Sure it can. the
```
script:
- echo "John said: hello there"
```
will fail YAML linter, because, even though I used quotes, yaml sees `echo "John said` as an object key
I think I'm yet to find more nonsense with YAML. And eventually, I'll grow to hate it.8 -
Trying to switch from 2 finger bird-view typing to 10 finger no-view. Fuck this is hard! I'm just veeery slowly getting used to it, although I tend to fall back automatically when I don't focus on it and just want to type in a few characters.
I keep doing several typos and often forget where a key was exactly or confuse the position of some character, even though I typed it fairly often before. Also typing any number or non-alphabetic letter is mostly a wild guess of finger position.
Either I'm a very slow learner or smth's wrong.😪5 -
!devrant.
More like 'relationship' rant.
The following is gonna be kinda crude and not work appropriate just fyi.
First, whats with this trend of 'shave your pussy", and small tits? Shit just a few years ago it was the opposite! Who wants to fuck a women who looks like an undeveloped boy. Give me a good medium pair of knockers and a (slightly) hairy pussy anyday and I'm in heaven.
On that note, all these guys whining and fucking whinging about "fat" women. Like I'm not chasing deathfat women or anything, but come on dudes. If you're gonna demand 'thin beautiful women' put in the fucking work! Just saying it now. Kinda pudgy, not a deal breaker for me. She have a pretty face, looks good in make up? Fuck it, I'll give her the time of day. Don't come at me with "hurrr...fat is unhealthy! Wheres your standards?"
Wheres YOUR fucking standards? Shit, I could take a 'heavy' girl and in a few months time have her trim. Its about the WORK you put in. All these fucking guys, all these fucking guys man, they all want something for nothing and chicks for free. No one wants to put in the fucking EFFORT anymore. I can't name on one hand the number of 'fat ugly chicks' everyone ignored from school (well except for me), who are now bombshells. If I stayed connected with people maybe I'd be with one of em right now, but I just get tired of this attitude that no one invests any time in others any more. It's all about 'me me me'.
Shes fat, maybe only a few extra pounds? Fat and 'not beautiful'? Fucking DO THE WORK and make her beautiful you bitch! Be her coach, like those fucking instagram couples you see sweating it out. Make her sexy. Become sexy, together.
Get her a fucking treadmill. Get her two. And jog together. Make her *feel* sexy.
More importantly get to *know* her. Why does she get out of bed in the morning? What drive her NOT to get out of bed? When does she feel lousy? What makes her feel that way? In addition to all the other shit men should know how to do, you should learn to play doctor phil, because every girl needs one. Women bond by talking, men bond by doing things together. Relationships should involve both.
Jesus fucking christ, this is basic bitch advice, and it annoys me I keep on coming across these spergs that don't fucking get it. Women are not cars you can stick your key in and just go 'vroom'.
They require maintenance, same as anything, any 'relationship' (because really, what are relationships in 2020, with instagram and fucking tinder and antisocial distancing?). You're a *team*, and i don't mean that in an inspirational way. You're a literal team. And far too many people prioritize the well being and success and concern of 'I' over' 'us'.
In short, if she ain't coming, you shouldn't be either. And if you expect her to on-the-regular put sharp objects on her fucking nether regions, don't expect any blowjobs unless you're doing the same thing for yourself!
Ideally you should be doing it to each other.
After all, you're partners. You trust her to put sharp objects near your groin, right?
Aren't relationships supposed to be about mutual trust?26 -
Data representation is one of the most important things in any kind of app you develop. The most common, classic way to do it is to create a class with all the fields you want to transport, for example User(name, lastName). It's simple and explicit, but hell no, in my current company we don't play that kindergarten bullshit, the only way we know how to do things here is full hardcore. Why would anyone write a class to represent a Song, a Playlist or an Album when you can just use a key-> value map for pretty much everything? Need a list of songs? No problem, use a List<Map<String, String>>, OBVIOUSLY each map is a song. Need a list of playlists? Use a List<List<Map<String, String>>>... Oh wait, need to treat a value as a number and all you have are strings? That's what casting is for, dumbass.
No, seriously, this company is great. I'm staying here forever!1 -
Fuck UPS and their API Documentation. Has anyone here ever integrated their API ?
Their API documentation doesn't mention any sandbox or testing accounts.
If I click on their create access key button, it takes me to a form which requires a real payment method and address which seems like it's meant for real stuff not testing.4 -
Trying to use authenticate a JWT token from an Azure service, which apparently needs to use Azure AD Identity services (Microsoft Entra ID, Azure AD B2C, pick your poison). I sent a request to our Azure admin. Two days later, I follow up, "Sorry, I forgot...here you go..."
Sends me a (small) screenshot of the some of the properties+GUIDs I need, hoping I don't mess up, still missing a few values.
Me: "I need the instance url, domain, and client secret."
<hour later>
T: "Sorry, I don't understand what those are."
Me: "The login URL. I assume it's the default, but I can't see what you see. Any shot you can give me at least read permissions so I can see the various properties without having to bother you?"
T: "I don't see any URLs, I'll send you the config json, the values you need should be in there."
<10 minutes later, I get a json file, nothing I needed>
<find screenshots of what I'm looking for, send em to T>
Me: "The Endpoints, what URLs do you see when you click Endpoints?"
<20 minutes later, sends me the list of endpoints, exactly what I'm looking for, but still not authenticating the JWT>
Me: "Still not working. Not getting an error, just that the authentication is failing. Don't know if it's the JWT, am I missing a slash, or what. Any way I can get at least read permissions so I don't have to keep bugging you to see certain values?"
T: "What do you need, exactly?"
Me: "I don't know. I don't know if I'm using the right secret key, I can't verify if I'm using the right client id. I feel like I'm guessing trying to make this work."
T: "What exactly are you trying to get working?"
<explain, again, what I'm trying to do>
T: "That's probably not going to work. We don't allow AD authentication from the outside world."
Me: "Yes we do. Microsoft Teams, Outlook, the remote access services. I can log into those services from home using my AD credentials."
T: "Oh yea, I guess we do. I meant what you are trying to do. Azure doesn't allow outside services to authenticate using a JWT. Sorry."
FRACK FRACK FRACK!!
Whew! Putting the flamethrower away.
Thanks devrant for letting me rant.3 -
#RANT_AHEAD
Almost everyone nowadays uses a PC, Laptop, Smartphone but sadly not even 60% of the total potential of the hardware is being used.
.
And no - you don't require custom cooling to use the whole 100% of the total potential, stock cooling is more than enough.
.
IRL "programmers" these days don't do any fscking effort to optimise their code and give it all up as some kinda shitty "hot patch" - code of their looks disturbing with no security features + optimisation. (wAnBlOwS products remain an example)
.
Even when you're using python you can push your project to limits. Instead of shoving face-size ASCII banners why don't chaps stress test their projects? Oh I forgot the community runs on show-offs and CVs ...
.
Note to Self : Optimisation is the key to integrate Technology with Nature.1 -
DO NOT EXPORT GPG KEYS _TEMPORARILY_ AND ASSUME THAT THEY'LL BE IN THE ORIGINAL LOCATION AFTER EXPORT!
I learnt this lesson the hard way.
I had to use a GPG key from my personal keyring on a different machine ( that I control ). This was a temporary one-time operation so I thought I might be a smart-ass and do the decryption on the fly.
So, the idiotic me directly piped the output : `gpg --export-secret-key | scp ...`. Very cool ( at the time ). Everything worked as expected. I was happy. I went to bed.
In the morning, I had to use the same key on the original machine for the normal purpose I'd use it for and guess what greeted me? - *No secret key*
*me exclaims* : What the actual f**k?!
More than half a day of researching on the internet and various trials-and-errors ( I didn't even do any work for my employer ), I finally gave up trying to retrieve / recover the lost secret key that was never written to a file.
Well, to be fair, it was imported into a temporary keyring on the second machine, but that was deleted immediately after use. Because I *thought* that the original secret key was still in my original keyring.
More idiotic was the fact that I'd been completely ignorant of the option called `--list-secret-keys` even after using GPG for many years now. My test to confirm whether the key was still in place was `--list-keys` which even now lists the user ID. Alas, now without a secret key to do anything meaningful really.
Here I am, with my face in my hands, shaking my head and almost crying.5 -
About a month ago I sorted out some old electronic stuff and found my old laptop from 2011. A 2:nd Gen i7 8gb ram. I replaced it due to several bluescreens a day that later turned out to be caused by a faulty RAM module (was 16Gb back then).
Well, back then it became a backup laptop and went on the shelf and almost forgotten.
I went through all the old files on it and copied them to the NAS, replaced the mechanic drive with cheep SSD.
Used the old Win7 license key to upgrade to win 10 , dust off the fan, and it turned out to be usable.
I have much better computers so I would not use it for anything but today I gave it to my 6 year old nephew so he can start using a computer and build his knowledge. Worse case; If he spills soda on it he'll learn not to do that with the more expensive computers he will use in future.
So win win. I got to get rid of some junk that had been gathering dust for many years by giving my nephew an opportunity to get started with computers.
Finally, the timing: Microsoft announced a few days back that any new upgrade from windows 7&8 to 10 is no longer supported, but that computer still has a valid win 10 license as it was updated a month ago. -
Tabs, or No Tabs? I did the same as this commentor 2 years ago. I can code so quick now because of this simple switch. Here's why:
(source, Laracasts.com)
Ben Smith
"I think the most beneficial tip was to do away with tabs. Although it took a while to get used to and on many occasions in the first few days I almost switched them back on, it has done wonders for my workflow.
I find it keeps my brain more engaged with the task at hand due to keeping the editor (and my mind) clutter free. Before when I had to refer to a class, I would have opened it in a new tab and then I might have left it open to make it easier to get to again. This would quickly result in a bar full of tabs and navigation around the editor would become slow and my brain would get bogged down keeping track of what was open and which tab it was in. With the removal of the tab bar I'm now able to keep only the key information in my mind and with the ability to quickly switch between recently opened files, I find I haven't lost any of the speed which I initially thought I might.
In fact this is something I have noticed in all areas of writing code, the more proficient I have become with an editor the better the code I have been writing. Any time spent actually writing your code is time in which your brain is disconnected from the problem you are trying to solve. The quicker you are able to implement your ideas in code, the smaller the disconnect becomes. For example, I have recently been learning how to do unit testing and to do so I have been rewriting an old project with tests included. The ability to so quickly refactor has meant that whereas before I might have taken 30 seconds shuffling code around, now I can spend maybe 5 seconds allowing my mind to focus much better on how best to refactor, not on the actual process of doing so."
jeff_way Mod
"Yeah - it takes a little while to get used to the idea of having no tabs. But, I wouldn't go back at this point. It's all about forcing yourself into a faster workflow. If you keep the tabs and the sidebar open, you won't use the keyboard."2 -
Yesterday and today combined I spent about 8 hours trying to get my PGP / GPG passphrase to work. Absolutely magically, somehow a newline character had gotten into the passphrase. Yes. That's possible. On macOS, that is.
On my Windows machine I have the same fucking private key protected with the same password. Now try and get a non-windows newline character into any Windows password field, be it a command line or some GUI input. WTF! You'll lose a year of your life with every passphrase error while you have the actual passphrase.
So after all these hours trying to hack my own GPG keystore without success, I remembered how the private key got on my Windows machine in the first place: see tags.4 -
Researching a new communication platform (Twilio, Vonage, etc), I started with Plivo. Created an account, they offer from free credits to try out the platform, so I set up a phone number and attempt to use their API, didn't quite work. I contact their support through their online portal (being very detailed about what I'm trying to do and the issue I'm having)
A day later they reply asking "Could you tell us how you are using Plivo and the issue you are having?"
That would be OK, but my question from the online portal was in the body of the email message. My first reply started with "You not reading the <bleep>ing message is my issue right now.", but I copied and pasted the same message. I even included a screenshot of the API I was having a problem with (so they could see what I see).
Next day I'm trying out a different area of their API and there is a banner "Incoming and Outgoing phone calls are disabled on this account. Contact Support blah blah blah"
I thought, OK, its a trial account, they probably want some additional validation before allowing anyone to make phone calls. I jump thru the hoops, next day I receive an email "Thanks for sharing the details with us. I have reached out to the Product Team to assist us with this and I'll share more details with you as soon as they revert."
Revert what? The block? Waited until next day, banner still there, so I replied again. Not another reply until the next day.
"Our internal team analyzed the account details and unfortunately, we would not be able to remove the restrictions from your account."
WTF!? Plivo, we are going to give you *money* and you can't answer my question! I'm not asking for free stuff, not asking for help finding the 'any key', your API is supposed to support XYZ feature and it's not working...OK. We're done.
I try to close the account (has too much of my personal info I don't want these clowns to have) and I get an error 'Unable to close the account'. WTF!
2 -
I got the Aero15. Had to send it in because ctrl+alt+shift+s (IntelliJ Preference menu) and some others critical shortcuts weren't working. Got a reply a week later.
"Thank you for using our service. The explained fault isn't actually a fault. If you want to use that button combination simply remap the FN key. Mind you this will disable any FN key combinations."
....
"What about all the other combinations?"
....
"Ok we returned it to the technicians who will do their best to repair it."
....
I await their response. But seriously, for a company that makes GAMING keyboards this is pretty embarrassing. I'm surprised it hasn't gotten more attention. -
Let's pick a datepicker for the project. Me: jquery-ui ? Supervisor: No something better.
Jquery-ui: any css selector, standard date format masks (dd/mm/yyyy or mm-dd-yyyy....), Opens if the field is access using Tab key
Something better: only Id selector, custom date format mask ( %d/%m/%Y ...), Tab does not work -
Ok, so: I have a macbook for work. And for the most part, I love it. Its a good looking device that has a fast cpu, enough ram to run stuff locally for testing, even multiple services / environments at the same time without getting overly sluggish.
And, the best thing: It isn't Windows. I have a good, working shell (zsh), so I can use all the command line tooling I could wish for, I have a somewhat working package manager and everything.
But there are just some little things I really can't wrap my head around. And since everything is so locked in by Apple, there are no sensible ways to fix those things without having a bunch of extra programs / services running all the time, introducing overhead, configuration for things I neither want nor need, and so on.
First of all, why the hell did you think the normal way of typing "@" on a german iso keyboard is the key combination for closing the currently focused application? I am a daily user of macos for over 2 years now, and I still keep quitting applications regularly, almost every day.
Or, scroll direction: I use a mouse (g pro wireless) and not just the touchpad, but when I am in a meeting or something (or when I take my macbook with me to configure a switch that isn't accessible over the network), I don't want to take the mouse with me, the touchpad is pretty good, it is big, precise and everything. But for some dumb reason, they decided to reverse the scroll direction for the mouse by default, so if you change that to use the mouse like a normal person, it also changes the scroll direction for the touchpad. And, the worst part is: there doesn't seem to be ANY easy way to separate those two settings, or to automatically set the scroll direction when a mouse is connected.
So every time I use my laptop somewhere else, wich also happens regularly, the scroll directions is wrong, which means I have to go into the settings, change it, then change it back when I am at my desk again.
It just doesn't make any sense, stop trying to "know what our customers want", and please, dear Mr. Tim Apple, give your customers the freedom to know for themselves what they want.
Thanks for listening to my TED Talk.8 -
!dev
TL: DR - This year is not good so far.
One important thing that I learned this year is you understand a certain person's importance after they are no more.
My grandfather, whom I've always hated, ignored, made my distance from him, just because he was unfair with me and my mother since my childhood, passed away a few days before. Only then I realized what kind of a fucking idiot I am.
On top of that, 2 of my best friends stop being friends with me, for one I had gone too far with a practical joke and for another, I proposed her.
But 2 months from now I expect things to be left behind, locked away in a closet, and throw away the key.
So, I'll just say this, that acknowledge person while they are here, don't hold any grudge towards any fucking one.1 -
Hi XXXX,
Thanks for speaking to me earlier,
If you could send me the following details we can really get the ball rolling with the recruitment process.
• Any jobs you have applied for or interviewed (I need company name and position)
This stops me re applying you for jobs you’ve already applied for
• Any key elements an employer has to have for you
• A name phone number and position held for references at your current contract.
If we can get these over asap then we can start the ball rolling and get you a new position in the most time effective manner.
Kind Regards,
Brainless Lazy Back-Stabbing Recruiter.3 -
Today, after searching for 4~ hours for a solution to host a little script that would hide a private API key, I discovered Google Apps Script. What a fucking nice service. Seriously, check it out, you may need it some day.
Anyway I don't understand why Google wants to restrict network access from the Firebase functions when a shitty little script hosted on the same servers can run without any restriction in memory or data transfer. It also provides a cache service, I could save my whole photo gallery on it without them even noticing.1 -
I'm feeling burnt due to the lack of direction at my job instead of overwork.
I'm working as a data scientist at a large corporation and have been remote for a little over a year. I'm very savvy at programming and other technical skills but my manager wants me to develop my leadership skills and want me to move to a management role eventually. So he's been kinda "grooming" me to take on more leadership responsibility in the projects I'm currently involved in.
However, to be honest, I'm a little torn about getting more management or leadership responsibilities. I'm an extreme introvert and absolutely abhor meetings and having the same thing to people all the time and this sort of things stresses me out very easily. My manager seems set on pushing me towards pursuing a path towards leadership and just basically assumed that this is what I want out of my career and started putting me in the deep end without asking me what I want.
I really want to voice my honest thoughts about what I really want to do in my career (to be a technical specialist rather than a manager) but I've kinda procrastinated over the past year when he first started "grooming" me for a leadership role and it's my bad that I didn't tell him earlier.
Right now, I'm thrown in the deep end. I'm given a lot of projects without much of any direction and I'm asked to figure out the people I need to reach out to, the types of meetings I need to set with them, the relationships I need to develop both in and out of my department, etc. However, my real passions lie in writing code, fixing bugs, building models, understanding new technologies and applying them to the business, etc.
On paper, I'm involved in a ton of projects and I seem to be a really busy worker. But right now, I'm having a lot of difficulty reaching out and developing relationships with people that I barely have any actual work to do during the day, because I'm constantly waiting for replies from people or for permission or red tape to get some key information or access to a system in order for me to build something like a model or a program for a particular project. I'm spending maybe 1 or 2 hours of my workday actually "working" which is attending meetings, reading emails, etc., reaching out to someone for the n-th time (even though they continue to ignore me), etc. And that's because I'm blocked on all of my projects - I need an essential piece of information, data, or access to a system or server and the person I'm reaching out to to get this isn't responding. I brought this up with my manager and he says he's gonna try to reach out to these people to help me but so far, it doesn't seem like his help has been effective as I'm continuing to wait.
Though I get paid pretty well, I feel guilty logging in to work everyday and doing very little work, not because I'm lazy but because there really isn't much work for me to do because I'm waiting on so much here and I'm at a point where I can't make any progress in any of my projects without the approvals or other critical information that others aren't providing me.
I know I probably should find another job and I'm currently looking but in the meantime, is there anything else that I should be doing at my current job to hopefully make this situation better? -
StackOverflow locked my account. I'm hoping someone here might be kind enough to help me with a bash script I'm "bashing" my head with. Actually, it's zsh on MacOS if it makes any difference.
I have an input file. Four lines. No blank lines. Each of the four lines has two strings of text delimited by a tab. Each string on either side of the tab is either one word with no spaces or a bunch of words with spaces. Like this (using <tab> as a placeholder here on Devrant for where the tab actually is)
ABC<tab>DEF
GHI<tab>jkl mno pq
RST<tab>UV
wx<tab>Yz
I need to open and read the file, separate them into key-value pairs, and put them into an array for processing. I have this script to do that:
# Get input arguments
search_string_file="$1"
file_path="$2"
# Read search strings and corresponding names from the file and store in arrays
search_strings=()
search_names=()
# Read search strings and corresponding names from the file and store in arrays
while IFS= read -r line || [[ -n "$line" ]]; do
echo "Line: $line"
search_string=$(echo "$line" | awk -F'\t' '{print $1}')
name=$(echo "$line" | awk -F'\t' '{print $2}')
search_strings+=("$search_string")
search_names+=("$name")
done < "$search_string_file"
# Debug: Print the entire array of search strings
echo "Search strings array:"
for (( i=0; i<${#search_strings[@]}; i++ )); do
echo "[$i] ${search_strings[$i]} -- ${search_names[$i]}"
done
However, in the output, I get the following:
Line: ABC<tab>DEF
Line: GHI<tab>jkl mno pq
Line: RST<tab>UV
Line: wx<tab>Yz
Search strings array:
[0] --
[1] ABC -- DEF
[2] GHI -- jkl mno pq
[3] RST -- UV
That's it. I seem to be off by one because that last line...
Line: wx<tab>Yz
never gets added to the array. What I need it to be is:
[0] ABC -- DEF
[1] GHI -- jkl mno pq
[2] RST -- UV
[3] wx -- Yz
What am I doing wrong here?
Thanks.
13 -
The key to any good relationship is compromise. Ladies and Gentlemen, allow me to introduce the 2-4-tab alternating space indent style!
if (x) {
somemethod();
}
else if (y)
{
someOtherMethod();
} else {
iDontKnowHowToTabOnAndroidMethod();
}5 -
Heres some research into a new LLM architecture I recently built and have had actual success with.
The idea is simple, you do the standard thing of generating random vectors for your dictionary of tokens, we'll call these numbers your 'weights'. Then, for whatever sentence you want to use as input, you generate a context embedding by looking up those tokens, and putting them into a list.
Next, you do the same for the output you want to map to, lets call it the decoder embedding.
You then loop, and generate a 'noise embedding', for each vector or individual token in the context embedding, you then subtract that token's noise value from that token's embedding value or specific weight.
You find the weight index in the weight dictionary (one entry per word or token in your token dictionary) thats closest to this embedding. You use a version of cuckoo hashing where similar values are stored near each other, and the canonical weight values are actually the key of each key:value pair in your token dictionary. When doing this you align all random numbered keys in the dictionary (a uniform sample from 0 to 1), and look at hamming distance between the context embedding+noise embedding (called the encoder embedding) versus the canonical keys, with each digit from left to right being penalized by some factor f (because numbers further left are larger magnitudes), and then penalize or reward based on the numeric closeness of any given individual digit of the encoder embedding at the same index of any given weight i.
