Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "full access"
-
The best parts of being a developer:
1. Full Internet access and admin rights.
2. It's nearly impossible for someone to tell if you are working or just zoning out.
3. We have the best online communities... because we make all of them.7 -
So a few days ago I felt pretty h*ckin professional.
I'm an intern and my job was to get the last 2003 server off the racks (It's a government job, so it's a wonder we only have one 2003 server left). The problem being that the service running on that server cannot just be placed on a new OS. It's some custom engineering document server that was built in 2003 on a 1995 tech stack and it had been abandoned for so long that it was apparently lost to time with no hope of recovery.
"Please redesign the system. Use a modern tech stack. Have at it, she's your project, do as you wish."
Music to my ears.
First challenge is getting the data off the old server. It's a 1995 .mdb file, so the most recent version of Access that would be able to open it is 2010.
Option two: There's an "export" button that literally just vomits all 16,644 records into a tab-delimited text file. Since this option didn't require scavenging up an old version of Access, I wrote a Python script to just read the export file.
And something like 30% of the records were invalid. Why? Well, one of the fields allowed for newline characters. This was an issue because records were separated by newline. So any record with a field containing newline became invalid.
Although, this did not stop me. Not even close. I figured it out and fixed it in about 10 minutes. All records read into the program without issue.
Next for designing the database. My stack is MySQL and NodeJS, which my supervisors approved of. There was a lot of data that looked like it would fit into an integer, but one or two odd records would have something like "1050b" which mean that just a few items prevented me from having as slick of a database design as I wanted. I designed the tables, about 18 columns per record, mostly varchar(64).
Next challenge was putting the exported data into the database. At first I thought of doing it record by record from my python script. Connect to the MySQL server and just iterate over all the data I had. But what I ended up actually doing was generating a .sql file and running that on the server. This took a few tries thanks to a lot of inconsistencies in the data, but eventually, I got all 16k records in the new database and I had never been so happy.
The next two hours were very productive, designing a front end which was very clean. I had just enough time to design a rough prototype that works totally off ajax requests. I want to keep it that way so that other services can contact this data, as it may be useful to have an engineering data API.
Anyways, that was my win story of the week. I was handed a challenge; an old, decaying server full of important data, and despite the hitches one might expect from archaic data, I was able to rescue every byte. I will probably be presenting my prototype to the higher ups in Engineering sometime this week.
Happy Algo!8 -
Rant
Why do shithead clients think they can walk away without paying us once we deliver the project !!!
So, here goes nothing..
Got an online gig to create a dashboard.
Since i had to deal with a lot of shitheads in the past, I told them my rules were simple, 20% advance, 40% on 50% completion and 40% after i complete and send them proof of completion. Once i receive the payment in full, only then i will hand over the code.
They said it was fine and paid 20%.
I got the next 40% also without any effort but they said they also needed me to deploy the code on their AWS account, and they were ready to pay extra for it, so i agreed.
I complete the whole project and sent them the screenshots, asking for the remaining 40% payment. They rejected the request saying my work was not complete as i had not deployed on AWS yet. After a couple of more such exchanges, i agreed to setup their account before the payment. But i could sense something fishy, so i did everything on their AWS account, except registered the domain from my account and set up everything. Once i inform them that its done and ask for the remaining payment.
The reply i got was LOL.
I tried to login to the AWS account, only to find password had been changed.
Database access revoked.
Even my admin account on the app had been removed. Thinking that they have been successful, they even published ads about thier NEW dashboard to their customers.
I sent them a final mail with warning ending with a middle finger emoji. 24 hours later,
I created a github page with the text " This website has been siezed by the government as the owner is found accused in fraud" and redirected the domain to it. Got an apology mail from them 2 hours later begging me to restore the website. i asked for an extra 10% penalty apart from the remaining payment. After i got paid, set an auto-reply of LOL to thier emails and chilled for a week before restoring the domain back to normal.
Dev : 1
Shithead Client: 024 -
"full stack" means "you'll be doing everything from gathering client requirements through data architecture up to the UI design and of course implementing all of it"
"backend" means "you'll be coding everything from database through server-side code and client-side code including html and css"
"we need you on-site all day every day" means "we have no idea how and why we should use repositories with remote access despite being a company developing an internet app, and we don't trust that you would be working anyway"
"interesting challenging projects" means "the same boring crap as every other company, running on an incredibly botched and dezorganized codebase".
"competitive pay" means "actual pay is around 1.5 times the minimum allowed pay, and everything else is being siphoned off into (stupid and useless) 'benefits' like massage and fitness discount coupons"
"friendly collective having fun at numerous company events each years" means "it is mandatory for you to participate on our weekend drinking retreats but you'll only find out when we fire you because you're 'not a team player' after you refused to participate on those"9 -
Hello!
I'm a member of an international hacker group.
As you could probably have guessed, your account [cozyplanes@tuta.io] was hacked, because I sent message you from it.
Now I have access to you accounts!
For example, your password for [cozyplanes@tuta.io] is [RANDOM_ALPHABET_HERE]
Within a period from July 7, 2018 to September 23, 2018, you were infected by the virus we've created, through an adult website you've visited.
So far, we have access to your messages, social media accounts, and messengers.
Moreover, we've gotten full damps of these data.
We are aware of your little and big secrets...yeah, you do have them. We saw and recorded your doings on porn websites. Your tastes are so weird, you know..
But the key thing is that sometimes we recorded you with your webcam, syncing the recordings with what you watched!
I think you are not interested show this video to your friends, relatives, and your intimate one...
Transfer $700 to our Bitcoin wallet: 13DAd45ARMJW6th1cBuY1FwB9beVSzW77R
If you don't know about Bitcoin please input in Google "buy BTC". It's really easy.
I guarantee that after that, we'll erase all your "data" :)
A timer will start once you read this message. You have 48 hours to pay the above-mentioned amount.
Your data will be erased once the money are transferred.
If they are not, all your messages and videos recorded will be automatically sent to all your contacts found on your devices at the moment of infection.
You should always think about your security.
We hope this case will teach you to keep secrets.
Take care of yourself.
>> RE >>
Well f### you, thanks for telling my password which is obviously fake. I have sent your details to the local police department, shall rest in peace. Don't earn money by this kind of action. STUPID!14 -
My team handles infrastructure deployment and automation in the cloud for our company, so we don't exactly develop applications ourselves, but we're responsible for building deployment pipelines, provisioning cloud resources, automating their deployments, etc.
I've ranted about this before, but it fits the weekly rant so I'll do it again.
Someone deployed an autoscaling application into our production AWS account, but they set the maximum instance count to 300. The account limit was less than that. So, of course, their application gets stuck and starts scaling out infinitely. Two hundred new servers spun up in an hour before hitting the limit and then throwing errors all over the place. They send me a ticket and I login to AWS to investigate. Not only have they broken their own application, but they've also made it impossible to deploy anything else into prod. Every other autoscaling group is now unable to scale out at all. We had to submit an emergency limit increase request to AWS, spent thousands of dollars on those stupidly-large instances, and yelled at the dev team responsible. Two weeks later, THEY INCREASED THE MAX COUNT TO 500 AND IT HAPPENED AGAIN!
And the whole thing happened because a database filled up the hard drive, so it would spin up a new server, whose hard drive would be full already and thus spin up a new server, and so on into infinity.
Thats probably the only WTF moment that resulted in me actually saying "WTF?!" out loud to the person responsible, but I've had others. One dev team had their code logging to a location they couldn't access, so we got daily requests for two weeks to download and email log files to them. Another dev team refused to believe their server was crashing due to their bad code even after we showed them the logs that demonstrated their application had a massive memory leak. Another team arbitrarily decided that they were going to deploy their code at 4 AM on a Saturday and they wanted a member of my team to be available in case something went wrong. We aren't 24/7 support. We aren't even weekend support. Or any support, technically. Another team told us we had one day to do three weeks' worth of work to deploy their application because they had set a hard deadline and then didn't tell us about it until the day before. We gave them a flat "No" for that request.
I could probably keep going, but you get the gist of it.4 -
Site (I didn't build) got hacked, lots of data deleted, trying to find out what happened before we restore backup.
Check admin access, lots of blank login submissions from a few similar IPs. Looks like they didn't brute force it.
Check request logs, tons of requests at different admin pages. Still doesn't look like they were targeting the login page.
We're looking around asking ourselves "how did they get in?"
I notice the page with the delete commands has an include file called "adminCheck".
Inside, I find code that basically says "if you're not an admin, now you are!" Full access to everything.
I wonder if the attack was even malicious.3 -
Our website once had it’s config file (“old” .cgi app) open and available if you knew the file name. It was ‘obfuscated’ with the file name “Name of the cgi executable”.txt. So browsing, browsing.cgi, config file was browsing.txt.
After discovering the sql server admin password in plain text and reporting it to the VP, he called a meeting.
VP: “I have a report that you are storing the server admin password in plain text.”
WebMgr: “No, that is not correct.”
Me: “Um, yes it is, or we wouldn’t be here.”
WebMgr: “It’s not a network server administrator, it’s SQL Server’s SA account. Completely secure since that login has no access to the network.”
<VP looks over at me>
VP: “Oh..I was not told *that* detail.”
Me: “Um, that doesn’t matter, we shouldn’t have any login password in plain text, anywhere. Besides, the SA account has full access to the entire database. Someone could drop tables, get customer data, even access credit card data.”
WebMgr: “You are blowing all this out of proportion. There is no way anyone could do that.”
Me: “Uh, two weeks ago I discovered the catalog page was sending raw SQL from javascript. All anyone had to do was inject a semicolon and add whatever they wanted.”
WebMgr: “Who would do that? They would have to know a lot about our systems in order to do any real damage.”
VP: “Yes, it would have to be someone in our department looking to do some damage.”
<both the VP and WebMgr look at me>
Me: “Open your browser and search on SQL Injection.”
<VP searches on SQL Injection..few seconds pass>
VP: “Oh my, this is disturbing. I did not know SQL injection was such a problem. I want all SQL removed from javascript and passwords removed from the text files.”
WebMgr: “Our team is already removing the SQL, but our apps need to read the SQL server login and password from a config file. I don’t know why this is such a big deal. The file is read-only and protected by IIS. You can’t even read it from a browser.”
VP: “Well, if it’s secured, I suppose it is OK.”
Me: “Open your browser and navigate to … browse.txt”
VP: “Oh my, there it is.”
WebMgr: “You can only see it because your laptop had administrative privileges. Anyone outside our network cannot access the file.”
VP: “OK, that makes sense. As long as IIS is securing the file …”
Me: “No..no..no.. I can’t believe this. The screen shot I sent yesterday was from my home laptop showing the file is publicly available.”
WebMgr: “But you are probably an admin on the laptop.”
<couple of awkward seconds of silence…then the light comes on>
VP: “OK, I’m stopping this meeting. I want all admin users and passwords removed from the site by the end of the day.”
Took a little longer than a day, but after reviewing what the web team changed:
- They did remove the SQL Server SA account, but replaced it with another account with full admin privileges.
- Replaced the “App Name”.txt with centrally located config file at C:\Inetpub\wwwroot\config.txt (hard-coded in the app)
When I brought this up again with my manager..
Mgr: “Yea, I know, it sucks. WebMgr showed the VP the config file was not accessible by the web site and it wasn’t using the SA password. He was satisfied by that. Web site is looking to beat projections again by 15%, so WebMgr told the other VPs that another disruption from a developer could jeopardize the quarterly numbers. I’d keep my head down for a while.”8 -
Worst legacy experience...
Called in by a client who had had a pen test on their website and it showed up many, many security holes. I was tasked with coming in and implementing the required fixes.
Site turned out to be Classic ASP built on an MS Access database. Due to the nature of the client, everything had to be done on their premises (kind of ironic but there you go). So I'm on-site trying to get access to code and server. My contact was *never* at her desk to approve anything. IT staff "worked" 11am to 3pm on a long day. The code itself was shite beyond belief.
The site was full of forms with no input validation, origin validation and no SQL injection checks. Sensitive data stored in plain text in cookies. Technical errors displayed on certain pages revealing site structure and even DB table names. Server configured to allow directory listing in file stores so that the public could see/access whatever they liked without any permission or authentication checks. I swear this was written by the child of some staff member. No company would have had the balls to charge for this.
Took me about 8 weeks to make and deploy the changes to client's satisfaction. Could have done it in 2 with some support from the actual people I was suppose to be helping!! But it was their money (well, my money as they were government funded!).1 -
In this day and age, what's my fucking excuse for not using a vpn full-time on my phone as well (next to my laptop)?
I do way more personal stuff on my phone anyways and add to that that I've got access to at least three self managed VPN servers...
Yup, going full VPN from now on.29 -
Friend of mine killed his MacBook with some Softdrink.
Just poured it all over his poor a1502.
He let it dry for a few days, it starts to work again.
Except the battery.
Goes on Amazon and buys a new battery.
New battery doesn't work either and so he tells me about it and I as stupid as I am couldn't resist the temptation to finally work on a MacBook like my "hero" Lois Rossmann does.
So turns out the board is good.
Cleaned it up and basically nothing happened to it.
So what's the deal with "los batlerias"?
The first got hit by liquid, the second had a broken connection to a cell.
That could have happened through my friend, installing it without testing it first, or at the seller, so it being a DOA battery.
Now away from the stupidity of my friend and the situation to the actual source for this rant.
Once something happens to a modern Managed battery, the Battery Management System (BMS) disconnects the voltage from the system and goes into an error state, staying there and not powering anything ever again.
For noobs, it's dead. Buy a new one.
But It can be reset, depending you know how to, and which passwords were set at the factory.
Yes, the common Texas instruments BQ20Zxx chips have default passwords, and apple seems to leav them at default.
The Usb to SMBus adaptors arrived a few days ago and I went to prod the BMS.
There is a very nice available for Windows called BE2works, that I used the demo of to go in and figure out stuff. The full version supports password cracking, the demo not.
After some time figuring out how Smart Battery Systems (SBS) "API" works, I got to actually enter the passwords into the battery to try get into manufacturer and full access mode.
Just to realise, they don't unlock the BMS.
So, to conclude, my friend bought a "new" battery that was most likely cut out of a used / dead macbook, which reports 3000mah as fully charged instead of the 6xxx mah that it should have, with 0 cycles and 0hours used.
And non default access.
This screams after those motherfuckers scaming the shit out of people on Amazon, with refurb, reset, and locked fucken batteries.
I could kill those people right now.
Last but not least,
My friend theoretically can't send it back because I opened the battery to fix the broken connection.
Though maybe, it'll get send back anyway, with some suprise in the package.9 -
this.rant == "long";
This is something I feel strongly about, I hope you do too...
I fucking hate it when I hear that people don't care about net neutrality (and I've heard people say it). There is little in this world untouched by shitty corporations encroaching on the little good that is left in this world.
Yes the internet is full of edgy teenagers, incompetent Seniors (both old people and Devs) and god knows what else. But you know what? I pay my money to copy and paste code from SO (we ALL do let's not lie to ourselves) and I'm not paying a special fee to look at this content or that or send this type of text to that kind of person.
Now then to the point... On 14th December 2017 the FCC will vote on whether or not to allow companies like Verizon and - dare I say it - Comcast to charge more to access certain sites or block you access altogether and otherwise control what you say and do.
I for one, say FUCK OFF and I hope you do to. If you can, call or otherwise contact your Congressperson - you can do that here: https://house.gov/representatives/... . If you're not from the US, you can still help! https://www.battleforthenet.com has lots of information on what you can do to help.
I hope you'll all join me in shouting as loud as we can and preventing this moronic idea from going through.
Peace.
this.rant.end();
rant shout help us help we can end this net neutrality wk79 this isn't related to wk79 but it's important idiot10 -
--- New API allows developers to update Android Apps while using them ---
Today, at the Android Dev Summit, Google announced a new API which allows developers to update an app while using it.
Until now, you were forced to close the app and were locked out of it until the update has finished.
This new API adds two different options:
1.) A Full-Screen experience which locks the user out of the app which should be used for critical updates when you expect the user to wait for the update to be applied immediately. This option is very similar to how the update flow worked until now.
2.) A flexible update so users can keep using the app while it's updating. Google also said that you can completely customize the update flow so it feels like part of your app!
For now, the API is only available for early-access partners, but it will be released for everyone soon!
Source:
https://android-developers.googleblog.com/...
19 -
Decompiled a .exe from a program that was written in Visual Basic 6.
Got a public server IP, username and Password that was hardcoded in the program.
Found out it was a SQL Server. I've now got full access to the server.
I want to tell the company about this, but I'm afraid I might get sued. Any advice?12 -
HO. LY. SHIT.
So this gig I got myself into, they have a whitelist of IP addresses that are allowed to access their web server. It's work-at-home. We just got a new internet provider, and it looks like I get a different public IP address everytime I disconnect and connect to the WIFI. And since it looks like the way they work on their codebase is that you either edit the files right on the server or you download the files that you need to work on, make the changes, and then re-upload the file back to the server and refresh the website to see the changes, now I can't access the server because I get different IP addresses. And it's highly inconvenient to keep emailing them to add IP addresses to the whitelist.
No source control, just straight-up download/upload from/to the server. Like, srsly. So that also means debugging is extremely hard for me because one, they use ColdFusion and I've never used that shit before and two, how the hell do you debug with this style of work?
I just started this last Tuesday, and I already want to call it quits. This is just a pain in the ass and not worth my time. I'll be glad to just go back to driving Lyft/Uber to make money while I look for a full-time, PROPER job.
By the way, can I do that to a contracting job? Just call it quits when you haven't even finished your first task? How does this work?17 -
This one time I aliased a coworkers 'sudo' with 'sl' (sl shows a train running across the screen)
And then I removed him from the sudoers group and sudoers list.
I then magnified his screen 200%
Changed his background to a shitty narwhal.
And then full screened a terminal with the 'sl' train stuck in a while loop.
You can't control c out of the terminal.
He solved the first part really quickly, fixing the full screened terminal and exiting out of it, magnification and the background.
But took him 4 days to find that I had fucked up his sudo. Apparently, he didn't need to use sudo in those 4days. It wasn't until he mentioned it out of the blue.
How did he find out about it? He was running an important script that had sudo in it. When he ran the script a train would pop up and his script would terminate early.
He came to me and cursed me to Satan's anus. He then asked me to fix it, but then changed his mind and said that he'd do it himself. After a while he couldn't figure out what I had done.
I walked him through it. Told him that he had to go to his .bashrc file and remove the alias.
Later he comes back to me and curses me to the 12th circle of hell. He found that he was no longer a sudoer. At this point he gave me access to his computer and told me to reverse everything that I had done.
Added him back into the sudoers group and called it a day.
Lesson to be learned? Don't leave your machine unlocked.20 -
The gift that keeps on giving... the Custom CMS Of Doom™
I've finally seen enough evidence why PHP has such a bad reputation to the point where even recruiters recommended me to remove my years of PHP experience from the CV.
The completely custom CMS written by company <redacted>'s CEO and his slaves features the following:
- Open for SQL injection attacks
- Remote shell command execution through URL query params
- Page-specific strings in most core PHP files
- Constructors containing hundreds of lines of code (mostly used to initialize the hundreds of properties
- Class methods containing more than 1000 lines of code
- Completely free of namespaces or package managers (uber elite programmers use only the root namespace)
- Random includes in any place imaginable
- Methods containing 1 line: the include of the file which contains the method body
- SQL queries in literally every source file
- The entrypoint script is in the webroot folder where all the code resides
- Access to sensitive folders is "restricted" by robots.txt 🤣🤣🤣🤣
- The CMS has its own crawler which runs by CRONjob and requests ALL HTML links (yes, full content, including videos!) to fill a database of keywords (I found out because the server traffic was >500 GB/month for this small website)
- Hundreds of config settings are literally defined by "define(...)"
- LESS is transpiled into CSS by PHP on requests
- .......
I could go on, but yes, I've seen it all now.12 -
I was working as a contractor for a client who just got enough funding to hire a full-time dev. I lovingly referred to him as "Mr. Koolaid" because he was obsessed with whatever the newest hotness was and cried constantly about how the 3-year-old code-base didn't use The Next Big Thing(tm). This was my first interaction with him:
Mr. Koolaid: I'd like access to the github repository. My username is xxxx.
Me: We currently aren't hosting the code on github. If you send me your public ssh key, I'll get you access to the private server.
Mr. Koolaid: I'd like to access the github repository.
Me: It's not on github; send me your public key and I'll get you access.
Mr. Koolaid: Can we skype real quick? You don't need my public key to grant me access to the github repo.
*Mr. Koolaid proceeds to forward me github's documentation on adding users to an organization and the documentation for adding users to a private repo. The email is written in a very passive-aggressive tone.*
ಠ_ಠ9 -
The bossman asked if our signup service sends an automated email after we successfully process someone's payment or when we promote them to full customer.
That sounds like a simple query, yeah?
Well.
Here's some background:
We have four applications; one in React, three in Rails. I'll replace their names to retain some anonymity.
1) "IceSkate" is the React app, and it's a glorified signup form. (I wrote this one.)
2) "Bogan" is the main application, and is API-only; its frontend has been long since deprecated by the following two:
3) "Bum" is a fork of "Bogan" that has long since diverged. It now contains admin-only tools.
4) "Kulkuri" is also a fork of "Bogan" that has long since diverged. It now contains tools specifically for customers, which they can access.
All but IceSkate (obv) share a database.
Here's how signups happen:
Signups come in from IceSkate, which hits a backend API on Bogan. Bogan writes the data to the database, charges the card immediately, and leaves the signup for moderation.
And here's how promotion from signup to customer happens:
Bum has a view allowing admins to validate, modify, and "promote" a signup to a full customer. Upon successful promotion, Bum calls "ServerWrap", a module which calls actions on the other applications; in this case: Bogan.
Bogan routes execution through three separate models before calling "ServerWrap" again, this time calling KulKuri.
Finally, KulKuri actually creates the customer!
After KulKuri finishes creating the customer, execution resumes on Bogan, which then returns, causing execution to resume on Bum. Bum then runs through several other models, references the newly-created customer object (as all three share a database), and ... updates the customer with its current data, and then updates the signup object. After all of this, it finally shows the admin the "new customer" view.
It took me 25 minutes to follow the chain of calls, and I still don't know quite what's going on. I have no idea if any of it sends an email or not -- I didn't see any signs of this, but I very easily could have overlooked something.
So, to answer bossman's question... I asked the accounting people if they send the email manually. If they don't, it's automatic, which means I missed something and get to burrow through that mess all over again!
I really hope I missed something; otherwise I need to figure out how and where (and when!) to send the email...
just...
errrrgghh9 -
Not just another Windows rant:
*Disclaimer* : I'm a full time Linux user for dev work having switched from Windows a couple of years ago. Only open Windows for Photoshop (or games) or when I fuck up my Linux install (Arch user) because I get too adventurous (don't we all)
I have hated Windows 10 from day 1 for being a rebel. Automatic updates and generally so many bugs (specially the 100% disk usage on boot for idk how long) really sucked.
It's got ads now and it's generally much slower than probably a Windows 8 install..
The pathetic memory management and the overall slower interface really ticks me off. I'm trying to work and get access to web services and all I get is hangups.
Chrome is my go-to browser for everything and the experience is sub par. We all know it gobbles up RAM but even more on Windows.
My Linux install on the same computer flies with a heavy project open in Android Studio, 25+ tabs in Chrome and a 1080p video playing in the background.
Up until the creators update, UI bugs were a common sight. Things would just stop working if you clicked them multiple times.
But you know what I'm tired of more?
The ignorant pricks who bash it for being Windows. This OS isn't bad. Sure it's not Linux or MacOS but it stands strong.
You are just bashing it because it's not developer friendly and it's not. It never advertises itself like that.
It's a full fledged OS for everyone. It's not dev friendly but you can make it as much as possible but you're lazy.
People do use Windows to code. If you don't know that, you're ignorant. They also make a living by using Windows all day. How bout tha?
But it tries to make you feel comfortable with the recent bash integration and the plethora of tools that Microsoft builds.
IIS may not be Apache or Nginx but it gets the job done.
Azure uses Windows and it's one of best web services out there. It's freaking amazing with dead simple docs to get up and running with a web app in 10 minutes.
I saw many rants against VS but you know it's one of the best IDEs out there and it runs the best on Windows (for me, at least).
I'm pissed at you - you blind hater you.
Research and appreciate the things good qualities in something instead of trying to be the cool but ignorant dev who codes with Linux/Mac but doesn't know shit about the advantages they offer.undefined windows 10 sucks visual studio unix macos ignorance mac terminal windows 10 linux developer22 -
The website for our biggest client went down and the server went haywire. Though for this client we don’t provide any infrastructure, so we called their it partner to start figuring this out.
They started blaming us, asking is if we had upgraded the website or changed any PHP settings, which all were a firm no from us. So they told us they had competent people working on the matter.
TL;DR their people isn’t competent and I ended up fixing the issue.
Hours go by, nothing happens, client calls us and we call the it partner, nothing, they don’t understand anything. Told us they can’t find any logs etc.
So we setup a conference call with our CXO, me, another dev and a few people from the it partner.
At this point I’m just asking them if they’ve looked at this and this, no good answer, I fetch a long ethernet cable from my desk, pull it to the CXO’s office and hook up my laptop to start looking into things myself.
IT partner still can’t find anything wrong. I tail the httpd error log and see thousands upon thousands of warning messages about mysql being loaded twice, but that’s not the issue here.
Check top and see there’s 257 instances of httpd, whereas 256 is spawned by httpd, mysql is using 600% cpu and whenever I try to connect to mysql through cli it throws me a too many connections error.
I heard the IT partner talking about a ddos attack, so I asked them to pull it off the public network and only give us access through our vpn. They do that, reboot server, same problems.
Finally we get the it partner to rollback the vm to earlier last night. Everything works great, 30 min later, it crashes again. At this point I’m getting tired and frustrated, this isn’t my job, I thought they had competent people working on this.
I noticed that the db had a few corrupted tables, and ask the it partner to get a dba to look at it. No prevail.
5’o’clock is here, we decide to give the vm rollback another try, but first we go home, get some dinner and resume at 6pm. I had told them I wanted to be in on this call, and said let me try this time.
They spend ages doing the rollback, and then for some reason they have to reconfigure the network and shit. Once it booted, I told their tech to stop mysqld and httpd immediately and prevent it from start at boot.
I can now look at the logs that is leading to this issue. I noticed our debug flag was on and had generated a 30gb log file. Tail it and see it’s what I’d expect, warmings and warnings, And all other logs for mysql and apache is huge, so the drive is full. Just gotta delete it.
I quietly start apache and mysql, see the website is working fine, shut it down and just take a copy of the var/lib/mysql directory and etc directory just go have backups.
Starting to connect a few dots, but I wasn’t exactly sure if it was right. Had the full drive caused mysql to corrupt itself? Only one way to find out. Start apache and mysql back up, and just wait and see. Meanwhile I fixed that mysql being loaded twice. Some genius had put load mysql.so at the top and bottom of php ini.
While waiting on the server to crash again, I’m talking to the it support guy, who told me they haven’t updated anything on the server except security patches now and then, and they didn’t have anyone familiar with this setup. No shit, it’s running php 5.3 -.-
Website up and running 1.5 later, mission accomplished.6 -
It was a normal school day. I was at the computer and I needed to print some stuff out. Now this computer is special, it's hooked up onto a different network for students that signed up to use them. How you get to use these computers is by signing up using their forms online.
Unfortunately, for me on that day I needed to print something out and the computer I was working on was not letting me sign in. I called IT real quick and they said I needed to renew my membership. They send me the form, and I quickly fill it out. I hit the submit button and I'm greeted by a single line error written in php.
