Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "phone case"
-
Sit down before you read this.
So I interviewed a guy for a "Support Engineer" internship position.
Me and the team lead sit down and are waiting for him to enter, but apparently he's actually making a coffee in the kitchen.
This isn't exactly a strike since the receptionist told him that he can go get a drink, and we did too. It's just always expected for him to get a glass of water, not waste 3 minutes brewing a coffee.
In any case he comes in, puts the coffee on the table, then his phone, then his wallet, then his keys and then sits on our side of the table.
I ask him to sit in front of us so we can see him. He takes a minute to pack and tranfer himself to the other side of the table. He again places all of the objects on the table.
We begin, team lead tells him about the company. Then I ask him whether he got any questions regarding the job, the team or the company . For the next 15 minutes he bombards us with mostly irrelevant and sometimes inappropriate questions, like:
0: Can I choose my own nickname when getting an email address?
1: Does the entire department get same salaries?
2: Are there yoga classes on Sundays only or every morning?
3: Will I get a car?
4: Does the firm support workspace equality? How many chicks are in the team?
5: I want the newest grey Mac.
And then.. Then the questions turn into demands:
6: I need a high salary (asks for 2.5 more than the job pays. Which is still a lot).
I ask him why would he get that at his first job in the industry (remind you, this is an internship and we are a relatively high paying company).
He says he's getting paid more at his current job.
His CV lists no current job and only indicates that he just finished studying.
He says that he's working at his parent's business...
Next he says that he is very talented and has to be promoted very quickly and that we need to teach him a lot and finance his courses.
At this point me and the team lead were barely holding our laughs.
The team lead asks him about his English (English is not our native language).
He replies "It's good, trust me".
Team lead invites him for an English conversation. Team lead acts like a customer with a broken internet and the guy is there to troubleshoot. (btw that's not job related, just a simple scenario)
TL: "Hello, my name is Andrew, I'm calli..."
Guy: *interrupts* "Yes, yes, hi! Hi! What do you want?"
TL: "Well, if you let me fi..."
Guy: "Ok! Talk!"
TL: "...inish... My internet is not working."
Guy: "Ok, *mimics tuning a V engine or cooking a soup* I fixed! *points at TL* now you say 'yes you fixed'".
Important to note that his English was horrible. Disregarding the accent he just genuinely does not know the language well.
Then he continiues with "See? Good English. Told you no need to check!".
After about half a minute of choking on out silent laughter I ask him how much Python experience he has (job lists a requirement of at least 1 year).
He replies "I'm very good at object oriented functional programming".
I ask again "But what is your experience? Did you ever take any courses? Do you have a git repository to show? Any side.."
*he interrupts again* "I only use Matlab!".
Team lead stands up and proceeds to shake his hand while saying "we will get back to you".
At last the guy says with a stupid smile on his face "You better hire me! Call me back tomorrow." Leaves TL hanging and walks away after packing his stuff into the pockets.
I was so shocked that I wasn't even angry.
We both laughed for the rest of the day though. It was probably the weirdest interview I took part at.35 -
So this just happened:
Sarah = best friend (random name)
Sister: Hey, could you help, sarah's phone isn't recognized by her computer anymore.
Me: What phone/pc does she have?
Sister: iPhone/Windows.
Me: Has she checked the drivers?
Sister: *tells to check drivers, feedback:* yes, seems to be fine.
Me: *comes up with 1000 other suggestions*
Sister: *doesn't work every time*
Me: Is there any other information that might be useful in this case?
Sister: Well, she dropped her phone in the water earlier, the phone is hardly responding.
Me: THE WAT? AND YOU DIDN'T THINK THIS WOULD BE WORTH MENTIONING IN THE BEGINNING?!? FUUUUUUUUUUUUUUUU.15 -
Worst dev I've interviewed?
"Archie" ran his own consulting business for almost 20 years. Prior to his interview, Archie sent HR (to send to us) his company's website, where he had samples of code for us to review (which was not bad, this guy did know his stuff).
What I found odd was Archie was the lone wolf at his company, but everything I found about him (the about page, his bio, etc), Archie was referred to as 'Mr. Archie Brown'.
Ex. 'Mr. Archie Brown began his humble career and 'Mr. Archie Brown is active in his church and volunteers his time in many charities ...'
Odd to refer to yourself in the third person on your own site, but OK, I like putting hot sauce on my mac & cheese (no judgement here).
Then the interview..standard stuff, then..
Me: "Given your experience, this is an entry level developer position. Do you feel the work would be challenging enough for you?"
Archie: "Yes, Mr. Archie Brown would have no problem starting at bottom. You see ..."
Almost any time he would reference himself, instead of 'me' or 'I', he would say 'Mr. Archie Brown'. As the interview continued, the ego and self-importance grew and grew.
My interview partner wanted to be done by using the escape clause, "PaperTrail, I'm good, do you have any questions?"
Yes, yes I do. I was having too much fun listening to this guy ramble on about himself. I made the interview go the full hour with the majority of time 'Archie' telling us how great he is.
The icing on the cake was my partner caught his gold cuff-links and tie-pin where his initials and how he kept raising his hands and playing with his tie to show us (which I totally missed, then was like "oh yea, that was weird")
After the interview, talking with HR:
HR-Jake: "How did it go?"
John: "Terrible. One of the worst. We would have been done in 10 minutes if PaperTrail didn't keep asking questions."
Me: "Are you kidding!? I had the best time ever. I wish I could have stayed longer."
HR-Jake: "Really? This guy was so full of himself I wasn't sure to even schedule with you guys. With his experience, I thought it deserved at least a round with you two. You think we should give him a chance?"
Me: "Hell no. Never in a million years, no. I never in my whole life met anyone with such a big ego. I mean, he kept referring to himself in the third person. Who does that?"
HR-Jake: "Whew!...yea, he did that in the phone interview too. It was a red flag for us as well."
Couple of weeks later I ran into HR-Jake in the break room.
HR-Jake: "Remember Mr. Archie Brown?"
Me: "To my dying day, I will never forget Mr. Archie Brown."
HR-Jake: "I called him later that day to tell him the good news and he accused me of being a racist. If we didn't give him the job, he was getting a lawyer and sue us for discrimination."
Me: "What the frack!"
HR-Jake: "Yep, and guess what? Got a letter from his lawyer today. I don't think a case will come in front of a judge, but if you have any notes from the interview, I'll need them."
Me: "What are we going to do?"
HR-Jake: "Play the waiting game between lawyers. We're pretty sure he'll run out of money before we do."
After about 6 months, and a theft conviction (that story made the local paper), Mr. Archie Brooks dropped his case (or his lawyers did).23 -
I just had a client complaining on the phone that she read my database design documents and that they are all wrong and need to be done again. Because things like varchar and int are confusing. And nobody understands what they mean. She asked around and nobody understood it.
Ooh, and I should place the customer name in more then one table because it would be handy to have in several places.
Spend a hour on the phone trying to explain that these documents are not intended for her. They are not for her to understand.
I make these documents to build a stable product and in case something bad happens to me its easier to pick up for another developer.
Long story short.. I'm currently making a document that explains the database design... Getting paid for it..... But fucking hell. Somebody save me.10 -
The programmer and the interns part 3.
Many of you asked me to keep posting about the interns that I'm responsible for.
I had the intention but never had the time or the energy. Since the interns only kept doing stupid, unthinkable things and just filtering out the good ones is a task of its own.
Time has passed, some interns left us by their choice, others were fired (for obvious reasons). Some stayed loyal and were given permanent positions. New ones joined. I no longer am directly responsible for their wellbeing, yet, somehow I am still their tech-lead and the developer of their tools.
Without further delay,
Case 0:
New guy get's into the internship, has his LinkedIn title set to ‘HTML Technician’.
Didn’t know about the existence of HTML5.
Been building static web pages in the early 2000s. The kind with embedded, inline CSS.
Claims that he is about to finish an engineering degree (sadly I believe him).
Fails the entry level Linux test. Complains about the similarity of the answer options.
Fails the basic web-standars test because "they change so fast, but the foundation is HTML and it's rock-solid!".
Get's caught taking home onions and milk from the kitchen.
Is spotted eating in a restaurant under our offices in his day off. Thrice. He lives a 30 minute drive away and comes here on a bicycle or by bus.
Apparently didn't know that the scrolling wheel on the mouse is clickable.
Said that his PC experience is mostly from his PlayStation (PC = PlayCtation apparently).
Get's fired, says that he'll go to the press. Never does.
Case 1:
Yet another new intern. He seems very eager to learn and work, capable, even charismatic. Has an impressive CV.
Does nothing.
Learns from the "case 0" guy and spends time with him until he is fired.
Comes to work at 8:00 AM and immediately goes to sleep on an office puff. In front of everyone.
Keeps dining alone, without a notice, at different times, for hours. Sometimes brings food into the office and loudly eats it there.
On his evening shifts keeps disappearing for long periods of time. Apparently drinking in the nearby bars and hitting on girls.
Keeps bragging about his success with getting their numbers and rants about those who reject him.
For over a year he fails his final training test and remains a trainee, without the ability to work on a real case.
Not fired yet.
Case 2:
Company retreat. Beautiful, exotic views, warm sun beams, all inclusive package for everyone on a huge half-island.
Simon (he's still with us, now as a true engineer!) brings his MacBook to the beach in order to work and impress all others.
Everybody get's drunk and start throwing huge inflatable balls at each other. One hits his laptop and it immediately is flattened.
Upset Simon is going in circles and ranting about the situation, looking for a solution.
Loses his phone on the beach.
Takes his broken laptop with him while searching for the phone.
Dips the laptop in the river while drunkenly ducking in order to pick a clam.
Case 3:
Still company retreat.
Drunk intern makes out with an employee's drunk wife.
Huge verbal fight. The husband says that he files for a divorce. Intern get's fired.
Case 4:
Still company retreat.
Three interns each take an inflatable swimming mattress and drift with the current. Get found on the other side of the resort three hours later, with red skin and severely dehydrated.
Case 5:
Still company retreat.
The 'informally fired' intern gets drunk again, climbs through a window into a room and makes out with an employee's drunk wife.
Again, gets caught when the husband returns to find a locked door but can see them though the window.
Case 6:
Still company retreat.
We all get ferociously drunk and wander off to the unknown in search of more booze.
Everybody does something stupid and somebody finds Simon's phone.
Simon is lost.
Frenzied horde of drunks is roaming the half-island in search of ethanol and the lost comrade.
Simon's phone get's permanently lost.
Five people step on sea urchins but find that out only hours later and then are unable to walk.
The mob, now including more drunk people who joined voluntarily, finds the sexually active intern making out with the enraged employee's wife yet again.
Surprisingly Simon is found sleeping in a room nearby.23 -
Chinese app programmer fights product manager for asking the app UI to "change color according to user phone case"
13 -
Lamer rant
For a really long time I said to myself that this is too basic to rant about but lately it became so frequent and extreme that here is my rant about completely clueless users that ask me IT related questions.
Disclaimer: Said users are people that I generally can't avoid. Distant family members, neighbors and etc.
Case 0:
U: I don't know what's happening!! The computer doesn't work!!
M: What do you mean?
U: There's no Facebook! And everything is stuck and no messenger!!!
M: The WiFi on your laptop was off. I turned it on. Still, this doesn't mean that the pc wasn't working.
U: I don't understand this shit!!!
Case 1:
U: I hate this computer!!! It never works!!! Help meeee!!!
M: What now?
U: Where did the internet disappear?!
M: (assuming it's wifi or browser related)
Actually user moved the Chrome window to bottom-right corner and lost it.
Every time I try to show the user how I resolve the issue the user yells that there are too many steps, that they are complicated and that I'm a bad teacher and doing it too fast.
Case 2:
U: My computer is so slow! It barely can load google translate! And I can't listen to music on youtube!! Shitty laptop! It's you! Your computers in the apartment drain everything!!!
M: You have no idea what you are talking about.
U: My husband told me that your computers are heavy and drain everything!
M: What exactly did he tell you that my devices drain?
U: I don't know! All the energy! I believe him! He knows!
M: My computers drain less electricity than your vacuum and I have a separate internet connection. Not only we share nothing but also I drain nothing.
U: Since you appeared all the computers are slow!!!!
Fkk...
Case 3:
U: I don't understand, where is my whatsapp?
M: You can't locate the app on your phone?
U: Yes! F*ck, help me! I'm so angry and I really need this NOW!!!
M: Shut up. I'm already here and helping.
(I open users phone and whatsapp is the active app...)
U: I can' t find my whatsapp with Clara!
F*ck you! F*ck you! Ghckjfshij!!!
Case 4:
(crazy hitting on my door)
U: I don't have THE internet!!!
It's you again! You took all of THE internet!!!
M: No, it doesn't work like that. Your provider is bad, your package is cheap and your cables are of low quality.
U: I need THE internet immediately!!! Stop playing with your typing and fix the facebook or I'll cut the power cables to the house!!
I can go on, just don't think that recalling all those events is healthy for me.20 -
JUST IN: Client wants to give me 25 character, mixed case password over the phone because the internet is UNSAFE13
-
#3 Worst thing I've seen a co-worker do?
A 20-something dev, 'A', back in the early days of twitter+facebook would post all his extracurricular activities (drinking, partying, normal young-buck stuff). The dev mgr, 'J', at the time took offense because he felt 'A' was making the company look bad, so 'A' had a target on his back. Nothing 'A' did was good enough and, for example, 'J' had the source control czars review 'A's code to 'review' (aka = find anything wrong). Not sorting the 'using' statements, and extra line after the closing }, petty things like that. For those curious, orders followed+carried out by+led by 'T' in my previous rant.
As time went on and 'T' finding more and more 'wrong' with A's code, 'J' put A on disciplinary probation. 'A' had 90 days to turn himself around, or else.
A bright spot was 'A' was working on a Delphi -> C# conversion, so a lot of the code would be green-field development and by simply following the "standards", 'A' would be fine...so he thought.
About 2 weeks into the probation, 'A' was called into the J's office and berated because the conversion project was behind schedule, and if he didn't get the project back on track, 'A' wouldn't make it 30 days. I sat behind 'A' and he unloaded on me.
<'A' slams his phone on his desk>
Me: "Whoa...whats up?"
A: "Dude, I fucking hate this place, did you hear what they did?"
<I said no, then I think we spent an hour talking about it>
Me: "That all sucks. Don't worry about the code. Nobody cares what T thinks. Its not even your fault the project is behind, the DBAs are tasked with upgrades and it's not like anyone is waiting on you. It'll get done when it's done. Sounds like a witch hunt, what did you do? Be honest."
A: "Well, um...I kinda called out J, T, and those other assholes on facebook. I was drunk, pissed, and ...well...here we are."
Me: "Geez, what a bunch of whiney snowflakes. Keep your head down and you'll get thru it, or don't. Its not like you couldn't find another job tomorrow."
A: "This is my first job out of college and I don't want to disappoint my dad by quitting. I don't even know what I'm supposed to be doing. All J told me was to get better. What the fuk does that even mean?"
Me: "He didn't give you any goals? Crap, for someone who is a stickler for the rules, that's low, even for J."
Fast forward 2 weeks, I was attending MS TechEd and I was with another dev mgr, R.
R: "Did you hear? We had to let 'A' go today."
Me: "What the hell? Why?"
R: "He couldn't cut it, so we had to let him go."
Me: "Cut what? What did he do, specifically?"
R: "I don't know, 'A' was on probation, I guess he didn't meet the goals."
Me: "You guess? We fire a developer working on a major upgrade and you guess? What were these so-called goals?"
R: "Whoa...you're getting a little fire up. I don't know, maybe not adhering to coding standards, not meeting deadlines?"
Me: "OMG...we fire people for not forming code? Are you serious!?"
R: "Oh...yea...that does sound odd when you put it that way. I wish I'd talk to you before we left on this trip"
Me: "What?! You knew they were firing him *before* we left? How long did you know this was happening?"
R: "Honestly, for a while. 'A' really wasn't a team player."
Me: "That's dirty, the whole thing is dirty. We've done some shitty things to people, but this is low, even for J. The probation process is meant to improve, not be used as a witch hunt. I don't like that you stood around and let it happen. You know better."
R: "Yea, you're right, but doesn't change anything. J wanted to do it while most of us were at the conference in case 'A' caused a scene."
Me: "THAT MAKES IT WORSE! 'A' was blindsided and you knew it. He had no one there that could defend him or anything."
R: "Crap, crap, crap...oh crap...jeez...J had this planned all along...crap....there is nothing I can do no...its too late."
Me: "Yes there is. If 'A' comes to you for a letter of recommendation, you write one. If someone calls for reference, you give him a good one."
R: "Yea..yea...crap...I feel like shit...I need to go back to the room and lie down."
As the sun sets, it rises again. Within a couple of weeks, 'A' had another job at a local university. Within a year, he was the department manager, and now he is a vice president (last time I checked) of a college in Kansas City, MO.10 -
RANT Incoming
Not necessarily dev related but I need to get this off my chest.
So a bit of a backstory. I had to stay late from school the other day and ended up having to take an Uber home. The ride was fine lady was nice. Everything seems to be going well and there were no signs of any payment failure.
Then yesterday, I had to stay late again. I never said that I had an outstanding balance on my account. Apparently Uber was having problems charging my Android pay account.
So I ended up being stuck at school for like 3 hours. Great!😑
So I emailed Uber when I got home. And this is when I started pulling my hair out. I don't know how many replies I had, but each time I had to tell them that I was not using a prepaid card.
This was one of my replies:
"I'm sorry, are you real? If you are, here is a quick summary of the issue. I am using ANDROID PAY with my CHASE DEBIT CARD. Not, NOT, NOT a prepaid card. I happen to know that CHASE DEBIT CARD(which is the card I use, in case you have already forgotten) works with uber because MY FATHER USES THE EXACT SAME TYPE OF CARD with uber. He uses a CHASE DEBIT CARD(again I use that same type of card as well). So by using LOGIC I am able to deduce that a CHASE DEBIT CARD is in fact compatible. AGAIN THIS IS NOT A PREPAID CARD!!! If the card is incompatible, WHY DOES THE APP ALLOW BE TO ADD IT?!?! Also in response to your last email... Because I am using Android pay, do you really think that an ANDROID would be able to use APPLE pay? Also Google wallet is DISCONTINUED! Finally, PayPal DOES NOT CONNECT TO UBER. Returns a "Server Error." So please stop wasting my time with generic help solutions. Believe me, I have already googled my issue, and nothing comes up. That is why I contacted Uber. I want my driver to be paid, and, uber had made it SO painful with unhelpful "Solutions" to problems that don't even APPLY TO MY ISSUE. No not even mention PREPAID cards in your reply or I will consider you a robot built by monkeys banging their heads on a keyboard. Uber HAS my VALID payment information, USE IT! If there is a phone number I can call, please, enlighten me"
And the response was:
"Thanks for reaching out with this.
Happy to help with this issue you are having.
After reviewing your I can see that the only payment method associated with your account is an ANDROID PAY card and it is also a prepaid card. Some cards and methods are not compatible with our billing processes and can't be used with Uber. This includes prepaid cards."
So I concluded that they are monkeys.
Then Uber banned me from logging into my account because I didn't pay.
So now it is impossible for me to pay because I can't do anything with my account.
Now they want my SSN and a bunch of other shit that I won't give them.
I told them that they were being illogical, and I got the exact same response about the prepaid bullshit.
So I sent them this photo as a goodbye.
I get my driver's licence next weekend, so I won't need Uber anymore. YAY!
Also mind grammatical errors, I talked it in and am to lazy to proofread
13 -
!(short rant)
Look I understand online privacy is a concern and we should really be very much aware about what data we are giving to whom. But when does it turn from being aware to just being paranoid and a maniac about it.? I mean okay, I know facebook has access to your data including your whatsapp chat (presumably), google listens to your conversations and snoops on your mail and shit, amazon advertises that you must have their spy system (read alexa) install in your homes and numerous other cases. But in the end it really boils down to "everyone wants your data but who do you trust your data with?"
For me, facebook and the so-called social media sites are a strict no-no but I use whatsapp as my primary chating application. I like to use google for my searches because yaa it gives me more accurate search results as compared to ddg because it has my search history. I use gmail as my primary as well as work email because it is convinient and an adv here and there doesnt bother me. Their spam filters, the easy accessibility options, the storage they offer everything is much more convinient for me. I use linux for my work related stuff (obviously) but I play my games on windows. Alexa and such type of products are again a big no-no for me but I regularly shop from amazon and unless I am searching for some weird ass shit (which if you want to, do it in some incognito mode) I am fine with coming across some advs about things I searched for. Sometimes it reminds me of things I need to buy which I might have put off and later on forgot. I have an amazon prime account because prime video has some good shows in there. My primary web browser is chrome because I simply love its developer tools and I now have gotten used to it. So unless chrome is very much hogging on my ram, in which case I switch over to firefox for some of my tabs, I am okay with using chrome. I have a motorola phone with stock android which means all google apps pre-installed. I use hangouts, google keep, google map(cannot live without it now), heck even google photos, but I also deny certain accesses to apps which I find fishy like if you are a game, you should not have access to my gps. I live in India where we have aadhar cards(like the social securtiy number in the USA) where the government has our fingerprints and all our data because every damn thing now needs to be linked with your aadhar otherwise your service will be terminated. Like your mobile number, your investment policies, your income tax, heck even your marraige certificates need to be linked with your aadhar card. Here, I dont have any option but to give in because somehow "its in the interest of the nation". Not surprisingly, this thing recently came to light where you can get your hands on anyone's aadhar details including their fingerprints for just ₹50($1). Fuck that shit.
tl;dr
There are and should be always exceptions when it comes to privacy because when you give the other person your data, it sometimes makes your life much easier. On the other hand, people/services asking for your data with the sole purpose of infilterating into your private life and not providing any usefulness should just be boycotted. It all boils down to till what extent you wish to share your data(ranging from literally installing a spying device in your house to them knowing that I want to understand how spring security works) and how much do you trust the service with your data. Example being, I just shared most of my private data in this rant with a group of unknown people and I am okay with it, because I know I can trust dev rant with my posts(unlike facebook).29 -
Boss: We need a new functionality to record company names for now.
Me: Ok. (This will be a quick one)
(few mins later)
Me: Ok, adding/editing/deleting company names.. done. I also added "date recorded" field, just in case we need it.
Boss: Ok, thanks.
(~20 mins later)
Boss: We also need a functionality for the users which has "this" permission to be able to "request" for a company registration. We need to add fields to record the contact person, email, phone, etc.. Once a "request" has been submitted, "this" person-in-charge has to get a notification on the dashboard. And the requesters, should get a notification that they have a pending request sent. Once the registration is done, the requester has to be notified.
Me: 👀6 -
Once upon a time in Devland, there were two best friends @Alice and @Michelle and they worked together at The DevCo company as developers.
After a tough day handling an @-ANGRY-CLIENT-, they thought that they had to go and @RantSomewhere and so they went to a café. At the café, they ranted about some stupid clients, and @theItalianGuy at the third floor of their office building who never picked up calls, and @thatJavaGuy from the second floor who, they thought, was @notarealDev, and the usual stuff about their work. Somewhere in between, @Alice thought it would be @funvengeance to @hack @theNSA; “@karma is coming to get them”, said @Michelle.
To do this, they knew they’d have to take help from none other than @Gandalf who lived in a nearby @cave. So, the next day, taking a leave from work, @Alice and @Michelle embarked on journey to meet @Gandalf. After about an hour’s drive, they reached @Gandalf’s @cave. @Michelle went ahead to knock on @Gandalf’s rusty cave door. Being a lazy @necromancer, he magically opened his door 2 minutes later. “Who is't dares to disturb me in mine own catch but a wink?” shouted a voice from the back; “We’re two developers from DevCo and we need your help in our mission to @hack @theNSA”, shouted @Michelle. After a few seconds, he replied, ”Hmm… N'rmally I wouldst sendeth thee to mine own cousin @Hagrid, but in thy case, I sayeth thee shouldst visiteth the detective who is't goeth by the nameth @S-Holmes”. @Alice replied back, “Thank you, Sir @Gandalf, we’ll get help from this @S-Holmes, I’ve heard that he’s an @exceptionalGuy”; “Mine own pleasure, Farewell!” said @Gandalf, and the door closed shut.
So, @Alice and @Michelle went back to their car, and that time @Alice raised a question, “How are we gonna find this @S-Holmes? We don’t have a phone number or anything so we could contact this guy.”
“We should call @thatJavaGuy from work, I’ve heard he is a man of resources, he must know how to contact @S-Holmes”, said @Michelle.
And it was true, after a call with @thatJavaGuy, they were able to obtain @S-Holmes’s phone number.
“Howdy, this is @S-Holmes, what can I diddily ding dong do you for?”
“Hi, I’m @Alice, I’m from DevCo and I was hoping that I could get your help in our mission.”
“What kind of mission?”, asked @S-Holmes.
“We want to @hack @theNSA.”, replied @Alice.
“Okay… I think I might be able to hel-diddly-elp you! There’s an old and abandoned laberino noodly-near @stacked Street. It was made in @1989 and since then, it houses a magical computeroo that can hel-diddly-elp you in your mission. So, you just have to connect the computeroo to the Internet and you can diddily ding dong do your programmeroo thing and then you'll have access to the the noodly-nsa diddily ding dong database!”, answered @S-Holmes.
S-Holmes continued, “But I shall warn you, there's a riddly-rumorino that the laberino was abandoned because of an @electric-ghost that lurks there, but I bel-diddly-elieve it is just a computeroo program that was diddily ding dong designed to try to @stop hackers from accessing the top secret stuff!".
“Okay, thanks for your help! I bet we can handle whatever this @electric-ghost thing is, so… Goodbye!”, replied @Alice.
“Goodbye!”, said @S-Holmes and that ended their conversation.
Luckily, the @stacked Street was just a couple of miles away from them, so they reached the lab quickly.
As they got close to the lab they saw something that really surprised them…
--------
To be continued in part two...
(Do you want a part two? :/)
My first ever story is a little special because it is kind of dev related at it has "cameos" by various devranters, as you might have noticed.
How many did you count?
More in Part Two.
Thank you for reading and please, any feedback is welcome. Did you like it?
I haven't really revised it once, it is straight out of the keyboard.
Should I drop the "@" ?
But then it would impossible to spot some of the devRanters .
Let me know.
PS
What should be the title?
1)Alice in DevLand?
2)Adventures of Alice and Friends: Hacking the NSA?
You decide..(or maybe I'll pick the second one :D)21 -
I'm trying to sign up for insurance benefits at work.
Step 1: Trying to find the website link -- it's non-existent. I don't know where I found it, but I saved it in keepassxc so I wouldn't have to search again. Time wasted: 30 minutes.
Step 2: Trying to log in. Ostensibly, this uses my work account. It does not. Time wasted: 10 minutes.
Step 3: Creating an account. Username and Password requirements are stupid, and the page doesn't show all of them. The username must be /[A-Za-z0-9]{8,60}/. The maximum password length is VARCHAR(20), and must include upper/lower case, number, special symbol, etc. and cannot include "password", repeated charcters, your username, etc. There is also a (required!) hint with /[A-Za-z0-9 ]{8,60}/ validation. Want to type a sentence? better not use any punctuation!
I find it hilarious that both my username and password hint can be three times longer than my actual password -- and can contain the password. Such brilliant security.
My typical username is less than 8 characters. All of my typical password formats are >25 characters. Trying to figure out memorable credentials and figuring out the hidden complexity/validation requirements for all of these and the hint... Time wasted: 30 minutes.
Step 4: Post-login. The website, post-login, does not work in firefox. I assumed it was one of my many ad/tracker/header/etc. blockers, and systematically disabled every one of them. After enabling ad and tracker networks, more and more of the site loaded, but it always failed. After disabling bloody everything, the site still refused to work. Why? It was fetching deeply-nested markup, plus styling and javascript, encoded in xml, via api. And that xml wasn't valid xml (missing root element). The failure wasn't due to blocking a vitally-important ad or tracker (as apparently they're all vital and the site chain-loads them off one another before loading content), it's due to shoddy development and lack of testing. Matches the rest of the site perfectly. Anyway, I eventually managed to get the site to load in Safari, of all browsers, on a different computer. Time wasted: 40 minutes.
Step 5: Contact info. After getting the site to work, I clicked the [Enroll] button. "Please allow about 10 minutes to enroll," it says. I'm up to an hour and 50 minutes by now. The first thing it asks for is contact info, such as email, phone, address, etc. It gives me a warning next to phone, saying I'm not set up for notifications yet. I think that's great. I select "change" next to the email, and try to give it my work email. There are two "preferred" radio buttons, one next to "Work email," one next to "Personal email" -- but there is only one textbox. Fine, I select the "Work" preferred button, sign up for a faux-personal tutanota email for work, and type it in. The site complains that I selected "Work" but only entered a personal email. Seriously serious. Out of curiosity, I select the "change" next to the phone number, and see that it gives me four options (home, work, cell, personal?), but only one set of inputs -- next to personal. Yep. That's amazing. Time spent: 10 minutes.
