Canvas login uchicago
James Madison University
2011.04.06 20:05 Breadley James Madison University
A community of current, former and future Dukes!
2019.08.28 00:00 chiicha Los Angeles Valley College
Post anything related to LAVC.
2011.05.03 04:08 UNCC 49ers
2023.06.03 17:09 MEYO6811 Meta Business Suite is ABSOLUTE GARBAGE And Mark Zuck is an idiot.
[Rant]
The posting ‘editor’ on Meta is absolutely awful and I, for the life of me, can not fathom how or why Mark Zuck has let the ball drop so hardcore and to this degree.
I handle social media marketing for several clients and the postings simply are not responsive between Facebook and Instagram and it’s mind boggling.
Zuck has purchased IG and WhatsApp, then spent the better part of 5 years throwing money into VR and the result has been Facebook completely dieing and organic marketing becoming nonexistent. No longer are ads optimized for smaller or localized business and the sizing for different posts is insane.
Using canva I created a:
— IG Story to be posted on both IG and FB. According to the size perimeters it should be equal and look fine. NOPE! On IG mobile and desktop the post looks fine. On mobile FB, the story looks fine. On Facebook Desktop it looks BLURRY AS FUCK and completely unprofessional. [also the 15 sec limit per slide is utter bullshit for business, especially considering reels has a 60 second cap. as a business or user in general, a ‘story’ should not have to be edited down to 15 second slides. Its dumb and clunky.
— FB/IG video post — 😤 welp. if/when I use meta suite, the “video” on Facebook is a 50/50 chance that the formatting is off, showing a profile video in a landscape box. And when I post on IG, IG now converts all video post into reels, so the bet thing to do is create a reel video in canvas right? No. Wrong! because REELS on IG do not automatically format properly when shown on the profile grid. Meaning, once upon a time, you would attempt to have proper structure and a ‘look’ for your profile grid, but now heads are chopped off and logos are not being shown. And the editor within Meta effing sucks. Slow loading, can’t properly preview postings, can’t upload or use the same music if used on mobile, etc. It’s FRUSTRATING
— and the ADS! The sizing and edit options for ADs is a whole other topic and discussion. But to some it up its shit. Also I’m sick and tired of all their ‘updates’ that are ‘designed to be useful’ when they are not useful at all. The new ‘omni ad maker’ for sales only lets you market to whole countries, not cities or states 🤬 So if I’m having an event in Washington, I would have to use my ad spend to show ads to all of the US. That’s dumb and doesn’t help me or my client.
Also, the ads no longer ‘work’ unless you are spending 1k on ad spend. I have clients with a 1k ad spend budget and clients with a $200 ad spend budget, and guess what? My client who spend $200 and has pixels and blah blah, does not get his ADs optimized in 7 days, and they are just taking his money. And don’t get me started on them changing the words/copy of the AD 🤬🤬🤬. Whether selling Botox or magic cleaner, the AD needs to be informative, not edited down to display 1 sentence then “click for more”.
100% FRUSTRATED that Meta has gone to shit, Facebook simply is a joke, and Instagram (desktop) isn’t supplied with proper EDITING TOOLS. (you are only allowed to login 4 accounts to one mobile device, so using mobile to schedule daily posts isn’t ideal. And you should be able to edit the cover of a video post after it’s been posted! My IG Profile Grids look so unorganized and un professional, and the fact that I have been deleting posts 2 minutes after viewing them on the selected platforms is just idiotic.) Also, the lack of optimization for small/local businesses is shitty. Show my ads to the right people please, not some randos in a different STATE, that you want calling me on WhatsApp 😤
Rant Over.
Zuck needs to fix his shit.
Edit to say: I just want to know what this guys game plan is. Is he no longer trying to help local businesses or sellers? Or trying to actually be innovative? All the ad updates are completely over complicated and does not produce results. And the various sizes between platforms is simply ridiculous. Is it that hard to make posts “responsive” in there own editor??! I’m convinced the only marketers turning a profit from meta are the annoying YouTube gurus attempting tutorials 😒
submitted by
MEYO6811 to
marketing [link] [comments]
2023.06.01 18:31 ComeAndSeeth How can I create a Carousel Indicator at the bottom of the Carousel?
Hi guys, Can i see a draft or sample code that has Carousel Indicator in it? I tried searching for it in documentation of Kivy MD and found nothing, I wanna try to add a indicator to see where the current active slide is at. Thank you!
here is my code:
from kivy.uix.screenmanager import Screen from kivy.lang import Builder kv=''' : canvas: Color: rgba: 0.941, 0.886, 0.835, 1 Rectangle: pos: self.pos size: self.size BoxLayout: orientation: "vertical" # pos_hint: {'center_x': 0.5, 'center_y': 0.7} Carousel: direction: "right" Image: source: 'images/cacaostart1.png' size_hint: None, None size: "300dp", "300dp" pos_hint: {'center_x': 0.5, 'center_y': 0.7} Image: source: 'Images/cacaostart2.png' size_hint: None, None size: 300, 300 pos_hint: {'center_x': 0.5, 'center_y': 0.7} Image: source: 'Images/cacaostart1.png' size_hint: None, None size: 300, 300 pos_hint: {'center_x': 0.5, 'center_y': 0.7} MDLabel: text: "Welcome to Cacao Guard" halign: "center" pos_hint: {"center_x": .5, "center_y": .4} MDFillRoundFlatButton: text: "Start" font_size: "18sp" font_name: "Raleway-Black.ttf" text_color: "white" md_bg_color: "#A08264" line_color: (0, 0, 0, 0) pos_hint: {"center_x": .5, "center_y": .2} on_release: root.go_to_login_screen() ''' Builder.load_string(kv) class Start(Screen): def go_to_login_screen(self, *args): self.manager.current = "login_screen"
submitted by
ComeAndSeeth to
kivy [link] [comments]
2023.05.31 19:29 ai-lover 30 Free AI Tools To Try Now
Dall-E is an image-generation tool developed by OpenAI. It harnesses the power of Artificial intelligence (AI) to generate images based on user textual prompts.
Nvidia Canvas is a Windows software that uses AI algorithms to turn brushstrokes into artwork. This software requires an Nvidia RTX graphics card to operate effectively.
Whisper is an online transcription tool that utilizes language models developed by OpenAI. It allows users to transcribe audio files accurately and efficiently.
Playform is an online application that converts sketches into artwork using AI algorithms.
YouChat is another tool that enables users to have conversations and ask questions, similar to ChatGPT.
NotionAI is a tool that allows users to create text inside any Notion document by utilizing prompts. Press the space bar to use it.
Riffusion is a music generation tool that transforms text descriptions into musical compositions. This AI-powered tool enables users to generate music based on their textual inputs.
Buzz is an offline version of Whisper designed for Windows. It offers unlimited usage without the need for an internet connection.
Summarize.tech is a tool for summarizing YouTube videos. While it may provide fewer in-depth summaries than other tools, it does not impose any usage limits.
Genmo is a tool that converts still images into animations using text prompts. It harnesses the power of AI to transform static visuals into dynamic and captivating animations.
OtterPilot is a feature integrated into the Otter meeting assistant. It transcribes and summarizes video calls, making it easier to review and reference important discussions.
The Runway is a versatile photo and video editor integrating AI-powered tools. These tools include green screen effects, image expansion, 3D texture creation, and more.
SkimIt.ai offers a convenient way to obtain summaries of articles. Users need to email the article link to
[email protected], and within 10 minutes, they will receive a resume in response.
MacWhisper is the Mac version of the Whisper offline transcription tool. Users can pay what they want for its usage or purchase the tool.
Boomy is a tool that allows users to generate custom music tracks by specifying the genre, instruments, and production values. This tool will enable users to create personalized music suited to their preferences.
Sonoteller.ai is a tool designed for music enthusiasts. By pasting a link to a song on YouTube, users can obtain an analysis of its lyrical content, instrumentation, genres, and moods.
El Pintador is a Stable Diffusion artwork generator designed for iOS devices, offering the ability to generate artwork.
WordTune Read is a tool that enhances the reading experience by displaying article and PDF summaries alongside the full text.
DiffusionBee is an offline Stable Diffusion artwork generator designed for MacOS. This tool allows users to generate artwork without any usage limits, even when offline.
Poe is a conversational AI developed by Quora, featuring multiple assistants with different strengths. Currently available for free and is compatible with iPhones.
NeevaAI is an AI-powered search tool that aims to provide users with direct responses generated by AI models. Citations accompany these responses.
Stable Diffusion Online is an artwork generator that utilizes the algorithm. It allows users to create unique and visually appealing artwork without the need to log in.
PicsArt AI Writer is a tool that enables users to generate various types of written content, including marketing copy, slogans, and product descriptions.
Eightify is a tool that provides text summaries of YouTube videos. It offers highlights within the outline, allowing users to click on specific sections to jump directly to that part of the video.
Gimme Summary is a Chrome extension that summarizes web articles by leveraging ChatGPT.
Beatoven is a music creation tool that allows users to generate custom music tracks by specifying the genre and mood.
Free content creation tool for blog posts, articles, and more. Easy to use and versatile.
AI-powered text generation platform. Human-like content creation without coding skills.
AI tool for faster summarization and content production. Extracts key points and writes summaries or blog posts. English support, more languages coming soon.
GFP-GAN, is a free AI tool that restores old photos within seconds. By merging two AI models, it fills in missing details with realistic precision, achieving a remarkable balance between authenticity and fidelity.
submitted by
ai-lover to
coolaitools [link] [comments]
2023.05.31 16:35 Unable-Guest9773 2FA authentication w/ Microsoft authenticator is incredibly annoying
Every week or so I have to clear browsing data to login to Canvas. My Microsoft student e-mail is constantly confused as to which email it should use (NID or my registered knights email).