Someone had forgotten to turn off the debug mode to the server.
Upon examination of the error message, it was a syntax error at line 29 in directory such and such. This directory, i thought to myself, I know where this is. I quickly started my ftp client and was able to find the actual file in the directory that the error mentioned. What I didn't know, was that I'd find a mountain of passwords inside their php files, because they were automating all of the authentications.
Curious as I was, I followed the link database that was in the php file. UfFortunately, someone in IT hadn't thought far enough to make the actual link unseeable. I was greeted by the full database. There was nothing of real value from what I could see. Mostly forms that had been filled out by students.
Not only this, but I was displeased with the bad passwords. These passwords were maybe of 5 characters long, super simple words and a couple number tacked onto the end.
That day, I sent in a ticket to IT and told them about the issue. They quickly remedied it by turning off debug mode on the servers. However, they never did shut down access to the database and the php files...2 -
I got transferred to a new city at the client location for few months.
I got the credentials for internet access, but I was not able to get internet. I contacted the admin and after troubleshooting it for few minutes, he asked where is Internet Explorer in this laptop?
I immediately understood, why they need me here. I was using a MacBook. 😐
PS: In the end, he gave me the full access without any credential requirements.1 -
Why is there so much hate against QA in general??
I read tons of rants about how bad testers are... and as a dev who does a lot of QA work, IT SUCKS!
We (devs) have to accept that are work needs to be tested! Otherwise we want be successful with our products.
BUT the testers need to know the development business! They should be trained at the same level as the devs are.
BECAUSE if the mug on my desk is smarter than the tester it is not going to work!
If the tester has full access to all the technologies, environments and tools (and are capable of using it) he has the ability to HELP!
I THINK that testing should be more than just follow predefined steps and let a random tool generate a bugreport.
I am sure that some of you are lucky enough to work with highly skilled testers so please let them help18 -
About 2 years ago, our management decided to "try outsourcing". I was in charge for coordinating dev tasks and ensuring code quality. So management came up with 3 potential candidates in India and I had to assess them based on Skype calls and little test tasks. Their CVs looked great and have been full of "I'm a fancy experienced senior developer." ....After first 2 calls I already dismissed two candidates because they had obviously zero experience and the CV must have been fake. ..After talking to the third candidate, I again got sceptical. The management, however, started to think that I'm just an ass trying to protect my own position against outside devs. They forced me to give him a chance by testing him with a small dev task. The task included the following statement
"Search on the filesystem recursively, for folders named 'container'. For example '/some_root_folder/path_segments/container' " The term 'container' was additionally highlighted in red!
We also gave him access to a git repo to do at least daily push. My intention was to look at his progressions, not only the result.
I tried the task on my own and it took me two days, just to have a baseline for comparison. I, however, told him to take as much time as he needs. (We wanted to be fair and also payed him.)
..... 3 weeks went by. 3 weeks full of excuses why he isn't able to use git. All my attempts to help him, just made clear that he has never seen or heard of git before. ...... He sent me his code once a week as zip per email -.- ..... I ignored those mails because I made already my decision not wanting to waste my time. I mean come on?! Is this a joke? But since management wanted me to give him a chance .... I kept waiting for his "final" code version.
In week 5, he finally told me that it's finished and all requirements have been met. So I tried to run his code without looking at it ..... and suprise ... It immediately crashed.
Then I started to look through the code .... and I was ..... mind-blown. But not in a good way. .....
The following is what I remember most:
Do you remember the requirement from above? .... His code implementing it looked something like this:
Go through all folders in root path and return folders where folderName == "/some_root_folder/path_segments/container".
(╯°□°)╯︵ ┻━┻
Alone this little peace of code was on sooooooo many levels wrong!!!!! Let me name a few.
- It's just sooooo wrong :(
- He literally compared the folderName with the string "/some_root_folder/path_segments/container"...... Wtf?!?
- He did not understand the requirement at all.
- He implemented something without thinking a microsecond about it.
- No recursive traversal
- It was Java. And he used == instead of equals().
- He compares a folderName with a whole path?!? Wtf.
- How the hell did he made this code return actual results on his computer?!?
Ok ...now it was time to confront management with my findings and give feedback to the developer. ..... They believed me but asked me to keep it civilized and give him constructive feedback. ...... So I skyped him and told him that this code doesn't meet the requirements. ......... He instantly defended himself . He told me that I he did 'exactly what was written in the requirements document" and that there is nothing wrong. .......He had no understanding at all that the code also needs to have an actual business purpose.
(╯°□°)╯︵ ┻━┻
After that he tried to sell us a few more weeks of development work to implement our "new changed requirements" ......
(╯°□°)╯︵ ┻━┻
Footnote: I know a lot of great Indian Devs. ..... But this is definitely not one of them. -.-
tl;dr
Management wants to outsource to India and gets scammed.8 -
Internship Rant #2
I can't believe I'm hating my job right now. It sucks because I have never coded in javascript and they expect me to code in javascript. I don't even know what I am doing, but I'm trying my best. I kinda have something already, but the worst part of it is that my boss comes in once in a while and sits beside me looking at my screen and of course, he expects me to tell him what I have been doing and what progress I have done. It's stressful cause I specifically told him that I have never coded in JavaScript and he still thinks I can get things done in a few days.
Perks of new job:
- I can take a bath there whenever I want
- gr8 bathroom 11/10
- gr8 heater, no need to have my hands shaking all the time
- workspace is nice and everyone has an extension so my phone and laptop are always on full charge
- flexible work schedule
- easy access to company files hehehe including credentials
Anyways, so I have to deal with this for three months.16 -
Did I every tell you about that time I scared a boss (not mine, he was in the room) so much, that he was to scared to enter my office for the next couple of weeks? 😅
Good times 😊
Tl;dr: He was the reason I was working at max capacity and then he started complaining that shit wasn't working.
Full story:
I was out of office, building up a new site. I was the only IT working that day, others were out on vacation.
Suddenly I start getting flooded with calls from other sites, that nothing works. It is so bad, that my boss can't reach me on the company phone, so he calls me on my private phone.
Apparently all the servers are down.
So me into a taxi, heading for the main office.
When I get there I just start booting the servers on by one, because they didn't like that they had lost power. While I'm working, my boss is standing there, ready to help.
Another boss enters the office and goes: "I can't access Navision". To which I quickly reply something like: "Well everything is down, I'm the only one who can fix it and I'm working as fast as I can".
Two weeks later, another employee tells me, that the other boss has been running all his equipment off a battery backup, since the failure, because his power cord failed. He spilled a cup of coffee on it and therefore was the reason, that all the servers lost power (bad setup, I know). And apparently I was so frightening that he didn't have the courage to ask for a new power cord 😂
Best thing was that my boss never stopped me or told me that I did something wrong.2 -
Admin Access
Have you ever been in a position where you become the de-facto person who works with a certain tool, but are denied full admin access to that tool for no real reason?
Two years ago I was put on the Observability squad and quickly discovered it was my thing, implementing tracking and running queries on this third-party tool, building custom stuff to monitor our client-side successes and failures.
About a year ago I hit the point where if you asked anyone "Who is the go-to person for help/questions/queries/etc. for this tool", the answer was just me lol. It was nice to have that solid and clear role, but a year later, that's still the case, and I'm still not an admin on this platform. I've asked, in an extremely professional way armed with some pretty good reasons, but every time I'm given some lame non-answer that amounts to No.
As far as I'm aware, I'm the only dev on our team at all who uses custom/beta features on this site, but every time I want to use them I have to go find an admin and ask for an individual permission. Every time. At the end of 2020 it was happening once a month and it was so demoralizing hitting up people who never even log into this site to ask them to go out of their way to give me a new single permission.
People reach out to me frequently to request things I don't have the permissions to do, assuming I'm one of the 64 admins, but I have to DM someone else to actually do the thing.
At this point it feels very much like having to tug on the sleeve of a person taller than me to get what I need, and I'm out of ways to convince myself this isn't demoralizing. I know this is a pretty common thing in large companies, meaningless permissions protocols, and maybe it's because I came from IT originally that it's especially irritating. In IT you have admin access to everything and somehow nobody gets hurt lol-- It still blows my mind that software devs who make significantly more money and are considered "higher up" the chain (which i think is dumb btw) are given less trust when it comes to permissions.
Has anyone figured out a trick that works to convince someone to grant you access when you're getting stonewalled? Or maybe a story of this happening to you to distract me from my frustration?13 -
I've run into problems with the app I'm working on, the problems are related to issues regarding code.
No in fact it's related the last guy who wrote the app, the code has no comments and the variable names make no sense, the only comments in the code are blocks of code... With no reason as to why it was commented.
I have to add in some checks to determine if a person that has logged in is a full member or not (full member has access to the feature I've added) and the way the guy has made this app works makes no sense to me at all.
I've tried my best to avoid all contact with his code because it makes me want to yell out in frustration.
But for this one case I have to work with what's there.
I know I've mentioned this before but I've hit my limit yet again.
And for those who don't know this guy managed to scrape together skeleton code from two apps to make part of this app, rather than using parts of the other apps he left out code that was specifically made for the other apps, (majority of the commented out code).
One app was a taxi app and from the looks of it the feature he used was to get GPS location (which I don't understand before Google maps is a think after all... The taxi app USES Google maps), the other app is some sort of funeral webcasting app (I found code imports for it, without any actual code).
I don't actual understand how this guy could put this together without not thinking "maybe this is a bad idea"
Always code as if the person who ends up maintaining your code is a violent psychopath who knows where you live
I'm that psychopath right now..... Fuck that guy (don't know where he lives though)1 -
I need a new 'main' language to do all my projects in as java is kind of grinding away at my psyche.
Golang I liked quite a lot when I used it for my job a year ago, I'll give that a try..
Golang installed and up and working fine.
Oh, I know lets see if there are GLFW bindings for golang. And sure there are lets go!
Oh I need gcc and mingwex + mingw32 which I will acquire through cygwin.
hmm.. mingwex + mingw32 not found and my drive is almost full. I'll reinstall on my D:\ drive before continuing troubleshooting.
> Delete C:\Cygwin Access denied.
> cmd rmdir c:\test /s /q Access denied.
> Change permissions Access denied.
No problem I just don't own this object!
> Change to be the 'object owner' Success!
> Change permissions Success!
> Delete C:\Cygwin Access denied.
> cmd rmdir c:\test /s /q Access denied.
> takeown /F C:\Cygwin /A /R /D Y Success!
> cmd rmdir c:\test /s /q Access denied.
At this point it would be more efficient to manually open up my ssd, and using a fridge magnet change every single bit to be exactly what I want it to be.
Or install linux.
7 -
The state of informatics education is just saddening.
You study "Software Development" and then you get to do exams asking you to do some basic linux commands - with full internet access on a computer. People are allowed to fail this and study on. On the other hand you have to do real coding with pen and paper, have to calculate from hex to bin to dec and stuff and most Importantly - know about all kinds of math stuff completely unreleated to cs.
Graph Theory absolutely makes sense in my eyes, but not if it's plain fucken math without even mentioning computers or applications of it. But if you fail that everyone looks weird at you.
I know about coding. I got A's and B's in all the coding exams _without even doing much for them_ but then fail all the fucken math exams. Makes no sense. FML.7 -
I was supporting a legacy CRM app which front end used Visual Basic 6 and almost the entire business logic was written on SQL store procedures.
A "feature" of the product was the open code, anyone with admin access could modify forms, code and store procedures.
We also sold "official" (and expensive) consulting services to modify the code.
A long time customer owned this thing and it was heavily customized. They had hired us to change something, hired a third party to make other changes and decided to modify some stuff themselves because, why not?
Suddenly they came to product support asking to fix a bug. The problem happened on a non customized form.
After reviewing, I realized the form used several of the modified store procedures in the business layer. I tried saying we don't support custom code but my boss was being pushed and said "look into it"
All 3 parties denied responsibility and said their changes were NOT the problem (of course). Neither of them commented or documented their changes.
The customer started to threaten to sue us.
I spent 5 full days following every field on the form through the nested and recurrent SQL store procedures and turns out it was a very simple error. A failed insert statement.
I was puzzled of why the thing didn't throw any error even while debugging. Turns out in SQL 2003 (this was a while ago) someone used a print line statement and SQL stopped throwing errors to the console. I can only assume "printing" in SQL empties the buffered error which would be shown in the console.
I removed the print statement and the error showed up, we fixed it and didn't get sued
:)4 -
So, to anyone defending IBM at this point, a member of a client's offshore team used their paystub as test data. Aaaaand I was horrified by what I saw.
Their pay is less than $2/hr ($3973/yr, 300k INR).
I can't even. Not only that someone would pay so little to a supposedly degreed professional (I question the validity of that claim based on performance, that's a story for another time), but that companies feel comfortable giving full production system access to people I would not blame for taking bribes.
Fuck.14 -
I've seen many devs doing crazy things in my entire career till now. But this one dude stands out.
He used to:
- Push binaries to git repo
- Use some old libraries which were used during Indus Valley civilization
- Had no sense of database and used to delete random data from it and call it as TESTING (Thank God! I never gave him prod access)
- And on top of this, he had an ass full of attitude!2 -
Okay, so I have a question...
Although unethical, I’m considering disabling a clients services without warning. They’re 6 months behind on paying me and I have complete access over their network infrastructure. Upon reading our contract, I’ve made the mistake of incorporating services will be discontinued due to lack of payment... But, I know if I disable things they’re not smart enough to figure out why they aren’t working and call me... That’s when I’ll tell them that I can’t preform work until past bills are paid in full.
I’m located somewhere in the US. Is this too unethical, too illegal? I just want my fucking money... Thanks!
EDIT: Yes I have invoiced then monthly. They’ve received them because I had deliver al invoices to avoid the “oh I never received it” claims.25 -
Hello devRant, this is going to be my first time posting on the site.
I work for a gaming community on the side, and today one of the managers asked me to implement a blacklist system into the chat and reactivate the previously existing one temporarily. This shouldn't have had any issues and should've been implemented within minutes. Once it was done and tested, I pushed it to the main server. This is the moment I found out the previous developer apparently decided it would be the best idea to use the internal function that verifies that the sender isn't blacklisted or using any blacklisted words as a logger for the server/panel, even though there is another internal function that does all the logging plus it's more detailed than the verification one he used. But the panel he designed to access and log all of this, always expects the response to be true, so if it returns false it would break the addon used to send details to the panel which would break the server. The only way to get around it is by removing the entire panel, but then they lose access to the details not logged to the server.
May not have explained this the best, but the way it is designed is just completely screwed up and just really needs a full redo, but the managers don't want to redo do it since apparently, this is the best way it can be done.7 -
Had an online programming interview for a start-up, writing code into a shared Google doc while on the phone with the interviewer.
Specifically told that I could just use pseudocode, so I did, without worrying about access modifiers, full variable declarations and use of "new" for making objects, or specific type declarations, etc.
Got told at the end that I "lack experience, and really should have defined access modifiers, declared types, and so on, and that they needed someone proficient in Java. That was the first time I knew about their Java requirement.5 -
This is response I got from my ex tech lead in a company that I left six months ago..
Btw account is registered on my private email and has admin access to Slack full of confidential files.
Don't even know why I worked there..
13 -
MySQL databases beginning with "test" in the name gives even people without login full access to its tables.
Somebody deleted all tables so we had to get a backup from out hoster.
Thanks MySQL.1 -
I’m LOLing at the audacity of one of our vendors.
We contract with a vendor to build and maintain a website. Our network security team noticed there was a security breach of the vendor’s website. Our team saw that malicious users gained access to our Google Search console by completing a challenge that was issued to the vendor’s site.
At first, the vendor tried to convince us that their site wasn’t comprised and it was the Google search Console that was compromised. Nah dude. Our Search Console got compromised via the website you maintain for us. Luckily our network team was able to remove the malicious users from our search console.
That vendor site accepts credit card payments and displays the user’s contact info like address, email, and phone. The vendor uses keys that are tied to our payment gateway. So now my employer is demanding a full incident report from the vendor because their dropping the ball could have compromised our users’ data and we might be responsible for PCI issues.
And the vendor tried to shit on us even more. The vendor also generates vanity urls for our users. My employer decided to temporarily redirect users to our main site (non vendor) because users already received those links and in order to not lose revenue. The vendor’s solution is to build a service that will redirect their vanity urls to our main site. And they wanted to charge us $5000 usd for this. We already pay them $1000 a month already.
WTAF we are not stupid. Our network service team said we could make the argument that they do this without extra charge because it falls in the scope of our contract with them. Our network team also said that we could terminate the contract because the security breach means they didn’t render the service they were contracted to do. Guess it’s time for us to get our lawyer’s take on this.
So now it looks like my stakeholders want me to rebuild all of this in house. I already have a lot on my plate, but I’m going to be open to their requests because we are still in the debrief phase.2 -
Imagine: It's the year 2109.
You pay a subscription of $2.00/week to be able to shut off your alarm.
You open up your laptop and after watching 5 un-skippable ads, Windows 35 boots up so you can start working.
You start VSCode and it requires you to watch an ad, to boot up.
You pay a subscription of $29.99/month to get full access to your keyboard.
You pick up your mobile phone and you have to pay a subscription of $49.99/month to be able to unlock your phone as many times as you want.
Your mobile network allows you to make 1 phone call free for the day, post which you have to pay $1.50 per call. Data costs are seperate and its sold to you as a package, labled as an "Offer".
Your salary is compared to peanuts even though tech has gone beyond its limits.
Life is Good.11 -
There’s no better feeling then doing a full server rebuild, modifying several projects heavily to be portable and keep working under new infrastructure and loosing access to dependent systems.
Migrating everything across, firing up Apache.... and BAM the fucker just works and ssl labs gives it an A (it was a giant F with multiple vulnerabilities yesterday on the old server)7 -
Our Professor gave us a predefined Datebase with access methods. The whole database is full of
value == 0 ? false : true
How can this guy teach programming languages when he can't apply a simple != operand6 -
> Startup: ok listen up, we got this super cool thing we want to do with Twilio. Doesn't get any easier: some calls to book a restaurant, you ask for booking data and save that on some db.
> iHateForALiving: I'm on it. We got a couple weeks of development, never worked with Twilio, but should be easy enough
> Startup: Hold it big guy, we can't just write code like this. There's this OTHER developer with a super cool framework he wrote himself, it supports OAuth2 and multitenancy, written in Huskell, microservices to authenticate several apps all working concurrently in our environment, some orchestrator, cloud computing on AWS, you're going to love it. There's this Postman project with 200-something calls (the ones I need for my project, one and only consumer for those APIs, are 5 including the login)
> iHateForALiving: You are aware you'll have approximately six clients and they'll pay some 30 bucks each per month, aren't you?
> Startup: You don't understand, this infrastructure is CRITICAL for the future of our company
> ffwd 6 months
> iHateForALiving: guys we had this 2 weeks project and it's taking months, I'm ready, what is going on there?
> Startup: someone killed our DB, the OTHER developer pushed on git the access credentials :(
THE FULL MOON IS DRAWING NEAR AND THE FUCKING WERECODERS STRIKE AGAIN! -
Owner of the company I freelance for: The proposal I sent yesterday to [PR Company we do work for] got bounced back. They said it was incomplete.
Me: Well no shit, they didn't provide us with a detailed itinerary of everything they need, nor did they give us access to sections that they want copied to the new website. I can't and won't provide a full quote when I don't have all the information needed to build one. I would be guessing at this point and it would be shitty guesses.
Owner: Here's a proposal they got from another company. We need to make it like this [sends file].
Me: They mention a one sentence footnote about what I laid out. Everything else is marketing jargon that I don't know, because I'm a developer, not a marketer. I'm not sure what it is you want me to do, because you're asking the wrong person.
Owner: Are you going to help me or not?
Me: Help you with what? You got my notes. Paraphrase them if you need to, but I have more important things on my agenda, like being a web developer, not a proposal drafter. -
What kinda blockhead moron at my ISP decided that I require a new modem & router that is managed by THEM! I'm not really baffled by the privacy concerns but more about that I am unable to manage my home network. I literally cant open ports, manage ip adresses and do other shit I NEED FOR WORKING AT HOME.
I cant print!
I cant read mail!
I cant access my network drives!
My website is down!
Colleagues are asking why the Minecraft server is offline!
And using the new brick they gave me as a modem only, is not possible as there is no setting to be found to turn the router off!
And if I call their imbecile's of support they tell my that if they change a setting, that my phone will disconnect. (The phone line is also connected to the modem!) And right after the support guy said that and wanted to start explaing me further steps, his settings apply and I get kicked off the line. Bruh! You knew this would happen so why didnt you work around it?!?!?!!
Thing is, this new modem isnt even necessary as it doesnt use a different standard like fiber for example.
If I cant figure out how to get my stuff to work again, I swear to god I will turn on full Karen mode and ramble into their next store looking to get some manager fired!
(Ill post an update soon!)7 -
I have come across the most frustrating error i have ever dealt with.
Im trying to parse an XML doc and I keep getting UnauthorizedAccessException when trying to load the doc. I have full permissions to the directory and file, its not read only, i cant see anything immediately wrong as to why i wouldnt be able to access the file.
I searched around for hours yesterday trying a bunch of different solutions that helped other people, none of them working for me.
I post my issue on StackOverflow yesterday with some details, hoping for some help or a "youre an idiot, Its because of this" type of comment but NO.
No answers.
This is the first time Ive really needed help with something, and the first time i havent gotten any response to a post.
Do i keep trying to fix this before the deadline on Sunday? Do i say fuck it and rewrite the xml in C# to meet my needs? Is there another option that i dont even know about yet?
I need a dev duck of some sort :/39 -
The Sys Admin limited everyone's access on an application through the admin panel. He forgot I have access to the database and I now have full access 😂1
-
At my last job, I created a Google Map for a client, where you could click on any department from France, and it would tell you about all the antennas (think "outpost") of his society. I used a Google Fusion Table where I registered everything: the datas to display, the coordinates for every departments and for every region.
I then wrote a 15-pages long document to tell how to maintain that, since I used my personal Google account to create the map. Anyone having a full access to the website should be able to recreate the map from nothing and witout writing a single line of code.
Then I switched project, the company kind of fucked me over, and I just received a mail saying that Google Fusion Table will be put down in a year.
I just hope they didn't receive the mail. -
Another story of mine is when me and my friends were playing games in the school library. I decided to fuck around on windows XP file systems to see what I could find. After clicking around for a bit, I found a way to access all of the student files in my year, with full access privileges.
What ended up happening was that my friends figured it out too, many of them changing files and writing messages for the other people in our class. After writing messages to each other and leaving messages to students here and there, I decided that it probably should be a good idea to report this.
The response at the IT room wasn't like the woman's response (bitch from last rant). They were like "Cool, thanks." The fix happened immediately and I wasn't really told off. It was a good day c: -
Sometimes I have to work with physical hardware. There are over 300 machines in our lab, split among two subnets. But for some reason, I can never access my machines by hostnames.
Every other week, there's an IP conflict on this network, requiring me to log into the active directory server and delete old DNS entries. This usually happens because someone decided to deploy 64 VMs on a huge server, all at once, didn't boot them with a delay, let alone with with a warning to IT.
Then when my superior asks how my progress has been and I respond with "I can't even get the machines to ping each other by hostname, there's something wrong with the DNS:, I get the following response: "HOW COME NOBODY ELSE IS HAVING PROBLEMS WITH THIS. YOU'RE FULL OF SHIT", from someone who spends 90% of the year abroad, working remotely.5 -
GDPR is about to happen.
Has anyone read the provisions?
It's like they put some flat earther anti-vaxers in a room and made them scribble up a law.
For those who don't know - it's a new, EU-wide "data privacy" law that's about to take effect on May 25th.
The gist of it is that if you fuck up even a little bit, you get to personally pay a fine of up to 10 Million Euros (for companies there's a separate clause, this is for employees only), or/and 2-3 years in jail if that fuck-up has caused material damages.
That little fuck-up can be as simple as losing a tiny amount of data between back-ups, or entrusting a third party with full access to some data (which is not prohibited) without controlling 100% what he can do with that data (which IS prohibited).
I shit you not, these are the explicit articles of that law.
If it is enforced in this way, it is the swift death of European economy. Just because some retards didn't read the privacy policy before agreeing to it, and then made a shit storm, everyone has to suffer.50 -
Fun fact, I left my old job in October last year. I still have a full access to their github. With admin privileges. I could just delete all their repositories. This is too much power.6
-
I don't know how managers are planning deadlines and counting December as a full working month!
Most companies that I worked with, count either half a month or push the deadline until the end of January when the workforce is back but not here.
Our division manager has promised the customer that the production environment will be ready on the first week of January, without even consulting the team or checking the schedule like WTF!
The person responsible for setting the infrastructure was on vacation for 2 weeks and he didn't hand over the access to production or share the progress done.
Fast forward, the manager went to slack and pinged the whole company with full caps message that the production should be done today.
Fun times :/7 -
Me: "I'll use my old laptop as a server to access via SSH to do my Docker Tests. I don't wanna use Keyboard and Screen. So, I'll set up Debian Server"
Also me: "Oh, full disk encryption with a preboot Login required. That's such a GOOD idea"
Introducing: Stupid me 🤗 -
SharePoint things that I get yelled at by customers for:
Setting up page permissions wrong (even though the real problem is that a coworker didn’t check the page in)
Writing the workflow wrong and nobody is getting emailed (even though they didn’t select who to send the email to)
Not magically knowing that they wanted the new intern (who started Tuesday) to be given full design rights on their page
Not magically knowing that their discussion mod quit a year ago (before I started here) and now nobody can feature a post
Not spinning up an entire new site so that they could post a link to a single sign up sheet for their team (of 10 people) barbecue
Somehow making it so MS Edge can’t handle high res images correctly (because I totally created Edge (which isn’t even a supported browser here))
Not responding immediately when they submitted a ticket at 7:00pm (I’m off at 5) asking me to change one word on a page they have edit rights to
Not giving their admin assistant global design rights for our entire organization
Not giving them access to a confidential folder that has nothing to do with their job
Telling the owner of aforementioned folder that they’re not allowed to store confidential data in SharePoint
Making workflows too confusing for them to figure out
Fixing shit workflows that their ex coworker built wrong
Generally having the word SharePoint associated with my name2 -
So I log into a great new site with my development machine. 64G of RAM, and 2 hex core CPU's; GTX 1070 video, SSD, etc. 4K display screen. (Motherboard is 5 years old, not trying to brag, just give context). I regularly put 8 pages of text on the screen side by side. Split ergonomic keyboard.
It wants me to load a mobile app for "full access".
Yea, why look at the world with wide open eyes when you can view everything through a cardboard toilet paper tube and type with your thumbs???
== John == -
Started a job as a full stack developer. My first task was shocking! Do these small edits on this backend script that collects stuff from one database and edits the entries in another... piece of cake so far!
Here is the project on the TFS...
HOLD ON! IS THIS VISUAL BASIC?!!
I came here to do .Net framework development and .Net Standard... I wasn’t told that there will be VB, I have never used vb.net before.
Now... that I’m going to maintain this script in the future, I decided to rewrite it in C#, few things I learned on my journey of doing this:
1- There is an access modifier in VB called Friend
2- There is a data structure/type called Collection, it’s a value,key pair! Not key value pair... Value first, then key!!
3- Do you know how null is null everywhere?!! In VB they call it Nothing! Yes, as in...
if(myVar == nothing)
{
//stuff
}
Asking the guy responsible for that choice... he thinks VB is easier to read than C#
I DONT WANT YOU TO READ IT, I WANT IT TO MAKE SENSE AND WORK WITH THE REST OF THE C# CODE WE HAVE!!9 -
I got a median-pay front-end job through a contractor (after a contract from hell...but yeah I didn't learn...) and I'm getting zero assignments after a month and nobody seems to know what my role is.