You then substitute the canonical weight in place of this encoder embedding, look up that weights index in my earliest version, and then use that index to lookup the word|token in the token dictionary and compare it to the word at the current index of the training output to match against.
Of course by switching to the hash version the lookup is significantly faster, but I digress.
That introduces a problem.
If each input token matches one output token how do we get variable length outputs, how do we do n-to-m mappings of input and output?
One of the things I explored was using pseudo-markovian processes, where theres one node, A, with two links to itself, B, and C.
B is a transition matrix, and A holds its own state. At any given timestep, A may use either the default transition matrix (training data encoder embeddings) with B, or it may generate new ones, using C and a context window of A's prior states.
C can be used to modify A, or it can be used to as a noise embedding to modify B.
A can take on the state of both A and C or A and B. In fact we do both, and measure which is closest to the correct output during training.
What this *doesn't* do is give us variable length encodings or decodings.
So I thought a while and said, if we're using noise embeddings, why can't we use multiple?
And if we're doing multiple, what if we used a middle layer, lets call it the 'key', and took its mean
over *many* training examples, and used it to map from the variance of an input (query) to the variance and mean of
a training or inference output (value).
But how does that tell us when to stop or continue generating tokens for the output?
Posted on pastebin if you want to read the whole thing (DR wouldn't post for some reason).
In any case I wasn't sure if I was dreaming or if I was off in left field, so I went and built the damn thing, the autoencoder part, wasn't even sure I could, but I did, and it just works. I'm still scratching my head.
https://pastebin.com/xAHRhmfH25 -
Rant and opinions wanted. Its a long one.
I have been working on a project for a month and a half. For the first week I was requesting designs that I got about 2 of out of 15. For the next week and a half the designer was on holiday so I couldn't do anything but delivered a few more designs once he got back.
This takes us 2 weeks in already. I have other things to do as well so at the same time I work on support tickets and some bespoke development coming in.
I get given 2 or 3 more designs and can't get anything else out of the designer after waiting a week so I have to design everything myself as I go and build it. Something I have never done before.
We are now 3 and a half weeks in. My boss randomly tells my pm it needs to be demo ready the next day. I work furiously to hack something together. It works but key functionality is missing.
I move house and work from home for a week and a half. I do my best but the project is full of bugs and the CSS is horrible because I didn't know what I was making at any stage. It is therefore CSS rules repeated in IDs everywhere.
My colleagues join me on the project because my boss has decided to try and sell it tomorrow.
They run through it and find all the bugs left from me working furiously to get things done quickly. Things like no search pagination and missing validation.
My boss is now pisses at me because the project is not finished, my colleagues are now all working on it. Throughout it all he knew the designer was not delivering me anything and that I was struggling.
Am I in the wrong for writing shit code that came about because I was coding with no idea of what the finished project should look like? Is he in the wrong for dumping this on me and just letting me get on with it even though he knew there were no designs?
Btw I am just finishing a 1 year internship and before this have never done web dev before.
Discuss.7 -
The most frustrating thing while I edit a file on Github directly is pressing home/end key. They're not related to lines but page.
This is the problem with most of the online textboxes/editor.
Am I doing something wrong? Is there any other shortcut -
I have sort of an embarrassing question...
I never learned touch typing, hated it as much as I hated my calligraphy lessons in elementary. Forward a couple of years, I'm a developer and trying to dig deeper into vim seems to require learning touch typing... it has been a struggle to say the least and lowered my speed to a frustrating rate. 😥
I know the arguments for putting the work and learning proper technique but, are there any other arguments out there? I mean, as a developer I find myself using a lot of numbers and symbols which are not totally covered in touch typing curricula, together with a bunch of key combinations...
Idk, maybe I'm just asking for encouragement or different perspectives or unknown advantages about learning touch typing even when you feel fast and confident without it... Thank you guys!11 -
Peers: Set bit 0 to 1 (((W key for movement)))
Host: Gets Bit 0; 0=1; sends signal back to peer for moving peer 1 pixel up
Peers: (Location remains the same?)
Any suggestions on what i'm doing wrong here?4 -
I really wanna get a keg of rum and start sailing across the globe...
Just to spank some devs / managers arses.
The last years were... very demanding regarding security and upgrades.
It hasn't gotten better.
Microsoft leaked it's security key thx to internal debugging and the tool to secure the debugging process so secure data gets filtered was buggy...
I'd guess I already have carpal tunnel after Redmond.
But the really really sad story is: This has become the gold standard.
https://lwn.net/Articles/943969/
Chrome selling the privacy mode for Ads, long topic ongoing for years... yeah they did it.
Apple... oh boy. I could write a Silmarillion about it and would still need an additional trilogy.
Amazon realizing that a Microservice architecture needs planning, cause yeah... just potting services in a data center doesn't end well.
It goes on and on and on....
Don't even get me started on the plethora of firmware / microcode updates cause there was either yet another CPU bug or another device pooped their pants cause the firmware is a mess and needed some dubious update without any background at all...
Serious question: Am I becoming a pepperidge farm uncle threatening to shoot everyone cause I'm getting old and cranky ....
Or is really everything in IT going down the drain the last few years?
It feels like every week is just another "we fucked it up" event.3 -
It started when i was about 10 old.
My uncle showed me how to display something in dos-prompt using the echo command in a custom batch-file.
A few commands later, i was able to "program" a flip-book of an ascii ski-driver. Each ascii picture was separated by pressing any key and cls ^^
Aaaaah. Sweet childhood memories!
Later on i used a programming-language for beginners in windows.
This language gave you control of a triangle called "turtle".
My first high-level programming language was Delphi.
Since i had no idea of databases, i created a pseudo database of magic the gathering play-cards. Each card had it's very own windows formular filled up completely with an uncompressed image object displaying the chosen card modally. *sigh*
I scanned each card by using a feed scanner.
Finally, my application consisted of 200 cardimages and forced my PC to swap the required memory from my harddisk.
Boy o boy. I was such a noob! ^^
Over the years i discovered and felt in love with a lot of languages (jsp, java (script), c#, php, ...) and concepts (mvvm, mvc, clean-architecture, tdd, ...)! ;) -
I'm looking for more semiprimes to test my code on, regardless of the bit length, up to a reasonable number of 2048 bits because the code is unoptimized.
For those wanting to see for themselves if its more failed efforts, heres what you can do to help:
1. post a semiprime
2. optionally post a hash of one of the factors to confirm it.
3. I'll respond within the hour with a set of numbers that contain the first three digits of p and the first three digits of q.
4. After I post my answer, you post the correct answer so others can confirm it is working.
How this works:
All factors of semiprimes can be characterized by a partial factorization of n digits.
If you have a pair of primes like q=79926184211, and p=15106381891, the k=3 pair would be [151, 799]
The set of all digits of this kind is 810,000 pairs.
My answers can be no larger than 2000 pairs, and are guaranteed to contain the partial factorization regardless of the bit length of n.
I especially encourage you to participate if you never thought for a second that the RSA research I've been doing on and off for a few years was ever real.
But those who enjoyed it and thought there might be something to it, if you want to come have fun, or poke fun, I encourage you to post some numbers too!
Semiprimes only.
Keys can be any size up to 2048 bits.
But I won't take any keys under 24 bits, and none over 2048.
You should be able to prove after the fact you know p and q, not only so everyone can confirm the results for themselves, but also because I don't want anyone getting cheeky and posting say the public key to a bank or google or something.
Good luck, lets see if you got a number I can't crack.
For prime numbers you're welcome to use
https://bigprimes.org/
... or any other source you prefer.25 -
I have implemented RESTful API using expressJS, and another React app which will use the API's to fetch data.
I'm getting a problem of Allow-Origin Header.
what's the proper way of calling a API ?
do I use a CORS middleware and allow all origin ('*') and use Api-key as way of check authorization to prevent mis-use. ?
any other tricks ?2 -
Update on my 60% keyboard and (neo)vim journey:
I've been getting much more used to the motions and hand posture required to use vim, but I still don't understand people who use it as their main editor.
I'm still using vanilla nvim, because:
- I am afraid of learning to install plugins
- I want to master the baseline experience before adding more
I enjoy the snappiness, and I feel my keyboard skills further improving, but everything about neovim is disappointing me from the syntax highlighting to the clunky copy/paste to the difficulty of finding code you need.
In VSCode, I can just do ctrl + p to go to any file, f2 to symbol rename, ctrl + shift+ f to do a recursive directory search. These are things offered only by plugins in nvim, but are available out-of-the-box in vscode.
Even saving your file is clunky. I've gotten used to esc + :w, but it's just more keystrokes than ctrl + s.
Sure, my hand is RIGHT in the middle of the keyboard, and key for key, I'm probably writing code faster when I'm in a groove. But there are so many things that are easy in vscode that are difficult in vim that I know that I'm losing time anyways.5 -
HOW I CAUGHT MY CHEATING PARTNER WITH THE HELP OF SOLACE CYBER WORKSTATIONS
Solace Cyber Workstations is a tool designed to help individuals find important information about their partner's online activities without causing any disruption or breach of privacy. This software works by gathering data that is publicly available, allowing users to understand more about their partner's digital presence. It can include social media profiles, public posts, and other online interactions, making it a comprehensive solution for those seeking clarity in their relationships. Using Solace Cyber Workstations is simple and user-friendly. The interface guides users step-by-step through the process of retrieving information. There are no complicated setups or technical skills needed. Once the user inputs the relevant details, the tool quickly navigates the internet to compile the necessary data, ensuring a seamless and efficient process. This ease of use supports individuals in their quest for knowledge about their partner's online life. One of the key features of Solace Cyber Workstations is its commitment to non-intrusiveness. The tool respects privacy and ensures that all information collected is taken from public sources. This means that users can learn more about their partner without violating their privacy or crossing any ethical boundaries. Users can feel comfortable knowing they are not engaging in any harmful or invasive practices while seeking information. Moreover, Solace Cyber Workstations are particularly useful for individuals looking to enhance trust and communication in their relationships. By using this tool, users can clarify any doubts they may have about their partner's online presence. Understanding their partner’s online interactions can lead to more open discussions and strengthen the bond between both individuals, ultimately fostering a healthier environment for the relationship. In conclusion, Solace Cyber Workstations provides a reliable and respectful way to learn about a partner's online life. Its user-friendly interface and non-intrusive methods make it an ideal choice for those who want to ensure transparency while maintaining ethical standards. By utilizing this tool, users can promote understanding and trust in their relationships, which is essential for long-term success. Send a W h a t s A pp D M via: +1 2 4 0 7 4 3 7 6 8 9
Thanks.9 -
When you commit a more readable README on GitHub to a non native English speaker sends you an email a day later asking for help why his self-signed certificate isn't trusted by his browser or his other computers.
The project he's working on is to sniff Wi-Fi packets that are encrypted through a MiTM attack. I've now stopped following this project and moved on.
Has anyone else had any stupid questions from debs which were about the key purpose of their project and how to go about it? -
So excited about my project !
It's about securing file transfer within local network.
Clients are android devices and there is a linux system as a server which handles file and public key transfer between clients .
Any idea about making it cooler ?10 -
It's funny when a girl says where's the "any" key to start a game it's found cute and when a guy does the same and it's like here should crawl back into his mother's womb and rethink his life decisions.4
-
Opinions please.
I want to share a small model in my iOS app. Now on android I'd do with with ViewModelProviders, but on iOS I'm going with SharedDataContainer which is basically a singleton class that store key value data.
Is there any better approach? Data will not be bigger than 10 list items with guid (key) and int (value)
However; when I have big data I do cache on disk or hello OOM exceptions (or whatever they call that bitch on iOS) -
I've been wondering about renting a new VPS to get all my websites sorted out again. I am tired of shared hosting and I am able to manage it as I've been in the past.
With so many great people here, I was trying to put together some of the best practices and resources on how to handle the setup and configuration of a new machine, and I hope this post may help someone while trying to gather the best know-how in the comments. Don't be scared by the lengthy post, please.
The following tips are mainly from @Condor, @Noob, @Linuxxx and some other were gathered in the webz. Thanks for @Linux for recommending me Vultr VPS. I would appreciate further feedback from the community on how to improve this and/or change anything that may seem incorrect or should be done in better way.
1. Clean install CentOS 7 or Ubuntu (I am used to both, do you recommend more? Why?)
2. Install existing updates
3. Disable root login
4. Disable password for ssh
5. RSA key login with strong passwords/passphrases
6. Set correct locale and correct timezone (if different from default)
7. Close all ports
8. Disable and delete unneeded services
9. Install CSF
10. Install knockd (is it worth it at all? Isn't it security through obscurity?)
11. Install Fail2Ban (worth to install side by side with CSF? If not, why?)
12. Install ufw firewall (or keep with CSF/Fail2Ban? Why?)
13. Install rkhunter
14. Install anti-rootkit software (side by side with rkhunter?) (SELinux or AppArmor? Why?)
15. Enable Nginx/CSF rate limiting against SYN attacks
16. For a server to be public, is an IDS / IPS recommended? If so, which and why?
17. Log Injection Attacks in Application Layer - I should keep an eye on them. Is there any tool to help scanning?
If I want to have a server that serves multiple websites, would you add/change anything to the following?
18. Install Docker and manage separate instances with a Dockerfile powered base image with the following? Or should I keep all the servers in one main installation?
19. Install Nginx
20. Install PHP-FPM
21. Install PHP7
22. Install Memcached
23. Install MariaDB
24. Install phpMyAdmin (On specific port? Any recommendations here?)
I am sorry if this is somewhat lengthy, but I hope it may get better and be a good starting guide for a new server setup (eventually become a repo). Feel free to contribute in the comments.24 -
I once was working on my family's business during summer and was doing something on the laptop that was there (according to the owner, it was in a "good shape" - oh my god that laptop nearly gave me cancer: an old Toshiba, running W10, with half the F keys not working - specially F5. I CAN'T LIVE WITHOUT F5 OH MY GOD -, and also the ➡ key (arrow keys). It was bought in a flea market and some IT guy, a friend of the owner, repaired it a bit and installed the OS because a laptop that old ran WinXP or Win Vista for sure) when suddenly it died on me.
I rebooted the thing and right before the time it should be showing the windows logo, the screen froze (on a black screen with some text) and it started to beep. Loudly. A loud continuous beep. I turned it off and on some times after that, seeing if turning it off and on did something (as it seems to work LoL) and it continued with the beeping. After a quick search I found out that that was a common problem with Toshibas that old, and that I needed to press F2 (that key worked thank god) when the black screen with the text showed up (I don't remember what was written there, it were some booting instructions, I think).
It worked. Great. Now the N key doesn't work when I press it. Greeeeeeeaaaaaat. Also it seemed that, when I opened the start menu, it would automatically write "nnnnnnnn(...)" without me pressing any key (pressing any key would make it stop though, maybe it was stuck).
Then I told the owner not to turn it off, because the laptop would start beeping and such (and I know he'd panic about it).
From then on I think it went off for good and now he's been using his own Toshiba, that runs Vista and is slow as all hell.
Moral of the story: he should have been used his crappy PC from the beginning, at least all its keys work
(Note: watching him type hurts my soul. When one is used to use both hands to type, and is fast-ish on the keyboard and uses tabs to change fields, watching someone type with only one hand every 2" or so and using the mouse to change fields hurts. So much time wasted 😭) -
Crypto. I've seen some horrible RC4 thrown around and heard of 3DES also being used, but luckily didn't lay my eyes upon it.
Now to my current crypto adventure.
Rule no.1: Never roll your own crypto.
They said.
So let's encrypt a file for upload. OK, there doesn't seem to be a clear standard, but ya'know combine asymmetric cipher to crypt the key with a symmetric. Should be easy. Take RSA and whatnot from some libraries. But let's obfuscate it a bit so nobody can reuse it. - Until today I thought the crypto was alright, but then there was something off. On two layers there were added hashes, timestamps or length fields, which enlarges the data to encrypt. Now it doesn't add up any more: Through padding and hash verification RSA from OpenSSL throws an error, because the data is too long (about 240 bytes possible, but 264 pumped in). Probably the lib used just didn't notify, silently truncating stuff or resorting to other means. Still investigation needed. - but apart from that: why the fuck add own hash verification, with weak non-cryptographic hashes(!) if the chosen RSA variant already has that with SHA-256. Why this sick generation of key material with some md5 artistic stunts - is there no cryptographically safe random source on Windows? Why directly pump some structs (with no padding and magic numbers) into the file? Just so it's a bit more fucked up?
Thanks, that worked.3 -
TLDR: Being taken of my assigned dev tasks to do a basic word mail merge.
Why am I doing a word mail merge again?
Oh yeah because the business are that used to oh well if it's more than two clicks IT will do it. The only bit that would be considered hard (using that word loosely) is the address block.
No totally not mad that you had me write a mail merge for dip shits guide which isn't being used. No totally not pissed that you now want me to drop everything I'm doing for this basic task.
The fucks can't even pull the right data. Here's the data for the mail merge. Great your missing some key bits. The fucking addresses and names of the people.
I think what's pissing me off the most is I'm not being technically challenged at all and any chance I get to do something that would be is taken away to do something basic you learn in school. -
Anyone here believes that good habits are the key to be a better programmer (write friendly code, learn something new, plan before code etc)
Any thoughts-suggestions?3 -
Optimization concepts/patterns or instances?
For pattern its gotta be any time i can take a O(n^2) and turn it into O(n) or literally anything better than O(n^2).
Instance would probably be the time that we took an api method that returned a json list made up of dictionaries CSV-style and changed it into a dictionary with the uid as the key and the other info as key-value pairs in a sub-dictionary. So instead of:
[
{
"Name": name,
"Info":info
}
]
We now return:
{
name:
{
"Info": info
}
}
Which can, if done right, make your runtime O(1), which i love. -
!Rant
TL;DR - Getting married can lead to installing life malware.
MARRIAGE SOFTWARE....
A young husband wrote this to a Systems Analyst -
(Marriage Software Div);
Dear Systems Analyst,
I am desperate for some help! I recently upgraded my program from Girlfriend 7.0 to Wife 1.0 and found that the new program began unexpected Child Processing and also took up a lot of space and valuable resources. This wasn't mentioned in the product brochure.
In addition Wife 1.0 installs itself into all other programs and launches during systems initialization and then it monitors all other system activities.
Applications such as "Boys' Night out 2.5" and "Golf 5.3" no longer run, and crashes the system whenever selected.
Attempting to operate selected "Soccer 6.3" always fails and "Shopping 7.1" runs instead.
I cannot seem to keep Wife 1.0 in the background whilst attempting to run any of my favorite applications. Be it online or offline.
.
I am thinking of going back to "Girlfriend 7.0", but uninstall doesn't work on this program. Can you please help?
.... The Systems Analyst replied:
Dear Customer,
This is a very common problem resulting from a basic misunderstanding of the functions of the Wife 1.0 program.
Many customers upgrade from Girlfriend 7.0 to Wife 1.0 thinking that Wife 1.0 is merely a UTILITY AND ENTERTAINMENT PROGRAM.
Actually, Wife 1.0 is an OPERATING SYSTEM designed by its Creator to run everything on your current platform.
You are unlikely to be able to purge Wife 1.0 and still convert back to Girlfriend 7.0, as Wife 1.0 was not designed to do this and it is impossible to uninstall, delete or purge the program files from the System once it is installed.
Some people have tried to install Girlfriend 8.0 or Wife 2.0 but have ended up with even more problems. (See Manual under Alimony/Child Support and Solicitors' Fees).
Having Wife 1.0 installed, I recommend you keep it Installed and deal with the difficulties as best as you can.
When any faults or problems occur, whatever you think has caused them, you must run the.........
C:\ APOLOGIZE\ FORGIVE ME.EXE Program and avoid attempting to use the *Esc-Key for it will freeze the entire system.
It may be necessary to run C:\ APOLOGIZE\ FORGIVE ME.EXE a number of times, and eventually hope that the operating system will return to normal.
Wife 1.0, although a very high maintenance programme, can be very rewarding.
To get the most out of it, consider buying additional Software such as "Flowers 2.0" and "Chocolates 5.0" or "HUGS\ KISSES 6.0" or "TENDERNESS\ UNDERSTANDING 10.0" or "even Eating Out Without the Kids 7.2.1" (if Child processing has already started).
DO NOT under any circumstances install "Secretary 2.1" (Short Skirt Version) or "One Nightstand 3.2" (Any Mood Version), as this is not a supported Application for Wife 1.0 and the system will almost certainly CRASH.
BEST WISHES!
Yours,"
Systems Analyst.
-----------------------------------------------
I'm not sure if this is a repost - if it is I apologise, but it's too good not to share.1 -
I hate group project so much.
I yet again successfully stirred up a big drama in my project group. For project, I proposed a CDN cache system for a post only database server. Super simple. I wanted to see what ideas other people come up with. So I said I am not good at the content and the idea is dumb. Oh man, what a horrible mistake. One group member wants to build a chat app with distributed storage. We implemented get/put for a terribly designed key value store and now they want to build a freaking chat app on top of a more stupid kV store using golang standard lib. I don't think any of those fools understand the challenges that comes with the distributed storage.
I sent a video explaining part of crdt. "That's way too complicated. Why are you making everything complicated."
Those fools leave too much details for course stuff's interpretation and says
"course stuff will only grade the project according to the proposal. It's in the project description".
I asked why don't they just take baby steps and just go with their underlying terribly designed kV store.
"Messaging app is more interesting and designing kV store with generic API is just as difficult"
😂 Fucking egos
Then I successfully pissed off all group members with relatively respectful words then pissed off myself and joined another group.1 -
This happened to me sometime back.
I want to try out a WordPress plugin in my local machine before installing on a production server. It is an Ubuntu machine. Downloaded and installed Xampp, then setup WordPress with MySQL. Now tried uploading the plugin zip file, it throws some permission error, asking to fix permissions or use FTP. I thought of just chmod 777 recursively for the WordPress directory to fix this easily.
Ran the command, looks like it is hung. Terminated using Ctrl+C and then ran the same command. Again it is taking much time. It should not take so much time to recursively change the permission of just a WordPress directory. Thought something was wrong. Before I realized the damage is already done.