Step 6: Ranting. I started going through the benefits, realized it would take an hour+ to add dependents, research the various options, pick which benefits I want, etc. I'm already up to two hours by now, so instead I decided to stop and rant about how ridiculous this entire thing is. While typing this up, the site (unsurprisingly) automatically logged me out. Fine, I'll just log in again... and get an error saying my credentials are invalid. Okay... I very carefully type them in again. error: invalid credentials. sajfkasdjf.
Step 7 is going to be: Try to figure out how to log in again. Ugh.
"Please allow about 10 minutes" it said. Where's that facepalm emoji?
But like, seriously. How does someone even build a website THIS bad?rant pages seriously load in 10+ seconds slower than wordpress too do i want insurance this badly? 10 trackers 4 ad networks elbonian devs website probably cost $1million or more too root gets insurance stop reading my tags and read the rant more bugs than you can shake a stick at the 54 steps to insanity more bugs than master of orion 312 -
Had an interesting time these past few days. Had a customer who, when I left for vacay, was complaining that he couldn't get access to our private package registry. Get back, this issue is still active.
We'd granted access to his github enterprise, and for some reason he wasn't getting the activation email. We spent about 22 hours of customer support time on his failing to help himself before he finally escalated to the standard 40 person IT enterprise tantrum/come to jesus meeting.
Long story short, he had somehow ignored repeated attempts (35 email replies to the ticket chain, 4 phone calls) to get him to check his spam folder. In which, as it was revealed to all the hollywood squares in attendance, there were no less than 35 activation emails from github granting him access. Of course, none of this was his fault. And while screensharing his big brain to god and everyone he decides the problem is now actually Microsoft because their office 365 spam email filtered his emails incorrectly. We of course agreed with his big brain, smoothed over his bruised ego and went about our day.
I mean, fair enough, it's kind of dumb that Microsoft ever spam lists github, but still. I was just a fly on the wall, and he burned all his paid support tickets on the issue, so hopefully we won't be dealing with him again this year.
Also, this is an edge case with our new product line, most of our customers are painless.4 -
Today was hell on earth as for user support. Phone going non stop, tickets coming in faster than we were able to process.
At the end of the day I had to make a symlink for a customer which is fine. But, the day was so busy that I just couldn't focus anymore.
I've made 1K+ symlinks in my life probably but I couldn't remember if the source or destination comes first with a symlink.... The day has been hell and I just couldn't bring up a single second of focus anymore..
Fuck it, I'll do it tomorrow. I know I can do this but I don't trust myself with this right now in case of a huge webshop (swap the source/destination: webshop gone).
I think I'll thank myself for this tomorrow.13 -
It's fine if you're 'not good with computers' and need help. Ask me politely and sure I'll see how I can help and teach you what you need so that you can do it yourself in the future.
It's not fine, however, if you refuse to fucking learn after the millionth time I've taught you how to do the exact same thing because 'It's too hard' and 'I won't understand anyway'. And then proceed to call me a bad and ungrateful friend because I can't come to your rescue the very second you need me and don't seem 1000% enthusiastic to help at 1am in the morning when I'm still doing my own work.
Sure, I'm the 'tech person' amongst our friends. I *do* understand the frustration you experience when something isn't working. But that doesn't mean I'm obligated to be your 24/7 IT support, while listening to your complaints of how I was probably the one who fucked it up in the first place when I helped fixed your phone/laptop last time (for the record, this was *never* the case).
UGHHHHHHHH
ps: I just found this community and I love it already! Thought this mental rant I had earlier would fit right in lol
(Also, sorry English isn't my first language D:7 -
A fanfic based on devRant-chan. The character was created by @caramelCase and a drawing by @ichijou.
This is freestyle. I'll think of an image of a scene and go with the flow. I won't remove my fingers from the keyboard and I won't edit or change anything. That's how I come up with my best ideas.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Notes:
B/N = Boss' name (I was too lazy to think of one.)
Anything in between astericks is in italics.
Ex.) *this is in italics.*
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
It was an early January morning when devRant-chan was situated in her desk, typing away on her laptop. She was working on a Python script for her barbaric client when she could've been out with friends. Oddly enough, her Sunday was surged with tranquility.
Normally, Sunday is when her irksome boss barks orders at her on the phone.
"This is wrong!"
"What is this?"
"Change it!"
devRant-chan resented her boss but loved her job. After all, "you can't force yourself to like everyone," was something her elder brother would tell her.
She released a slight chuckle, the one she would only display at the thought of her brother.
Her musings were interrupted when a concerning thought crawled into her mind like an undesirable intruder.
Why hasn't her boss called to complain yet? It's not that she enjoyed his complaining, which she didn't. She simply found it odd, since he's done this every Sunday morning, since she was a junior developer.
Unless he found someone else to complain to? In that case, good riddance!
But still, it wasn't a euphoric feeling to be replaced. She was already accustomed to his Sunday morning calls that it feels almost lonely not to receive them.
She should call him... Just in case some situation—or—problem—has emerged.
She dialed his number, waiting patiently for a reply.
"Hello," said her boss.
"Ah, hello," said devRant-chan. "I called, wondering—"
"You've reached the voicemail of B/N, please leave a message after the beep."
"Damn..." mumbled devRant-chan with a sharp exhale. "I always fall for that."
Why didn't her boss answer the phone? It was odd of him, considering he's always answered her calls.
She was about to dial her coworker when she received an email, which stimulated her attention. The subject of the email read:
*Important. Please read.*
She opened the email. It was her boss. The email read:
*Hello.*
*In case you aren't aware, I had quit my job, due to the stress. I've left the manager in charge. Starting tomorrow, he will be your new boss.*
*-B/N*
Before she could rejoice in excitement, she detected a strange change of voice, emitting from the email. Did her boss really write this?
That's when she spotted something. The word "tomorrow."
Her boss didn't write this.
He would never use words such as "tomorrow," or "today." He would use time instead. If this was her boss, he would say "in 24 hours."
She checked the IP of the email. Oddly enough, it was her boss' IP.
Still, the pieces didn't fit the puzzle. Her boss didn't complain, answer her call, or use his style of speaking in the email.
Something happened to him and she knows it. Whatever it is, has something to do with the manager, and she was determined to figure it out.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This was just a quick random fanfic, and I'm not sure if I'll continue it. As I said, I didn't plan anything, since it's freestyle. I might or might not continue it, so I'll think it over.8 -
This is my most ridiculous meeting in my long career. The crazy thing is I have witnessed this scenario play out many times during my career. Sometimes it sits in waiting for a few years but then BOOM there it is again and again. In each case the person that fell into the insidious trap was smart and savvy but somehow it just happened. The outcomes were really embarrassing and in some cases career damaging. Other times, it was sort of humorous. I could see this happening to me and I never want it to happen to you.
Once upon a time in a land not so far away there was a Kickoff Meeting for an offsite work area recovery exercise being planned for our Oklahoma locations. Eleven Oklahoma high ranking senior executives were on this webinar plus three Enterprise IT Directors (Ellen, Jim and Bob) who would support the business from the systems side throughout the exercise.
The plan was for Sam Otto, our Midwest Director of Business Continuity to host this webinar. Sam had hands-on experience recovering to our third party recovery site vendor and he always did a great job. He motivated people to attend the exercise with the coolest breakfasts and lunches you could imagine. Donuts, bagels, pizza, wings, scrumptious salads, sandwiches, beverages and desserts. He was great with people and made it a lot of fun.
At the last minute Charles 'Don't Call Me Charlie' Ego-Smith, the Global Business Continuity Senior Vice President, decided to grand-stand Sam. He demanded the reins to the webinar. Pulled a last-minute power-play and made himself the host and presenter. You have probably seen the move at some point in your career. I guess the old saying, 'be careful what you wish for' has some truth to it - read on and let me know if you devRanters agree...
So, Charlie, I mean Charles, begins hosting the session and greets all of the attendees. Hey, good so far! He starts showing some slides in the PowerPoint presentation and he fields a few questions, comments and requests from the Oklahoma executives. The usual easy to handle requests such as, 'what if we are too busy to do recover all systems', 'what if we recover all of our processes from home', 'what if we have high profile visitors that month?' Hey you can't blame them for trying. You are probably thinking to yourself, 'been there - heard that!' But luckily our experienced team had anticipated the push-back. Fortunately, Senior Management 'had our backs' and committed that all processes and systems must participate and test - so these were just softball requests, 'easy-peasy' to handle. But wait, we are just getting started!
Now the fireworks begin. Bob, one if the Enterprise IT directors started asking a bunch of questions. Well, Charles had somewhat of a history with Bob from previous exercises and did not take kindly to Bob's string of questions. Charles started getting defensive and while Bob was speaking Charles started IM'ing. He's firing off one filthy message after another to me and our teammate Sam.
'This idiot Bob is the biggest pain in the ass that I ever worked with'; 'he doesn't know shit', 'he never shuts the f up', 'I wanna go over to his office and kick his f'in ass...!'
Unfortunately...the idiot Charles had control of the webinar and was sharing his screen so every message he sent was seen by all of the attendees! Yeah, everyone including Bob and the Senior Oklahoma executives! We could not instant message him to stop as everyone would have seen our warnings, so we tried to call Charles' cell phone and text him but he did not pick up. He just kept firing ridiculously embarrassing dirty IM messages and I guess we were all so stunned we just sat there bewildered. We finally bit the bullet and IM'ed him to STOP ALREADY!!! Whoa, talk about an embarrassing silence!
I really felt sorry for Bob. He is a good guy. Deservedly, Charlie 'Yes I am going to call you CHARLIE' got in big time hot water after the webinar with upper management. For one reason or another he only lasted another year or so at our company. Maybe this event played a part in his demise.
So, the morale is, if you use IM - turn it off during a webinar if you are the host. If you must use it, be really careful what you say, who you say it to and pray nothing embarrassing or personal is sent to you for everyone to see.
Quick Update - During the past couple of months I participated on many webinars with enterprise software vendors trying to sell me expensive solutions. Most of the vendors had their IM going while doing webinars and training. Some very embarrassing things came flying across our screens. You learn a lot reading those messages when they pop-up on the presenters' screen, both personal and business related. Some even complaints from customers!
My advice to employees and vendors is to sign-out of IM before hosting a webinar. Otherwise, it just might destroy your credibility and possibly your career.5 -
I'm going for longest rant. TL:DR; version here:
http://pastebin.com/0Bp4jX9y
then:
http://pastebin.com/FfUiTzsh
Twat Client,
As per our conversation, here is an invoice for the work you requested on behalf of U.S. Bloom. I realize that you ended up going with another designer, but you did request samples of what my take on the logo design would be. The following line item is indicative of 1 hour of graphic design consultation as per your request via Skype.
As I recall, you mentioned that this is not how Upwork "works" but considering it was you who requested that I converse with you via Skype instead of via the Upwork messenger, and since there were no clear instructions on how to proceed with Upwork after our initial consultation, It is assumed that you were foregoing Upwork altogether to work with me directly, thus the invoice from me directly for my time involved in the project. I would have reached out to you via Skype, but it seems that you may have severed our connection there.
After spending a little time researching your company, I could not find current information for Basic Media Marketing, but I was able to reach out to your former partner Not A. Twat, who was more than helpful and suggested that he would encourage you to pay for the services rendered.
It is discouraging that you asked for my help and I delivered, but when I ask for compensation in return for my skills, you refused to pay and have now taken your site offline and removed me as a contact from Skype.
{[CLIENT of CLIENT]},
I am sorry that I have bothered you with this email. I copied you on it merely for transparency's sake. I am sure that your logo is great and I am sure whatever decision was made is awesome for your decision. I just wanted to make sure that you weren't getting "samples" of other people's work passed off as original work by Twat Media Marketing.
I can't speak for any of the other candidates, but since Twat asked me to conduct work with him via Skype rather than through Upwork, and since he's pretty much a ghost online now, (Site Offline, LinkedIn Removed or Blocked, and now Skype blocked as well) one has to think this was a hit and run to either crowdsource your logo inexpensively or pass off other artist's work as his own. That may not be the case, but from my perspective all signs are pointing to that scenario.
Here is a transcript. Some of his messages have been redacted.
As you can clearly see, requests and edits to the logo were being made from Jon to me, but he thinks it's a joke when I ask about invoicing and tries to pass it off as an interview. Do you see any interview questions in there? There were no questions about how long I have been designing, what are my rates, who have I done work for in the past, or examples of my previous work. There were none because he didn't need them at this point.
He'd already seen my proposal and my Behance.net portfolio as well as my rates on Upwork.com. This was a cut to the chase request for my ideas for your logo. It was not just ideas, but mock designs with criticism and approval awaiting. Not only that, but I only asked for an hour of compensation. After looking at the timestamps on our conversation, you can clearly see that I spent at least 3 hours corresponding with Twat on this project. That's three hours of work I could have spent on an honest paying customer.
I trust that TWATCLIENT will do the right thing. I just wanted you guys to know that I was in it to do the best design I could for you. I didn't know I was in it to waste three hours of my life in an "interview" I wasn't aware I was participating in.
Reply from ClientClient:
Hello Sir,
This message is very confusing?
We do not owe your company any money and have never worked with you before.
Therefore, I am going to disregard that invoice.
Reply from TWATCLIENT's boss via phone:
I have two problems with this. One I don't think your business practices are ethical, especially calling MY client directly and sending them an invoice.
Two why didn't you call or email Jon before copying my client on the email invoice?
Me: Probably because he's purposely avoiding me and I had no way to find him. I only got his email address today and that was from a WHOIS lookup.
Really, you don't think my business practices are ethical? What about slavery? Is that ethical? Is it ethical to pass of my designs to your client for critique, but not pay me for doing them?
... I'LL HAVE TO CALL YOU BACK!
My email follow up:
http://pastebin.com/hMYPGtxV
I got paid. The power of CCing the right combination of people is greater than most things on Earth.14 -
Me: I honestly don't care how thick a phone is and who cares if it doesn't have wireless charging...
Other consumers: I want a thin, beautifully designed phone and it has to have wireless charging, it's 2018 l, every phone needs this....
*Me watching that same consumer put a thoch bulky case that hides the phone and breaks wireless charging*
Well that makes fucking sense doesn't it...8 -
My sleep pattern is royally fucked. I searched around for alarm apps that can help me get back on track. I found one called Alarmy. The list of features was mindblowing. Fast forward a couple of weeks and I’m on vacation. I’m using my mobile data as a hotspot to browse and do research as there are no other internet options here.
My alarm goes off at 6 AM. Everyone besides me is sleeping. Here is where the first problem arises. The only way to turn the alarm off is by taking a picture of something I have at home (This is how I force myself out of bed). I start panicking. How the hell am I going to shut this damn thing off. I try to turn the phone off, and that’s when I realize I’ve made a huge error. The pro version of Alarmy has a setting that allows you to prevent yourself from turning it off at all. Genius me thought that was a good idea. I fumble with my phone as the 1 minute mute timer they give you is slowly ticking down, before all hell breaks loose. That’s when it hits me. I have an LG G3 with replaceable batteries. My violently pounding heart rate start to slow down as I take off the case and slamdunk the phone until the battery falls out. I did it. I’m saved. 5 minutes later I turn my phone on, start the hotspot and get back to my browsing.
BEEP F*CKING BEEP. Alarmy is not done with me yet. It turns out they’ve implemented a new feature that continues the damn alarm after a shutdown. At this point I have ran out of options. I take the battery back out, and now I’m sat here without no phone or internet for the rest of my vacation, and with no clue what to do.13 -
This is more of a rant about myself and what a prick I am. Last week I left my brand new Kindle at a hotel, just forgot about it because my brain is mush.
I don't even bother calling the hotel for days thinking and knowing full well the staff would have taken it (this stupid thing is worth a week's worth of wages here). I decide to call anyway and ask. "Yes sir, Mr. Matt, your Kindle is safe and sound in our hotel's main safe in a soft case awaiting your pickup or we will be happy to courier it to you".
I drove back to Varna and the super nice hotel guy apologized he didn't have my number otherwise he would have called (I don't have a phone number in BG).
I hate being the cynical asshole-dick I've always been.
Fuck.
I'm getting drunk now.
10 -
Yesterday I stayed at home sick. Had a bad case of the EXPLOSIVE DIARRHEA FROM HELL. Was feeling ok but could not walk away from me throne.
Went in today cuz the lead was not gonna be there and shit always breaks on Freyja's day as we all know.
1 and a half hours before we clock out and go home someone calls saying that students are trying to drop from classes at the last minute and our app ain't doing it.
I "fixed" the app last week and ran a small login test. It work so I thought it was fine. Stupid me for making unprofessional and retarded assumptions.
Manager freaks out. The entire school freaks out. Coworker lols cuz he ain't got to work on it. I start mind debugging the entire bitcheridoo.
45 minutes later...and I was able to successfully go through almost 15k lines of code of php/html/js code and fucking FIXED it with tests and all for real.
Went at it hard. Babe ass manager was like 0.0 and then (͡° ͜ʖ ͡°)
Called head office and told them everything was undr control.
Dropped the phone like a mic. Mic drop.
Then I looked at manager and coworker and said "ya I fucked up, but I am still the king"
Both nodded in agreement.
Everyone got wet with my sheer awesome troubleshooting php master skills.
Got home thinking about how boss I am.
Fucking Texas af b. Can't touch this heat. The rangers still suck and so do the cowboys. The astros and the texans don't exist because there is only room for one. Go spurs.
Still have diarrhea.
Fuck yeah.8 -
So following from this rant:
https://devrant.io/rants/618679/...
Warning long rant ahead
I resigned and my last day is tomorrow, I've released the app updates a week ago, patched a couple bugs for iOS.
My boss and the idiot who can't open an email on his phone go off to use the app as part of some training thing for the company.
I got a call yesterday saying the Android app has issues and I proceeded to ask my boss what type of phone they have:
"Samsung and Huawei"
I thought okay I need more info "what type of phone..." He responds with wouldn't have a clue....
I can't see the phone, didn't get a screenshot or anything like that but I'm expected to just know what the phone is.
My boss goes on to say yeah it's the app (he is literally the most computer illiterate person I could think of aside from guy who can't open emails on phone, how the fuck do you know that?)
Me: "From all the testing I've done the app works"
Look if you want a more robust error free update hire more than one developer I can't test every single fucking use case to determine the app is 100% bug free, I've tested on at least 10 phones before releasing the update just to be absolutely sure I got everything done and okay I missed something.
So I proceed to get my boss to tell the guy who has the issue I'll sign him up to the testing app to find out the cause and hopefully fix the issue, I setup crashlytics send the email and get a call from my boss saying the guy didn't get the email.
Well okay is it my problem that we have two emails for the same person where one of them is a typo? No it's the guy who asked and wrote down the email instead of actually forwarding a blank email from him to be absolutely sure, I sent the email to both just to be on the safe side.
I swear if he is another idiot who can't open emails on his phone well I can't help him, app works on my phone and the phones at work.
I need a phone where it doesn't work so I can get a solution I know works but if I have to deal with these idiots that can't even check an email how the fuck do I do that?
Sorry about the formatting just needed to get this off my chest before I start work.
Oh and I get asked "so who'll fix the bugs when you're gone" well I can't (in reality I'm not working for free, I'm not traveling 1 1/2 commute time to fix one bug for free, go hire someone you think will love to work for minimum wage and let's see if this guy can do what I did)8 -
Custom devRant swag! 😃
(I bought some genuine swag as well, I'm not just doing it to get cheaper swag...)
3 -
* Recruiter says he has a nice proposition
* I say that I'm not comfortable switching jobs yet, but I'd be up for a short phone interview to hear him out, out of pure interest
* Recruiter explains a lot about the company, and then asks if I am up for "a short Teams introduction with the team lead to hear more"
* I say yes, though still stating that I do not intend on switching, but want to know more in case of a future possibility
* Recruiter says I need to send my full CV / Resumé plus grades from every school I ever intended (including the early ones that doesn't even matter)
* I say no since 1) I'd have to dig them out from the basement, 2) I am not looking for a job right now, and 3) This request is absurd to me, and NOT a norm in my part of the world when I am not applying.
* He says I HAVE to, since I could be lying
(I am mostly self-taught and have very little actual education, so this logic made NO sense to me)
* I continue to say no, stating that it's simply not worth the time finding the old grades in the basement for a job I will not be taking, and that I am mostly self-taught so grades wouldn't matter
* He starts getting angry, accusing me of "purposefully wasting his time", and says he'll warn the company about me.
Fair point. I'll warn my contacts about you then. Have a nice day, you f*cking prick :)2 -
@netikras since when does proprietary mean bad?
Lemme tell you 3 stories.
CISCO AnyConnect:
- come in to the office
- use internal resources (company newsletter, jira, etc.)
- connect to client's VPN using Cisco AnyConnect
- lose access to my company resources, because AnyConnect overwrites routing table (rather normal for VPN clients)
- issue a route command updating routing table so you could reach confluence page in the intranet
- route command executes successfully, `route -n` shows nothing has changed
- google this whole WTF case
- Cisco AnyConnect constantly overwrites OS routing table to ENFORCE you to use VPN settings and nothing else.
Sooo basically if you want to check your company's email, you have to disconnect from client's VPN, check email and reconnect again. Neat!
Can be easily resolved by using opensource VPN client -- openconnect
CISCO AnyConnect:
- get a server in your company
- connect it to client's VPN and keep the VPN running for data sync. VPN has to be UP at all times
- network glitch [uh-oh]
- VPN is no longer working, AnyConnect still believes everything is peachy. No reconnect attempts.
- service is unable to sync data w/ client's systems. Data gets outdated and eventually corrupted
OpenConnect (OSS alternative to AnyConnect) detects all network glitches, reports them to the log and attempts reconnect immediatelly. Subsequent reconnect attempts getting triggered with longer delays to not to spam network.
SYMANTEC VIP (alleged 2FA?):
- client's portal requires Sym VIP otp code to log in
- open up a browser in your laptop
- navigate to the portal
- enter your credentials
- click on a Sym VIP icon in the systray
- write down the shown otp number
- log in
umm... in what fucking way is that a secure 2FA? Everything is IN the same fucking device, a single click away.
Can be easily solved by opensource alternatives to Sym VIP app: they make HTTP calls to Symantec to register a new token and return you the whole totp url. You can convert that url to a qr code and scan it w/ your phone (e.g. Google's Authenticator). Now you have a true 2FA.
Proprietary is not always bad. There are good propr sw too. But the ones that are core to your BAU and are doing shit -- well these ARE bad. and w/o an oppurtunity to workaround/fix it yourself.13 -
Goddamn I'm happy that I've put a €3 rubber case on my phone.. it just fell face down from 2 meters height, if it wasn't for that protection, I'd have a €630 paperweight by now 😰
Seems like these things can happen to the best of us (I'm generally very careful with my gadgets).. Today I leaned not to omit your smartphone's protection 😶9 -
I just tried to sign up to Instagram. I made a big mistake.
First up with Facebook related stuff is data. Data, data and more data. Initially when you sign up (with a new account, not login with Facebook) you're asked your real name, email address and phone number. And finally the username you'd like to have on the service. I gave them a phone number that I actually own, that is in my iPhone, my daily driver right now (and yes I have 3 Androids which all run custom ROMs, hold your keyboards). The email address is a usual for me, instagram at my domain. I am a postmaster after all, and my mail server is a catch-all one. For a setup like that, this is perfectly reasonable. And here it's no different, devrant at my domain. On Facebook even, I use fb at my domain. I'm sure you're starting to see a pattern here. And on Facebook the username, real name and email domain are actually the same.
So I signed up, with - as far as I'm aware - perfectly valid data. I submitted the data and was told that someone at Instagram will review the data within 24 hours. That's already pretty dystopian to me. It is now how you block bots. It is not how Facebook does it either, at least since last time I checked. But whatever. You'd imagine that regardless of the result, they'd let you know. Cool, you're in, or sorry, you're rejected and here's why. Nope.
Fast-forward to today when I recalled that I wanted to sign up to Instagram to see my girlfriend's pictures. So I opened Chromium again that I already use only for the rancid Facebook shit.. and it was rejected. Apparently the mere act of signing up is a Terms of Service violation. I have read them. I do not know which section I have violated with the heinous act of signing up. But I do have a hunch.
Many times now have I been told by ignorant organizations that I would be "stealing" their intellectual property, or business assets or whatever, just because I sent them an email from their name on my domain. It is fucking retarded. That is MY domain, not yours. Learn how email works before you go educate a postmaster. Always funny to tell them how that works. But I think that in this case, that is what happened.
So I appealed it, using a random link to something on Instagram's help section from a third-party blog. You know it's good when the third-party random blog is better. But I found the form and filled it in. Same shit all over again for info, prefilling be damned I guess. Minor convenience though, whatever.
I get sent an email in German, because apparently browsing through a VPS in Germany acting as a VPN means you're German. Whatever... After translating it, I found that it asks me to upload a picture of myself, holding a paper in my hands, on which I would have a confirmation code, my username, and my email address.. all hand-written. It must not be too dark, it must be clear, it must be in JPEG.. look, I just wanted to fucking sign up.
I sent them an email back asking them to fix all of this. While I was writing it and this rant, I thought to myself that they can shove that piece of paper up their ass. In fact I would gladly do it for them.
Long story short, do not use Instagram. And one final thing I have gripes with every time. You are not being told all the data you'll have to present from the get-go. You're not being told the process. Initially I thought it'd just be email, phone, username, and real name. Once signed up (instantly, not within 24 hours!) I would start setting up my account and adding a profile picture. The right way to ask for a picture of me! And just do it at my own pace, as I please.
And for God's sake, tackle abuse when it actually happens. You'll find out who's a bot and who isn't by their usage patterns soon enough. Do not do any of this at sign-up. Or hell, use a CAPTCHA or whatever, I don't fucking care. There's so many millions of ways to skin this cat.
Facebook and especially Instagram. Both of them are fucking retarded.6 -
WTF is this bullshit?!! I set an alarm on my phone for 9:00 and 9:15 just in case... The alarms went off at 10:00 and 10:15, now I am an hour late for work. Just how does that even work?!!! Yeah, time changes but you don't change the fucking alarm Huawei! FFS... I really don't look forward to explaining this...
Also.. devRant on mobile seems to be broken? :( @dfox14 -
So we ordered a piece of software from external software house becouse I was low on time and we needed it asap.
So. Long story short, their software was bugged as hell, they deny all the bugs and they have their BDD that they done and anything we say about it like "feature XYZ is broken on firefox" they will deny it "becouse it wasn't on BDD" or "let's get on call" (in which +- 6-7 people participate from their side and we of course have to pay them for this...)
So they fixed like 20% of bugs (mostly trivials/minors) Application is fairly small scope. You have integration with like 3 endpoints on arbitary API, user registration/login, few things to do in database (mainly math running from cron).
They done it in ASP so I don't know the language and enviroment so can't just fix it myself.
2 days ago (monday) they annoyed me to point where I just started to break things. For starters I found that every numeric input is vunrable to integer overflow (which is blocker). I figured most of fields are purefect opportunity to XSS (but I didn't bother to do JS... anything but not JS...). I figured I can embed into my name/surname/phone (none validated) anything in HTML...
So for now we have around 25 bugs, around 15 of them are blockers.
They figured it's somehow our fault that it's bugged and decided to do demo with us to show off how perfectly it works. I'm happy to break their demos. I figured I will register bunch users that have name - image with fixed/absolute position top:0;left:0 width/height 100% - this will effectively brick admin panel
Also I figured I can do some addotional sounds in background becouse why not. And I just dont know what to put in. It links to my server for now so I can freely change content of bricked admin panel.
I have curl's ready to execute in case they reset database.
I can put in GIFs or heck, even videos, dosen't really matter. Framework escapes some things for them so at least that. But audio/image/video works.
Now I have 2 questions:
- what image + audio combo will work the best (of course we need to keep it civil). Im thinking finding some meme with bugs or maybe nuclear logo image with some siren sound
- am I evil person?
Edit:
I havent stated this clearly:
"There is no BDD that describes that if user inserts malicious input server should deny it" - that's almost literally what we get from them....9 -
iPhones are ridiculously picky when it comes to finding a mate- um charger. And knowing why doesn't really make it any easier to understand why. If anything it baffles me more.
So, let's start with appliances that are not phones. Think Bluetooth headsets, keyboards, earbuds, whatever. Those are simple devices. They see 5V on the VCC line and 0V on ground, and they will charge at whatever current they are meant to. Usually it will not exceed 200mA, and the USB 2.0 spec allows for up to 500mA from any USB outlet. So that's perfectly reasonable to be done without any fuss whatsoever.