I'm one month in, and every week I have to email my boss to remind her to sign my paycheck, which is stressful because I'm charging for my time because my assignments are like "Research this" or "look at this Wordpress theme or brand guide". The team never communicates but once a week, and I'm beginning to believe that I'm not a good fit for the team because they are impossible to get a hold of and the sysadmin won't give me access to anything even when I CC my boss. (I don't want to grief this guy...) Despite this, I've been told privately by higher-ups on a few occasions that they plan to hire me full time by November...
My SO thinks that the reason people are so dodgy toward me is because they literally do nothing and I'm breaking the flow of that by asking for things. I'm used to agency output, which can be toxic and where everything is 'due yesterday', and I'm watching this team work on assignments ten times slower than normal. ("You want to change a phone number on a website footer? You'll get it next week...maybe." I can't step on toes because I don't have access...) I'm perfectly fine with having to wear several hats at a low-stress job, but I can't even get my first assignment and I'm still being asked who I am in weekly meetings, or asked things like, "Would you even be willing to relocate here?" (I actually live DOWN THE STREET FROM THE OFFICE!! WHY DO I HAVE TO BE REMOTE? Why am I being asked this question?) It feels like my boss impulse hired me, with zero input from the team, and had no real reason to hire me in the first place...
It could also be another issue: Yeah, my experience is in PHP/JS/React, "but here have a seven year old .NET project and a company laptop with zero documentation and make this form import data to a database we know nothing about." Lead dev won't even talk to me.
I feel like a joke.2 -
When customers pretend to really care about security but then share server folders to "everyone" 🤨1
-
Fuck you Steam, just fuck you and your price politics.
I have a Swiss and one Russian Steam account. I have on my Swiss account over 450 Games and on the russian one around 4.
I have a friend in Russia and to play some games with him, I need a russian account.
Guess what? Since the last change to Steam Shop I cant use my Swiss Credit Card anymore to buy games in Russia.
Now when I want to test a game first on the russian account and when it's good to buy it after on my main Account, I can't.
Why should I pay for a game in Early Access the full price, when the game is bad and will be abadoned in a half year?
Sure they are some good early access games, which I payd the full price for (Switzerland has the highest Steam Game prices). As example ARK or Battlegrounds. I love these games and like to support the Devs.
But I get really angry when I have to pay for a Game which is worth 5 $ and sold in my Country for 20 $ and will be unsupported after a year.
Really fuck you Valve and Steam 🖕🏻🖕🏻😡
Atleast refund the people the money, when the game is abadoned! But sure, you're just in for a Cash Grab...4 -
Yesterday, microsoft showed me once again, what it means to "obey".
I tried to install Microsoft SQL Server 2012 on a virtual machine with OS Windows7.
The installation-center asked me to choose an installation-folder for SQL-Server.
No matter what, for any folder i had chosen for the installation, the setup replied with the errormessage "The installation-folder is invalid"
So i considered asking our platform-services team, whether they gave me administrative rights for the vm.
They did. I had full access to the components of my vm.
After a few days i finally recognized, that i had picked a wrong iso for the installation of sql server.
Instead of sql server 2012 + Service Pack 3, i picked sql server 2012 ServicePack 3.
So after all, Microsoft tried to tell me by showing the message "The installation-folder is invalid", that the setup weren't able to find an installation of Microsoft SQL Server 2012.
God damned!!1!3 -
As I already said on devrant, I'm a freelance web developer and I also often sell my services for teaching, loving that. Currently I'm teaching PHP with 30 students and it's going very well.
But yesterday, I received an offer for giving another course next month, this time on HTML and CSS, for a company I don't know yet. Almost every line of this email is wrong, outdated by 20 years, or just basically meaningless...
So I thought I could do my best to translate this as close as possible to the original, preserving the wrong formulations too, just for you devranters fellas.
"Hello,
I have an offer for a 2 days course for 5 people (level 1+ and/or 2), on HTML5 and CSS3. Below, the program :
1. XHTML AND CSS2 INTRODUCTION
Advantages and benefits of change
Understanding compatibility for different versions of browsers
HTML, XHTML, CSS edition tools : presentation of the different tools
The CSS language : different types of selectors : class of selector, identifier of selector, contextual selectors, grouped selectors
Blocks of text, boxes of text
The CSS1, CSSP, CSS2 properties
Relative and absolute measures units
2. LAYOUT TECHNIQUES
Full CSS, XHTML websites demo
Positioning with the position property, positioning with the float property
Columns creation
Layout for forms
Layout for data tables
Layout for menus
3. INTRODUCTION TO SVG (SCALABLE VECTOR GRAPHICS)
Role and importance of SVG
Using SVG on client side : basic shapes
SVG structure of document, tags examples
Using CSS styles with SVG
Different integration methods for SVG in a XHTML document
4. OPTIMISATION OF JAVASCRIPT CODE
Introduction to DOM and Javascript
Access to document objects : different access techniques, using this keyword, create elements dynamically
Positioning elements with the help of Javascript : positionning elements relatively to the mouse, move elements
Show/hide elements for creating hierarchical menus
Code optimisation techniques : using objects, objects litterals, loops optimisation
Can you please give me your availability ?"
Seriously...
CSS-fucking-1 ! Is it a course for dinosaurs ?
...And if only my rant was just about the program...
It's totally impossible to cover all these subjects in only 2 days with people of different levels and experience.
The guy exactly said to me : "don't worry about the program, it's an old text but they agreed to it anyway. They just want to learn HTML and CSS, some of them already know it but want to learn more, and the others are total beginers.".
And here is the meaning for the "(level 1+ and/or 2)" part in the email.
So... Surprizingly, I accepted the offer, but asked for at least a 3rd day. I'm waiting for their answer, but I'll do it anyway, adapting the course content to the actual students knowledge. I need the money, after all.
Wish me luck...
It's just sad that these formation companies are selling bullshit to clients that just want to learn something useful. It's too often like that, they sell shitty/useless programs and we have to catch up in real time with students that don't understand why they don't learn what was told to them.3 -
Can someone explain to me why a static page with 11 links should have:
- database with 3 tables,
- 47 libraries
- full blown next.js setup
- docker container
- infrastructure monitoring
- pin code based admin access to add additional links17 -
When your CTO has full access to the production servers and makes SQL changes directly without following process. Then breaks production and tells everyone "this is why we need to follow process!". Then proceeds to break it again hours later.
-
So apparently google doesn't give a fuck about your money. Yes I didn't use it right now, i purchased the dev account so I will be able to publish later when I need it and already used it in the past. How is it that they will close an account that you've payed for for inactivity?
ps.: Now I understand why has the play store full garbage apps. I will do that too...
pps: I know it's only 25$ but I still payed that to have access in the first place
2 -
A time I (almost) screamed at co-worker?
Too many times to keep up with.
Majority of time its code like ..
try
{
using (var connection = new SqlConnection(connectionString))
{
// data access code that does stuff
}
catch (Exception e)
{
// Various ways of dealing with the error such as ..
Console.WriteLine("Here");
ShowMessage("An error occured.");
return false;
// or do nothing.
}
}
Range of excuses
- Users can't do anything about the error, so why do or show them anything?
- I'll fix the errors later
- Handling the errors were not in the end-user specification. If you want it, you'll have to perform a cost/benefit analysis, get the changes approved by the board in writing, placed in the project priority queue ...etc..etc
- I don't know.
- Users were tired of seeing database timeout errors, deadlocks, primary key violations, etc, so I fixed the problem.
On my tip of my tongue are rages of ..
"I'm going to trade you for a donkey, and shoot the donkey!"
or
"You are about as useful as a sack full of possum heads."
I haven't cast those stones (yet). I'll eventually run across my code that looks exactly like that.1 -
Haven't ranted for awhile but here it goes...
In a meeting with a front end user yesterday. They don't like the entry screens on our Oracle ERP system. They want us to provide them with a tool so they can create new entry screens to replace those they dont like. They want full autonomy over that tool and no interference from IT. Oh, and they want unfettered database access to the production data, including full ability to execute DML. I so wanted to say 'Are you high?'.1 -
Today I found out we have 5 different Customer databases, one for each product area. We don't have access to more than 2 of them, while corp. it central has full access, but we have to beg and pay to see our own customers....
Now i'm tasked with integrating all these into a Customer db. and the way i get access is cobolt made, fixed length csv files and it's different for each db.
FML1 -
My boss insists that we shouldn’t lock or password-protect a particular system because, in her words, remembering or write down a password is hard and email as a concept is confusing. I tried to explain if people who don't know what left versus right-clicking do have full admin access, it’s only a matter of time before something goes terriblely wrong. She listened but ultimately decided to keep everything open, confident that everyone would use it responsibly.
Unfortunately, that’s not what happened, it never has been and never will be. The problems started, just as I feared, and now I’m stuck cleaning up the chaos, one issue at a time. I do have a backup and automation snapshots, but things got so tangled up that it will still be a hassle.
I tried soft lock so everyone could only access the section relevant to them. The reaction was immediate—they were confused and stressed, saying they’d be unable to do anything if it stayed that way. They didn’t get the idea that keeping them from touching certain things (that they shouldn't be touching in the first place) wasn’t the same as blocking their whole work. But since they’re all my superiors, I had no choice but to remove the restrictions and leave the system wide open again.
Nothing serious came out, just really annoying because something like this happens all the time.4 -
Python devs and data analysts....
Do you recommend using pycharm for working with jupyter notebooks? I surely had a bad time with it.
I have been using many jetbrains softwares , and am a fan of their docs search and autocompletion. But I don't think there is a full support for jupyter jn it, because sometimes my graphs made using matploit or seaborn just brakes.
And some libraries have a lot of functions taking parameters as " *args, **kwargs " , I don't know what that means but those function take a lot of "value" parameters i guess?(like this: plt.figure(figsize=[13,6], axis=False) )
Pycharm also don't seem to have access to list of those arguments...
Are you having such problems too? Have you found some better ide with autocompletions and support for jupyter? Do tell.
(Ps: i know jupyter can be run directly on a browser, but as i said "auto completions and documentations" )5 -
Just got access to OpenAI beta. This thing is seriously impressive. The attached image shows it summarizing a paragraph from Friedrich Nietzsche. Apart from that, I have tried summarizing a complex Math Algo which I found on Wikipedia, getting specs for building a new PC, and also improving my Startup Idea. The results were astonishing. I can't imagine what possibilities it can have in the future.
At the same time, I can clearly see why they are not allowing open access to their APIs. The potential for abuse is so high here. Especially when most of our population is full of digital idiots.
-
Tl;Dr Im the one of the few in my area that sees sftping as the prod service account shouldn't be a deployment process. And the ONLY ONE THAT CARES THAT THIS IS GONNA BREAK A BUNCH OF SHIT AT SOME POINT.
The non tl;dr:
For a whole year I've been trying to convince my area that sshing as the production service account is not the proper way to deploy and/or develop batch code. My area (my team and 3 sister teams) have no concept of using version control for our various Unix components (shell scripts and configuration files) that our CRITICAL for our teams ongoing success. Most develop in a "prodqa like" system and the remainder straight in production. Those that develop straight in prodqa have no "test" deployment so when they ssh files straight to actual production. Our area has no concept of continuous integration and automated build checking. There is no "test cases", no "systems testing" or "regression testing". No gate checks for changing production are enforced. There is a standing "approved" deployment process by the enterprise (my company is Whyyyyyyyyyy bigger than my area ) but no one uses it. In fact idk anyone in my area who knows HOW to deploy using the official deployment method. Yes, there is privileged access management on the service account. Yes the managers gets notified everytime someone accesses the privileged production account. The managers don't see fixing this as a priority. In fact I think I've only talk to ONE other person in my area who truly understands how terrible it is that we have full production change access on a daily basis. Ive brought this up so many times and so many times nothing has been done and I've tried to get it changed yet nothing has happened and I'm just SO FUCKING SICK that no one sees how big of a deal this. I mean, overall I live the area I work in, I love the people, yet this one glaring deficiency causes me so much fucking stress cause it's so fucking simple to fix.
We even have an newer enterprise deployment. Method leveraging a product called "urban code deploy" (ucd) to deploy a git repository. JUST FUCKING GIT WITH THE PROGRAM!!!!..... IT WAS RELEASED FUCKING 12 YEARS AGO......
Please..... Please..... I just want my otherwise normally awesome team to understand the importance and benefits of version control and approved/revertable deployments2 -
God fucking damn this stupid MariaDB is full of bugs... First access denied because I tried to login as root as non root and now that... Damn...
6 -
Working on small scale games to working on a full blown VR 4 person MO game, the scale from one to another is pretty big, I seem to manage somehow though :D takong it all one step at a time, making sure I don't use any repeated code in places that could need it, cleaning up classes so it's easier to access for debugging, building nice inspector things so people that create art/particles and such don't have a hard time understanding my weird naming conventions.
I could go on and on really xD i've learnt so much and i'm still learning, and I really have nothing to rant about thesw days so i've gone back to lurk mode lol -
Last update on my student job.
Today is my last day. Even thought it was tough sometimes it was a really good experience.
I worked with amazing people and had a little taste of IT limitation. Didn't had full admin access so I was limited on a lot of things I had to do but that taught me to say no to my supervisors when some things were not possible.
I'm very proud of the final result so do my superiors and colleagues. I'm really impressed by what I was capable of doing and that gives more self confidence. I know I made the right choice and I know I'll continue enjoy computer science as much as I do today.2 -
Head of legal: email me details of the customer information you hold/access
Me (in head): I'm a full stack developer! I access everything!! Should I tell the truth, or "the TRUTH"3 -
I just need to vent about how frustrating and terrible Windows is.
It almost seems like consistentsy and attention to detail are completely foreign concepts to Microsoft. Everything from simple text selection (WHY DOES A DOUBLE CLICK INCLUDE THE TRAILING SPACE) to using advanced software feels like a chore.
Any sympathizers here? What problems do you need to vent about when trying to navigate your OS?
FWI I'm not a Mac or Linux user, so I have the joy of using Windows at home. I wish I could switch, but I prefer full access to my Steam library so I'm stuck with this option.rant microsoft venting windows 10 windows sucks windows 10 sucks why would you do that bad design windows7 -
PouchDB.
It promised full-blown CRDT functionality. So I decided to adopt it.
Disappointment number one: you have to use CouchDB, so your data model is under strict regulations now. Okay.
Disappointment number two: absolutely messed up hack required to restrict users from accessing other users’ data, otherwise you have to store all the user data in single collection. Not the most performant solution.
Disappointment number three: pagination is utter mess. Server-side timestamps are utter mess. ANY server-side logic is utter mess.
Just to set it to work, you need PouchDB itself, websocket adapter (otherwise only three simultaneous syncs), auth adapter (doesn’t work via sockets), which came out fucking large pile of bullshit at the frontend.
Disappointment number four, the final one: auth somehow works but it doesn’t set cookie. I don’t know how to get access.
GitHub user named Wohali, number one CouchDB specialist over there, doesn’t know that either.
It also doesn’t work at Incognito mode, doesn’t work at Firefox at all.
So, if you want to use PouchDB, bear that in mind:
1. CouchDB only
2. No server-side logic
3. Authorization is a mess
4. Error logs are mess too: “ERROR 83929629 broken pipe” means “out of disk space” in Erlang, the CouchDB language.
5. No hosting solutions. No backup solutions, no infrastructure around that at all. You are tied to bare metal VPS and Ansible.
6. Huge pile of bullshit at frontend. Doesn’t work at Incognito mode, doesn’t work at Firefox.8 -
Spent the entire morning updating a SQL query.
Client wanted to have different expiration times for different products. So the full package would be 1 year of access and a module would only be 6 months. Then when you renew your account the renewal is 1 year if you have the full package else it's 6 months.
The query takes 0.7s to run and left joins 3 tables. Only to return about 100 results. Still it's faster than the guy who wrote the original query which just dumped the hole db into memory then looped through it appending valid entries to a new array. -
To make matters even worse, my manager gave the horrible client also access to another clients environment just to 'compare' things, and nitpick over configuration that he is missing, but just hasn't setup yet...
Fucking fuck fuck fuck fuck fuck my manager, what a total 🌰🔩🥜nutjob5 -
AWS is so secure that even with full access I cannot access the resource I need and the error message is so cryptic every hacker will give up first. Amazing!3
-
Nothing makes me not want to take a full-time job at your company more than having to go through IT tickets every quarter year when my password expires to actually change my password. Why have a fucking self-service portal for employees if logging in with an expired password doesn't work and the reset password link tells me that I need to log in to enroll with security questions (???). It feels like these websites are glued together with sticks and spit and there's a million of them each sporting one specific purpose! I have to go through this shit multiple times since I'm an intern and I didn't have access to my account through the course of the semester. Get your fucking shit together!1
-
Just as an extension of last rant to explain how much fun it is to keep up with Apple's security through obscurity bullshit.
AFAIK this full disk access (FDA) feature was touted to protect a user's data on macOS. Programs that want to access those files need to request the user's permissions to do so. Now to the fun part: Apple is not providing any API. A staff member suggested, that you should only try to access the files your app needs and if you can't as for the user's allowance. One should not use some fixed files and try to access them, because their locations might change, as well as their (UNIX file) access rights (ACL), or if they fall under FDA. Not to speak about the other security features that might hinder you accessing files (you might be sandboxed, or the files might be subject to SIP/rootless).
Honestly, you should be starting to take drugs, if you want to stay sane. I mean UNIX ACL are weird enough: e.g. you can make a directory only readable for root such that a user cannot list the files inside, but you can place files inside that the user can read (if she knows about their existence). On macOS you'll never know. You may have all the rights to access a file,.. but Apple will only give you the finger.
As they always do to us developers.
2 -
Google, please explain to me: Why the fuck would you create a hardcoded requirement in your libraries to use a plaintext json file with credentials to your API?
Credentials which give full access to all of the company email, addresses, cloud services, etc?
And why would you accompany this in your docs with example implementations which read as if they were an intern's first coding project — non psr compliant PHP, snippets of Go which won't compile due to type errors...
I'm starting to become convinced that the whole of the Google Cloud API was actually written by thirteen year old who found their parent's liquor cabinet.
Fuck this I'll build my own Google.1 -
Can't git push
because of an "access denied" error message
because I didn't set up my key file properly (with right paths, right format and so on)
because I'm working from my home laptop device
because I'm in home office
because Corona
..but..
I can connect to my work computer where git is set up properly but also I
can't git push
because I can't "cd" into the project path
because the samba mount point is messed up
because I don't reboot my machine to fix it
because I can't enter my password
because it does have a full hard drive encryption and the password screen shows up before the network services are started.2 -
Working with a group on a startup idea. We have weekly Google chat meetings with the full team and sometimes me and the other two founders have side calls. Our group is getting bigger so the weekly is getting longer so the 3 of us were talking about ways to make them more efficient. One was, background distractions like TV, random people talking in bg, kids...
So then yesterday the 3 of us went over a different topic and the guy who had brought up the distraction issue was in the bathroom shaving and trimming nose hairs the whole time. He kept asking questions about the agenda which we all had access to. I shouldn't even care much. I drink through the meetings anyways.2 -
To all that read my rants regarding my webshop before! Here's the long awaited update!
So this asshole partner did just not take care of business so I decided to stand down as a director for that company. So we arranged that last monday.
I thought: let's end this properly, clean up my mail, some other stuff... tuesday he revoked me access to everything, so I couldn't access anything anymore. Wow fucker! You never did a thing and now suddenly you take action? Wtf?!
Can you please pay your part of the bill for the accountant? You already promised a couple of times.
Well of course mr retard, you really think I'll follow up on my promises? You never kept 1 of them yet expect me to keep that promise? Fuck you man.
So today he asked again. I told him that I'd like to know what he wants with all the custom made stuff as I developed it and copyright is owned by me. Then mr asshole started insulting again: just because of the fact that you're not a front end dev doesn't mean that makes.up for you taking so much time.to implement all that. I asked an expert.and he could do it in 3 hours! Wow dude! A front end dev optimizing db queries, rewriting parts of the back end in just.3 hours including the front-end?,You're so right.
Of course not cunt face. I'm already full stacking for 20 fucking years and.you tell me that?! Really? Mr insult's back again!
Then he says: I'm so fed up with all this crap that to end this properly I will have my new IT business partner look at your so called 'custom made components'.
For fuck's sake man, can I send you a tree with a rope so that you can hang yourself?
Good luck getting your domain name as it is still registered on my company's name. I might cancel it someday in the future at my convenience.
If anyone here loves fucking up a website, get in touch with me.1 -
Just a small discussion topic, if you could look through the source code ad have full access to 1 project/application/game/moon base forever, what would you choose and why?
For me, I would love to go through the source code for the game Hyper Light Drifter, would love to see some of the inner workings and just learn new methods of doing things.10 -
We want to hire new dev, so, these MBA guys have a brilliant plan. Give him access to our complete repository and let him go through the full fucking code and *access it*. I don't even know what to explain here..
-
Being victim of an arbitrary worplace's culture on dev experience and documentation makes me a very frustrated dev.
Often I do want to document, and by that, I don't mean laying an inline comment that is exactly the function's name, I mean going full technical writer on steroids. I can and WILL get very verbose, yes, explaining every single way you can use a service - no matter how self explanatory the code might look.
I know developers (and me included) can, and sometimes will, write the best variable and function names at the time, wondering if they reached the peak of clean, DRY code that would make Robert Martin have a seizure and piss himself, only to find weeks later after working on something else that their work is unreadable. Of course.
I know the doc's public, it's me, and I've done this.
But then again explain for the people in the back how the FUUUUCK are we meant to suggest improvements, when we are not the ones who are prioritising features and shit WITH the business?
Just email me when the fucking team recycles, and no new team member knows how to even setup the IDEs because this huge piece of monumental shit called CompanyTM is also run by VPN. Fuck, no one wants to access that garbage, you have no docs.
I once tried setting up a culture for documentation. I did an herculean amount of work studying what solutions were internally homologated, how steep the learning curve would be from what we had at the moment (NOTHING, WE HAD FUCKING NOTHING, jesus christ, I even interviewed SEVENTEEN other squads to PROVE they FUCKING NEED
DOCS
TO WORK
You know what happened to that effort?
It had a few "clap" reactions on a Teams meeting and it never reached the kanban.
It didn't even made it to backlog.
I honestly hope that, someday, an alien fenomenon affects the whole company, making their memories completely reset, only to have the first one - after the whole public ordeal on why our brains became milkshake -, to say: "oh, boy, I wish we had documented this".
Then I will bring them to the back and shoot them. -
I wish that my previous company gets investigated. They probably got more violations if they are investigated. Here are a few examples:
The company is in the telecom business and they wanted to create AI summaries of their phone calls. So they used real private calls of their clients as test data without their knowledge & consent.
The CEO also made fun of someone handwritten CV on LinkedIn. Sure, he blurred out the obvious data but shit like certificates, past history & rough location was still present. It was not be hard to find who it was.
The 2FA of some IT services was still on the ex-CTOs private phone (now he is a consultant 1x a week)
One of their engineers moved back to Russia and has access to sensitive data. (aka call recording of insurances, banking, fire departments, ...)
Offering users to write a public review of the company for a discount if the review is positive. The "paid review" is not mentioned.
The reviews of their new feature are done by 'external' people but they all benefit from the companies success. The review is written from their own company but it was written by the external design company (CEOs wife under her own company), marketing consultant (under his own company).
They did fire an employee illegally (as in did not follow the legal procedures, the new COO thought she was a consultant, she was in fact not so she had more protections)
They did fire an employee for untrue reasons and waiting till he was on holiday & abroad (dick move but legal I think)
They did spy through the security cameras and made up a reason to fire someone. Company offered free soda during that time, employee did not like the offered soda and filled it with a diet-variant on their own dime. He then took his own bought diet-soda back home (not all) and got fired for stealing. (or idk, it might have been ice tea or fanta)
They did not report that an employee sold company data but he was let go.
They run cookies on their website but has no clause for cookie-consent.
Their features that they are promoting & selling is not working like expected
They lie about their server uptime or heavily manipulate it.
They sell a feature that is no longer supported and broke a few updates ago.
They are offering a product as a fix that is simply not longer supported by the development team
They have fired consultants and then refuse to pay their last month salary or only pays it partially. Happened as far as i know, 4 times (no proof).
Everyone had access to the full password vault including the login credentials for business routers and the credit card info of the CEO, CFO, CTO. It took me multiple times to report it to the IT admin for mine to be restricted.
Every new dev has access to production data within a few weeks or direct database access
Any person who has access to the admin-portal can spoof phonenumbers in a few clicks.
A colleague is blacklisted at the police portal for past crimes where they have to fulfil police orders. He did them pretending to be a different employee who was approved. Also, they do not keep track of the data needed to fill in the yearly report (idk why the company has to them but the police does not do it).
They forgot to implement a warning (legally needed) before someone hits their data limit. those people cannot be billed. Someone was watching 4k movies in Signapore and costed the company tens of thousands of Euro.
If I think of more, I'll add it comments lol11 -
Meeting for a warehouse job, where computer skills were required...
Worked 9 months there.
Me and boss was fired, he had very personal Wird ideias... And cause was a know it all never asked, never researched...
His ideia: take work from the office by giving werehouse employees full access to clients...
Best compensation I ever got by behing fired... And gained my worst enemy. -
Now that I've joined a proper full time "software engineering" job, I guess it's time to get back to ranting.
It's been a month and a half since I've joined here and they have no work for me. And the fact that I've been given a Windows system with restricted access makes it worse2 -
GitHub Packages Sucks. Like, it REALLY sucks.
It sounds like the best thing in the world - being able to host your project packages alongside your code! It has full support for Maven, Gradle, Ruby Gems, Node packages, Docker images and even dotnet CLI applications. It even lets you view statistics on how many developers have downloaded a given package! For public repositories, the packages are free to host as well!
So, I decide to use it for my Maven project since it's "so great". I've never used a public Maven repository before, so this was all very new to me. I follow the documentation - simply run "mvn deploy ...." and use a generated GitHub personal access token. No problems there. Deployment is a success and I feel a wave of happiness seeing my packages online. I follow through the various links and it even adds automatically generated usage information for other Maven users - fantastic!
That was, until I decide to try and download one of the files from this package repository. In order to download a file, you must have a GitHub access token. Okay, makes sense I guess? What if another developer wants to use my library? To do so, they have to generate their own GitHub access token, store it in their local ~/.m2/settings.xml file and only THEN can they use my library. So clearly, this is significantly inferior to other public Maven repositories where you don't have to get an access token to simply USE a library.
Upon discovering this, I decide to simply delete all of the packages and continue using whatever previous system I was using. Except of course, they forbid the deletion of public packages because "other projects could depend on it". The only way to delete public packages is to either:
[0] Make the repository private (losing all stargazers and watchers), delete the packages and then make the repository public again
[1] Contact support and ask them to delete the public packages. They say that they'll only do this for "special cases", such as legal issues or GDPR breaches.
I've sent a contact form and I'm currently hoping that they see things in my favor. I mean seriously - a public package repository where in order to use it you have to have a GitHub account and then generate an authentication token - it's absurd!3 -
It's 2016 and Android still doesn't support ODBC (let alone OLEDB). Every time somebody asks how to connect their app to a database directly, the groupthink brigade goes "dur hur, use JSON/SOAP/XML services cuz raisins!1one*." That wasn't the fucking question. I don't want your framework-cobbling make-work dependencies. Even the cretins at Xamarin, trying desperately to hook Windows C# programmers, only have SQL Server support because Microsoft fucking did it for them. WTF have Android developers done over 7 OS versions if basic features like database access are still fucking missing? No wonder the App Stores are full of Mickey Mouse garbage.