Looks like I ran the command
sudo chmod -R 777 /
instead of
sudo chmod -R 777 ./
Fuck, I missed a dot in the command and it is changing permissions of everything in my machine. Saw the System monitor, CPU usage spiked to 100%. I can't close or open any program. Force shutdown the machine using the power key. It didn't boot again. Recovery mode didn't help. Looks like there is no easy way to restore back from this damage. Most of the files I need are backed up in the cloud, still, need a few more personal files so that I can format and reinstall Ubuntu. Realised I have Windows in dual booting. Boot into Windows and used some ext4 reader to recover the files, formatted and reinstalled the OS. Took a few hours to get back to my previous setup.
Lesson Learned: Don't use sudo unnecessarily.
Double check the command while executing.
Running a wrong command with root permission can fuckup your entire machine. -
Watch an "Introduction" video about it, or read the docs/blogs on why and where to use this particular tech. If you find it useful, then get your head down and work. Watch every YouTube video, read company docs, read random blogs, read FAQs. Honestly, any source you can get your hands on.
And never forget to write more code than you read.
Consistency and hard work is the only key.
I still remember when I was first getting introduced to front end, I didn't sleep for 3 straight days and was studying all that I could. -
How the hell do you interrupt a download in Sublime FTP???!!! Any obvious hot key such as Ctrl+C doesn't work, and there's not a word about how to interrupt an operation in the docs of Sublime FTP.15
-
I created a custom interface for an LMS that allows students to see their marks even if they haven't been 'shared' yet by their teachers. This is all done without accessing any unauthorized apis, as the LMS always returns all student marks and then hides the ones with a False 'shared' key. School administration caught me, so I've now shut it down. I have a meeting with the deans tomorrow. Any advice? (Again, this is all done using existing methods found within this LMS)4
-
I am new to Ubuntu or any Linux OS and have been hearing a few good things about them.
So few days ago I decided to try out the Ubuntu 17.10, after which I installed Gnome Tweak Tool to customize the look and feel. After installing some themes and applying them I found the whitish bar appear as you can see in the photo I attached. I do not like it (hated it also when I used Windows). Please how do I make this go away as I have googled alot about it but cant get anything helpful.
I also have the issue of my Windows button not performing any shortcut task as before like showing the desktop screen (this now happens when I click the Windows buttton + A key)
Thank you all
9 -
On page 19 of the ethereum yellow paper: http://gavwood.com/paper.pdf it defines the address of a wallet as: A(pr) = Β[96...255](KEC(ECDSAPUBKEY(Pr))), which is the right most 160-bits of the Keccak hash of the public key generated by the private key.
If I expose the public key to the network, do I allow people to impersonate me and sign transactions even though they don't have Tr, Ts, or Tw? My understanding is no, that without those values you can't hash the transaction.
Subsequently, this leads me to wonder if the purpose of the address (besides identifying users) to obscure the public key so that the private key is at a less risk of being reversed? Or can the public key of any address be captured?
If the public key of any address can be identified on the network or off network (without actually being the owner of that key), how do you do that? Are there any resources on how to perform this that are computationally easy?1 -
Is it just me who thinks that the "insert" key is the most useless and annoying key piece?
It's beside backpack, I accidentally press it. I really haven't found any uses for it so far...5 -
!rant
If you want to resize and move windows without any hassle (with pressed ALT key) in windows? Just like in linux? Then check out AltDrag.
Wish someone had told me this sooner 😅 -
I have a Lenovo IdeaPad 330s and it shows the battery percentage remaining when we press any key on the keyboard while the laptop is switched off. This is a really handy feature. Does anyone know how it is implemented or how could it be implemented (on other laptops) ?
Don't just ++, favorite this post, pin it (so, you can comment on it if you find the way later) and please, mention it in the comments if you know it.4 -
(Question/0.5Rant)
So I am working on a mixed API (aka reachable from anywhere, but also only accessible by specific allowed devices) and I am struggling with the security of it, its not managing anything hardcore (this API is "is the coffe ready?" kind of level) or I would have just enforced per device registration for example already, but the app that goes with that API is deployed remotely and has to be "ready to go!!!" out of the box, so I can't add any registration, verifications of devices etc.
The main thing I am afraid of is, that one of those agent retards will get his spaghetti phone blasted from the inside, so all the https calls will be read out by some random attacker, which then will be able to "abuse" the API via read out api-key, is there any way for me to have a rescue plan if one of those retards does get hacked and the system then get spammed or something, like if I log all devices that use the API I could just deny access from that device (until resolved) and issue a new app update via new api key.
What's the best way of handling this and is my idea really the only way to handle this? this shitfest is really causing shit ton of ideas in my head, which then I deny literally 20 seconds later, because there's a way to bypass it or once you have the old api key to get a new one by just monitoring it etc.5 -
Hire the Best Hacker At Mighty Hacker Recovery.
It was a normal morning when I realized my wallet was missing. Panic immediately set in as I frantically searched through my apartment, hoping to find it tucked away somewhere. But it was nowhere to be found. I retraced my steps from the previous day, but the wallet was still missing. I knew I had to act fast. My wallet contained my pharse key, which gave me access to my cryptocurrency wallet. And in that wallet, I had 4.8 million AUD worth of cryptocurrency. It was a fortune that I had worked hard for, and I couldn't afford to lose it. As I sat on my couch, racking my brain for any clues or leads, my phone rang. It was an unknown number. I hesitated to answer, but something told me to pick up. And I'm glad I did because on the other end was a representative from Mighty Hacker Recovery. At first, I was skeptical. How did they know about my missing wallet? But they assured me that they had a team of skilled hackers who could help me recover it. They explained that my wallet's pharse key was encrypted and that only a skilled hacker could access it. With nothing to lose, I agreed to meet with them. They were professional and had a wealth of knowledge about cryptocurrency. They assured me that they would do everything in their power to recover my wallet. And they did. After days of hard work and numerous attempts, they finally cracked the encryption and retrieved my pharse key. I couldn't believe it. I was overjoyed and grateful beyond words. I couldn't thank them enough. Thanks to Mighty Hacker Recovery, I was able to access my wallet and retrieve my 4.8 million AUD worth of cryptocurrency. They saved me from a financial disaster, and I will forever be grateful to them. I couldn't believe how lucky I was to have crossed paths with them. They were truly a team of mighty hackers, and their skills were unmatched. I made sure to spread the word about their services, and I even saved their number on my phone, just in case. From that day on, I made sure to keep my pharse key safe and secure, knowing that Mighty Hacker Recovery was just a phone call away if I ever needed them again. And I was at peace, knowing that my fortune was in safe hands. WhatsApp +1 845 699 5044.
-
I need advice:
I'm a developer, I have lots of experience with Java and Python (More on Java than Python). But I'm not a game-dev.
I've been thinking about dedicate serious time to develop a game, like a long term plan, using my free time.
Top down adventure / puzzle game; you know typical go here, get key there, put three gems here, unlock that and so on.
I have two options: Go with Java as I can move easily with it OR use an engine like Godot even though I've never used it before.
So game-devs, any advice on what should be the best approach here?8 -
After not using Intel XDK for a year. I just noticed that they dropped support for this tool in early 2018 and removed all the keystores stored in their system.
Now I'm unable to update my android app because I don't have the key anymore.
And now soon google play will remove my app due to security issue on certain module.
I should've kept the keystore myself...
Oh well mistakes were made and lessons are learned the hard way.
Does anyone have any suggestion to retrieve a keystore file? -
Oh look at it stupid technomusings.
Context:
- You have a sequence of N-byte-wide values.
- Each value is unique.
- You XOR them all together into an N-byte-wide key.
- Just dump the key into a list somewhere.
Problem:
- A new value sequence is input.
- Same rules: all values are unique and fixed-size.
- You XOR them all together into a key.
- You walk the list of keys and check them for equality against the new one.
The same sequence of values, regardless of order, would ((supposedly)) always give you the same key. I used this years ago, for a renderer that used indexed colors, to see if I had to make a new palette or not when saving/loading textures: the image format had the key on the header.
It worked, but I was using a __very__ limited value range, cursed 8-bit YUV lossy fuckery; never bothered investigating the idea any further.
So, question:
- Is there any specific situation in which you get a false positive?
- Is there any specific situation in which you get a false negative?
My brain wants to say 'yes' to both because I'm privy to the mystical truth that my methods invariably fall on the idiot side of the spectrum. But my lazy testing keeps saying 'no, you dumbass'.
So who's wrong?
brb gon hit that crack~1 -
Here's a shorter version of my earlier question in case it was way too long and wordy. It's informal research.
Have you experienced a scenario in which you did not feel accountable (or felt less accountable) for the outcome of some development work you did because of bad decisions that were forced upon you?
I'm interested in any specifics, including how you felt about it. Or even just, "Yes, that's happened to me."
The key detail is that in this situation you felt the person who made the decision was or should be accountable, and that you were not accountable or less accountable.
Thanks -
Hit Compile and Run almost as many times as you press any other key. Mid-writing tests work well as long as you understand what you're looking for!
-
Caps lock is an annoying key in a prominent place, so I want to remap it. Backspace or control both seem like a good option. Any experience or preferences? Of course this is very personal, but I'd like to hear from you anyways.11
-
Holy shit, finally had the time to look into tmux and also accidentally discovered you can resize the panes via ctrl+b then hold ctrl+[arrow-key] to resize it to any side, but I can't find any use for it all myself yet, since I just use some terminal emulator that has tabs or use the inbuilt virtual-desktop, still an exciting and cool thing to have played with, though I would def. change most of the hotkeys to something less capslock heavy, since it's rather awkward to first press ctrl+b then shift+2 etc.
-
Good poem i read :
“OK” said Fuen, “but why is Hydra howling at the moon.”
“He is just a bit upset at his PC breaking” replied Red.
“Can’t he fix it?” asked Fuen.
“Doesn’t look like it” said Red. “He keeps getting stuck during the trouble shooting.”
“Which bit of trouble shooting?” asked Fuen.
“The last bit” replied Red. “He says his keyboard doesn’t have an ‘any’ key.”
Fuen winced. -
Some day ago I ranted that I needed to program Angular2 but my keyboard didn't have the ` symbol.
Now I decided to remap the useless £ to `. I wasted like 2 hours but it seems that doesn't exist any way to do it. I downloaded like 10 application but nothing, I can't remap a second-function key.
Oh my god, who invented the italian keyboard needs to burn in the hell10 -
For me it's definitely teaching. Whether I teach coding or any mathematical or even theoretical subjects. I find that when you teach someone you learn how to communicate better and transfer knowledge effectively. Communication is key in client relationships.
Secondly when you teach someone a concept you think you understand you tend to find flaws in the way you understand that subject matter by forcing you to hear your explanation out loud. This in turn will make you delve deeper into that subject matter and make you understand it better, rearranging your own perceptions and correcting those flaws. -
I am in a team where almost everyone is an apt critique. everyday new challenges and people seem to be so competitive that they don't share any information across, thus making everyone isolated and whack the motto "collaboration is key" teamwork rarely comes into play and it is most if the times one man show. thriving in such an environment is a challenge thanks team 😃
-
Do you guy know that there is a lot of short query name like "f" in web development?
We are discourage from using single character variable name and the query key is too short. Is there any specific reason for using short query name?6 -
Is anyone using a yubikey or any other hardware key device at work?
How is your experience when using it and what types of accounts are secured with it?5 -
Greets. I need advice. And before reading just skip me with classic things you can't - you shouldn't. As i am Windows user last 20 years, I never actually used any other os (running ubuntu on vm occasionally doesnt count). So for some period of time I'm thinking about throwing myself fully into some Linux distro but I can't choose which one. I was thinking between Fedora, Arch and Debian (i dont want Ubuntu), but also what it should be a main key of my decision is good documentation backed up distro. Thanks in advice if you are willing to help my decision2
-
One user could report that the data they saw didn't make sense. Turns out there was a one-off hardcoded caching detail for one of our services that cached based on a search query (yes, the entire query was the key) and before any auth checks. The system would return the results owned by whoever asked first, no matter who asked after that point.
There's "Oh dear but we all make mistakes" and there's surrender cobra. This is what PRs are for.1 -
On Linux I want to scp a file from Machine B to my machine A.
Assuming B allows all connections is any key/cert file exchange needed?
I recall whenever I SSH to a new machine I need to accept a key on the first connect.
Guess general question is what is the connection process between 2 Linux machines for sftp purposes?9 -
Nothin to get a rant simmering like reFuckingRanting! All good, I'll have another shooter while I wait to reinstall, reconfig, rebuild, rewipe, and reRefuse any and all Windows clammy hand of aid it forces down my soul. One of these days, when the whole realm understands we don't need this vast array of exactly the same shit but this one's dick is a little bigger so lets fucking make it, this and not that, and rebuild, push the update, need 4 more updates by noon next day. Nothing stays stable team green, NOTHING. Fuck anyone trying to actually ...make something..We got vulns and updates, backdates, and breaking changes on all 58 of our same shit production line shit shows. I can't count one time in this few year pain olympics that in a single 8 hour span of time the same shit that was working like a fucking wet glove in a horses ass at whiskey 1 was NOT fucking anywhere near coherent come whiskey not 1. Just sayin, is this a cock show boys? Or is is just a wild and rambunctious thought to maybe start compiling/combining some key role playing pieces of softwar? If not, I'll just prep for another round of fucks, and carry on. Sadly, this shit is addicting against many odds. Enjoy your lunches
-
Any one ever heard of the Solo? It's basically an open source FIDO compliant U2FA usb (with planned support for PGP/SSH key storage!).
The guys who made it are now miniaturizing it into the "Somu" (Secure Tomu).
Please support it! It's a great project and a great (and cheap) addition to basic system security.
https://crowdsupply.com/solokeys/...21 -
Hi people, I need some help.
First, stack , Golang/gorm(ORM)
I need doing a simple sum(amount) , I have a " db.Table("orders").Select("sum(amount) as Amount, merchants.name").Joins("inner join merchants on merchants.id = orders.merchant_id AND merchants.name = ? GROUP BY merchants.name", key).Scan(&total)
total is a struct type .
Are there any smell and I don't see ....?1 -
### Discover the Pin Up Bet App for a Seamless Betting Experience in Bangladesh
If you're looking for a top-tier mobile betting app, the is the perfect solution for players in Bangladesh. With its easy-to-use interface, seamless navigation, and exciting range of betting options, the PinUp app download https://pinupbetting-bd.com/pinup-b... allows you to take your sports betting experience to the next level.
#### Why Choose the Pin Up Bet App?
The **Pin Up Bet App** offers a smooth and engaging betting experience right at your fingertips. Whether you're a sports enthusiast or a casino fan, this app gives you access to a variety of games and events, including live sports betting, casino games, and more. From cricket to football and beyond, you’ll find a wide range of events to place your bets on.
#### User-Friendly and Convenient
One of the key features of the **Pin Up Bet App** is its user-friendly design. It’s optimized for both Android and iOS devices, ensuring that no matter where you are, you can access your favorite games with just a few taps. The app’s intuitive layout allows you to easily navigate through different sections, make quick deposits, and place bets with ease.
#### Safe and Secure Betting
When it comes to online betting, security is crucial, and the **Pin Up Bet App** takes this seriously. The app ensures your transactions and personal data are fully encrypted, providing a safe environment for all your betting activities. With reliable payment methods and secure withdrawals, you can enjoy your betting experience without any concerns.
#### Play Anytime, Anywhere
The **Pin Up Bet App** gives you the flexibility to place bets and play your favorite casino games no matter where you are. Whether you're at home or on the go, you’ll have access to your account and betting opportunities 24/7.
In conclusion, the **Pin Up Bet App** is the perfect solution for anyone in Bangladesh looking to enhance their betting experience. With a wide range of options, user-friendly design, and secure environment, it’s the ultimate app for mobile betting enthusiasts.9 -
Unlock the secrets of the digital world with our latest video, "Hire the Best Hacker 2025!" Discover how Mighty Hacker Recovery can assist you in retrieving your lost bitcoins, upgrading your school scores, and enhancing credit card limits. Whether you're facing financial challenges or seeking academic improvement, our expert hackers offer tailored solutions to meet your needs.
Join us as we explore the incredible capabilities of skilled hackers in 2025. Don’t forget to like and share this video with anyone who might benefit from our services!
Hire the Best Hacker 2025! Bitcoin Recovery & More
USDT trade key for withdrawal contact Mighty Hacker Recovery on Whatsapp +1.8.4.5.6.9.9.5.0.4.4.
How to recover my lost usdt online/ contact Mighty Hacker Recovery.
What can you do to retrieve USDT if it was mistakenly sent to the wrong wallet address? contact Mighty Hacker Recovery.
How to recover my lost usdt online? contact Mighty Hacker Recovery
Hire expert Certified Ethical Hackers at Mighty Hacker Recovery.
Hackers contact number near me contact Mighty Hacker Recovery
#Hacker2025 #BitcoinRecovery #CreditCardUpgrade #ScoreUpgrade #MightyHackerRecovery #Cybersecurity #TechSolutions
Hacker Near By me contact Mighty Hacker Recovery
Who can I call about a hacker? Call Mighty Hacker Recovery Whatsapp +1.8.4.5.6.9.9.5.0.4.4
Hire a Local Hacker Near Me for Enhanced Cybersecurity Whatsapp +1.8.4.5.6.9.9.5.0.4.4
Hire expert Certified Ethical Hackers for any job Whatsapp +1.8.4.5.6.9.9.5.0.4.4
Ethical hackers academy reddit contact Mighty Hacker Recovery8 -
I'm going insane.
So let's say you have an object in database, with 20-30 related objects (Or lists of objects) (All related objects have a foregn key to the "main" object).
Now, as long as you just edit/create thinga everything is fine.
But the deletion... Oh MY GOD
"Just put on delete cascade", right ? RIGHT ?
WRONG ! presence of some objects should block delete, while others can be deleted and some are "situational" depending on the first object state.
So delete operation with all the checks takes .... 1 - 2 seconds.
Seems fine ? WRONG ! When you have 40 or more objects to delete, even 1 second is too long.
Should I say "fuck it" and just write a stored proc which will crash if object cannot be deleted for any reason ? because with Entity Framework, I don't see how I can do it effitenly.
But I HATE stored proc, after couple of month/years noone remembers how they work...
RHAAAAA.
Ok I feel better.8 -
Have been searching on this topic alot lately, but I cant find any good solution, in my opinion.
I have a system where I want to encrypt some data in the database, so it isn't in plain text, but how would you do it properly?
It has to be decrypted to view the data in the system, but how to manage it?
How can I store the keys in the right way? In my current trial, I have a encryption key and an iv, but wouldn't it be wrong to store the encryption key in the config file?
Can't really see how to grasp this the right way and in the same way have it as secure as possible.
Is it just stupid in general? -
Is it a good approach to have a master SSL key for all your servers when making the authentication?
I am a Developer, but when you work in a company with two developers and you are the senior one you have to learn a lot of stuffs. I am learning more in depth things about how to secure the servers and network.
Now, I am expanding the servers. Splitting the code and database in three different servers (code, Master DB, Slave DB) and configuring Master-Slave databases.
My questions are:
1. Is it a good approach to have a master SSL key for all your servers?
2. Is is a good approach to use the same SSL key for Master database server and Slave database server?
Any other suggestions are welcome.
Thank You in advance!2 -
My vServer setted Up recently is working.. nearly.. git isn't working.. cant Push to the server.. permission denied, Can not read.. Shit! Any suggestions?
I can login to my Server with my Public Key, but for some reason not with git. Maybe I will Dream from a Solution. Good night ;)6 -
Merry Christmas! Finally got my 60% keyboard, so it's time to get back to practicing nvim. Already getting better at using hjkl since I don't have any arrow keys.
Only thing that's a bit of a bummer is the ~ key is Shift + Fn + Esc. Oh well, I only use that one maybe a few times a day anyways especially since the only Linux I use is WSL.3 -
How to choose the best writing service?
Choosing the best essay writing service at (GoEssaywriter dot com) involves several key considerations to ensure you receive high-quality, original essays that meet your academic needs. Here's how to select the best essay-writing service:
Reputation and Reviews: Look for a service with a strong reputation and positive feedback from previous clients. Check independent review platforms and testimonials on the service's website.
Writer Qualifications: The best writing services employ writers with advanced degrees and expertise in various fields. Ensure that the writers are capable of handling your specific essay topic.
Samples: Request or look for samples of previous work to gauge the quality and style of writing. This will give you an idea of the standard you can expect.
Pricing: While affordability is important, be wary of services that offer meager prices, as this may indicate poor quality or plagiarism. The best services offer fair prices for the level of expertise and customization provided.
Guarantees: A reliable essay writing service will offer guarantees such as confidentiality, timely delivery, and plagiarism-free content. Make sure these guarantees are in place before you commit.
Customer Support: The best services have responsive and helpful customer support available 24/7 to assist with any questions or concerns you may have.
Revision Policy: Check if the service offers free revisions in case you need changes to the essay. A good service will be willing to make adjustments to ensure your satisfaction. -
Comvox Systems LLC: Revolutionizing Business and Education with Interactive Touchscreen Displays, Smart Touch TVs, and Commercial Monitors in Jacksonville, FL
At Comvox Systems LLC, we are dedicated to providing innovative and high-quality technology solutions for businesses, educational institutions, and more. Based in Jacksonville, FL, at 5570 Florida Mining Blvd S, Unit 401, Jacksonville, FL 32257, we specialize in providing cutting-edge interactive touchscreen displays, touchscreen TVs for education, smart touch TVs for business, and commercial touchscreen monitors that cater to your specific needs. Whether you're looking to enhance your business presentations, improve classroom engagement, or upgrade your commercial displays, we have the perfect solutions to meet your requirements.
Interactive Touchscreen Displays: Engage and Inspire Your Audience
Interactive touchscreen displays are transforming how businesses and educators engage with their audience. At Comvox Systems LLC, we offer interactive touchscreen displays that are designed to provide an engaging and intuitive experience. These displays allow users to interact directly with content, making them ideal for meeting rooms, conference areas, classrooms, retail environments, and more.
Our interactive touchscreen displays offer smooth and responsive touch technology that enhances presentations, meetings, and teaching sessions. Whether you need to highlight key points, draw diagrams, or interact with live content, these displays provide flexibility and functionality. These displays not only help improve communication but also encourage collaboration, making them an excellent tool for any environment.