Is there any way to opt out of this? Super annoying
submitted by
Unable-Guest9773 to
ucf [link] [comments]
2023.05.31 04:59 ProOnlineClass Delta Math Answers
| Updated: 30 May 2023 Delta Math Answers Have you been searching for the best Delta Math answers available online? Look no further than pro online class, a premier Delta Math Answer service that provides value for your money. Many students wonder which service to select owing to the several firms promising high-quality services, but our site promises high quality at affordable prices. To understand more about our services in relation to Delta Math, please keep reading. Pay someone to take my online class What Is Delta Math? Delta Math is an online platform that offers students from grade 6 to AP levels practice problems in a variety of subjects such as Algebra 1 and 2, geometry, calculus, and computer science. Teachers use this platform to assign math problems to students and provide instant feedback once completed, as well as tests, which students like yourself can place an order on our site to get assistance with. Is Delta Math Free? Yes. This technology is free for teachers and students alike. This has led to its surge in popularity, with thousands of teachers and millions of students using it. With just an email address, an instructor can get started on this package. It offers cheat prevention, student time stamps, and premade problem types. However, your instructor may prefer to use advanced packages such as Delta Math Plus and Delta Math Integral due to their additional features. The Delta Math Plus subscription package costs $95 annually and offers extra features such as classroom integration, group assignments, category sub-types, video assignments, and maps to standards. Alternatively, your class may be using Delta Math Integral, which offers bulk data export, printing, and integration with other platforms such as Canvas, Schoology, or Clever. How Does Delta Math Work? Your instructor will use their details, such as school email, to access the platform. You will receive a class course code that allows you to use the platform. Once you complete a test, it is automatically graded, and you can view the results. As we advise students when they place an order for Delta math help on our site, they can also view solutions and explanations, allowing them to continue practicing. Why Do Teachers Like Using Delta Math? Thousands of teachers across the country use this platform to enhance their classrooms. The numbers keep steadily growing, and while competitors are present, many wonder what sets Delta Math apart. This integrated platform, much like other technologies, offers several benefits to its users, such as: - Alignment with common core standards
Common core standards refer to the basic math concepts students are required to learn to solve everyday problems. Simply put, it sets standards for what students should learn in math from kindergarten to high school. Currently, 41 states and four territories states apply these standards , so Delta Math applies them and is seeking to expand coverage to all 50 states soon. Additionally, Delta Math plans on including comparisons of student performance in comparison to the standards. It promotes equity in learning, but many critics claim that it promotes a fragmented learning process. Depending on the topic and student level, your instructor can formulate different types of assignments such as standards. Additionally, they can form unique questions for each student and separate others into categories based on difficulty. One can also form a list with an unlimited number of questions that can help students focus on problem areas such as Algebra. Teachers require tools to properly assess student progress to maximize their educational growth. Delta Math is popular in this regard as it allows teachers to view the time students spent on each question and if they got the answers correct. Certain packages, such as the Integral, also have a feature to export grades to applications such as Excel. The Student Last Action button also allows teachers to view the student’s last steps on the platform. This tool is especially beneficial for tracking students who may be having difficulty with their work or time management skills. The Delta Math platform is remarkably user-friendly for the functionality it offers. Registration requires basic information, but data is safely stored in their servers, thus preventing cheating or data theft. As a result, both students and teachers can benefit from this resource with ease, unlike other platforms, which are more complex and require training to utilize properly. Are you in need of a high-quality, 100% plagiarism free essay or online class help?Place your order and get 100% original work. GET FREE QUOTES Unlike other platforms, Delta Math offers users several features to assist teachers. These include the test correction feature and random student caller, which allow teachers to supplement student class activities. For example, if a teacher wants to highlight a student’s weakness they should focus on, the test correction feature allows that. As a result, the platform is very convenient as it does not require add-ons to enhance usability. How Can You Find Answers To Delta Math? The majority of students use Delta Math for arithmetic. This subject requires them to progress from simpler levels to more complex ones. Regular practice is essential to ensure you remain adept at certain skills and acquire new ones. Unfortunately, many students lack a positive attitude, prior knowledge, and proper understanding hence failing in math and other technical subjects. For this reason, they seek assistance from external sources such as our Delta Math homework help services which allow students to improve their grades with ease. How To Hack Delta Math? To hack Delta Math, log in and right-click on Inspect. Select inspect element and proceed to ‘How To Find Answers. This option contains a code that has all the answers. However, you may benefit from our Delta Math tutoring services. While receiving a Delta Answer key may help you breeze through your assignments, you may not fully grasp concepts, and this can affect your exam grades. Using our personalized tutoring sessions allows you time with a math expert of your choice to explain concepts you need help with. Not only are these sessions affordable, but you are also guaranteed the expertise of a qualified tutor; hence you will receive value for your money. Simply log in and select the ‘exam prep’ option, and a support representative will contact you to seek more details. Can Delta Math Detect Cheating? No, the website does not utilize proctor software for tests. While they may request certain data from the user, they only use this to develop and improve their website but not to track students. However, the tests and assignments are timed to test your speed which is a key ability when handling math. As a result, you may spend too much time researching and cause delays when using separate tabs, which your instructor may think is suspicious, so you need to be quick when using references. Why Choose Us For Delta Math Answers Help? The internet contains millions of resources, and there is an abundance of Delta math answer key service providers similar to ours. In the age of bought or fake reviews, this can lead clients to confusion as they do not know who to trust. However, we have amassed a wide following due to offering tangibles to our clients: As a student, you obviously want to seek help without fear of getting exposed to your institution and getting punished for plagiarism, which constitutes the act of passing off another person’s work or ideas as your own, is a serious academic offense, and leads to punishment. We guarantee complete anonymity, so you can be sure that once you procure our services, we will not divulge any information such as your school, card and payment details, or identity to any individual or entity. Additionally, our website is fully encrypted, and staff has to sign a confidentiality agreement before starting work to guarantee professionalism. Most instructors offer assignments with a short duration, so students have to complete each quickly. Additionally, they have to deal with multiple assignments. If you are in a rush, you can reach out to us and place an order for Delta Math answers with the deadline and other details attached, and we can begin the bidding process to ensure your paper is completed by an expert who understands the timeframe provided. - Expertise in a variety of subjects
Math is a broad subject. As you advance, you and your peers will select various sub-topics, such as algebra or geometry, to specialize in. While some service providers do not have the relevant experts for this, we offer help with a variety of topics such as delta math answers algebra 2. Additionally, Delta math offers computer science practice resources, a field in which we are adept. - Diverse services provided
Customers have diverse needs. At one point, they may desire a delta math answer key but may prefer tutoring and exam prep services in another instance. Our company understands this and allows you to choose from a selection of exam prep tutoring or answer keys such as Delta Math answers algebra 2help, thus setting us apart from the competition. This versatility encourages clients to continue booking our services, thus increasing our customer base and loyalty. This is also in part due to the consistent quality despite the diversity of needs the students may have. Unlike other brands, our pricing is based on a bidding process. You simply register or login for Delta Math questions stating your project details and budget, then wait for the many experts available on our site to begin placing their bids. This system allows you to save while meeting the expert halfway and letting them choose tasks with time, payment, and topics they are comfortable with. Frequently Asked Questions Other than Delta Math answers, what other answer key services do you provide? Yes! Other than Delta Math, you can also place an order for IXL answers, Wileyplus Answers, Cengage answers, McGraw Hill answers, CPM answers, WGU test answers, Saylor Academy answers, Inquizitive answers, and GINA Wilson answers. Simply click on the option you are searching for on the menu, upload the instructions, and let us handle the rest. Do you offer discount services for students seeking Delta Math answers? Yes! From time to time, usually on an annual basis, you can benefit from our discounts which we offer repeat clients. However, despite the occasional offers, you will be pleasantly surprised to find that we offer consistently low prices in comparison to our competition and the quality offered. I lost my Delta Math login credentials. How do I recover them? In some cases, Delta Math allows your teacher to access your email logins and attempt to reset your password. If this fails, initiate a password recovery request or reach out to the support team at [ [email protected]](mailto: [email protected]). I missed a Delta Math assessment deadline. Can I take it later? Yes! After explaining to your instructor that you were unable to take the test, they can assign a future time. This allows the student to take the test without other students accessing it at that later time. Alternatively, your instructor may allow grouping where they can assign students once they complete their tests. What does a penalty in Delta Math mean? A penalty in Delta math refers to the deduction of points due to wrong answers. Instructors implement this to ensure students are keen on their work. Depending on the topic's complexity, your instructor may offer two or three attempts before the answer is wrong and their total points are reduced. This also applies when you press to give up on a question. Conclusion In summary, Delta Math is an innovative and integrative platform that offers students practice and assessment solutions for grades 6 to 12. Known for its ease of use, Delta Math allows teachers to manage their classrooms more efficiently by tracking time spent on certain assignments and allowing students to view step-by-step solutions to all problems covered. Additionally, the platform also offers beneficial resources for students seeking Computer science courses. Many students using this educational platform also seek Delta Math answer key and exam prep services. The main issue is that many such services are subpar, leaving many students unsatisfied and wary. This is not the case for us, a premier writing service that guarantees quality and versatile Delta Math answers service at affordable prices. To begin, simply click the link to register and place your order today and start your journey to academic growth. submitted by ProOnlineClass to u/ProOnlineClass [link] [comments] |
2023.05.28 07:46 techtimee What is my job? What am I doing?
I landed a technical support job at an office, job description was basic and the only other thing on there was "help with some projects" at the very bottom, earning $19/hour, with the flexibility to work remotely. On my first day, the owner requested small changes using Power Platform and canvas apps, to which I confessed my lack of knowledge. The owner assured me that I could undergo Microsoft training to become certified. However, the IT guy who was supposed to guide me seemed disinterested and disclosed that turnover was high in this workplace. He shared that he no longer did much and warned me that the workload was overwhelming.
Despite my initial reservations, I proceeded with the job, fulfilling daily system checks and assisting with software setups while gradually learning Power Platform. Unexpectedly, the IT guy vanished for days without explanation, but the owner seemed unfazed by his absence. When the IT guy reappeared, he casually mentioned working for another company and expressed apathy towards the tasks at our office. Told me he was the 3rd IT guy in 1.5 years and that to not take the job seriously. As time went on, the owner increasingly assigned me additional responsibilities, such as managing marketing campaigns across various platforms and even creating website variants and acquiring domains. My doubts grew as I compared my limited background in technology to the qualifications of the previous employees who had left the company.