Phones on the other hand are smarter.. some might say too smart for their own good. In this case I will only cover Android phones, because while they are smarter than they perhaps should be, they are still reasonable.
So if you connect an Android phone to the same 5V VCC and 0V ground, while leaving the data lines floating, the phone will charge at 500mA. This is exactly to be within USB 2.0 spec, as mentioned earlier. Without the data lines, the phone has no way to tell whether it *can* pull more, without *actually* trying to pull more (potentially frying a charger that's not rated for it). Now in an Android phone you can tell it to pull more, in a fairly straightforward way. You just short the data lines together, and the phone will recognize this as a simple charger that it can pull 1A from. Note that shorting data lines is not a bad thing, we do it all the time. It is just another term for making a connection between 2 points. Android does this right. Also note that shorted data lines cannot be used to send data. They are inherently pulled to the same voltage level, probably 0V but not sure.
And then the iPhones come in, Thinking Different. The iPhones require you to pull the data lines to some very specific voltage levels. And of course it's terribly documented because iSheep just trying to use their Apple original white nugget charger overseas and shit like that. I do not know which voltage levels they are (please let me know!), but it is certainly not a regular short. Now you connect the iPhone to, say, a laptop or something to charge. An Android phone would just charge while keeping data transmission disabled (because they can be left floating or shorted). This is for security reasons mostly, preventing e.g. a malicious computer from messing with it. An iPhone needs to be unlocked to just charge the damn thing. I'm fairly sure that that's because the data lines need to be pulled up, which could in theory enable a malicious computer to still get some information in or out of it. USB data transmission works at at least 200mV difference between the data lines. It could be more than that. So you need to unlock it.
Apple, how about you just short your goddamn data lines too like everyone else? And while you're at it, get rid of this Lightning connector. I get it, micro USB was too hard for your users. I guess they are blind pigs after all. But USB-C solved all of that and more. The only difference I can think of is that the Lightning connector can be a single board with pads on either side on the connector, while in USB-C that could be at the socket end (socket being less common to be replaced). And at the end of the day, that really doesn't matter with all the other things that will break first.
Think Different. Think Retarded. Such tiny batteries and you can't even fucking charge them properly.6 -
My recruitment story is a bit funny,
i had two interview, first one was to evaluate working style, behavior and ethics, where the interviewer and i spent almost 20 minutes discussing video games 😀.
second was technical, was interviewed by a lady dev manager and the team's technical lead "which i didn't know their roles at that time" went really good and at the end they asked:
Do you wanna ask us any questions?
Me: *leans back, with one arm on the chair arm and with a curious look and pointing one finger at both of them😕*
So what are you two?
them: *both had a shocked face and looked at each other for few seconds, manager chuckles😓😓* Well i am the team's dev manager and this guy is the team's technical lead, and in case you were wondering, we are not a couple.
technical lead: 😂😂😂
Me: 😨😨 no no that's not what i meant i swear.
Interview was over, i left the building thinking 😢😢 oh god, i totally blew it.
2 weeks later i get a phone call asking me to come and discuss contract terms 😂😂😂
sorry for the long story
5 -
Disclaimer: Long tale of a tech support job. Also the wk29 story is at the bottom.
One time I was working tech support for a website and email hosting firm that was in town. I was hired and worked as the only tech support person there, so all calls came in through me. This also meant that if I was on a call, and another one came through, they would go straight to voice mail. But I couldn't hang up calls either, so, sometimes someone would take up tons of time and I'd have to help them. I was also the "SEO" and "Social Media Marketing" person, as well; managed peoples' social media campaigns. I have tons of stories from this place but a few in particular stick out to me. No particular order to these, I'm just reminiscing as I write this.
I once had to help a man who couldn't find the start button on his computer. When I eventually guided him to allowing me to remote into his computer via Team Viewer, I found he was using Windows XP. I'm not kidding.
I once had to sit on the phone with a man selling Plexus Easy Weight Loss (snake oil, pyramid scheme, but he was a client) and have him yell at me about not getting him more business, simply because we'd built his website. No, I'D not built his website, but his website was fine and it wasn't our job to get him more business. Oh yeah, this is the same guy who said that he didn't want the social media marketing package because he "had people to hide from." Christ.
We had another client who was a conspiracy theorist and wanted the social media marketing package for his blog, all about United States conspiracies. Real nut case. But the best client I've ever had because sometimes he'd come into the office and take up my time talking at me about how Fukushima was the next 911 and that soon it'll spill into the US water supply and everybody was going to die. Hell, better than being on the phone! Doing his social media was great because he wanted me to post clearly fake news stories to his twitter and facebook for him, and I got to look at and manage all the comments calling him out on his bullshit. It was kinda fun. After all, it wasn't _me_ that believed all this. It felt like I was trolling.
[wk29] I was the social media and support techie, not a salesperson. But sometimes I was put in charge _alone_ in front of clients for status meetings about their social media. This one time we had a client who was a custom fashion-type person. I don't really remember. But I was told directly to make them a _new_ facebook page and post to it every day with their hot new deals and stuff. MONTHS pass since I do that and they come in for a face-to-face meeting. Boss is out doing... boss things and that means I have to sit in with her, and for some fucking reason she brought her boyfriend AND HER DAD. Who were both clearly very very angry with me, the company, and probably life. They didn't ever say anything at first, they didn't greet me, they were both just there like British royal guards. It was weird as fuck. I start showing them the page, the progress on their likes goals, etc etc. Marketing shit. They say, "huh, we didn't see any of these posts at home." Turns out they already had a Facebook page, I was working on a completely seperate one, and then the boyfriend finally chimes in with the biggest fucking scowl, "what are you going to do about this?" He was sort of justified, considering this was a payed and semi-expensive service we offered, but holy shit the amount of fire in all three of them. Anyway, it came down to me figuring out how to merge facebook pages, but they eventually left as clients. Is this my fuck up? Is it my company's? Is it theirs? I don't know but that was probably the most awkward meeting ever. Don't know if it comes across through text but the anxiety was pretty real. Fuck.
tl;dr Tech support jobs are a really fun and exciting entry level position I recommend everybody apply for if they're starting out in the tech world! You'll meet tons of cool people and every day is like a new adventure.2 -
NO FUCKING GOOD NIGHT FOR FLOYD.
THIS MULTI FACTOR AUTHENTICATION IS A FUCKING NIGHTMARE.
So my organisation uses some MFA app as an SSO to access any and everything. Fantastic. Absolutely wonderful. No VPN shit and one password to rule them all.
But, for some reason I accidentally deleted the app from my phone and as any normal human being would do, I also reinstalled the app.
Well, post reinstalling, the app does not detect the linked Org account.
I was cool, when I'll login, the system will throw a prompt to map the phone.
So I login to org URL from my machine and lo and behold, the URL says that MFA is already linked to the phone and I have to enter the Citrix type code to login.
But phone does not show the code because account is no longer linked and web does not have option to change/re-register the phone.
What the actual unholy fuck?????? Bloody retards. How am I suppose to get in now?
So after a Googling for a bit, a thread mentioned that this is most common issue faced by users with this MFA app. The only way to get this resolved is to contact your IT team.
Cool. Let's do that.
I opened the link to my IT portal and it asks me to login via SSO which is what I need help with in first place.
I can't login to Slack because fuckers ask SSO every time the app is exited. So no contact there.
Thankfully bastards allow Outlook so was able to drop a note to one of my team member, whom I connected recently and is very nice, asking her to help me sort this IT team.
If this is the most common use case then why the fuck not add a feature to help people overcome this shit?
And my IT team is absolute nuts. No other way allowed to reset the linking or connect them or any help links provided on login page.
Whoever was behind this design should be dipped in donkey shit and deep fried in pig urine.6 -
After I spent 4 years in a startup company (it was literally just me and a guy who started it).
Being web dev in this company meant you did everything from A-Z. Mostly though it was shitty hacky "websites/webapps" on one of the 3 shitty CMSs.
At some point we had 2 other devs and 2 designers (thank god he hired some cause previously he tried designing them on his own and every site looked like a dead puppy soaked in ass juice).
My title changed from a peasant web dev to technical lead which meant shit. I was doing normal dev work + managing all projects. This basically meant that I had to show all junior devs (mostly interns) how to do their jobs. Client meetings, first point of contact for them, caring an "out of hours" support phone 24/7, new staff interviews, hiring, training and much more.
Unrealistic deadlines, stress and pulling hair were a norm as was taking the blame anytime something went wrong (which happened very often).
All of that would be fine with me if I was paid accordingly, treated with respect as a loyal part of the team but that of course wasn't the case.
But that wasn't the worst part about this job. The worst thing was the constant feeling that I'm falling behind, so far behind that I'll never be able to catch up. Being passionate about web development since I was a kid this was scaring the shit out of me. Said company of course didn't provide any training, time to learn or opportunities to progress.
After these 4 years I felt burnt out. Programming, once exciting became boring and stale. At this point I have started looking for a new job but looking at the requirements I was sure I ain't going anywhere. You see when I was busy hacking PHP CMSs, OOPHP became a thing and javascript exploded. In the little spare time I had I tried online courses but everyone knows it's not the same, doing a course and actually using certain technology in practice. Not going to mention that recruiters usually expect a number of years of experience using the technology/framework/language.
That was the moment I lost faith in my web dev future.
Happy to say though about a month later I did get a job in a great agency as a front end developer (it felt amazing to focus on one thing after all these years of "full-stack bullshit), got a decent salary (way more than I expected) and work with really amazing and creative people. I get almost too much time to learn new stuff and I got up to speed with the latest tech in a few weeks. I'm happy.
Advice? I don't really have any, but I guess never lose faith in yourself.3 -
!dev && rant
What's people's problem with Wikipedia.
Earlier this week I told my cleaning lady about how Black Friday was so pointless this year, and apparently it's the first thing she heard about Black Friday (she's in her late 30's and a mother of 2, go figure). Not only that but she believed that it occurred every end of the month because someone else told her so. She said it would make sense because it's close to everyone's payday.
So I go and look up some information about Black Friday for her. All the DDG results somehow shit or cluttered by marketing wank.. your guess is as good as mine. Anyway, appended Wikipedia to get some reasonably good information quick. And that looked for all the world like that was the case. Apparently it's got to do with American Thanksgiving.. who knew?
She still didn't believe it. "But that's Wikipedia..." So she looked it up on her own phone on some random local site.. it confirmed that indeed it occurs once a year. Well, confirmed to the extent that there was "2017", "2018" and "2019" on the page... Yeah.
Finally she believed it. At least she didn't double down on it anymore. But seriously.. you're gonna take the words of one random person over a medium that's constantly being improved under the many eyes principle?
"People can edit Wikipedia so therefore it's bad"
I really don't get people...18 -
A box with 20 blotters of LSD, a bottle of Tawny Port, some rock climber's hand strength training clay which is great against RSI, a very undomesticated purring feline, some leatherworking tools (making a new folding case for my phone), 2 sesame bagels with cream cheese, a piece of cherry wood, two routers (one woodworking, one internet), one Ducky Horizon and one ErgoDox keyboard, two boxes of baby wipes and a bottle of formula, an expired ticket to a corona-cancelled concert, my sleeping newborn daughter wrapped in a black hoodie, a bottle of cognac, 3x 1440p displays, a chunk of chocolate, one freshly brewed cortado, a bottle of dimethylsulfoxide, 3 laptops, a TV remote, a glass of water, and one bolt which was left over from an IKEA box but I'm unsure which furniture item it belongs to.4
-
Dear every single Samsung owner I see, if you spend $200+ on a life proof case but still end up with your screen and back smashed... I think you have bigger problems than just a smashed phone...3
-
Long rant ahead.. 5k characters pretty much completely used. So feel free to have another cup of coffee and have a seat 🙂
So.. a while back this flash drive was stolen from me, right. Well it turns out that other than me, the other guy in that incident also got to the police 😃
Now, let me explain the smiley face. At the time of the incident I was completely at fault. I had no real reason to throw a punch at this guy and my only "excuse" would be that I was drunk as fuck - I've never drank so much as I did that day. Needless to say, not a very good excuse and I don't treat it as such.
But that guy and whoever else it was that he was with, that was the guy (or at least part of the group that did) that stole that flash drive from me.
Context: https://devrant.com/rants/2049733 and https://devrant.com/rants/2088970
So that's great! I thought that I'd lost this flash drive and most importantly the data on it forever. But just this Friday evening as I was meeting with my friend to buy some illicit electronics (high voltage, low frequency arc generators if you catch my drift), a policeman came along and told me about that other guy filing a report as well, with apparently much of the blame now lying on his side due to him having punched me right into the hospital.
So I told the cop, well most of the blame is on me really, I shouldn't have started that fight to begin with, and for that matter not have drunk that much, yada yada yada.. anyway he walked away (good grief, as I was having that friend on visit to purchase those electronics at that exact time!) and he said that this case could just be classified then. Maybe just come along next week to the police office to file a proper explanation but maybe even that won't be needed.
So yeah, great. But for me there's more in it of course - that other guy knows more about that flash drive and the data on it that I care about. So I figured, let's go to the police office and arrange an appointment with this guy. And I got thinking about the technicalities for if I see that drive back and want to recover its data.
So I've got 2 phones, 1 rooted but reliant on the other one that's unrooted for a data connection to my home (because Android Q, and no bootable TWRP available for it yet). And theoretically a laptop that I can put Arch on it no problem but its display backlight is cooked. So if I want to bring that one I'd have to rely on a display from them. Good luck getting that done. No option. And then there's a flash drive that I can bake up with a portable Arch install that I can sideload from one of their machines but on that.. even more so - good luck getting that done. So my phones are my only option.
Just to be clear, the technical challenge is to read that flash drive and get as much data off of it as possible. The drive is 32GB large and has about 16GB used. So I'll need at least that much on whatever I decide to store a copy on, assuming unchanged contents (unlikely). My Nexus 6P with a VPN profile to connect to my home network has 32GB of storage. So theoretically I could use dd and pipe it to gzip to compress the zeroes. That'd give me a resulting file that's close to the actual usage on the flash drive in size. But just in case.. my OnePlus 6T has 256GB of storage but it's got no root access.. so I don't have block access to an attached flash drive from it. Worst case I'd have to open a WiFi hotspot to it and get an sshd going for the Nexus to connect to.
And there we have it! A large storage device, no root access, that nonetheless can make use of something else that doesn't have the storage but satisfies the other requirements.
And then we have things like parted to read out the partition table (and if unchanged, cryptsetup to read out LUKS). Now, I don't know if Termux has these and frankly I don't care. What I need for that is a chroot. But I can't just install Arch x86_64 on a flash drive and plug it into my phone. Linux Deploy to the rescue! 😁
It can make chrooted installations of common distributions on arm64, and it comes extremely close to actual Linux. With some Linux magic I could make that able to read the block device from Android and do all the required sorcery with it. Just a USB-C to 3x USB-A hub required (which I have), with the target flash drive and one to store my chroot on, connected to my Nexus. And fixed!
Let's see if I can get that flash drive back!
P.S.: if you're into electronics and worried about getting stuff like this stolen, customize it. I happen to know one particular property of that flash drive that I can use for verification, although it wasn't explicitly customized. But for instance in that flash drive there was a decorative LED. Those are current limited by a resistor. Factory default can be say 200 ohm - replace it with one with a higher value. That way you can without any doubt verify it to be yours. Along with other extra security additions, this is one of the things I'll be adding to my "keychain v2".10 -
Disclaimer: This is not a Windows hate rant as this problem has been solved by Microsoft(partially).
I went to a hackathon last year at an engineering college. It was not such grand hackathon as people have in USA or Europe. So I entered in this competition trying to develop a medical app which asks the user detail about his/her problems then asks questions to match the symptoms of diseases. So me and a guy(who isn't a coder) tried to develop that app. He provided the data of diseases, I tried to develop kind of AI app with those data but found that job too hard for one day hackathon. So I wrote an email for api medic for their api which I was going to use. I then coded continuously for 4 hours in Android studio for the android app. The event manager told us late in the day that repo had been made for the hackathon and we must push our codes before 12 that night. The event manager provided the repo very late that day maybe around 6. I did a big mistake not creating my own repo on github to save every code I had written from time to time.(After this e vent whatever I code I save it in a repo). I was running Windows 10 on one of my laptop and ubuntu on my another. Due to some divine badluck I was using my Windows 10 laptop on that hackathon. So around maybe 10 I was about to wrap up the day push the code to repo. I went to getself a cup of coffee and returned to find lo and behold fucking BSOD. I was fucked, it was my first hackathon so made another misatake of using emulator rather than my android phone. My Android phone was not responding good that day so I used the android emulator.
From that day on I do three things:
1. Always push my projects to github repo.
2. Use android phone after running some minor tests on emulator.
3. Never use windows(Happy arch user till eternity.)
You might be thinking even though BSOD, it can be recovered. But didn't happen in my case, the windows revert back to the time I had just upgraded from Windows 8.1 to 10.3 -
Playing around with Bard:
Me:Who called me from ...?
Bard: <blah blah blah> Would you like me to run a reverse phone lookup on that number for you?
Me: Yes
Bard: I'm just a language model, so I can't help you with that.
Me: Then why did you ask?
Bard: "I understand that you don't need me to run a reverse phone lookup, and that's perfectly fine. I just wanted to offer the service in case you were interested."
I tweaked the question and Bard responded with a Python script and a phone number regular expression.
Our jobs are safe for now.1 -
Storytime!
I got a ticket near the end of the day, asking to install a printer on a computer. The branch in question was in a different time zone (I'm in US-Pacific [GMT-07] and the computer was in US-Eastern [GMT-04]). I figured I wouldn't worry about it; after all, I had other tickets to work on that were much higher priority.
The next day I come into work and immediately get a message from one of my East Coast coworkers, telling me that this branch is calling and asking how the printer is coming. I told him to tell them I would call them a bit later. I do a couple of easy jobs and then begrudgingly call the branch. I listen to the phone tree that they have (which requires two button presses instead of one in order to speak with someone) and finally get in contact with a person... only to have the call disconnect.
I call back and ask for the person who called in the ticket and then followed up, who had apparently gone to lunch. I informed the person that I was just going to install the printer and it would be good to go. This would be fine... up until she mentioned she needed scanning functionality.
Now I wasn't sure if the driver we have in AD is set up with the scan functionality, so I said okay, but that meant I would have to get the driver from the website. The connection to our branches are about 1Mbps, so even downloading Java updates (60-ish MB) take about 5-10 minutes on a good day. The file for this printer was about 700MB (thanks HP). So I went and did other stuff while that downloaded.
I come back after it finished and started the install process. Right away it asks to re-seat the USB cable. So I call the branch. The call disconnects. I call again. It disconnects. I call one more time, and finally get the person who called the ticket in. I instruct him to re-seat the cable. He does. The driver starts doing its thing. I tell him I'll call back if I run into any issues and we hang up.
The driver goes through the install process for about 20 minutes, stops at 99%, then fails. I want to restart the computer, just in case there's a conflict somewhere, but that would require calling the store again, so I put it off.
About an hour later I get a message from another East Coast coworker, telling me the branch is calling about the printer again. I was in the middle of another call and said I would call back later. I do. It disconnects. I call again, and get the person who called the ticket in again. I tell him I want to restart the computer, but wasn't sure if it was okay. He checks with the people using it, who says it's okay, so I reboot. I hang up.
Once the computer comes back up I start the install process again. It asks to re-seat the cable. Fuck. I don't want to call the store again, so I open notepad and say "Please take out the printer's USB connection from the back of the computer."
Three. Fucking. People. Saw it. They moved the window and one even tried to close it, but they didn't re-seat the cable. I opened another window, telling them to call me at my number. They didn't. I called them. Got disconnected. I called them again, finally got someone, told them to re-seat the printer cable again. They do, thank god.
I say thank you and hang up. Continue the installer. It stops at 99% again and fails. I reboot the computer; screw it, I'm just going to install the driver from Active Directory. Check Devices and Printers. It's installed successfully. Hallelujah!
I get the printer set up for the various programs they use and print a test page. I call them one last time; their phone system sounding like they were connected via an underwater line connected by tin cans. I get someone.
$me: Hi, I want to know if the printer has printed something.
$them (garbled): -et me shee... yesh, it -rint-d a *beezelborp*.
$me: Perfect, I'm going to close this ticket! Thanks, goodbye! *hangs up*
tl;dr - I hate printers -
The story of how I got my dream job.
I was working for a company with a job I got just after graduating university. It was ok, not very exciting tech but I learned a lot by just surrounding myself with professional code monkeys. I was there for about a year when my company bought parts of another company and there was talk about people getting fired. This made me worried since I was the last one to get hired, so I started looking around for other jobs. I received this e-mail from a company saying they were looking for interns, what a coincidence! I adjusted my CV and sent it in.
--A few weeks pass--
It's Friday and I'm at a dinner party, it's 10pm and someone is calling me. I pick up and it's a recruiter from this company. I get very nervous but the alcohol helps me keep my cool, I pass the initial idiot test and they invite me for an interview. Yay!
I go to work on Monday and in a 1-on-1 and I tell my boss about the upcoming interview, he gives me a high-five :)
The interview is approaching and I'm feeling that I'm about to get sick, I refuse to believe this so I start taking a lot of medicine (painkillers, cough medicine etc.). I feel a bit better and thank the gods for medication.
--D-day--
I wake up, put on my nicest clothes and get on the train. I had one hour to spare just in case, which was well needed because the fucking train is late by 30 minutes. I'm still heavily medicated because of my ongoing fever. When I arrive I basically have to run there and somehow I manage to pick up a coffee on the way there which I devour in two seconds. I'm ready for the interview!
Some guy meets me in reception and the first thing he says is "My colleague doesn't speak our language so we'll have to speak english". This is fine, I speak good english but I was not prepared for this so it caught me off-guard and made me even more nervous. We get in and start talking. Things are going OK despite my numbed brain. I try to make eye-contact to make a good impression with the foreign engineer but he keeps staring somewhere which is making me nervous.
We get to the technical part on a whiteboard and this is where my brain decides to stop communicating. I'm presented a simple task which I'm struggling with finishing, and I feel the embarrassment coming over me. "NOOOOO THIS IS MY DREAM JOB, THIS CANNOT BE HAPPENING!" I'm thinking to myself. After making myself look like a complete arsehole for some time we wrap it up and just before I step out the door I say to the engineer "You should checkout my Github page, I have lots of interesting stuff there" and he says "I'll be sure to do that" but I don't believe him.
I leave the office in fury (of myself) and make my way to the train station and even though it's the middle of the day I quickly devour two beers to calm my nerves and make me feel a bit better. I was so damn disappointed in myself, I wasted the opportunity of a lifetime! I go back home to my regular (now shitty) job.
--Two days later--
I get a call from an unknown number. I pick up the phone and it's the same recruiter guy. "So how did you think it went?" he says. "To be honest, I think it went really bad", I replied. "What? Really? Because they loved you, you got the job". (this was an obvious recruiter lie) "... wat, are you sure you called the correct person?" I said and he just laughed. The day after I quit my old job the whole department gets fired - such impeccable timing.
--A few months later--
I finish my internship and they want to keep me. I'm so happy. The engineer that was in the interview works on my team. I ask him "Why did you hire me? You know as well as I do that my interview was horrible". It turns out he _did_ look at my Github profile and that's how he knew I could write code. I also heard later that for my position there was about 2000 applicants and somehow I made the interviews.
I still work there today and I couldn't be happier (Sorry for the long text).3 -
"Hey boss, could you look over this reply to this support case before I send it? I just want to clarify a couple of things first."
"I haven't got the time to look over support case replies - you need to be proactive in deciding what's right, and then just sending them on."
"Ok, no worries."
5 minutes later...
"What the hell have you written on this support case? This isn't correct at all. Now they're going to be really confused. You've completely contradicted what I told them yesterday on the phone."2 -
!dev
Dropped my iPhone from the 2nd floor (in US 3rd floor because our ground is your 1st) on concrete... case is fucked but the phone doesn’t have a single scratch..
Lucky me..4 -
my dad's excavating some land so he can build a house, and he found a HDD buried out in the middle of fucking nowhere (50+ miles from nearest town in the middle of 10-house "village") -- no case, no wrap, just the drive. It works, but when we read it it was zeroed save for a few bad sectors that didn't take. It also makes a horrible cricket-like noise (https://picosong.com/w8qYn but much louder in reality, shitty phone mic) and it worries me.12
-
Had to modify, but phone case is looking good.
(Took embarrassingly long time to figure out how to take photo of phone case, ala, just take phone out of case.)😅
4 -
More like a sub company/department inside a company: Android.
I still use it as my main driver, but every time I try to get back into development with it(did it professionally for 2 years nearing on 3 and was a lead Android dev, mind you not necessarily by merit....) I end up hating everything about it.
The tooling is meh, the API is hideous and even with the addition of Kotlin, which I do find a nicer language over Java I still dislike it. The ammount of shit needed to make something as simple as store data, manage fragments, integrate with the NDK, make JSON API calls or even shake motions is just ludicrous and counter intuitive. I can see why people would hate Java based on Android, a language that I generally love and defend.
I firmly believe that people extend frameworks or tooling for 2 reasons only:
1 the stack is so awesome that you just want to create packages and libraries to extend the functionality of a powerful environment, like gems for Ruby, python packages, Node packages, php composer, nuget etc
2 the stack is so fucking hideous that people need to fix shit: the entire android square utility framework, butterknife, flutter, react native, codenameone, etc etc
The case with Android is the second. I have not met a professional Android developer that completely likes everything about Android, but will seldom find people that HATE other frameworks or environments.
Android it is for me. Still my daily driver and I love every Android phone I have ever owned. It just makes me feel lots of more compassion for fellow Android devs.4 -
#wk13
Client: Let's get our car online using the phone as the router!
Me: let's do that!
Client: Can we use NFC as the protocol?
Me: Probably, but just to automate the connection..
Client: No we should use NFC for the entire session!
Me: No!
Client: Why not? It's new, it's happening, bosses will be excited!
Me: You do know what the N in NFC stands for right!
Client: New?
Me: -_- thinking "I hope you lose your genitals to a horrible case of blue waffles.."8 -
Just got a new phone.
0. Download devRand
1. Join the dark side
2. Go buy a case for when I inevitably drop said phone2 -
Accidentally dropped my Pixel 3 this morning, which I bought just a week ago. 😭 And now there's a visible crack on the back of the lower-left corner. 😭 Thought that was the only one until I inspected my phone again and noticed a long, fine crack along the back... 😭😭😭
Man, whatever happened to the days when it was PHONES that smashed walls and floors instead??
And in case you're wondering, yes I have bought a case for it--still waiting for it to arrive...7 -
I just spent 2 hours straight browsing for a new phone case and still haven't made up my mind. Why am I so indecisive!7
-
I will be there at the same time I don't have a car so I can get a ride to the airport on Friday and I will be there at the same time I don't have a car so I can get a ride to the airport on Friday and I will be there at the same time I don't have a car so I can get my car out the time to do it again and I look forward to hearing from you in awhile I have a few questions about the other I have a few questions about the same as the other day I will have a talk at you and I hope to see everyone again and again I apologise I didn't get a response to your advertisement for a while but it is a little chilly here is a copy to the store to buy the car is in a good way to start a little more time with the family for a while but it is a little chilly here is a copy to the time of the year for the first time in a long time and I don't want it for a couple days so I'm just trying for you guys I just want a ride with us to get a few things done and I will be there at the end if this works out well for you and your family a very happy and excited about this weekend so I'm just going to go to the store and get back with me and my family is going to be a little late today but I'm still in my car and I will be there at like midnight so much and have to be at work at the moment but I'll try again later in life I have been trying to get a hold of the guy that I have a meeting with you to discuss the details of the job and I have been working in my room so I can get a ride to the airport on Sunday so we are all on my own and I will be there at noon so I'll just be me my money back and I will get it done this weekend but I will be there at the same time and where would we have been in the hospital for a week or two to see you soon and have a great day today love it and it will not work for me to come in and get a new phone or in person and I am not sure how long it would have taken it off and on again and again I apologise I didn't know you were going to be a little late to the game and it will not work on it this morning I was wondering if you had a choice but I don't know if you have any questions please feel free to contact me at any rate is higher up for it and the other is a good time to come in for an appointment with the surgeon on my phone and I don't want to be a good friend to come in at all and the other is a good time to call and talk about what we can do to help you feel better I can come by to pick up the kids from school today so I'm not going anywhere for the next few days and I have a few more days before we get into my car to go out for lunch at home and I will be there at the same time as you can imagine how hard is it to late to get a new car is a lot more done with the interview and the kids will have a good day at school today so I'm not going anywhere for the next two days so we are all on my way home from the gym and then I will be able to make it today because I'm a very nice person who can do it for you if you want to come by and see you soon and have to go back in the office tomorrow morning at work today but I'm going back and I will be there at the same time and where would we have been trying all of us and the rest are you still interested I can send you a picture of the front and back of the house and the kids are going well with the family for a while but it is a little chilly here is a picture of the front and back of the house is in my prayers as a friend but it will have a great weekend and I will be there at the end if this works out well and that your mom and dad are going to be a bit of an emergency at least you have a good day at school today so I'm going to be in the office tomorrow and will be back to the hotel now I'm in bed with a friend and then I will be able to make it to the meeting tonight but I will be there at the same time I was in a hurry and come to the office and I will send the other side and a little about me and you will see that you sent it out and get a good deal and you have the address of where I can get a ride to work on it this week but will have a good day at school today so I'm not going anywhere for the next two days so we are going to be in the office tomorrow and I have been working in the morning and I will get it done this weekend but will be back in the office on Monday and Tuesday and Wednesday are going well for you and your wife is not the case then you have the address of your day goes on and I have been working in the morning and I will be there at the same time I am in need and I'll see what the status is on the way to the airport and then we will have a great day at school today so I'm trying to get a hold of the guy who was the guy who was the guy who is going well and I am going to be out by then but if I can find a way to get the car out the door to go to the store and I have to be in a relationship with a friend and then I will be able to make it to the meeting and will get the info for the guy who was the guys are doing the meeting at the church16
-
So I just used Google analytics data from my sites to reverse stalk someone who google stalked me today. I got a whole bunch of information including their mobile model, their city and bunch of other data to confirm they did actually stalk me and understand their psychology.