Touchscreen TV for Education: Enhancing Learning Environments
In educational settings, having the right tools to engage students is crucial. Our touchscreen TV for education is the perfect solution for classrooms and training rooms that need to integrate technology seamlessly into the learning experience. Designed specifically for the needs of educational institutions, our touchscreen TVs for education offer interactive features that make lessons more dynamic and engaging for students.
These touchscreen TVs come equipped with user-friendly interfaces, smart capabilities, and interactive features such as whiteboarding, digital annotation, and multimedia support. They also allow for seamless integration with various educational software, enabling teachers to enhance the learning experience with multimedia content, online resources, and collaborative tools. Whether you’re in a K-12 school, university, or training facility, our touchscreen TVs for education help create an interactive, modern, and effective classroom environment.
Smart Touch TVs for Business: Elevating Professional Presentations
For businesses looking to elevate their meetings and presentations, smart touch TVs for business provide the perfect solution. These smart touch TVs offer an array of features that enhance collaboration and communication in a corporate setting. At Comvox Systems LLC, we provide smart touch TVs for business that seamlessly integrate with your existing systems and provide features such as wireless screen sharing, interactive whiteboarding, and video conferencing.
Our smart touch TVs for business are perfect for boardrooms, conference rooms, or collaborative spaces. They offer exceptional picture quality, intuitive touch capabilities, and are compatible with a wide range of devices, allowing teams to present ideas, share information, and work together efficiently. Whether you’re giving a presentation or brainstorming ideas with your team, these smart touch TVs bring innovation and professionalism to your business environment.
Commercial Touchscreen Monitors: Durable and Functional for Any Industry
When you need a display that can withstand the demands of constant use in commercial settings, commercial touchscreen monitors are the ideal solution. At Comvox Systems LLC, we offer commercial touchscreen monitors designed to meet the needs of industries such as retail, hospitality, healthcare, and more. These monitors are built for durability, with features that support continuous usage and high-performance tasks.5 -
Expert Garage Door Service: Professional Garage Door Tune-Up in Scottsdale, AZ
Your garage door plays a crucial role in the safety and functionality of your home or business. It’s one of the most frequently used parts of your property, and over time, regular use can cause wear and tear on its components. To ensure that your garage door remains in top working condition, it’s essential to have it properly maintained with a garage door tune-up. At Expert Garage Door Service, we provide expert garage door tune-up services in Scottsdale, AZ, and the surrounding areas. Our goal is to keep your garage door operating smoothly, extend its lifespan, and prevent costly repairs down the road.
What Is a Garage Door Tune-Up?
A garage door tune-up is a comprehensive service that involves inspecting, cleaning, and adjusting various components of your garage door system. Regular tune-ups are essential for maintaining optimal performance and ensuring that all parts of your garage door are functioning correctly. Just like a car needs regular oil changes and maintenance, your garage door requires periodic inspections and adjustments to keep it running smoothly.
Why Is a Garage Door Tune-Up Important?
There are several key reasons why a garage door tune-up is an essential service for your home or business:
1. Prevent Unexpected Breakdowns
A garage door tune-up helps identify potential issues before they become major problems. By catching issues early, such as worn-out springs or misaligned tracks, you can avoid costly repairs or complete system failure. Regular maintenance ensures that your garage door operates smoothly and reliably for years to come.
2. Extend the Lifespan of Your Garage Door
With routine tune-ups, your garage door and its components will last longer. By keeping springs, cables, tracks, and openers in good condition, you can delay the need for replacements and save money on long-term repairs. A well-maintained garage door can last anywhere from 15 to 30 years, depending on the quality of the system and how well it is cared for.
3. Enhance Safety and Security
A malfunctioning garage door can be a safety hazard. Worn-out springs or cables can lead to the door unexpectedly falling, which could cause injury or property damage. A garage door tune-up ensures that all safety features, such as auto-reverse functions and sensors, are working correctly, protecting both your family and your property.
4. Improve Performance
Regular maintenance ensures that your garage door operates efficiently. A well-tuned system runs more quietly, opens and closes more smoothly, and uses less energy. If your garage door is noisy or struggles to open, a tune-up can often resolve these issues, making your door work like new.
5. Increase Energy Efficiency
If your garage door isn’t sealed properly or its insulation is damaged, it can cause energy loss. A tune-up includes checking the seals and weather stripping around your door to ensure it’s properly insulated, helping you save on energy bills by keeping your home better protected from outdoor temperatures.
What Does a Garage Door Tune-Up Include?
At Expert Garage Door Service, we provide a thorough and detailed garage door tune-up that includes the following:
1. Visual Inspection
Our technicians will perform a complete visual inspection of your garage door system, looking for any signs of wear or damage. We check the tracks, springs, cables, rollers, and other components to identify any potential issues.
2. Lubrication of Moving Parts
We apply high-quality lubricants to the moving parts of your garage door, such as the rollers, hinges, and springs. Lubricating these components reduces friction, prevents premature wear, and ensures smoother operation.
3. Spring and Cable Tension Adjustment
Proper spring tension is essential for the safe operation of your garage door. We’ll inspect the springs and cables and make any necessary adjustments to ensure they’re properly tensioned. This helps maintain balanced operation and prevents unnecessary strain on your opener and other components.
4. Track Alignment and Adjustment
Misaligned tracks can cause your garage door to move unevenly or get stuck. We’ll inspect and adjust the tracks to ensure they’re properly aligned, which will keep your door moving smoothly without resistance.
5. Opener Adjustment
Your garage door opener is the heart of the system. During a tune-up, we’ll inspect the opener and adjust its settings to ensure it operates at peak performance. This includes checking the force settings, travel limits, and safety features.
1 -
ADWARE RECOVERY SPECIALIST ARE ALWAYS AVAILABLE TO HELP YOU GET YOUR LOST BITCOIN BACK HIRE THEM NOW
Website info: h t t p s : // adware recovery specialist. expert
WhatsApp info:+12 723 328 343
Two months ago, I found myself deeply involved in what I thought was a promising investment opportunity. I was excited and optimistic about the potential returns. Unfortunately, my enthusiasm quickly turned to despair when I discovered that the investment company I had trusted was nothing more than a sophisticated scam. Initially, everything seemed legitimate. The company was well-organized, their website looked professional, and the brokers were persuasive. I invested a significant amount—AUD 45,000 in Bitcoin—believing it was a wise decision. I was confident that my investment would yield substantial returns. However, things began to unravel when I requested a withdrawal of my profits. At first, everything seemed normal. I filled out the necessary forms and anticipated receiving my returns. Email info: Adware recovery specialist @ auctioneer. net To my dismay, the company started asking for additional fees and commissions before processing my withdrawal. I was skeptical and hesitant but eventually paid the requested amounts, hoping it would resolve the situation. Unfortunately, the demands didn’t stop there. The company continued to come up with new excuses and additional charges, trying to extract even more money from me. Despite my growing frustration, I initially tried to comply, believing it was the only way to recover my investment. However, when they started inventing even more fees and excuses, I decided enough was enough. I refused to pay any more money, standing firm on my decision not to send another dime until I received my initial investment and profits. As time went on, the broker who had initially introduced me to this company stopped responding to my messages. Despite my repeated attempts to reach out, my messages were read but never replied to. It became clear that I had been completely cut off and left in the dark. Desperate for a solution, I began searching for help online. That’s when I came across ADWARE RECOVERY SPECIALIST . I was skeptical at first, having been duped once already, but I needed to try anything to recover my investment. After reaching out to ADWARE RECOVERY SPECIALIST , I was surprised to find them professional and dedicated to their work. They assessed my situation and assured me that they could help. To my amazement, they successfully navigated the complex web of deceit and managed to retrieve my full investment. They transferred the entire amount—AUD 45,000 in Bitcoin—back to my Trust Wallet address. Their expertise and persistence were impressive, and they proved themselves to be the genuine deal in an otherwise sea of fraud. I must admit that I had significant doubts at the beginning, but ADWARE RECOVERY SPECIALIST exceeded my expectations and restored my faith in recovery services. Their success in recovering my funds was not only a financial relief but also a huge emotional boost after such a stressful ordeal. For anyone who finds themselves in a similar predicament—caught up in a fraudulent investment scheme—my strong recommendation is to contact ADWARE RECOVERY SPECIALIST. They have demonstrated their capability and reliability in recovering lost investments. Don’t hesitate to reach out to them for any recovery needs. Their expertise can make a significant difference, as they did in my case. while my experience with the fraudulent investment company was extremely distressing, the intervention by ADWARE RECOVERY SPECIALIST provided a crucial lifeline. Their professionalism and effective recovery solutions were a beacon of hope and helped me reclaim what I had almost lost. If you’re facing similar challenges, seeking their assistance could be the key to recovering your funds and moving forward from the ordeal of financial deception. -
Good day, everyone!
I don't want to terrify anyone, but the rise in internet theft is a growing concern that we cannot ignore. The digital age has brought numerous advantages, but it has also introduced new risks, especially in the realm of online fraud. Recently, a relative of mine fell victim to an investment scam that promised a 100 percent return in just a week. While such promises may sound tempting and almost too good to be true, they are often red flags indicating fraudulent schemes. It’s easy to think that such scams only target those who are naive or greedy, but the reality is that anyone can become a victim of these sophisticated frauds. Scammers use increasingly convincing tactics to lure individuals into their traps, making it crucial for all of us to remain vigilant and informed about potential threats. Fortunately, there is hope even if you've been scammed. The first and most important step is to seek assistance rather than succumbing to fear and despair. Ignoring the situation or feeling embarrassed can prevent you from taking necessary actions that could help you recover your losses. In my relative’s case, after realizing he had been duped, he decided to take action. He completed a thorough investigation and was lucky enough to discover a service called Tech Cyber Force Recovery. Tech Cyber Force Recovery specializes in helping individuals who have been defrauded recover their funds from fraudulent schemes. They have a track record of successfully retrieving money that has been lost to bogus investment companies. It was eye-opening to learn that such services exist and can be effective. The idea that professionals could help recover stolen funds from scammers was something I hadn’t fully appreciated before. The key takeaway here is that there are resources and experts available to assist those affected by online fraud. It’s not just about accepting the loss and moving on; there are actionable steps you can take to potentially recover your funds. Tech Cyber Force Recovery, for example, works by leveraging its expertise and tools to trace and reclaim stolen assets, providing a glimmer of hope to those who have been misled by fraudulent operations. Additionally, it's important to note that filing a complaint with such services does not always require an upfront payment. Many reputable recovery services offer initial consultations or evaluations without demanding payment right away. This allows you to assess the situation and understand your options before committing any resources. If you find yourself in a similar predicament, reaching out for professional help should be your first course of action. In sharing this information, my aim is to empower others with the knowledge that there is support available. Being informed about the existence of Tech Cyber Force recovery and understanding how to approach them can make a significant difference in navigating the aftermath of an online scam. Remember, the best defense against fraud is to be proactive and seek help as soon as possible. It's worth reiterating that awareness and caution are critical. Educate yourself about common scams and warning signs, and always verify the legitimacy of investment opportunities before committing any funds. By staying informed and vigilant, we can better protect ourselves and others from falling victim to these deceptive schemes. while internet theft is a serious issue, it is not an insurmountable one. With the right knowledge and resources, like those provided by Tech Cyber Force Recovery, it’s possible to recover from such losses and prevent future incidents. Share this knowledge with others and encourage them to seek help if needed. Together, we can build a safer online community and safeguard ourselves against the growing threat of internet fraud.
WEBSITE PAGE W.W.W. techcyberforcerecovery.info
WHATSAPP\CALL +15617263697
TELEGRAM PAGE. TECHCYBERFORC -
BTC Recovery Success with CERTIFIED RECOVERY SERVICES: My Experience and Recommendation
As a marine biologist dedicated to rescuing coral reefs, every dollar I saved was destined for the future of the ocean. I had amassed $575,000 in Bitcoin over a period of years to underwrite an ambitious reef restoration program. I needed to expand our coral nursery program, build more artificial reef structures, and fund education in coastal villages. This cryptocurrency savings nest egg was oxygen for marine ecosystems on life support, more than just money. But the sea, as much as I love her, is merciless. On a trip offshore to survey bleaching patterns, I took my hardware wallet along for safety. Break-ins at our field station in the past had made me paranoid about leaving it behind. Tucked in what I thought was a top-notch waterproof case, the device was clipped inside my gear bag. Following a day beneath the water, capturing coral decay and fending off territorial triggerfish, I returned to the boat, exhausted but satisfied. That satisfaction evaporated when I opened the case to find that it was flooded, the alleged waterproof seal having failed. My hardware wallet, the key to my entire $575,000 fund, was waterlogged beyond belief. Saltwater had permeated every seam, corroded buttons, the screen wavering like a distant lighthouse giving up the fight. Panic surged through me, stronger than any riptide. I imagined our nursery growth plunging into the abyss, our educational efforts silenced, and our reef-restoring efforts shut down in their tracks. Despair lingered like a storm cloud until another researcher on our vessel mentioned something about CERTIFIED RECOVERY SERVICES. He'd read about their success with water-damaged gear in a tech newsletter geared to field scientists.
With satellite internet barely functioning, I emailed frantically. They replied promptly and reassuringly. Their engineers, who had experience in rescuing wallets from every possible disaster, collaborated with our boat's sporadic schedule. They guided me through salvaging the device by drying it slowly using silica gel packs (which were fortunately part of our camera gear). Once I returned to land, I overnighted the damp wallet.
What happened next was nothing less than marine magic. The CERTIFIED RECOVERY SERVICES team painstakingly disassembled the corroded machine, navigating around burnt circuits and pulling out the encrypted keys. In twelve nail-biting days, my Bitcoin was fully recovered.
Our coral nursery is now thriving, our artificial reef program is expanding, and our team teaches kids about the value of ocean stewardship. None of this would have been possible without CERTIFIED RECOVERY SERVICES. They didn't just recover crypto; they recovered a future for our reefs, one polyp at a time.
Here's Their Info Below:
WhatsApp: (+1(740)258‑1417 )
1 -
REACH OUT TO A POTENTIAL BITCOIN/USDT/ETH RECOVERY EXPERT- HIRE SPARTAN TECH GROUP RETRIEVAL
As a freelancer and part-time cryptocurrency trader, I had built up over $200,000 worth of Bitcoin in my digital wallet. What began as a casual interest in cryptocurrency quickly turned into a profitable venture, helping me cover tuition and living expenses. However, a seemingly small accident during a family holiday in the Maldives nearly led to a catastrophic financial loss. One afternoon, while soaking in the picturesque beauty of the Maldives, I decided to take a selfie to capture the moment. In my excitement, my phone slipped from my hands and shattered on the pavement below. At first, I was upset about losing my device, but soon, a far more alarming realization hit me. I had also lost access to my Bitcoin wallet. My recovery phrase, the key to restoring my funds, had not been stored in a secure location, leaving me with no way to retrieve my wallet. Panic set in as I considered the possibility of losing years of earnings and investments. Determined to find a solution, I began scouring the internet for any service that could help. That was when I came across SPARTAN TECH GROUP RETRIEVAL. Although skeptical about the chances of success, I had nothing to lose, so I reached out to their team on WhatsApp:+1 (971) 4 8 7 -3 5 3 8, explaining my predicament in detail. To my relief, they responded promptly and professionally, assuring me they had the expertise to attempt a recovery. They explained the process clearly, starting with verifying my identity and wallet ownership. Once those steps were completed, their team immediately got to work. Despite the challenges posed by my shattered device and the missing recovery phrase, SPARTAN TECH GROUP RETRIEVAL team demonstrated exceptional skill and persistence. Within just a few days, they successfully recovered my wallet and restored access to my funds. The relief and gratitude I felt were indescribable. This incident was a wake-up call. Beyond recovering my funds, SPARTAN TECH GROUP RETRIEVAL took the time to educate me on the importance of proper security measures. They stressed the need to store recovery phrases in secure offline locations, use hardware wallets, and implement two-factor authentication to safeguard assets against loss or theft. Thanks to SPARTAN TECH GROUP RETRIEVAL, I was able to avoid a disastrous financial setback. Their professionalism, expertise, and guidance not only saved my investment but also prepared me to navigate the crypto world more securely in the future.
INFO ABOUT THE COMPANY>>>> >>
Email : spartantech (@) c y b e r s e r v i c e s . c o m
Telegram:+1 (581) 2 8 6 - 8 0 9 2
3 -
Dallas Remodeling Group: Expert Flooring Finishes in Irving, TX
At Dallas Remodeling Group, we specialize in providing high-quality flooring installation and remodeling services for homes and businesses in Irving, TX and the surrounding areas. Our team is committed to offering flooring solutions that fit your unique style and needs. One of the key aspects of a beautiful floor is the finish, and we offer a range of finishes to help you achieve the perfect look for your space. Whether you prefer a satin finish, matte finish, glossy finish, semi-gloss finish, or high-gloss finish, we have the perfect solution for you. Let us help you find the right flooring finish to enhance the beauty of your home or business.
Satin Finish: A Balanced Look
A satin finish provides the perfect balance between a glossy shine and a matte appearance. With a soft, velvety look, satin finish floors have a subtle sheen that enhances the natural beauty of the material while hiding fingerprints and dust more effectively than high-gloss finishes. Satin finish flooring is ideal for spaces that see moderate foot traffic, such as living rooms, bedrooms, and hallways. This finish provides a sophisticated yet low-maintenance solution that works well with almost any décor. At Dallas Remodeling Group, we offer satin finishes for hardwood, tile, and engineered wood floors, ensuring a beautiful and functional finish that is easy to maintain.
Matte Finish: A Contemporary, Low-Key Look
For those who prefer a more understated and modern look, the matte finish is an excellent choice. Matte floors have no shine, giving them a sleek, minimalist appearance that suits contemporary and industrial-style interiors. This finish helps hide imperfections, such as scratches and dust, and is often favored in high-traffic areas like kitchens and entryways. Matte finish flooring is also perfect for rustic or natural looks, such as reclaimed wood or stone tiles. At Dallas Remodeling Group, we can install matte finish flooring to create a sophisticated, modern atmosphere in your home or business.
Glossy Finish: A Bright and Shiny Appearance
If you’re looking for a finish that makes a statement, a glossy finish might be just what you need. Glossy floors have a high-shine, reflective surface that catches and amplifies light, making your space feel brighter and more open. This finish works especially well in formal areas like dining rooms or living rooms, as it adds a touch of elegance and luxury. While it requires more maintenance to keep it looking pristine, a glossy finish brings out the beauty of materials like wood, stone, and tile. At Dallas Remodeling Group, we offer professional installation of glossy finishes that will help your floors shine in all the right ways.
Semi-Gloss Finish: The Best of Both Worlds
The semi-gloss finish offers the perfect middle ground between glossy and satin finishes. It provides a subtle shine that enhances the richness of your floors while still being practical and easy to maintain. Semi-gloss floors are durable and more resistant to stains and dirt than matte finishes, making them an ideal choice for high-traffic areas, such as kitchens, bathrooms, and entryways. This finish is especially popular for hardwood floors, as it allows the natural grain to show through while providing a polished, elegant look. With a semi-gloss finish from Dallas Remodeling Group, you can enjoy the beauty of your floors with a functional and low-maintenance solution.
High-Gloss Finish: Unmatched Shine and Elegance
For a truly stunning, high-end appearance, a high-gloss finish provides unmatched shine and elegance. High-gloss floors are highly reflective, giving them a mirror-like appearance that can make even the simplest room look grand. This finish is often used in luxury homes, offices, and showrooms, where aesthetics and style are paramount. High-gloss floors are also incredibly durable and easy to clean, as the glossy surface repels dirt and dust. However, they do require regular maintenance to keep them looking their best. At Dallas Remodeling Group, we offer high-gloss finishes for a range of flooring materials, from wood to tile, ensuring your space has a bold, sophisticated look that catches the eye.
Why Choose Dallas Remodeling Group?
At Dallas Remodeling Group, we understand that the right floor finish can dramatically change the look and feel of your space. Whether you prefer a satin finish, matte finish, glossy finish, semi-gloss finish, or high-gloss finish, our expert team will help you choose the perfect finish that complements your style, needs, and budget. We offer professional installation, ensuring your floors are finished to perfection.2 -
Fire Shield Fire Protection: Premium Service for Fire Extinguishers in Jacksonville, FL
At Fire Shield Fire Protection, we specialize in offering top-tier service for fire extinguishers to ensure your property, employees, and loved ones are always safe from fire hazards. Based in Jacksonville, FL, our mission is to provide comprehensive, reliable fire extinguisher services for residential, commercial, and industrial clients. Whether you need installation, inspection, maintenance, or replacement, we are the team you can trust to keep your fire extinguishers in perfect working condition.
Why Fire Extinguisher Service is Essential
Fire extinguishers are one of the most important tools for protecting people and property in the event of a fire. However, to be effective, fire extinguishers must be maintained regularly. This is where Fire Shield Fire Protection steps in. Our expert team offers a full range of service for fire extinguishers to make sure your fire safety equipment is reliable, compliant with local laws, and ready for use when you need it the most. Here’s why proper fire extinguisher service is essential:
Maintaining Compliance with Fire Safety Regulations
Local fire codes, including those in Jacksonville, FL, require that fire extinguishers are inspected and maintained regularly. Fire Shield Fire Protection ensures that your fire extinguishers meet all necessary regulations, helping you avoid fines and ensuring the safety of your building, tenants, and employees.
Ensuring Fire Extinguishers Are Fully Functional
A fire extinguisher that isn’t properly maintained may fail to work when needed most. Regular service helps ensure that your fire extinguishers are fully charged, in good condition, and accessible at all times.
Minimizing Fire Damage
If a fire occurs and your fire extinguisher isn’t functioning properly, it can lead to greater property damage and put lives at risk. Routine fire extinguisher service reduces the likelihood of this scenario, giving you the confidence that your equipment is prepared to act when required.
Our Comprehensive Fire Extinguisher Service
Fire Shield Fire Protection offers a full spectrum of fire extinguisher services to meet the needs of both businesses and homeowners. Whether you need installation, inspections, or repairs, we are here to help:
Installation
Choosing the right fire extinguishers for your property is crucial. Our team will help you determine the appropriate type and number of fire extinguishers based on your specific needs, whether for a residential home, office, or industrial facility. We offer professional installation, ensuring that your fire extinguishers are placed in optimal locations and comply with fire safety codes.