*raisins!1one = "I don't know how to secure a database so I'll just yell 'security!1one' so people think I r smrt"5 -
Was motivated to do a project with ReactNative for Android but already stuck.
I need to read a SQLite DB file from /data/data/some.other.app/database/DB.db
Yes I am rooted.
1. How does I request root from the App (Android Pie)
2. What SQLite npm package can load from an absolute path. I found a few libs but they don't seem to be full access, just for dbs in the app's own data folder.8 -
i have to edit a few html templates in our database, obviously automatically generated by a visual editor, full of nonsense in it, no line breaks, and i don't have access to a good html editor. fuck me6
-
I just tested a VPS and it was kind of impressive: I just had shared hosting until now and it is a total difference when you're having full root access.
Kind of hating these greedy shared hosting fuckers now ;)
Because it was just for testing purposes, I wanted to try the mysterious command "rm -rf / --no-preserve-root".
It was working for around 5 minutes and after that literally no command worked anymore!
Not even reboot worked :P
Then I tried reboot it via the VPS panel :) End of the story: vps panel chrashed with error message: unable to start vps :P
I thought it was kind of funnny and nice to share & thanks for reading 'til here!5 -
Just spent all morning adding my own user account to my local MongoDB because some network security guy found I was running an unprotected server on my PC....
I tried all the admin roles to get full access across all databases I have but none worked....
Until I see one at the bottom of the official documentation:
root -
This is a true story when I was working as a application technician a couple of years ago!
Before I started working there, they had a couple of incidents with ppl with less knowledge accidently deleted stuffs in prod databases, and only a handfull of ppl get the full access to them. I started working in this team, and one day I was asked to run a snippet in one of the prod databases from a co-worker with less privilege.
Loged in, run the snippet and the server STALLED for a couple of minutes! When the snippet was finished I looked at the screen and saw the output "1724217 rows deleted". The fun part here, was that we went to a coffee break right after this, and after a couple of minutes we started to hear ppl mumbling that the network was slow as f*ck, servers didn't respond etc etc.
Well, I responded that I got a snippet that deleted 1724217 row in a table and we ran back to our computers and started to work backwards to solve this.
The best part in this story is that:
* Was not my fault! Even thou I was the one that executed it.
* The tables was deleted from a live prod server that was not heavily used!
* I asked for a life line for us in this team, that we needed a prevented output so we can "match" the actual output after we ran it in prod from the ones from the developers!
Even thou it was not my fault, this is the worst mess up I have done working in IT over 10 years. O_o
8 -
After two years of being in (metaphorical) jail, I once again was given the a privilege of unlocking and rooting my phone. Damn. Frick Huawei, never coming back to that experience.
I gotta say, rooting... Feels a tad less accessible nowadays than when I last practiced it. All this boot image backup, patch, copy, reflash is crying to be automised, only reason I can think of why that changed and magisk can no longer patch itself into the phone's initrd is that it's somehow locked? Was it a security concern? Or can sideloaded twrp no longer do that?
Oh, and the war... The war never changes, only exploits do - fruck safety net... Good for Google that they now have an *almost* unfoolable solution (almost). The new hardware-based check is annoying af, but luckily, can still be forced to downgrade back to the old basic check that can be fooled... Still, am I the only one who feels Google is kinda weird? On one hand, they support unlocking of their own brand of phones, but then they continuously try to come up with frameworks to make life with a rooted or unlocked phone more annoying...
On the other hand, I do like having my data encrypted in a way that even sideloading twrp doesn't give full access to all my stuff, including password manager cache...
Any recommendations what to install? I do love the basic tools like adaway (rip ads), greenify (yay battery life!), viper4android (More music out of my music!) and quite honestly even lucky patcher for apps where the dev studio practices disgust me and don't make me want to support them...2 -
IT teachers here at my school giving us 20 different and completely unsuitable for Access databases businesses, as subjects for indeed Access databases. And then be like "Create documentations for that"
And they actually mean by that is
So I clicked here then there and then I selected and pressed the C symbol key while holding the Control key on the keyboard input device connected on my computer, which happens to be plugged into the wall outlet..
As a full-stack developer this is just so cringy I'm speechless.. -
Cleaning up my desk at the office today. As I'm sure is the case with most of us, I have a draw that's full of old technical crap that's not currently in use (mice, charging cables, USB hubs, routers, access points, cameras, old phones and iPads, you get the idea).
Found out that not only do I have an extra Mini-DVI to HDMI dongle; I apparently have 3 of them. That's more than I've got available Mini-DVI ports to begin with.2 -
Hello wonderful people out there, I need some career advice and would really appreciate your help in deciding. I am sure you have perspectives and opinions that may not even have crossed my mind.
I am a Full Stack Dev with 9 years of experience. I got two overseas opportunities, one in Bucharest, Romania and the other one in Mississauga, Canada.
Now according to my research:
+ives in Romania:
> Role is good
> Low cost of living
> Money is good and company also provides 2 bed accommodation
> Access to Europe
> Is approx 8 hours far away from my country of origin
-ives in Romania (just as per my internet research when compared to Canada)
> Healthcare is not the great
> Scores low on standard of life and quality index
> Not sure I can think of settling down there
+ives in Canada
> No Language barriers
> Ample amount of opportunities in the long run
> Can strongly think of settling down there
> Scores really high in standard of life and quality index
> Strong healthcare and education system
-ives in Canada
> Living expenses are fuckin high
> Money initially is not that great and won't be able to save enough for my future goals
> Is approx 28 Hours far from my country of origin
Which one would you choose and if you can please mention why?11 -
What the fuck, Android? My phone was locked, and the last open app was Instagram brcause I was chatting with my friend. So I try to unlock the phone with fingerprint, as I always do. The phone unlocks (at least it looked like it) and I get straight ot my IG chat, but at the same time an error message appears on the top of the screen saying that it failed to unlock the phone. And sure enough when I check my navi bar, the recent apps button is missing, indicating that the phone is still in a locked state. So after a failed unlock, someone with enough luck can get full access to my instagram chats and whatever else the foreground app is??? What the actual fuck?2
-
So a little while back, my location was officially switched from "Specific Office Location" to "Home Office", i.e. I was finally _officially_ full-time WFH. The other day, I had to visit one of our physical offices for the first time in years. What I didn't realise until that point was that I HAVE to work from home: I have to access a specific VPN in the US to do my work, but you can't connect to any VPNs from within our office.
Genius.
🤦🏻♂️4 -
How Microsoft expect anyone to develop using any technology they introduce with so many limitations.
Moi a Microsoft dumb enthusiast said to myself : hey dude you are a developer stop whining about the app gap bust a move create decent array of apps and release them, went into a full project management mode wrote requirements did sketches and some prototypes, time to execute.
1. first app: image files organizer, viewer , with some light editor capabilities and album creator after some work i came to discover that you don't have a proper file system APIs to show a folder tree view in my app "WTF" there are work arounds and dirty solutions but seriously? i can only access the stupid media folders created by Microsoft and that's it.
so i ditched the apps until uwp become a development tools with target audience other than kids who eat crayons, and while using "Edge" i thought to my self : "you know what dude extensions are cool and if you do something like a speed dial it would be awesome"
fire up my text editor started writing my extension to discover that:
"you cannot use localStorage from local HTML files".
moral of the story
MS is failing with consumers not because people hate MS but rather MS hates itself like no engineer over there said to him self this is fking stupid ?
other limitations :
no proper system tray access
no registry access what so ever
and i have started 2 days ago.
yeah Ms this is the main app gap problem the uwp sucks big time. compared to android Java which has a great access to every aspect of the device even apple provide better APIs for their systems.
if uwp is MS future then rip MS.
please i stand corrected if anyone knows better.2 -
Your computer is probably vulnerable to Samy Kamkar's poisontap: a Pi Zero-based device that connects to usb and does the following:
- emulates an Ethernet device over USB (or Thunderbolt)
- hijacks all Internet traffic from the machine (despite being a low priority/unknown network interface)
- siphons and stores HTTP cookies and sessions from the web browser for the Alexa top 1,000,000 websites
- exposes the internal router to the attacker, making it accessible remotely via outbound WebSocket and DNS rebinding
- installs a persistent web-based backdoor in HTTP cache for hundreds of thousands of domains and common Javascript CDN URLs, all with access to the user's cookies via cache poisoning
- allows attacker to remotely force the user to make HTTP requests and proxy back responses (GET & POSTs) with the user's cookies on any backdoored domain
- does not require the machine to be unlocked
- backdoors and remote access persist even after device is removed and attacker sashays away
I need several minutes with your laptop to perform the hack, even if it's locked. Full-disk encryption and secure boot won't save you.
If you use GNU/Linux, install usbguard today. If you use macOS/Windows, idk, pray.19 -
Follow up on my internship:
>The recruiter told me to use whichever stack i prefer for the full stack development of their e-commerce website.
>I chose MERN stack.
>After completing the project 90% in 2 weeks, he wanted to host it on his shared hosting platform of godaddy.
> It doesnt have shell access nor allows node.js to install on it.
>Now he wants me to convert my node.js code to PHP using Dreamweaver software.... Shut up already. Give me my money and certificate and leave me the fuck alone.5 -
So I finally got full computer access 2 and a half weeks into working, and now there's "scheduled network downtime" with no indication of when it will be back up. I swear I'm never going to get anything done here
-
I remember back when I was in pre calculus I decided to take a class online. So my teacher's website was made by him and run on go Daddy, he taught precalculus, calculus, algebra, algebra ii, and computer science. I decided to penetration test his website and use a web crawler. His directory that had the tests, test answers, exams, exam answers, and homework answer's as well as all the books he's written in PDFs, was unprotected, I could access and download them all. He also had a database directory that contained all the students' phone numbers, email addresses, home addresses, and their full names.
I alerted him to this and didn't get anything in turn :P2 -
Hello everyone, looking for some career advice here.
First of let me list my credentials off here. I graduated in 2016 with a BS in Computer Science. While I was working on my degree I worked as an engineering for 3 years in a cell phone repair company. What this entailed was managing/reverse engineering a software solution of one of that companies vendors, writing documentation etc (it started as a summer internship and became a job that I worked full time over Summers and up to 30/week in the school year).
Anyway, the vendor I acted as a point of contact offered me a job before I graduated and I started with them in May 2016 as a junior most Dev. Since then I have have maintained the same job tittle (software developer), however my duties have increased.
Currently I maintain several of our build servers, manage software releases (as in I am the lead developer of this application) for the service that makes 90% of this companies money, and am the subject matter expert for everything regarding smartphone diagnostics. I've literally been entrusted with access to all of the company servers for if something goes wrong. I'm also training our newest developers and being told I'm doing a good job at doing so.
Currently with my job on a day to day basis I'm working with Java, Android, C++, Golang, MongoDB, iOS in Objective C, and Python
(Please note this is a small company of less than 50 people)
Currently I'm only being paid 60k USD and am wondering if I should hold out for a raise or consider looking for a better job? ( Please note I live in the east coast in an area where the cost of living isn't absurd).
Because this job was practically handed to me I don't know what to expect and feel imposter syndrome as I think I deserve better pay but think I don't have enough years experience. All advice is welcome4 -
Finally accepted as telematics lab. assistant
Had to go to 30 years old initiation tradition by drinking 'The Drink' before getting lab. full access
Full Recipe: Mineral water, instant coffee, vanilla milk, cola, banana, pineapple, apple, melons, cup ramen, peanuts, snickers, m&m, potato chips, nata de coco.
Step:
1. Shove it all to blender
2. Blend
3. Bon Appetit3 -
rent / question (there is a question at the end and I'd appreciate your opinion)
8 months ago, I agreed to help a not too distant relative of mine to do his master thesis at the company where I work. He was supposed to build something really MVP, but useful for us and I'd help him get some scientific questions out of it, and provide him with (computing) resources to test his theories / implementations under simulated and much heavier load.
Since then, he didn't get done anything even remotely useful, always just stuck on very rudimentary issues, claimed things are almost ready, I wrote a quick smoke test to prove that the whole application blows up when you touch it, in short - a disaster and went over to radio silence.
In the meanwhile, we didn't need it anymore, so 1.5 months ago, I got in touch with him again, with an even more technical proposal, something, at least I'd think, that's even cooler to do. He asked me some question about hypothetical load, the system should be able to handle eventually, to come up with alternative implementations to compare them against each other. He said that his exam period is going to be over soon and he'll get back to me with some initial version.
2 weeks ago, I got back in touch with him, trying to urge him, to get finally started and get something done. If he'd actually sit down and do it during the holidays as a "full time job", he'd be probably done in 2 weeks. Last week, he came back to me and said he has an initial PR ready to review.
I was excited about it, but basically froze when I realized what he did. He deleted all his previous work - some infrastructure stuff which took us basically 3 months of back and forth to get running - and as far as I could see, all the new code were only auto generated clients based on a swagger specification. In short - I could do it in less then an hour. If you really have no idea what you're doing, it might take you half a day, but definitely nowhere near to a week.
His brother, which a good friend of mine, thinks I'm being too hard on him. His argument was, that it's too hard, and he has to do it in C#, but he only knows Java (I gave him access to some of our repositories to copy paste code together, he didn't need to invent anything. I also prefer C# but wrote my master thesis in Java) Personally, I'm just pissed because he promises stuff that he never does. I totally understand him - I was like that as a student as well, I guess karma is a ... but still, he's wasting my time.
Right now I'm thinking how to get out of this, without having even more time wasted. I doubt he'd ever deliver anything useful. He got plenty of input from me about what he could consider for his scientific question, how to measure performance, ... He can keep his credentials to access our test environment with the test data, but I won't give him access to any additional computing resources, to compare how his solutions might scale on our company's cost. (mainly it's not the money, but I'd have to provide that stuff, and probably help him set it up)
does it sound like a fair deal (saying, I'm done with you. You can finish your topic on your own, but don't expect any help from me)? or am I being a dick about it and too demanding?1 -
My computer has gone to repair so for the meantime I'm computer-less. Which sucks big time because I have projects and tests coming up (not to mention personal projects and other stuff I've been asked to do) and I kinda have to leech off my friends and I don't like doing that, but, for now, it's what I'm doing. My old toshiba couldn't handle whatever I have to do, damn thing should be going through menopause or something. I wasn't a good owner LoL
I never really know if it'll boot during the first minute after I turn it on or if'll take it hours to do so, so I don't wanna risk it taking it with me to uni 😬 Not to mention it's still running Vista 😅
So my brother left to go to a friend's house until sunday so for the today and tomorrow I have access to the beast that is his computer ☺
I don't mean beast as a bad thing, it's a good computer, but it has an almost full SSD and I need to install a couple things so I can work on it :') (I'll uninstall them later and try to leave it as I found it LoL)
I can finally take a bit to play as well 😥 as I haven't been able to do so, as not only my PC is on repair, but I've been leaving uni late (after midnight - I valour my sleep OK). Luckily one of my house mates lets me use her PC after she goes to bed or her bf arrives to our house. The other day I managed to install steam and play a bit (she gave me permission to do so and I uninstalled them later) 😂 her computer almost died on me, it only has 4GB of RAM :') poor thing was over working to keep up LoL
Now, my brother's computer has a mechanical keyboard and besides the macro keys (they're on the far end of the keyboard, where you'd expect the shift/ctrl/caps lock/etc keys to be), I'm loving it tbh. It's a cheap keyboard, my mom didn't want to buy anything too fancy for him, but I like the sounds it makes 😅 may get one for myself (a mechanical keyboard I mean LoL. I really liked one I saw here on devRant that looked like a typewriter but it's WAY out of my league for now HaHa) -
I sent an e-mail to my friend containing new information about something we were discussing.
He said: "It's cumbersome for me to access my e-mail, could you take a screenshot of it to me and send it on Skype?".
I was appalled. The e-mail is full text and he wants a screenshot of text. E-mail's primary purpose is to send text content. This guy never heard of copy paste text (which is what I did)? And he works in helpdesk, which is even more ironic.2 -
And so begins week 3 of 5 without full computer access. I'm able to do some research needed but I'm still very limited. The only programs I can use are IE11, and the three basic MS Office programs. Oh well... at least I'm still getting paid by the hour1
-
Who the fuck authorizes a new build to be pushed at 430pm on a friday and then demands full regression testing be done immediately regardless of how long it takes? Fucking analysts shouldn't be allowed to dictate the schedule if they don't understand the effort required behind the scenes.
99% of the time I wouldn't care but I'm the only tester with DB access and I'm supposed to go on the first date I've had in months tonight at 6.
#HelloDarknessMyOldFriend2 -
So yeah, need money so I started looking for extra projects to develop and found a project to make "the new facebook" and it just kinda sucks.
I just got access to the whole codebase and it's done using angular, nodejs and typescript (which is cool to me), while the dude contacting me was telling me it was done in react (which is kinda a big no for me).
Well, anyway, I start by cloning the repo and the npm-i the whole thing, it's not even at 10% of the whole process and I already got like 50 deprecated packages over maybe a hundred needed (total of 2054 node modules installed).
Well I kinda don't even know where to start from this, all I know is that I'm gonna do it just for the money so I'll be a little underpaid (about 500$/month) while according to me the price should be about 1500$/month, but I can't do it full-time, so it kinda works out.4 -
LINUX MASTERS, I can't believe that linux didn't get rid off yet of the annoying user:group system.
Anyway, I have two pre-existing groups(postgres & www-data), now I need to enable both groups full access to an HD for data storing, currently the owner of /media/"user"/DATA is www-data but I need to enable the postgres group to operate in it.
I seached around and can't get around how to accomplish this, if it's even possible.
Help >_<15 -
Need Advice!
The Situation (cut a lot to keep it short...):
Made a Website for a Job-Agency (~7 non tek Employees) in Germany. Website is up and live a year already and runs really well. Over 1000 Applications came in (the DB), which is a lot.
Everybody is happy, I got constant approval every post launch meeting ever since...
Now: Realized, and I checked!....none of the applications ever reached the company!
And nobody ever complained.
I have full access to all mail accounts of that company, so I really know that they were never processed...
So what to do now?
Problem was a typo. So it's an easy fix.
-> Fix it, say nothing?
They will for sure wonder about the many new applications..
-> Fix it and tell?
It was my fault, so they will be for sure pissed
-> Sell this somehow?
-> don't fix, see how crazy it can get?
Will they ever realize?
any thoughts?7 -
I swear I touched some weird and complex programming shit in over a decade of programming.
I interfaced myself through C# to C++ Firmware, I wrote Rfid antennas calibration and reading software with a crappy framework called OctaneSDK (seems easy until you have to know how radio signal math and ins and outs work to configure antennas for good performance), I wrote full blown, full stack enterprise web portals and applications.with most weird ass dbs since the era of JDBC, ODBC up to managed data access and entity framework, cloud documental databases and everything.
Please, please, please, PLEASE I BEG YOU, anyone, I don't even have the enough life force to pour into this, explain me why the hell Jest is still a thing in javascript testing.
I read on the site:
"Jest is a delightful JavaScript Testing Framework with a focus on simplicity."
Using jest doesn't feel any delightful and I can't see any spark of focus and simplicity in it.
I tried to configure it in an angular project and it's a clustefuck of your worst nightmares put togheter.
The amount of errors and problems and configurations I had to put up felt like setting up a clunky version of a rube goldberg's machine.
I had to uninstall karma/jasmine, creating config files floating around, configure project files and tell trough them to jest that he has to do path transformations because he can't read his own test files by itself and can't even read file dependencies and now it has a ton of errors importing dependencies.
Sure, it's focused on simplicity.
Moreover, the test are utter trash.
Hey launch this method and verify it's been launched 1 time.
Hey check if the page title is "x"
God, I hate js with passion since years, but every shit for js I put my hands on I always hope it will rehab its reputation to me, instead every fucking time it's worse than before. -
Intel Management Engine is half-hoax. Yes, it exists, but rumors about its true capabilities are fabricated and artificially amplified to make "what about intel ME" a very effective though-terminating cliche in the privacy community.
Let me remind you that to this day there was not a single takedown or leak that resulted from some power exploiting ME. All kingpin takedowns, all whistleblower deanons, all deanons period, all doxxes — all due to software shortcomings and other exploits.
Yet, "what about intel ME" reigns supreme and instills doom into the minds of the questioning. I can totally see someone who is new to this whole privacy thing doing their research, finding this ME craziness and thinking that real, actionable privacy is impossible, and going back to using amazon alexa and giving tiktok full camera and microphone access.
Just forget about Intel ME. It might as well not exist at all, because it was never used successfully. Instead, do this:
- Keep your threat models updated
- Learn to distinguish state-level actors from surveillance capitalists7 -
With the current pace of gpt and dall-e, it’s looking more likely that a lot of development roles may go obsolete in the nearest future (3+ yrs).
I see the possibility of building full fledged websites and fixing bugs based on voice commands. The picture of this possibility is quite vivid in my head because it’s totally feasible technical-wise.
The only delay that may occur in this dynamics is the slow pace of its implementation by existing developer tools. Of which I think the reason is directly related to the cost of management of resource, quite the limiting factor here.
But imagine if a big tech like google creates a platform to build websites based on voice/text commands using advanced gpt inline with its access to existing corpus of data; that to me is “game-over” for web devs.16 -
So, the story starts with me getting a job. Full-time job for the first time in my 21 years old life. After short conversation about how amazing this company is, after countless lies and stood questions they decided to hire me. I had to get come on Monday a week later with everything prepared.
So of course I did that and got to my workplace on designated time. Turned out nobody was expecting me, nothing was prepared for a new programmer and everyone seemed angry at me for no apparent reason.
After long talk with my new boss I got some less than 100$ pc with CPU that couldn't handle virtualization and expected me to work on software that needed extensive use of virtual machine.
PC is of course filled with all kinds of spying software that uses most of the resources. IT teams only job is to check if programmers are working their assess off for at least 8 hours a day.
I've filled a ticket about granting me access to Debian machine on the mainframe so I could work. No response for two weeks. I've lost hope already.
I have to work on open space with more than 30 engineers. Screams, phone calls, alarms, all at once, all the time. My colleagues seem to not care and I can't understand how.
I was tasked with rewriting major application because old developer did some half assed piece of burning shit. It took him more than one year, I'm finishing it in less than two weeks.
Of course nobody except for me is preparing any kinds of documentation. I had to reverse-engineer whole API for alarm system.
Salary is less than a junior programmer should earn.
But I'm stuck here for at least a year because nobody's here wants a guy whose only experience is as a freelancer. -
HOW TO UNCOVER THE TRUTH OF A SUSPICIOUS PARTNER CONTACT CYBERPUNK PROGRAMMERS
Cheating is a different kind of pain. It shatters your peace, your confidence, your sense of reality. I never thought I’d find myself in that place—questioning everything, doubting the person I loved. The sleepless nights, the gut feelings… they weren’t just in my head.
I couldn’t take the lies anymore, so I made the hardest decision: to find out the truth.
That’s when I found CyberPunk Programmers. I was scared, unsure, and emotionally drained, but they made everything feel safe and professional. With their help, I got full access to her phone and computer—her messages, emails, deleted texts, even hidden apps and social media accounts. What I discovered hurt more than I could’ve imagined—videos, conversations, private sites… things I wish I’d never had to see.
But in that pain, there was also clarity. I finally had answers. And with those answers, I found the strength to walk away.
If you’re stuck in doubt and don’t know what’s real anymore—CyberPunk Programmers can help you get the truth. They were fast, discreet, and more affordable than I expected. I’m not just another customer—I’m someone who finally got peace, thanks to them. reach them at cyberpunkprogrammersdotcom5 -
Went through 60 python packages to see which fails installing on the serve. Took hrs as I have no terminal access but just via jenkins pipeline. So "edit/gitpush requirements.txt and wait" many times. Eventually looped them 1 by 1 in shell. By end of day got the list that installs.
Finally sent the whole list....with confidence
-Takes full 10 mins & Fails......
(panic mode starts)
+Changed the sequence = fails, somewhere else
+1 by 1 again = installs.....
+few random without the culprit =works
+again, whole list = fails, somewhere else
Need to sleep, brain's thinking of eagles1 -
Piggy backing off an earlier rant about Linux. Let's talk about time wasted fixing Linux.
One time for me was I couldn't get Ubuntu to boot. Whenever it booted through UEFI it would go straight to the EFI bash like command line boot screen, not allowing me to access Ubuntu.
I tried for almost a full day to fix it, Googling solutions, resetting my BIOS and fixing Boot using a Ubuntu Live USB.
In the end I found it was an issue with setting my filesystem as XFS. I reinstalled using EXT4 and it booted right up. Must've been some sort of bug. Strange because XFS boot worked with Fedora. A day wasted trying to set up Ubuntu.6 -
Need some help choosing a laptop (budget is up to 2000 EUR)
Initially 6 months ago I bought Dell G5 (5587) for 1300 EUR and it had i7 8750H CPU, 6GB NVDIA GeForce GTX 1060 Max-Q GPU, 16GB RAM, 256GB SSD+1TB HDD.
However turned out to be a piece of shit because dell fucked up their thermal management badly and they don't give proper access for their users to control the fans. Even when you force fan control via Windows test build then you will face a dissapointment since most games won't run properly on Windows test mode. So anyways I got rid of that laptop. For more info you can have a look here https://dell.com/community/... and there are dozens of topics on reddit about that.
So yeah currently looking for a decent gaming/movies/coding laptop which gives full access to undervolting/fan control.
Currently I'm looking into Razer Blade 152 -
I recently came across this article with some basic security advices, like use 2fa security key, encrypt your USB keys, don't use untrusted USB chargers / cables / ports (or use a data blocker cable if you need to charge your device). It made me think, how relevant are the USB-related threats and risks today? Do people really still use and carry so many wired USB devices, and just drop or plug them wherever?
The last time I used an USB device to transfer some important data was probably over 10 years ago, and for the love of god I don't know anyone who still carries an USB key with sensitive data with them on a daily basis, much less actively uses it. Besides, whoever still does that probably puts their USB key on the same keychain as their ID / access tag and a bunch of other keys (including a 2fa device if they use one) - they're not going to lose just some sensitive data, they're going to lose authentication and physical access devices as well, and that could turn a small data leak into a full-scale incident, with or without an encrypted USB device.
I'm also not sure about untrusted USB cables and ports, from what I've seen the USB outlets and cables are pretty much non-existent in public places, most places offer wireless charging pads instead (usually built into a hand rest or table surface).3 -
Permissions service that allows users completely unknown to the system full access.
If you happen to be a known user, but just happen to hate being restricted, just remove the connection configuration on the client side, you get full permissions anyway. -
So I am pretty fair dev at Java and have been doing freelancing for sometime apart from normal full time job.
Got a client , a well funded one, who raised a decent chunk of money recently.
Got me do a couple of different areas right from refactoring and bumping their performance to all the way setting up AWS Services like RDS,Lambdas,Dynamo,SQS.
It was going good , money was coming in for the initial part.
Thinking that money is not the concern here , I accepted work at runtime and gave quotations about the additional work.
However now that all is done and deployed , the client simply refuses to pay me the money and has ghosted me horribly than my ex ever did.
I have access to their GitHub,AWS(I setup myself).