Consequently, I devoted significant personal time to learning outside of working hours to keep up with the demands placed upon me as I knew I could learn, and figured it to be my "foot in the door" job for the industry. 3 months in I got a raise to $23 and a promise of 65k in 1 year. But then the owner just suddenly piling things on and when I pushed back, would say "Just do one thing at a time then". IT guy up and quit one day and we never heard from him again in the office. He did call me personally though and say that he landed a job making $35/hr and that working in that office was the worst thing ever. He told me I should quit too, that he saw how hard I was working, but that I'd just burn out and that he barely ever worked when he was in the office anyway, because it was terrible and not an IT job at all.
Here's what I've been doing since month 2:
1) Manage marketing platforms(Google ads, Facebook ads, Microsoft ads, Youtube)
2) Power platform, canvas apps, power automate, forms, solutions
3) Dynamics CRM
4) Website building, form creation, integrating forms into power automate for other stuff. No development account(s). All flows and so forth are created using personal accounts and you need to login using those personal credentials of people long gone, or make co-owner as you go along. Almost every single flow was deprecated or broken.
5) Purchasing and managing domains on 3, yes, 3 different hosting/domain sellers with one being defunct and having been a pain to get the domain back.
6) Asked to create multi national websites with their own variants, forms, emails etc
7) Maintenance of all hardware in the office, all with CPU's/Memory/HDD's from early 2000's. Not a single PC past 2009! No backups, simple passwords, admins everywhere etc. No windows updates on some important systems...
8) Managing multinational telephone systems and IVR's
9) Literally asked to write code for "in house" programs or tools, when I do not code and is not my job description.(Put my foot down at this point)
10) Asked to transfer financial data to a online service and move charts of accounts and so forth after their accountant walked out(We've been through 2 accountants in the few months I've been there).(Again a hard no as some stuff could not even be translated 1:1 according to the platform they wanted to move things to)
11) Azure Active Directory management...that wasn't even being paid for and an utter mess
12) Integrations with countless, and I mean \countless* other platforms, services that half were broken or nobody was paying attention too, but were doing all manner of things on the website, office systems, etc. So many defunct and causing problems.*
13) When talking about workload and how almost everyday it's "Can we add this?" "Can we do this?" "I want us to work on this" and we need more people, being told "Can you go online and find some freelancers? We can pay them $30". First of all, I am fine with them being paid more than me if they can code or dance around power platform, etc. But what an insult regardless despite all the work that I do. Secondly, why can't we just hire someone so that we can have a working relationship and build a team?!
So I'm not even sure wtf my job is at this point. The owner says I'm a "Tech lead", but the job ad said "Office IT support". I looked up what a tech lead is and freaking laughed, because WHO am I to lead here anyway when they refuse to hire an actual IT/software team?
Anyway. How much should I be making for all this stuff I deal with? I looked up various jobs such as "power platform developer", "system admin", "website development", etc and the salaries are pretty good individually; but this dude is paying me $23 right now. I asked for 65k right now last month, but he said "The economy is kind of poor right now, let's talk again in a year". So now I'm thinking "This guy just wants me to fix and do everything, then maybe, maybe I'll get 65k. But is this not worth more than that anyway?" He promised, promised me raises to 65k every 3 months. I got one decent raise and the last one was, I kid you not, $0.50. It took everything I had not to tell him just to keep it.
Arghh, I'm beginning to see why everyone bails out before a year is even complete! I'm just trying to help out my family so the extra income and being able to work remote is nice, but good grief.
submitted by
techtimee to
ITCareerQuestions [link] [comments]
2023.05.27 15:20 wehaveagoodbingo Dave & The Foos have done something to my brain - I think they broke it.
A bit wordy - but it's somewhat therapeutic/cathartic to write this out.
Prior to Thanksgiving Weekend 2021, I hadn't listened to a Foos Album in its entirety since The Color and The Shape. Embarrassingly, I didn't even know that Taylor Hawkins was the drummer (yes, I've flogged myself as punishment for being a douche). Only song I had of the Foos outside of the ripped version of TCATS was the accostic version of Times Like these from Skin & Bones.
Rewind to the Saturday after Thanksgiving, I'm bored and flipping through Youtube videos and I stumble across Nandi Bushell's video when she took the stage in LA to play Everlong. I was blown away, not only by her drumming but by the fact that the Foos had her onstage. I watched the related videos about how that came about and was like "How fucking cool is that?".
The rest of the weekend and following days, I watched almost every video regarding Dave and the Foos I could, downloaded every album and recording I could. I watched Back and Forth, Studio City, Sonic Highways, the Cradle-to-Stage series, Kiss Guy video, the Garage Tour (how fucking cool is that), fans playing, and endless clips of Dave and Taylor. Fresh Pots. Dave's Book and I even saw Studio 666 in the theater with 3 other people. I also became a big fan of their "down-to-earth" mindset, self-deprecating humor, and work ethic. I am sure there is dark shit somewhere, but everyone's got bones in their closet. WTF?!?
My musical tastes have been hard rock & grunge, Zep, AC/DC, Ozzy, Dio, Nirvana, Pearl Jam, NiN, et al. but I can't recall being affected by a band's music the way the Foo Fighters music had on me. The last time I felt anything remotely close to that was in 1980 when I first heard Back in Black. Pearl Jam came close on a few occasions but not like this. Since that weekend, I rarely listen to anything else other than the Foos. WTF is happening here.
Another thing happened at that time - I felt compelled to pick up my guitar for the first time in over 20 years and play. I had stopped in the late 90s due to an arm injury and partial paralysis in my right hand (long story). My picking ability was lost due to a lack of dexterity. I would get pissed and eventually give up. But now, I felt like playing. Started with the basic exercises, fired up Ultimate Guitar Tabs and started tacking their acoustics first. My wife, who enjoyed me playing prior to the injury was like WTF?!. My kids didn't even know I could play. They knew I had a guitar but never saw or hear me play it. The FOOs music really motivated me through the frustration and enjoyed playing again. Yeah, it was basic compared to Zep or Yes, but it felt great. When I was younger, I only played the "stuff of stature" like Zep, Floyd, and more of the intricate metal because I thought the hard shit was really cool but this had a different effect on me. Did I suffer some form of Psychological break?
Of course, now I had to see them live. I saw them once when they warmed up for the Stones at Giants Stadium (now Metlife) in `97 and at the time I said to my friend "Oh, this is that guy from Nirvana". I think Taylor had just joined and they just release TCATS. I ended up getting tickets for Citi Field for July `22 - I was fucking pumped...but as we all know, that never happened. I woke up on Saturday March 26, 2022, which also happens to be my birthday, and did what I normally do. Coffee, login to check emails to see if there were any happenings from Friday, turn on my cable tv app to listen to the news while I canvas happenings, and I heard the news that Taylor had passed. At first, I was in shock and thought I just misheard it and then it repeated 20 or so minutes later. I fucking started crying. 56 years old, married 23 years, three grown kids and I am fucking crying for the first time in over 30 years. I felt guilty because I never got to the point of crying when my Mom or Dad passed - don't know why - I guess they were both expected and I had time to accept it in advance but hearing about Taylor struck some fucking nerve deep in my soul and I couldn't control my reaction. By this time, my steady diet of all things Dave, Taylor, and the Foos made me feel like I knew them. I was heartbroken (as I write this, On the Mend just started playing - fuck me).
So, it's been 1.5 years since my "Foo re-discovery" and have put a lot of thought into why I still feel this strongly about this people in this band and their music (my wife thinks I'm fucking batshit crazy now). I think it boils down to two things - the feeling I get when I listen to their music combined with how I see them as people. Not perfect but down to earth and passionate about what they do. I mean, does anyone else know of another frontman for a band that fell off of a 12 foot stage and broke their fucking leg that got back on the stage an hour later and finished the fucking show???? That's legendary shit right there. Looking forward to seeing them live soon in Asbury Park in September.
It's possible they didn't break my brain, but fixed it. I'd been in a funk/rut for a few years prior to November `21. I feel more positive now that I've been infected with FOOVID-23. I swear, The Pretender, Bridge Burning, Rope, These Days, Times Like These, and even Congregation can instantly change my mood.
I am happy and hopeful about the Footure with the new album coming out (diggin' it so far) and hitting the road but I wish I had gotten to witness Dave and Taylor switch positions and see Taylor belt out a Queen song. It won't be the same, but here we are.
submitted by
wehaveagoodbingo to
Foofighters [link] [comments]
2023.05.26 08:58 MuLoginBrowser Show You How to Choose a Truly Useful Antidetect Fingerprint Browser
| https://preview.redd.it/z32r17qbj42b1.jpg?width=700&format=pjpg&auto=webp&s=f45505704311d98831384fee78764f89426d1760 Sellers who are engaged in e-commerce platforms such as Amazon, eBay, and Shopify know that if we need to run multiple stores on these platforms, need to use multiple accounts for store reviews and do SEO and advertising on Facebook and Instagram, we usually need to use an antidetect fingerprint browser as well. The Antidetect fingerprint browser mainly solves the problem of accounts being associated and blocked. In recent years, an increasing number of antidetect browser tools have emerged. Some of these tools are just a flash in the pan and don't make much of a splash, while others are sincere in providing users with real anti-detect technology and services. So how do you find a browser that truly prevents accounts from being associated and blocked? Here are some tips on how to choose a beneficial anti-detect fingerprint browser. Why would a website consider an account to be a suspicious risk account? First, we need to know that websites identify an account as a suspicious risk account for four main reasons: - multiple account logins on the same computer.
- unstable IP addresses.
- false account identity information.
- abnormal operation behavior.