Inspection and Maintenance
Regular inspections are key to maintaining the functionality of fire extinguishers. Our expert technicians perform thorough inspections to check for any damage, leaks, or low pressure. We also verify that the equipment is accessible and in compliance with local fire safety regulations. We’ll handle any necessary maintenance, such as recharging or refilling, to keep your fire extinguishers in top condition.
Recharge Services
If your fire extinguisher has been discharged or is losing pressure, we provide quick and efficient recharge services. This ensures your equipment is ready for use at a moment’s notice. We handle all the technical aspects of recharging fire extinguishers, ensuring they’re fully operational.
Replacement
If your fire extinguisher is outdated or no longer functional, we offer timely replacement services. Our team will assess the condition of your fire extinguishers and replace any that are damaged or past their expiration date with high-quality, new units.
Why Choose Fire Shield Fire Protection for Your Fire Extinguisher Service?
Experienced Technicians: Our team consists of certified, experienced professionals who are dedicated to providing the best service for fire extinguishers. We stay up-to-date on the latest fire safety regulations and techniques to ensure you get the highest level of service.
Affordable and Transparent Pricing: We believe in offering our clients excellent service at an affordable price. Our pricing is clear and competitive, with no hidden fees, so you can be sure you’re getting great value for your investment.
Personalized Service: Every property is different, and so are its fire protection needs. We provide tailored recommendations and solutions based on your specific requirements, ensuring that your fire safety plan is effective and meets all local regulations.
Reliability and Availability: Whether you need an emergency service or routine maintenance, we’re here for you. Our team is always ready to provide prompt and reliable fire extinguisher service in Jacksonville, FL, so you can have peace of mind knowing your property is protected.
Contact Fire Shield Fire Protection Today5 -
Pure Pressure Wash Co LLC: Professional Gutter Cleaning Services in Thousand Oaks, CA
At Pure Pressure Wash Co LLC, we understand the importance of maintaining the health and integrity of your home or business, and one key aspect of property maintenance that’s often overlooked is gutter cleaning. Gutters are designed to protect your property by channeling rainwater away from your roof, walls, and foundation, but over time, they can become clogged with leaves, twigs, dirt, and other debris. When this happens, your gutters can no longer do their job effectively, leading to potential damage to your roof, walls, and even your foundation. That's where we come in.
Serving Thousand Oaks, California, and the surrounding areas, Pure Pressure Wash Co LLC offers professional gutter cleaning services to keep your property safe and protected. Our team uses the latest tools and techniques to ensure your gutters are clear, functioning properly, and free of debris, so you can avoid costly repairs down the road.
Why Gutter Cleaning is Essential
Your gutters play a critical role in maintaining the structural integrity of your property. When they are clogged or damaged, it can lead to a number of issues, including:
Water Damage to the Roof
When gutters are clogged, water can back up onto your roof. Over time, this can cause roof leaks, rotting shingles, and mold growth, which can compromise the entire roofing structure. Regular gutter cleaning prevents water from accumulating on your roof and causing expensive damage.
Foundation Problems
Gutters that are full of debris can cause rainwater to spill over the edges and pool around the foundation of your home. This excess water can seep into the ground, leading to soil erosion and cracks in your foundation, which can be costly to repair.
Landscape Damage
Overflowing gutters can also damage your landscaping by directing water to areas where it shouldn’t be. Erosion, over-watering, and soil displacement can harm your plants, garden beds, and lawn.
Mold and Mildew Growth
When water is trapped in clogged gutters, it can create a perfect breeding ground for mold and mildew. Over time, this can spread to other parts of your home, causing health issues and further property damage.
Pest Infestations
Clogged gutters are also a haven for pests, including mosquitoes, ants, rodents, and even birds. Standing water in gutters provides a place for mosquitoes to breed, while leaves and debris attract rodents looking for shelter. Gutter cleaning ensures that these unwanted guests don’t make your gutters their home.
Why Choose Pure Pressure Wash Co LLC for Gutter Cleaning?
At Pure Pressure Wash Co LLC, we pride ourselves on providing top-notch gutter cleaning services that ensure your property stays in great shape year-round. Here’s why homeowners and businesses in Thousand Oaks trust us for all their gutter cleaning needs:
Experienced Technicians: Our team of professionals is highly trained in gutter cleaning, ensuring that we remove debris thoroughly and safely. We use the best tools and techniques to get the job done right the first time, whether your gutters are hard to reach or heavily clogged.
Thorough Inspection: We don’t just clean your gutters—we also inspect them for any damage, such as cracks, leaks, or loose hangers. If we find any issues, we’ll notify you so you can address them before they become bigger problems.
Safe and Efficient: Gutter cleaning can be dangerous, especially if your gutters are high up or hard to access. Our team is equipped with the proper safety gear and tools to safely clean your gutters, ensuring a job well done without risking injury.
Eco-Friendly Practices: We’re committed to protecting the environment, which is why we use eco-friendly cleaning products and methods. We also dispose of debris in a responsible manner, ensuring that nothing goes to waste.
Affordable Pricing: We believe that gutter cleaning should be affordable, and we offer competitive, transparent pricing with no hidden fees. You’ll receive a free estimate before we start the job, so you know exactly what to expect.
Comprehensive Services: In addition to gutter cleaning, we also offer gutter maintenance and repair services. If your gutters need minor repairs or adjustments, we can handle it while we’re on-site, ensuring that your gutters function optimally year-round.
Our Gutter Cleaning Process
We follow a systematic approach to ensure that your gutters are thoroughly cleaned and working efficiently. Here’s what you can expect when you hire Pure Pressure Wash Co LLC for gutter cleaning:
Initial Inspection
We start by inspecting your gutters to assess the level of cleaning required. We check for blockages, damage, and potential problem areas, ensuring that we address any issues as part of the service.
5 -
Choosing the Right Sports Netting for Your Facility
When it comes to protecting your sports facility and ensuring the safety of players, spectators, and property, choosing the right sports netting is essential. Whether you're outfitting a baseball field, tennis court, or any other sports arena, selecting durable and high-quality netting is a crucial step. In this blog, we'll guide you through important considerations for sports netting installation and help you understand how to choose a reliable net manufacturer.
1. Why Sports Netting is Essential
Sports netting plays a vital role in preventing balls from flying out of the field and causing damage or injury. It acts as a protective barrier that keeps the game safe, while also maintaining a clear boundary around the playing area. Additionally, sports netting can enhance the aesthetics of your facility by providing a sleek and professional look.
2. Key Considerations for Sports Netting Installation Material Quality
The material of your sports netting is one of the most important factors to consider. Durable, high-quality materials like polyethylene or nylon are often preferred for their weather-resistant properties and long-lasting performance. Choosing netting made from the right material ensures that your facility’s netting will hold up to the wear and tear of both usage and environmental factors.
Netting Size and Shape
The size and shape of the netting should align with the specific needs of your facility. For example, if you need sports netting installation on a baseball diamond, the netting must be tall enough to catch foul balls. If you're installing netting around a soccer field, you might need lower-profile netting that still provides effective boundary control.
Customization Options
A good net manufacturer will offer customization options to ensure that the netting fits perfectly with the specific layout of your facility. From color choices to net size, custom netting can give your space a tailored look and function effectively for the type of sport being played.
3. Choosing the Right Net Manufacturer
Selecting the right net manufacturer is key to ensuring that you get high-quality sports netting that meets your needs. A reputable manufacturer will offer products made from the most durable materials and provide professional installation services. Look for a manufacturer with a proven track record in the sports industry, as they will be familiar with the specific requirements for different types of sports facilities.
4. Benefits of Proper Installation
Proper sports netting installation ensures the longevity of your nets and maximizes their effectiveness. Professional installation helps avoid issues such as sagging, misalignment, or inadequate support, which could undermine the protective purpose of the netting.
5. Quick Tips for Sports Netting InstallationChoose a manufacturer with industry experience.Ensure the material is weather-resistant.Opt for custom sizes and shapes tailored to your facility.Have nets professionally installed for optimal results.6. Google My Business and Reviews
If you're looking for the best net manufacturer, Google My Business (GMB) is a great resource. It provides direct access to a company’s contact details, reviews, and past projects. By reading customer reviews and checking their GMB profile, you can gain valuable insights into their service quality and reliability before making your choice.
7. Contact Us
If you're ready to install sports netting at your facility, contact Nets Depot Inc. today! Our team is here to help you choose the perfect netting solution for your needs and provide expert installation. Reach out to us now to get started!
By following these tips and carefully considering your options, you can ensure that your sports facility is protected and looks great with quality sports netting installation from a trusted net manufacturer.
3 -
Reliable Water Heater Service by Pipe Doctor Home Services, Inc. in Woodmere, NY
A functional water heater is essential for the comfort and convenience of your home. Whether you need a hot shower, clean dishes, or warm water for laundry, a well-maintained water heater plays a crucial role in your daily routine. At Pipe Doctor Home Services, Inc., we specialize in comprehensive water heater services in Woodmere, NY, and surrounding areas. From repairs to installations and regular maintenance, our expert technicians ensure that your water heater operates efficiently and reliably year-round.
Why Water Heater Service is Important
Your water heater is one of the most important appliances in your home, and like any major system, it requires regular care to perform at its best. Here are some key reasons why water heater service is essential:
Improved Efficiency
A well-maintained water heater works more efficiently, using less energy to heat water. This can lead to lower utility bills, as your system won’t have to work as hard to produce hot water.
Increased Lifespan
Routine maintenance helps extend the life of your water heater. By preventing issues before they become significant problems, you can avoid costly replacements and keep your water heater in good working condition for years.
Safety Assurance
Regular inspections and maintenance help ensure your water heater operates safely. Faulty water heaters can pose risks, such as gas leaks or dangerous buildup of sediment, which can lead to malfunction or even cause fires.
Consistent Hot Water
A properly serviced water heater provides a steady supply of hot water when you need it most. Whether it’s for a warm shower or filling up a bath, you can count on your water heater to perform efficiently.
Common Signs Your Water Heater Needs Service
If you notice any of the following issues with your water heater, it may be time to call Pipe Doctor Home Services, Inc. for professional service:
Inconsistent or No Hot Water
If your water heater is producing inconsistent hot water or no hot water at all, there could be an issue with the heating element, thermostat, or sediment buildup inside the tank.
Strange Noises
Sediment buildup in the bottom of the tank can cause popping, banging, or rumbling noises as it heats. These noises are a sign that your water heater needs to be flushed and maintained.
Water Temperature Problems
If your water heater is producing water that’s too hot or not hot enough, it could be a sign that the thermostat is malfunctioning or that there’s an issue with the heating element.
Water Discoloration
If the hot water coming from your faucets is brown or rusty, this could indicate that your water heater’s tank is corroding, and the unit may need repairs or replacement.
Leaks Around the Unit
Any water pooling around your water heater is a cause for concern. Leaks could indicate a damaged tank or faulty connections that need immediate attention.
Increased Energy Bills
If your energy bills have spiked unexpectedly, your water heater may be working harder than necessary. This could be due to inefficiencies in the system that require professional attention.
Our Comprehensive Water Heater Services
At Pipe Doctor Home Services, Inc., we provide a full range of water heater services to meet the needs of homeowners in Woodmere, NY, and nearby communities. Here’s how we can help:
1. Water Heater Installation
If you’re in need of a new water heater, we offer expert installation services for a variety of systems, including:
Tankless Water Heaters
These energy-efficient units provide on-demand hot water without the need for a large storage tank. Our experts can help you choose the right size and model for your home.
Traditional Tank Water Heaters
Whether you need a replacement for an old unit or are upgrading to a more energy-efficient model, we provide reliable installation services for traditional storage tank water heaters.
Hybrid Water Heaters
Combining the benefits of a traditional tank with heat pump technology, hybrid water heaters are highly energy-efficient and ideal for households with higher hot water demand.
2. Water Heater Repairs
If your current water heater isn’t working properly, our skilled technicians can perform thorough diagnostics and provide efficient repairs. We can fix a variety of issues, including:
Faulty thermostats
Broken heating elements
Sediment buildup
Leaks and corrosion
Gas and electrical issues
Our team is trained to repair all types of water heaters, including gas, electric, and hybrid models. We use only high-quality parts to ensure long-lasting repairs.
6 -
I've built a number of apis consumed by internal devs. Then there's one which I consumed in a mobile client–smoothest experience ever. I dogfed myself and empathised with any blind spot or skirmish that would have arisen if there was an external body
The ones consumed by others always end in tears and loggerheads. There was one with this girl who called me names and turned my relationship sour with the guys who contracted me. Our Altercation culminated in her hooking me, going as far as deleting personal media shared. That was my darkest hour supporting an api. Well, it started with her grumpy over broken endpoints, which I maintain were not that many
I wasn't an amateur dev at the time: I used conventions mastered post-suphle. Code was backed by automated tests and well documented. Now that I think of it, our earliest, innocuous argument was brought about by her incompetence. She didn't know some rudimentary stuff like how to build payloads or format to send to an api. Funny enough, the lead who contracted us both strongly vouched for her cuz they once worked together. He claimed she was no noob so I must be the faulty one
I'm about to release another api now. I've had all the time in the world to build it to production standard. Over 200 tests, all passing. In my head, I'm thinking, what could go wrong? Stakeholder introduced a feature breaking fundamental functionality. I refactored, implemented, connected tons of apis stubbed out in tests. Painstakingly began to fix broken tests to both fit integrated api behaviour and ensure system integrity is intact. Shit, software engineering is arduous. This is best case scenario unlike front end web or mobile where there is an unfixable bug or a ui requirement stumping you for literal days
Anyway atp I believe I've done my homework. The only thing that would likely do me in are those damned apis I rely on. One malformed response or missing key is enough to undo my meticulous efforts. I strongly hope not to have a huge fallout with the front end dev and the numerous third party consumers we're expecting
As an aside, On a different project entirely piggybacking off external apis, I'm supposed to write tests to verify their status. I wonder whether this is tenable or a waste of effort. But on paper, it's more reliable than building a postman collection and sending them from there -
Shepler & Associates: Your Premier Tax Company for Reliable Tax Prep Services
Tax season doesn’t have to be stressful when you have the right partner by your side. At Shepler & Associates, we pride ourselves on being a trusted tax company offering exceptional tax prep services to individuals and businesses in Saginaw and beyond. Conveniently located at 4200 Fashion Square Blvd Suite 201, Saginaw, MI 48603, we are dedicated to simplifying the tax process and delivering outstanding results.
Expert Tax Prep Services You Can Rely On
At Shepler & Associates, we understand that every tax situation is unique. That’s why we provide tailored tax prep services designed to meet your specific needs. Our comprehensive offerings include:
Individual Tax Preparation
Filing personal taxes can be daunting, but our experienced team ensures that every detail is handled with precision. We aim to maximize your refund and minimize any potential liabilities.
Business Tax Services
Managing business taxes requires expertise and careful attention to detail. Whether you’re a sole proprietor or a corporation, we provide reliable solutions to keep your business compliant and thriving.
Tax Planning and Advisory
Effective tax planning is the key to long-term financial success. We help you strategize for the future, offering insights that reduce your tax burden and support your goals.
Why Shepler & Associates is the Tax Company You Can Trust
Experienced Professionals
With years of experience in tax preparation and consulting, we have the knowledge and skills to handle even the most complex tax situations.
Personalized Attention
We believe in building strong relationships with our clients. Our team takes the time to understand your needs and provide solutions that work for you.
Convenient Location
Searching for a tax company near you? Look no further! Our office at 4200 Fashion Square Blvd Suite 201, Saginaw, MI 48603, is easily accessible and ready to serve you.
Outstanding Customer Service
At Shepler & Associates, your satisfaction is our top priority. Have questions or concerns? Call us anytime at +1 989-798-0609, and our friendly team will be happy to assist.
Make Tax Season Stress-Free
Don’t let tax season overwhelm you. With Shepler & Associates, you get the expertise and support you need for a hassle-free experience. Our tax prep services are designed to save you time, reduce stress, and ensure every detail is handled with care.
Visit us today at 4200 Fashion Square Blvd Suite 201, Saginaw, MI 48603, or call +1 989-798-0609 to schedule your appointment. Let Shepler & Associates show you why we’re the preferred tax company for individuals and businesses in the Saginaw area.
8 -
Get a certified ETH Recovery Expert and lead Of Stolen Funds With LEE ULTIMATE HACKER
Last month, I encountered a frightening situation when the full amount of SUI I had stored in my Exodus wallet was suddenly sent to an unknown address. I hadn’t authorized any transactions, nor had I shared my private keys or seed phrases with anyone, so the entire event left me bewildered and anxious. The funds had simply disappeared, and I couldn’t figure out how or why this had happened. In an attempt to recover my funds, I reached out to several support services, starting with Exodus. I was hoping they might be able to track the transaction or shed some light on what went wrong. Unfortunately, their response was not helpful. They explained that they couldn’t trace blockchain transactions directly, and suggested that my private key might have been compromised, though I had no idea how that could have happened. Feeling frustrated, I decided to continue my search for assistance and stumbled upon LEEULTIMATEHACKER @ A O L . C O M
telegram: L E E U L T I M A T E https: / / l e e u l t i m a t e h a c k e r . c o m
. Initially, I was doubtful about their ability to help, but after reading positive reviews, I decided to give it a try. Their website explained that they specialize in tracing lost or stolen cryptocurrency and offered recovery services for cases like mine. I submitted a request with all the relevant details, including the unauthorized transaction and the address to which my SUI assets had been sent. To my surprise, the response from their team came quickly. They assured me that they could investigate the destination address and begin tracking it. Over the following days, they kept me updated on their progress and worked diligently to trace the flow of funds. They were able to identify the wallet associated with the destination address and gathered enough information to take further action. Thanks to their efforts, my funds were ultimately recovered. The team successfully reversed the unauthorized transaction, and I was provided with security recommendations to protect my wallet moving forward. The relief I felt upon recovering my SUI was immense, and I couldn’t have done it without the help of Lee Ultimate Hacker. This incident taught me valuable lessons about the importance of safeguarding my crypto assets and being cautious with digital wallets. I'm extremely grateful for the support I received, as without Lee Ultimate Hacker, I would likely have lost my funds for good.2 -
CRYPTO SCAM RECOVERY & PROFESSIONAL HACKING SERVICES ‖ VISIT DIGITAL HACK RECOVERY
After losing £150,000 in Bitcoin to a scam, I found myself in the role of a treasure hunter, but without a map to guide me through the overwhelming landscape of online deceit. What had begun as an exciting venture into cryptocurrency quickly turned into a disheartening saga of loss and betrayal. The thrill of potential profit had turned into a nightmare, leaving me grappling with feelings of vulnerability and regret.In my search for a way to reclaim my lost assets, I discovered Digital Hack Recovery, a team renowned for their expertise in navigating the complexities of online fraud. Though I was initially skeptical, my desperation pushed me to reach out. During our first conversation, I felt a wave of relief; they not only listened to my story but also approached it with genuine compassion and professionalism. They reassured me that I wasn’t alone in this battle and that recovery was possible.As I engaged with Digital Hack Recovery, I began to grasp the nuances of cryptocurrency scams that had previously eluded me. Their knowledgeable team provided insights into recognizing warning signs and understanding the tactics used by fraudsters. This newfound understanding was empowering and helped shift my perspective from feeling defeated to feeling proactive.The road to recovery was fraught with challenges, requiring careful attention and a strategic mindset. Digital Hack Recovery worked diligently, employing sophisticated methods to trace the digital trails left by the scammers. Throughout the process, they maintained transparent communication, ensuring I was informed about every development, no matter how small.Weeks transformed into months, yet with each step forward, hope grew stronger. Each breakthrough—whether it was tracking a transaction or identifying a key player in the scam—felt like unearthing hidden treasure. Finally, after an intense and thorough effort, I received the news I had longed for: a substantial portion of my stolen funds had been successfully recovered.Regaining access to my wealth was more than just a financial relief; it marked a significant restoration of my peace of mind. I emerged from this ordeal not only with my assets back but also with invaluable lessons about vigilance and the importance of seeking help. With the support of Digital Hack Recovery, I transformed from a victim of fraud into an informed advocate for safe investment practices. My journey was not solely about reclaiming lost wealth but also about rediscovering my confidence and trust in the digital landscape. For any kind of crypto recovery service contact Digital Hack Recovery via⁚
Email; digital hack recovery @ techie . com
Website; https : // digital hack recovery . com
WhatsApp +19152151930
-
ALPHA KEY, A LICENSED CRYPTO RECOVERY HACKER, IS A GREAT REFERENCE
After helping me recover over $45,800 worth of bitcoin from some Russian scammers I invested with online, ALPHA KEY has been a blessing to me for the past few days. It has made me smile and helped me realize that there are still honest and trustworthy people in the world. I would like to express my gratitude to ALPHA KEY RECOVERY for giving me life again after such a foolish act of becoming a victim of scam. I kindly recommend ALPHA KEY RECOVERY for any kind of cryptocurrency recovery.
Contact details:
Telegram: Alpha Key Recovery
Signal at +16145683873
WhatsApp: +15714122170
4 -
Varun Marbles-Kalinga Stone Dealer: Your Premier Stone Showroom for Black Granite Flooring in Gurgaon, Delhi, and Gurugram
When it comes to choosing the perfect materials for your flooring, countertops, or other surfaces, quality and durability are key factors. Varun Marbles-Kalinga Stone Dealer is your trusted stone supplier, offering a wide variety of high-quality materials such as black granite for flooring, Indian marble, Italian marble, quartz, and Varmora tiles in Gurgaon, Delhi, and Gurugram. Our showroom, located at Metro Pillar Number 6, Mehrauli-Gurgaon Rd, Arjan Garh, Haryana, showcases an extensive selection of stones that cater to both residential and commercial projects.
Why Choose Black Granite for Flooring?
Black granite is a luxurious and versatile option that can instantly enhance the look of any space. Its deep, rich color and sleek finish make it a popular choice for modern interiors and elegant exteriors. Here's why black granite for flooring is a great choice for your home or business:
Timeless Elegance: Black granite has a sophisticated, classic appeal that can complement any style of décor, from modern to traditional. Its deep color brings a touch of luxury to your floors, whether you're designing a high-end kitchen, living room, or office space.