Need suggestions of whats the best way I can fuck them up if they decide to not pay even after a few more professional polite attempts I do .
sidenote : They had a pretty dumb db design and blindly had resorted to services in AWS and the pricing is still a major point of concern for them.10 -
I've heard all kinds of arguments for about how whiteboard coding interviews should be obsolete, and that they usually doesn't reflect how good you are as a developer. But I've been polishing my skills with data structures and algorithms for a few weeks (learning this stuff for the second time since years ago in college) and I get this feeling that I'm becoming a much better programmer by practicing these things. And having access to all these things in the "working memory" of my brain has made me now think of solutions I couldn't before. But then - it may be that right now I'm working on embedded systems so this efficiency matters much more, earlier while doing full stack web development I didn't care about these much except while playing with strings maybe. So it might be dependent on your niche. What do you guys think?3
-
Question to you all, do you really think you own your computer or system/data when almost all sites/services out there state very clearly in there ELUA(Fuck yes ours) that they might use your data how they feel fit, now this does not stop with websites, Mac, Windows and some Linux Distros also do this.
I for one stop thinking that I own data but I just change a few bits to make it look different these days, everything on your computer is not yours, we its and hardware, read the ELUA/TOS many hold the right to recall, revoke and so on use of the items to the point you paid for it they will take it back.
Items now sending keylogs, data usage and apps usage data to MS, Apple, some big linux distro, and YES this happens don't fool yourself Apple and MS both admit this happen and both US and UK now requesting these companies to let the have full access to this data, if it was not there they wouldn't want it.
This wont stop me from messing with code and loving tech but do you really feel you own anything anymore?
I don't :P7 -
So a long time ago, I posted Ink lyrics from ColdPlay, and gave them a DevOp twist. I will post the full lyrics, as memorabilia and for a chill moment from rants:
Got access rules said "prod/maintainer"
Pulled in your change with my cli
And you wonder when you wake up
Did it build last night?
Oh, oh, oh, oh, oh
Feels like the pipeline, is broken inside
All I know
All I know
Is that I'm host
When company broke
AIl I know
Is that I love to code
So much that it hurts
Got a homebrew but the shell aint right, oooh, oooh
Just want a way of keeping docker alive
All I know, All I know
Is that the post
BreachForums indorsed
All I know
Is that the data is sold
So much that it hurts
I see that Forbes, and New York Times
They said my boss, began to fire
I see my console and Im mashing Ctrl-C
All I know
Is that loved to code
So much it -
So I've been using Duet on my iPad Pro for a couple years now (lets me use it as an external monitor via Lightning cable) and without issue. Shit, I've been quite happy with it. Then the other day, whilst hooked up to my work laptop, there was a power fluctuation that caused my laptop to stop sending power to connected devices. Which is fine - I have it plugged into a surge protector so these fluctuations shouldn't matter. After a few seconds the laptop resumed normal operation and my connected devices were up and running again.
But the iPad Pro, for some reason, went into an infinite boot loop sequence. It reboots, gets to the white Apple logo, then reboots again.
In the end, after putting the iPad into recovery mode and running Apple's update in iTunes (as they recommend), it proceeds to wipe all my data. Without warning. I lost more than a couple of years of notes, illustrations and photos. All in one fucking swoop.
To be clear, you get 2 options in iTunes when performing a device update:
1. UPDATE - will not mess with your data, will just update the OS (in this case iPadOS)
2. RESTORE - will delete everything, basically a factory reset
I clicked UPDATE. After the first attempt, it still kept bootlooping. So I did it again, I made sure I clicked UPDATE because I had not yet backed up my data. It then proceeds to do a RESTORE even though I clicked UPDATE.
Why, Apple? WHY.
After a solemn weekend lamenting my lost data, I've come a conclusion: fuck you Apple for designing very shitty software. I mean, why can't I access my device data over a cabled connection in the event I can't boot into the OS? If you need some form of authentication to keep out thieves, surely the mutltiple times you ask me to log in with my Apple ID on iTunes upon connecting the damn thing is more than sufficient?! You keep spouting that you have a secure boot chain and shit, surely it can verify a legitimate user using authenticated hardware without having to boot into the device OS?
And on the subject of backing up my data, you really only have 2 manual options here. Either (a) open iTunes, select your device, select the installed app, then selectively download the files onto my system; or (b) do a full device backup. Neither of those procedures is time-efficient nor straightforward. And if you want to do option b wirelessly, it can only be on iCloud. Which is bullshit. And you can't even access the files in the device backup - you can only get to them by restoring to your device. Even MORE bullshit.
Conversely, on my Android phone I can automate backups of individual apps, directories or files to my cloud provider of choice, or even to an external microSD card. I can schedule when the backups happen. I can access my files ANYTIME.
I got the iPad Pro because I wanted the best drawing experience, and Apple Pencil at the time was really the best you could get. But I see now it's not worth compromise of having shitty software. I mean, It's already 2021 but these dated piles of excrement that are iOS and iPadOS still act like it's 2011; they need to be seriously reviewed and re-engineered, because eventually they're going to end up as nothing but all UI fluff to hide these extremely glaring problems.2 -
Fucking Apples hold my bananas! Collegue and me see our naïve thought refuted that a commercial vendor, most valuable company would create an OS that is not as split and fucked up as Linux distros.
It is hard even where to begin, so deep is the shitfest they are putting developers through with Mojave and Catalina.
Our testers weren't hardly able to install Catalina beta 6-7. Behavior of kernel extension and full disk access varying on a daily basis. Fixing these bugs is like nailing a pudding to the wall.
Makes me wanna quit software. Whom should you trust if even your OS is flaky as hell?8 -
Getting started with Pin-Up Casino is a simple process, and new players from Uzbekistan can follow clear instructions via pinap https://pinupcasinoonline-uz.com/ . The site outlines each step of the registration process, from entering personal details to verifying your account and making your first deposit. It also provides tips on setting up a secure password, choosing the right currency, and navigating the platform. This guide is ideal for users who want a hassle-free start and quick access to Pin-Up’s full range of casino games, sports betting, and live dealer tables.5
-
Profile (1, 1) --- (1, 1) User
Right?
- A single user *must* have *exactly* 1 profile.
- A single profile *must* belong to *exactly* 1 user.
Makes sense?
I did this because i moved user profile image and user banner image into Profile entity
So now i can easily join tables and fetch user profile image based on username or user ID
By deeply thinking like an asshole and overengineering, i stumbled upon a confusion
If i can join tables and get ALL fields (assuming its a left or full outer join) from both entities...
What is the difference between choosing which entity to fetch on the frontend?
For example if i want to fetch users, inversely, i can fetch Profile entity, which has User entity as a nested object, and that way access users. Now i have access to each user's profile image, banner image, bio etc aside from the entire user object
If the user navigates to a profile page, inversely, i can fetch User entity which will have a Profile entity as a nested object, and that way show the remaining necessary fields that the profile page needs to show
I gave these inverse examples because if i want to fetch users, surely enough i can simply fetch from User entity, and if i want to fetch someones profile data i can fetch from Profile entity directly
So if this is the case, when am i supposed to fetch one over the other?
You tell me. For simplicity lets focus on these two examples. Consider this as an exam question:
1) user navigates to home page. Now paginated users with role X need to be shown, but also their profile image. Do you fetch from User or Profile entity? If you use joins which ones and why?
2) user navigates to their or someone elses profile page. Now profile-based data needs to be shown, but also the user's username and full name need to be shown. Do you fetch from User or Profile entity? If you use joins which ones and why?20 -
HIRE A CRYPTO RECOVERY EXPERT; CYBER CONSTABLE INTELLIGENCE YOUR ULTIMATE SOLUTION FOR LOST CRYPTOCURRENCY
I am truly at a loss for words as I try to express my deep gratitude to Cyber Constable Intelligence for the incredible support they provided me during one of the darkest times of my life. I never imagined I would find myself in a situation like this, but I am so thankful I reached out to them when I did. A while ago, I became desperate to access my spouse’s phone, as I had suspicions about his conversations with another woman. In my search for help, I made the terrible mistake of trusting a hacker who claimed they could assist me in gaining access. Little did I know, this hacker had ulterior motives and would take full advantage of my vulnerability. Instead of helping, the hacker scammed me, taking a significant amount of my Bitcoin, and even worse, he blackmailed me. He threatened to expose my personal information and demanded more money from my spouse. I felt completely trapped, unable to think clearly or find a way out. It seemed like I had lost everything my money, my peace of mind, and even my sense of security. That's when I found Cyber Constable Intelligence. After reading about their success stories, I decided to reach out, even though I was unsure what to expect. From the moment I contacted them, I felt a weight lift off my shoulders. They listened to my situation with empathy and immediately got to work, providing not just technical expertise, but the reassurance I desperately needed. Thanks to their diligent efforts, they were able to track down the hacker who had caused me so much distress. Not only did they help me recover all of my lost funds, but they also made sure the hacker was held accountable for his actions. In addition, they helped me gain access to my spouse’s phone, revealing the truth behind his communications with the other woman. I am incredibly grateful to Cyber Constable Intelligence for their dedication, and compassion. They went above and beyond to help me recover both my finances and my peace of mind. If you find yourself in a similar situation, I highly recommend reaching out to them. They truly saved me, and I will always be thankful for their intervention.
Here's Their info below
Website Info : www cyber constable intelligence com
Email Info: cyberconstable (@) coolsite net25 -
For those who love to play and bet on the move, the https://pinupbet-bangladesh.com/pin... offers the perfect solution. Designed for convenience and performance, the Pin-Up App brings the full range of gaming and betting options to your mobile device.
The app features a user-friendly interface that makes navigation simple and enjoyable. Players can access slots, live casino games, and sports betting markets with just a few taps. Additionally, the app is optimized for speed, ensuring smooth gameplay even on older devices.
Detailed installation instructions for Android and iOS are available, making it easy for users to download and start playing. With secure payment options and 24/7 customer support integrated into the app, it’s a must-have for anyone seeking a seamless gaming experience.4 -
Recover Your Crypto Funds with SACLUX COMPTECH SPECIALST Losing access to your cryptocurrency due to scams, hacking, or other technical issues can be devastating. Fortunately, SACLUX COMPTECH SPECIALST offers professional crypto recovery services to help individuals and businesses recover their lost digital assets, including Bitcoin, Ethereum, USDT, and more.
Why SACLUX COMPTECH SPECIALST Is the Best Choice for Crypto Recovery
1. Advanced Blockchain Forensics With specialized expertise in blockchain forensics, SACLUX COMPTECH SPECIALST uses cutting-edge tools and techniques to:
Track stolen or lost cryptocurrency through complex blockchain transactions. Recover wallets compromised due to scams, forgotten passwords, or technical failures. Trace Bitcoin, Ethereum, and other digital assets across multiple wallets and exchanges. Their deep knowledge of blockchain technology enables them to handle even the most difficult cases of cryptocurrency loss.
2. Proven Track Record of Success SACLUX COMPTECH SPECIALST has a history of successfully recovering stolen or lost cryptocurrency for their clients. Their expertise has enabled them to recover millions of dollars in digital assets, making them a top choice for those seeking recovery services.
3. Success-Based Fee Model Clients only pay SACLUX COMPTECH SPECIALST if their lost funds are successfully recovered. This success-based fee model ensures a risk-free experience for clients and demonstrates the agency’s confidence in their recovery process.
4. Global Network for Cross-Border Recovery Cryptocurrency scams often involve international transactions, making recovery more complex. SACLUX COMPTECH SPECIALST has a global reach, working with exchanges, partners, and law enforcement agencies worldwide to recover crypto assets, even if they’ve been transferred across borders.
5. Ethical, Transparent, and Legal Practices SACLUX COMPTECH SPECIALST ensures that every recovery effort is compliant with legal and ethical standards. They provide clients with regular updates throughout the recovery process, maintaining full transparency.
Real Success: Bitcoin Recovery Case A client recently lost $110,000 in Bitcoin to a phishing scam. After contacting SACLUX COMPTECH SPECIALST, the team utilized advanced blockchain forensics to trace the stolen funds and collaborated with several international exchanges. Within a few weeks, a significant portion of the Bitcoin was successfully recovered.
Contact SACLUX COMPTECH SPECIALST for Crypto Recovery If you’ve experienced a loss of cryptocurrency and need expert assistance, reach out to SACLUX COMPTECH SPECIALST today. Their experienced team is committed to helping you recover your lost or stolen digital assets with professionalism and care. SACLUX COMPTECH SPECIALST is your trusted partner in recovering lost cryptocurrency.1 -
RECOVER BITCOIN, USDT, AND ETH FROM SCAMMERS HIRE ADWARE RECOVERY SPECIALIST
Six months ago, I made a life-changing decision: I left a stable job to pursue full-time cryptocurrency trading. After a full year of mentorship from my cousin—who had built substantial wealth through Bitcoin and altcoins—I felt ready to take the leap. I started with a modest investment of $20,000, trading cautiously between established cryptocurrencies and promising DeFi projects. To my surprise, my portfolio tripled in value within a few months, climbing to over $60,000. That early success fueled my ambition and confidence. WhatsApp info: +12 (72332)—8343
Emboldened, I decided to go all in. I liquidated my savings, borrowed against some assets, and raised my total investment to $390,000. At first, the decision seemed to pay off. My trades were profitable, and the returns felt consistent. I began to feel unstoppable. But then I made a critical mistake. Drawn in by the promise of zero-fee trading and instant withdrawals, I transferred my entire portfolio to a new, unverified exchange. Website info: h t t p s:// adware recovery specialist. com
At first, everything seemed perfect—executions were smooth, the interface was sleek, and my balance continued to grow. But when I attempted to withdraw funds, things took a turn. The support team began giving vague excuses about ‘wallet maintenance’ and ‘verification delays.’ Weeks passed, and then suddenly, my account was frozen for so-called ‘suspicious activity.’ Soon after, the platform went dark—the domain was inactive, support channels disappeared, and just like that, my life savings were gone.
The shock was paralyzing. I spent days in panic, scouring the internet for answers and barely sleeping. That’s when I discovered ADWARE RECOVERY SPECIALIST, a cybersecurity firm known for helping victims of crypto fraud. A fellow trader who had recovered lost assets recommended them. I was skeptical—but desperate. Email info: Adware recovery specialist@ auctioneer. net
ADWARE RECOVERY SPECIALIST quickly sprang into action. Their team traced blockchain transactions, identified the fraudulent network, and worked tirelessly to recover my funds. Thanks to their expertise, I was able to regain access to my wallet and recover a significant portion of what I had lost. While I didn’t get everything back, their intervention saved me from total financial ruin.
In the middle of that nightmare, I felt an overwhelming sense of gratitude—not just for the team’s skill and dedication, but for what I believe was divine intervention. I truly believe God led me to ADWARE RECOVERY SPECIALIST. It reminded me that even in our darkest hours, faith can light the path forward. Sometimes, the help we need comes through the hands of others—and I’m incredibly thankful that I found the right people at the right time.2 -
It's these individually tiny annoyances in products and software that together form a huge annoyance.
For example, it's 2022 and Chromium-based web browsers still interrupt an upload when hitting CTRL+S. This is why competition is important. If there was no Firefox, the only major web browsers would, without exception, have this annoyance, since they're all based on Chrmoium.
I remember Chromium for mobile formerly locking scrolling and zooming of the currently viewed page while the next page was loading. Thankfully, this annoyance was removed.
In 2016, the Samsung camera software was updated to show a "camera has been opened via quick launch" pop-up window when both front and rear sensors of the smartphone were covered while the camera was launched by pressing the home button twice, on the camera software Samsung bundled with their custom version of Android 6. What's more, if that pointless pop-up was closed by tapping the background instead of the tiny "OK" button or not responded to within five seconds, the camera software would exit itself. Needless to say, this defeats the purpose of a quick launch. It denies quick-launching while the phone is in the pocket, and the time necessary to get the phone out could cause moments to be missed.
Another bad camera behaviour Samsung introduced with the camera software bundled with their customized Android 6 was that if it was launched again shortly after exiting or switching to stand-by mode, it would also exit itself again within a few seconds. It could be that the camera app was initially designed around Android 5.0 in 2015 and then not properly adapted to Android 6.0, and some process management behaviour of Android 6.0 causes this behaviour. But whatever causes it, it is annoying and results in moments to not be captured.
Another such annoyance is that some home screen software for smartphones only allows access to its settings by holding a blank spot not occupied by a shortcut. However, if all home screen pages are full, one either needs to create a new page if allowed by the app, or temporarily remove a shortcut to be able to access the settings.
More examples are: Forced smartphone restart when replacing the SIM card, the minimum window size being far too large in some smartphones with multi-windowing functionality, accidental triggering of burst shot mode that can't be deactivated in the camera software, only showing the estimated number of remaining photos if less than 300 and thus a late warning, transition animations that are too slow, screenshots only being captured when holding a button combination for a second rather than immediately, the terminal emulator being inaccessible for the first three minutes after the smartphone has booted, and the sound from an online advertisement video causing pain from being much louder than the playing video.
Any of these annoyances might appear minor individually, but together, they form a major burden on everyday use. Therefore, developers should eliminate annoyances, no matter how minor they might seem.
The same also applies for missing features. The individual removal of a feature might not seem like a big of a deal, but removing dozens of small features accumulates to a significant lack of functionality, undermining the sense of being able to get work done with that product or software when that feature is unexpectedly needed. Examples for a products that pruned lots of functionality from its predecessor is the Samsung Galaxy S6, and newer laptops featuring very few USB ports. Web browsers have removed lots of features as well. Some features can be retrofitted with extensions, but they rely on a third-party developer maintaining compatibility. If many minor-seeming features are removed, users will repeatedly hit "sorry, this product/software can not do that anymore" moments. -
Lee Ultimate Hacker: Phone Surveillance, Private Investigations, Crypto Recovery
I was introduced to crypto by my son a few years ago, I invested in USDT and BTC using Binance, I have several accounts including personal bank accounts so I was unable to keep up with all of them and ended up forgetting my secret codes used in accessing the account, I asked my son to help me since he had introduced me Crypto, unfortunately he gave me bad news that I had lost my investment, I was so heartbroken considering I had invested my life saving of $70,700, I narrated my ordeal to one of my friends who happened to know someone who had a similar experience, so after I met him he directed to where he got help, he told me that LEE ULTIMATE HACKER who were able to help him with his recovery problem, I quickly contacted them to help me with my lost funds, I was a bit skeptical about it coz of what I had gone through the last few days, the frustration and anxiety was getting to me, after contacting LEE ULTIMATE HACKER one of their team members took me through the recovery process explaining on how it works and what was required from my end ,he informed me that it would take 12 hours for my funds to be recovered, I was so anxious but they assured me that all will be well and soon enough I will be able to have full control of my wallet, true to their word LEE ULTIMATE HACKER team were able to recover my wallet and I was able to access and change my log ins to my wallet, I was so happy and I couldn’t believe it I logged in and out of my account a few times just to be sure, for any lost crypto contact LEE ULTIMATE HACKER via LEEULTIMATEHACKER @ AOL . COM
telegram: LEEULTIMATE
wh@tsapp +1 (715) 314 - 9248 the solution to all your recovery problems.1 -
BEST RECOVERY EXPERT FOR CRYPTOCURRENCY VISIT CRANIX ETHICAL SOLUTIONS HAVEN
I've always been a coffee-is-the-answer-to-everything kind of a person. It turns out, sometimes it’s actually the barista who comes to save the day.
I remember one morning, idly listening to my go-to barista Emily casually recount how her uncle’s access to his crypto wallet was taken away. She continued about CRANIX ETHICAL SOLUTIONS HAVEN descending onto him like a crew of virtual private eyes and freeing him from his six-figure stash. I nodded idly, moderately amused but for the most part concerned about getting my caffeine boost. Skip two months, and I'm in full-blown freak-out mode. My $200,000 Bitcoin wallet was locked, and my password? Absolutely gone from my head. I tried everything: my older passwords, my birthday in reverse, my childhood street, even my first pet’s name (RIP, Buddy). Nothing, zilch, zero. To start, I refused to admit I'd actually lost it. I sat in front of my computer for a whole eight hours, convinced that I could turn my password into returning simply through concentrated staring. Spoiler: it didn't. Next, I entered the period of frenzied jotting down potential passwords in post-it notes. Next, I attempted to hack my brain via meditation (no go, dude). Next, I entered the full-blown life-is-a-farce, I-made-a-mistake, I'm-too-old-to-be-playing-every-game stage and questioned all life choices that'd landed me in this position.
Following two sleepless nights, I chanced upon a recall of Emily’s anecdote. I shot over to the coffee shop, not even thinking twice about it, my financial life in my hands (because, well, it kind of was). Emily took one glance at my frizzed face and smug-smiled. "Forgot your password, then?" I nodded, fighting off an urge to cry into my coffee. She snatched a napkin, jotted down CRANIX ETHICAL SOLUTIONS HAVEN, and slapped it onto my counter with a flourish, handing me a lifeline in its most extreme form. II reached out in hope that they'd be all that she'd hyped them to be. As soon as I'd reached out, I could see I'd placed my issue in expert hands. Their crew was courteous, reassuring, and unsettlingly brilliant at unscrambling an intractable issue. They'd cracked my wallet in days (lawfully, of course), and my cash was restored in a nanosecond. I couldn't believe my eyes. The morning after, I entered my coffee shop and saw a man who'd been beaten to death. Emily saw me, arched an eyebrow, and asked, "So, did they sort you out?" I laughed. "Let's say I owe you a free coffee for life."
Moral of the story: Tip your coffee shop attendants, and for crying' out loud, jot down your passwords
WhatsApp: +44 746 062 2730
Email: cranixethicalsolutionshaven {at} post {dot} com
Telegram: @ Cranixethicalsolutionshaven1 -
If you want to know more or any query, just knock us here–
24 Hours Reply/ (Contact Us)
Skype: Best5starshop
Telegram: @Best5starshop
Whatsapp: +1(650)690-5706
Our accounts are 100% legit and verified.
✔ 100% Satisfaction & Recovery Guaranteed.
✔ High-Quality Service.
✔ 100% verified accounts, USA, UK, CA and other countries.
✔ Full Completed Profiles.
✔ First Delivery.
✔ Phone verified are USA,CAN,other countries Account.
✔ 100% Satisfaction & Recovery Guaranteed.
✔ Card Verified.
✔ Bank Verified.
✔ Email Login Access.
✔ Number verified.
✔ BTC Withdrawal Enabled.
✔ 24/7 Ready to Customer Support.
Buy Verified Cash App Accounts. UK, USA, CA, AUS phone number and driving licensed and Credit Card add Cash App .Our accounts are meticulously verified to ensure seamless transactions, giving you peace of mind with every transfer.Instant access, reliable support, and hassle-free transactions. Purchase now!
Buy verified Cash App accounts to enhance global market trading and digital marketing efforts. These accounts offer security and reliability. Cash App has become a significant tool for traders and digital marketers. Docs verified accounts give a secure and proficient way to handle transactions. Verified accounts offer benefits like increased transaction limits and enhanced security features.
Traders can manage their investments more effectively, while digital marketers can handle payments seamlessly. Investing in verified Cash App accounts can streamline financial processes and improve overall business efficiency. This makes them a valuable asset for anyone engaged in global trading and digital marketing activities. If you feel, you need to buy verified cash app accounts place your order at
What is verified cash app and offers of cash app?
Verified Cash App accounts are accounts with confirmed individual data. These accounts offer a higher level of believe and security. They ensure smoother transactions and fewer restrictions. People use them for both personal and business purposes. Verification usually involves confirming identity details. Buy aged cash app account to avoid verification further.
If you want to know more or any query, just knock us here–
24 Hours Reply/ (Contact Us)
Skype: Best5starshop
Telegram: @Best5starshop
Whatsapp: +1(650)690-5706
Verified Cash App offer assistance to guarantee more secure and improve speedier cash exchanges. Many traders and digital marketers prefer using verified accounts. These accounts reduce the fraudulent activities. Verified accounts moreover have higher exchange limits. Buy verified cash app accounts with enhanced transaction limits.
Benefits of verified cash app account-
Verified Cash App accounts provide higher security. They use 100% upgraded advanced encryption for transactions. This ensures your money is safe. There is less risk of fraud. Unauthorized access is almost impossible. Buy aged cash app account at (website).
Verified Cash App accounts are very easy to use. Traders can quickly send and receive money. The interface is simple and user-friendly. Even a beginner can navigate it without any trouble.
Verified Cash App accounts help save money. Transaction fees are lower compared to banks. Traders can keep more of their earnings. This makes it a less costly option for many.
What is legal process to buy cash app accounts?
When you decide to buy cash app accounts, you have to follow few guidelines. Always buy from trusted sources. Look for verified sellers. Check their reviews. Ensure their accounts are legitimate. Verified accounts come with guarantees. Avoid unknown sellers. This reduces risks. Trustworthy sources provide support. They offer refunds if needed. They ensure account safety. Buy cash app accounts at (website).
Short Description
Buy Cash App With 15k Limits
If you want to flourish and safe your transaction and trade you should to buy cash app with 15K limits at (website). Our accounts are verified with selfie, SSN and bank details. So you are safe in using our cash app accounts.