The last three points are mainly personal operation problems of users and will not be explained in detail in this article. To prevent websites from detecting that we are logged into multiple accounts on the same computer, we usually modify or hide the hardware's Canvas, WebGL, audio fingerprint, etc. For example, we can use MuLogin Antidetect Fingerprint Browser to disguise the above fingerprints. Users can set up different profiles through MuLogin Antidetect Browser with 100% secure isolation, canvas fingerprint protection, and a very good anti-leakage effect. How to choose an anti-detect fingerprint browser? A good anti-detect fingerprint browser, in addition to effectively hiding the browser fingerprint environment, also needs to meet the team collaboration needs of e-commerce operations, such as account security management, privacy handling, risk control, team management, etc. This is the standard of a good anti-detect fingerprint browser. Account Permission Control The permission control of master and child accounts in team management mainly solves the organizational structure problem in team management. Different levels of users use different levels of permission functions. Sub-account unified management It mainly solves the unified allocation and authorization management of sub-accounts, clarifies the functions of sub-accounts, and ensures the reasonableness of account permissions and budget. If there is a personnel adjustment, the account can be adjusted to retrieve in time. Multi-account grouping management to prevent confusion and errors Multiple browser accounts can be categorized into different groups and authorized to be managed by different team members to prevent confusion and misuse when the number of accounts is large. Simple automation operation MuLogin Antidetect Fingerprint Browser Automation allows you to automate tasks in MuLogin browser profiles. From creating simple automation scripts to complex web crawlers that can search, collect, and interact with web data. Feel free to visit the website for more details and sign up for a free trial test! submitted by MuLoginBrowser to u/MuLoginBrowser [link] [comments] |
2023.05.26 08:56 MuLoginBrowser Show You How to Choose a Truly Useful Antidetect Fingerprint Browser
| https://preview.redd.it/finb0nnvi42b1.jpg?width=700&format=pjpg&auto=webp&s=9b6c5b47b2f56f38d69846e3458a7e9bda71e3a8 Sellers who are engaged in e-commerce platforms such as Amazon, eBay, and Shopify know that if we need to run multiple stores on these platforms, need to use multiple accounts for store reviews and do SEO and advertising on Facebook and Instagram, we usually need to use an antidetect fingerprint browser as well. The Antidetect fingerprint browser mainly solves the problem of accounts being associated and blocked. In recent years, an increasing number of antidetect browser tools have emerged. Some of these tools are just a flash in the pan and don't make much of a splash, while others are sincere in providing users with real anti-detect technology and services. So how do you find a browser that truly prevents accounts from being associated and blocked? Here are some tips on how to choose a beneficial anti-detect fingerprint browser. Why would a website consider an account to be a suspicious risk account? First, we need to know that websites identify an account as a suspicious risk account for four main reasons: - multiple account logins on the same computer.
- unstable IP addresses.
- false account identity information.
- abnormal operation behavior.
The last three points are mainly personal operation problems of users and will not be explained in detail in this article. To prevent websites from detecting that we are logged into multiple accounts on the same computer, we usually modify or hide the hardware's Canvas, WebGL, audio fingerprint, etc. For example, we can use MuLogin Antidetect Fingerprint Browser to disguise the above fingerprints. Users can set up different profiles through MuLogin Antidetect Browser with 100% secure isolation, canvas fingerprint protection, and a very good anti-leakage effect. How to choose an anti-detect fingerprint browser? A good anti-detect fingerprint browser, in addition to effectively hiding the browser fingerprint environment, also needs to meet the team collaboration needs of e-commerce operations, such as account security management, privacy handling, risk control, team management, etc. This is the standard of a good anti-detect fingerprint browser. Account Permission Control The permission control of master and child accounts in team management mainly solves the organizational structure problem in team management. Different levels of users use different levels of permission functions. Sub-account unified management It mainly solves the unified allocation and authorization management of sub-accounts, clarifies the functions of sub-accounts, and ensures the reasonableness of account permissions and budget. If there is a personnel adjustment, the account can be adjusted to retrieve in time. Multi-account grouping management to prevent confusion and errors Multiple browser accounts can be categorized into different groups and authorized to be managed by different team members to prevent confusion and misuse when the number of accounts is large. Simple automation operation MuLogin Antidetect Fingerprint Browser Automation allows you to automate tasks in MuLogin browser profiles. From creating simple automation scripts to complex web crawlers that can search, collect, and interact with web data. Feel free to visit the website for more details and sign up for a free trial test! submitted by MuLoginBrowser to u/MuLoginBrowser [link] [comments] |
2023.05.25 01:07 patopansir My personal arkenfox useroverrides.
Sharing is caring. I won't update this unless you request it, but updates are rarely necessary. Here's the purpose of this useroverrides.
- Provide documentation for settings I'll probably want to enable/disable. This documentation is way shorter and less detailed than the original, and it only shows settings that are relevant to me.
- Provide minimal improvements to privacy(mainly) and security that are not applied by default (I agree with the documentation that these changes, most of them listed under extra, will have very little to no effect in improving arkenfox, but I still either don't like these features or feel like disabling them.)
Settings that I had enabled are uncommented, this includes personal changes that reduce privacy/security/experience. I had for example disabled saving passwords because I already use a password manager. I didn't touch any setting I did not understand. If you suggest changes, I'll likely won't put them in because it is a personal list after all. It's more of a service to me than to others. Here's the file's contents
https://pastebin.com/WN2MbEDi // https://github.com/arkenfox/user.js/wiki/3.2-Overrides-%5BCommon%5D // Extras, to disable just uncomment. user_pref("browser.safebrowsing.malware.enabled", false); // 0401 Safe Browsing user_pref("browser.safebrowsing.phishing.enabled", false); // 0401 Safe Browsing user_pref("browser.safebrowsing.downloads.enabled", false); // 0402 no checks for downloads user_pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false); // 0404 no checks for downloads user_pref("browser.safebrowsing.downloads.remote.block_uncommon", false); // 0404 no checks for downloads user_pref("browser.send_pings", true); // 0610 Enforce "No Hyperlink Auditing" user_pref("network.trr.mode", 5); // 0710 Disable DNS-over-HTTPS user_pref("network.http.windows-sso.enabled", false); // 0906 disables automatic authentication on Microsoft sites user_pref("privacy.cpd.downloads", true); // 2820 not used, see note above... what note? user_pref("privacy.cpd.openWindows", false); // 2820 Session Restore user_pref("privacy.cpd.passwords", false); // 2820 user_pref("privacy.cpd.siteSettings", false); // 2820 user_pref("browser.privatebrowsing.autostart", true); // 5001 Start in Private Browsing user_pref("signon.rememberSignons", false); // 5003 Disable saving passwords user_pref("extensions.formautofill.addresses.enabled", false); // 5017 Disable Form Autofill user_pref("extensions.formautofill.creditCards.enabled", false); // 5017 Disable Form Autofill user_pref("extensions.formautofill.heuristics.enabled", false); // 5017 Disable Form Autofill // Extras that break user_pref("security.mixed_content.block_display_content", true); // 1241 disable insecure passive content (such as images) on https pages user_pref("layout.css.font-visibility.private", 1); // 1402 Limits fonts user_pref("layout.css.font-visibility.standard", 1); // 1402 Limits fonts user_pref("layout.css.font-visibility.trackingprotection", 1); // 1402 Limits fonts user_pref("dom.security.https_only_mode_pbm", true); // 1244 HTTPS-Only mode in all windows // user_pref("dom.security.https_only_mode.upgrade_local", true); // 1245 1244 HTTPS-Only mode for local user_pref("media.peerconnection.ice.no_host", true); // 2004 Protects ip in trusted scenarios, can break video conferencing user_pref("media.gmp-provider.enabled", false); // 2020 Disable Gecko Media Plugins user_pref("media.gmp-widevinecdm.enabled", false); // 2021 Disable widevine CDM (content decryption module) user_pref("privacy.antitracking.enableWebcompat", false); // 2702 disable ETP web compat features // Adds features users want // user_pref("browser.download.useDownloadDir", true); // 26/51 This is confusing. If set to true, Firefox won't ask where do you want to save the file and just put it in the download dir. I am confused because I swear setting it to true would achieve this, but it's not doing that anymore. It's also not on user.js, so there should had been no reason for Firefox to prevent me from changing this setting from the settings menu. I am so confused. // user_pref("browser.startup.page", 0); // 0102 set startup page. 0=blank, 1=home, 2=last visited page, 3=resume previous session(2811) // user_pref("privacy.clearOnShutdown.history", false); // 0102 option 3 depends on 2811 clearOnShutdown user_pref("keyword.enabled", true); // 0801 Search through web search. If you manually select the search engine instead, it will still work // user_pref("privacy.clearOnShutdown.cache", false); // 2811 don't clear cache on shutdown // user_pref("privacy.clearOnShutdown.downloads", false); // 2811 don't clear downloads history on shutdown // user_pref("privacy.clearOnShutdown.formdata", false); // 2811 don't clear form data on shutdown // user_pref("privacy.clearOnShutdown.history", false); // 2811 don't clear history on shutdown // user_pref("privacy.clearOnShutdown.sessions", false); // 2811 don't clear http login sessions on shutdown (not cookies) // Websites fixes // user_pref("network.http.referer.XOriginPolicy", 0); // 1601 Can break some sites. #1 issue. Use Smart Referer extension (Strict mode + add exceptions) // user_pref("media.eme.enabled", true); // 4501 RFP #2 issue. Install Canvas Blocker // user_pref("media.eme.enabled", true); // 4504 Letterboxing #2 issue. // user_pref("webgl.disabled", true); // 4520 Disable WebGL // user_pref("media.eme.enabled", true); // 2022 enables all DRM content // More features users want user_pref("privacy.clearOnShutdown.siteSettings", true); // 2811 clear site settings on shutdown. Uncomment to disable user_pref("privacy.clearOnShutdown.openWindows", true) // 2812 clear open windows on shutdown. Uncomment to disable user_pref("privacy.clearsitedata.cache.enabled", true); // 2816 set cache to clear on exit. Uncomment to disable // user_pref("browser.cache.disk.enable", true); // 1001 enable disk cache, can improve performance // user_pref("privacy.clearOnShutdown.cache", false); // 2811 don't clear cache on shutdown // user_pref("browser.sessionstore.privacy_level", 0); // 1003 save extra session data. 0=everywhere, 1=unencrypted sites, 