Durability: Black granite is one of the hardest natural stones, making it extremely durable and resistant to wear and tear. It can withstand heavy foot traffic, making it ideal for high-traffic areas such as hallways, kitchens, and commercial spaces.
Low Maintenance: One of the standout features of black granite for flooring is its low maintenance requirements. It is resistant to stains, moisture, and scratches, making it easy to keep clean with minimal effort.
Heat and Scratch Resistance: Black granite is highly resistant to heat, which makes it a fantastic choice for kitchens and other spaces where hot items may come into contact with the floor. It also resists scratches, ensuring that your flooring maintains its pristine appearance over time.
Versatility: Whether you are designing a contemporary or traditional space, black granite flooring can complement a wide range of color schemes and design styles. The deep, polished finish of black granite creates a striking contrast with lighter walls and furnishings, adding depth and richness to any room.
Visit Our Stone Showroom Near Me
If you're searching for a stone showroom near me, look no further than Varun Marbles-Kalinga Stone Dealer. We offer an impressive selection of stones, including black granite, Indian marble, Italian marble, quartz, and Varmora tiles. Our showroom is conveniently located at Metro Pillar Number 6, Mehrauli-Gurgaon Rd, Arjan Garh, Haryana, serving customers throughout Gurgaon, Delhi, and Gurugram.
Why visit our showroom?
Wide Range of Stone Options: At Varun Marbles-Kalinga Stone Dealer, we pride ourselves on offering a wide variety of premium stones. Whether you need black granite for flooring, Indian marble, Italian marble, or quartz, we have something to suit every style and budget.
Expert Guidance: Our team of stone experts is here to help you choose the perfect material for your project. We offer professional advice on selecting the right stone, understanding the pros and cons of each type, and providing recommendations based on your specific needs.
Quality Products: We source our stones from reputable quarries, ensuring that you receive only the highest-quality products for your flooring, countertops, or other surfaces. Our stones are carefully inspected for quality and consistency.
Customization: Whether you're interested in custom cuts, finishes, or edge profiles, we can tailor our stones to suit your project. Our team will work closely with you to ensure that your black granite flooring or other stone surfaces are customized to your exact specifications.
Competitive Pricing: At Varun Marbles-Kalinga Stone Dealer, we offer competitive pricing on all our stone products. We believe that high-quality stones should be accessible to all, and we ensure that you get great value for your investment.
Benefits of Choosing Varun Marbles-Kalinga Stone Dealer
When it comes to purchasing black granite for flooring or any other stone products, Varun Marbles-Kalinga Stone Dealer is the go-to destination for homeowners, contractors, and designers in Gurgaon, Delhi, and Gurugram. Here are a few reasons why you should choose us:
High-Quality Stones: We specialize in a variety of stone materials, including black granite, Indian marble, Italian marble, quartz, and Varmora tiles. Our stones are sourced from trusted quarries and are guaranteed to meet the highest standards of quality and durability.
1 -
About Me
As a dedicated and skilled Security Analyst in the Cyber Wing, I bring a wealth of expertise in identifying, assessing, and mitigating cyber threats to protect organizational assets and sensitive information. My background is grounded in a robust understanding of cybersecurity principles, which I apply daily to safeguard against evolving digital threats.
Professional Background
With a strong foundation in cybersecurity, I have honed my skills in threat analysis, risk assessment, and incident response. My role involves continuous monitoring of network traffic, identifying vulnerabilities, and implementing security measures to prevent data breaches. I am proficient in using advanced cybersecurity tools and technologies to analyze threat intelligence and develop strategies to defend against cyber-attacks.
Key Competencies
Threat Analysis: Expert in identifying and analyzing potential threats to cybersecurity, including malware, phishing attacks, and network intrusions.
Risk Assessment: Skilled in evaluating the security posture of systems and networks, identifying vulnerabilities, and recommending corrective actions.
Incident Response: Experienced in managing and responding to security incidents, ensuring quick resolution and minimizing impact on operations.
Security Protocols: Knowledgeable in implementing and maintaining security protocols and policies to ensure compliance with industry standards and regulations.
Achievements
Successfully mitigated multiple cyber threats, reducing potential impact on organizational operations.
Developed and implemented security policies that enhanced the overall security posture of the organization.
Conducted comprehensive security assessments that led to significant improvements in network security and data protection.
Professional Goals
My goal as a Security Analyst is to continue advancing my expertise in cybersecurity, staying abreast of the latest trends and technologies to effectively combat emerging threats. I am committed to contributing to a safer digital environment and ensuring the highest level of security for the organization.
Personal Attributes
I am a proactive and detail-oriented professional, known for my analytical thinking and problem-solving abilities. I thrive in dynamic environments and am passionate about leveraging my skills to protect against cyber threats.
Contact elctrohacker DOT COM
Feel free to reach out to me for any inquiries or to discuss how I can contribute to enhancing your organization's cybersecurity posture. -
Greene Horizons: Empowering Change Through Motivation and Motivational Interviewing
At Greene Horizons, located at 320 Raritan Ave #202b, Highland Park, NJ, we are committed to helping individuals overcome obstacles and achieve their goals through the power of motivation and motivational interviewing. Whether you're dealing with personal challenges, striving for positive change, or seeking support in your journey toward a healthier life, we provide the guidance and tools to help you unlock your potential.
The Role of Motivation in Personal Growth
Motivation is the driving force that fuels change and helps us pursue our goals. Whether it's overcoming personal barriers, achieving better mental health, or making positive lifestyle changes, motivation is key to success. At Greene Horizons, we believe that everyone has the ability to make meaningful changes in their life. Our goal is to help you tap into your inner drive and find the motivation to create lasting transformations.
Whether you're dealing with procrastination, a lack of confidence, or difficulty following through with goals, we offer the support and encouragement you need to stay motivated. Our therapists work closely with you to identify what drives you and help you harness that energy to make sustainable, positive changes in your life. Motivation is not only about setting goals but also about understanding the emotional and psychological factors that influence your ability to achieve them.
Motivational Interviewing: A Collaborative Approach to Change
Motivational interviewing is a client-centered, evidence-based therapeutic approach that focuses on helping individuals find the motivation to make positive changes. Rather than being confrontational or directive, motivational interviewing encourages self-reflection and enhances an individual’s intrinsic motivation to change.
At Greene Horizons, we use motivational interviewing to help clients explore their ambivalence toward change, resolve internal conflicts, and ultimately commit to their goals. This approach is especially effective for individuals dealing with addictions, mental health challenges, and those who may feel stuck or uncertain about making changes in their lives.
The key principles of motivational interviewing include:
Expressing empathy: We listen without judgment, acknowledging the challenges you face.
Developing discrepancy: We help you see the difference between where you are and where you want to be, increasing awareness of the need for change.
Rolling with resistance: Instead of confronting resistance, we work with it, helping you explore any fears or doubts about change.
Supporting self-efficacy: We empower you to believe in your ability to succeed and make positive changes in your life.
Our skilled therapists are trained in motivational interviewing and can guide you through this powerful process to help you find clarity, build motivation, and take actionable steps toward your goals.
Why Choose Greene Horizons for Motivation and Motivational Interviewing in NJ?
At Greene Horizons, we are passionate about helping individuals tap into their full potential. Whether you're facing challenges in your personal life, career, or mental health, our team of experienced therapists is here to provide the support you need to stay motivated and achieve your desired outcomes.
We understand that every individual’s journey is unique, which is why we offer personalized care tailored to your specific needs. Our approach is compassionate, client-centered, and grounded in evidence-based practices, such as motivational interviewing, to help you achieve long-term success.
Take the First Step Toward Change Today
If you're ready to unlock your potential, find your motivation, and make lasting changes in your life, Greene Horizons is here to help. Our motivational interviewing services are designed to empower you to make decisions that align with your values and goals, and to move forward with confidence and clarity.
Contact us today at +16408889665 to schedule an appointment or learn more about how we can support you in your journey toward a brighter future. Our office is located at 320 Raritan Ave #202b, Highland Park, NJ 08904, and we are here to help you achieve the positive change you’ve been seeking.1 -
RECOVER YOUR STOLEN USDT AND ETH WITH SPARTAN TECH GROUP RETRIEVAL FOR INSTANT RECOVERY
Exceptional Support and Guidance from Spartan Tech Group Retrieval: A Lifesaver in Cryptocurrency Trouble . I recently had a complex issue while transferring my cryptocurrency through the Ethereum network to my Trust Wallet, which defaulted to the BNB Smart Chain. Due to the new beta version of Trust Wallet, called the "Swift Wallet," there was no option for the Ethereum network, causing my crypto to become effectively frozen. I could only see the transaction on Ether scan, but without a way to access my funds.Unfortunately, I was informed that it might take months, or even years, for Trust Wallet to integrate Ethereum support into this beta version, leaving me in limbo. To make matters worse, the Swift Wallet does not use a traditional private key; instead, it relies on my device as the key. This means that if my device were lost or damaged, I would permanently lose access to my funds, as Trust Wallet does not provide a backup key. After struggling with this issue, I reached out to Spartan Tech Group Retrieval on WhatsApp:+1 (971) 4 8 7 - 3 5 3 8 . They were incredibly helpful and dedicated to explaining the intricacies of my situation. They kept their promise of no upfront fees and only asked me to write a review in return for their assistance. Their transparency and professionalism were evident throughout the process. Spartan Tech Group Retrieval provided not only insights into my immediate issue but also offered valuable advice on alternative exchanges, wallets, and cold storage options. They were attentive to my safety, ensuring that my sensitive information and passwords were never exposed. Their straightforward approach made the process feel trustworthy, which is crucial in the often-confusing world of cryptocurrency. I can recommend Spartan Tech Group Retrieval highly enough. Their commitment to helping me navigate this challenging situation without any financial burden was remarkable. I will definitely return to them for any future needs and will refer anyone facing similar issues to their services. Thank you, Spartan Tech Group Retrieval, for your exceptional support and guidance! other contact info like Telegram:+1 (581) 2 8 6 - 8 0 9 2
OR Email: spartantechretrieval (@) g r o u p m a i l .c o m to reach out to them -
Saclux Comptech Specialist appears to be a legitimate cryptocurrency recovery service. Here are some key points about their self-recommendations:
Expertise
1. Specialized knowledge: They claim to have extensive experience in cryptocurrency recovery, blockchain analysis, and crypto tracing.
2. Technical expertise: Their team allegedly consists of skilled technicians and experts in cryptocurrency recovery.
Services
1. Recovery services: Saclux Comptech Specialist offers recovery services for lost, stolen, or inaccessible cryptocurrencies.
2. Blockchain analysis: They provide in-depth blockchain analysis to track down stolen funds.
3. Crypto tracing: Their team uses advanced tools and techniques to trace and recover cryptocurrencies.
Benefits
1. High success rate: Saclux Comptech Specialist claims to have a high success rate in recovering lost or stolen cryptocurrencies.
2. Fast and efficient: They allegedly provide fast and efficient recovery services.
3. Confidentiality: Their team prioritizes confidentiality and ensures that client information remains secure.
Recommendations
1. Positive reviews: Saclux Comptech Specialist has received positive reviews from clients who have used their recovery services.
2. Expert endorsements: Some cryptocurrency experts recommend Saclux Comptech Specialist for their recovery services.
Please note that while Saclux Comptech Specialist appears to be a legitimate service, it's essential to check their website very well so that you will not fall into any scam.1 -
HIRE Century Web Recovery TO RECOVER YOUR LOST BITCOIN
If you’ve lost your Bitcoin to an online scam, hiring a professional recovery service can significantly improve your chances of getting your funds back. Century Web Recovery specializes in Bitcoin recovery, helping victims reclaim their stolen assets. Here’s what you need to know:
Understanding the Recovery Process
The recovery process begins with contacting Century Web Recovery. Their team will guide you through the steps necessary to initiate an investigation into your case. Understanding the process is key to managing your expectations.
Documenting Your Case
To facilitate recovery, it’s essential to document all relevant information regarding the scam. This includes transaction records, wallet addresses, and any communications with the scammer. Century Web Recovery will help you gather this information to build a strong case.
Investigation and Tracking
Once you hire Century Web Recovery, their experts will begin investigating your case. They use sophisticated tools to track the stolen Bitcoin, identifying the paths taken by the scammers. This tracing is crucial for successful recovery.
Freezing Stolen Assets
Quick action is vital in recovering stolen Bitcoin.Century Web Recovery works directly with cryptocurrency exchanges to freeze any stolen assets, preventing the scammers from cashing out your funds. This collaboration is essential for a successful recovery.
Legal Support and Guidance
If necessary, Century Web Recovery can provide legal support. They will guide you on reporting the scam to law enforcement and assist in filing any legal claims. Their expertise in crypto-related cases ensures you receive the best advice on how to proceed.
If you’ve lost Bitcoin to an online scam, don’t hesitate. Hire Century Web Recovery to recover your lost assets and regain your financial security.
Website. centuryweb.online2 -
ABC Locksmith: Your Trusted "Pop a Lock" Service in Winter Haven, FL
If you find yourself locked out of your car, home, or office, the first thing that comes to mind might be the phrase, “pop a lock.” While this term is often used casually, it refers to the expert services that a professional locksmith, like ABC Locksmith, can provide. Whether you're dealing with a lockout situation or need help accessing a property quickly, ABC Locksmith is here to offer quick, reliable, and safe lock opening services in Winter Haven, FL, and surrounding areas.
What Does "Pop a Lock" Mean?
"Pop a lock" refers to a professional locksmith service where a technician uses specialized tools and techniques to unlock a door or vehicle without causing damage. Whether you’ve accidentally locked yourself out, lost your keys, or are facing a malfunctioning lock, our experienced locksmiths can help "pop a lock" efficiently and safely.
At ABC Locksmith, we provide expert lockout services for residential, automotive, and commercial clients. If you’re stuck outside, don’t waste time trying to force the door open or break the window—let our skilled locksmiths pop the lock for you without causing damage or frustration.
Why Choose ABC Locksmith to "Pop a Lock" for You?
Quick and Efficient Service
When you’re locked out of your home, car, or office, time is of the essence. ABC Locksmith offers fast response times and works efficiently to get you back inside quickly and safely. We understand how important it is to get access to your property, and we make it our priority to solve the problem as soon as possible.
24/7 Availability for Emergency Lockouts
Lockouts can happen at any time of the day or night. That's why we offer 24/7 emergency locksmith services to ensure that no matter when you need us, we’re here to help. Whether it’s early in the morning or late at night, if you need to pop a lock, we’re just a phone call away.
Experienced and Professional Technicians
At ABC Locksmith, our locksmiths are licensed, insured, and highly trained to handle all types of lockout situations. We use the latest tools and techniques to ensure that we “pop” your lock without damaging the lock or surrounding property.
Affordable, Transparent Pricing
We know how important it is to provide fair pricing. At ABC Locksmith, we offer honest and transparent pricing. Before we begin any work, we provide an upfront estimate, so you know exactly what to expect. No hidden fees—just affordable and reliable service.
Serving Winter Haven, FL, and Surrounding Areas
Located in Winter Haven, FL, ABC Locksmith proudly serves Polk County, including nearby areas like Lakeland, Auburndale, Bartow, and beyond. With our mobile locksmith service, we come directly to you, wherever you are, to solve your lockout problem on-site.
Our "Pop a Lock" Services
We provide a variety of services to help you regain access to your property, including:
Home Lockouts:
Locked out of your house? We can quickly and safely "pop a lock" and get you back inside without any damage to your locks or doors.
Car Lockouts:
If you've locked your keys inside your vehicle, our auto locksmiths can efficiently "pop a lock" and get you back on the road. We can handle most vehicle makes and models, from traditional keys to high-tech keyless entry systems.
Office or Commercial Lockouts:
Locked out of your office or commercial property? Whether it’s your storefront, warehouse, or office, we offer quick and professional lockout services to get you back inside and minimize downtime.
Broken Key Extraction:
If your key breaks off in the lock, don’t panic. We can safely extract the broken key and help you get a replacement key on the spot.
Rekeying and Lock Replacement:
If you're concerned about security, we can rekey your locks to ensure that any lost or stolen keys no longer work. We also offer lock replacements for added security.
Why You Should Call ABC Locksmith for Lockout Services
Non-Damaging Techniques
Our experienced locksmiths use non-destructive methods to pop a lock, ensuring that your door, car, or lock remains intact and fully functional after the service.
Quick and Hassle-Free Access
We aim to provide you with a hassle-free experience. Our team will arrive quickly, assess the situation, and open your lock without making you wait for hours.
1 -
Lost Your Crypto Here’s How to Get It Back
Digital asset recovery is a hot topic for anyone who's lost their precious cryptocurrency like Bitcoin. Imagine waking up to find your digital wallet empty or even worse having someone else scam you. It is a gut punch but there are steps you can take to fight back and possibly reclaim what is yours. The world of crypto can feel like the Wild West yet recovery is not a lost cause if you know where to turn. Victims of BTC loss have a few solid avenues to explore and with the right moves you might just turn despair into hope.
First off don't panic. Time is key so start by gathering every scrap of evidence you have. Think transaction IDs, wallet addresses and any messages tied to the loss. This info is your ammo. Next, you should also notify your crypto exchange or wallet provider. Some platforms have tools or support to freeze suspicious activity if you act fast.
Now let's talk about getting serious help. Hiring a private investigator who knows the crypto space can make a huge difference. These pros dig into blockchain trails and track where your assets might have gone. There are many but among them one name that pops up often is GrayHat Hacks Contractor. They're known as some of the most sought after experts in this game. Their skills in tracing digital footprints have earned them a rep among victims looking to recover their funds. Just don't expect miracles overnight because most times it takes grit and patience for recovery to be successful.
It is a good Idea working with blockchain analysis firms like them. These outfits use fancy tech to follow the money across the network. They can spot patterns and sometimes even ID the culprits behind the loss. Pair this with legal action and you have got a combo that might pressure thieves into slipping up. Speaking of legal stuff consider consulting a lawyer who gets cryptocurrency. They can guide you on filing claims or even hitting scammers with lawsuits if you can pin them down.
Finally, join the community. Online forums and groups are full of people who have been through this. They share tips and sometimes point you to resources you would never find alone. Recovery is not always guaranteed but sitting still gets you nowhere. Whether it is teaming up with pros like GrayHat Hacks Contractor or tapping into crowd wisdom every step forward counts. Crypto loss stings hard yet with determination and the right allies you can fight to take back what is yours. The key is to act smart, act fast and never give up.1 -
Trusted Locksmith Services by Local Locksmiths
When it comes to securing your property and ensuring that you can access your home, business, or vehicle without stress, having a reliable locksmith on hand is crucial. At Local Locksmiths, we provide professional, fast, and affordable locksmith services in Hallandale Beach, FL, and the surrounding areas. Whether you need help in an emergency or are looking to upgrade your security systems, our expert team is here to assist you.
Your Go To Locksmith Experts
Located at 1000 NE 12th Ave, Hallandale Beach, FL 33009, Local Locksmiths is committed to delivering high quality locksmith services for residential, commercial, and automotive needs. Our experienced technicians are well equipped to handle a wide variety of services with precision and care. We understand how important it is to feel safe and secure, and our goal is to make sure you can trust us with your locksmith needs.
Comprehensive Locksmith Services
Local Locksmiths offers a wide range of locksmith services designed to meet the diverse needs of our clients. Whether you're locked out of your home or need new locks installed at your business, our skilled technicians have got you covered.
Residential Locksmith Services
We offer lockout assistance, rekeying services, lock replacements, and home security upgrades. Protecting your family and belongings is our priority, and we provide solutions to ensure your home remains secure at all times.
Commercial Locksmith Services
For business owners, we offer high security lock systems, master key systems, keyless entry installations, and access control solutions to help you maintain a secure and efficient environment. Our team can handle the specific needs of your business, ensuring that your property and assets are well protected.
Automotive Locksmith Services
Locking yourself out of your car or losing your keys can be a frustrating experience. Local Locksmiths offers automotive locksmith services, including car key replacements, transponder key programming, and ignition repairs, so you can get back on the road quickly.
Emergency Locksmith Services
Lock and key issues can occur at any time, and that’s why we offer 24/7 emergency locksmith services. Whether you're locked out of your home, office, or car, our team is ready to respond quickly and get you the help you need, no matter the time of day or night.
Why Choose Local Locksmiths?
Experienced and Professional Technicians
At Local Locksmiths, we only employ fully trained and experienced locksmiths who are equipped with the knowledge and tools necessary to complete every job to the highest standard. No job is too big or too small for our team.
Fast and Reliable Service
We understand the urgency of lock and key problems, which is why we prioritize fast and efficient service. Our locksmiths respond quickly to emergencies, and we always aim to resolve your issue on the spot.
Affordable and Transparent Pricing
When you choose Local Locksmiths, you can expect competitive prices and no hidden fees. We provide upfront quotes and ensure that our pricing is clear and fair.
Contact Local Locksmiths Today
Whether you're in need of urgent assistance or just want to ensure that your property is secure, Local Locksmiths is here to help. Contact us at +1 754-551-1841 to speak with a friendly representative, or visit our office at 1000 NE 12th Ave, Hallandale Beach, FL 33009.
Trust Local Locksmiths for all your locksmith needs your security is our priority!2 -
Star Phone Fix: Reliable Water Damage Fix in Hialeah, FL
Accidentally dropped your phone in water? Don't panic! At Star Phone Fix, we specialize in water damage fix for all kinds of mobile devices, including iPhones, Samsung smartphones, and many others. We know how stressful it can be when your phone has been exposed to water, but with our expert repair services, you can get your device back in working order as quickly as possible.
Located at 405 W 29th St, Hialeah, FL 33012, we’re your local go-to for all kinds of phone repairs, especially water damage fixes. With our fast, reliable, and affordable services, you can trust us to handle your device with care and get it back to perfect working condition.
Why Choose Star Phone Fix for Your Water Damage Fix?
Water damage is a tricky problem for any device, but Star Phone Fix has the experience and tools to handle it with ease. Here’s why we’re the best choice when you need water damage fix:
1. Experienced Technicians
Our technicians are trained in diagnosing and repairing a wide range of water damage issues. Whether it’s a phone that has been submerged in water or one that has simply gotten a little wet, we know exactly what to do. From preventing further damage to restoring your device’s full functionality, our team is equipped to handle it all.