Our Account Details-
Email verified
Phone number (US) verified
Owner selfie verified
Locked and unlocked accounts available
4k, 6k, 7.5k, 15k, 25k, and 50k acc. available
Superfast delivery confirmed
Customer satisfaction guaranteed
Meta Title
Buy Verified Cash App Accounts-100% BTC Enabled and Safe
Meta Description
Buy Verified Cash App Accounts from your trusted vendor in the USA (website) at very reasonable prices with virtual or physical cards. Place your order to buy now.joke/meme buy cash app accounts buy verified cash app accounts uk buy verified cash app accounts usa -
HOW TO FIND A LEGITIMATE CRYPTO RECOVERY EXPERT/BYTE PHANTOM CYBER RECOVERY
As a small business owner I found myself in a precarious situation when I decided to leverage decentralized finance (DeFi) to secure a loan for my growing enterprise I aimed to secure $1 million to expand my operations and invest in new opportunities To do this I deposited $120,000 as collateral on a platform called DeFiLend Pro which promised attractive terms and quick access to funds Initially everything seemed legitimate and I felt optimistic about my decision However when I attempted to withdraw my collateral after the loan was secured I was met with an unexpected demand for additional collateral This alarming request raised red flags for me I began to investigate the platform further and discovered that DeFiLend Pro bore striking similarities to a known scam operation The code used on the platform was nearly identical to that of previous fraudulent schemes which had been exposed by cybersecurity experts It became clear that I had fallen victim to a sophisticated scam designed to exploit unsuspecting users in the DeFi space I came across Byte Phantom Cyber Recovery a team of experts specializing in recovering funds lost to scams and fraudulent platforms Byte Phantom Cyber Recovery had a proven track record of helping victims reclaim their assets by analyzing the underlying code and tracing the flow of funds I reached out to Byte Phantom Cyber Recovery sharing all the details of my experience with DeFiLend Pro Byte Phantom Cyber Recovery quickly got to work They meticulously examined the platform's code and confirmed its connection to the previous scam operation Armed with this evidence Byte Phantom Cyber Recovery initiated a recovery process targeting the deployer wallet where my funds were likely held Their expertise in blockchain forensics allowed them to track the movement of my $120,000 and identify the individuals behind the scam After a tense period of waiting Byte Phantom Cyber Recovery successfully retrieved the full amount from the deployer wallet I was relieved and grateful having regained my hard-earned money thanks to Byte Phantom Cyber Recovery Their expertise in navigating the complexities of the DeFi landscape were instrumental in my recovery process showcasing the vital role they play in helping victims of scams reclaim their assets Byte Phantom Cyber Recovery services to assisting individuals like me in distressing situations is commendable and I cannot thank them enough for their support6 -
QUICK AND RELIABLE SOLUTIONS TO RECOVER LOST ASSET WITH SALVAGE ASSET RECOVERY
Am Amelia, I lost my entire Bitcoin savings to scammers who posed as Coinbase support representatives on Facebook. It started when I came across what I believed was an official Coinbase support page. They appeared legitimate, with professional logos, official-sounding language, and even real-time responses. I was experiencing some issues with my wallet at the time, so I reached out to them for help. They responded quickly and walked me through what they called a “verification process” to secure my account. Trusting them, I followed their instructions step-by-step. Unfortunately, I unknowingly granted them remote access to my Coinbase wallet. Within moments, my heart sank as I watched 6.5 BTC, everything I had saved over the years, disappear from my account. I was in utter disbelief. I couldn’t sleep, eat, or think clearly. The loss was crippling, both financially and emotionally. After recovering from the initial shock, I began searching for solutions online. That’s when I stumbled upon a service called SALVAGE ASSET RECOVERY. At first, I was skeptical, how could anyone possibly retrieve stolen cryptocurrency? But with nothing left to lose, I decided to reach out and explain my situation in full detail. To my surprise, they responded quickly and were extremely understanding. Their team of recovery specialists launched an investigation almost immediately. Using advanced tracking tools and years of expertise, they were able to trace the movement of the stolen Bitcoin through the blockchain. Not only did they locate the stolen funds, but they also identified the wallets associated with the scammers. In just two days, SALVAGE ASSET RECOVERY successfully recovered my 6.5 BTC and provided me with information about the individuals responsible. I was stunned. After thinking all hope was lost, they gave me a second chance. Their professionalism, speed, and technical skill were beyond anything I expected. If you've fallen victim to an online scam, whether it's crypto-related or otherwise, I strongly encourage you to contact SALVAGE ASSET RECOVERY. They turned one of the worst experiences of my life into a powerful reminder that not all is lost. Scammers are getting smarter, but thankfully, so are the experts who fight against them. Stay cautious, verify every source, and remember recovery is possible. Reach out to SALVAGE ASSET RECOVERY contact info
TELEGRAM---@Salvageasset
WHATSAPP...+ 1 8 4 7 6 5 4 7 0 9 62 -
I never thought my grandmother's book club would save my crypto fortune, but life is full of surprises. In the mayhem of moving into a new apartment, I mislaid my hardware wallet containing $400,000 in Bitcoin. I had packed it securely-at least, that's what I thought-but after unpacking every single box, it was nowhere to be found. First, I kept my cool. It had to be here somewhere, right? But when hours turned into days, my confidence crumbled. I tore through bags, checked jacket pockets; I even looked in the fridge in sheer desperation. Nothing. Next came panic: Had I thrown it out accidentally? Had the movers taken it? I couldn't get this vision out of my head that somehow my fortune had poofed into thin air. Frustrated and exhausted, I mentioned my predicament to my grandmother during a phone call. Instead of the usual "You should be more careful" speech, she surprised me. Oh, I've heard of a company that helps with that!" she said cheerfully. I almost dropped the phone. My grandma knew about crypto recovery? Turns out, her book club had a guest speaker, a retired cybersecurity expert who raved about Digital resolution services. She even remembered their website. At this point, I would have tried everything. I contacted them, and from the first conversation, I knew I was in good hands. Their staff was professional and patient, above all confident. They asked for detailed questions relating to my wallet, where I last saw it, and how it was backed up. Days later, they cracked the case. Using forensic data recovery and some advanced tracking techniques, they helped me regain access to my lost Bitcoin. It was a feeling of relief that cannot be described because I went from utter dejection to pure joy in a moment. More than a recovery service, Digital resolution services taught me something: never underestimate grandma's wisdom. Now, my hardware wallet is stored safely, with multiple backups, and I will never forget this lesson: when Nana talks, I will listen.
Don't fall victim, reach out to Digital resolution services for any cryptocurrency related issues.
Be safe
muriel halley
1 -
Bitsquery Web Retriever UK’s Leading Binary Options Recovery Expert
As binary options scams continue to evolve, so does the need for a trusted and effective recovery expert. In the UK, Bitsquery Web Retriever has earned a solid reputation as one of the most reliable cyber recovery services for victims of binary options fraud. Using advanced blockchain tracking tools, ethical hacking methods, and years of cybersecurity expertise, Bitsquery helps victims trace and recover their lost funds.
Why Bitsquery Stands Out
Bitsquery Web Retriever is known for its high success rate and commitment to client confidentiality. Unlike typical scam recovery "agents," Bitsquery uses real digital forensics, transaction tracing, and data extraction techniques to identify the wallets and channels where stolen funds were moved.
Steps to Recover Lost Binary Options Funds with Bitsquery
1. Initial Consultation:
Victims reach out via email or Telegram to provide an overview of the incident, including the platform used, the amount lost, and any relevant transaction details.
2. Case Assessment:
Bitsquery analyzes the information and verifies the authenticity of the case. If it's deemed legitimate and traceable, they proceed to the next stage.
3. Blockchain Investigation:
Using advanced blockchain analysis tools, Bitsquery traces the flow of stolen cryptocurrencies or wire-transferred funds. This involves mapping wallet addresses, identifying exchange exits, and unmasking IP traces if possible.
4. Retrieval Strategy:
Depending on the case, they may:
- Deploy a cyber infiltration method to regain access to funds.
- Collaborate with legal enforcement and exchanges to freeze or recover assets.
- Execute direct recovery from hot or cold wallets via ethical penetration testing (when legally viable).
5. Recovery & Reporting:
Once funds are recovered, they are returned to the rightful owner. Bitsquery also provides a full digital report for legal follow-up, including evidence that can support criminal charges or civil cases.
6. Post-Recovery Support:
Clients receive guidance on future protection steps and fraud-prevention strategies to ensure it doesn’t happen again.
How to Contact Bitsquery Web Retriever
If you've been a victim of a binary options scam and believe your funds may still be recoverable, you can contact Bitsquery Web Retriever directly:
Email: bitqueryretrieverhacker@bitquery.co.site
Telegram: @Bitsquerywebretriever12 -
BEST BITCOIN RECOVERY EXPERT TO RECOVER LOST BITCOIN; USDT RECOVERY EXPERT VISIT CYBER CONSTABLE INTELLIGENCE
Running Greenfield Grocers, my supermarket business, has always been my passion. I'm constantly looking for ways to grow both my business and wealth, which led me to an investment opportunity that seemed too good to pass up. A Bitcoin platform promised high returns, and after what I believed was thorough research, I decided to invest $195,000. Everything seemed legitimate at first, and I felt confident in my decision. Unfortunately, my optimism quickly turned to regret. The platform began to delay withdrawals. The excuses they gave were vague and unconvincing, but I held on, hoping the issues were temporary. However, as time passed, the platform became even less responsive, and eventually, it disappeared entirely. I was left with nothing no platform, no support, and no way to access my funds. The emotional and financial toll was immense. Losing that amount of money felt like both a personal and professional blow, leaving me questioning my judgment and feeling utterly defeated. As I struggled to accept what had happened, I spoke with a business associate who had faced a similar scam in the past. At first, I was hesitant about taking any further steps, but my associate urged me not to give up. He mentioned that the police had successfully referred him to a company called Cyber Constable Intelligence when he was in a similar situation. After hearing his positive experience, I decided to take his advice and reach out to Cyber Constable Intelligence. From the very first conversation, I knew I had made the right choice. The team at Cyber Constable Intelligence was professional, empathetic, and incredibly knowledgeable. They took the time to explain the entire recovery process and reassured me that they had the necessary tools and experience to recover my lost funds. Their approach gave me hope during a time when I felt hopeless. After 2 weeks of dedicated work, I received the incredible news that Cyber Constable Intelligence had successfully recovered the full $195,000 I had lost. The sense of relief was overwhelming, and I can’t describe the gratitude I felt. The team’s expertise and persistence turned a dire situation into a victory. I will forever be thankful to Cyber Constable Intelligence Without their support, I’m not sure where I’d be today. This experience has not only taught me to be more cautious but has also shown me the power of finding the right people to help when you need it most.
Here's Their Info Below
WhatsApp: 1 (252) 378-7611
mail: cyber constable @ coolsite net
Website info; www cyber constable intelligence com1 -
APM BILLING: Providing HIPAA-Compliant Billing Services You Can Trust
In today’s healthcare landscape, maintaining patient privacy and data security is paramount. Healthcare providers must adhere to strict standards to protect sensitive information while ensuring that financial operations are smooth and efficient. APM BILLING, based in Philadelphia, Pennsylvania, is dedicated to providing HIPAA-compliant billing services that ensure the highest level of security and compliance, while also optimizing the billing process for healthcare providers.
What Are HIPAA-Compliant Billing Services?
HIPAA (Health Insurance Portability and Accountability Act) establishes strict rules to ensure that healthcare providers maintain patient privacy and the confidentiality of their health information. As part of our commitment to protecting patient data, APM BILLING offers HIPAA-compliant billing services that meet all of the requirements set forth by this regulation.
Our HIPAA-compliant billing services ensure that all personal health information (PHI) handled during the billing and claims process remains secure. From data encryption to secure transmission, we follow the highest security standards to prevent unauthorized access, breaches, and other vulnerabilities.
Why Is HIPAA Compliance Critical for Healthcare Billing?
For any healthcare business, staying HIPAA-compliant is not just a regulatory necessity—it's essential to maintaining trust with patients and avoiding costly penalties. Non-compliance can result in hefty fines, lawsuits, and damage to your reputation. When it comes to billing, ensuring that all processes follow HIPAA guidelines is critical in preventing unauthorized access to sensitive patient data.
APM BILLING takes privacy and security seriously. Our team is well-versed in all HIPAA regulations, so you can trust that your patient data is always protected. We integrate comprehensive security protocols into our billing workflows, including:
Encrypted communications for all patient data exchanges
Secure data storage that meets HIPAA standards
Audit trails to track access to patient information and billing details
Employee training to ensure that everyone handling sensitive data understands HIPAA guidelines
The Benefits of Working with APM BILLING for HIPAA-Compliant Billing Services
By choosing APM BILLING, you gain the peace of mind that comes with knowing your billing processes are in full compliance with HIPAA regulations. Here are some of the key benefits of our HIPAA-compliant billing services:
Data Security: We use the latest technology to protect patient information, ensuring that all billing data is securely transmitted and stored.
Regulatory Compliance: Our team stays up-to-date with the latest changes to HIPAA regulations, ensuring that your practice remains compliant with all legal requirements.
Reduced Risk of Penalties: HIPAA violations can lead to significant fines and penalties. By outsourcing your billing to APM BILLING, you minimize the risk of compliance issues and the associated costs.
Enhanced Trust: Patients trust healthcare providers to keep their personal and medical information safe. By using our HIPAA-compliant billing services, you show your commitment to maintaining privacy, which fosters trust and enhances your reputation.
Efficiency and Accuracy: In addition to security, we ensure that your billing processes are efficient and accurate, leading to faster claim submissions, reduced denials, and increased revenue.
Why Choose APM BILLING for HIPAA-Compliant Billing Services?
Expertise: Our experienced team is dedicated to ensuring that all of your billing practices comply with HIPAA guidelines.
Tailored Solutions: We offer customized solutions that meet the specific needs of your healthcare practice, whether you’re a clinic, provider, or specialty office.
Focus on Security: We take security seriously and use state-of-the-art systems to protect all sensitive information.
Reliable Support: With APM BILLING, you’ll have a trusted partner in billing that is committed to safeguarding your practice’s financial and data integrity.
Get Started with APM BILLING Today
At APM BILLING, we understand the importance of maintaining HIPAA-compliant billing services in today's healthcare environment. We are here to help your practice stay secure, compliant, and financially efficient.
Contact us today at +1-800-621-3354 to learn more about how we can help streamline your billing process while ensuring complete protection of patient data. Visit our office at 19104 Philadelphia, Pennsylvania, and let APM BILLING handle your billing needs with the utmost professionalism and care.
Let APM BILLING take the stress out of billing while keeping your practice compliant with HIPAA regulations, so you can focus on what matters most—caring for your patients.2 -
INVESTMENT SCAM RECOVERY:: MY EXPERIENCE USING TRUST GEEKS HACK EXPERT TO RECOVER MY BITCOIN
Imagine waking up one day to discover that the $29,000 you invested in a trading platform has vanished, and your account is suddenly locked. That was the reality I faced after first trusting a reputable company. I had seen promises of high returns and was lured into making a significant investment. For a while, everything seemed fine, but soon, things began to unravel in ways I never expected. Without any warning, my trading account was frozen. When I contacted the company, I was told that I needed to pay an additional fee to unlock my account. This demand immediately raised red flags. I had already invested a large sum of money and now they wanted more? It felt like a classic scam, and unfortunately, it was. They had no intention of letting me access my funds unless I paid more, which made it clear that this was a scheme to get even more money from me. Desperate to recover what I had lost, I decided to take action. I began searching for solutions and came across TRUST GEEKS HACK EXPERT Website, w w w :// trustgeekshackexpert . com /-- Email: Trust geeks hack expert @ fast service . com -- Tele Gram, Trustgeekshackexpert, A company specializing in recovering funds from online scams. I reached out to them, and they responded quickly and professionally. They reassured me that they had dealt with similar cases and that they could help me get my money back. With their assistance, the process of recovery began. TRUST GEEKS HACK EXPERT investigated the situation thoroughly, working with relevant authorities and taking the necessary legal steps. Throughout the process, they kept me updated on their progress, and after a few months of hard work, I was finally able to recover the full amount I had lost. If you’re reading this and have found yourself in a similar situation, I strongly encourage you to reach out to TRUST GEEKS HACK EXPERT. They played a crucial role in helping me regain my funds, and I’m incredibly grateful for their expertise. It’s a harsh reminder to always be cautious when dealing with online trading platforms, as not all are trustworthy. If you’ve already fallen victim to a scam, don’t despair. There are professionals like TRUST GEEKS HACK EXPERT who can help you. Protect yourself, do your research, and remember: not every “opportunity” online is what it seems.6 -
LEARN HOW TO GET YOUR MONEY BACK FROM A FAKE INVESTMENT PLATFORM / VISIT TRUST GEEKS HACK EXPERT
TRUST GEEKS HACK EXPERT is a lifesaver! What started as a routine software update quickly turned into a nightmare that took me to the brink of financial ruin. A glitch in the updating process somehow locked me out of my Bitcoin wallet, which held $250,000. It was a significant investment I had worked hard to amass over several years, and it represented my savings, my future, and my peace of mind. The panic that followed was both instant and overwhelming. I desperately looked to recover my recovery phrase, only to realize it had been miss-printed when I originally wrote it down—a mistake I never thought would have any ramification until that exact moment. Each failed attempt at unlocking my wallet tightened the grip of anxiety on me. I was helpless, watching what appeared to be my entire financial security get further and further away. Despair drove me to search frantically for a lifeline. That's when I found TRUST GEEKS HACK EXPERT via web w w w: //
trust geeks hack expert. c o m /. I was wary at first—this was my life savings, after all, and I was well aware that the digital asset recovery business could be full of scams and false hope. But the glowing testimonials and success stories offered promise. I took the risk. I knew from the first conversation I had done the right thing. Their personnel were polite, sympathetic, and patient. They heard every aspect of my issue and assured me that I was not a lost cause. Its confidence was a lifeline. They explained the process of recovery in terms that I could understand, defining every technical step along the way and keeping me informed at each stage. I was most amazed at their accuracy and speed. They quickly diagnosed the issue and applied advanced recovery techniques to regain access to my wallet. Within days, my $250,000 was restored to me—intact and secure. The weight that was taken off my chest at that moment cannot be put into words. TRUST GEEKS HACK EXPERT not only restored my investment but also restored my faith in professional services. Their professionalism, honesty, and empathy made all the difference. I just can't thank them enough. If you are experiencing the same trauma, don't wait—contact TRUST GEEKS HACK EXPERT They are no less than saviors. Email: Trust geeks hack expert @ fast service . c o m
3 -
HIRE A HACKER TO RECOVER YOUR STOLEN CRYPTOCURRENCY ASSETS-CONTACT RAPID DIGITAL RECOVERY
Whatsapp: +1 4.14 8.0 71.4 8.5
Website: https: // rapiddigitalrecovery. org
Email: rapiddigitalrecovery (@) execs. com
Rapid Digital Recovery was a lifesaver when a stock trader from Denver, Colorado, found myself ensnared in a crypto scam. As someone who has spent years carefully navigating the stock market, I pride myself on being cautious with my investments. But when I came across a crypto platform promising extraordinary returns, I couldn’t resist the temptation to dive in. I invested $125,000, enticed by their professional appearance and glowing reviews. Everything seemed legitimate—until it didn’t. Within weeks of making the investment, I noticed that I could no longer access my funds. Customer support became evasive, and the platform’s response time grew longer and less helpful. It quickly dawned on me that I had been scammed, and my hard-earned money was likely gone for good. The realization was both frustrating and overwhelming. As a stock trader, I was used to analyzing risks and protecting my investments, but this was an entirely different animal. I felt completely powerless. In my desperation, I reached out to a fellow trader in Denver who had faced a similar situation. He recommended Rapid Digital Recovery, saying their team had helped him recover his own funds after a crypto scam. Though I was initially skeptical, I had nothing to lose at that point and decided to give them a try. From the moment I contacted Rapid Digital Recovery, I felt a sense of hope. Their team was responsive and professional, taking the time to thoroughly understand my case. They laid out a clear plan of action and assured me they had the expertise to handle the complexities of crypto recovery. I was impressed with how quickly they got to work and the level of detail they provided throughout the process. Within just a few weeks, Rapid Digital Recovery managed to recover the full $125,000 I had lost. I was astounded by how efficiently they handled everything. Their team kept me informed at every stage, ensuring I knew exactly what was going on. The sense of relief I felt when I saw my funds returned was indescribable. Thanks to Rapid Digital Recovery, I was able to recover my lost investment and learn a valuable lesson in the process. For anyone who finds themselves in a similar situation, I highly recommend their services. Their expertise truly set them apart in an industry rife with scams.
1 -
RECOVER SCAMMED USDT FROM ONLINE SCAMMERS HIRE ADWARE RECOVERY SPECIALIST
I first met Sarah at St. James Episcopal Church in Los Angeles during a Sunday service. We struck up a conversation, and over time, we became good friends, bonding over our personal stories and professional experiences. Sarah, an experienced journalist, had built her career on uncovering the truth, exposing corruption, and holding those in power accountable. But despite her keen eye for deception, she never imagined she would fall victim to a sophisticated online scam. WhatsApp info:+12 (72332)—8343
It all began when Sarah received an email from what appeared to be a reputable media subscription service. The offer seemed legitimate—exclusive access to industry insights and breaking news for a small monthly fee. As a journalist, staying ahead of the curve was essential, so she eagerly signed up for what she believed was a valuable resource. Website info: h t t p s:// adware recovery specialist. com
The website looked professional, with polished graphics and convincing language. Sarah was prompted to pay upfront, and she invested $11,000 in what she thought was a premium subscription package. But within days, the website vanished. Her login credentials no longer worked, her emails went unanswered, and the phone numbers listed were disconnected.
Shocked and devastated, Sarah confided in me about what had happened. She felt helpless, having lost a significant sum of money to an invisible predator. That’s when I suggested she reach out to ADWARE RECOVERY SPECIALIST, a firm dedicated to recovering funds lost to online scams. Desperate for a solution, she contacted them immediately. Email info: Adware recovery specialist (@) auctioneer. net
To her relief, the team at ADWARE RECOVERY SPECIALIST acted swiftly. Through a meticulous investigation, they traced the stolen funds and successfully recovered the full $11,000. Sarah was overwhelmed with gratitude—not only had she regained her hard-earned money, but she also restored her faith in recovery services. Telegram info: h t t p s:// t. me / adware recovery specialist1
Determined to help others avoid a similar fate, Sarah now shares her story with fellow journalists and media professionals, raising awareness about the growing threat of digital scams. Her experience serves as a powerful reminder that even the most vigilant among us can be deceived, and that having the right support can make all the difference.
1 -
ARE YOU A VICTIM OF INVESTMENT OR BITCOIN SCAM? Visit FOLKWIN EXPERT RECOVERY FOR HELP.
Living in Vancouver, I was once a victim of a devastating crypto scam that nearly destroyed my financial life. I had invested SGD 29,000 into a platform that promised high returns. It seemed like a great opportunity at first, but I soon realized it was a fraud. The scammers convinced me that I needed to pay a withdrawal fee to access my funds. Desperate to recover my money, I complied and sent the payment. However, once I paid the withdrawal fee, everything changed. The scammer blocked me completely, and I couldn’t reach them. My funds were gone, and I was left with nothing. The loss of such a large sum was incredibly traumatic, especially since it caused a significant breakdown in my relationship with my husband. The financial strain was overwhelming, and I didn’t know where to turn. For months, I searched desperately for help, hoping to recover my lost money. I reached out to several recovery services, but most of them seemed to offer little more than empty promises. Just when I was starting to lose hope, I found Folkwin Expert Recovery. Their team stood out from the rest professional, knowledgeable, and genuinely committed to helping me. Folkwin Expert Recovery took the time to understand my situation. They carefully listened to the details of the scam and immediately began working on a recovery plan. Although the process wasn’t easy, their expertise and persistence paid off. After some time, they successfully tracked down the scammer and recovered the full SGD 29,000 that I had lost. The relief I felt was indescribable, and it felt like a huge weight had been lifted off my shoulders. I can’t express enough how grateful I am to Folkwin Expert Recovery for their hard work. They went above and beyond to ensure I got my money back, and their efforts not only restored my finances but also my peace of mind. If you’re in a similar situation, I highly recommend reaching out to them. Via What's app:+1 (740)705-0711, Or email: Folkwinexpertrecovery(@)tech-center(.)com for assistance, They made all the difference in my recovery journey, and I’m forever grateful for their support.
Warm greetings,
Arielle Kebbel.
1 -
HIRE THE BEST BITCOIN RECOVERY EXPERT; HOW TO SAFELY RECOVER STOLEN CRYPTOCURRENCY VISIT CYBER CONSABLE INTELLIGENCE
I’ve always felt confident navigating the world of cryptocurrency. As a software engineer, I understood the ins and outs of wallets, private keys, and blockchain security, which made me feel secure in my investments. So, when I found a promising platform that seemed like a great opportunity, I invested $250,000 without hesitation. Unfortunately, I soon learned that my confidence would be shattered by a sophisticated cyber attack. It started with small, unauthorized transactions in my wallet. At first, I thought it was a mistake, but as the activity continued, I realized something was wrong. My wallet had been compromised, but not in the way I had expected. Instead of a simple hack, I had fallen victim to a virus attack. The virus was a piece of malware designed specifically to target cryptocurrency wallets. It infiltrated my system through a vulnerability I hadn’t noticed. Once inside, the virus silently monitored my wallet, captured my private keys, and gave the hackers full access to my funds. It was stealthy and nearly undetectable. The attackers didn’t need to log into my account manually; they could control everything remotely, draining my wallet without my knowledge. I was completely blindsided. As someone familiar with tech, I knew how advanced this virus was. It wasn’t just a typical phishing attack, it was a targeted, silent assault on my financial assets. As my funds disappeared, I realized I might never be able to recover them. Desperate, I turned to a trusted colleague who had gone through a similar situation. They recommended Cyber Constable Intelligence, a company that specializes in recovering stolen crypto assets. I contacted them immediately, and their team quickly started investigating. Cyber Constable Intelligence explained how the virus had exploited a weak point in my security. Using advanced tools, they traced the stolen funds across the blockchain and located them. After a thorough recovery process, they managed to return the entire $250,000.Thanks to their expertise and quick action, I was able to recover my funds. The experience was a wake-up call about how vulnerable even the most cautious can be to sophisticated attacks. Without Cyber Constable Intelligence, I would have lost everything, and I’m grateful for their skill in reversing the damage caused by the virus.
Here's Their Info Below
WhatsApp: 1 (252) 378-7611
mail: cyberconstable @ coolsite net
Website info; www cyberconstableintelligence com1 -
RECOVER MONEY FROM ONLINE SCAM HIRE ADWARE RECOVERY SPECIALIST
WhatsApp info:+1 (272) 332–8343
Based in New York, I’ve always been familiar with the fast-paced and often volatile nature of financial markets. Navigating them has become second nature to me over the years, and I’ve had my share of both wins and losses. However, nothing prepared me for the emotional rollercoaster I experienced when I stumbled across a binary trading platform that promised incredibly high returns in a short period. The site looked legitimate, the testimonials seemed genuine, and the returns it promised were hard to ignore. Overcome by the potential for profit, I invested a substantial amount $25,000. At first, everything seemed to be going as promised. I was getting regular updates on my supposed profits and felt confident that I had made the right move. However, as time went on, things began to feel off. The platform became increasingly difficult to access, and my attempts to withdraw funds were met with delays and excuses. It wasn’t long before I realized I had been scammed. The sinking feeling of losing everything was unbearable, and I found myself questioning how I could have been so careless. At my lowest point, when I was unsure if there was any way to recover my money, I came across a post on Instagram recommending a service called ADWARE RECOVERY SPECIALIST. At first, I was skeptical. After all, I had just been burned by a fraudulent platform, so the idea of trusting another service seemed risky. But the post highlighted their professionalism, quick action, and, most importantly, a track record of successfully helping people in similar situations. After some research and a few reassuring conversations, I decided to give them a shot. ADWARE RECOVERY SPECIALIST team was prompt, organized, and transparent in their approach. They understood the urgency of my situation and set to work immediately. Their professionalism reassured me that I was in good hands. Within just a few weeks, I received the news I had been hoping for my full investment of $25,000 was recovered. The relief I felt was indescribable. Not only had I regained my funds, but I also regained my faith in the process of recovery. I can’t thank ADWARE RECOVERY SPECIALIST enough for their dedication and expertise. Thanks to them, I’m now more cautious when navigating the online financial landscape, but I’m also grateful that there are services out there that genuinely care about helping people like me. If you ever find yourself in a similar situation, I highly recommend reaching out to them they truly are a success story.1 -
Ask META TECH RECOVERY PRO for help via:
Metatech @ Writeme . Com
WHATSAPP +1 (469) 692‑8049
My elation knew no bounds as my earnings began to surge higher. Intrigued, I increased my investment. This investment firm assured me that I could retrieve my profits after two months. Upon the expiration of those eight weeks, I attempted to access my invested capital, only to discover I was locked out of my account. My cryptocurrency investment had been compromised, and I was then instructed to remit a substantial sum to regain full access to my investment. I was utterly bewildered, as the amount demanded was exorbitant. I implored them to deduct the necessary sum, but my pleas fell on deaf ears. I then sought alternative methods to recover my hijacked crypto assets as time was going by, and my business capital, which I tampered with, was crumbling. I engaged with several crypto recovery specialists, but they all absconded with my funds, leaving me deep in debt. I cannot precisely recall how I encountered META TECH RECOVERY PRO, though I believe it was through Facebook. I contacted them, outlining my situation, and they assured me of a successful recovery, along with a forensic analysis of the data I provided. I harbored some skepticism during my interactions with META TECH RECOVERY PRO, yet they ultimately upheld their commitments. I successfully recovered my hijacked crypto assets, which were returned to my digital wallet. Kudos to the team of META TECH RECOVERY PRO, I really applaud their expertise.
Thank you.2 -
RECOVER LOST OR STOLEN BITCOIN, ETH, USDT WITH THE SUPPORT OF CYBER CONSTABLE INTELLIGENCE
The internet can feel like the wild west, full of danger and hidden traps, and I learned that lesson the hard way when I lost access to my Bitcoin wallet thanks to some sneaky malware. Picture this: I was just minding my own business, innocently clicking on what I thought was a harmless ad, maybe something about a new “must-have” kitchen gadget, when suddenly I found myself staring in horror at my computer screen, realizing I had just compromised my wallet containing a whopping $480,000. Talk about a facepalm moment! It felt like I’d just walked into a bar in a cowboy movie, only to find out the saloon was full of outlaws.