2=nowhere // user_pref("pdfjs.disabled", false); // user_pref("pdfjs.enableScripting", false); // 2651 Open PDFs // Less Likely Website Fixes // user_pref("network.IDN_show_punycode", true); // 2619 Messes with non-latin alphabets. // user_pref("privacy.clearOnShutdown.cookies", false); // 2815 don't clear cookies on shutdown // user_pref("privacy.clearOnShutdown.offlineApps", false); // 2815 don't clear offline apps on shutdown // user_pref("privacy.window.maxInnerWidth", 1600); // user_pref("privacy.window.maxInnerHeight", 900); // 4502 Max site resolution. idk what resolution is the default // user_pref("security.ssl.require_safe_negotiation", false); // 1201 Breaks old websites with outdated security, vulnerable to MiTM // user_pref("security.OCSP.require", false); // 1212 Certification errors // user_pref("security.cert_pinning.enforcement_level", 0); // 1224 Strict PKI/Public Key Pinning. MOZILLA_PKIX_ERROR_KEY_PINNING_FAILURE // user_pref("extensions.enabledScopes", 5); // user_pref("extensions.autoDisableScopes", 15); 2660 lock down allowed extension directories. This is not the setting that disables it // user_pref("javascript.use_us_english_locale", false); // 02011 Restricts Firefox locale to english. // user_pref("network.dns.disableIPv6", false); // 0701 Disable IPv6. Router already disables it but some websites may still have an issue. // Android Fixes // user_pref("browser.download.useDownloadDir", false); // Allows longtapping and saving images. // Extras copy and paste from user.js /*** [SECTION 5500]: OPTIONAL HARDENING Not recommended. Overriding these can cause breakage and performance issues, they are mostly fingerprintable, and the threat model is practically nonexistent ***/ /* 5501: disable MathML (Mathematical Markup Language) [FF51+] * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=mathml ***/ // user_pref("mathml.disabled", true); // 1173199 /* 5502: disable in-content SVG (Scalable Vector Graphics) [FF53+] * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+svg ***/ // user_pref("svg.disabled", true); // 1216893 /* 5503: disable graphite * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+graphite * [2] https://en.wikipedia.org/wiki/Graphite_(SIL) ***/ // user_pref("gfx.font_rendering.graphite.enabled", false); /* 5504: disable asm.js [FF22+] * [1] http://asmjs.org/ * [2] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=asm.js * [3] https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ ***/ // user_pref("javascript.options.asmjs", false); /* 5505: disable Ion and baseline JIT to harden against JS exploits * [NOTE] When both Ion and JIT are disabled, and trustedprincipals * is enabled, then Ion can still be used by extensions (1599226) * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+jit * [2] https://microsoftedge.github.io/edgevposts/Super-Duper-Secure-Mode/ ***/ // user_pref("javascript.options.ion", false); // user_pref("javascript.options.baselinejit", false); // user_pref("javascript.options.jit_trustedprincipals", true); // [FF75+] [HIDDEN PREF] /* 5506: disable WebAssembly [FF52+] * Vulnerabilities [1] have increasingly been found, including those known and fixed * in native programs years ago [2]. WASM has powerful low-level access, making * certain attacks (brute-force) and vulnerabilities more possible * [STATS] ~0.2% of websites, about half of which are for crytopmining / malvertising [2][3] * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=wasm * [2] https://spectrum.ieee.org/tech-talk/telecom/security/more-worries-over-the-security-of-web-assembly * [3] https://www.zdnet.com/article/half-of-the-websites-using-webassembly-use-it-for-malicious-purposes ***/ // user_pref("javascript.options.wasm", false); /* 5507: disable rendering of SVG OpenType fonts ***/ // user_pref("gfx.font_rendering.opentype_svg.enabled", false); /*** [SECTION 6000]: DON'T TOUCH ***/ /* 6050: prefsCleaner: reset previously active items removed from arkenfox FF102+ ***/ // user_pref("beacon.enabled", ""); // user_pref("browser.startup.blankWindow", ""); // user_pref("browser.newtab.preload", ""); // user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", ""); // user_pref("browser.newtabpage.activity-stream.feeds.snippets", ""); // user_pref("browser.region.network.url", ""); // user_pref("browser.region.update.enabled", ""); // user_pref("browser.ssl_override_behavior", ""); // user_pref("devtools.chrome.enabled", ""); // user_pref("dom.disable_beforeunload", ""); // user_pref("dom.disable_open_during_load", ""); // user_pref("extensions.formautofill.available", ""); // user_pref("extensions.formautofill.addresses.supported", ""); // user_pref("extensions.formautofill.creditCards.available", ""); // user_pref("extensions.formautofill.creditCards.supported", ""); /*** [SECTION 7000]: DON'T BOTHER ***/ /* 7001: disable APIs * Location-Aware Browsing, Full Screen, offline cache (appCache) * [WHY] The API state is easily fingerprintable. Geo is behind a prompt (7002). * appCache storage capability was removed in FF90. Full screen requires user interaction ***/ // user_pref("geo.enabled", false); // user_pref("full-screen-api.enabled", false); // user_pref("browser.cache.offline.enable", false); /* 7002: set default permissions * Location, Camera, Microphone, Notifications [FF58+] Virtual Reality [FF73+] * 0=always ask (default), 1=allow, 2=block * [WHY] These are fingerprintable via Permissions API, except VR. Just add site * exceptions as allow/block for frequently visited/annoying sites: i.e. not global * [SETTING] to add site exceptions: Ctrl+I>Permissions> * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings ***/ // user_pref("permissions.default.geo", 0); // user_pref("permissions.default.camera", 0); // user_pref("permissions.default.microphone", 0); // user_pref("permissions.default.desktop-notification", 0); // user_pref("permissions.default.xr", 0); // Virtual Reality /* 7003: disable non-modern cipher suites [1] * [WHY] Passive fingerprinting. Minimal/non-existent threat of downgrade attacks * [1] https://browserleaks.com/ssl ***/ // user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false); // [DEFAULT: false FF109+] // user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false); // [DEFAULT: false FF109+] // user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false); // user_pref("security.ssl3.ecdhe_rsa_aes_256_sha", false); // user_pref("security.ssl3.rsa_aes_128_gcm_sha256", false); // no PFS // user_pref("security.ssl3.rsa_aes_256_gcm_sha384", false); // no PFS // user_pref("security.ssl3.rsa_aes_128_sha", false); // no PFS // user_pref("security.ssl3.rsa_aes_256_sha", false); // no PFS /* 7004: control TLS versions * [WHY] Passive fingerprinting and security ***/ // user_pref("security.tls.version.min", 3); // [DEFAULT: 3] // user_pref("security.tls.version.max", 4); /* 7005: disable SSL session IDs [FF36+] * [WHY] Passive fingerprinting and perf costs. These are session-only * and isolated with network partitioning (FF85+) and/or containers ***/ // user_pref("security.ssl.disable_session_identifiers", true); /* 7006: onions * [WHY] Firefox doesn't support hidden services. Use Tor Browser ***/ // user_pref("dom.securecontext.allowlist_onions", true); // [FF97+] 1382359/1744006 // user_pref("network.http.referer.hideOnionSource", true); // 1305144 /* 7007: referers * [WHY] Only cross-origin referers (1600s) need control ***/ // user_pref("network.http.sendRefererHeader", 2); // user_pref("network.http.referer.trimmingPolicy", 0); /* 7008: set the default Referrer Policy [FF59+] * 0=no-referer, 1=same-origin, 2=strict-origin-when-cross-origin, 3=no-referrer-when-downgrade * [WHY] Defaults are fine. They can be overridden by a site-controlled Referrer Policy ***/ // user_pref("network.http.referer.defaultPolicy", 2); // [DEFAULT: 2] // user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2] /* 7010: disable HTTP Alternative Services [FF37+] * [WHY] Already isolated with network partitioning (FF85+) ***/ // user_pref("network.http.altsvc.enabled", false); /* 7011: disable website control over browser right-click context menu * [WHY] Just use Shift-Right-Click ***/ // user_pref("dom.event.contextmenu.enabled", false); /* 7012: disable icon fonts (glyphs) and local fallback rendering * [WHY] Breakage, font fallback is equivalency, also RFP * [1] https://bugzilla.mozilla.org/789788 * [2] https://gitlab.torproject.org/legacy/trac/-/issues/8455 ***/ // user_pref("gfx.downloadable_fonts.enabled", false); // [FF41+] // user_pref("gfx.downloadable_fonts.fallback_delay", -1); /* 7013: disable Clipboard API * [WHY] Fingerprintable. Breakage. Cut/copy/paste require user * interaction, and paste is limited to focused editable fields ***/ // user_pref("dom.event.clipboardevents.enabled", false); /* 7014: disable System Add-on updates * [WHY] It can compromise security. System addons ship with prefs, use those ***/ // user_pref("extensions.systemAddon.update.enabled", false); // [FF62+] // user_pref("extensions.systemAddon.update.url", ""); // [FF44+] /* 7015: enable the DNT (Do Not Track) HTTP header * [WHY] DNT is enforced with Tracking Protection which is used in ETP Strict (2701) ***/ // user_pref("privacy.donottrackheader.enabled", true); /* 7016: customize ETP settings * [WHY] Arkenfox only supports strict (2701) which sets these at runtime ***/ // user_pref("network.cookie.cookieBehavior", 5); // [DEFAULT: 5 FF103+] // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault", true); // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation", true); // [FF100+] // user_pref("privacy.partition.network_state.ocsp_cache", true); // user_pref("privacy.query_stripping.enabled", true); // [FF101+] [ETP FF102+] // user_pref("privacy.trackingprotection.enabled", true); // user_pref("privacy.trackingprotection.socialtracking.enabled", true); // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true] // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true] /* 7017: disable service workers * [WHY] Already isolated with TCP (2701) behind a pref (2710) ***/ // user_pref("dom.serviceWorkers.enabled", false); /* 7018: disable Web Notifications * [WHY] Web Notifications are behind a prompt (7002) * [1] https://blog.mozilla.org/en/products/firefox/block-notification-requests/ ***/ // user_pref("dom.webnotifications.enabled", false); // [FF22+] // user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+] /* 7019: disable Push Notifications [FF44+] * [WHY] Push requires subscription * [NOTE] To remove all subscriptions, reset "dom.push.userAgentID" * [1] https://support.mozilla.org/kb/push-notifications-firefox ***/ // user_pref("dom.push.enabled", false); /* 7020: disable WebRTC (Web Real-Time Communication) * [WHY] Firefox desktop uses mDNS hostname obfuscation and the private IP is never exposed until * required in TRUSTED scenarios; i.e. after you grant device (microphone or camera) access * [TEST] https://browserleaks.com/webrtc * [1] https://groups.google.com/g/discuss-webrtc/c/6stQXi72BEU/m/2FwZd24UAQAJ * [2] https://datatracker.ietf.org/doc/html/draft-ietf-mmusic-mdns-ice-candidates#section-3.1.1 ***/ // user_pref("media.peerconnection.enabled", false);
Since these are being used on a new system I had barely used, with time, more settings would be enabled by default as I encounter more issues. Next time I make a post like this, I might provide multiple useroverrides files instead of one. Currently, this is a file I used when I had mostly only needed to access my web servers and do some minimal browsing to install applications. Next time, I'll probably shorten the list of not recommended changes, despite not being recommended some can be used as a personal preference. Example: Disabling desktop notifications. You can perfectly do so on the Firefox settings, but it's useful in case you for some reason want to disable it this way anyways. These settings are useful.