2. Quick and Efficient Repair
We understand that time is of the essence when it comes to water damage fix. The sooner you get your phone into our hands, the better the chance we have to restore it. That’s why we offer same-day repair for many water-damaged devices. We work fast to dry out and fix your device, so you can get back to using it as soon as possible.
3. Affordable Pricing
Dealing with water damage doesn’t have to be costly. Star Phone Fix offers affordable and competitive pricing for water damage fixes without compromising on quality. We’ll assess your device, provide an upfront quote, and make sure you know exactly what you’re paying for before any work is done.
4. High-Quality Replacement Parts
In the case that your device requires replacement parts due to water damage, we use only the highest quality components. From screens to internal components, we ensure that your phone gets the best possible repair, so it works just like new.
5. Customer Satisfaction Guarantee
Your satisfaction is our top priority at Star Phone Fix. We’re committed to delivering exceptional service, and if you’re not happy with the repair, we’ll do everything we can to make it right. With us, you’re not just a customer – you’re a priority.
What Happens During a Water Damage Fix?
When you bring your device to Star Phone Fix, we follow a proven process to ensure the best chance of restoring your phone:
Initial Assessment: The first step is to assess the extent of the water damage. We’ll look at the device’s external condition and carefully inspect the internal components to identify any affected parts. Early detection is key to preventing further damage.
Drying Process: We’ll disassemble the device, remove any excess water, and let the internal components dry properly. This crucial step helps prevent corrosion and other issues caused by prolonged exposure to water.
Cleaning and Repair: Once the device is dry, we clean the internal components to remove any moisture or contaminants that may have accumulated. If necessary, we replace any damaged parts, such as screens, batteries, or connectors, to restore full functionality.
Testing: After the repairs are made, we test the device thoroughly. We check for any remaining issues with the touch screen, camera, speaker, charging port, and other functions to ensure everything is working as it should.
Final Review: Once we’ve completed the repair and testing, we’ll call you to let you know your device is ready to pick up. We’re committed to delivering a fully functional phone that’s ready to go.
Devices We Fix for Water Damage
At Star Phone Fix, we handle water damage fixes for a variety of devices, including:
iPhones: From the iPhone 6 to the latest iPhone models, we have experience fixing water-damaged Apple devices.
Samsung Galaxy Phones: Whether it’s a Galaxy S series, Note, or any other model, we can repair water damage and restore your device.
Other Smartphones: We also provide water damage repairs for other brands such as Google Pixel, Motorola, LG, and more.
Tablets and Smartwatches: Water damage doesn’t just affect phones – we can also repair water-damaged tablets and smartwatches, including iPads and Android devices.
Why You Should Act Quickly for Water Damage Fix
If your phone has been exposed to water, acting quickly is essential. The longer your device remains wet, the greater the chances of irreversible damage to internal components. It’s important to power off your device immediately and avoid charging it until it has been properly inspected and dried.
3 -
Finding the Best Health Insurance Solutions with a Health Insurance Agent and Broker Near You
Choosing the right health insurance can be a daunting task, especially with so many options available. Whether you’re looking for individual health coverage, family plans, or Medicare options, the process can feel overwhelming without the right guidance. That's where a Health Insurance Agent near me and a Health Insurance Broker in Fort Lee can help you make the best decision for your healthcare needs.
At Alex Gonzalez Health Insurance Advisor, located at 100 Old Palisade Rd, Fort Lee, NJ 07024, we specialize in helping individuals, families, and businesses navigate the complex world of health insurance. As your trusted Health Insurance Broker near me, we’re here to help you understand your options, compare plans, and find the best coverage at an affordable price. Whether you're in Fort Lee or the surrounding areas, we're dedicated to providing personalized service to ensure you get the coverage you need.
What is a Health Insurance Agent?
A Health Insurance Agent is a professional who works directly with health insurance companies to sell their plans to consumers. Agents are usually licensed by the state and specialize in the plans offered by one or more health insurance providers. A health insurance agent can assist you by explaining the plans, helping you choose the right option, and assisting with the application and enrollment process.
Key Benefits of Working with a Health Insurance Agent:
Expert Guidance: A health insurance agent has in-depth knowledge of the different plans available and can help you understand the details of each option.
Access to Multiple Plans: While some agents work with only one insurer, others represent several companies. This means they can provide a variety of plans for you to choose from.
Personalized Service: A health insurance agent takes the time to understand your needs and will work with you to find the best plan for your budget and healthcare needs.
What is a Health Insurance Broker?
A Health Insurance Broker is similar to an agent but with a key difference: brokers are not tied to a specific insurance company. Instead, they work independently and have access to a variety of insurance plans from multiple insurers. This allows brokers to offer a wider range of options, helping you find the best plan that meets your needs without being limited to one provider.
Key Benefits of Working with a Health Insurance Broker in Fort Lee:
Unbiased Advice: Since brokers are independent and not tied to any one insurance company, they can offer impartial advice and help you compare a variety of plans from different insurers.
Wide Range of Options: A broker has access to multiple carriers and can help you compare the coverage, premiums, and benefits offered by each.
Tailored Solutions: Brokers can offer customized solutions based on your specific needs, whether you're looking for individual, family, or group health plans.
Ongoing Support: Health insurance brokers not only assist during the enrollment process but are also available to help with any questions or concerns you may have throughout the life of your policy.
Why Choose a Health Insurance Broker Near Me in Fort Lee?
Finding the right health insurance plan is not just about picking a provider; it’s about ensuring that the plan fits your healthcare needs and budget. With the help of a Health Insurance Broker near me in Fort Lee, you can get personalized advice and support to navigate the numerous options available.
Here’s why working with a local health insurance broker can be a huge advantage:
Personalized, Local Service: As a Health Insurance Broker in Fort Lee, Alex Gonzalez Health Insurance Advisor understands the local health insurance market and can help you find plans that are best suited for residents of Fort Lee and surrounding areas.
Expert Knowledge of State-Specific Plans: Brokers in your area are familiar with plans available in your state and can help you understand local regulations, subsidies, and programs that may be available to you, such as Get Covered NJ for New Jersey residents.
Access to Local Providers: Working with a local broker means that you can be connected with nearby healthcare providers that are in-network for your plan. This ensures you receive the care you need without incurring unnecessary out-of-pocket expenses.
Why Work with Alex Gonzalez Health Insurance Advisor?
At Alex Gonzalez Health Insurance Advisor, we pride ourselves on offering personalized service to help you navigate the complex world of health insurance. Whether you’re looking for Health Insurance Plans, Medicare Coverage, or Marketplace Insurance, we are here to guide you every step of the way. Here’s why you should choose us as your Health Insurance Broker near me:
1 -
Trusted Locksmith Services by Local Locksmiths
When it comes to securing your property and ensuring that you can access your home, business, or vehicle without stress, having a reliable locksmith on hand is crucial. At Local Locksmiths, we provide professional, fast, and affordable locksmith services in Hallandale Beach, FL, and the surrounding areas. Whether you need help in an emergency or are looking to upgrade your security systems, our expert team is here to assist you.
Your Go-To Locksmith Experts
Located at 1000 NE 12th Ave, Hallandale Beach, FL 33009, Local Locksmiths is committed to delivering high-quality locksmith services for residential, commercial, and automotive needs. Our experienced technicians are well-equipped to handle a wide variety of services with precision and care. We understand how important it is to feel safe and secure, and our goal is to make sure you can trust us with your locksmith needs.
Comprehensive Locksmith Services
Local Locksmiths offers a wide range of locksmith services designed to meet the diverse needs of our clients. Whether you're locked out of your home or need new locks installed at your business, our skilled technicians have got you covered.
Residential Locksmith Services
We offer lockout assistance, rekeying services, lock replacements, and home security upgrades. Protecting your family and belongings is our priority, and we provide solutions to ensure your home remains secure at all times.
Commercial Locksmith Services
For business owners, we offer high-security lock systems, master key systems, keyless entry installations, and access control solutions to help you maintain a secure and efficient environment. Our team can handle the specific needs of your business, ensuring that your property and assets are well-protected.
Automotive Locksmith Services
Locking yourself out of your car or losing your keys can be a frustrating experience. Local Locksmiths offers automotive locksmith services, including car key replacements, transponder key programming, and ignition repairs, so you can get back on the road quickly.
Emergency Locksmith Services
Lock and key issues can occur at any time, and that’s why we offer 24/7 emergency locksmith services. Whether you're locked out of your home, office, or car, our team is ready to respond quickly and get you the help you need, no matter the time of day or night.
Why Choose Local Locksmiths?
Experienced and Professional Technicians
At Local Locksmiths, we only employ fully trained and experienced locksmiths who are equipped with the knowledge and tools necessary to complete every job to the highest standard. No job is too big or too small for our team.
Fast and Reliable Service
We understand the urgency of lock and key problems, which is why we prioritize fast and efficient service. Our locksmiths respond quickly to emergencies, and we always aim to resolve your issue on the spot.
Affordable and Transparent Pricing
When you choose Local Locksmiths, you can expect competitive prices and no hidden fees. We provide upfront quotes and ensure that our pricing is clear and fair.
Contact Local Locksmiths Today
Whether you're in need of urgent assistance or just want to ensure that your property is secure, Local Locksmiths is here to help. Contact us at +1 754-551-1841 to speak with a friendly representative, or visit our office at 1000 NE 12th Ave, Hallandale Beach, FL 33009.
Trust Local Locksmiths for all your locksmith needs—your security is our priority!1 -
MOST RELIABLE BITCOIN RECOVERY / ADWARE RECOVERY SPECIALIST ALWAYS AVAILABLE IN ALL SCAMMED RECOVERY
I remember when I first got into Bitcoin mining. It was back in the early days when Bitcoin was still a new concept and very few people knew about it. As a bank manager, I was intrigued by this digital currency and decided to give mining a shot. I set up my computer and began the process, eventually accumulating a significant amount of Bitcoin. At that time, Bitcoin wasn't worth much, but I believed in its potential. I decided to encrypt my Bitcoin wallet for security. I created a decryption key and stored it somewhere safe, or so I thought. Email info: Adwarerecoveryspecialist@ auctioneer. net Years passed, and I didn't think much about my Bitcoin. Then, the price of Bitcoin skyrocketed. When I checked my wallet, I realized I had Bitcoin worth $1,500,000!Excited, I rushed to decrypt my wallet, only to discover that I had forgotten the decryption key. I searched everywhere, racking my brain to remember where I had stored it, but it was no use. My fortune was locked away, seemingly out of reach. Feeling desperate, I turned to Google, searching for any possible solution to recover my lost Bitcoins. During my search, I stumbled upon a tool called ADWARE RECOVERY SPECIALIST. This tool promised to help recover lost or forgotten decryption keys. Skeptical but hopeful, I decided to give it a try. The process was straightforward. I downloaded the tool and followed the instructions carefully. ADWARE RECOVERY SPECIALIST guided me through a series of steps designed to locate and recover my decryption key. The interface was user-friendly, and the instructions were clear. As I progressed through the recovery process, I felt a glimmer of hope. The tool used advanced algorithms to search for traces of the key on my computer. After several hours of scanning and searching, ADWARE RECOVERY SPECIALIST provided a list of potential keys. With bated breath, I tried each one, and finally, one of them worked! I was able to access my Bitcoin wallet and retrieve my $1,500,000 worth of Bitcoin. The relief and joy I felt were indescribable. Thanks to ADWARE RECOVERY SPECIALIST, my financial future looked bright once again. Telegram info: @adwarerecoveryspecialist This experience taught me the importance of securing important information properly and never underestimating the power of modern technology. With my Bitcoin now accessible, I have a renewed sense of hope and excitement for the future. -
What are the key considerations when looking to book a farmhouse in Delhi for a weekend getaway?
When looking to book a farmhouse in Delhi for a weekend getaway, it's important to consider factors like location, amenities, and group size. Choose a farmhouse that’s conveniently located, close to main roads or tourist spots, yet offers a peaceful retreat from the city's hustle. Make sure the farmhouse offers the amenities you need, such as a pool, Wi-Fi, air conditioning, or event space, depending on the nature of your getaway. Additionally, check for the capacity of the farmhouse to accommodate your group size comfortably. It's also advisable to look into reviews, pricing, and any extra charges like security deposits or cleaning fees. Planning in advance and booking early ensures that you secure the best deals and avoid last-minute rush.
1 -
Question about cache (Redis or other distribuated cache).
So I would like to find a solution with “Partioning”. But without code it my self (ofc)
Ok, example :
In the application you have clients, each client has users, each user has role.
So right now it’s in the cache with the keu “User:<userId>” = role
Sometimes, when you change client settings, all entries should be removed.
So what I would love to have :
Client_Id/UsersRoles/UserId as a key
And I would love to be able tp delete “all keys after /” :
Basiclly delete client_id/ would delete everything in cache for this client
Delete client_id/UserRoles will clean up all saved roles.
I’m pretty new working with redis, but it doesn’t seem possible out of the box.
Any reading material I could read ?4 -
VirPhone: Empowering Your Business with Cloud Phone Systems and VOIP Technology
In today’s fast-paced and digital world, efficient communication is key to the success of any business. Whether you're reaching out to clients, collaborating with remote teams, or handling customer inquiries, having a reliable phone system is essential. VirPhone offers cutting-edge cloud phone systems that are designed to streamline your communication, reduce costs, and improve efficiency. Let’s explore how our cloud phone systems can elevate your business and answer some common questions like, “What is VOIP phone?” and how it can benefit your business.
What is a Cloud Phone System?
A cloud phone system is an advanced communication solution that operates over the internet, rather than relying on traditional landlines. This system provides businesses with a more flexible, scalable, and cost-effective way to manage their communications. VirPhone’s cloud phone systems allow businesses to make and receive calls, send messages, and conduct video conferences—all from the convenience of a cloud-based platform.
With VirPhone, you can enjoy the flexibility of managing your communications from anywhere. Whether you’re in the office, working remotely, or traveling, a cloud phone system ensures you stay connected at all times.
What is VOIP and How Can It Benefit Your Business?
VOIP stands for Voice Over Internet Protocol, which is a technology that allows voice calls to be made over the internet rather than using traditional telephone lines. So, what is VOIP phone? It’s simply a phone system that enables businesses to make calls over the internet.
Unlike traditional phone systems, VOIP phone systems are cost-effective and more flexible, providing features such as call forwarding, voicemail, and voicemail-to-email. VirPhone’s VOIP technology not only reduces your business’s communication costs but also enhances overall productivity by providing features that are more customizable and scalable.
Some of the key benefits of VOIP phone systems include:
Lower Costs: Traditional phone systems charge for long-distance calls. With VOIP, these calls are often free or at a much lower rate.
Scalability: As your business grows, your cloud phone system can easily scale to accommodate more users or advanced features without expensive upgrades.
Flexibility: With VOIP phone systems, employees can make and receive calls anywhere, as long as they have an internet connection. This is ideal for remote teams or employees on the go.
How to Get a Toll-Free Number with VirPhone
One of the most important features for any business is having a toll-free number. A toll-free number makes your business appear professional and accessible, giving customers a way to reach you without incurring charges. VirPhone offers toll-free numbers that are easy to set up and manage through our cloud phone system.
With a toll-free number from VirPhone, customers can call your business without worrying about the cost, regardless of where they are located. This can improve customer satisfaction and make it easier for customers to get in touch with your business. Whether you're conducting customer service calls or receiving inquiries, a toll-free number can help you provide exceptional service.
Calling on a Phone: How VirPhone Enhances Your Business Calls
Whether you’re calling on a phone to reach a client, partner, or team member, VirPhone’s cloud phone system ensures that your calls are clear, reliable, and cost-effective. No more worrying about dropped calls or poor audio quality—our system is designed to provide high-quality call connections, no matter where you are.
Here are some features of VirPhone’s calling on phone services that help improve your business communication:
Crystal-Clear Audio: With VOIP phone systems, you can expect high-definition voice quality that eliminates the usual static or noise found in traditional phone calls.
Call Forwarding and Routing: If you’re unavailable, VirPhone can forward your calls to another number or voicemail. This ensures you never miss an important call.
Voicemail-to-Email: With VirPhone, you can receive voicemails directly in your email inbox, making it easier to manage messages and respond promptly.
Why Choose VirPhone for Your Business Communication?
At VirPhone, we understand the importance of reliable communication for businesses. Our cloud phone systems are designed to provide advanced features and excellent call quality, all at an affordable price. Here’s why businesses trust VirPhone for their communication needs:
Affordable: Our VOIP phone systems are cost-effective and provide significant savings over traditional phone systems.
Flexible and Scalable: Whether you're a small business or a large enterprise, our systems grow with you. Adding more lines or features is easy and can be done remotely.
1 -
Many people think that cryptocurrency trading is a scam. Please don't believe them, they are wrong. Trading cryptocurrency is a perfectly legit form of investment. Nevertheless, the cryptocurrency trading universe is ripe with scams, so it makes sense to be extra cautious.
Even though Forex trading is a legitimate form of investment, retail traders often fall prey to fraudsters. Therefore, it is always recommended to exercise extra caution.
1. The essence
a.Forex and cryptocurrency trading is a perfectly legit form of investment.
b. Forex scams and Forex pyramid schemes are widespread globally.
c. Retail Forex traders are the prime targets of fraudsters
d. Choosing a reputable Forex broker is a key step in anyone’s trading journey.
2. How to spot a Forex scam?
Be suspicious if you’re offered Forex trading services that promise massive gains in a short period of time. As with all forms of investment, Forex trading carries massive risks and there is no guarantee your trades will always be profitable. Promises of exorbitant gains are almost always a red flag.
It’s not a good idea to let other people have access to your money. Never deposit any funds without due diligence of the person/organization you are dealing with. One of the most common types of Forex scam relies on not allowing people to withdraw the funds they had deposited earlier.
3. How To Get Money Back
a. Get recovery advice:
Advice from recovery professionals experienced in financial fraud cases can be very helpful in the recovery process. I recommend that you consult Saclux Comptech Specialst that will help you navigate the system and get your money back. If you are a victim of Cryptocurrency or Forex fraud, it is important to act quickly. The longer you wait, the harder it will be to get your money back.1 -
When you’re in need of reliable, fast, and professional locksmith services in Fort Lauderdale, Local Locksmiths is your go to provider. With years of experience serving the Fort Lauderdale area, we understand the importance of security and ensuring that your property, whether it's your home, office, or vehicle, is safe and secure. Our team is committed to offering top notch locksmith services at affordable prices, making us the most trusted locksmith in Fort Lauderdale.
Why Choose Local Locksmiths?
At Local Locksmiths, we pride ourselves on our customer first approach. Here’s why we stand out from other locksmith services:
Fast Response Time: Lockouts and security issues can happen at any time. Our expert locksmiths are always ready to respond quickly to any emergency. Whether it’s a car lockout or a home lock problem, we are here to help with a fast, reliable solution.
Comprehensive Services: We offer a wide range of locksmith services to meet your needs. From residential to commercial and automotive locksmith services, we handle it all. Whether you need a lock replacement, rekeying services, or a key duplication, we have the expertise to get the job done right.
Expert Technicians: Our team of licensed and trained locksmiths has the skills and knowledge to solve any lock related issue. They are equipped with the latest tools and techniques to provide efficient and effective solutions.
Affordable Pricing: We understand that security services can be an unexpected expense, which is why we offer competitive and transparent pricing. You can count on Local Locksmiths to deliver high quality services without breaking the bank.
Emergency Locksmith Services: Locked out of your car or home? We offer 24/7 emergency locksmith services in Fort Lauderdale. Day or night, our locksmiths are always available to assist you with your urgent lock and key needs.
Our Services
Residential Locksmith: From installing new locks to rekeying your home, we ensure your property is protected with the best security measures.
Commercial Locksmith: We provide a variety of services for businesses, including master key systems, access control systems, and high security lock installation.
Automotive Locksmith: Locked out of your car or lost your keys? Our automotive locksmith services cover all makes and models, helping you get back on the road quickly.
Emergency Services: When you’re in a pinch, you can rely on us for 24/7 emergency lockout services and other urgent locksmith needs.
Serving Fort Lauderdale and Beyond
While our business is based at 1000 NE 12th Ave, Hallandale Beach, FL, we proudly serve Fort Lauderdale and the surrounding areas. Our proximity to Fort Lauderdale ensures we can respond to your locksmith needs quickly and efficiently. We’re just a call away at +17545511841, ready to provide you with fast, professional service.
Contact Local Locksmiths Today
Don’t let lock issues cause you unnecessary stress. Whether you need a simple key replacement or emergency locksmith services, Local Locksmiths is here to help. With our expertise, commitment to customer satisfaction, and affordable pricing, we’re your trusted locksmiths in Fort Lauderdale. Contact us now at +17545511841 for all your locksmith needs.
For reliable, fast, and professional locksmith services, choose Local Locksmiths your trusted partner in Fort Lauderdale.2 -
Glory Casino is a popular platform for players in Bangladesh looking to enjoy a wide range of exciting casino games. https://casinologin-bd.com/glory-ca... offers all the details you need to log into your Glory Casino account with ease. Once you’ve registered and created your account, the login process is straightforward, and the site offers helpful tips to ensure you never miss a chance to play.
One of the key features of Glory Casino is its live dealer games, which offer a real-time, interactive gaming experience. Players can enjoy games like blackjack, roulette, and baccarat with live dealers, making it feel as though they are playing in a land-based casino from the comfort of their home. Glory Casino also offers a wide selection of slot games and other casino classics, ensuring there is something for everyone.
For those who encounter any issues with logging into their account or navigating the site, provides customer support options and troubleshooting guides to help players resolve any issues quickly. Enjoy your time at Glory Casino, where the best online gaming experience awaits.7 -
Despite already having a few years of professional experience dealing with Linux servers, I still, to this day, confuse, which environment file gets sourced and when...
There's /etc/profile, /etc/bashrc, ~/.bash_profile, ~/.profile, ~/.bashrc
I think it's... Bashrc for interactive shells, profile for login shells.
But then I have examples like "ssh user@server 'echo $var'" that... Don't source any of the files!