In the midst of my panic, I turned to Cyber Constable Intelligence, hoping they could pull off a miracle. I can’t emphasize enough how much they felt like my personal posse in that moment. Their team was not just professional; they were genuinely empathetic, treating my case with the urgency it absolutely deserved. It felt like I was surrounded by a group of tech-savvy superheroes, ready to tackle the villain that was my lost fortune.
After a few days of nail-biting suspense, I received the call that changed everything. They had not only recovered my funds but had done it faster than I could say “malware disaster.” It was like winning the lottery, only this time, I wasn’t just rich; I was also educated! They took the time to provide me with invaluable advice on safeguarding my wallet in the future, transforming my panic into peace of mind.
I walked away from this experience not only with my $480,000 intact but also with a newfound respect for the importance of digital security. I mean, who knew that clicking on an ad could lead to such chaos? It’s like finding out that your favorite cowboy is actually a bandit in disguise. Thanks to Cyber Constable Intelligence, I can finally take a breath without feeling like my funds are riding off into the sunset.
So, here’s to you, Cyber Constable Intelligence! You’ve not only saved my wallet but have also given me the tools to navigate this wild digital frontier with a sense of humor and a lot more caution. I can’t thank you enough for turning my panic into peace of mind. Next time I see a “too good to be true” ad, you can bet I’ll be remembering this lesson and staying far away
Reach Their info with the info below
What Sapp Info: 1. (2. 5. 2. ) 3. 7. 8. (7. 6. 1. 1.)
Email Info : support (@) cyber constable intelligence com
Website info: www cyber constable itelligence. com -
American Alliance Security Agency: The Best Security Company in New Hampshire
When it comes to securing your business, home, or special event, you deserve nothing less than the best. At American Alliance Security Agency, we proudly stand as the best security company in New Hampshire, offering comprehensive, tailored security solutions that give you peace of mind. With a team of experienced professionals and a dedication to providing top-tier protection, we are committed to safeguarding your property and loved ones with the highest level of care.
Why American Alliance Security Agency is the Best Security Company in New Hampshire
At American Alliance Security Agency, we understand that security isn’t just about protecting assets—it’s about providing a sense of safety and assurance. Here’s why we are considered the best security company in New Hampshire:
Experienced and Professional Team: Our security personnel are highly trained, with years of experience in handling a wide range of security situations. From managing crowds at large events to providing on-site protection for businesses, our team is equipped to handle any challenge.
Comprehensive Security Services: We offer a wide range of security services to meet the diverse needs of our clients. Whether you need on-site security guards, CCTV monitoring, event security, access control management, or fire watch services, we have you covered.
Tailored Security Solutions: We recognize that no two properties or events are the same. That’s why we offer personalized security plans designed to address the specific needs of your business, home, or special event. We assess potential risks and create a customized strategy to provide maximum protection.
24/7 Availability: Security is a constant concern, and that’s why we offer round-the-clock service. Whether you need surveillance at night, emergency response during the day, or full-time protection, we are always ready to respond to your needs.
Commitment to Excellence: Our commitment to excellence means that we never cut corners when it comes to the security of your property or loved ones. We continually invest in the latest technology, training, and systems to ensure we remain the best security company in New Hampshire.
Our Range of Security Services
At American Alliance Security Agency, we offer a comprehensive range of services designed to protect your assets and ensure the safety of those around you. Here are just a few of the security services that set us apart:
Security Guard Services: Whether you need armed or unarmed security, we provide professional security guards who are highly trained to protect your property, manage security risks, and respond quickly to incidents.
Event Security: From concerts and festivals to corporate events and private parties, we provide event security services to ensure smooth operations, crowd control, and the safety of all attendees.
CCTV Monitoring: Our CCTV monitoring services provide real-time surveillance and continuous monitoring of your property. Whether you need to monitor your retail store, office, or home, our security team is ready to watch for suspicious activity and respond swiftly.
Risk Assessment: We conduct thorough risk assessments to evaluate your property or business's security vulnerabilities. By identifying potential threats, we help you implement preventive measures to protect your assets, employees, and clients.
Access Control Management: Our access control solutions allow you to manage who enters your property, ensuring only authorized individuals have access to restricted areas.
Fire Watch Services: We offer specialized fire watch services to monitor sites at risk of fire hazards. Whether it’s a construction site, industrial facility, or large event, we ensure that fire safety protocols are being followed.
Mobile Patrols: Our mobile patrol services offer dynamic security coverage for large properties or multiple locations. We provide random, scheduled patrols to ensure comprehensive security and deter any criminal activity.
Why We Are the Best Security Company in New Hampshire
Choosing American Alliance Security Agency means choosing the best in the business. Here’s why:
Proven Track Record: We have a proven track record of successfully protecting properties, businesses, and events in New Hampshire. Our clients trust us to provide reliable, professional security services that meet their unique needs.
Advanced Technology: We stay ahead of the curve by investing in the latest security technology, such as surveillance cameras, alarm systems, and access control systems, ensuring that our services are efficient, effective, and up to date.1 -
Navicosoft offers VPS hosting solutions that can be purchased using various cryptocurrencies, including Bitcoin, Ethereum, Monero, and Dash. This allows users to maintain privacy and anonymity in their transactions. The VPS services come with features like full root access, SSD storage, and KVM virtualization. Navicosoft provides instant setup across over 100 global data center locations, catering to users seeking secure and anonymous hosting solutions .2
-
So, I decided to try hosting a couple of personal projects on a VPS that accepts Bitcoin payments. Not because I’m trying to go full crypto-anarchist or anything, but honestly—it’s super convenient when I don’t feel like dealing with banks or card declines for offshore services.
Found a provider that let me pay in BTC, no ID required, and had the VPS up in under 10 minutes. Ubuntu, full root access, decent specs for the price, and no questions asked. Just how I like it.
There’s something satisfying about using Bitcoin not just as an investment but actually as a currency. Plus, hosting stuff this way gives a nice little privacy boost—no paper trail, no names attached.
Only downside? BTC transaction fees can spike randomly, and some hosts make you wait for a couple of confirmations before provisioning. But hey, trade-offs.
Anyone else experimenting with Bitcoin VPS setups? Especially curious if anyone’s self-hosting Bitcoin nodes or lightning services.2 -
PYRAMID HACK SOLUTION'S crew was assuring, considerate, and professional. They took me through their system in detail, updating me at each step. Unlike with all my dead ends, they actually had a real plan in motion. And it worked out. They recovered my long-lost password in a matter of days and restored full access to my Bitcoin. Waves of relief crashed over me and I couldn't even try and count them. What could have been a financial debacle, a complete loss, became a fought-for success. PYRAMID HACK SOLUTION recovered my assets, but restored my peace of mind, too. With them (and a podcast episode I happened to tune in at a particularly inopportune moment), I have a much-improved system in motion for protecting my assets. Telegram; @PyramidhackSolution WhatsApp; +4474142809141
-
CRYPTO SCAM RECOVERY SUCCESSFUL – A TESTIMONIAL OF LOST PASSWORD TO YOUR DIGITAL WALLET BACK.
My name is Robert Alfred, Am from Australia. I’m sharing my experience in the hope that it helps others who have been victims of crypto scams. A few months ago, I fell victim to a fraudulent crypto investment scheme linked to a broker company. I had invested heavily during a time when Bitcoin prices were rising, thinking it was a good opportunity. Unfortunately, I was scammed out of $120,000 AUD and the broker denied me access to my digital wallet and assets. It was a devastating experience that caused many sleepless nights. Crypto scams are increasingly common and often involve fake trading platforms, phishing attacks, I highly recommend them with full confidence Email Recovercapital @cyberservices. com2 -
You can Hire a professional and special hacker with good reputations and integrity to hack any cell phone activities remotely for you as long as you have the target person cell phone numbers. Maestro Encrypter Financier can provide you a full and untraceable access to live call recording, ambient listening of background sound recording, Text messages, including the deleted text, WhatsApp chats, Facebook account conversations, photos, Email, tracks location, monitor browser activity and history and can clone any cell phone remotely for you without the target person knowledge. You can reach out to him for any of the above services for help. He’s a professional and ethical hacker and always ready to help. Just tell him your problem he’ll help and provides a lasting solutions to it. Text him via email: maestro encrypter @ financier . com or rather visit WhatsApp: [ +1 472 203 8937 ]
1 -
I was duped into investing $108,000 in a cryptocurrency investment platform, which promised astronomical returns. The platform disappeared overnight, taking my Bitcoin and leaving me with a bitter taste of shame. We searched so many forums and found a group specializing in crypto recovery, Wizard James Recovery. They provided a professional service, tracing the flow of my coins across the blockchain. The team pressured the right points, freezing the wallets holding the funds before the scammers could liquidate them. The next morning, the team secured access to a portion of my assets, proving that $108,000 worth of Bitcoin was recoverable. They walked me through the final steps, including setting up a secure wallet, verifying the transfer, and watching the coins land. I was stunned to see my money back, the team at Wizard James Recovery turned a nightmare into a second chance. They were the ones who fought to make things right in a world full of thieves. Contact their customer service at WIZARDJAMESRECOVERY@ USA. COM1
-
I lost my cryptocurrency worth $308,000 investment in a platform that promised astronomical returns. I found a group specializing in crypto recovery after surfing through the net, Wizard James Recovery, who traced the flow of their coins across the blockchain and froze the wallets holding the funds before the scammers could liquidate them. The team secured access to a portion of the investor's assets, proving that $285,260 worth of Bitcoin was recoverable. The team turned a nightmare into a second chance in my life, fighting to make things right in a world full of thieves. The investor's art collective's multi-sig wallet hemorrhaged $308,000 in Bitcoin, and their studio fell silent. A blockchain dev tagged their graffiti wall with Solidity snippets, suggesting they contact Wizard James Recovery Services. Within hours, Wizard's team diagnosed a flaw in the withdrawal function, tracing the forgeries and changing the locks. The investor's studio became a war room, but the funds returned, and the art collective's installations thrived. All thanks to Wizard James Recovery Service. Below is their contact details.
WhatsApp Number + 4 47418367204
Email. wizardjamesrecovery @ usa . com1 -
APNA IPTV: Your Premier Destination for IPTV Box and IPTV Recharge Services in Surrey, Vancouver
Are you looking for reliable IPTV recharge services or searching for an IPTV box in Surrey? Look no further than APNA IPTV—your trusted local provider of top-quality IPTV services. Conveniently located at 12990 72 Ave, Surrey, BC V3W 4J7, we specialize in offering free IPTV solutions and IPTV box recharge subscriptions, ensuring that you enjoy uninterrupted access to your favorite shows, movies, and live sports.
What is IPTV?
IPTV (Internet Protocol Television) is an advanced method of delivering TV content through the internet rather than traditional cable or satellite services. IPTV provides access to live TV, on-demand videos, sports, news, and much more, all through an internet connection. It’s the perfect solution for anyone looking to enjoy high-quality entertainment at an affordable price.
At APNA IPTV, we are committed to providing the best IPTV experience for our customers in Surrey, Vancouver, and the surrounding areas. Whether you're in need of an IPTV box or looking for convenient IPTV recharge options, we’ve got you covered.
Why Choose APNA IPTV for IPTV Box and IPTV Recharge in Surrey?
IPTV Box in Surrey: At APNA IPTV, we offer a wide selection of IPTV boxes to suit your entertainment needs. Whether you're new to IPTV or looking to upgrade your current setup, we provide the best IPTV boxes that offer seamless streaming, high-definition content, and easy installation. Our team will guide you through the process of setting up your IPTV box to ensure that you get the most out of your IPTV experience.
Convenient IPTV Recharge Services: One of the key services we offer is IPTV recharge. Our IPTV box recharge subscriptions are designed to keep your device updated and running smoothly. With an easy-to-manage IPTV recharge, you’ll have uninterrupted access to all the content you love, whether it’s live TV, movies, or sports.
Free IPTV Solutions: Looking for free IPTV? We offer a selection of free IPTV services that give you access to a variety of channels and content, allowing you to explore the world of IPTV without any commitments.
Local Support in Surrey: As a local business in Surrey, we pride ourselves on offering personalized service. Whether you need a new IPTV box, a recharge for your existing device, or help setting up your IPTV service, our team is here to provide expert assistance. We understand the unique needs of our Surrey customers and are dedicated to offering high-quality, reliable service.
Affordable IPTV Solutions: At APNA IPTV, we are committed to providing affordable IPTV services. Whether you’re interested in free IPTV solutions or a premium IPTV subscription, we offer a variety of packages designed to fit your needs and budget.
What APNA IPTV Offers:
IPTV Box in Surrey:
We provide high-quality IPTV boxes that are designed for easy setup and smooth streaming. Whether you’re watching local channels, international content, or on-demand shows, our IPTV boxes are equipped to deliver a superior viewing experience.
IPTV Recharge:
Keep your IPTV box running at full capacity with our affordable IPTV recharge services. Regular recharges ensure that you continue to enjoy uninterrupted access to the latest content without any disruptions.
Free IPTV Solutions:
Enjoy a wide variety of channels and shows with our free IPTV services. Explore new content, enjoy live TV, and get access to movies, sports, and more—all without the need for a paid subscription.
Customer Support:
Our friendly and professional team is always available to assist you with any questions or concerns regarding your IPTV box or IPTV recharge services. Whether you need help setting up your device or troubleshooting an issue, we’re just a phone call away.
Why Surrey Residents Choose APNA IPTV:
Affordable and Convenient:
We understand that many people are looking for affordable alternatives to traditional cable services. Our IPTV services offer a flexible, budget-friendly option for accessing entertainment. Plus, with our IPTV recharge services, you can enjoy uninterrupted access without any hassle.1 -
UNLOCK YOUR LOST DIGITAL ACCOUNT AND FROZEN FUNDS WITH DIGITAL HACK RECOVERY EXPERTS
A financial catastrophe unfolded when I entrusted this platform with my life savings. For months, I had been saving diligently for one major goal: buying a car. Each deposit brought me closer to my dream, but just as I was nearing my target, I came across an investment opportunity that seemed too good to pass up. The platform promised high returns with robust security, so I decided to invest the money I had set aside for the car.At first, everything seemed to be going according to plan. My account showed promising growth, and the customer service reassured me that my investment was safe. But one morning, I tried to log in to check my balance and found that my account was suddenly frozen. Panic set in. Despite multiple attempts to reset my password, I was unable to regain access. Days turned into weeks, and my efforts to contact customer support went unanswered. My anxiety mounted as I realized that my hard-earned savings intended for my car could be lost. In desperation, I started searching for solutions online. That’s when I found Digital Hack Recovery. Their team specialized in recovering lost accounts and frozen funds. Though initially skeptical, I felt I had nothing to lose and reached out to them. From the moment I made contact, their professionalism and expertise were apparent. They took immediate action, thoroughly investigating my case and working directly with the platform to resolve the issue.Within a few days, I was given the incredible news: my account had been restored, and I regained access to the full amount of $150,130. The relief I felt was overwhelming. What once seemed like an impossible situation had been turned around, thanks to the dedicated team at Digital Hack Recovery.With my savings back in my hands, I was finally able to purchase the car I had dreamed of for so long. The moment I drove it off the lot, I knew that the journey, though full of frustration, had ultimately led me to a successful conclusion. My goal had been realized, and it was all thanks to the help of Digital Hack Recovery.If you ever find yourself locked out of your account or struggling to recover your funds, I wholeheartedly recommend Digital Hack Recovery. Their expertise and dedication can turn your financial setbacks into victories, just as they did for me. For quick assistance contact Digital Hack Recovery⁚
WhatsApp⁚ +19152151930
Email⁚ digital hack recovery @ techie . com
Website⁚ https : // digital hack recovery . com1 -
App idea: Platform for ongoing entrepreneurs
I just come from a start-up weekend. I really enjoyed the support we got from 17 different mentors (most of them founded in the past on their own).
Back home start-up funders don't have the access to that mentoring. My idea is to create a platform specialized for founders, where you can share your idea, believes and ask question all around your business.
I think especially in the early founding stages entrepreneurs are full of questions. Helping and discussing with other selfminded people is probably very enjoyable for us founder folks. A difference to the f.e. reddit concept: Users can create "diaries", a place where all storys, questions and posts about your project are stored. Reading a diary from beginning to end shall be a fun experience, reviewing your or others history of their "babys" and following the entrepreneurs thoughts through all stages of founding. Users of course can create multiple diaries.
Functionality will be suited for the listed usecase, for example a "Post as Anonymous" function will be added, if you have to deal with company sensitive data and more stuff like that.
What do you think about the idea? Do you like it? Would you use it? If not, tell me why?
Cheers -
RECOVERY COMPANY SERVICE TO RECOVER LOST OR STOLEN BTC, HIRE SALVAGE ASSET RECOVERY
I had never thought that a read passing would one day save me from financial ruin. I was just going through some crypto blogs that evening to see security tips. I stumbled upon a pretty personal post of someone who had lost access to his Bitcoin wallet. He simply made the mistake of forgetting his password, and it had gone to catastrophic ends.
It was not the story itself that caught my attention but how it ended. The writer had finally found this company called Salvage Asset Recovery, which had successfully returned their funds to them. Their words were full of relief and gratitude toward the team that got them out of that troublesome situation.
I thought, That's terrible. But that won't happen to me. I was wrong.
A few weeks later, I had the same nightmare. I had set up a complex passphrase for my crypto wallet, one I was sure I would never forget. Fast-forward some time later, life got busy, and when the time came to access my funds, I drew a complete blank. However much I tried different combinations, none worked.
I stared down at my wallet, holding a cool $150,000 in Bitcoin that was now completely unreachable to me. Recovery phrases meant absolutely nothing because the encryption on it had changed some months prior as a measure to further beef up security; ironically, that action had managed to lock me out of my money.
It was then that the blog post came to my mind.
I searched frantically for it, found the name Salvage Asset Recovery, and reached out immediately. From the first message, their team was calm, professional, and reassuring. They explained their process step by step, analyzing my wallet's encryption and working tirelessly to regain access.
Days passed, and my anxiety only grew—until I got the call that changed everything. They had cracked my forgotten passphrase. My $150,000 was back in my hands.
I was so relieved. But more than just getting my money back, Salvage Asset Recovery structured a more secure yet workable system for the future.
That blog had undersold their brilliance-these people are lifesavers. Without them, my money would have been locked away forever.
Now, I tell everyone in my crypto circles: if you ever get locked out of your wallet, there is only one name that you need to remember: Salvage Asset Recovery. Reach Out to them via --
WhatsApp+ 1 8 4 7 6 5 4 7 0 9 6
1 -
Having full access to online papers opens up a lot of benefits for students:
Online essays are available whenever you need them. You just need to have access to the Internet!
Our essays are written in accordance with all writing standards. You shouldn’t be worried about grammar mistakes because we add samples of reputable professionals to our base. It also means that structure, sequence, and logic of writing are clear, precise and understandable.
Our website contains an huge assortment of newspapers on topics that are various, which means you will not have trouble locating the one for your requirements.
You may download and use our samples! This benefit is helpful since you may look through our essays and also make up your papers that are private to fulfill both your own teachers' needs and get outstanding grades.
Specialized language can be found by you in our essays, which is quite beneficial to understand while drafting missions that are new. You could paraphrase some passages to make them seem brand new and fresh.
You can even cite some of them because quotations are used widely in our essays. Moreover, you can use references from essays to broaden your base of references. Thus, your essay may look more solid and convincing, and newly found references may help you with further research and writing.
Our site is easily navigated. It has an essay helper that facilitates to find a proper paper manyfold. It will not take much time to find a paper you really need.
Nevertheless, students who are under pressure due to lack of time and control can place an order for custom and professionally written essays. Our trustworthy service has already assisted many times in writing original and qualitative assignments. High standards of our works have helped many students to get the best grades! Your professors will be satisfied, and you will get more time to do things you really adore doing! -
HIRE TRUST GEEKS HACK EXPERT FOR ALL HACKING SERVICES REVIEWS 2025
I never imagined I’d lose access to my Bybit wallet — Especially with $50,000 worth of Bitcoin inside. But one wrong move, a forgotten security detail, and suddenly, my funds were gone. I couldn’t log in. I couldn’t reset anything. I was completely locked out. The panic that hit me was unreal. I tried everything — support tickets, online forums, tutorials, even “recovery tools” — but nothing worked. Days turned into weeks, and hope started to fade fast.
I searched endlessly online, reached out to forums, and tried every recovery method I could find. I even contacted Bybit wallet support, but since it’s a non-custodial wallet, there wasn’t much they could do. As days turned into weeks, my hope started to fade. I truly believed my Bitcoin was gone forever. That’s when I discovered Trust Geeks Hack Expert. At first, I was skeptical. The internet is full of scammers who prey on people like me — desperate and vulnerable. But from the moment I spoke with Trust Geeks Hack Expert, something felt different. They were calm, respectful, professional — and most importantly, honest.
They didn’t promise a miracle. They explained the risks, walked me through their process step by step, and reassured me without giving false hope. I decided to take the leap and trust them, and I am so glad I did. Within just a few days, they reached out with the message I never thought I’d receive: “We’ve recovered your Bitcoin.” Every single dollar was there. Nothing missing. No delays. Just relief, gratitude, and pure disbelief.
Trust Geeks Hack Expert didn’t just recover my money — they restored my peace of mind. They handled everything with care, skill, and absolute integrity. In a world full of uncertainty, they were the one team I could trust when it mattered most. for Assistance support team is available Web h tt p s :// trust geeks hack expert . c o m/-- E m a i l: Trust geeks hack expert @ fast service . com -- TeleGram: Trustgeekshackexpert
2 -
HIRE A HACKER TO RECOVER STOLEN BTC / USDT / BNB - DIGITAL TECH GUARD RECOVERY
I was instantly drawn to the idea of the Dubai Cryptocurrency Summit. As a startup founder deeply involved in fintech, the allure wasn’t just the professional opportunity it was the entire package. Dubai’s reputation for luxury, innovation, and ambition made it feel like the perfect setting for a high-profile cryptocurrency event. The promotional materials played into that image perfectly sleek branding, glamorous images of the Burj Khalifa, luxury hotels, exclusive networking lounges, and promises of elite industry attendees from around the globe. The event promised a premium experience that aligned perfectly with the bold, forward-thinking vision I had for my company. I pictured myself networking in rooftop lounges, pitching to investors, and forming strategic partnerships in a city known for embracing blockchain and crypto innovation. Everything about the summit matched Dubai’s reputation high-end, cutting-edge, and full of opportunity.The "premium sponsorship package" was offered at $25,000 in Bitcoin, and it promised a speaking slot, a branded booth, marketing exposure, and exclusive access to investor roundtables. It felt like a fast track to recognition and growth, all set against a backdrop of luxury and global innovation. The polished website, active social media pages, and impressive list of supposed sponsors and speakers all added to the credibility. It seemed too good to pass up. But as the event date approached, red flags began to appear. The summit’s website started glitching, emails to the organizers bounced back, and their social media accounts disappeared. That’s when the harsh truth hit me: the Dubai Cryptocurrency Summit was a scam. The event never existed, and I had sent $25,000 in Bitcoin into thin air. I contacted DIGITAL TECH GUARD RECOVERY, a firm specializing in cryptocurrency scam investigations. Using advanced tracking tools, they traced my Bitcoin through complex wallets and eventually to a Dubai-based crypto exchange. Working with local authorities, they managed to freeze the scam wallet and recover $22,000 of my funds. While it wasn’t the full amount, it was a significant victory.
WhatsApp: +1 (443) 859 - 28862 -
Shokoh Nasab Los Angeles Real Estate Specialist: Your Trusted Partner for Buying and Selling Homes in Los Angeles
Are you looking to buy a house in Los Angeles? Whether you are looking for a cozy home in East LA, a luxurious estate in Beverly Hills, or a piece of land for investment, Shokoh Nasab is your expert guide in navigating the Los Angeles real estate market. With years of experience and a deep understanding of the area’s property landscape, we offer personalized services to help you find your perfect home or investment property.
Why Choose Shokoh Nasab Los Angeles Real Estate Specialist?
Expert Guidance in Buying Homes
At Shokoh Nasab, we specialize in buying homes in Los Angeles and surrounding areas. If you're searching for a house for sale East LA or want to explore other neighborhoods in Los Angeles, we provide you with the expertise to navigate the diverse market and find the right property for your needs. From single-family homes to luxury estates, we are here to help you every step of the way.
Your Trusted Realtor in Beverly Hills
Looking to invest in one of the most sought-after locations in Los Angeles? As the agent Beverly Hills, Shokoh Nasab offers you exclusive access to some of the best properties in this iconic neighborhood. Whether you're looking for a modern mansion or a charming bungalow, we provide expert advice to help you make the best choice.
Buy House in USA Los Angeles
If you're planning to buy a house in USA Los Angeles, we can help simplify the process. Los Angeles is known for its diverse neighborhoods, each offering unique advantages, and we ensure that you have all the information needed to make an informed decision.
Explore Realty California and Find Your Dream Home
Realty California is a dynamic and competitive market, but with Shokoh Nasab, you have an experienced real estate professional by your side. Whether you're interested in residential properties, land for sale, or commercial real estate, we provide comprehensive services to match your needs.
Realtor Listings for Your Dream Home
Access our exclusive realtor listings to find the perfect property. We feature a wide range of homes, from houses of sale to new construction, giving you a variety of options to choose from. Our listings are always up-to-date, ensuring you have access to the latest properties available.
Buying Land and Real Estate Investment Opportunities
If you're interested in buying land, we offer expert advice on available parcels across Los Angeles and the surrounding areas. Whether you're looking for a plot for development or investment, Shokoh Nasab helps you identify the best opportunities in the market.
Open Houses in Los Angeles
Take advantage of open houses in Los Angeles to explore available homes firsthand. We host open houses regularly, offering you the chance to tour properties and get a feel for the neighborhood. This is a great opportunity to ask questions and assess the property before making any decisions.
Realty Sale and Selling of Property
Whether you're buying or selling, we provide full realty sale services. For sellers, we help you navigate the selling of property, ensuring your home is priced correctly, marketed effectively, and sold quickly. If you're buying, we provide expert negotiations and ensure you get the best value for your investment.
Partnering with Keller Williams Real Estate
KW Keller Williams Real Estate is one of the most respected real estate companies in the industry. As part of their network, Shokoh Nasab brings you a wealth of resources, exclusive listings, and a vast network of professionals to help you with your property needs.
Homes Selling Fast? Get the Best Deals with a Top Agent
In a fast-paced market like Los Angeles, homes selling can be a competitive process. With Shokoh Nasab on your side, you’ll have access to properties before they hit the public market, giving you a competitive edge when you're ready to buy. As the best real estate agent in Los Angeles, we ensure that you make the most of every opportunity.
Our Services Include:
Buy a House: We provide expert advice and a wide range of homes for sale, from affordable properties to luxury estates.
Buy a Land: If you're looking to invest in land, we can help you find the perfect parcel in Los Angeles and surrounding areas.
Open Houses: Attend our open houses Los Angeles and explore properties firsthand, ask questions, and make informed decisions.
Realty Sale Services: Comprehensive support for both buying and selling properties, including market analysis, negotiations, and closing deals.