Backstory: I had deactivated my instagram a couple of weeks ago account without any notice. It was the best decision I made this year. I feel more focused and found myself with plenty of time which otherwise I would have spend on lusting over those sexy ig girls.
Thought nobody would even notice or care. But apparently this one girl, my 2020 covid long distance lover whom I haven't talked to in over 8 months noticed it and decided to Google me.
She spent over 25 mins on my main site and also somehow managed to discover my dead travel blog from Google. I was thinking that I did a good job with the pseudonym I used for the travel blog. Apparently that's not the case!
She must've then proceeded to my linkedin account listed on the site and then sent me a connection request. That was then the notification popped up in my phone earlier today and made me feel butterflies in my stomach. I hadn't felt those butterfly feeling ever since I figured out that we can't be together or possibly even meet for once in real life.
I was curious how she found my linkedin and why sent me the request. We are not even in a related work field, same country. I never thought I'd be thinking more than 5 secs over a linkedin connection request.
That's what lead me to check out the Google analytics data to find the chronology of the events that lead to this connection request.
Anyways, it warmed my heart to learn that she still remembers me after all these months and that she bothered to Google me. Maybe she worried if I blocked her in ig? Or maybe she wondered if I lost my life in the recent covid wave?..
I wanted her to think that I was dead by not responding to the linkedin connection request. But it is possible that she checked out my GitHub profile and found my recent activities.
It fucking sucks knowing that I might never meet her in real life. If we meet, I worry it will lead us to doing things that might hurt others.
I guess at least I can die knowing that there was some truth in our love and someone cared about me and that it was not some illusion I felt..
Maybe the least I can do for her is to just accept that connection request.9 -
A certain person here on devRant was annoyed about my phone being named “Beyond”, seeing a screenshot of my settings.
What they said: “the name, beyond, reeks pretentiousness and arrogance, you say you’re better than other people”
What really happened: during one of my manic episodes, I discovered the band named Death Grips. Their music resonated with me and helped me to cope with my derealization. In one of their songs, I misheard lyrics, and heard the word “Veyon” that was never there in the first place. Upon my inner voice pronouncing it, as it usually happens to me, a brand-new universe appeared before me, where Veyon was a name of a megacorporation that exists in a shaky spacetime plane somewhere in India. If you want to go there, three outcomes are possible: you can actually come to their building that appears to be normal, with people working inside you can talk to, and no signs of trouble in sight. Or, you can try to walk to their building, but you will never reach it. GPS will show you slowing down gradually as you get closer, but to you, it would look like you’re just walking with your regular speed, as if nothing happened. Like a function trying to reach its asymptote, you’ll never come to your destination. The third outcome is by far the most interesting one. You will reach the building, but it will be abandoned, with doors scattered on the floors randomly, some of them will disappear after you walk in, rendering you missing in this universe. Oh, and floors are guarded by robots and turrets, and they are made by Grumman, the military aviation manufacturer. Yes, Grumman, not Northrop Grumman. This building in the third outcome originates from the spacetime plane where Northrop and Grumman never merged.
The whole thing raced through my mind in a millisecond. I liked it and decided to squat the name, but it was already taken by Veyon open source software (Virtual Eye On Networks).
In some time, I bought a new phone second-hand, and named it Veyon. The next day, I took it to shower with me. It turned out that the seller lied to me about it never being fixed. It was, and in the process its water resistance was compromised. So, this phone was damaged beyond repair the next day I bought it.
The same day, I went and bought the same phone model, but brand new, and in black, as I originally wanted. I was grateful for this opportunity that helped me escape the situation where I would've been using the phone of the colour I disliked just because I cheapen out. I know myself, and I would’ve been feeling uneasy every day, hesitant to sell it and get a new one because “nothing is wrong with it, quit being this picky, it’s just a colour”, but wait, don’t I deserve to make the colour a significant enough reason to switch the phone because I care about colour, especially if it’s me who’s paying the money? Did I make this money rightfully, or am I an impostor who gets paid because of intricate lies I tell? Do I actually tell them, or do I make that up to somehow convince "them" I'm innocent? Or do I try to get attention?
I’m terrible at dealing with that kind of mess, So, I was grateful.
The only thing left to do was to name my new phone. I decided not to name it “Veyon” again, just in case. So, I named it “Beyond”, as this word is probably what the actual song said.
The monstrosity of a story above is the usual thing for me to feel. I was really hurt by you telling me the name I chose was a display of pretentiousness. Do I deserve to be pretentious? I say yes, but my voice is shaking, as flashbacks of my awful mother abusing me come in the way.
You hurt me with that comment. Let’s meet? :)2 -
Freelance Headhunters...
No idea where they got my name and the number of my work phone...
- they do not give a damn and call me 1045 am to discuss "EXCITING BUSINESS OPPORTUNITIES™"
- they are sure I am having a case of stockholm syndrome, because I could NEVER be satisfied in my current employment
- they call every other day with a new number and start the same process again
How fucking dense can people get?11 -
I don't know about you, but I have Stack Exchange's app installed in my phone just in case. I never use it, but it's there for an emergency (I don't know what kind of emergency, to be honest, but you never know...)1
-
It all started with an undelivereable e-mail.
New manager (soon-to-be boss) walks into admin guy's office and complains about an e-mail he sent to a customer being rejected by the recipient's mail server. I can hear parts of the conversation from my office across the floor.
Recipient uses the spamcop.net blacklist and our mail was rejected since it came from an IP address known to be sending mails to their spamtrap.
Admin guy wants to verify the claim by trying to find out our static public IPv4 address, to compare it to the blacklisted one from the notification.
For half an hour boss and him are trying to find the correct login credentials for the telco's customer-self-care web interface.
Eventually they call telco's support to get new credentials, it turned out during the VoIP migration about six months ago we got new credentials that were apparently not noted anywhere.
Eventually admin guy can log in, and wonders why he can't see any static IP address listed there, calls support again. Turns out we were not even using a static IP address anymore since the VoIP change. Now it's not like we would be hosting any services that need to be publicly accessible, nor would all users send their e-mail via a local server (at least my machine is already configured to talk directly to the telco's smtp, but this was supposedly different in the good ol' days, so I'm not sure whether it still applies to some users).
In any case, the e-mail issue seems completely forgotten by now: Admin guy wants his static ip address back, negotiates with telco support.
The change will require new PPPoE credentials for the VDSL line, he apparently received them over the phone(?) and should update them in the CPE after they had disabled the login for the dynamic address. Obviously something went wrong, admin guy meanwhile having to use his private phone to call support, claims the credentials would be reverted immediately when he changed them in the CPE Web UI.
Now I'm not exactly sure why, there's two scenarios I could imagine:
- Maybe telco would use TR-069/CWMP to remotely provision the credentials which are not updated in their system, thus overwriting CPE to the old ones and don't allow for manual changes, or
- Maybe just a browser issue. The CPE's login page is not even rendered correctly in my browser, but then again I'm the only one at the company using Firefox Private Mode with Ghostery, so it can't be reproduced on another machine. At least viewing the login/status page works with IE11 though, no idea how badly-written the config stuff itself might be.
Many hours pass, I enjoy not being annoyed by incoming phone calls for the rest of the day. Boss is slightly less happy, no internet and no incoming calls.
Next morning, windows would ask me to classify this new network as public/work/private - apparently someone tried factory-resetting the CPE. Or did they even get a replacement!? Still no internet though.
Hours later, everything finally back to normal, no idea what exactly happened - but we have our old static IPv4 address back, still wondering what we need it for.
Oh, and the blacklisted IP address was just the telco's mail server, of course. They end up on the spamcop list every once in a while.
tl;dr: if you're running a business in Germany that needs e-mail, just don't send it via the big magenta monopoly - you would end up sharing the same mail servers with tons of small businesses that might not employ the most qualified people for securing their stuff, so they will naturally be pwned and abused for spam every once in a while, having your mailservers blacklisted.
I'm waiting for the day when the next e-mail will be blocked and manager / boss eventually wonder how the 24-hours-outage did not even fix aynything in the end... -
Fucking shit for brains authors that think the digital world is a fantasy realm where everything can happen just to aid their story. Out of boredom i watched "scorpion" today, a tv series about a group of geniusses which are a special case task force.
They got a visitor from the government saying the servers from the federal reserve bank were encrypted with ransomware. I already twitched when they said the economic system would collapse if the servers were left inoperational for a few days. Then one guy got to his desk and "hacked" the fed network to check... he then tried to remove the malware but "it changed itself when observed". But they got the magical fingerprint of the device that uploaded it. In the end some non-programmers created the malware, but it is super fast and dangerous because it runs on a quantum computer which makes it hyper fast and dangerous. They got to the quantum computer which was a glowing cube inside another cube with lasers going into it and they had to use mirrors to divert the lasers to slow down that quantum thingy. And be careful with that, otherwise it explodes. In the end the anti-malware battled the malware and won, all in a matter of minutes.
This is a multimillion hollywood production. How can a movie this abusive to computer science even air on television? Shit like this is the reason people still think the cyberworld is some instable thing that can explode any second. It's not, it's an instable thing that can break down any second. I remember "ghost in the wires" and people had surreal imaginations about the internet already. Shit like this is why people stay dumb and think everything can be done in seconds. If i ever should encounter one of these idiots i tell him i have an app that can publish his browser history by taking a picture of his phone and watch his reaction.
Time to shuw down the tv and learn vim again.11 -
Storytime!
(I just posted this in a shorter form as a comment but wanted to write it as a post too)
TL;DR, smarts are important, but so is how you work.
My first 'real' job was a lucky break in the .com era working tech support. This was pretty high end / professional / well respected and really well paid work.
I've never been a super fast learner, I was HORRIBLE in school. I was not a good student until I was ~40 (and then I loved it, but no longer have the time :( )
At work I really felt like so many folks around me did a better job / knew more than me. And straight up I know that was true. I was competent, but I was not the best by far.
However .... when things got ugly, I got assigned to the big cases. Particularly when I transferred to a group that dealt with some fancy smancy networking equipment.
The reason I was assigned? Engineering (another department) asked I be assigned. Even when it would take me a while to pickup the case and catch up on what was going on, they wanted the super smart tech support guys off the case, and me on it.
At first this was a bit perplexing as this engineering team were some ultra smart guys, custom chip designers, great education, and guys you could almost see were running a mental simulation of the chip as you described what you observed on the network...
What was also amusing was how ego-less these guys seemed to be (I don't pretend to know if they really were). I knew for a fact that recruiting teams tried to recruit some of these guys for years from other companies before they'd jump ship from one company to the next ... and yet when I met them in person it was like some random meeting on the street (there's a whole other story there that I wish I understood more about Indian Americans (many of them) and American engineers treat status / behave).
I eventually figured out that the reason I was assigned / requested was simple:
1. Support management couldn't refuse, in fact several valley managers very much didn't like me / did not want to give me those cases .... but nobody could refuse the almighty ASIC engineers. No joke, ASIC engineers requests were all but handed down on stone tablets and smote any idols you might have.
2. The engineers trusted me. It was that simple.
They liked to read my notes before going into a meeting / high pressure conference call. I could tell from talking to them on the phone (I was remote) if their mental model was seizing up, or if they just wanted more data, and we could have quick and effective conversations before meetings ;)
I always qualified my answers. If I didn't know I said so (this was HUGE) and I would go find out. In fact my notes often included a list of unknowns (I knew they'd ask), and a list of questions I had sent to / pending for the customer.
The super smart tech support guys, they had egos, didn't want to say they didn't know, and they'd send eng down the rabbit hole. Truth be told most of what the smarter than me tech support guy's knew was memorization. I don't want to sound like I'm knocking that because for the most part memorization would quickly solve a good chunk of tech support calls for sure... no question those guys solved problems. I wish I was able to memorize like those guys.
But memorization did NOT help anyone solve off the wall bugs, sort of emergent behavior, recognize patterns (network traffic and bugs all have patterns / smells). Memorization also wouldn't lead you to the right path to finding ANYTHING new / new methods to find things that you don't anticipate.
In fact relying on memorization like some support folks did meant that they often assumed that if bit 1 was on... they couldn't imagine what would happen if that didn't work, even if they saw a problem where ... bro obviously bit 1 is on but that thing ain't happening, that means A, B, C.
Being careful, asking questions, making lists of what you know / don't know, iterating LOGICALLY (for the love of god change one thing at a time). That's how you solved big problems I found.
Sometimes your skills aren't super smarts, super flashy code, sometimes, knowing every method off the top of your head, sometimes you can excel just being more careful, thinking different.4 -
Dear web devs,
PLEASE learn how to (or teach/inform your clients) correctly target ads.
Thank You
Also, WTF??? and even WZF?!?! Who created this? Furthermore who the hell paid for this to be an ad, what are they trying to achieve and how tf do they think this will achieve that???
PS-
In case you're wondering what i was looking up on thesaurus.com, or would like to assume/blame this ad on my browsing history, cookies and/or something like google listening in the background through my mic... nope. Looked up "adage" and im waaay too adept at cybersecurity and easily annoyed by anything doing something i didnt explicitly tell it to.
if you're ignorant of the google listening thing:
yes this is totally a real thing that the vast majority of Smartphone users have no clue is happening despite it being in t&c. Try a few, somewhat relevant to this topic, google searches and youll find suggested searches like "can my phone read my mind?".
I tend to explicitly ban shit like that on everything (even devices of anyone on my property that never logged into my internet... im not paranoid, just not a fan of tech doing things i didnt tell it to)... but when i needed to enable/allow it on a dev for 30min, the next time i went to look for a book, one of the top suggestions (before typing anything) was "Burmese Pythons"... i looked back at my activity for that 30min days ago... I had been explaining some basic python code to a kid from myanmar... so it was pretty amusing.
20 -
Wow man. Can the day get any worse
Mother fucker creator of Android. Now I'm A long time android user, but
Android+Snapdragon 6XX chip+Moto= worst combo ever. Damn you creators, may You be deepfucked by a mad bison in heat. Cocksuckers.
The heat my Moto X play generates, I could make an omelette on top of it. And the newest feature, where you try to type, but you can't see anything happening, when 30 secs later, you suddenly start seeing the after images of all the buttons you pressed, all the text you typed. Why maybe I typed at the speed of light and android couldn't keep up. No.
NO! You dumb fuckin POS. NO. I threw my phone 20ft, broke the tempered glass. The case protected this shit. Once I can save enough, I'll either sell a kidney and get an iPhone or even better a OP5.
Nothing disgusts me more than slow hardware.12 -
Sorta related to previous rant
https://devrant.com/rants/2961085/...
Get message from recruiter on LinkedIn around 10 last night "Are you available immediately? I need a Java dev urgently based in [my city]. Please to [email address]"
I reply, send email, accept connect request
See the post they made about position , literally says "Apply today, interview tomorrow, start Monday"
I could really do with this. Made sure to be up and about by 9 in case phone rings/to reply promptly
Hear nothing back. Check in around mid day "Yes, I got your CV. My emails have been flooded. Will get to it asap" Well, that was yesterday, still nada
Linked post is about other challenges in my job hunt with a different recruiter2 -
For whatever the fuck reason google decided you should not be able to select text when writing a review, at least it's the case right now. Therefore I had to make a guilty screenshot.
Peel remote is successfully nails it to be as annoying as a single application can get and I should consider blocking ads on my phone completely.
2 -
So i was working on an android app that communicate with restfull web service. I setup everything , started the web service api at localhost and launched the app on genymotion (virtual machine android) .Nothing seems to work . I checked the code , debugged some stuff and it turns out i couldn't communicate with the api server. I tested the api on my browser and nothing is wrong ,I tried to test on the phone vm browser and voila 404 not found . How the hell it's working on my windows and not on the vm (with localhost url :/ ) .I kept debugging for more then 3 hours with no solution to be found .
The moment I realised wtf I'm doing and how stupid I was => shut down my laptop went to coffee shop and bought a lifeless dark espresso .
In case you didn't understand what the issue is, I was running the api on my windows localhost and testing it with same url on my android vm (I should've changed localhost with my machine IP )1 -
Thank God it's Friday and my brain is toasted from this specific email to IT department which I had to call to get more details. Here are the parties involved.
1) Original sender (OS), 2) Sender to IT (SIT), 3) IT (Me)
SIT: Can someone from IT print this for OS? She's having issue printing.
Me: It's just an image file in the email. What issues is she having when trying to print?
SIT: Idk. She said she's having issues printing.
Me: Yeah, but what issue? She can't connect to printer, the file won't open or what? Can you ask her what the issue is?
SIT: *hold on...comes back... She just said that again..issue printing..
Me: Well, we need to know what issues it is so we can fix it. In that case she can print and not keep sending documents or files to someone else to print. Btw, did you try printing the image file?
SIT:Since she said she's having issue printing I figured to send to IT to fix the issue and print. I didn't print it.
Me: 😕😂🤔🤨😒..what? First of I still don't know whatever issue she is having. Second, you should try printing it and if you also have issues, let me know.
SIT: Ok how?
Me: *shows her how to get
SIT: Thanks it printed. Now I'm also wondering what issue she was having because this was easy to print..
Me: Can you transfer me to her phone?
Now pay attention here. She is SIT's boss.
Me: Hi OS, what issue are you having when trying to print the image file in your email? I'd like to fix it so you don't encounter that issue from now on..
OS: No issues. I was too busy to do it so I asked my secretary to do it.
Me: So you can print image files with no issues, correct?
OS: Yes.. actually I just printed my a picture my daughter sent me.
Me: Ok, have a nice..
*I call SIT back
Me: She's all set
SIT: Thank you so much fo fixing her issue.
Me: She didn't have any issue. She can print fine..
SIT: WTF!?!
Me: Have a good day, SIT..
😂😂😂😂 I was WOWED!!!5 -
Hopefully, you already know that the company controlled by the alledged reptiloid subhuman and olimpic testicle juggler formerly known as Mister Zuck My Tits is not to be trusted.
But as is always the case in this bitch, I've been forced into cowjizz flooded swamps' worth of stinking shit platforms for the sake of avoiding isolation.
And so, I've just found yet another way in which Facebook **THUNDERSTRIKE** ... the company, not the geriatric ward, is one of the CROWN ACHIEVEMENTS of human civilization.
Let me tell you something: some people are fucking broke. Hell, some people sleep on the streets, live on scraps, and willingly engage in acts of public defecation when provoked. But I'm not even talking about them no, just plain *broke*.
And so imagine being that guy who doesn't really use his phone much, except maybe for sharing cat pictures with mom because that's what being an absolute chad is all about. You don't get a new phone, because money is a __little__ bit tight. But THEN...
The dreaded CAPITAL strikes, and requests of you to bend and fall onto your knees so as to provide intense, intimate and manual -- as well as oral -- PLEASURE to the [NOT SO] METAPHORICAL PENIS of the """SYSTEM""".
Oh, what an abominable, drooooooling revenant that lies before you!
"Gimme your ass... " he says, menacingly, as you wail about in a futile attempt to guard and preserve the very last vestiges of your own anal virginity.
And so you fight, and kick him in the NADS with everything you have, down to the final shreds of vigor. Victory! Or so you thought...
"You must... " he mutters, mortally wounded "update WhatsApp... "
"Still you breathe?!" you exclaim, suddenly transformed into a heroic, sexy moustachoed arquebusier "After I'm done ~OILING~ my VICTORIOUS CHEST, I *shall* bestow DEATH uppon you!".
But as you rip open your shirt to apply sensual oiling to your marvellous frontal assets, your nemesis reveals it's portentous Portugal: "this new version of Android... " he gasps as he perishes "is incompatible with your device... "
"Ughh! Sacrebleu!" you shriek out in pain, realizing that you are now unable to ACCESS THE FUCKING DATA THAT IS IN YOUR OWN FUCKING HARDWARE BECAUSE OF A STUPID FORCED BINARY INCOMPATIBILITY.
That's right. Now even if I *do* get a new phone, I can't do shit about losing all of the family memes. And contacts and all of that shit, but the stickers are more important. A minor inconvenience, yes, and it didn't need all of this preamble but I was doing the dramatic fight scene bit inside my head as I was writing and I got into it.
Because the only documented way to transfer all of that data is to OPEN THE APPLICATION and scan some code, but everytime I go to do that, IT TELLS ME I NEED TO UPDATE. And every time I GO TO UPDATE, it says that MY PHONE is TOO FUCKING OLD!! AAAAAAAGHGHGHGHGHGHGHG!!!!
And you too, might be a dashing french man from centuries past, with both balls and tits down to your fucking knees, folding your arms in a position that exhumes smugness in a disgustingly irreverent and self-aggrandizing way, looking at me as a mere plebeian who cannot wrap his head around the mystical art of interacting with Google's black deuce box.
And you would be somewhat right in your judgement! But just having to fiddle about with these fucking pocket Elmo screens is such a traumatic experience for me that I'd rather lose my stickers.
[ADBREAK] Are you a debonair victorian undercover butt pirate, taking unparalleled care of your Falstaffian, highfalutin poils pubiens? Need your "sword" sharpened, as you browse through the pages of this magnanimous lexicon? Would you rather allocate final death to your coworkers than learn one more synonym for sonorous, supercilious and pontifical?
We all know that ALL you need to help keep that honor intact is slaying your enemies in high-stakes combat. But how to satisfy less gallant needs, when male prostitution is outlawed in more than sixteen duchies?
Look no further than BloodCurse, the ancient hex that will haunt your family for countless generations! With BloodCurse, you may crawl the earth as a mindless, shameless, piece of shit cockswallowing JUGGERNAUT that craves nothing BUT the consumption of scabbed human ass!
BloodCurse is easily contracted through consumption of the GENITAL fluids of highly-lecherous succubi, conjured through [EXTREMELY CENSORED]! This forbidden arcana allows the user to debour HIS OWN testicles in no time!
Get your bottle of scents, sensual Portuguese chest oils, and fucking designer-drug bath salts for the low, low price of a passionate, unceassing self-blowjob! And use my code FRONTALASSETS for 60% OFF in your next soul-robbing foray into the felational dark arts!
Big ups to BloodCurse for sponsoring this RRRRRRRR~$RRR$$RR%5RRRRR$0000:>A48CC50A E3A1B22A : 330D4750 7C24E5A5|.......*3.GP|$.. 5262E7D5 0D1C24E6 : 85594B39 1CB7593E|Rb......YK9..Y>
:~7 -
Here, a full retrospective of my Apple products ownership.
iPhone SE – after Android, I was absolutely amazed by how fast it worked. No UI lags, camera works absolutely instantly no matter the light conditions, all the GPU-heavy games work butter smooth.
After camera and charging port failures on Xperia flagship and CPU literally melting through screen rendering it unusable on Meizu, it was enough to make me interested in Apple products.
When I was using Meizu, I actually got a twitching eye which was triggered by UI lags. After two months of using iPhone, I noticed that something was missing – my eye wasn't twitching anymore.
iPhone actually cured me.
MacBook 12 – a 900 grams laptop with passive-cooled mobile CPU running many Chrome tabs, heavy Webpack HMR build, VSCode and Slack just fine. Yes, you can't play games, but I don't even require it from a laptop this tiny.
Butterfly keyboard that internet hates so much actually increased my typing speed and comfort compared to MX Red mechanical keyboard, and ForceTouch trackpad made me forget about mouse. I learned how to disassemble the Butterfly keyboard if I ever need this but the keyboard never failed.
I use this laptop to this day and it still even smells like the day one, a beautiful smell of a new Apple product.
iPhone X – got it because of the camera, stayed for great battery life and amazing OLED display. I use telephoto lens exclusively and it made me lay off my Canon DSLR with Helios lens which stays on my bookshelf covered in dust to this day.
True black of OLED display which is undistinguishable from the screen bezel is stunning. To this day, battery surely works for one and a half days and I watch youtube really often.
I sometimes struggled to unlock iPhone SE with wet fingers, but with FaceID, as soon as I look at the screen the phone is unlocked. Works perfect every time, never had an issue with this.
Stainless steel body feels premium compared to aluminum. Stereo sound is a major selling point if you're like watching videos and playing games on your phone. Overall amazing product and a huge improvement over SE.
Apple Watch series 4 – really comfortable fit. Nice battery life, once I forgot about it for like ten days during lockdown and it was still working, even though on power reserve mode. Really reliable in terms of battery life and liquid protection. Very satisfying Taptic Engine crown clicks. I run every day and Apple watch always measure my heart rate correctly, and the running app is well designed and a pleasure to use. Overall a nice accessory to have if you use iPhone.
Powerbeats Pro – great sound and battery life. I switched from Shure SE215 which was great, but it had wires. I listen to a lot of music so the sound quality is important for me. When I was choosing earphones I visited a store where you can listen to them all. I listened through earphones like Noble Audio Kaiser Encore and JH Audio Layla, and of course $4000 Laylas sound better than $249 bluetooth earphones, but the difference in sound doesn't justify the difference in price to me.
Powerbeats pro is the Apple H1 chip true wireless earphones with largest driver of them all which makes them sound better than AirPods Pro – it's just physics. Bass in Powerbeats is amazing, which is also true for my Shures, but Powerbeats also win in clarity.
It connects seamlessly to both my MacBook and my iPhone, and everyone in voice chats can hear me really good.
Huge case is a major throwback compared to AirPods, but the battery life of earphones themselves is so great that I just leave the case at home and only carry earphones and it works for me.
Apple Link bracelet in space black – really better than I expected. Intricate detailing, literally the steel that Rolex uses, top-notch finishing and polishing – all that for just 450 dollars. I only used it for several days now, but it already feels like a really satisfying product.
Before all that I was using Linux. It took a year for elementaryos devs to fix wifi for my laptop. Ubuntu looks and feels ugly. Pop OS felt like garbage. Manjaro was also just that – garbage. KDE Plasma – I don't even want to talk about that. A monstrocity where you accidentally click a wrong switch in the settings and your system won't boot up again. Also, PulseAudio. Struggles with proprietary drivers and software updates.
Windows? I serviced a lot of Windows PCs through my career and it never, never worked as intended. I'm no dumbass, I always managed the rights correctly and never installed sketchy apps. My latest ryzen gaming build with a lot of ram also lags somehow even in Windows 10 UI.
Before I switched, I defended Linux.
My life was a lie.
I'm sorry to everyone who I offended based on their opinion on Linux.33 -
My soul cringes a bit every time some smart ass decides to put "Smart" before the product name.
As though nothing means smart as much as digging your own hole.
More broadly, the whole whole world is buying into this "smart" mantra. As if anything and everything that existed before was not smart. Basically "I'm the best" attitude. Don't forget that you can see far only because you're standing on the shoulders of giants.
Case in point:
1. Smart phone which is smart enough to start causing trouble after a couple of years.
2. Smart watch
3. Smart car
4. Smart planes
5. Smart home
.
.
Fucking non sense10 -
One of the big ISP/entertainment companies dug up the roads a few months back and laid fibre optic cables (cutting through a power cable in the process but that's another story).
Recently had someone turn up at my door to chat about their services. All sounded very good, I took a card and gave it some thought and did some research.
So, it'd be a little cheaper than my current provider (FTTC setup). It'd be faster for downloads, slightly slower for uploads (I want fast upload). IPv6 is only on their business packages. I use IPv6 a lot. I also have several static IPv4 addresses.