You can enable user environment files for SSH that get sourced whenever a user logs on through SSH (~/.ssh/environment / environment specified for a key in ~/.ssh/authorized_keys)
Is there some sort of master environment file that gets sourced *every* time, no matter what kind of shell starts?1 -
SECURE YOUR BITCOIN RECOVERY WITH RAPID DIGITAL RECOVERY TRUSTED SOLUTION
Before parting with any money on a website or mobile app, it's essential to take steps to ensure the platform is legitimate. Researching the company, its founders, and its track record is key to making an informed decision. Be diligent in asking questions, reading reviews, and looking for any signs of credibility. Always remember the old adage, "If it’s too good to be true, it probably is." Scammers often prey on unsuspecting users with enticing offers that, on closer inspection, are nothing more than traps designed to steal your money. Scams can come in many forms, and some are more subtle than others. For instance, scammers may pretend to form emotional connections, feigning love or friendship to manipulate victims into giving money. In more extreme cases, they may even post inappropriate material to coerce or blackmail their victims. Regardless of the method, the impact can be both emotionally and financially damaging. If you’ve been scammed, recovering your funds can be a stressful and frustrating process. However, with the right approach, you may be able to recover your money and mitigate the damage. I found myself in such a situation, and I was able to successfully recover my funds by working with a service like Rapid Digital Recovery. They specialize in helping individuals who have fallen victim to online scams by assisting with fund recovery. The process was faster and easier than I expected, and their team made the entire experience much less overwhelming. If you suspect you’ve been scammed, the first step is to gather all relevant information about the transaction. This means taking screenshots of conversations with the scammer, which will serve as vital evidence. Next, gather any details about the scammer, such as their full name and account information. If you made the payment through a mobile app or SMS, find the transaction in your history and copy the “Transaction ID Number.” This information will be essential when filing your case with both your bank and the platform where the scam took place. Once you’ve gathered your evidence, contact your bank’s e-fraud department immediately. Most banks have specialized teams for online fraud. Provide them with all the necessary details, including screenshots and transaction IDs. It’s also wise to contact the scammer’s bank, sharing the same information, and to forward a copy of your case to Rapid Digital Recovery. Their team worked with the bank to help freeze the scammer’s account, preventing further losses and speeding up the recovery process. Recovering funds from online scams can be daunting, but with the right steps and the help of professionals like Rapid Digital Recovery, you can significantly increase your chances of success and protect yourself from future scams. Thanks to their assistance, I was able to recover my funds and put the whole ordeal behind me.
Reach Out To Them Via
Whatsapp: +1 4.14 8.0 71.4 8.5
Website: https: // rapiddigitalrecovery. org
Email: rapiddigitalrecovery (@) execs. com
1 -
Hypoallergenic Dog Breeds
A sizable bit of the American public is really powerless against canines: around 10% (as per America College of Allergy, Asthma, and immunology). Dreadfully, various canine darlings experience the malevolent effects of sensitivities and need to regulate unmistakable extraordinary trickiness assaults as they can't battle the compulsion to assist the four-legged venerating creatures.
This can be an issue for canine darlings who may be experiencing lively troubles and mental issues, as they would have discovered some comfort or settlement in reiterating with their pet canine. Different individuals save a pet subsequently through an ESA letter, which permits these individuals to keep up their psychological achievement. These individuals can additionally profit by express laws and establishments that are set to help those with mental prosperity issues.
In any case, all isn't lost for individuals with sensitivities needing a pet canine as an energized support creature, for there are unmistakable canine arrangements that, at any rate, not 100% hypoallergenic, think about extraordinary trickiness enduring individuals to get or get canines as pets.
What are hypoallergenic canines?
Canines regularly shed their hair dependably and irregularly. The fine hair by then gets joined to any surface it sticks on, particularly on surfaces. Notwithstanding, it isn't normally the shedding that immediately triggers the affectability yet the peril of the canine and other fine particles that catch onto the hair. For various creatures, the allergenic can take various structures, for instance for felines it is in their salivation which gets onto their hair during planning. If you want to keep your pet inside your house you should have an ESA letter for housing.
A hypoallergenic canine is one that doesn't store allergens of any structure through either the dander locking onto the stowaway. Canines, notwithstanding, are not absolutely hypoallergenic, in any case with a blend of a low shedding canine variety and worthwhile getting ready, you can have a canine that makes individuals with hypersensitivities immaterial no difficulty.
Fiery Support Animal Letter(ESA Letter) for your hypoallergenic canine?
The ESA letter is a letter given to the canine proprietor by an affirmed emotional well-being master, in the wake of evaluating the ability of the said proprietor through an assessment. The appraisal will regard if the individual is experiencing mental or anxious distress or hardship and s/he needs the pet canine's connection to lessen the issues and feel regular. If you have a pet you should have an emotional support animal letter.
The ESA Letter joins the quality of the expert and a confirmed stamp and notices explicitly that the individual necessities to have the canine with them dependably for their psychological and lively strength.
This letter will keep on assisting the energized help creature proprietors with profiting by-laws that award their pets to be with them during voyaging or in their lodging.
The particular hypoallergenic canine arrangements
The American Kennel Club, set up in 1885 is one of the authentic voices on canine arrangements, preparing, and success.If you have other creatures, you should have an emotional support dog letter.
It beginning late passed on a diagram of canines that are close to being hypoallergenic and are ideal for individuals with hypersensitivities. A portion of the canines related to the quick overview is:
Affenpinscher
Maltese
Afghan Hound
American Hairless Terrier
Poodle
Yorkshire Terrier
Basenji
Bichon Frise
Shih Tzu
Chinese Crested
Coton de Tulear
Little Schnauzer
Irish Water Spaniel
Kerry Blue Terrier
Alongside these groupings, there are different collections that are reasonable for handily influenced individuals. The key brand name that makes these creatures reasonable is their irrelevant or low shedding stow away. With relentless getting ready and bit by bit brushing, you can get essentially more sure outcomes. It comparatively helps if the hair on the canine is wiry and human-like, for example, the Afghan Hound, or near zero body stow away, for example, the American Hairless Terrier and the Basenji. If you do not have an ESA letter you can apply for ESA letter online. -
Professional Bitcoin Recovery Expert ⁄⁄ Digital Hack Recovery
Recovering your lost bitcoins requires patience, dedication, and the right expertise. While the process may seem daunting, the opportunities for reclaiming stolen or misplaced digital assets are just as viable today as ever, provided you have the right tools and support. Like many others, I once thought my lost Bitcoin account was beyond recovery after it was stolen. However, my perspective changed when I found Digital Hack Recovery.At first, I was skeptical. Could any service really help me recover my cryptocurrency? The world of digital assets is complex, and I had resigned myself to the idea that my coins were lost for good. But from the moment I reached out to Digital Hack Recovery, I was impressed by their professionalism and knowledge. They use a variety of advanced techniques and recovery tools to retrieve digital assets from a wide range of sources, making the entire process both effective and secure. Their team immediately reassured me that recovery was possible, and they guided me every step of the way.What truly sets Digital Hack Recovery apart is its user-friendly interface. Even if you don’t have a technical background, their platform makes it easy to follow the recovery steps. The service is designed to be simple and intuitive, with clear instructions for both beginners and more experienced users. This was a key factor for me, as I didn’t have a deep understanding of the technicalities of Bitcoin recovery. Digital Hack Recovery’s clear, step-by-step process made it accessible and easy to navigate, even for someone with limited tech skills.Security and privacy are also top priorities for Digital Hack Recovery. They assured me that my personal information would remain completely secure throughout the recovery process, and I never had any concerns about the confidentiality of my data. Knowing that my information was in safe hands gave me the peace of mind I needed to trust them with such an important task. I highly recommend Digital Hack Recovery to anyone who has lost or misplaced their digital assets. Their advanced recovery tools, combined with an easy-to-use interface and top-notch security, make it an invaluable resource for both individuals and businesses. Thanks to their expertise and dedication, I was able to recover my lost Bitcoin. If you’re facing a similar situation, I’m confident that Digital Hack Recovery can help you too.
Contact info⁚
WhatsApp +19152151930
Email⁚ digital hack recovery @ techie . com
Website⁚ https : // digital hack recovery . com7 -
When considering a broker for trading, it’s crucial to be aware of the risks associated with platforms that offer rigid conditions, high spreads, and excessive fees. Many brokers lack transparency, which can lead to unexpected costs that significantly reduce profitability. These hidden fees, combined with inefficient platforms, can leave traders feeling misled and dissatisfied with their experience. If you find yourself facing such challenges, reaching out to CRANIX ETHICAL SOLUTIONS HAVEN may be the key to securing a resolution. One common issue with certain brokers is the difficulty in executing trades. Delays in opening and closing positions can prevent traders from capitalizing on market opportunities, leading to missed chances and financial losses. In addition to these delays, high spreads often further erode potential profits, making it harder for traders to break even or achieve meaningful gains. For those caught in these frustrating situations, CRANIX ETHICAL SOLUTIONS HAVEN offers professional assistance to help recover lost funds and trace the origin of the issues. A particularly concerning problem arises when traders attempt to withdraw their funds. After experiencing success in their trades, many expect to withdraw their earnings without issue. However, brokers with poor practices may block or delay withdrawal requests without offering any clear explanation. In some cases, accounts may even be restricted, leaving traders unable to access their own money. If you find yourself locked out of your account or struggling to recover your funds, CRANIX ETHICAL SOLUTIONS HAVEN can step in to help. Their team of experts specializes in navigating these complex issues, working to ensure that your money is traced and returned as quickly as possible. For those dealing with unresponsive brokers, CRANIX ETHICAL SOLUTIONS HAVEN provides invaluable support. Their qualified agents can assist in identifying and resolving problems related to withdrawals or account restrictions. With their expertise, you can gain peace of mind knowing that your funds are being actively pursued and safeguarded. The recovery process can be complex, but CRANIX ETHICAL SOLUTIONS HAVEN streamlines it, providing clients with the best possible chance of recovering their money. Given the risks associated with brokers who operate under opaque terms, it’s essential to choose your platform carefully. Make sure to research the broker’s reputation and policies before committing to any investment. If you find yourself facing withdrawal issues, account restrictions, or high fees, CRANIX ETHICAL SOLUTIONS HAVEN is a reliable service that can help recover your funds and guide you through the process. By working with them, you ensure that you have professional support when navigating the challenges posed by unreliable brokers.
WhatsApp: +44 7460 622730
Email: cranixethicalsolutionshaven @ post . com
Website: https: / / cranixethicalsolutionshaven . info1 -
CRYPTO RECOVERY SPECAILIST CONTACT FUNDS RECLIAMER COMPANY
I am a Mexican based professional in the investment industry and on FUNDS RECLAIMER COMPANY to expand my network and connect with other industry professionals. I would be happy to connect you all with FUNDS RECLAIMER COMPANY and start the dialogue to see how we can cooperate.
At the beginning of 2025, I found myself in a terrifying situation when the entire amount of SUI, worth 250,000 Euros, that I had stored in my Trust Wallet was mysteriously transferred to an unknown address. I had not authorized any transactions, nor had I shared my private keys or seed phrases with anyone, so the sudden disappearance of my funds left me both confused and alarmed. It seemed as though my assets had vanished into thin air, and I couldn’t comprehend how or why this happened. Desperate for a solution, I reached out to Trust Wallet customer support, hoping they might be able to offer some clarity or assistance. The response I received, however, was disappointing. Trust Wallet explained that they couldn't directly trace blockchain transactions, as their platform does not have the capability to track funds once they leave the wallet. They also suggested that the most likely cause of the loss was a compromised private key, even though I had been careful to safeguard this information. I felt an overwhelming sense of helplessness. How could my private key have been compromised without me ever sharing it? I had followed all the best practices for keeping my wallet secure, and yet, my funds were gone. After hitting a dead end with Trust Wallet, I knew I had to explore other avenues for recovery. During my search, I came across Wizard Web Recovery. This company claims to specialize in tracing stolen funds and recovering them from blockchain networks. Initially skeptical, I decided to give it a try. The more I researched Wizard Web Recovery, the more confident I became in their expertise. They have a team of certified experts who specialize in the recovery of lost or stolen cryptocurrency, including ETH and other digital assets, and they seem to have a proven track record in handling these types of cases. When I reached out to FUNDS RECLIAMER COMPANY, their team was prompt in responding and immediately set to work analyzing my situation. They began by asking for transaction details and wallet information, assuring me that they would investigate the matter thoroughly. Over the next few days, I stayed in close contact with them as they worked diligently to trace the stolen funds. Their expertise in blockchain technology and recovery techniques gave me hope that there was still a chance of retrieving my lost assets. Although the process is still ongoing, I feel much more reassured knowing I’m working with professionals who understand the intricacies of cryptocurrency recovery. As we start 2025, I remain cautiously optimistic that my funds will eventually be recovered. If you ever find yourself in a similar situation, I would highly recommend seeking help from certified experts like Wizard Web Recovery. Their dedication to recovering stolen funds has made a potentially disastrous situation a lot more bearable.
FOR MORE INFO:
Email: fundsreclaimer(@) c o n s u l t a n t . c o m
WhatsApp:+1 (361) 2 5 0- 4 1 1 0
Website: h t t p s ://fundsreclaimercompany . c o m
1 -
Hire a Trusted Company for Recovery of Lost Bitcoin — CryptoChain Global Track
The rapid growth of the cryptocurrency industry has created both opportunity and risk. While digital assets like Bitcoin offer financial freedom, privacy, and accessibility, they also attract cybercriminals who exploit unsuspecting users. From investment scams to phishing attacks, hacked wallets to fraudulent trading platforms, Bitcoin holders around the world are increasingly falling victim to schemes that result in serious financial loss. When this happens, finding a reliable, professional recovery service becomes a critical step forward.
CryptoChain Global Track is a trusted and recognized name in the field of cryptocurrency recovery. The company is known for helping individuals and businesses who have lost Bitcoin due to scams, unauthorized access, or transactional errors. Backed by a team of skilled blockchain analysts, ethical hackers, and forensic investigators, CryptoChain Global Track offers a lifeline to those who thought their assets were gone forever.
Unlike many services that overpromise and underdeliver, CryptoChain Global Track works with complete transparency and professionalism. Their recovery process begins with a detailed analysis of the client’s situation. This includes examining the blockchain data, wallet transactions, and any communication or documentation related to the scam or loss. Using advanced tools, the team can trace the movement of Bitcoin through multiple wallets and platforms, even if the funds have been moved through mixing services or converted into other cryptocurrencies.
The company's success is rooted in its deep understanding of blockchain networks and how digital criminals operate. Their technical capabilities allow them to identify patterns, pinpoint destination wallets, and in many cases, work directly with exchanges or law enforcement to flag suspicious accounts. Every case is approached with careful investigation, guided by facts and real-time data—not assumptions or generic solutions.
Trust is a key part of any recovery process, especially when dealing with sensitive financial matters. CryptoChain Global Track treats every case with discretion and ensures that clients remain informed throughout the investigation. From initial assessment to asset tracking and follow-up actions, communication is clear and consistent. Clients are not charged upfront for empty promises—they receive honest evaluations and tailored solutions based on the nature of their case.
Beyond technical expertise, CryptoChain Global Track is also committed to client support and education. Many Bitcoin losses occur because of a lack of awareness about threats in the crypto space. The company takes time to educate its clients about how the breach or scam occurred and provides practical advice to help them avoid similar situations in the future. This commitment to both recovery and prevention makes the service holistic and genuinely helpful.
A trusted solution is available—and it starts by connecting with a team that understands how to fight back against crypto fraud with skill and determination.6 -
APNA IPTV: Your Premier Destination for IPTV Box and IPTV Recharge Services in Surrey, Vancouver
Are you looking for reliable IPTV recharge services or searching for an IPTV box in Surrey? Look no further than APNA IPTV—your trusted local provider of top-quality IPTV services. Conveniently located at 12990 72 Ave, Surrey, BC V3W 4J7, we specialize in offering free IPTV solutions and IPTV box recharge subscriptions, ensuring that you enjoy uninterrupted access to your favorite shows, movies, and live sports.
What is IPTV?
IPTV (Internet Protocol Television) is an advanced method of delivering TV content through the internet rather than traditional cable or satellite services. IPTV provides access to live TV, on-demand videos, sports, news, and much more, all through an internet connection. It’s the perfect solution for anyone looking to enjoy high-quality entertainment at an affordable price.
At APNA IPTV, we are committed to providing the best IPTV experience for our customers in Surrey, Vancouver, and the surrounding areas. Whether you're in need of an IPTV box or looking for convenient IPTV recharge options, we’ve got you covered.
Why Choose APNA IPTV for IPTV Box and IPTV Recharge in Surrey?
IPTV Box in Surrey: At APNA IPTV, we offer a wide selection of IPTV boxes to suit your entertainment needs. Whether you're new to IPTV or looking to upgrade your current setup, we provide the best IPTV boxes that offer seamless streaming, high-definition content, and easy installation. Our team will guide you through the process of setting up your IPTV box to ensure that you get the most out of your IPTV experience.
Convenient IPTV Recharge Services: One of the key services we offer is IPTV recharge. Our IPTV box recharge subscriptions are designed to keep your device updated and running smoothly. With an easy-to-manage IPTV recharge, you’ll have uninterrupted access to all the content you love, whether it’s live TV, movies, or sports.
Free IPTV Solutions: Looking for free IPTV? We offer a selection of free IPTV services that give you access to a variety of channels and content, allowing you to explore the world of IPTV without any commitments.
Local Support in Surrey: As a local business in Surrey, we pride ourselves on offering personalized service. Whether you need a new IPTV box, a recharge for your existing device, or help setting up your IPTV service, our team is here to provide expert assistance. We understand the unique needs of our Surrey customers and are dedicated to offering high-quality, reliable service.
Affordable IPTV Solutions: At APNA IPTV, we are committed to providing affordable IPTV services. Whether you’re interested in free IPTV solutions or a premium IPTV subscription, we offer a variety of packages designed to fit your needs and budget.
What APNA IPTV Offers:
IPTV Box in Surrey:
We provide high-quality IPTV boxes that are designed for easy setup and smooth streaming. Whether you’re watching local channels, international content, or on-demand shows, our IPTV boxes are equipped to deliver a superior viewing experience.
IPTV Recharge:
Keep your IPTV box running at full capacity with our affordable IPTV recharge services. Regular recharges ensure that you continue to enjoy uninterrupted access to the latest content without any disruptions.
Free IPTV Solutions:
Enjoy a wide variety of channels and shows with our free IPTV services. Explore new content, enjoy live TV, and get access to movies, sports, and more—all without the need for a paid subscription.
Customer Support:
Our friendly and professional team is always available to assist you with any questions or concerns regarding your IPTV box or IPTV recharge services. Whether you need help setting up your device or troubleshooting an issue, we’re just a phone call away.
Why Surrey Residents Choose APNA IPTV:
Affordable and Convenient:
We understand that many people are looking for affordable alternatives to traditional cable services. Our IPTV services offer a flexible, budget-friendly option for accessing entertainment. Plus, with our IPTV recharge services, you can enjoy uninterrupted access without any hassle.1 -
SRS Roofing & Exteriors: Your Trusted Roofers Near Me in Surrey, BC
When it comes to ensuring the safety and protection of your home or business, the roof is one of the most crucial components. Whether you're dealing with a minor repair or need a full roof replacement, finding reliable, professional roofers near you is essential. At SRS Roofing & Exteriors, we take pride in offering high-quality roofing services right here in Surrey, BC. We are your go-to roofers near you, providing exceptional services to ensure your roof remains strong and durable for years to come.
Why Choose SRS Roofing & Exteriors?
As a locally owned and operated business, we understand the unique needs of our community in Surrey and the surrounding areas. We specialize in providing a wide range of roofing solutions for both residential and commercial properties. Whether you're looking for roof repair, installation, or maintenance, our team of experienced professionals is ready to help.
1. Experienced and Knowledgeable Roofers
At SRS Roofing & Exteriors, we employ a team of highly skilled and certified roofers who have years of experience in the industry. Our expertise allows us to handle any roofing project, no matter the size or complexity. We use the latest techniques and high-quality materials to ensure that your roof stands the test of time.
2. Comprehensive Roofing Services
We offer a full spectrum of roofing services to meet all your needs, including:
Roof Installation: If you're building a new home or commercial property, we can help with the installation of a brand-new roof, tailored to your specifications and needs.
Roof Repairs: Whether you have a small leak or significant damage, our team can identify and fix the problem efficiently.
Roof Inspections and Maintenance: Regular roof inspections and maintenance are key to preventing costly repairs down the line. We provide thorough assessments to ensure your roof is in top shape.
Exterior Services: In addition to roofing, we offer exterior services such as siding installation and repair to improve the overall look and durability of your property.
3. Affordable and Transparent Pricing
We believe that high-quality roofing services should be accessible to everyone. That's why we offer competitive and transparent pricing. You can trust that the price we quote will be the price you pay. We are committed to providing value without compromising on quality.
4. Emergency Roofing Services
Roofing issues don’t always occur during business hours. That’s why we offer emergency roofing services to handle urgent repairs when you need them most. Our team is ready to respond to your roofing emergencies quickly and efficiently, minimizing any potential damage to your property.
5. Local and Trusted
As roofers near you in Surrey, BC, we are deeply committed to our local community. Our customers trust us because we consistently deliver top-tier service and results. We are proud to be the roofing company that locals turn to for reliable, honest, and professional service.
Serving Surrey and Beyond
Located at 7290 123 St., Surrey, BC V3W 9J1, SRS Roofing & Exteriors proudly serves Surrey and the surrounding areas. Whether you're searching for "roofers near me" or need help with a specific roofing issue, we are just a call away. We’re dedicated to providing fast, efficient, and affordable roofing solutions to keep your home or business safe and secure.
Get in Touch with SRS Roofing & Exteriors Today
Don't wait until small roofing problems turn into expensive repairs. If you’re looking for reliable "roofers near me," look no further than SRS Roofing & Exteriors. We’re here to help with all your roofing needs!
For more information or to schedule a consultation, contact us today:
Phone: +16046558486
Address: 7290 123 St., Surrey, BC V3W 9J1, Canada
Let us take care of your roofing needs, so you can enjoy peace of mind knowing your roof is in expert hands.2