submitted by
patopansir to
u/patopansir [link] [comments]
2023.05.23 10:22 Potential-Diamond416 SQL connector - security
Hi guys I have made a canvas app with SQL as the main connector. Users can access tables from the PowerApp and update or add records. In SQL I have given users read and write access, but how can I ensure that users can’t login to the database and delete the whole model? Can I have read and write rights for users but deny login to the database in SSMS?
submitted by
Potential-Diamond416 to
PowerApps [link] [comments]
2023.05.22 18:02 SmortJacksy I’m in my study hall for the next 4 hours and it’s all I can think about
2023.05.22 16:12 Sparklepaws First time hardening a browser (Firefox). Any recommendations? User.js listed.
Hey guys! Recently I decided it was time to harden my browser, which is something I have very little experience with. I have some loose privacy requirements:
- I want to eliminate trackers, popups, fingerprinting and referals wherever possible.
- I don't want to sacrifice too much convenience, such as: Login to other sites using Google, Netflix EME, third-party videos, tab recovery (CTRL+Shift+T), history, specific site login session cookies and WebGL.
I understand this is a tall order, considering some of those goals conflict. I'm willing to change things as needed to find a fair middle-ground between both worlds.
Any suggestions and/or observations you can make would be greatly appreciated, thanks so much for your time! Here is my current user.js for reference. Note that some of the configurations have been reverted back to the original true/false states to fix some site features that broke as a result of changing them:
UPDATE: The original list of parameters I posted contained an overwhelming number of parameters; essentially a copy/paste of my entire user.js file. As suggested, I have removed the congestion. The information below is appended to my arkenfox user.js file and contains each modification made to the parameters (loosely separated by association):
user_pref("extensions.pocket.enabled", false);
user_pref("media.eme.enabled", true);
user_pref("network.http.referer.XOriginPolicy", 0);
user_pref("privacy.clearOnShutdown.downloads", false); // [DEFAULT: true] user_pref("privacy.clearOnShutdown.history", false); // [DEFAULT: true] user_pref("privacy.clearOnShutdown.sessions", false);
user_pref("webgl.disabled", false);
user_pref("privacy.resistFingerprinting", false); user_pref("privacy.resistFingerprinting.letterboxing", false);
user_pref("signon.rememberSignons", false);
user_pref("browser.urlbar.suggest.history", false); user_pref("browser.urlbar.suggest.bookmark", false); user_pref("browser.urlbar.suggest.openpage", false); user_pref("browser.urlbar.suggest.topsites", false);
user_pref("browser.taskbar.lists.enabled", false); user_pref("browser.taskbar.lists.frequent.enabled", false); user_pref("browser.taskbar.lists.recent.enabled", false); user_pref("browser.taskbar.lists.tasks.enabled", false);
user_pref("browser.download.folderList", 2);
user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+] user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+] user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
user_pref("alerts.useSystemBackend.windows.notificationserver.enabled", false);
user_pref("app.update.background.scheduling.enabled", false);
user_pref("keyword.enabled", true); user_pref("browser.startup.page", 1); user_pref("browser.startup.homepage", "
https://duckduckgo.com/");
user_pref("network.dns.disableIPv6", false);
My addons are:
- uBlock Origin
- Canvas Blocker
- Toggle Referrer
submitted by
Sparklepaws to
privacy [link] [comments]
2023.05.19 17:06 Dragonflydaemon Free element sort missing
Is anyone else having a problem where the "free" sort option has gone missing?
Before I started working in my current position, someone else had used the pro version of Canva for our login (we share a login for our team of 4ish people instead of using a team setting). When I first started, I just used my own Canva account to find things since I didn't have the option to sort for free on the shared account. However, that option has also gone missing on my personal account too.
Now, everything is pro and I'm having a super difficult time with finding elements that are usable for my projects that are free to use.
Is anyone else having this issue? How do I fix it so I can sort for free again? Do we need to delete the payment attached to the account (even though we're not paying for anything now, it's still there)?
submitted by
Dragonflydaemon to
canva [link] [comments]
2023.05.18 20:09 N7FAN4EVER Microsoft Account??
So, I was trying to login into Canvas to check my final grades for this semester. Apparently a Microsoft Account is required. Is anyone noticing this or is it just me? Does anyone why this required in the first place?
submitted by
N7FAN4EVER to
CSN_Coyotes [link] [comments]
2023.05.18 17:17 Adventurous-Ear9433 Hopi & Sumerians, Ancient accounts of cataclysms, New DNA findings
The Codex Aubin , Aztlan was a place where the Aztecs were subject to the Azteca Chicomoztoca - the tyrannical elite. To escape the Chicomoztoca, the Aztecs fled Aztlan, led by their priest . In the legend, the god Huitzilopochtli told them they could not use the name Azteca, and they would be known as Mexica. This is the sun called Nahui-atl, '4 water.' Now the water was tranquil for forty years, plus twelve, and men lived for the third and fourth times. When the sun Nahui-atl came there had passed away four hundred years, plus two ages, plus seventy-six years. Then all mankind was lost and drowned, and found themselves changed into fish. The sky came nearer the water. In a single day all was lost, and the day Nahui-xochitl, '4 flower,' destroyed all our flesh... (Plato says the islands sank in a single night)[
Footprints of Tarawa Apkallu Maya Popul Vuh details the 3 sons of the Kings of Quiche "determined to go as their fathers had ordered to the East, on the shores of the sea whence their fathers had come, to receive the royalty, 'bidding adieu to their brothers and friends, and promising to return.' Doubtless they passed over the sea when they went to the East to receive the royalty. .And when they arrived before the lord Nacxit, the name of the great lord, the only judge, whose power was without limit, behold he granted them the sign of royalty and all that represents it . . ." - Plato saying 'the King's of Atlantis held dominion over the great opposite continent'. He says of their religious beliefs that "they made no regular sacrifices but fruits and flowers; they worshipped the sun."
In Peru a single deity was worshipped, and the sun, his most glorious work, was honored as his representative.
Quetzalcoatl, the founder of the Aztecs, condemned all sacrifice but that of fruits and flowers.
"The first religion of Egypt was pure and simple; its sacrifices were fruits and flowers; temples were erected to the sun, Ra, throughout Egypt." In Peru the great festival of the sun was called Ra-mi...
Again from the Popul Vuh, is the dire character of the disaster. It says that the roar of fires was heard above. The earth shook and things revolted against man. It rained tar with water. The trees were swinging, houses crumbling, caves collapsing. Then day became black night. The Chilam Balam of Yucatán asserts that the motherland of the Mayas was swallowed up by the sea amid earthquakes and fiery eruptions in a very distant epoch. An indian tribe Paria, used to live in Venezuela, in a village with so significant a name as Atlan. They had a tradition of a calamity which had destroyed their country, a large island in the ocean. A perusal of American Indian mythology discloses an interesting fact that over 130 tribes have legends of a world catastrophe.
thought id share this article 1923 LA Times -A People of Mystery:Lemurians on Mt Shasta it's an interesting read Lhasa Record (Buddhas,Tibet)-"
They sought refuge in their temples and citadels, and the wise Mu - the Hieratic Ra Mu - arose and said to them: did I not predict all this? And the women and the men in their precious stones and shining garments lamented 'Mu, save us!' and Mu replied: 'You shall all die together with your servants and your riches, and from your ashes new nations shall arise. If they forget they are superior not because of what they put on but what they put out the same will befall them"
• Hopi believe the Father Creator is KA. The Sumerians believed the Father Essence was KA. • The Hopi believe Taiowa, the Sun God, is the Creator of the Earth. The Sumerians believe TA.EA was the Creator. • The Hopi believe two brothers had guardianship of the Earth. The Sumerians believed two brothers had dominion over the Earth.
• The Hopi believe Alo to be spiritual guides. The Sumerians believed AL.U to be beings of Heaven. • The Hopi believe Kachinas (Kat'sinas) are the spirits of nature and the messengers and teachers sent by the Great Spirit. The Sumerians believed KAT.SI.NA were righteous ones sent of God.
• The Hopi believe Nan-ga-Sohu is the Chasing Star Katsina. The Sumerians believed NIN.GIR.SU to be the Master of Starships(Egyptian-Sahu- stars of Orion)
"Man does not know. For man often forgets. But they know. The stones know, And they remember. Airships were flying. Came pouring a liquid fire. Came flashing The spark of life and death. By the might of spirit Stony masses ascended. Scriptures guarded wise secrets. And again all is revealed"
Hopi "Down on the bottom of the seas lie all the proud cities, the flying patuwvotas, and the worldly treasures corrupted with evil..."
This article was published recently & was fascinating to me personally, because it specifically highlighted the Ainu of Japan.
American Journal of human genetics- Japanese/Chinese in Americans - In Australia-Perth the Ko Ka or Kokka people came from a place called Shurin and was later changed to Quairading by the English. Totem is the Koya and there is a mt Koya in Japan. Also their town called Wagin, the same in Japan.