It would involve getting a cable in to where my equipment rack is, and one to where the TV is (which I spent ages building a TV unit with power, network etc.)
To record/watch TV in another room with their service, I'd need to pay extra. The service just provides HD channels that I can already get, unless I pay more. At the moment I have MythTV handling all the recording of TV shows I want, and Kodi to play them back on different TVs, via CAT6 I spent ages installing into the walls.
Then there's the uncertainty of how nicely their equipment will play with my relatively complicated setup.
I decided, it isn't worth it really for me. I would have to change a load of stuff just to end up with what I already have... But with more limitations.
Anyway, the guy turned up again a few days later, I told him of my decision and away he went.
Since then I have been visited by 2 other employees of this company to try to sell me the service.
It is probably great and convenient if you are not like me and DIY all your home network and media distribution setup...
Also the ISP I'm with is quite small. They are very knowledgeable and friendly and I can get through to someone quickly if i phone. What I use meets my needs, so I prefer to support the smaller company in this case. -
Google's attempts to follow the iPhone just make me think, "Might as well get an iPhone."
I wish Google would create a high-end phone with grippy, durable case, replaceable two-day battery and SD card slot. Vanilla Android with latest updates. Bring it in at a reasonable price (which I'd hope would be possible if not trying to squeeze everything).
Given me a real alternative here. Don't try and lead with design. It's letting Apple choose the battlefield.7 -
So I am broke and can't buy a vds, I installed Termux on my android phone instead. Now I have a portable server that is capable to recieve calls and transmit sms for logs.
BUT, then I had to go to customer support due to case makes the phone get short circuited şn random times. Obviously they deleted all info and Samsung Cloud doesn't backup other users' data. (Termux emulates a terminal running on another user, which is not root by default)
Can anyone teach this teenager how to use tar properly? :D3 -
I got so many concerns/questions about the EU chat control and the future. Sorry for my long rant lol:
1) What about projects that are on life support and no active development?
2) What about chat application in video games or the chat service on the website of a local shop
3) What about false flags? Like that parent who got into legal trouble for sharing a picture of his kid with a doctor to get a medical opinion on some skin condition. (might misremember the details)
4) What about false flags like instagram banning accounts and forwarding it to the police department and over-exhausting the resources of the police (accidental 'DDOS' of their personel)
5) What if the content shared in country A is legally OK but not in country B. What if you then travel there? Or if your participant is from that country B.
6) What about content that is taboo but should be OK to discussed? Like puberty or hormonal discussions online? Some subreddits like "stopsmoking" is now also regional banned by Reddit in the UK to avoid any unneeded risks. That is bad. YouTube had some problem where adult content existed on their platform but labeled as educational.
7) What if you encrypt messages before sending it. Will you be banned just in case? What if you need support with an app and you send an encrypted application crash log that came from your computer, will you now be banned just in case?
8) What if you like privacy and have those apps for innocent purposes. Is having those apps now illegal
9) What if criminals use apps from Asia or Africa or somewhere where this law is not present/enforced. Or what if they create a simple app with this encryption. It is not difficult to make one.
10) Before 2001, airport security was very lax but then 9/11 happened and the security increased. It never went back to the state before. Since they have or will have this check, what will them stop it from expanding it after the next disaster of an unrelated accident (like terrorist attack).
11) What if those services miss a case? Will the company that allows this to be send now have legal trouble?
12) What if users are using metaphors or practice self-censorship to avoid flagged words? We see it with monetization in social media (like murder or killing is replaced with "unaliving")
13) It will be just an other problem to start a new company with limited budget. So start-ups will just have a bit harder time to break into the market.
14) this might just push users away from mainstream options
15) it's just an other attack vector for hackers to use
16) Do we want to have private companies be able to scan our messages because they are contracted by the government? They can have their own bias to satisfy their shareholders. What if they are invested by the Big Oil so critic towards the Big Oil is altered? How certain can you be this won't happen now or in the future. Reddit Admin did that before so who knows at this point.
17) Anonymity will disappear.
18) Different companies verify users and store this data so this seems like a major cyberrisk and identity theft waiting to happen
19) fragmentation of users. it is now annoying that some family or friends don't use whatsapp but use telegram and the other way around. You might need +5 chat application to keep contact and lose social relationships.
20) Is AI detected messages even legal proof in court?
21) What if you talk about video games and flag the AI system this way? Or use abbreviation from a niche community that also overlaps with flagged words (like checkpoint being abbreviated as CP) or just the language with poor support or use a 'dialect' in your chat that trips up the software.
22) What if your phone is stolen and they send those messages in your name or this is done remotely.
23) What if you are sharing old family pictures and there is 1 and only 1 odd picture that just barely trips up the system.
24) Games like 'Beyond human' also has gameplay that hurts a fictional child which fits the storyline and acts as shock value. Will this be banned
25) The newer population will see this as normal so what will they find acceptable if they can now vote7 -
Everytime i buy any electronics , my brother would suggest me to buy latest ones with the newest configuration . His logic was " If you buy a not-so new tech now.. It will outdate fast and you will end up with an outdated one soon.. So the extra 10K is worth considering that " .
Considering the development trend i personally think it is useless to invest in electronics unless necessary . Everytime i buy an electronic product , within 2 or 3 months i find the same good at almost 75% of the price.. So with tech prices falling like this.. i think it is worth saving that money instead of the cutting edge tech which i wont need for another 2 years .
Thoughts ?
(The cousin brother i mentioned does this everytime he buys a phone and ends up changing the phone 4 times faster than me.. and the use case is similar to mine if not worse..)1 -
I always love trying something new, especially when it's Linux.
In this case, I'm installing Plasma Mobile on my phone to see how it handles.undefined maybe gf will move to riot after this oh well i wish it had more mainstream applications wish me luck1 -
How do you guys like my new sticker. It came directly from china as a freebie with a phone case i ordered. When looking at my laptop i'm super cringing but also smiling xD.
2 -
Sus!
yesterday I bought a cool domain in namecheap, I was very lucky to find short and good one for my case.
Today (at weekends!!!!) I receive a letter:
>Hello **redacted name**,
>
>We are contacting you from the Namecheap Risk Management Team regarding your '**redacted name account**' account.
>
>Unfortunately, your Namecheap account was flagged by our fraud screening system as requiring verification and was locked.
>
>Please follow the instructions below to get your account verified:
>
>- take a color photo of the credit card used for the payment at **redacted link**
>
>Please make sure all of the edges of the credit card are visible, and that we can clearly see the card holder's name, expiration, and last four digits of the card number. The screenshots or images of the card cannot be accepted for verification. >If the submission does not meet these requirements, we can either request to submit the details again or permanently suspend your account.
>
>- provide a valid phone number and the best time to call you (within normal business hours, US Pacific time).
>
>If we do not hear back from you within 24 hours, we will be forced to cancel your orders.
>
>We apologize for any inconvenience that may result from this process. This extra verification is done for your security and to ensure that orders are legitimate. This industry, unfortunately, has a high rate of fraudulent orders, and this sort of >verification helps us drastically reduce fraud and ensure our customers remain secure. Such documents are used for verification only and are not provided to third parties in any way. Account verification is a one-time procedure, after your account >is verified, you will never face this issue again.
>
>Looking forward to your reply.
>
>---------------
>Dmitriy K.
>Risk Management
> Namecheap, Inc.
what if I did not notice it in 24 hours? It is the weekend for god's sake! People usually rest until monday.
They would what, cancel order and scalpel it to super high price?!
I have some doubts if the request is trully having anti fraudulent origins.
What if I used digital visa card? How was I supposed to photo it?
And the service they provided for photoing accepts only photos from web camera. I was lucky that I bought recently web camera with high enough amount of pixel power and manual focus. What if I did not?
That's all really SUS!
The person can not notice the letter within 24 hours time frame until the morning, when it would be already too late.10 -
Log 1:
Day 10 of crunch time. I have entered a sleepless zen state. Lord willing, I will be able to get 7 hours of sleep Saturday night. The building is terrifying at night, as there are a lot of noises. Security guards are nice, but curious to see me all alone. Must not show weakness in case they think numbers will give them an advantage over me.
Supplies are low. Only one type of energy drink left in the machine, and coffee gone for the night. My phone is out of fast data so Pandora is spotty at best. I have battery to get me through the night at least.
Tomorrow and Saturday decide the fate of the project. My team lead has not slept in at least 2 days. I feel guilty napping when I do, but she is driven like Ahab so I will let her obsession carry her.
If I am alive tomorrow I will report in.1 -
The dangers of PHP eval()
Yup. "Scary, you better make use of include instead" — I read all the time everywhere. I want to hear good case scenarios and feel safe with it.
I use the eval() method as a good resource to build custom website modules written in PHP which are stored and retrieved back from a database. I ENSURED IS SAFE AND CAN ONLY BE ALTERED THROUGH PRIVILEGED USERS. THERE. I SAID IT. You could as well develop a malicious module and share it to be used on the same application, but this application is just for my use at the moment so I don't wanna worry more or I'll become bald.
I had to take out my fear and confront it in front of you guys. If i had to count every single time somebody mentions on Stack Overflow or the comments over PHP documentation about the dangers of using eval I'd quit already.
Tell me if I'm wrong: in a safe environment and trustworthy piece of code is it OK to execute eval('?>'.$pieceOfCode); ... Right?
The reason I store code on the database is because I create/edit modules on the web editor itself.
I use my own coded layers to authenticate a privileged user: A single way to grant access to admin functions through a unique authentication tunnel granting so privileged user to access the editor or send API requests, custom htaccess rules to protect all filesystem behind the domain root path, a custom URI controller + SSL. All this should do the trick to safely use the damn eval(), is that right?!
Unless malicious code is found on the code stored prior to its evaluation.
But FFS, in such scenario, why not better fuck up the framework filesystem instead? Is one password closer than the database.
I will need therapy after this. I swear.
If 'eval is evil' (as it appears in the suggested tags for this post) how can we ensure that third party code is ever trustworthy without even looking at it? This happens already with chrome extensions, or even phone apps a long time after reaching to millions of devices.11 -
IMAGE COMPRESSION QUESTION
lets say i upload a 100x100 photo from my android device. this image has a size of e.g. 2MB. not a lot. if i compress it then the size will be e.g. 300kB. cool. upload is thunderbolt for any internet speed.
lets consider this case. a random ass motherfucker decides it is cool to upload a 10000x10000 image that has a size e.g. 300MB. compressing this would be e.g. 150MB which is still a lot as fuck for one pic.
heres my question: where should the compression be handled? at backend (REST API server) or client (android image compression library)?
because if i try to send a 150MB pic to the server and their internet sucks but to be fucking honest even the best internet speed would take way too long to upload, is it better to do the compression on the backend or client?
or should i do compression in android? if i should do compression on client then should i;
1) do the compression on the main thread with a progress dialog to wait them until the compression + PLUS the fucking upload is done or
2) do the compression + THE upload in a background thread in which case it can be dangerous for verbose amount of fuckups (internet dies phone explodes etc) and the app crashes
which (one) option of the 2 suboptions from the second parent option branch?
of course this is an extremely unrealistic case, it is possible but thats not my point: my point is WHERE SHOULD THE COMPRESSION (as some kind of universal standard) BE HANDLED AT?6 -
So I was looking into phone app development again (as you do) and I'm working on a simple QoL app for me and my SO that will help us automate some home management and finances stuff. Naturally I delved down the rabbit hole deep and wanted to have push notifications so we don't have to check the app periodically to know when certain things happen... Oh boy... Why is mobile development so convoluted, especially if you don't want to rely on Google Services...
It seems that the most accepted way of doing this is Firebase (FCM). Well me being me, I refuse to use google services for this and I prefer self hosted solutions (for data privacy reasons) which eliminates most products out there.
It also didn't help that my framework of choice is Flutter/Dart, because fuck Android Studio and the insane buggy XML stuff and fuck Android and it's constantly changing APIs...
Well In the end I decided on a rather simple solution and self hosted an AMQP service (RabbitMQ in my case, as I have some experience with it already) and implemented a foreground service in android platform specific code on top of my flutter project to kickstart it and made my phone a queue listener... This now means I can push notifications from my server to the Messaging Queue and it will be pushed into my App automatically!
One thing I found out on this journey was that Android now kills most background services and enforces foreground services to have a visible notification in the status drawer... which I actually approve of. It's a bit annoying that you can start a reliable background service, but I'm absolutely on-board with long running processes started by my apps are constantly visible...
Long story short, I love reinventing all the wheels, especially if it's for free and private... And I also went to sleep at 2AM again because this took longer that I'd like to tune... but it works, and it's google free...
I'm thinking of trying to package this up as a flutter module later, but first I want to do testing on battery life and the general life cycle of the service. RabbitMQ says they have the client library optimized for long-lasting connections and it should be just using a tcp socket, which should pretty much be what all the push notification services are doing anyway. I'm also not completely satisfied with how the permanent notification looks.. it isn't collapsible like some of the other ones from other apps and it's about 2 lines high instead of single line... which is something quite annoying and I'm struggling to find any relevant docs on how this is done other than possible making a custom Notification Style... but I just can't believe that everyone is doing that.. there must be a built-in somewhere -_-... Ugh Android is hell...
Anyway, if any android devs here have some hints, tips and tricks on how to handle this type of background/foreground process stuff and I'm doing something wrong let me know, cause googling this shit is a nightmare too!7 -
I have lost now another device to planned obscolence (how is that still legal), my g3 officially took its last breath two days ago, first it was its battery dying (thousands of devices broke that way [exactly two years after buying it] and at that time there was no batteries to replace it with) - whoever was brave enough to hold onto his device for longer than the battery failure - he then faced the simcard reader breaking and that was my case now too.
I asked many colleagues for help and even found a guy that does repairs for the oldest phones (got too excited), but even he couldnt find the issue, besides a guess that its the main chip that partially died on purpose or it got somewhere desoldered by the always and poorly managed overheating issue, which would cost almost the same to replace as just getting a new phone in the end and even then, theres probably a third switch they planned, to give you the final bullet.
I got a Xiaomi Redmi Note 4 now and really gotta say they have an amazing near vanilla android experience and their "two phone" isolated spaces are quite handy to seperate work and private notifications, apps and files.
It was even compatible with lineageOS and has a simple website to unlock the bootloader (a first for me, never saw any company making it that easy), but after trying their version of it, I don't even have to switch.
I will still miss the vibration motor of the g3, the feedback of it when typing is still to this day the best one I ever tried.8 -
After waiting for almost a month, yesterday I went to check on how my computer was doing, since I hadn't got any messages or calls ever since.
I go to the store and ask one of the workers about how my laptop is doing, and that I'd left it there almost a month ago and that they'd tell me when it was time to get the papers and then the laptop itself. The girl asks me for my phone number and then my name, and found nothing on the computer. She goes somewhere inside the store and comes back with a colleague, who tells me that I need a process paper. I pull out the receipt the technician photocopied and signed because that was the only thing I had. I hadn't touched that part of my paste for the whole time after I left the computer there and I was 100% sure I didn't have the process paper with me until he started pressing me for it. I kept repeating that the technician told me that they'd call or message me when said process paper was ready, which I hadn't got any of those to go pick it up. The guy asks me if that were the number and name I'd given the tech guy and I said yes. Both of them disappear into the store again. They come back with a cardboard box and say that the surname written there was wrong by a char (as I've said before my name is unusual, and my surname is also unusual where I'm studying, but where I'm from there's like 5 or 6 families with that surname), so that's why they couldn't find it in the computer. After that they went through all the details I gave on the time of handing the PC and the number they told me was there was off by miles. I think I may have said a wrong digit but that number was way off. There should be some person who got calls or messages about a computer they don't even own LoL
They told me to try it and see if it was running OK and that I had 15d to go back if something was wrong
When I got home I turned it on, afraid it would start dying on me again LoL
I pass the login screen and the fan just starts working really hard and I'm worried. The ASUS guys reinstalled Win8 and the CPU is running wild already, going at about 3,5 GHz (2,5 max) and over 30% usage on nothing
After some minor inconveniences (making the USB with Win10 took longer than expected) I finally installed Win10 and the CPU usage drops to < 10% and runs at way below the 2,5 GHz max. It constantly uses <= 10-15% CPU and the fan makes no noise unless I put in a heavier game (like Oxygen Not Included - it asks for 4GB RAM minimum 8I), in which case it goes up a bit and runs at around 3 GHz, but it doesn't make as much noise as before, thank jesus. I'm gonna keep trying to see how it does and hope I don't have to go back to the store after the next 15d 8I
I can finally work and not be a leech on my friends because my old toshiba - which I forgot I'd brought with me to uni - is really old and it makes a lot of noise (the fan is constantly working too much but it's so old I don't bother anymore) and it heats my room a lot, so it's gonna be a nice change of pace HaHa4 -
hey, y'all android users listen up. i wanna start a new project but im not sure if it's gonna be useful. essentially, i want to make a scripting language to program people's phone, so devs or android super users can make the most of their phone. users will be able to create, share, and schedule execution of the scripts all from the app. is it a good idea? is their something like it?
example of a use i personally would have: there is a set date for when the soccer league schedule for the youth league i play in is supposed to be released online. however, the set date is never met, and it is usually a few days late. in this case, i could make a script to request to the website with the schedule and see if the html changed from last time, and if so it would send me a notif saying "check for schedule" or something similar.
then, i could schedule it to run every five minutes, and i wouldnt have to check manually.
its essentially bash automation for your phone.
good idea?7 -
What is it with non-technical managers, especially those in sales, thinking that the solution to all problems is to "just pick up the phone and ring them?" This was *always* his opinion, whether the web service we were using wasn't accepting a valid request (apparently this was best "explained over the phone", I kid you not - have you ever tried speaking JSON?!) or whether we just needed a simple request going in to increase the API limit. I mean I could send an email or log a ticket in a few minutes tops, but you want me to spend 2 hours on hold to a support department only to be told "ah we don't take those requests over the phone, here's the URL, log a ticket."
Then it's always a case of "I don't understand why they're like that, all the guys I speak to are happy to help on the phone". Yeah, beacuse you're in sales & marketing you muppet. Blathering on to each other so you can stroke the egos of yourselves and your companies is kinda in the job description.
Grr. This was all a while ago, but I thought of it just now and the pure concept just annoyed me, so here it is. I really hope he's not doing the same thing to guys under him now (but let's be honest, he probably is.)7 -
Last week: Build out a landing page and contact form in Pardot. Deliver to client after a quick QA pass through.
Friday: Get nasty message from client via basecamp about how the entire page looks like complete crap. We're also very unprofessional and can't deliver a simple request, while we charge a premium for our services.
So I, wondering what I managed to screw up so horribly, hop on to the test page I sent them. Except, its different and looks like crap.
They edited the page after it was sent to them and are pissed it doesn't match the comps they sent over. So I edit it back - except for the form. The one they added selects and textarea boxes to. Fields they didn't include in their comp and there was no mention of them wanting to use.
Today: Phone call with client. Every single complain they have about the page template they delivered all goes back to one of 3 things.
1. Their designer doesn't know how to use their global styles in his designs. So when things match their global styles (as they specifically asked for) they don't understand why they don't match the comp in a side by side view.
2. They change their mind on a design after the page was built. They won't admit this is the case and want to blame someone else for it not looking the way they want it. You know, "Spirit and Style of their current site"
3. They're idiots.
So now, I put aside a much more fun React project for an Amazon owned grocery chain and work on this nonsense. -
My biggest personal challenge as a dev is getting help. Sometimes I feel so deserted.
Now and then I have to do things that are not my expertise and I feel out of my depth. I think if I had an expert come in for a day they would be able to save me weeks of slow progress. There are dev things like updating frameworks, etc which I am fine to struggle through or read the docs, etc but things like setting up servers, enabling single sign on, database administration, integration with other systems. These are not really software development tasks but they need to be done. It seems every time I try to get help it is so much effort then the help I get turns out not to be helpful.
In my current role I have no budget or company credit card, etc. To make any sort of purchase I need to get my manager to write a business case to get approved by his manager signed in triplicate, buried in soft peat, etc. Even if I went through this process there are so many companies out there who want to get paid to do nothing and say they are experts in all things. It is almost impossible to know if we would get competent help or if I end up just wasting time explaining issues to people in phone meetings who are no help. -
Ok... so I have a unique question/opportunity. I can't give all the details but here's the jist:
3yrs ago I was hired to consult a now prominent(still decently well known then) web-based company with many thousands of users, dealing with a lot of money and leveraging a social environment. They had several issues but initially they really needed me to find/train chat mods.
I did not take the offer for monetary reasons, like all consulting I've done, I had additional reason and/or fondness to fix the issues. In this case it was an interesting challenge and I knew several customers and some support staff so it'd be worthwhile.
They (without request) reduced their typical 2mo probationary period to 2wk for me. With less than a day left of that period, I was 'hacked' via a pushed telegram update, on the account they made me create for work purposes (they had control of the phone number not me).
During this 'hack' one of the 2, currently active, culprits sent a message to his tg account from the 'hacked' one and quickly deleted the entire convo. The other pretended (poorly) to be me in the chat with the mods in training (at least a few directly witnessed this and provided commentary).
Suddenly, I was fired without any rationale or even a direct, non-culprit, saying anything to me.
The 'hack' also included some very legit, and very ignorantly used, Ukrainian malware.
This 'hack' was only to a 2nd gen lenovo yoga I got due to being a certified refurbisher... just used for small bs like this chat mod/etc job. I even opened up my network, made honey pots, etc., waiting for something more interesting... nope not even an attempt at the static ip.
I started a screen recording program shortly after this crap started (unfortunately after the message sent be 'me' to the dude who actually sent it happened... so i still dont know the contents).
I figured I'd wait it out until i was bored enough or the lead culprit was at a pinnacle to fall from...
The evidence is overwhelming. This moron had no clue what he was doing (rich af by birth type)... as this malware literally created an unhidden log file, including his info down to the MAC id of his MacBook... on my desktop in real time (no, not joking... that stupid)
Here's my quandary... Due to the somewhat adjacent nature of part of our soon to be public start-up... as i dont want it to turn into some coat tail for our tech to ride on for popularity... it's now or never.
Currently im thinking, aside from any revenge-esq scheme, it'd be somewhat socially irresponsible to not out him to his fellow investors and/or the organisation that is growing with him as one of few at the forefront... ironically all about trust/safety/verification of admins in the industry.
I tried to reach out to him and request a call... he's still just as immature. Spent hours essentially spamming me while claiming it wasnt him but hed help me find whoever it was... and several other failed attempts to know what i had. When i confirmed he wasnt going to attempt a call, i informed him id likey mute him because i don't have time for back and forth bs. True to form he deleted the chat (i recorded it but its of no value).
So... any thoughts?7 -
My favourite bug fix was actually IT based and it was the first time my Eastern European, critical of my skills, family not only praised me but claimed that I was smarter than them.
My grandfather had changed from a telecom to a VOIP device for his landline. For some reason after installation, he could hear the other person on the line but they couldn't hear him. Me and my mother were away during this time so they called in the other family IT guy. This guy is no joke, he's one of the top in his company and makes a sweet six figures and lives in a mansion.
So he started looking things up, googling forum, etc. Couldn't find anything. Started calling the tech support and tried to deduce what it was and their tech support had never heard of such a problem. He takes his lunch breaks to help out my gramps. Keeps escalating, escalating and nothing. His conclusion is that they need to send him a new VoIP stick and they're not giving it to him. At this point, he's so frustrated that he screams at my grandfather to go back to paying 60 bucks a month for landline and to stop bothering him.
At this time me and my mother return and they have concluded that they need a new stick. My mom is great at intimidating people into free stuff so she and I go over to do so. At this point everyone is convinced of the problem and even I don't think I could fix it. But I decide to check if that's the case because I don't want my gramps to get a new stick and it still doesn't work.
I go through the typical forum hunting and there's Nada on the problem. I look at the stick and all the lights seem to be working, no error lights. And I wonder maybe the problem is not the stick, because usually you can't do anything at all if the hardware is broken. So I start thinking, maybe my gramps accidentally muted his handset while talking or something dumb like that. That wasn't it.
Then I decided to see if the problem was recreated on the other handsets. I tried one out and my mom could hear me but I couldn't hear her. What?! That's different! It was the opposite with the other phone. I conclude that it's working and there's something up with the handsets. So I go and do a reset on all of the handsets to make sure.
Lo and behold, the problem is fixed. It took me 25 minutes to solve. That guy gave up after a week of trying. My mom who assumed my IT skills were on par with other kids and nothing special had finally seen me up against an opponent, and not any opponent, a six figure high ranking IT specialist. And I didn't even use any secret, complex software knowledge that wasn't accessible to her or any other normal user.
That's when she finally said that I was smarter than her, that I just used my common sense. She would've needed some kind of prompting, hint or direction to solve the issue but I did it without any.
It was a very satisfying bug to fix. -
I have passed 3 interview levels including the coding test for a big telecoms company. After 2 weeks i get a 15 minute phone-interview in which I answered all the tech questions correctly and yesterday I received an email saying my application was unsuccessful. WTF...literally.
P.S.
I even said I was Bi-sexual in case they wanted diversity :D1 -
I just realized this is the dumbest marketing stunt McDonald's can come up with
https://thrillist.com/news/nation/...
The card is actually a phone case with your name etched into it.
1. How do I use it if I'm ordering online?
2. Why is the prize meant to encourage mobile ordering a physical card to use in stores?
3. So every time the winner takes out their phone, s/he is just asking to get mugged or have it stolen?3 -
Mmmm new screen protector and case for foon 😁
Old screen protector was burnt and nasty in general, new one has a matte finish. The case has the same colour as the back, but doesn't show how I let my phone drop and crack the glass, huehue
Yes I'm happy now my foon looks good again5 -
A beginner in learning java. I was beating around the bushes on internet from past a decade . As per my understanding upto now. Let us suppose a bottle of water. Here the bottle may be considered as CLASS and water in it be objects(atoms), obejcts may be of same kind and other may differ in some properties. Other way of understanding would be human being is CLASS and MALE Female be objects of Class Human Being. Here again in this Scenario objects may differ in properties such as gender, age, body parts. Zoo might be a class and animals(object), elephants(objects), tigers(objects) and others too, Above human contents too can be added for properties such as in in Zoo class male, female, body parts, age, eating habits, crawlers, four legged, two legged, flying, water animals, mammals, herbivores, Carnivores.. Whatever.. This is upto my understanding. If any corrections always welcome. Will be happy if my answer modified, comment below.
And for basic level.
Learn from input, output devices
Then memory wise cache(quick access), RAM(runtime access temporary memory), Hard disk (permanent memory) all will be in CPU machine. Suppose to express above memory clearly as per my knowledge now am writing this answer with mobile net on. If a suddenly switch off my phone during this time and switch on.Cache runs for instant access of navigation,network etc.RAM-temporary My quora answer will be lost as it was storing in RAM before switch off . But my quora app, my gallery and others will be on permanent internal storage(in PC hard disks generally) won't be affected. This all happens in CPU right. Okay now one question, who manages all these commands, input, outputs. That's Software may be Windows, Mac ios, Android for mobiles. These are all the managers for computer componential setup for different OS's.
Java is high level language, where as computers understand only binary or low level language or binary code such as 0’s and 1’s. It understand only 00101,1110000101,0010,1100(let these be ABCD in binary). For numbers code in 0 and 1’s, small case will be in 0 and 1s and other symbols too. These will be coverted in byte code by JVM java virtual machine. The program we write will be given to JVM it acts as interpreter. But not in C'.
Let us C…
Do comment. Thank you6 -
As i was shitting on toilet I realized something very important. This could be THE answer.
The question: what is the formula for achieving success? I realized this must be THE ultimate answer:
Money + connections + luck >= success
Why?
MONEY:
You must have money to make more money.
CONNECTIONS:
Some average joe can tell his friend Cockty to phone call his friend Dickson who's a good friend with Cumston to message his millionaire friend Asslicker who is gonna help the average joe succeed.
LUCK:
No matter what you do or how hard you work, how many achievements you have or degrees, you can spend 10 million dollars on a project -- and still fail because you're not lucky.