Selling of Property: If you're looking to sell your home, we help you market it effectively and negotiate the best deal.9 -
BEST CRYPTOCURRENCY RECOVERY EXPERT HIRE MAESTRO ENCRYPTER FINANCIER
I mean, thinking back, it has seemed almost too good to be true. After so many different failed attempts with other companies and solutions, I pretty much had given up hope of such a thing happening. That's when Maestro Encrypter Financier completely flipped everything. They not only managed to restore my Bitcoin but did manage to restore my faith in customer service and technical excellence for cryptocurrency. Their approach was full, professional, and more importantly, they delivered the goods. I am speechless and out of words to thank them. If in the same situation, where you can't access your Bitcoin or any other cryptocurrency, I strongly recommend reaching out to Maestro Encrypter Financier. Apart from a lot of companies in this field promising to deliver heavens and giving you less than a pinch, Maestro Encrypter Financier is among the few which makes it a point that it keeps the promises and sees through its commitments. After countless failures, I finally found a company that delivered. And for this, I'll be forever grateful. I was surprised with the speed at which the whole process started moving. While most other companies made me wait for days or even weeks without any progress, Maestro Encrypter Financier immediately sprang to action. They started their analysis of my wallet encryption, cross-referencing some security protocols, and applied advanced recovery tools to fight their way through issues that had been preventing access. A recovery time was projected for the effort involved in recovering this data. And, amazingly, they succeeded by it. It was further an important milestone in that entire process when, after my perceived 'dead end', Maestro Encrypter Financier recovery experts were ready to put on alternatives around the problems instead of accepting 'that's impossible' as some would try to cash on or change to. They never pressed me to do anything that sounded like fraud or was an unnecessary charge. It was a day that I would never forget-a moment when such an email landed in my box from Maestro Encrypter Financier and assured me that my Bitcoin was restored. I could feel my heartbeat as I tried to log into my wallet. I was so used to seeing the "access denied" message that it felt like a dream to finally see my balance staring back at me. The coins were all there, as they should be. My whole investment-my future-was safe again. Not only did they return my Bitcoin, but the team even made sure that my wallet was now more secure than ever. They gave me better security features and explained how to maintain my digital assets in the future. Because of Maestro Encrypter Financier, I would never have to experience the loss of my Bitcoin again. For enquiry, Email:(maestroencryp1er@financier. com) or call/ WhatsApp: +14722038937
5 -
BEST CRYPTO RECOVERY EXPERT; ESSENTIAL STEPS TO RECOVER LOST BITCOIN AND USDT VISIT CYBER CONSTABLE INTELLIGENCE
I lost $210,000 worth of Bitcoin to a group of fake blockchain impostors on Red note, a Chinese app. They contacted me, pretending to be official blockchain support, and I was misled into believing they were legitimate. At the time, I had been saving up in Bitcoin, hoping to take advantage of the rising market. The scammers were convincing, and I made the mistake of trusting them with access to my blockchain wallet. To my shock and disbelief, they stole a total of $10,000 worth of Bitcoin from my wallet. It was devastating, as this amount represented all of my hard-earned savings. I was in utter disbelief, feeling foolish for falling for their deceptive tactics. I felt lost, as though everything I had worked towards was taken from me in an instant. Thankfully, my uncle suggested I reach out to an expert in cryptocurrency recovery. After doing some research online, I came across Cyber Constable Intelligence. I was hesitant at first, but their positive reviews gave me some hope. I decided to contact them directly and explained my situation, including the amount I had lost and how the scammers had gained access to my account. To my relief, the team at Cyber Constable Intelligence responded quickly and assured me they could help. They launched a detailed recovery program, using advanced tools and techniques to trace the stolen Bitcoin. Within a matter of days, they successfully recovered my full $210,000 worth of Bitcoin, and they even identified the individuals behind the scam. Their expertise and professionalism made a huge difference, and I was incredibly grateful for their support. If you find yourself in a similar situation, I highly recommend reaching out to Cyber Constable Intelligence. They helped me recover my funds when I thought all hope was lost. Whether you’ve lost money to scammers or any other form of online fraud, they have the knowledge and resources to help you get your funds back. Don’t give up there are experts who can help you reclaim what you’ve lost. I’m sharing my story to hopefully guide others who are going through something similar.
Here's Their Info Below
WhatsApp: 1 (252) 378-7611
mail: cyberconstable (@) coolsite net
Website info; www cyberconstableintelligence com3 -
LOST BITCOIN AND BLOCKCHAIN TECHNOLOGY HIRE DUNAMIS CYBER SOLUTION
633869Hi, I’m Robert. My journey into the world of Bitcoin began in 2024, thanks to a crypto-savvy classmate who casually mentioned his investments during a study session. Until then, I only had a passing interest in cryptocurrencies. But that conversation piqued my curiosity, and I began researching more about Bitcoin and blockchain technology. What started as casual reading quickly turned into a growing fascination. Eventually, I decided to take the plunge and invested a modest amount, something I considered more of an experiment than a serious financial move.To my surprise, that small gamble paid off. Within months, my investment skyrocketed, reaching an incredible $100,000. Watching that number rise was thrilling; it felt like I had stumbled into the future of finance. I was euphoric, imagining all the possibilities this sudden windfall could bring. For a while, I truly felt like I had unlocked a door to financial freedom.That feeling didn’t last long. In early 2025, everything took a dramatic turn. After a wild college party, I woke up to discover my phone was missing, lost somewhere in the chaos of the night. Losing a phone is bad enough, but my real panic set in when I remembered that my Bitcoin wallet’s two-factor authentication was tied to that device. I didn’t have backup codes. Just like that, I was locked out of my fortune. The helplessness I felt was overwhelming. I couldn’t believe I might have just lost $100,000 overnight.I confided in a friend, who mentioned a company called DUNAMIS CYBER SOLUTION .I was hesitant to believe it; these things usually sound too good to be true, but I had nothing to lose. I contacted them, hoping for even a sliver of hope. To my surprise, their team was not only responsive but incredibly knowledgeable. They assured me that recovery was possible, even without access to my phone or codes.In less than a week, they delivered. I regained full access to my Bitcoin wallet. That moment was indescribable relief, gratitude, and disbelief all at once. Thanks to DUNAMIS CYBER SOLUTION I got a second chance. Now, I take my digital security much more seriously and will always be grateful for the help when I needed it most.2 -
As a surgeon, I’m no stranger to pressure but nothing compares to the panic I felt after locking myself out of my Bitcoin wallet. After a 36-hour shift, running on fumes, I mistyped my password multiple times. I’d enabled extra security (trying to be responsible), and just like that, my $800,000 in Bitcoin was locked down. I tore through everything notes, emails, old backups. I even considered hypnosis. Nothing worked. Then a colleague mentioned BLOCKCHAIN CYBER RETRIEVE. Skeptical but desperate, I reached out. From the first interaction, they were professional, patient, and reassuring. They walked me through the process without judgment and gave me hope when I thought all was lost. It wasn’t instant it took weeks but they never gave up. Finally, they cracked it. I got full access to my wallet again.
The relief I felt was indescribable. It was like a successful surgery, only this time I was the patient.
BLOCKCHAIN CYBER RETRIEVE didn’t just recover my Bitcoin they saved my sanity. If you’re locked out of your wallet, don’t wait. Call them. They’re the real deal.
Contact information:Whatsapp +1, 5,2,0, 5,6,4, 8,3 0 0
Email: B L O C K C H A I N C Y B E R R E T R I E V E @ P O S T . C O M OR Zoho Mail: SUPPORT{at} B L O C K C H A I N C Y B E R R E T R I E V E{.}ORG1 -
I’ve always felt confident navigating the world of cryptocurrency. As a software engineer, I understood the ins and outs of wallets, private keys, and blockchain security, which made me feel secure in my investments. So, when I found a promising platform that seemed like a great opportunity, I invested $250,000 without hesitation. Unfortunately, I soon learned that my confidence would be shattered by a sophisticated cyber attack. It started with small, unauthorized transactions in my wallet. At first, I thought it was a mistake, but as the activity continued, I realized something was wrong. My wallet had been compromised, but not in the way I had expected. Instead of a simple hack, I had fallen victim to a virus attack. The virus was a piece of malware designed specifically to target cryptocurrency wallets. It infiltrated my system through a vulnerability I hadn’t noticed. Once inside, the virus silently monitored my wallet, captured my private keys, and gave the hackers full access to my funds. It was stealthy and nearly undetectable. The attackers didn’t need to log into my account manually; they could control everything remotely, draining my wallet without my knowledge. I was completely blindsided. As someone familiar with tech, I knew how advanced this virus was. It wasn’t just a typical phishing attack, it was a targeted, silent assault on my financial assets. As my funds disappeared, I realized I might never be able to recover them. Desperate, I turned to a trusted colleague who had gone through a similar situation. They recommended Hack Buster Recovery, a company that specializes in recovering stolen crypto assets.
1 -
All thanks goes to The Cyber Tech Wizard for their unwavering support to me during this trying time, in a world full of so many evil and unworthy people out there trying to impersonate on something they know nothing about i was been scammed of my hard earned money that i have saved all my life i nearly loose my life on this process thinking everyday knowing fully well that all my hope of living is gone.
I am a teacher from Oakes i have saved so many years and when i heard and read online about growing your income through bitcoin it sounds so very interesting to me that i had to invest all i have on the platform but not knowing that they are not the real legitimate investment company i fall prey for them they used me and made away with my money i could not access my password i was worried and was having a thought of suicide but one mind came to me and ask me to stumble online to see if there would be any legitimate recovery company that can retrieve scammed crypto. I found so many companies online but my mind pushed me to work with The [Cyber Tech Wizard] and the rest was history.
My money was reversed back and i was been taught so many things on how to guard my money increase my money grow income without falling into scam through The help Cyber Tech Wizard. You can also reach out to them if fallen victim V.i.A. Email cyber tech wizard @ cyber services DOT com
7 -
"When it comes to online gambling, slot games remain one of the most popular choices among players around the world. Whether you're a beginner or a seasoned gambler, the slots section at Pin-Up Casino offers an incredible variety of themes, game mechanics, and winning possibilities. If you're looking for a dedicated guide to help you understand everything about the slot experience at Pin-Up, https://pin-uplogin.com/slots/ is the perfect resource.
The website offers a comprehensive overview of the slot collection available at Pin-Up. From classic fruit machines to the latest video slots with 3D graphics and immersive soundtracks, there is something for every taste. Many of these slots come from top-tier developers such as NetEnt, Play'n GO, and Pragmatic Play, ensuring both quality and fairness.
In addition to game reviews, the site also offers helpful tips and insights into volatility, return-to-player (RTP) percentages, bonus features, and more. If you're new to online slots, understanding how paylines work or what ""free spins"" mean can be overwhelming, but the site breaks down everything in a user-friendly way.
Another important aspect covered is how to register and start playing on Pin-Up. It walks you through the login process, account verification, and making your first deposit to access the full slot library. Security and fair play are also discussed, giving players peace of mind before spinning the reels.
Whether you're playing for entertainment or hoping to hit the jackpot, this guide is a reliable companion to help you explore and enjoy the world of Pin-Up slot games in a smart and responsible way."9 -
PROFESSIONAL BITCOIN RECOVERY EXPERT; USDT RECOVERY EXPERT FOR HIRE: A FULL GUIDE BY CYBER CONSTABLE INTELLIGENCE
Hello there,
I want to share my unfortunate experience to warn others about a serious investment scam I fell victim to. I had been searching for a trustworthy platform to invest a substantial amount of money, and after some research, I decided to commit over half a million dollars to what appeared to be a legitimate opportunity. Unfortunately, what followed was nothing short of a nightmare. After making my deposit, I was unable to access my funds. My account was locked, and when I tried to reach out to customer support, I was told that I could only regain access to my account if I paid an additional fee. They claimed this would "unfreeze" my account, but it quickly became clear that this was just another scam tactic. The company refused to let me withdraw any of my funds unless I complied with their demands for more money. That’s when I realized I had been duped by a fake investment platform. I was devastated, as I had invested a significant portion of my life savings. However, I didn’t give up. A co-worker, who had experienced a similar issue with a fraudulent company, recommended Cyber Constable Intelligence to me. They had helped him recover a large part of his investment, and so I decided to give them a try. Cyber Constable Intelligence was extremely responsive and professional from the start. They took my case seriously, and their team began investigating my situation right away. I was kept in the loop throughout the process, and it was clear that they were dedicated to helping me recover my money. After several weeks of hard work, I was overjoyed to receive a notification that $215,000 had been successfully refunded to my account. While I didn’t get all of my money back, the refund I received was a huge relief. Cyber Constable Intelligence’s thorough approach and persistence made all the difference. I cannot express enough how grateful I am for their expertise and support in recovering a significant portion of my investment.For anyone who finds themselves in a similar situation, I highly recommend reaching out to a trusted recovery service like Cyber Constable Intelligence. It can be hard to trust anyone after experiencing a scam, but with the right professionals on your side, there’s hope for recovering what you’ve lost.
Here's Their Info Below
WhatsApp: 1 (252) 378-7611
mail: cyberconstable@coolsite net
Website info; www cyberconstableintelligence com1 -
I’ve been passionate about fitness for years, and in 2020, while studying at the University of Texas, I first heard about Bitcoin. One of my classmates was deeply involved in cryptocurrency and constantly talked about its potential. His enthusiasm piqued my interest, and I began researching Bitcoin on my own. Even though I didn’t have much to invest at the time, I took a chance with the little savings I had. Little did I know, this small investment would grow significantly over the next few years, eventually turning into an impressive $300,000. As a fitness enthusiast, I made regular visits to the gym part of my routine. But one day, after an intense workout session, I realized I had made a costly mistake. I left my phone behind in the locker room, and by the time I went back to retrieve it, the phone was nowhere to be found. Someone had taken it, and it was impossible to track it down. That’s when panic set in—I had all my two-factor authentication codes and security information for my Bitcoin wallet stored on that device, and I hadn’t backed anything up. In an instant, it felt like all of the money I had worked so hard to accumulate was gone.
I spent days trying different ways to recover access to my wallet, but nothing worked. I was convinced I had lost everything. It was an incredibly stressful time. However, while browsing online forums for solutions, I stumbled across Cyber Tech Wizard. I read numerous reviews from people who had experienced similar situations and had successfully recovered their wallets thanks to Wizard Cyber Tech Wizard . Skeptical but desperate, I decided to give them a try. From the moment I contacted Cyber Tech Wizard , they were professional and reassuring. They took the time to explain how they could recover my wallet even without my phone or backup codes. Their team worked diligently, and within just a few weeks, they succeeded in restoring full access to my wallet. The relief I felt was overwhelming—I couldn’t believe that my $300,000 was safely back in my control. If you’ve ever lost your phone or found yourself locked out of your Bitcoin wallet, don’t lose hope. Cyber Tech Wizard has the expertise and tools to get your funds back. Their service was a lifesaver for me, and I can’t recommend them enough for anyone facing a similar crisis.Details belloW ,,Email cyber tech wizard @ cyber services . com
-
IF YOU CAN TRACE BACK YOUR BITCOIN YOU CAN KEEK IT WITH= DIGITAL TECH GUARD RECOVERY
Investing in Bitcoin is often a high-stakes, high-reward endeavor. I invested CHF 30,000 into an online trading platform, optimistic about the potential returns. Initially, the investment seemed to be flourishing; within just a few weeks, its value climbed to CHF 39,000. The rapid increase was thrilling and felt like a validation of my decision. However, this initial euphoria soon gave way to frustration. I attempted to withdraw my profits, but each effort was thwarted by repeated blocks and obstructions from the platform. My attempts to access the funds were met with a series of difficulties, and it quickly became evident that something was seriously wrong. Realizing that I had likely fallen victim to a scam, I sought professional help. I contacted Digital Tech Guard Recovery, a firm known for its expertise in recovering lost or stolen cryptocurrency. The situation was dire, but Digital Tech Guard Recovery’s reputation for handling such cases gave me hope. The team at Digital Tech Guard Recovery acted swiftly and with precision. They employed advanced recovery techniques to address the complexities of my case. Their efforts were methodical and persistent, navigating through the platform's barriers and red tape. With their expertise, they were able to recover the full amount of CHF 39,000 that had been trapped. The resolution of my case was a significant relief. Digital Tech Guard Recovery’s intervention not only recovered my investment but also provided a sense of closure and security. This experience underscored the importance of carefully vetting trading platforms and remaining vigilant in the digital investment space. Thanks to the diligent efforts of Digital Tech Guard Recovery, I am now more informed and prepared for future investment opportunities. -
My name is Winifred Etan and for months, I lived in agony after losing my entire crypto portfolio worth $650,000 in USDT to a group of sophisticated online fraudsters.What I thought was a legitimate investment opportunity turned out to be an elaborate crypto manipulation scheme, leaving me devastated. But thanks to Washington Recovery Pro, a top-tier crypto recovery firm, I got my funds back. Here’s my story. It started when I joined a private Telegram group called Elite Crypto Investors.The admins claimed to have insider knowledge of low cap altcoins poised for massive pumps. They presented convincing charts, fake testimonials, and even video calls with successful traders who had supposedly made millions.Trusting their expertise, I transferred 650,000 USDT to a wallet they controlled, believing it would be used for a high yield, short-term trade. At first, they sent small profits to build trust. But when I tried withdrawing my full amount, they froze my access, deleted the group, and vanished.I reported the scam to authorities, but crypto transactions are nearly impossible to reverse without expert intervention. After weeks of research, I found Washington Recovery Pro, a firm specializing in blockchain forensics and asset recovery. They deployed advanced chain analysis tools to track my stolen USDT across Ethereum, Binance Smart Chain, and Tron networks. They identified the scammers’ exit points where they tried to cash out through offshore exchanges.Using their legal network, they froze the funds before the criminals could liquidate them. Within 7 days, they recovered 92% of my stolen USDT a staggering $598,000 and returned it to my secure wallet. Today, I’m forever grateful to Washington Recovery Pro for their skill and dedication. If you’ve been scammed, don’t lose hope professional recovery is possible.
WhatsApp-+1 (903) 249‑86332 -
BEST DIGITAL TECH GUARD RECOVERY - A CERTIFIED BITCOIN RECOVERY EXPERT
It's true, guys, Digital Tech Guard Recovery is the real deal! I never imagined heartbreak could manifest itself online until I was betrayed in the worst possible way. My ex-boyfriend the guy I used to trust with my whole heart—turned out to be the source of my utmost pain. When I confronted him for using my own hard-earned savings to fund his scandalous cheating sprees, I thought breaking up with him would finally set me free. He opted for revenge instead in the worst way possible. In a twist of sadism, he intentionally messed up the security credentials of my wallet so that I was completely locked out of my Bitcoin wallet with a staggering $850,000. Shock and disappointment at the time were indescribable. I felt as if all the notes of love and trust had been replaced with bitter notes of betrayal. My own world, which had been so full of hope for a bright future, was suddenly dark and uncertain. I wept for so many nights, wondering how someone I loved so dearly could hurt me so deeply. The electronic fortress of high-tech that I had built to safeguard my future was now a searing reminder of a trust betrayed by a person i once loved.
Yet, in the midst of such overwhelming grief, I would not succumb to despondency. Determined to regain what was rightfully mine, I searched for Digital Tech Guard Recovery—a name that shone like a beacon in my despair. Their staff encircled me with understanding and compassion from the very first call, as if they truly comprehended the anguish behind my situation. They listened patiently as I recounted every painful detail, reassuring me that my story was not one of defeat but of resilience.
With unwavering dedication and top-notch technical proficiency, Digital Tech Guard Recovery meticulously diagnosed the issues that had denied me access to my virtual paradise. Every update they provided was a soothing touch, smoothing the jagged edges of my bruised heart. In a matter of days, they restored my access and retrieved my $850,000 investment, an act not just restoring my finances but also beginning to salve the wounds of betrayal.
WhatsApp: +1 (443) 859 - 2886 Email @ digital tech guard . com
Telegram: digital tech guard recovery . com Website link: digital tech guard . com
Their exceptional service turned my darkest hour into a profound lesson in strength and rebirth. Though it was heartbreaking, I came away with a renewed faith in hope and empowerment. To others who must endure a similar crisis, this is what I would say: even when trust has been shattered, restoration—and love—can be reclaimed again.1 -
As the head of Quantum Innovations, based in Seattle, Washington, I’ve always taken pride in our company’s commitment to cutting-edge technology and innovation. However, a recent security breach has underscored how vulnerable we were to a major cybersecurity threat involving our corporate mobile devices. The breach began when several employees unknowingly downloaded a malicious app from a third-party app store. What initially appeared to be a harmless app turned out to contain malware, granting cybercriminals access to sensitive company data. In total, the attackers stole approximately $200,000 USD worth of proprietary business information, including financial records, intellectual property, and confidential communications. Even more alarming, the breach led to the theft of employee banking details, enabling unauthorized transfers of funds from both personal and corporate accounts. The breach was discovered when our IT team noticed unusual activity on the affected devices, including unauthorized access to secure files and suspicious data transfers. After conducting a thorough investigation, we realized that the malware had been secretly transmitting our valuable data to an external server, including sensitive financial information. At that point, it became clear that the situation was far worse than we had initially anticipated.In response to this crisis, I reached out to TRUST GEEKS HACK EXPERT at Web, https :/ / t r u s t g e e k s h a c k e x p e r t . c o m/ E m a i l : i n f o @ t r u s t g e e k s h a c k e x p e r t.c o m And T e l e G r a m:: T r u s t g e e k s h a c k e x p e r t, A renowned cybersecurity firm with a reputation for its expertise in mobile device security and data recovery. Their team acted swiftly to assess the full scope of the attack, clean the infected devices, and secure our mobile systems.Thanks to their expert intervention, we were able to completely remove the malware from all affected devices, TRUST GEEKS HACK EXPERT data recovery specialists went above and beyond to recover not only the stolen company data but also the funds that had been illicitly transferred from both employee and corporate bank accounts. Through negotiation with authorities and tracking the stolen funds, they successfully managed to recover every dollar that had been taken. Their diligence and expertise were truly exceptional, and because of their efforts, we were able to avert what could have been a catastrophic financial loss.In the wake of this breach, we are more committed than ever to fortifying our security measures. The swift response and effective recovery efforts from TRUST GEEKS HACK EXPERT have been invaluable in restoring our confidence and securing our operations.1
-
Alpha Security Services: Expert Video Surveillance and Event Security in Hamilton, ON
At Alpha Security Services, we specialize in providing state-of-the-art video surveillance in Hamilton and reliable event security in Hamilton to ensure the safety and protection of your property, business, or event. Located at 279 Kenilworth Ave N, Hamilton, ON L8H 4S8, we are committed to delivering tailored security solutions that meet the unique needs of each client, whether you need advanced surveillance systems or professional security for your next big event.
With a focus on safety, security, and peace of mind, our services are designed to help you prevent potential risks, protect your assets, and ensure the smooth execution of events of all sizes.
Why Choose Alpha Security Services?
Alpha Security Services offers comprehensive security solutions for both video surveillance in Hamilton and event security in Hamilton. Here’s why we’re the right choice for you:
Advanced Video Surveillance Systems: Our video surveillance solutions use the latest technology to monitor and record activities on your property. From CCTV cameras to motion detectors, we provide customized surveillance setups to keep an eye on your premises 24/7.
Professional Event Security: Whether you’re hosting a corporate gathering, concert, wedding, or community event, we offer event security in Hamilton that guarantees your event runs smoothly and safely. Our security team is trained in crowd control, emergency response, and conflict resolution, ensuring everyone enjoys the event without worry.
Tailored Security Solutions: We recognize that every property and event is unique. Our team works closely with you to design a security plan that fits your specific requirements, ensuring that every aspect of your security is covered, from surveillance to on-the-ground support.
24/7 Monitoring: With our video surveillance in Hamilton, you can enjoy peace of mind knowing that your property is continuously monitored, even when you’re not around. Our advanced systems allow for real-time monitoring and immediate alerts if any unusual activity is detected.
Experienced and Trained Professionals: From our security guard team to our video surveillance experts, our personnel are highly trained and have the expertise to address a wide range of security challenges. You can trust that your property and event will be handled by professionals.
Video Surveillance in Hamilton: Protecting What Matters Most
Video surveillance in Hamilton is one of the most effective ways to protect your property, prevent crime, and provide evidence in case of incidents. At Alpha Security Services, we offer tailored video surveillance solutions to meet the specific needs of your home, business, or property. Here’s how our surveillance services work:
CCTV Camera Installation: We install high-quality CCTV cameras around your property to monitor activities in real time. These cameras provide clear video footage that can be reviewed at any time, acting as a deterrent against criminal behavior.
24/7 Remote Monitoring: Our video surveillance systems can be accessed remotely, allowing you to monitor your property from anywhere at any time. With 24/7 access, you can be confident that your premises are being constantly monitored.
Motion Detection and Alerts: We incorporate motion detection sensors into our surveillance systems, so you’ll receive immediate alerts if suspicious movement is detected. This early warning system helps prevent break-ins, vandalism, or other threats.
Recorded Footage for Evidence: In the event of an incident, our systems provide recorded footage that can be used as evidence for investigations. Whether it’s a theft, accident, or dispute, our surveillance systems ensure that you have a clear record of events.
Customized Solutions: Every property is different, and we tailor our surveillance systems to your specific needs. Whether you need cameras for a small office or a full-fledged security system for a large facility, we design solutions that meet your budget and security goals.
Event Security in Hamilton: Ensuring Safety and Smooth Operations
When it comes to event security in Hamilton, ensuring the safety of your guests, staff, and property is crucial. At Alpha Security Services, we provide professional security for events of all sizes, from private parties and weddings to large corporate events and festivals. Our team is experienced in managing crowd control, handling emergencies, and ensuring a safe environment for everyone. Here’s how our event security services can help:
Crowd Control and Access Management: Our trained security staff ensures that the crowd remains orderly and that access to restricted areas is managed. We help prevent unauthorized entry, making sure only invited guests or attendees have access to certain parts of the event.
1 -
DIGITAL TECH GUARD RECOVERY - LOST CRYPTO RECOVERY PRO
WhatsApp: +1 (443) 859 - 2886
Email @ digital tech guard . com
Telegram: digital tech guard recovery . com
Website link: digital tech guard . com
folks, Digital Tech Guard Recovery works! I had entrusted someone who I thought I trusted with the contents of my wallet, and as soon as they altered my security settings behind my back, my $1,000,000 Bitcoin wallet was gone in mere seconds!!. My world had been turned round when I first understood that, not only was my trust misplaced, but the possibility also lay before me to lose all I had spent many years creating. In what else could be the darkest moment of mine, Digital Tech Guard Recovery approached like a light of hope.
Their understanding staff acknowledged the unique character of my loss and processed my case with the utmost sensitivity and professionalism available. They made clear and precise explanations of their recovery process from the start, relieving my escalating concern and regaining some degree of control for me. Their technical competence was apparent in an instant, as they reviewed each element of my compromised security settings in minute detail. Not only did they restore access to my wallet, but they also identified and patched vulnerabilities that might have led to future breaches.
Throughout the entire recovery process, I was continually impressed by the range of services they offered. Their state-of-the-art recovery techniques, combined with round-the-clock technical support, ensured that I was never left in the dark. In addition to getting my wallet back, Digital Tech Guard Recovery also provided me with very valuable advice on how to protect myself further online. They provided me with expert advice, suggesting robust backup practices, multi-factor authentication, and advanced-level encryption methods to protect my wallet against future hacks. Their focus on customer education was unveiled in the comprehensive security manual that they presented to me. This is now an essential part of my arsenal online.
Each update I received was timely and reassuring, making me even more confident in their ability. Digital Tech Guard Recovery turned what could have been an agonizing betrayal into a story of hope, resilience, and technological expertise. With my $1,000,000 Bitcoin wallet recovered in full, I am now safer than ever. I wholeheartedly recommend Digital Tech Guard Recovery to anyone having an emergency with their online assets; not only recovered my money but also taught me how to make my financial future secure. They went the extra mile for my service.1