Nature-DNA South Americn,Native American, Sub Saharan African in latin America Y chromosome East Asia Genetic Evidence for Convergent Evolution Twenty individuals each from the following populations were typed on the Affymetrix 10K whole-genome sampling assay (WGSA) Mapping Array (Santa Clara, CA): West African (Mende from Sierra Leone), Island Melanesian (Nasioi from Bougainville), South Asian (Indians from Andhra Pradesh), Native American (Nahua from Mexico), East Asian (Chinese and Japanese from Coriel Human Cell Repository)
"Like its northern counterpart (R1b-M269), R1b-V88 is associated with the domestication of cattle in northern Mesopotamia. Both branches of R1b probably split soon after cattle were domesticated, approximately 10,500 years ago (8,500 BCE). R1b-V88 migrated south towards the Levant and Egypt. The migration of R1b people can be followed archeologically through the presence of domesticated cattle, which appear in central Syria around 8,000-7,500 BCE (late Mureybet period), then in the Southern Levant and Egypt around 7,000-6,500 BCE (e.g. at Nabta Playa)
This was the stele Flinders Petrie himself uncovered in Abydos,
Kings of Anu: Tera-Neter. That's the divine script, it says Het-U :Temples , of the God Seth, Net Annu-u-Cities of the people of Anu, Tera-Neter: devoted to the 1 God. The Sumerian Kings list tells us the antediluvian patriarchs founded the Kish Dynasty (Egypt, india,Syria, Ethiopia). Anu was also regarded as the Divine Source of Human Kingship.According to the earliest Egyptian traditions Osiris was also an Anu. It is the Anu who invented architecture, writing , irrigation and dry agriculture in the Nile Valley. According to the DNA & archaeological evidence cited above, these people domesticated cattle near Göbekli Tepe, then migrated to Egypt. So the legends of Enki’s 7 Lineages bringing Arts & civilization to humanity after the cataclysm are supported by science.
Going further, Abul Hasan Ali Al-Masudi, an Arab historian from the 10 th century A.D., wrote about ancient Egypt and the methods he alleges they used to move massive stones, including those used to build the pyramids . He claimed that a magic papyrus imprinted with symbols was placed under each stone, after which a metal rod was struck against the stone to initiate the levitation process. What scientist recently achieved
acoustic tractor beam According to Al-Masudi, the stone would be guided along a fenced path with metal poles placed on each side. Some believe these poles could have been used to create high-frequency sound vibrations, which would have been responsible for creating the levitation effects."In Egyptian mythology the falcon god horus is associated with harpoons, the clearest evidence for sonic drilling has been staring us in the face for millennia. One common symbol or object that is seen so often in ancient Egyptian art is the ‘scepter’. It appears in relics art and hieroglyphs associated with the ancient Egyptian religion. It is a long straight staff with a forked end. I've previously cited the Was Scepter & at sites like Pictish, & Abernathy you see not only the tuning fork but the hammer right beside it. There are TONS of Was scepters at Cairo museum with string in-between the forked ends that vibrate when plucked.As for energy, indigenous African cultures have been using the Geothermal energy of the Earth's faults for a long time. In the recent thread was an article about Indigenous Kenyans /Corp who produce Geothermal energy and how successful the project has been over the past few years. The Anatolian fault is probably the largest in the world, and the only Aquifer bigger is found in Africa...where Egypt built their civilization....
Foundations are the stones......the water. The answers have always stared us in the face.
For the Egyptians, they didnt place titles like "Book of...." so the title "Book of the Dead" is a Western addition, like much of the names and places youre familiar with. Egypt has the most ancient texts, artifacts, traditions that speak of that sunken mother country.
The true title of "the book of the Dead"(Vignette 81) the divine script shows a head, which represents Egypt.As shown by the headdress.The head has arisen out of a lotus, The lotus is shown as dead and closed. In the vignette the lotus is dead Mu.
Translated it reads: "The Egyptians came from Mu, a land which is dead and exists no more."
"I am a pure lotus" means: "I am a pure descendant from the people of Mu." "Sprung from the Field of the Sun" corroborates the lotus. "The Field of the Sun" also means the Empire of the Sun, the imperial name of Mu.
Mu in the tongue of the Motherland meant: "mother, land, field, country, empire" and "mouth." A free reading means
"I am an Egyptian of pure descent; my forefathers came from the motherland Mu, the Empire of the Sun, which is now dead and gone." The indigenous groups i mentioned last time each still believe in Duat & carry the sacred knowledge of The Egyptians, Inca, Naga-Maya & have death cults responsible for burial ceremony which symbolizes the deceased returning to the "motherland that sank in the West". That's why false doors in Egypt were placed on the Western Wall, where the Goddess of the West could bring nourishment for the Ka.( Valley of the Kings on the West Bank of the Nile) The sunken land is where the the underworld is. Kui-Land or the Land of Kui, according to the Maya language, was the birthplace of the goddess Maya, the mother of the gods a pure Lotus sprung out of the Field of the Sun."
Egyptologists, and most academics today are sadly deficient in symbology.All fail to differentiate between the symbol and what it represents. They fail to remember that the ancients used a special symbol for every attribute of the Deity, and that the sun was the collective symbol of all the attributes of the Deity, and therefore represented the Deity Himself.
Wandering Bes: Emissary of Ancient BaTwa Pygmy Philosophy and Lore Within Dynastic Egyptian and Bronze/Iron Age Cultures Anu Dwarves or Twa Pygmies are also carved into the Narmer Palette that Nu is (Akkadian: ANU, from An “Sky”, “Heaven”) or Anum, originally An (Sumerian: was the divine personification of the sky, king of the gods, and ancestor of many of the deities in ancient Mesopotamian religion.Egypt and the lunar calendar system of Assyria coincided in the same year -- 11,542 B.C., when both calendars were presumably created. We now have the DNA evidence supporting what we already knew, the Egyptians & Sumerian Priesthood were of the same bloodlines. Same is found in Mesoamerica.
-Some ancient accounts of acoustic levitation From
ArchaeoacousticsA story was told by the local Aymara Indians to a Spanish traveller who visited Tiahuanaco shortly after the conquest spoke of the city's original foundation in the age of Chamac Pacha, or First Creation, long before the coming of the Incas. Its earliest inhabitants, they said, possessed supernatural powers, for which they were able miraculously to lift stones of off the ground, which "...were carried [from the mountain quarries] through the air to the sound of a trumpet"
Shaman known to locals in San Agustin as "magicians" & the religious practices and astronomical worship of the Mother Goddess complex (Venus, the Dogon Sirius observation and the Venus worship of the Olmecs, the use of the ax in the worship of Shango among he Yoruba of West Africa and the use of the ax in Olmec worship as well as the prominence of the thunder God later known as Tlalock among the Aztecs)
Lastly, something ive wanted to mention ...In the Early 17th century, known as the 'old charges' tell how everything dear to mankind existed before the disastrous Flood and had to be reconstructed by the survivors. Serpent wisdom is always accompanied wth the mother Goddess(Isis) & Venus which is represented as a five-pointed star. The smaller star found depicts more than 7, its not Venus at all. . It’s the ‘missing star’ above the ‘missing pillar’ of Enoch.
If Dr Griaule was alive, he and any other initiate of could tell you that the Masonic Landmark symbolizes the ‘cause’ of the disastrous Flood. That's the “Sun of Righteousness”—
Its The Freemason’s blazing star, the Tibetan Bal Star..i mentioned Griaule because the Dogon refer to it as 'that Celestial intruder 'Ni-biru'
submitted by
Adventurous-Ear9433 to
AlternativeHistory [link] [comments]
2023.05.18 11:08 fcndaeosh5819vst2i Rayobyte GitHub Secret: How to use the ClonBrowser browser to protect personal information
| https://preview.redd.it/bj7dtn623k0b1.png?width=889&format=png&auto=webp&s=24a5fca343511e74e5b2812abccb1bb0aa9e1ef7 Rayobyte GitHub Secret: How to use the ClonBrowser browser to protect personal information With online security threats constantly on the rise, it has become more important than ever to protect our personal information. ClonBrowser, a leading anti-detection fingerprint browser, offers a range of security features to keep your personal data safe. One of the key features of ClonBrowser is its ability to manage multiple accounts. Whether you use several email accounts or social media profiles, ClonBrowser makes it easy to keep everything organized in one place without compromising on security. By using ClonBrowser, you can ensure that your online activity remains discrete, and your personal information is safe from potential hackers. ClonBrowser also offers anti-fingerprint and anti-identification features, which protect against against tracking systems that gather information about your online activity. This is especially important for those who frequently use public Wi-Fi connections or work on sensitive projects that require additional privacy. Another notable feature of ClonBrowser is its advanced cookie management system. While cookies are used to remember your preferences and login details, they can also be used to track your activity across different websites. With ClonBrowser's cookie management system, you can choose which cookies to keep or delete, ensuring that your online activity is private and secure. Finally, ClonBrowser offers a range of customization options, allowing you to adjust settings to suit your individual needs. This includes the ability to change your user-agent string, adjust your canvas fingerprint, and enable additional privacy features to further improve online security. In conclusion, ClonBrowser is a powerful tool for anyone looking to protect their personal information online. With its anti-fingerprinting, anti-identification, and advanced cookie management features, ClonBrowser provides a comprehensive solution to online security threats. So, whether you're using multiple accounts or working on sensitive projects, ClonBrowser is the perfect browser to keep your data safe and secure. submitted by fcndaeosh5819vst2i to u/fcndaeosh5819vst2i [link] [comments] |
2023.05.18 04:46 ColarBruh I would buy the pizza tower shirt today but it’s too big for my size.