Let's calculate this probability:
have = 1
missing = -1
money = 0
connections = 0
luck = 0
success = 1
money + connections + luck >= success
Case 1 (have everything):
have + have + have >= success
1 + 1 + 1 >= 1
3 >= 1 ✅
Case 2 (no money):
missing + have + have >= success
-1 + 1 + 1 >= 1
1 >= 1 ✅
Case 3 (no connections):
have + missing + have >= success
1 - 1 + 1 >= 1
1 >= 1 ✅
Case 4 (no luck):
have + have + missing >= success
1 + 1 - 1 >= 1
1 >= 1 ✅
Case 5 (no money, no connections):
missing + missing + have >= success
-1 - 1 + 1 >= 1
-1 >= 1 ❌
Case 6 (no money, no luck):
missing + have + missing >= success
-1 + 1 - 1 >= 1
-1 >= 1 ❌
Case 7 (no connections, no luck):
have + missing + missing >= success
1 - 1 - 1 >= 1
-1 >= 1 ❌
Case 8 (no money, no connections, no luck):
missing + missing + missing >= success
-1 - 1 - 1 >= 1
-3 >= 1 ❌
We have: 4 possible outcomes that we want, k=4
Out of total: 8 possible combinations, n=8
Probability of achieving success using this formula is: P(A) = k/n = 4/8= 0.5 * 100% = 50% chance of being successful in this shit life
This is correct in theory. HOWEVER:
Case 1: someone having
- a lot of money
- a lot of connections
- a lot of luck
In practicality is damn near IMPOSSIBLE
Maybe 1 in 100 million people are born like this. That's 100,000,000 people / 8,000,000,000 people = 0.0125 * 100% = 1.25% of people are this blessed and gifted in life. This might be even less so we can ignore this probability as a possible outcome and average it out to realistic average joe daily life.
Therefore giving us a total of 7 combinations, 3 possibilities to succeed in this shit life
So: k/n = 3/7 = 0.4285 * 100% = 42.85% chance to be successful in this shit life
Mathematically proven how life is pure trash
Funny enough we can round it to 42%. And 42 is the answer to life, universe and everything in existence4 -
Lately, I've been working in a web security company (mainly as a Support guy).
Going through tickets, I've found one golden gem, which helped me realising how dum customers are.
Since he's our customer, we try to keep stuff up-and-running at all times. If something goes bad, we fix it, and we need their passwords for stuff.
After the customer (somehow) got hacked again, he changed the password in panic.
Note the initial password was really, really good.
He emailed us the new password for "just in case".
The password is "hard-to-guess".
What. The. Actuall. Fuck.
What's next?
Setting the password "12345", activating 2-step-authentication and sending his phone in, along with his finger so we can unlock it with touch id?2 -
That feel when you're saving for a laptop and trying to work on a project for a client but your laptop is quite old (3 years and 5 months in my case) and decides to go crazy when for months ago, the same stuff open wouldn't lead to a variety of freezes.
I mean, there's new specs and stuff but spending in the £1-2 grand on a new one (at least one more up-to-date and with better specs) isn't going to happen anytime soon especially with the new job coming soon.
At least, I can do some of the stuff on my phone 😅. -
Why all mobile hotspot/wifi tethering implementations seems to be buggy as hell?
It doesn't matter if I'm trying to use an iPhone or an Android as the hotspot or what I'm trying to connect (PC/Mac/Nintendo Switch...) in most case to have the clients find the mobile phone and successfully connect trough it I have to restart the mobile hotspot multiple times.2 -
How GrayHat Hacks Helps Victims of Cheating Spouses
In today’s world, where secrets can hide in encrypted messages or private chats, suspecting a partner of infidelity can be emotionally devastating. GrayHat Hacks Contractor has become a beacon of clarity for those seeking answers, offering advanced digital investigation services to uncover evidence of cheating. Their work, detailed on their official website GrayHat Hacks Blog, helps clients find closure by revealing the truth, though it comes with ethical and legal considerations.
GrayHat Hacks Contractor specializes in digital investigations, with a focus on services like "Spying on Cheating Spouses." This involves hacking into social media accounts, emails, and other digital platforms to retrieve evidence of infidelity. Based in Charleston, SC, their team combines technical expertise with discretion, ensuring clients receive undeniable proof without alerting the target. While their website also lists cyber security services like cryptocurrency recovery and credit score repair, their infidelity investigations stand out for their impact on clients’ lives.
The process is both efficient and discreet. Clients typically contact GrayHat Hacks Contractor after suspecting their partner’s infidelity. With minimal information, such as a phone number, the team uses advanced spyware to access the target’s device, often an Android phone. Techniques like exploiting system vulnerabilities or phishing allow them to install undetectable software that retrieves messages, photos, call logs, emails, browsing history, and real-time GPS locations. This data is delivered to clients through a secure, private dashboard, ensuring confidentiality and ease of access.
Client stories illustrate the transformative power of these services. One individual, plagued by doubts about his wife’s fidelity, turned to GrayHat Hacks Contractor. Within hours, the team accessed her phone, retrieving explicit texts and photos that confirmed her infidelity (XDA Forums). Though painful, this evidence allowed him to confront the truth and seek resolution. Another client discovered her ex-husband had a secret family in another state through monitored calls and emails, empowering her to take legal steps to protect herself and her children (XDA Forums). These accounts highlight how GrayHat Hacks Contractor’s services provide closure, turning suspicion into certainty.
The efficiency of their process is a key strength. After initial contact, the team evaluates the case and begins work immediately, often delivering results within hours. Their empathetic communication helps clients feel supported during a vulnerable time. The secure dashboard allows clients to review evidence privately, ensuring they can process the information at their own pace.
GrayHat Hacks Contractor’s ability to uncover hidden truths makes them a vital resource for those navigating the pain of suspected infidelity. Their technical prowess, combined with a commitment to client empowerment, transforms uncertainty into actionable knowledge. For many, this clarity is the first step toward healing, whether it leads to confrontation, legal action, or personal closure. By leveraging cutting-edge technology, GrayHat Hacks Contractor stands as a leader in digital truth-seeking, offering hope to those lost in the shadows of doubt.9 -
Hire the Best Hacker At Mighty Hacker Recovery.
It was a normal morning when I realized my wallet was missing. Panic immediately set in as I frantically searched through my apartment, hoping to find it tucked away somewhere. But it was nowhere to be found. I retraced my steps from the previous day, but the wallet was still missing. I knew I had to act fast. My wallet contained my pharse key, which gave me access to my cryptocurrency wallet. And in that wallet, I had 4.8 million AUD worth of cryptocurrency. It was a fortune that I had worked hard for, and I couldn't afford to lose it. As I sat on my couch, racking my brain for any clues or leads, my phone rang. It was an unknown number. I hesitated to answer, but something told me to pick up. And I'm glad I did because on the other end was a representative from Mighty Hacker Recovery. At first, I was skeptical. How did they know about my missing wallet? But they assured me that they had a team of skilled hackers who could help me recover it. They explained that my wallet's pharse key was encrypted and that only a skilled hacker could access it. With nothing to lose, I agreed to meet with them. They were professional and had a wealth of knowledge about cryptocurrency. They assured me that they would do everything in their power to recover my wallet. And they did. After days of hard work and numerous attempts, they finally cracked the encryption and retrieved my pharse key. I couldn't believe it. I was overjoyed and grateful beyond words. I couldn't thank them enough. Thanks to Mighty Hacker Recovery, I was able to access my wallet and retrieve my 4.8 million AUD worth of cryptocurrency. They saved me from a financial disaster, and I will forever be grateful to them. I couldn't believe how lucky I was to have crossed paths with them. They were truly a team of mighty hackers, and their skills were unmatched. I made sure to spread the word about their services, and I even saved their number on my phone, just in case. From that day on, I made sure to keep my pharse key safe and secure, knowing that Mighty Hacker Recovery was just a phone call away if I ever needed them again. And I was at peace, knowing that my fortune was in safe hands. WhatsApp +1 845 699 5044.
-
So I've been using Duet on my iPad Pro for a couple years now (lets me use it as an external monitor via Lightning cable) and without issue. Shit, I've been quite happy with it. Then the other day, whilst hooked up to my work laptop, there was a power fluctuation that caused my laptop to stop sending power to connected devices. Which is fine - I have it plugged into a surge protector so these fluctuations shouldn't matter. After a few seconds the laptop resumed normal operation and my connected devices were up and running again.
But the iPad Pro, for some reason, went into an infinite boot loop sequence. It reboots, gets to the white Apple logo, then reboots again.
In the end, after putting the iPad into recovery mode and running Apple's update in iTunes (as they recommend), it proceeds to wipe all my data. Without warning. I lost more than a couple of years of notes, illustrations and photos. All in one fucking swoop.
To be clear, you get 2 options in iTunes when performing a device update:
1. UPDATE - will not mess with your data, will just update the OS (in this case iPadOS)
2. RESTORE - will delete everything, basically a factory reset
I clicked UPDATE. After the first attempt, it still kept bootlooping. So I did it again, I made sure I clicked UPDATE because I had not yet backed up my data. It then proceeds to do a RESTORE even though I clicked UPDATE.
Why, Apple? WHY.
After a solemn weekend lamenting my lost data, I've come a conclusion: fuck you Apple for designing very shitty software. I mean, why can't I access my device data over a cabled connection in the event I can't boot into the OS? If you need some form of authentication to keep out thieves, surely the mutltiple times you ask me to log in with my Apple ID on iTunes upon connecting the damn thing is more than sufficient?! You keep spouting that you have a secure boot chain and shit, surely it can verify a legitimate user using authenticated hardware without having to boot into the device OS?
And on the subject of backing up my data, you really only have 2 manual options here. Either (a) open iTunes, select your device, select the installed app, then selectively download the files onto my system; or (b) do a full device backup. Neither of those procedures is time-efficient nor straightforward. And if you want to do option b wirelessly, it can only be on iCloud. Which is bullshit. And you can't even access the files in the device backup - you can only get to them by restoring to your device. Even MORE bullshit.
Conversely, on my Android phone I can automate backups of individual apps, directories or files to my cloud provider of choice, or even to an external microSD card. I can schedule when the backups happen. I can access my files ANYTIME.
I got the iPad Pro because I wanted the best drawing experience, and Apple Pencil at the time was really the best you could get. But I see now it's not worth compromise of having shitty software. I mean, It's already 2021 but these dated piles of excrement that are iOS and iPadOS still act like it's 2011; they need to be seriously reviewed and re-engineered, because eventually they're going to end up as nothing but all UI fluff to hide these extremely glaring problems.2 -
I can't wait for the release of Snips Air sometime in 2019 so that I can stop using my Google home. It's not even the privacy concern that bugs me, it's the stupid shit like alarm management. To preface, I've had a Google home since late last year and since I got it the alarms have been nothing but trouble. More than half the time when I ask it when my next alarm is, it will respond with "You have an alarm for Friday at 7pm that is going off right now" (At the time of this response it was Tuesday). Then snoozing sometimes just doesn't work, I told it to snooze for 10 minutes, it worked just fine. Then today I made the mistake of asking it to snooze a second time which responded with "Sure, snoozing for 5 minutes", I wake up 45 minutes later, and ask "Hey Google, when's my next alarm?", it responds "You have an alarm today for 7:00 snoozed until 7:15". I have an exam today so luckily I didn't sleep in too late but againg this isn't the first occurence. To prevent this I normally just have a backup alarm on my phone and the one on my phone will wake me up in case something happens. On top of that though I've had rarer cases where it will delete all my alarms and I'll have to go command by command reminding of each alarm. That's just alarms though, I also have it control several IoT devices, and me having to use IFTTT requires the utmost precision in my phrasing otherwise it won't understand ( although this issue is mainly due to how the assistant service trigger on IFTTT is configured ). It still does much better than Siri ( at least my home can set alarms unlike my mac ), I have yet to try Alexa though. Of course my last problem is the hotword, saying "Hey Google" is much better than "Ok Google" but it's still excessive when I have to repeat it for each individual command. This is why I'm so excited for snips air, a set of devices that look pretty great, hackable, and as a bonus much more private that the current options. I realize that I could get a dev kit or set up snips on a pi but the dev kit isn't exactly visually appealing and I doubt I could get something that looks or functions half decent on the pi.1
-
Didn't had much experiences with recruiters, but there was one funny case.. One recruiter was trying contact me for couple of days. Emails, phone calls and sms, you name it.. I wasn't yet working as much back than, but the only reason that I've turned him down was, that he was my Officer in the army some years before and that shit seriously creeped me off...
-
First and foremost, keep clients and work colleagues (especially management people) out of your personal life as much as possible.
Communicate to the rest of the team and clients (if in a client facing role) when you will and won't be available. Also communicate your concerns about any unrealistic deadlines.
Most of the times, this is bound to be ineffective. So, keep phone on silent (or flight mode) at night and during weekends. Also don't call back in case there is a missed call from anybody from work colleagues.
I deviate from this only if there is a go live or similar activity going on. -
Guys i want to clone my phone into a virtual one under Linux like a virtual machine, i do have Authy, and few financial apps i want to install on it in case I don't have access to my phone or if it's dead, what are the best options2
-
Today I got the case for my new Pixel phone... so switched from my Oneplus 6.
It's the first one I'm not going to root...
It's also only my 4th phone now that I think of it...
Google Galaxy, Oneplus 1, OP 6, pixel 4a 5g... -
You may be suspecting that your wife is cheating on you. The doubts linger, causing anxiety and sleepless nights. In a desperate search for the truth, he turns to TrustGeeks Hack Expert, a renowned digital forensics company known for its expertise in uncovering hidden information. And so, the curious case begins. TrustGeeks Hack Expert embarked on a mission to unveil the hidden messages that held the potential to confirm or dispel the husband's suspicions. Using their arsenal of expert techniques, they began the intricate digital investigation process. The first step involved collecting all the necessary details, such as the communication platforms used, usernames, and any available passwords.
With the information in hand, the team at TrustGeeks Hack Expert delved deep into the digital realm, employing cutting-edge forensic tools to recover deleted messages and uncover hidden conversations. Once the messages were retrieved, they underwent a meticulous examination, deciphering the content and ensuring their authenticity for future use. The final step involved presenting the uncovered messages to the client, providing him with the concrete evidence he needed to confront his wife and make informed decisions about his relationship. Thanks to the wizardry of TrustGeeks Hack Expert, the truth was uncovered, and the husband was equipped with the knowledge he sought. A selection of services designed especially to unearth the truth behind messages from an unfaithful spouse are provided by TrustGeeks Hack Expert. Their team of professionals is proficient in data recovery, digital forensics, and meticulous tracking methods. With their help, people can obtain the proof they require to validate their suspicions and make wise choices regarding their relationships. Even though there may be a lot of grounds for suspicion, it's crucial to conduct the inquiry in an ethical manner. TrustGeeks Hack Expert is aware of how delicate these circumstances can be, and they take care to make sure that all of their procedures follow moral and legal guidelines. Their mission is to give people the information they need while protecting their right to privacy and secrecy. TrustGeeks Hack Expert proficiency in digital forensics and data recovery is just one of their many skills. They have the ability to retrieve erased emails, messages, and other digital traces that might contain information about the secrets of an unfaithful spouse. They are able to resurrect material that has been concealed and offer it as proof by employing sophisticated strategies. TrustGeeks Hack Expert is aware of the significance of social media surveillance in this day and age, as these platforms play a big part in communication. They are able to monitor messaging apps, keep tabs on online activities, and even offer phone tracking services. People can use their knowledge to better understand their partner's interactions, which enables them to make defensible decisions. Remember, while discovering a cheating spouse can be a painful experience, having access to expert techniques like those offered by TrustGeeks Hack Expert can provide the clarity and evidence needed to move forward. Trust in their expertise and let them guide you through the process, armed with wit, personality, and a dash of digital magic.
Communicate with TrustGeeks Hack Expert through:
whats App +1 406- 218- 6900
Telegram User: @ Trustgeekshackexpert
Best Wishes -
My Journey Through Loss, Discovery, and Recover/ Hack Savvy Tech
Since December 2024, my family and I had been planning the perfect getaway to the Lake District. After years of saving and sacrificing, we decided it was finally time to treat ourselves to a dream vacation. We were planning a trip that would cost us £15,000 in total, a considerable amount that we hoped would create lasting memories. I found an appealing holiday package offered by what seemed like a reputable travel agency online. After reviewing all the details and comparing it to other options, I felt confident and excited, so I went ahead and booked the trip on Valentine's Day, thinking it would be a special gesture for our family. I paid £5,000 as a deposit for what I thought would be the vacation of a lifetime.However, things quickly took a devastating turn. After making the payment, I received a vague email confirmation, but then, all communication stopped altogether. When I tried to get in touch with the agency, their phone lines were disconnected, and their website went offline. It was clear that something wasn’t right. I was in disbelief, but I quickly realized that my family and I had been scammed. The £5,000 I had paid, as part of the larger £15,000 cost, seemed completely lost . As a Marketing Executive, I’m usually quite cautious with online transactions, but in this case, I let my excitement and trust cloud my judgment. The emotional impact of losing such a significant amount of money, especially after planning this vacation for months, was overwhelming. My family was devastated, and I felt deeply betrayed by the fraudulent agency. I didn’t know where to turn for help.That’s when I found Hack Savvy Tech . After reading about their expertise in helping people who had fallen victim to online scams, I decided to reach out. From the very first consultation, they made me feel supported and reassured. The team immediately began investigating the fraudulent travel agency and quickly uncovered a history of scams involving the same company. Hack Savvy Tech guided me through the process of disputing the payment with my bank, Lloyds Bank, providing all the necessary evidence and documentation. They handled everything on my behalf, communicating with the bank and working through all the complexities of the dispute. Their knowledge and dedication were invaluable, and after a few weeks, I was thrilled to find out that they had successfully recovered the full £5,000 I had lost.Not only did I get back the full amount, but Lloyds Bank also provided additional compensation for the stress and inconvenience caused by the scam. Thanks to Hack Savvy Tech, I was able to rebook a legitimate holiday to the Lake District for my family. With the money we recovered, we planned the vacation we had dreamed of, and we made unforgettable memories together.What had started as a heartbreaking experience turned into a joyous and well-deserved family getaway, all thanks to the expertise and support of Hack Savvy Tech.
mail: contactus @ hacksavvytechnology . com
Website: https : // hacksavvytechrecovery . com
Whatsapp : +7.9.9.9.8.2.9.5.0.3.83 -
HOW TO RECOVER USDT (Tether) LOST TO A FRAUDULENT INVESTMENT PLATFORM
My name is Alex. I’m a hardworking auto mechanic in Florida. I don’t have a fancy degree or a Wall Street background—I just know how to fix engines, change tires, and give people honest work. I’ve spent years under the hood, saving every penny I could to build a better future for my family. I never thought I’d fall victim to a scam, let alone one that almost destroyed my life.
It all started when I came across a well-advertised movement called FIRE — Financial Independence, Retire Early. It sounded like a dream come true. They offered investment strategies through cryptocurrency that promised rapid returns and long-term wealth. I followed their advice, watched webinars, and even got on phone calls with so-called financial advisors who fed me charts, projections, and the kind of words that made me believe I was finally on the right track.
Over a few months, I invested more than $97,000—my entire life savings. It was everything I had saved from long days in the shop, weekends spent working extra hours, and holidays skipped just to get by. At first, everything seemed legit. My “account” kept showing growth. I thought I’d finally made a smart move for my family’s future.
Then one day, everything was gone.
The platform vanished. The emails stopped. The so-called advisors blocked me. My money—my future—was stolen, just like that. I was numb. Angry. I couldn’t eat, couldn’t sleep. I tried to trace their crypto wallets. I filed reports, contacted the authorities, and even tried tracking them down myself. But the trail went cold. They were ghosts on the internet.
That experience broke me. I felt like a fool. I fix cars for a living—I didn’t belong in the world of crypto, and this was my punishment for trying to reach beyond my means.
Then, when all hope seemed lost, I came across a post about AUTOPSY MAINNET RECOVERY. I thought, “What do I have to lose?” I emailed them at Autopsymainnetrecovery@autopsy.co.site, expecting just another dead end.
But this time… it was different.
They responded quickly. They spoke to me like a human being—not just another case. Their team launched a full investigation, analyzed blockchain activity, followed every suspicious transaction. They were relentless, determined, and unbelievably skilled.
Within a few days, they recovered over 83% of my stolen crypto.
I stood in my garage with tears in my eyes. Not just because I got my money back—but because someone finally stood up for people like me. I wasn’t just another victim. I mattered.
AUTOPSY MAINNET RECOVERY didn’t just return my assets—they restored my dignity. If you're out there, hurting and feeling helpless, know this: you are not alone. These people are the real deal. Don’t give up. Reach out. Fight back—with the best team on your side.
They gave me my life back. Let them do the same for you.
WhatsApp: +44 758 601 9698
Email: Autopsymainnetrecovery@autopsy.co.site5 -
Experiencing a security breach involving your Bitcoin wallet can be a harrowing ordeal. This was my reality when I received an unexpected BTC security code on my phone. At the time, I didn’t realize the significance of this code and, unfortunately, ignored it. To my dismay, I later discovered that my Bitcoin wallet had been hacked by an unknown scammer, resulting in the theft of all the funds I had accumulated. The frustration and helplessness I felt during this period were overwhelming. My entire Bitcoin portfolio was inaccessible, and the sense of losing control over my assets was incredibly distressing. The funds that had been stolen represented not just an investment, but a crucial part of my financial security. I was left without any clear path forward, grappling with the reality that my savings were gone and that I had no immediate way to recover them. In my search for a solution, I turned to online resources and discussions in hopes of finding a way to retrieve my lost funds. It was during this search that I heard about FAYED HACKER from a trusted friend. They spoke highly of FAYED HACKER’s reputation for recovering lost funds and providing effective solutions for hacking incidents. Encouraged by their positive feedback, I decided to reach out to FAYED HACKER for help. I contacted them through their email, providing all the relevant details about my situation. The response from FAYED HACKER was swift and professional. They offered a detailed consultation and outlined the steps I needed to follow to initiate the recovery process. Their instructions were clear and comprehensive, guiding me through every necessary action to address the breach and attempt to regain control of my wallet. Following their expert advice, I was able to take the necessary steps to begin the recovery process. FAYED HACKER’s team worked diligently on my case, employing their expertise and advanced techniques to trace the stolen funds and secure my compromised wallet. The process required patience and careful adherence to their instructions, but their support was unwavering and reassuring throughout. Within a few weeks, I received the incredible news that my Bitcoin wallet and the stolen funds had been successfully recovered. FAYED HACKER’s efforts to rectify the situation were nothing short of remarkable. They had not only restored access to my wallet but also ensured that the stolen BTC was returned. I was once again able to manage my wallet independently, regaining control over my financial assets. The successful recovery of my Bitcoin and wallet was a huge relief and a testament to the effectiveness of FAYED HACKER’s services. Their professionalism, expertise, and commitment to their clients were evident throughout the entire process. I am profoundly grateful for their help and would strongly encourage anyone who finds themselves in a similar predicament to seek assistance from credible and ethical recovery services like FAYED HACKER. Dealing with a hacked Bitcoin wallet can be an incredibly stressful experience, but recovery is possible with the right help. FAYED HACKER provided me with the expert support and guidance needed to regain my assets and restore my peace of mind. Their dedication to their clients and their effective recovery strategies make them a trustworthy choice for anyone facing issues with stolen or compromised Bitcoin. If you ever find yourself in a situation where your funds or wallet have been hacked, reaching out to a reputable recovery service like FAYED HACKER could be the key to reclaiming what you’ve lost.
EMAIL: writeus @ fayedhacker . tech or fayedexperthack @ solution4u . com
WHATSAPP: + 44 (753) (524) (0205)
-
Losing $200,000 worth of Bitcoin to scammers was one of the most devastating experiences of my life. As someone who had invested years of savings into cryptocurrency, the thought of losing it all to a fraudulent scheme was paralyzing. I felt helpless, angry, and overwhelmed. That’s when I discovered *Coin-Caper Recovery*, a professional cryptocurrency recovery service that specializes in helping victims of scams reclaim their lost funds. Here’s how they turned my nightmare into a story of hope and recovery. It all started with what seemed like a legitimate investment opportunity. I was approached by a group claiming to be a reputable crypto trading platform, promising high returns on my Bitcoin investment. They had a professional-looking website, convincing testimonials, and even a "support team" that answered all my questions. Trusting their credibility, I transferred $200,000 worth of Bitcoin to their wallet. Within days, the platform disappeared. Emails bounced back, phone numbers were disconnected, and my funds were gone. I realized I had fallen victim to a sophisticated scam. Desperate, I began searching for ways to recover my lost Bitcoin, but most options seemed futile—until I found Coin-Caper Recovery. From the moment I contacted Coin-Caper Recovery, I felt a glimmer of hope. Their team of experts was empathetic, professional, and transparent about the recovery process. Here’s how they helped me: Coin-Caper Recovery began by thoroughly reviewing my case. They asked for all relevant details, including transaction records, communication with the scammers, and any other evidence I could provide. Their team explained the complexities of blockchain technology and how they could trace my funds. Using advanced blockchain analysis tools, Coin-Caper Recovery traced the movement of my Bitcoin. They identified the wallets the scammers used and monitored the flow of funds across the blockchain. This step was crucial in understanding where my money had gone and how to recover it. Coin-Caper Recovery collaborated with legal experts and law enforcement agencies to take action against the scammers. They filed reports, gathered evidence, and worked tirelessly to freeze the scammers’ accounts. Their global network of professionals ensured that no stone was left unturned. After weeks of relentless effort, Coin-Caper Recovery successfully recovered a significant portion of my lost Bitcoin. While not all funds were retrievable due to the nature of cryptocurrency transactions, the $200,000 I thought was gone forever was partially restored. Their team kept me informed at every step, providing updates and reassurance throughout the process. Thanks to Coin-Caper Recovery, I was able to reclaim a portion of my lost Bitcoin and regain my faith in the cryptocurrency space. While the experience was traumatic, it taught me the importance of due diligence and the value of having experts like Coin-Caper Recovery on your side when things go wrong. If you’ve fallen victim to a cryptocurrency scam, don’t lose hope. Reach out to Coin-Caper Recovery—they are the lifeline you need to turn your situation around. Their expertise and dedication can make all the difference in recovering what’s rightfully yours. Always exercise caution when investing in cryptocurrency and verify the legitimacy of platforms and services. If you suspect fraud, act quickly and seek professional help from reputable recovery services like Coin-Caper Recovery.
Contact Coin-Caper Recovery via: Whatsapp +1 (747) 360‑9248
1 -
MOST RELIABLE BITCOIN RECOVERY COMPANY-CODER CYBER SERVICES
Despite some difficult days, I observed encouraging returns. Small things like getting cookies from the office kitchen still brought me joy. Life was moving forward, and my investments seemed to be paying off. I had started adding more money to an online platform, eager to optimize my gains. Who wouldn’t want to maximize returns when things were going so well? The platform had appeared legitimate at first, and I was excited about the steady progress my account was showing. But then, everything suddenly vanished. One morning, I logged into my account to check on my investments, only to be greeted by a stark message: “Account temporarily unavailable.” I refreshed the page, tried a different browser, and even attempted to log in from my phone all to no avail. My heart sank as I realized that the funds I had worked hard to grow seemed to have disappeared. After several failed attempts to contact customer service, I eventually received a vague email from the online platform. The message instructed me to stop interacting with the platform and suggested that I attempt a bank reversal for any deposits made. However, by this point, too much time had passed, and the window for initiating a reversal had long since closed. I felt trapped. The money I had invested seemed inaccessible, and the promise of returns that once felt so certain was now nothing more than a distant memory. Desperate for answers, I reported the situation to the Federal Trade Commission (FTC), hoping that their intervention might shed some light on what had happened and bring accountability to the platform. I also began sharing my experience on online forums and social media, hoping to raise awareness and prevent others from falling into the same trap. Still, I knew that waiting for a regulatory response could take time, and I wasn’t ready to give up on recovering my funds. In my frustration, I sought out a professional service called Coder Cyber Services. Known for their expertise in recovering funds from online platforms with questionable practices, they offered a more hands-on approach. I reached out to them, hoping they could help expedite the process of retrieving my blocked payout requests. The process with Coder Cyber Services was slow, each step unfolding like a puzzle with more questions than answers. Communication from their team was sparse, and the uncertainty began to take a toll on my patience. Yet, I couldn’t give up. The professionals at Coder Cyber Services assured me they were doing everything they could, and their experience gave me hope that my case could be resolved. After weeks of waiting, my persistence paid off. Coder Cyber Services successfully helped me recover my money. Their expertise and determination turned a seemingly hopeless situation around. I finally saw the funds I thought were lost returned to my account, which was an incredible relief. Reflecting on this experience, I’ve learned several valuable lessons. The most important is the necessity of caution when dealing with online platforms. While the potential for high returns is tempting, it’s crucial to ensure that any platform you trust with your money is reputable. My decision to invest without enough research or due diligence is a mistake I will never repeat. I also learned the importance of acting quickly. Time is often the enemy when dealing with financial platforms, especially those with questionable practices. Though my journey is still ongoing, this experience has made me more resilient. I will continue to approach future investments with greater caution, vigilance, and a commitment to understanding the risks involved. And I’ll always be grateful to Coder Cyber Services for helping me recover what I thought was lost for good. Get in touch with the company via:
Whatsapp: +1 (672) 648-1781
Thank you,
Smith.
1 -
RECOVERY LOST CRYPTOCURRENCY FROM SCAM INVESTMENT PLATFORM: CONSULT RAPID DIGITAL RECOVERY
My quest for financial independence began with ambition but nearly ended in ruin. Desperate to escape the grind of traditional investments, I plunged headfirst into cryptocurrency, lured by stories of overnight wealth. With no prior experience, I committed $800,000 to a platform that radiated credibility: polished interfaces, “verified” testimonials, and persuasive brokers who swore returns would dwarf my risks. What I didn’t admit even to myself was how much I’d gambled. The investment wasn’t just my savings; I’d even taken a loan, mortgaging my future to fuel this dream. For months, dashboards showed soaring profits, and I celebrated prematurely, believing I’d cracked the code to prosperity. But when I tried to withdraw funds, the nightmare began. Endless delays. Opaque fees. Then, radio silence. The platform vanished overnight, leaving me stranded. Reality struck like a physical blow: I’d been scammed. My savings were gone, and the debt I’d taken on loomed like a guillotine. The aftermath was catastrophic. Creditors hounded me. Shame gnawed at my sanity. How could I explain this to my family? To myself? I’d risked everything even borrowed beyond my means to chase a mirage. The weight of failure dragged me into a pit of despair. Sleep became impossible. I’d stare at my phone, willing the scammers to reply, while suicidal whispers taunted me: This is how it ends. A friend intervened, urging me to contact RAPID DIGITAL RECOVERY...WhatsApp: +1 4 14 80 71 4 85.. Skeptical but desperate, I submitted my case, clinging to the frail hope that experts could undo the irreversible. Their response was immediate. Unlike the scammers, they spoke with precision, dissecting the fraud: fake wallets, fabricated transactions, and offshore accounts designed to launder funds. They warned recovery would be arduous but possible. RAPID DIGITAL RECOVERY became my lifeline....Email: rapid digital recovery (@) execs. com.. Their team traced cryptocurrency footprints across continents, collaborating with regulators to freeze assets and force accountability. They decoded the scam’s infrastructure, revealing how my loan-funded investment had been funneled into anonymous wallets. Every step was documented; every update, a flicker of hope. Weeks later, the impossible happened: funds began trickling back. First a fraction, then more, until nearly the entire $800,000 including the loan amount was recovered. The relief was visceral. Beyond restoring my finances, they salvaged my dignity. RAPID DIGITAL RECOVERY didn’t just expose the scam; they educated me, equipping me to spot fraud and invest wisely. Today, I’m rebuilding not just my wealth, but my trust in humanity. If you’re trapped in a similar hell, know this: there is a way out. RAPID DIGITAL RECOVERY doesn’t just retrieve funds they resurrect hope. To those who’ve taken loans, drained savings, or bet it all on a lie: act now. Let them turn your collapse into a comeback.
Telegram: https: // t. me/ Rapiddigitalrecovery11 -
Motorcycle Accident Lawyer: Your Trusted Advocate in Miami – Pita Weber Del Prado
Motorcycle accidents can result in devastating injuries, from broken bones and spinal injuries to traumatic brain injuries and even fatalities. The physical, emotional, and financial toll of a motorcycle accident can be overwhelming, leaving victims unsure of how to navigate the complexities of insurance claims and legal proceedings. If you’ve been involved in a motorcycle accident in Miami, having an experienced motorcycle accident lawyer by your side is essential to ensuring you receive the compensation you deserve. At Pita Weber Del Prado, we are committed to protecting the rights of motorcycle accident victims and guiding them through every step of the legal process.
Why You Need a Motorcycle Accident Lawyer in Miami
Motorcycle accidents are unique and often involve more severe injuries compared to car accidents due to the lack of protective barriers. Additionally, the public’s perception of motorcyclists can sometimes be biased, making it harder for victims to get the fair treatment they deserve. An experienced motorcycle accident lawyer can help level the playing field by ensuring that your case is properly investigated and that your rights are vigorously defended.
At Pita Weber Del Prado, we specialize in representing motorcycle accident victims in Miami and surrounding areas. Our legal team has a deep understanding of Florida’s motorcycle laws, insurance regulations, and how to navigate the complex issues that arise in these types of cases.
Common Causes of Motorcycle Accidents
Motorcycle accidents can happen for a variety of reasons. Some of the most common causes include:
Distracted Drivers: One of the leading causes of motorcycle accidents is other drivers not paying attention to the road. Distracted driving—such as texting, using a phone, or even eating—can prevent drivers from noticing a motorcyclist, leading to collisions.
Failure to Yield: Drivers often fail to yield the right of way to motorcyclists, particularly at intersections, causing accidents. Many drivers simply don’t notice motorcyclists or fail to check their blind spots before changing lanes or making turns.
Speeding and Reckless Driving: Speeding and aggressive driving are dangerous for all road users, but they are particularly risky for motorcyclists. Excessive speed reduces the time to react to hazards, which can lead to accidents.
Road Hazards: Poor road conditions—such as potholes, uneven surfaces, or wet roads—can be especially dangerous for motorcyclists. These hazards can cause loss of control, resulting in crashes.
Impaired Driving: Driving under the influence of alcohol or drugs significantly impairs a driver’s reaction time and ability to judge distances, leading to crashes involving motorcycles.
How a Motorcycle Accident Lawyer Can Help You
If you’ve been injured in a motorcycle accident, you may be facing steep medical bills, lost wages, and emotional distress. An experienced motorcycle accident lawyer can help you by:
Investigating the Accident: Our team will conduct a thorough investigation into the accident, gathering crucial evidence such as witness statements, police reports, and accident scene photographs. We will also work with accident reconstruction experts, if necessary, to establish fault.1 -
I saw this link in a blog Henryclarkethicalhacker @ gmail. com, after years of searching and decided to contact them when I had a case with my spouse. I don't know how they did it but they did get me remote access to his Whatsapp, Facebook, everything including phone calls.
-
HIRE A HACKER TO HACK AND SPY ON PHONE; CYBERPUNK PROGRAMMERS
My name is Jennifer an IT consultant ,i was married for ten years, in my final marriage year, i started noticing strange patterns in my husband behavior. He would often come home late from work, with execuses that didn't quite add up, and his phone was perpetually glued to his hand. despite my love for him, i couldn't shake the feeling that he was hiding something. After weeks of doubt and painful suspicion i decided to seek help from the experts i once heard my colleagues at work mention, Cyberpunk Programmers, a team of technicians known for their efficiency and discretion agreed to take of the case. led by the sharp witted Alex, they devised a plan to install a spyware on my husbands phone which would allow them to monitor his activities without his knowledge.It wasn't long before they found incriminating evidence: secret phone calls, encrypted messages, and late night meetings at a downtown hotel. the evidence was undeniable. My husband was having an affair! Caught red handed, he could not deny his deceit. Now armed with the truth, i had to make a difficult decision to end my marriage. The teams hard work not only validated my suspicions but also provided me with the closure i needed to move forward. Cyberpunk Programmers are not just the best at protecting data ; the proved themselves to be effective in uncovering the darkest secrets of the digital world. If you ever find yourself in such kind of situation, reach out to Cyberpunk Programmers. Their reputation has grown not for just catching cheating partners, but for their unyielding dedication to their clients.
reach out to cyberpunk programmers through;
WhatsApp:+4478481617732 -
RELIABLE TRUSTED CRYPTO RECOVERY SERVICES CONTACT FUNDS RECLIAMER COMPANY
Farming is iffy at the best of times, but I could have never foreseen the day that a lightning strike landed on the metal side of my hardware shack and incinerated the hardware wallet that held the key to all of my Bitcoin savings that had a grand total of $160,000. I stood out in the rain with the burnt-out shell of warped metal and wood, feeling that I had lost a lifetime of financial stability with it. I shivered with trepidation as I rummaged within the ashes to seek out the melted shreds of the digital savings bridge that I had put into the care of it. Panic gripped me with a fierceness that no famine had ever triggered. Money was the insurance policy fund, cushion fund, plan to enlarge the farm larger, the destiny of the family of mine. I had failed them somehow. I tossed about all night with visions of debt and of the loss of the house spinning round the head of me. The next afternoon at the ag conference (more out of habit than hopes), I stood next to a speaker while I was eavesdropping on him say the name of FUNDS RECLIAMER COMPANY carelessly while talking to someone between talks. I was interested and desperate so I followed him later to introduce himself with a quavering voice. I contacted the FUNDS RECLIAMER COMPANY that afternoon. From the very beginning of the call, their staff treated my case with the professionalism of seasoned experts aware of the personal and the technical worth of the loss I had experienced. They were not merely examining a burnt wallet; they were examining a farmer with his means of support by a thread. Their experts treated the broken hardware with the tenderness of a priceless germ sample. With the skill of meticulous techniques, they recovered my personal keys out of to me a junk pile of useless electronics. With each update they made, they were a lifeline that kept me afloat away from financial destitution. Ten tense days had passed when I got the call: the wallet had been recovered. I was about to drop the phone in the barn with the news. I was overcome with relief that I knew that the savings were intact. The farm could carry on, and the future of the family was secured.
FUNDS RECLIAMER COMPANY recovered not just information but also hope. They turned disaster into resilience, something I will forever be thankful to them for.
Email: fundsreclaimercompany@ z o h o m a i l . c o m
WhatsApp:+1 (361) 2 5 0- 4 1 1 01 -
HOW TO SPY ON MY SPOUSE'S PHONE // CRYPTO PANDEMIC HUNTER
To be honest, I'm not proud of having to write this, but I feel it's important to share my experience in case it can help someone else facing similar doubts. I suspected my ex was being unfaithful, and the doubts were making me restless. I'm not tech-savvy at all, but after days of endless worries, I stumbled upon Crypto Pandemic Hunter while researching ways to possibly confirm my suspicions.
Honestly, I was skeptical. Spying software always seemed complicated and something requiring advanced computer skills. But the more I read about it on Crypto Pandemic Hunter, the more I felt like it might be the only way to get the peace of mind I desperately craved.
What surprised me most was how user-friendly the whole process was. The team walked me through everything step-by-step. The software itself was surprisingly intuitive, even for someone like me who struggles with basic tech. The interface was clean, and the instructions were clear.
Within a short time, I started getting access to the data I needed. The spying software provided call logs, text messages, and even social media activity. I won't go into all the details, but it didn't take long to uncover the truth—my ex was indeed being unfaithful.
While the discovery was painful, I can't deny that Crypto Pandemic Hunter provided me with the clarity I needed to move forward. The tool was easy to use, and the support I received was invaluable.
I understand that using spying software raises ethical concerns; however, in my situation, I felt it was the only way to confirm my suspicions and regain control of my life. If you're considering finding the truth, I recommend you reach out to Crypto Pandemic Hunter.5 -
Star Phone Fix: Reliable Water Damage Fix in Hialeah, FL
Accidentally dropped your phone in water? Don't panic! At Star Phone Fix, we specialize in water damage fix for all kinds of mobile devices, including iPhones, Samsung smartphones, and many others. We know how stressful it can be when your phone has been exposed to water, but with our expert repair services, you can get your device back in working order as quickly as possible.
Located at 405 W 29th St, Hialeah, FL 33012, we’re your local go-to for all kinds of phone repairs, especially water damage fixes. With our fast, reliable, and affordable services, you can trust us to handle your device with care and get it back to perfect working condition.
Why Choose Star Phone Fix for Your Water Damage Fix?
Water damage is a tricky problem for any device, but Star Phone Fix has the experience and tools to handle it with ease. Here’s why we’re the best choice when you need water damage fix:
1. Experienced Technicians
Our technicians are trained in diagnosing and repairing a wide range of water damage issues. Whether it’s a phone that has been submerged in water or one that has simply gotten a little wet, we know exactly what to do. From preventing further damage to restoring your device’s full functionality, our team is equipped to handle it all.
2. Quick and Efficient Repair
We understand that time is of the essence when it comes to water damage fix. The sooner you get your phone into our hands, the better the chance we have to restore it. That’s why we offer same-day repair for many water-damaged devices. We work fast to dry out and fix your device, so you can get back to using it as soon as possible.
3. Affordable Pricing
Dealing with water damage doesn’t have to be costly. Star Phone Fix offers affordable and competitive pricing for water damage fixes without compromising on quality. We’ll assess your device, provide an upfront quote, and make sure you know exactly what you’re paying for before any work is done.
4. High-Quality Replacement Parts
In the case that your device requires replacement parts due to water damage, we use only the highest quality components. From screens to internal components, we ensure that your phone gets the best possible repair, so it works just like new.
5. Customer Satisfaction Guarantee
Your satisfaction is our top priority at Star Phone Fix. We’re committed to delivering exceptional service, and if you’re not happy with the repair, we’ll do everything we can to make it right. With us, you’re not just a customer – you’re a priority.
What Happens During a Water Damage Fix?
When you bring your device to Star Phone Fix, we follow a proven process to ensure the best chance of restoring your phone:
Initial Assessment: The first step is to assess the extent of the water damage. We’ll look at the device’s external condition and carefully inspect the internal components to identify any affected parts. Early detection is key to preventing further damage.
Drying Process: We’ll disassemble the device, remove any excess water, and let the internal components dry properly. This crucial step helps prevent corrosion and other issues caused by prolonged exposure to water.
Cleaning and Repair: Once the device is dry, we clean the internal components to remove any moisture or contaminants that may have accumulated. If necessary, we replace any damaged parts, such as screens, batteries, or connectors, to restore full functionality.
Testing: After the repairs are made, we test the device thoroughly. We check for any remaining issues with the touch screen, camera, speaker, charging port, and other functions to ensure everything is working as it should.
Final Review: Once we’ve completed the repair and testing, we’ll call you to let you know your device is ready to pick up. We’re committed to delivering a fully functional phone that’s ready to go.
Devices We Fix for Water Damage
At Star Phone Fix, we handle water damage fixes for a variety of devices, including:
iPhones: From the iPhone 6 to the latest iPhone models, we have experience fixing water-damaged Apple devices.
Samsung Galaxy Phones: Whether it’s a Galaxy S series, Note, or any other model, we can repair water damage and restore your device.
Other Smartphones: We also provide water damage repairs for other brands such as Google Pixel, Motorola, LG, and more.
Tablets and Smartwatches: Water damage doesn’t just affect phones – we can also repair water-damaged tablets and smartwatches, including iPads and Android devices.
Why You Should Act Quickly for Water Damage Fix
If your phone has been exposed to water, acting quickly is essential. The longer your device remains wet, the greater the chances of irreversible damage to internal components. It’s important to power off your device immediately and avoid charging it until it has been properly inspected and dried.
3 -
My initial engagement with DUNE NECTAR WEB EXPERT demonstrated considerable professionalism and transparency. This favorable first impression prompted a more thorough investigation into the company's background and operational practices. Subsequent research revealed a significant history of successful engagements across various services. Their client portfolio reflects a commendable track record in several complex domains, including phone surveillance, private investigations, and cryptocurrency recovery. Specifically, their proficiency in phone spying involves ethical and legal data acquisition, adhering to all relevant regulations while securing necessary authorizations. In private investigations, their work exemplifies a dedication to meticulous fact-finding and discreet operations, ensuring the respect of client confidentiality and legal parameters.
Furthermore, their achievements in cryptocurrency recovery underscore their expertise in blockchain technology, digital forensics, and navigating the complexities of cryptocurrency exchanges and regulatory frameworks. These achievements are not merely anecdotal; they are substantiated by numerous client testimonials and case studies accessible on their website and through independent verification. The consistently positive feedback, combined with demonstrable expertise across various specialized fields, reinforced my assessment that DUNE NECTAR WEB EXPERT is the most reputable and effective solution for recovering my lost cryptocurrency. Their commitment to transparency, their proven track record, and adherence to ethical standards distinguish them from other firms operating within this intricate sector. The depth of their expertise and the breadth of their successful engagements instilled in me the confidence to entrust them with this critical matter.
WEB- dunenectarwebexpert . com
EMAlL - support @dunenectarwebexpert . com.
6 -
I could never have imagined that some random Facebook groups would turn out to be my financial savior, but that is precisely how things happened following the accident when I erased the whole Bitcoin wallet by formatting the phone. It all began with what, at the time, seemed a simple phone reset. My phone had been on the fritz-apps moving slower than necessary, screens freezing on me-so I figured this factory reset was just what I needed. A responsible person I thought I had been, making sure my photo library, important files, and contacts were properly backed up online. What hadn't clicked, well, till now? It wasn't going to be in that backup-the crypto wallet, that is. The moment I booted up my "brand-new" phone and went to my wallet, my stomach just dropped. It was gone: All evidence of it vanished. My mind goes to: Had I written down my recovery phrase? Was there another backup somewhere? Spoiler alert: I had nothing. I freaked out. That wallet had about $80,000 worth of Bitcoin in it. Suddenly, I realized it was gone-unsalvageable. I spent hours Googling the solution, reading forum posts, and trying to reverse-engineer my mistake. Every attempt ended in frustration. It was then that I turned to Facebook. Desperate, I made a post in some niche crypto group I joined years ago but never really participated in. The answers were full of condolences, technical suggestions, and direct doom. Yet, there was this comment: This happened to me last year. Try HACK SAVVY TECH-they saved my funds." I looked up their page, read through dozens of positive reviews, and had nothing to lose. From the moment I reached out, they handled everything like pros: patiently walking me through this process, reassuring me that this wasn't an impossible case. That confidence gave me a degree of hope, but I braced for bad news. A few days later, I received that call: my Bitcoin was fully recovered. The relief was overwhelming. What I thought was a disaster turned into just a stressful hiccup—all thanks to HACK SAVVY TECH. Now, I have my funds back, a proper backup strategy, and a newfound appreciation for random Facebook groups. Lesson learned: never assume your data is safe.
mail: contactus @ hacksavvytechnology . com
Website: https: // hacksavvytechrecovery . com
Whatsapp : +799982950381 -
Trustworthy and Efficient: How Cryptic Trace Technologies Uncovered my Cheating Wife
In a moment of personal crisis, I needed to confirm my suspicions about my wife's infidelity. I reached out to Cryptic Trace Technologies, hoping they could help me find the truth. Their phone hacking services exceeded my expectations in every way. From the initial contact, their team was professional, empathetic, and highly skilled. They explained the process in detail, ensuring I understood what to expect and how they would proceed. Throughout the investigation, they kept me informed and addressed any concerns I had promptly. Cryptic Trace Technologies delivered the evidence I needed swiftly and with complete discretion. Their expertise and commitment to confidentiality were evident in every interaction. They handled my case with care and respect, which was incredibly important to me during this difficult time. I wholeheartedly recommend Cryptic Trace Technologies to anyone seeking reliable and professional help in uncovering the truth. Their services were instrumental in providing me with the clarity I needed. Thank you, Cryptic Trace Technologies, for your outstanding support. Contact them through their email: Cryptictrace@technologist . com
Website: cryptictracetechnologies . com1 -
Professional Cyber Surveillance for Cheating Spouse Investigations
When I suspected my spouse of cheating, I was overwhelmed with uncertainty and anxiety. I knew I needed answers but had no idea where to turn until I found Cybernet Surveillance. I reached out to them via their email Cybernetsurveillance @ mail . Com and the reply was instant. Their phone hacking services came highly recommended, and now I understand why. From the moment I reached out, they handled my case with the utmost professionalism and care. Within days, they provided me with undeniable proof—access to hidden messages and detailed call logs—that confirmed what I had feared. Their ability to recover even deleted data was nothing short of remarkable. I can’t express how grateful I am for their support during such a difficult time. Their advanced technology, combined with their compassionate approach, gave me the clarity I desperately needed. If you’re struggling with suspicions about your partner, I wholeheartedly recommend Cybernet Surveillance. They not only deliver results but also give you the peace of mind that comes with knowing the truth. You can also reach them through their other email: mail @ Cybernetsurveillance . Site. -
Recover My Stolen Crypto | Cryptocurrency Investment With Lee Ultimate Hacker
LEEULTIMATEHACKER @ AOL . COM
telegram: LEEULTIMATE
wh@tsapp +1 (715) 314 - 9248
https :// leeultimatehacker. com
My initial engagement with Lee Ultimate Hacker was marked by clarity and transparency, which immediately set a positive tone. Their willingness to explain the services they offer and the steps involved made it clear that they were a professional and trustworthy firm. This strong first impression prompted me to further investigate the company’s background and operations, and what I discovered reinforced my confidence in their capabilities. Lee Ultimate Hacker has a notable history of successful engagements across a variety of complex services. They have built a reputation for expertise in phone surveillance, private investigations, and cryptocurrency recovery. Their approach to phone surveillance is especially noteworthy. The company uses ethical and legal methods to gather data, ensuring compliance with all relevant laws and securing the necessary authorizations before proceeding. This careful adherence to legal guidelines is crucial for anyone seeking these services, as it ensures the protection of privacy and the integrity of the process. In addition to phone surveillance, Lee Ultimate Hacker is highly regarded for its work in private investigations. Their process is marked by thorough fact-finding and a commitment to confidentiality. They handle sensitive information with the utmost care, ensuring that every aspect of an investigation adheres to legal parameters. Their attention to detail and dedication to delivering accurate results make them a reliable choice for anyone in need of investigative services. One of the most compelling aspects of Lee Ultimate Hacker is their expertise in cryptocurrency recovery. The world of digital currency can be complex and challenging, especially when it comes to recovering lost or stolen assets. Lee Ultimate Hacker stands out in this area due to their deep understanding of blockchain technology and digital forensics. They navigate the intricate networks of cryptocurrency exchanges and regulatory systems with ease, offering effective solutions to individuals seeking to recover their funds. The company’s track record is further supported by numerous client testimonials and case studies, which are available on their website and verified through independent sources. The consistent positive feedback from satisfied clients speaks to the firm’s ability to deliver on their promises. This solid reputation, combined with their extensive expertise in multiple domains, made me feel confident in choosing Lee Ultimate Hacker to handle my cryptocurrency recovery needs. Their combination of transparency, ethical standards, and proven success positions them as a standout option in this field, and I felt assured that I had made the right choice.1 -
I never thought my grandmother's book club would save my crypto fortune, but life is full of surprises. In the mayhem of moving into a new apartment, I mislaid my hardware wallet containing $400,000 in Bitcoin. I had packed it securely-at least, that's what I thought-but after unpacking every single box, it was nowhere to be found. First, I kept my cool. It had to be here somewhere, right? But when hours turned into days, my confidence crumbled. I tore through bags, checked jacket pockets; I even looked in the fridge in sheer desperation. Nothing. Next came panic: Had I thrown it out accidentally? Had the movers taken it? I couldn't get this vision out of my head that somehow my fortune had poofed into thin air. Frustrated and exhausted, I mentioned my predicament to my grandmother during a phone call. Instead of the usual "You should be more careful" speech, she surprised me. Oh, I've heard of a company that helps with that!" she said cheerfully. I almost dropped the phone. My grandma knew about crypto recovery? Turns out, her book club had a guest speaker, a retired cybersecurity expert who raved about Digital resolution services. She even remembered their website. At this point, I would have tried everything. I contacted them, and from the first conversation, I knew I was in good hands. Their staff was professional and patient, above all confident. They asked for detailed questions relating to my wallet, where I last saw it, and how it was backed up. Days later, they cracked the case. Using forensic data recovery and some advanced tracking techniques, they helped me regain access to my lost Bitcoin. It was a feeling of relief that cannot be described because I went from utter dejection to pure joy in a moment. More than a recovery service, Digital resolution services taught me something: never underestimate grandma's wisdom. Now, my hardware wallet is stored safely, with multiple backups, and I will never forget this lesson: when Nana talks, I will listen.
Don't fall victim, reach out to Digital resolution services for any cryptocurrency related issues.
Be safe
muriel halley
1 -
My spouse and I were devastated. What started as a promising crypto investment ended up being a cleverly disguised scam. We had put in a significant portion of our savings money we’d set aside for our children’s future, for emergencies, for peace of mind.At first, everything seemed legitimate.The platform had professional branding, 24/7 support, and even a dashboard that showed our ‘profits’ growing steadily. But when we tried to withdraw a portion of our funds, the excuses started. Then came the silence. Our accounts were frozen, emails ignored, and phone numbers disconnected.It felt like a nightmare we couldn’t wake up from.After weeks of stress, guilt, and sleepless nights, we came across Washington Recovery Pro. Skeptical but desperate, we reached out and it turned out to be the best decision we could have made.They listened without judgment. Their team walked us through every step, carefully gathering evidence, tracking digital transactions, and building a case to trace and recover what we had lost. They were honest about the process it wasn’t magic, and it wouldn’t happen overnight but they assured us it was possible.Weeks later, we received the incredible news: a portion of our funds had been successfully recovered and returned to our account. For the first time in months, we breathed easier. We smiled again.Thanks to Washington Recovery Pro, we reclaimed not just our money, but our hope.
WhatsApp:+1 (903) 249‑86332 -
I finally got around to setting up my own cloud with nextcloud on my own dedicated server.
Just setting up Nextcloud alone was not really the challenge ( I've set up at least 2 Nextcloud instances in the past ).
The actual challenge was to install /e/ OS on my mobile phone and get it to work with my Nextcloud instance.
It's not all performant, buttery-smooth or super-fast yet, but for a one-person / user-cloud, I think it should be just fine.
There's still room for improvement in terms of server-side performance, but it's working fine with the basics at least.
I need to figure / iron out some issues like social federation via ActivityPub not working, Nextcloud SMS not syncing up my SMS, Mail app crashing because I used a self-hosted Nextcloud instance, etc; but those are things I could work on slowly, in the course of time.
No, the server is not physically controlled by me, yet ( it's a dedicated box server though. Still, hosted and physically controlled by a provider ).
I intend on setting up another 'replica' on a RaspberryPi which I will then make primary, connecting to the internet via DynamicDNS.
I'll probably keep the server as a fallback / backup server just in case my home server loses connectivity.
Taking back control from Big Tech is something I intend on pursuing actively this year. I've had the idea in my head for too long that it has started to fester.
This is only a first step, of many, that needs to follow, in order for me to take control back from Big Tech.
Yes, there still is some room for improvement, but I think for now ‒
Mission Accomplished!🤘3 -
HIRE A HACKER FOR BITCOIN RECOVERY CONTACT SLAYER COIN RECOVERY
When I received an official-looking IRS notice claiming I was under audit for my Bitcoin holdings, panic instantly set in. The letter appeared legitimate, outlining issues with my tax filings and suggesting I owed back taxes on my cryptocurrency. Included in the message was a phone number for a "licensed crypto tax consultant" who assured me that this was a serious matter, and the only way to resolve it was by transferring $75,000 in Bitcoin to a “verified IRS wallet” for review. Stressed, overwhelmed, and terrified of potential legal trouble, I didn’t hesitate. I followed the instructions and transferred the Bitcoin, thinking it was my only option. Hours later, I realized I had been scammed.Desperate, I quickly turned to SLAYER COIN RECOVERY, a firm that specializes in recovering stolen cryptocurrency. Their team of experts responded immediately, and after reviewing my case, they identified the scam. The fraudsters had impersonated IRS officials, a tactic commonly used to steal funds from unsuspecting crypto holders. With their expertise, SLAYER COIN RECOVERY legal team began to trace my stolen Bitcoin. Within just a few hours, they pinpointed the wallet where my funds had been sent, linking it to a U.S.-based money mule. A money mule is a middleman who launders stolen funds before transferring them to international criminal networks.Thanks to SLAYER COIN RECOVERY swift action, the experts worked with law enforcement, using cryptocurrency forensic tools to track the funds. They were able to freeze my stolen Bitcoin before the criminals had a chance to move it offshore. In less than 72 hours, I received the incredible news that 100% of my $75,000 had been recovered. According to SLAYER COIN RECOVERY, i2 -
HOW TO HIRE A BITCOIN RECOVERY EXPERT—> DIGITAL HACK RECOVERY
It was one of those days when nothing seemed to go my way, and I hadn’t even gotten my coffee yet. I updated my phone, thinking my life will become easier, but I actually locked my $350,000 Bitcoin wallet out of my device in the act. I cleared out my saved passwords in my update, and I couldn’t access my coins and my wallet. Worst part? I hadn’t taken a backup for such a purpose.
I panicked and, in my state, I chanced to view a review for a restoration service for a wallet on YouTube. I saw a reviewer who experienced a similar debacle, and I couldn’t but sympathize with him. He testified about Digital Hack Recovery, stating that their professionals restored his wallet with ease and professionally. I had nothing to lose, and I took a chance and contacted Digital Hack Recovery and inquired about possibly getting them to work for me, too.
The moment I contacted them, I felt I was in capable hands. The group was incredibly patient, calm, and assuring, a godsend in my state of panic. I communicated my issue—how my phone update cleared my passwords—and they guided me through my next move in language I could understand and follow with ease.
Their process was transparent, beginning to conclusion. They did not go in blind and not tell me what they were about to do; they took the time to notify me of how they planned to go about retrieval, step for step. I appreciated immensely how direct and transparent they were about what I could and could not possibly expect. They did not make any kind of claims about overnight success, but they did make concrete claims, and that helped me not freak out and have trust in them knowing what to do with it.
And to my surprise, in a matter of days, my $350,000 in my wallet was restored to me. I could hardly believe it when I received confirmation. I couldn’t even try and begin to describe the feeling of relief I received when I received it. Not only did they regain access for me to my $350,000, but they even provided me with information about securing my wallet in a smarter way in the future.
In reflection, I saw how important it is to have a sound backup in case your assets in crypto go down—and I happened to have discovered Digital Hack Recovery when I most desperately needed them. I don’t simply appreciate restoration of my monies; I appreciate peace of mind, and I appreciate it for years to come. Talk to Digital Hack Recovery Team through⁚
WhatsApp +19152151930
Website; https : // digital hack recovery . com
Email; digital hack recovery @ techie . com1 -
TRUSTED HACKER TO RECOVER MONEY FROM A BINARY OPTIONS PLATFORM ; CONTACT DIGITAL HACK RECOVERY COMPANY RIGHT NOW
After putting a total of $275,000 into a binary options platform over several weeks, I began to worry when I tried to make a withdrawal and it was unsuccessful. Concerned, I immediately contacted the platform's customer support team via email and phone, hoping for a quick resolution. However, despite my multiple attempts, I received no response. That was when things started to look increasingly suspicious.Weeks went by, and I still hadn’t heard back from the platform. One day, I received an email from them, but instead of processing my withdrawal, they told me that in order to release my funds, I would need to invest even more money. This raised an immediate red flag, and I knew something was seriously wrong. I refused their demand and never received any further communication from them after that.At that point, I realized I had likely been scammed, and I was devastated. It felt like my hard-earned money had simply disappeared, and there was nothing I could do. I felt helpless and frustrated, but I couldn’t shake the feeling that I had to do something to try to recover my funds.Several months later, I came across a thread on an online forum where people were sharing their experiences with Digital Hack Recovery, a company that helped individuals recover money that had been stolen or scammed, particularly in the form of digital currency like Bitcoin. According to the forum, Digital Hack Recovery had helped many people get their lost funds back, and their track record seemed promising.I decided to give it a try and contacted Digital Hack Recovery. They were professional and responsive from the start. After providing them with the details of my case, including the name of the platform I had invested with, they assured me they could help. They asked for additional information to begin the recovery process, and I submitted everything as requested.To my amazement, within just 96 hours, Digital Hack Recovery managed to recover all of my lost funds. It was a relief beyond words, and I couldn’t believe it actually happened. I had almost given up hope, but thanks to Digital Hack Recovery, I got my money back and regained some sense of control.I am incredibly grateful to Digital Hack Recovery for their dedication and professionalism in helping me recover my funds. If you find yourself in a similar situation, I highly recommend reaching out to them. They truly turned a devastating situation into a positive outcome. Reach out to them through⁚
WhatsApp +19152151930
Website; https : // digital hack recovery . com
Email; digital hack recovery @ techie . com
11 -
CONTACT COIN ASSETS RECOVERY TO RECOVER YOUR LOST OR STOLEN BITCOIN AND OTHER CRYPTO ASSETS.
I started investing with an online cryptocurrency platform, only to have my account frozen and my $807,000 savings vanish without a trace. Panic, disbelief, and a crushing sense of helplessness washed over me. My dreams felt shattered. Days blurred into nights as I frantically searched for answers—sending countless emails, making endless phone calls, and scouring online forums fueled by despair. With each passing hour, my hope dwindled, replaced by a gnawing fear that my money was truly lost. Left with no other option, I sought help from crypto recovery specialists. After extensive research, I stumbled upon COIN ASSETS RECOVERY and read numerous positive reviews from other victims they had helped. I reached out, skeptical but clinging to hope, prepared for whatever might come next. From my first email, COIN ASSETS RECOVERY displayed a level of empathy that reassured me. They listened patiently to my story, outlined their recovery process, and kept me informed every step of the way. They became the lifeline I desperately needed. The days that followed were a rollercoaster of emotions. Hope flickered and dimmed but flared again with each update. Gradually, progress was made as COIN ASSETS RECOVERY unraveled the complexities of my case. Finally, the day arrived when I received the news: all $807,000 had been recovered. Tears of relief streamed down my face as I read the confirmation email. It felt like a miracle—a second chance at life. My experience with COIN ASSETS RECOVERY was not just about recovering my money; it restored my faith in humanity and the possibility of justice. Today, I stand not as a victim but as a survivor. This journey is a testament to resilience, the importance of hope, and the incredible work done by COIN ASSETS RECOVERY . If you find yourself in a similar situation, don’t give up. Seek help, reach out, and remember: even in the darkest times, light is waiting to be found. Below is COIN ASSETS RECOVERY CONTACT DETAILS:
Whatsapp: +158064384085 -
Is my iPhone hacked or bugged? [GrayHat Hacks Review] Remove spyware
A few weeks ago, I had noticed my wife acting increasingly suspicious and secretive, and it was as if she knew my every move. I realized that my laptop had become annoyingly slow and would randomly redirect me to unfamiliar websites on its own. My phone would sometimes light up with notifications that I hadn't received. I'm not the most tech-savvy person, but even I knew that something was off. That's when I stumbled upon the term 'spyware' and the horrifying reality of how it could be used to invade someone's privacy.
Desperate to know the truth, I found myself in a dark corner of the internet, searching for a way to get to the bottom of my suspicions. That's when I came across a review for GrayHat Hacks Contractor, a team of ethical hackers well versed in hacking and spywares. I sent them an email detailing my situation and the signs that had led me to suspect my wife. To my surprise, they responded within minutes, offering a free consultation and assuring me of their confidentiality.
They explained their process and the tools they would use to scan my devices for any signs of intrusion. They were incredibly thorough, explaining the different types of spyware that could be planted and the ways they could be hidden. The actual process of detection and removal was done remotely. They provided clear, step-by-step instructions on how to give them secure access to my iPhone and laptop.
The results were shocking. Within a few hours, they had found and removed not one, but multiple instances of spyware on both my phone and computer. The extent of the violation was staggering. My wife had been tracking my location, reading my messages, and even listening in on my calls. I was devastated, not just because of the betrayal, but because I had been living under constant surveillance in what I had thought was a sanctuary of privacy.
Armed with the evidence, I approached my wife with a heavy heart. Through tears and anger, she admitted to installing the spyware, driven by her own insecurities and suspicions. She confessed to an affair that had been going on while I was away on business, a classic case of projection. Turns out that she was the one that was cheating. GrayHat Hacks Contractor not only removed the spywares but also taught me how to protect my devices and privacy in the future.
Our relationship is now a work in progress, filled with healing and rebuilding trust. The pain of her infidelity still lingers, but with the truth out in the open, we can begin to move forward. If you ever find yourself in a situation where you suspect your privacy is being invaded, I urge you to consider contacting GrayHat Hacks Contractor.
-
CAN DIGITAL TECH GUARD RECOVERY HELP YOU RECOVER CRYPTO FROM PHISHING ATTACKS?
WhatsApp: +1 (443) 859 - 2886 Email @ digital tech guard . com
Telegram: digital tech guard recovery . com website link / digital tech guard . com
I matched with Samantha on Tinder thinking the usual: favorite movies, travel dreams, the obligatory "so what do you do? " Instead, over a plate of overpriced sushi, she hit me with "Yeah, I lost $250,000 in crypto once. Digital Tech Guard Recovery got it back." I spat my drink. Excuse me? She laughed. "Yeah, some scam drained my wallet overnight. Thought my life was over. Then I came across Digital Tech Guard Recovery, and they did the impossible." I nodded half in amazement, half in disbelief; this lady must have been exaggerating. I mean, who just casually recovers six figures? Cool story, but that could never be me.
Oh, how foolish of me.
Fast forward two months and the universe decided to make me its punchline. I woke up one morning, checked my crypto wallet, and $400,000 was gone. GONE. Like it had been beamed into another dimension. I stared at my screen in horror, refreshing the app like a maniac. Maybe it was a glitch? Maybe my eyes weren't working? Maybe I was hallucinating from lack of sleep Nope. I had fallen for a Ledger fake update. The panic that followed was unlike anything I had ever felt in my life. I was sweating all over my place like I had just finished running a marathon. My brain short-circuited, replaying every bad decision I'd ever made. How could I be this stupid? And then-I remembered Samantha. I scrolled frantically through our old messages, found the name Digital Tech Guard Recovery, and within minutes, I was on the phone, pleading for them to save my financial life. From the moment they answered the phone, I knew I was in good hands: so calm, professional, and eerily confident that their team analyzed my case, assured me they'd track my funds. I barely slept for days on end, checking my emails like a lunatic, waiting for updates. Then, finally—the call: "We recovered your funds. Every last cent." I just sat in complete shock before bursting into laughter. This was what Samantha had described. This time, it was my life they had just saved. I reached for my wallet, and sure enough—there it was, every single dollar back where it belonged. Relief washed over me hard enough that I almost fell. I wanted to scream and cry and throw a party all at once. Instead, I did the only logical thing: I messaged Samantha. "You're never gonna believe this." She replied instantly. "Let me guess… Digital Tech Guard Recovery? " All I could do was send a thumbs-up. Lesson learned: Never ignore good advice from a Tinder date. Also, check on crypto updates yourself; or better yet, have Digital Tech Guard Recovery watch your back.1 -
RECOVER LOST CRYPTO WITH THE HELP OF FUNDS RECLAIMER COMPANY
I'm a logical individual, I assure you. I don't believe in conspiracies, in reading minds, in messages from the universe "sending me messages." But in hindsight, the universe wasn't sending messages at all – it was holding a sign in my front lawn, screaming at me to pay attention!
My three disparate friends—*in altogether disparate professions—*all mentioned FUNDS RECLIAMER COMPANY in one and the same month, no less. First, my finance buddy told me about how they recovered his $150,000 following a phishing attack. Next, a technology buddy waxed poetic about getting recovered his compromised wallet a week afterward. And then, out of nowhere, my fitness trainer (yes, my fitness trainer) mentioned them when I grumbled through leg day at the gym.
I could have taken down my contact information at that point, but no, I simply chuckled. "Wow, these guys must have been pretty darn talented." And then I continued with my totally secure, totally unpenetrable life in crypto.
And then one morning, I signed in to my wallet and saw the "incorrect password" message I'd been dreading. No problem—I tried again. And then again. And then yet again. With each failure, I crept ever-closer towards a full-fledged meltdown in life.
And then I considered, "No problem, I have my backup key stored!" Except.I hadn't saved it anywhere, in my hyper-care in being ultra-secure, I'd buried it somewhere so secure even I couldn't remember!
And at that point, full-blown panic moved in and started unboxing its bags. $300,000. Gorno.
My head careened out of control. Perhaps I could meditate? Stupidity, I know. Perhaps I could scream? Tempting, I must admit.
Perhaps I could—OH. WAIT
I remembered FUNDS RECLIAMER COMPANY. Same name, three times in one month, appearing in my life. All at once, my three friends no longer seemed mad. I took out my phone and called them.
From my first conversation, I could trust I was in safe hands. Their team sounded relaxed, professional, and obviously in charge of a routine activity. They questioned me with all proper questions, analyzed my case, and began working immediately.
A couple of days later, I received a message: "We recovered your wallet." I sat down in a heap, full of a mix of joy and disbelief at having my life restored in one go. I sent a same message to all three friends: "Fine, you were correct." Their smug messages popped in at once.
Moral lesson? In case three disparate persons report about a single issue, it is no fluke but a heads-up. And when that issue turns out to be FUNDS RECLIAMER COMPANY, make a call even before a disaster can unfold.
Email: fundsreclaimer(@) c o n s u l t a n t . c o m
Email: fundsreclaimercompany@ z o h o m a i l . c o m
WhatsApp:+1 (361) 2 5 0- 4 1 1 0
Website: h t t p s ://fundsreclaimercompany . c o m1 -
It started with a leap of faith—one that nearly cost me everything, last month I stumbled across an investment platform promising “guaranteed high returns” on cryptocurrency holdings. Skeptical but tempted, I poured my entire Bitcoin wallet—worth $190,000 in USDT—into their “elite portfolio,” convinced I was on the brink of financial freedom then, disaster struck, The platform’s interface suddenly went dark. Phone numbers disconnected. Emails bounced back. Panic set in as I realized I’d been scammed. My savings, tied up in a digital currency I couldn’t access, vanished into the ether. For weeks, I spiraled: filing police reports, pleading with blockchain support teams, and scouring online forums for answers. Most responses were bleak. “Crypto scams are irreversible,” But I refused to surrender, During a late-night Google deep dive, I discovered "Dexdert Net Recovery" a cybersecurity firm specializing in crypto asset retrieval. Their website testimonials detailed eerily similar stories, with claims of recovering funds even from “untraceable” scams. Desperation outweighed doubt. I submitted a case file, attaching transaction records, wallet addresses, and every shred of evidence I had.
Within hours, Dexdert Net Pro Recovery responded calmly but urgently: “The longer we wait, the harder recovery becomes. Let’s move.” Dexdert’s team launched a forensic investigation, tracing my USDT through a labyrinth of dummy wallets and offshore exchanges. They explained how the scammers used “chain-hopping” to obscure the trail, bouncing funds across multiple blockchains. But Dexdert’s tools were sharper, Over two weeks, Their experts updated me daily, Dexdert Net Recovery forced the scam platform’s hosting provider to freeze the wallet. Within 48 hours, my $190,000 USDT streamed back into my secure wallet. The relief was visceral—a physical weight lifted off my chest, Today, my Bitcoin sits in a cold wallet, guarded by layers of encryption. I share my story not just as a cautionary tale, but as proof that even in the Wild West of crypto, hope—and the right team—can rewrite endings.
Thanks to Dexdert’s Net Recovery, I reclaimed more than just money—I reclaimed trust in the system.
Contact Dexdert Net Recovery Via:
WhatsApp: (+1 (859) 609‑4156)
Telegram: (@Dexdertprorecovery)2 -
WHERE TO FIND A TRUSTED HACKER FOR ANY HACKING SERVICE = DIGITAL HACK RECOVERY
I had stored my Bitcoin wallet details in a digital note on my phone, thinking it was safe. It seemed like the most convenient option at the time—always accessible and secure behind my phone's encryption. However, my sense of security was shattered when my phone got hacked, and I lost access to my wallet. The moment I realized what had happened, a wave of panic washed over me. I had invested a significant amount of money into Bitcoin over the years, and the value had grown substantially. I was staring at the possibility of losing $400,000, my entire nest egg, in the blink of an eye. The anxiety was unbearable.For weeks, I tried everything I could think of to recover my funds. I consulted with tech-savvy friends, searched endlessly online, and even attempted various recovery tools, but nothing worked. Each failed attempt only heightened my fear that my Bitcoin was gone for good. It was a constant emotional roller coaster—one minute, I felt a glimmer of hope, and the next, I was plunged back into despair. I couldn’t eat, sleep, or think about anything else. I was consumed by the thought of losing everything I had worked so hard to build.Just when I was about to give up, I came across Digital Hack Recovery. At first, I was hesitant. Could I really trust someone to recover my wallet? Would they be able to help, or was this just another dead end? Despite my doubts, I decided to reach out to them—it was my last hope. From the moment I made contact, I felt a sense of relief. The team at Digital Hack Recovery was incredibly professional and understanding. They didn’t just treat me like another client; they treated my case with the urgency and care it deserved. They took the time to understand the details of my situation, and their thoroughness immediately put me at ease.The recovery process was far from easy. There were challenges and setbacks along the way, and there were moments when I feared the worst. But Digital Hack Recovery never gave up. They kept me informed at every step, explaining the technical aspects in a way that made sense and reassured me that they were doing everything possible to recover my Bitcoin. I discovered they had a range of tools and techniques at their disposal that I had never even heard of before—things that went far beyond the standard recovery methods I had tried on my own.After what felt like an eternity, I received the news I had been desperately hoping for—they had recovered my wallet. I was overwhelmed with relief and gratitude. The weight that had been pressing down on me for weeks was finally lifted. Digital Hack Recovery didn’t just recover my Bitcoin; they restored my peace of mind and taught me a valuable lesson about the importance of digital security.If you find yourself in a situation where you’ve lost access to your Bitcoin wallet due to hacking or any other digital mishap, I cannot recommend Digital Hack Recovery highly enough. They went above and beyond to ensure I got back what was rightfully mine. Their expertise, dedication, and compassion made all the difference. I’m forever grateful to them for saving not just my $400,000 but also my sanity. contact them via⁚ WhatsApp +19152151930, Email⁚ digital
hack recovery @ techie . com or visit their Website⁚ https : // digital hack recovery . com
-
CONSULT A LICENSED BITCOIN RECOVERY EXPERT- HIRE SALVAGE ASSET RECOVERY
take a leap of faith. I filled out their consultation form, heart racing with a mixture of hope and apprehension. It felt like throwing a message in a bottle into the vast cyber ocean, praying someone would find it and help me navigate back to shore. Within hours, I received an email from Marcus, one of their lead recovery specialists. His tone was reassuring and professional, filled with an empathic understanding of my plight. He reiterated my fears about scams, explaining that skepticism was a natural response given the ruthless nature of the crypto world. However, he shared a few success stories involving recovered funds, detailing painstaking journeys that resonated with my own. There was something about his honest approach that removed a chunk of doubt from my mind. I scheduled a call with Marcus, where he meticulously walked me through their process. They respected my urgency, treating my case with the seriousness it deserved. Their strategies involved utilizing advanced blockchain forensic techniques that would track down stolen assets through the labyrinth of online chaos. A team of experts patiently monitored developments, pored over transactions, and leveraged networks outside the ordinary realm of recovery protocols. As he spoke, I couldn't help but feel a flicker of hope ignite within me. My next step was to gather every piece of information I had about the transaction—a blurry screenshot, a few emails, and my increasingly frazzled mental state. I sent it all over with a deep breath, a cloud of anxiety hanging overhead. Days turned into nights, and I could hardly maintain my usual routine, my focus drifting toward notifications as if my phone would magically chirp with the triumphant news I yearned for. Just when I felt the flame of hope waning, I got an unexpected call from Marcus. “We have a lead,” he said. My heart pounded louder than anything I'd ever felt—a racing pulse combining both exhilarating hope and crippling anxiety. Over the span of several tension-filled weeks, I remained in close contact with the Salvage Asset Recovery team. They operated transparently, sending me updates regularly, and assuring me that not a moment was wasted in the relentless pursuit of my funds. As days slowly merged into weeks, I learned how meticulous investigation might occasionally feel excruciatingly slow, but they refused to give up. and then it happened. One sunny afternoon, a ping echoed from my phone, a gleaming notification flashing wildly: "Funds Recovered." Stunned disbelief washed over me. The figure before my eyes was not just a number—it was a lifeline, a redemptive shift back to stability. I nearly yelled in excitement. With renewed gratitude, I approached the very same keyboard that earlier had felt more like an anchor than a tool for liberation. I crafted a heartfelt thank-you email to Marcus and the team. Their expertise and unwavering support had facilitated the impossible. In the unpredictable world of cryptocurrency, transparency reigned supreme. Salvage Asset Recovery had proven to be a beacon in chaotic waters—a team driven not just by the quest for profit, but by restoring hope to those caught in its grab. I’d almost lost faith in both technology and humanity, but they restored my belief in second chances—one lost dollar at a time. Reach out to Salvage Asset Recovery via below contact details.
WhatsApp-----.+ 1 8 4 7 6 5 4 7 0 9 6
Telegram-----@SalvageAsset
3 -
I still remember the day I received the phone call that changed my life. I had been a victim of online scams, and I had lost a significant amount of money to a group of cyber thieves. I was devastated, unsure of how I was going to recover from the financial hit. But then, a friend recommended that I reach out to Malice Cyber Recovery, a company that specialized in helping people recover their stolen funds. At first, I was skeptical. I had tried contacting the authorities, but they had told me that there was little they could do to help. I had also tried contacting other recovery services, but they had all promised me the world and delivered nothing. So, why should I trust Malice Cyber Recovery? But, I had nothing to lose at this point, so I decided to give them a shot. I reached out to Malice Cyber Recovery via their website, and I was immediately impressed by their response time. Someone from their team got back to me within the hour, and we started discussing my case. They asked me for all the details of the scam, including the amount of money I had lost and the supposed cryptocurrency wallet address that the thieves had used. Armed with this information, Malice Cyber Recovery launched an investigation into the scam. They worked tirelessly behind the scenes, using their expertise and resources to track down the thieves and locate my stolen funds. I was amazed at how quickly they were able to move, and I found myself checking my email and phone constantly, waiting to hear from them. As the days turned into weeks, I started to lose hope. I was beginning to think that I would never see my money again. But, the team at Malice Cyber Recovery never gave up. They continued to work tirelessly, following every lead, every tip, every hint that might lead them to my stolen funds. And then, one day, they called me with the news that I had been waiting for. They had located the cryptocurrency wallet address that the thieves had used, and they had been able to track down the funds. They informed me that my money was safe, and that they would be able to recover it for me. I was overjoyed. I couldn't believe that I was finally going to get my money back. I felt a weight had been lifted off my shoulders, and I couldn't wait to get my hands on my hard-earned cash. The team at Malice Cyber Recovery walked me through the process of recovering my funds, explaining every step of the way what was happening and when I could expect to see my money. And then, the day finally arrived. My money was transferred back into my account, and I was finally able to breathe a sigh of relief. I had gotten my money back, and I couldn't thank Malice Cyber Recovery enough for their help. They had taken a difficult and stressful situation and turned it into a positive one. As I look back on that experience, I realize just how lucky I was to have found Malice Cyber Recovery. They are a team of experts who truly care about their customers, and they will stop at nothing to help you recover your stolen funds. If you're a victim of online scams, I urge you to reach out to them. They are the real deal, and they will get you the help you need.
1 -
I Could Hardly Breathe! Months of tireless fundraising had finally come through for my small nonprofit, and we had $300,000 in Bitcoin to supply food, shelter, and medical aid to refugees fleeing war. That fund was hope, a future for families who had no other place to turn. It all fell apart in an instant. Our treasurer, a man I'd trusted like a brother, vanished overnight and took the entire fund with him. I was heartbroken. The weight of the people who were depending on us pressed against my chest. I could hardly breathe. I looked at my screen, powerless to do anything as the blockchain ledger confirmed my worst nightmare, the funds had been moved through a series of wallets, vanished into thin air.
Sleepless and remorseful, I consulted a crisis management expert in a desperate phone call. With the calm, panic-slashing tone of her voice, she spoke GRAYWARE TECH SERVICES . Her confidence was the sort that spoke of seen miracles. At that straw of hope, I grasped and called them immediately.
From that first call, GRAYWARE TECH SERVICES treated my case like those refugee lives were in their own hands. Their lead investigator explained their approach, tracing transactions through blockchains, monitoring wallet activity, and leveraging relationships with international exchanges. They explained it all in plain terms, never once making me feel dumb for my ignorance. They understood both the technical complexity and the human stakes.
There were daily progress reports. They followed the laundering path our treasurer had attempted, following the trail through the decentralized exchanges and privacy-focused mixers. Each breakthrough was like a heartbeat resuscitating a stilled chest. On the nineteenth day, they called with the words I had scarcely dared to hope: "We got it back."
I got down on my knees and wept. $300,000 was safely recovered to our nonprofit wallet. But GRAYWARE TECH SERVICES didn't hesitate. They guided us through implementing enhanced security measures, such as multi-signature wallets, cold storage solutions, and rigorous internal oversight. They even advised us on vetting future financial officers.
Our mission is stronger today than ever. Refugee families are still being assisted, and I sleep well knowing our funds are secure. GRAYWARE TECH SERVICES not only retrieved our Bitcoin, they restored my faith in resiliency and human kindness.
1 -
BITCOIN RECOVERY FROM SCAMMERS HIRE ADWARE RECOVERY SPECIALIST
Investing in the hopes of a brighter future, we embarked on a journey to secure our family’s financial well-being. Like many, we were drawn to the promises of binary trading, where gains seemed easy and the potential rewards endless. With our sights set on creating lasting memories for our loved ones, we decided to invest $100k, believing that it would yield the returns we had been dreaming of. Unfortunately, our optimism quickly turned to despair. After a few months of initial progress, everything suddenly crumbled. The brokers we were working with, who had once seemed so trustworthy, became unreachable. Their phone lines went silent, their accounts became inaccessible, and their websites vanished into thin air. WhatsApp info:+12723 328 343 What we thought was a calculated risk turned out to be a catastrophic betrayal. The weight of losing such a significant amount felt unbearable. Our dreams of providing for our family were in jeopardy, and for a while, it seemed like all hope was lost. It was during this dark period that I stumbled upon ADWARE RECOVERY SPECIALIST, an online recovery service. Initially, I was hesitant. I had already been through so many false promises, so the idea of reaching out to yet another service felt daunting. But what convinced me to take the leap was the overwhelming number of positive reviews and recommendations from friends who had faced similar situations. Their stories of recovery gave me a sense of hope that perhaps this time, things could be different. From the moment I reached out to ADWARE RECOVERY SPECIALIST, I was impressed by their professionalism and transparency. They took the time to understand my case thoroughly and laid out a clear plan of action. Their team was dedicated, working tirelessly to track down and recover the funds we had lost. Throughout the process, I felt informed and supported every step of the way. Thanks to their expertise and unwavering commitment, we were able to recover a significant portion of our funds. More importantly, their service restored a sense of security and peace to our lives. The stress and anxiety that had clouded our days began to dissipate, and we found ourselves cherishing the simple joys once again. If you’re in a similar situation, I wholeheartedly recommend reaching out to ADWARE RECOVERY SPECIALIST . Their transparency, dedication, and success rate speak for themselves. I’m confident they can help you recover your lost funds, just as they helped me rebuild my financial future. Don’t wait take the first step toward restoring what’s rightfully yours today.1 -
HOW TO HIRE A HACKER TO HELP ME RECOVER MY STOLEN FUNDS— HIRE DIGITAL HACK RECOVERY COMPANY
When I received an email claiming I had been selected for a government grant of $30,000, I was excited. As a small business owner in Florida, this seemed like a fantastic opportunity to help my business grow. The message looked official, complete with government logos and persuasive language, explaining that I just needed to pay a processing fee upfront to receive the funds. Trusting that it was legitimate, I paid the $15,000 fee, believing the grant money would soon be deposited into my account.But after several days passed without any sign of the promised $30,000, I began to get concerned. When I tried to reach out to the contact provided in the email, the phone number was disconnected, and the email bounced back. That’s when it hit me—I had been scammed. The $15,000 I had paid was gone, and I didn’t know how to get it back.That’s when I turned to Digital Hack Recovery. I knew I needed help recovering the lost funds, and Digital Hack Recovery specializes in helping victims of online fraud. After reviewing my case, they quickly identified that I had fallen for a fake government grant scam. The fraudsters had used highly convincing tactics, including fake government logos and official-sounding messages, to trick me into paying for a non-existent grant.Digital Hack Recovery acted swiftly, guiding me through the steps of reporting the scam to the Federal Trade Commission (FTC), the Better Business Bureau (BBB), and the U.S. Department of Justice (DOJ). They also helped me contact my bank to initiate a chargeback and worked with government agencies and financial institutions to trace the fraudulent transactions.Thanks to Digital Hack Recovery’s persistence and expertise, I was able to recover $14,500 of the $15,000 I had lost. While not all of the funds were recoverable due to the fraudsters’ efforts to launder the money, I was relieved to get most of it back. The entire process was complicated, but Digital Hack Recovery made it manageable, keeping me informed and handling the intricate details.This experience taught me a valuable lesson about being cautious with unsolicited offers, especially those that require upfront payments for government grants or loans. I’m incredibly grateful for the help I received from Digital Hack Recovery, not only for recovering my funds but also for ensuring I’m better prepared to protect myself from future scams. Contact Digital Hack Recovery via⁚
WhatsApp⁚ +1(915)2151930
Webpage⁚ https : // digital hack recovery . com
Email⁚ digital hack recovery @ techie . com
1 -
Quick question.
I feel like I'm quickly developing a Bitcoin addiction. I've figured out how to backup my wallet to 'The cloud's by saving a file to Google drive in case I lose or spike my phone. Tested it out, it works. Got like 98% faith that the crypto is safe as far as not being able to access it like the dogecoin that's sitting on a phone that I still need to repair the screen of. First it was 20$, then 40$ in the BTC ATM. Felt like magic.
My question is:. Is you're opinion of me stupid?14