2023.05.18 03:46 Adventurous-Ear9433 Evidence supports our ancestors accounts of global civilization:DNA archaeological evidence, linguistics & cultural artifacts. 7 Sages
Hedjet & atef The Codex Aubin , Aztlan was a place where the Aztecs were subject to the Azteca Chicomoztoca - the tyrannical elite. To escape the Chicomoztoca, the Aztecs fled Aztlan, led by their priest . In the legend, the god Huitzilopochtli told them they could not use the name Azteca, and they would be known as Mexica. This is the sun called Nahui-atl, '4 water.' Now the water was tranquil for forty years, plus twelve, and men lived for the third and fourth times. When the sun Nahui-atl came there had passed away four hundred years, plus two ages, plus seventy-six years. Then all mankind was lost and drowned, and found themselves changed into fish. The sky came nearer the water. In a single day all was lost, and the day Nahui-xochitl, '4 flower,' destroyed all our flesh... (Plato says the islands sank in a single night)
Footprints of Tarawa footprints of the "Long ears' or tall ones(Annu Naki were known as the tall ones in Sumer) Maya Popul Vuh details the 3 sons of the Kings of Quiche "determined to go as their fathers had ordered to the East, on the shores of the sea whence their fathers had come, to receive the royalty, 'bidding adieu to their brothers and friends, and promising to return.' Doubtless they passed over the sea when they went to the East to receive the royalty. .And when they arrived before the lord Nacxit, the name of the great lord, the only judge, whose power was without limit, behold he granted them the sign of royalty and all that represents it . . ." - Plato saying 'the King's of Atlantis held dominion over the great opposite continent'. He says of their religious beliefs that "they made no regular sacrifices but fruits and flowers; they worshipped the sun."
In Peru a single deity was worshipped, and the sun, his most glorious work, was honored as his representative.
Quetzalcoatl, the founder of the Aztecs, condemned all sacrifice but that of fruits and flowers.
"The first religion of Egypt was pure and simple; its sacrifices were fruits and flowers; temples were erected to the sun, Ra, throughout Egypt." In Peru the great festival of the sun was called Ra-mi...
Again from the Popul Vuh, is the dire character of the disaster. It says that the roar of fires was heard above. The earth shook and things revolted against man. It rained tar with water. The trees were swinging, houses crumbling, caves collapsing. Then day became black night. The Chilam Balam of Yucatán asserts that the motherland of the Mayas was swallowed up by the sea amid earthquakes and fiery eruptions in a very distant epoch. An indian tribe Paria, used to live in Venezuela, in a village with so significant a name as Atlan. They had a tradition of a calamity which had destroyed their country, a large island in the ocean. A perusal of American Indian mythology discloses an interesting fact that over 130 tribes have legends of a world catastrophe.
thought id share this article 1923 LA Times -A People of Mystery:Lemurians on Mt Shasta it's an interesting read Lhasa Record (Buddhas,Tibet)-"
They sought refuge in their temples and citadels, and the wise Mu - the Hieratic Ra Mu - arose and said to them: did I not predict all this? And the women and the men in their precious stones and shining garments lamented 'Mu, save us!' and Mu replied: 'You shall all die together with your servants and your riches, and from your ashes new nations shall arise. If they forget they are superior not because of what they put on but what they put out the same will befall them"
• Hopi believe the Father Creator is KA. The Sumerians believed the Father Essence was KA. • The Hopi believe Taiowa, the Sun God, is the Creator of the Earth. The Sumerians believe TA.EA was the Creator. • The Hopi believe two brothers had guardianship of the Earth. The Sumerians believed two brothers had dominion over the Earth.
• The Hopi believe Alo to be spiritual guides. The Sumerians believed AL.U to be beings of Heaven. • The Hopi believe Kachinas (Kat'sinas) are the spirits of nature and the messengers and teachers sent by the Great Spirit. The Sumerians believed KAT.SI.NA were righteous ones sent of God.
• The Hopi believe Nan-ga-Sohu is the Chasing Star Katsina. The Sumerians believed NIN.GIR.SU to be the Master of Starships(Egyptian-Sahu- stars of Orion)
"Man does not know. For man often forgets. But they know. The stones know, And they remember. Airships were flying. Came pouring a liquid fire. Came flashing The spark of life and death. By the might of spirit Stony masses ascended. Scriptures guarded wise secrets. And again all is revealed"
Hopi "Down on the bottom of the seas lie all the proud cities, the flying patuwvotas, and the worldly treasures corrupted with evil..."
This article was published recently & was fascinating to me personally, because it specifically highlighted the Ainu of Japan.
American Journal of human genetics- Japanese/Chinese in Americans - In Australia-Perth the Ko Ka or Kokka people came from a place called Shurin and was later changed to Quairading by the English. Totem is the Koya and there is a mt Koya in Japan. Also their town called Wagin, the same in Japan.
Xi(Olmec) Skeletal Y chromosome East Asia Genetic Evidence for Convergent Evolution Twenty individuals each from the following populations were typed on the Affymetrix 10K whole-genome sampling assay (WGSA) Mapping Array (Santa Clara, CA): West African (Mende from Sierra Leone), Island Melanesian (Nasioi from Bougainville), South Asian (Indians from Andhra Pradesh), Native American (Nahua from Mexico), East Asian (Chinese and Japanese from Coriel Human Cell Repository)
"Like its northern counterpart (R1b-M269), R1b-V88 is associated with the domestication of cattle in northern Mesopotamia. Both branches of R1b probably split soon after cattle were domesticated, approximately 10,500 years ago (8,500 BCE). R1b-V88 migrated south towards the Levant and Egypt. The migration of R1b people can be followed archeologically through the presence of domesticated cattle, which appear in central Syria around 8,000-7,500 BCE (late Mureybet period), then in the Southern Levant and Egypt around 7,000-6,500 BCE (e.g. at Nabta Playa)
Egypt Hedjet crown This was the stele Flinders Petrie himself uncovered in Abydos,
Kings of Anu: Tera-Neter. That's the divine script, it says Het-U :Temples , of the God Seth, Net Annu-u-Cities of the people of Anu, Tera-Neter: devoted to the 1 God. The Sumerian Kings list tells us the antediluvian patriarchs founded the Kish Dynasty (Egypt, india,Syria, Ethiopia). Anu was also regarded as the Divine Source of Human Kingship.According to the earliest Egyptian traditions Osiris was also an Anu. It is the Anu who invented architecture, writing , irrigation and dry agriculture in the Nile Valley. According to the DNA & archaeological evidence cited above, these people domesticated cattle near Göbekli Tepe, then migrated to Egypt. So the legends of Enki’s 7 Lineages bringing Arts & civilization to humanity after the cataclysm are supported by science.
Going further, Abul Hasan Ali Al-Masudi, an Arab historian from the 10 th century A.D., wrote about ancient Egypt and the methods he alleges they used to move massive stones, including those used to build the pyramids . He claimed that a magic papyrus imprinted with symbols was placed under each stone, after which a metal rod was struck against the stone to initiate the levitation process. What scientist recently achieved
acoustic tractor beam According to Al-Masudi, the stone would be guided along a fenced path with metal poles placed on each side. Some believe these poles could have been used to create high-frequency sound vibrations, which would have been responsible for creating the levitation effects."In Egyptian mythology the falcon god horus is associated with harpoons, the clearest evidence for sonic drilling has been staring us in the face for millennia. One common symbol or object that is seen so often in ancient Egyptian art is the ‘scepter’. It appears in relics art and hieroglyphs associated with the ancient Egyptian religion. It is a long straight staff with a forked end. I've previously cited the Was Scepter & at sites like Pictish, & Abernathy you see not only the tuning fork but the hammer right beside it. There are TONS of Was scepters at Cairo museum with string in-between the forked ends that vibrate when plucked.As for energy, indigenous African cultures have been using the Geothermal energy of the Earth's faults for a long time. In the recent thread was an article about Indigenous Kenyans /Corp who produce Geothermal energy and how successful the project has been over the past few years. The Anatolian fault is probably the largest in the world, and the only Aquifer bigger is found in Africa...where Egypt built their civilization....
Foundations are the stones......the water. The answers have always stared us in the face.
For the Egyptians, they didnt place titles like "Book of...." so the title "Book of the Dead" is a Western addition, like much of the names and places youre familiar with. Egypt has the most ancient texts, artifacts, traditions that speak of that sunken mother country.
The true title of "the book of the Dead"(Vignette 81) the divine script shows a head, which represents Egypt.As shown by the headdress.The head has arisen out of a lotus, The lotus is shown as dead and closed. In the vignette the lotus is dead Mu.
Translated it reads: "The Egyptians came from Mu, a land which is dead and exists no more."
"I am a pure lotus" means: "I am a pure descendant from the people of Mu." "Sprung from the Field of the Sun" corroborates the lotus. "The Field of the Sun" also means the Empire of the Sun, the imperial name of Mu.
Mu in the tongue of the Motherland meant: "mother, land, field, country, empire" and "mouth." A free reading means
"I am an Egyptian of pure descent; my forefathers came from the motherland Mu, the Empire of the Sun, which is now dead and gone." The indigenous groups i mentioned last time each still believe in Duat & carry the sacred knowledge of The Egyptians, Inca, Naga-Maya & have death cults responsible for burial ceremony which symbolizes the deceased returning to the "motherland that sank in the West". That's why false doors in Egypt were placed on the Western Wall, where the Goddess of the West could bring nourishment for the Ka.( Valley of the Kings on the West Bank of the Nile) The sunken land is where the the underworld is. Kui-Land or the Land of Kui, according to the Maya language, was the birthplace of the goddess Maya, the mother of the gods a pure Lotus sprung out of the Field of the Sun."
Egyptologists, and most academics today are sadly deficient in symbology.All fail to differentiate between the symbol and what it represents. They fail to remember that the ancients used a special symbol for every attribute of the Deity, and that the sun was the collective symbol of all the attributes of the Deity, and therefore represented the Deity Himself.
Wandering Bes: Emissary of Ancient BaTwa Pygmy Philosophy and Lore Within Dynastic Egyptian and Bronze/Iron Age Cultures Anu Dwarves or Twa Pygmies are also carved into the Narmer Palette that Nu is (Akkadian: ANU, from An “Sky”, “Heaven”) or Anum, originally An (Sumerian: was the divine personification of the sky, king of the gods, and ancestor of many of the deities in ancient Mesopotamian religion.Egypt and the lunar calendar system of Assyria coincided in the same year -- 11,542 B.C., when both calendars were presumably created. We now have the DNA evidence supporting what we already knew, the Egyptians & Sumerian Priesthood were of the same bloodlines. Same is found in Mesoamerica.
-Some ancient accounts of acoustic levitation From
ArchaeoacousticsA story was told by the local Aymara Indians to a Spanish traveller who visited Tiahuanaco shortly after the conquest spoke of the city's original foundation in the age of Chamac Pacha, or First Creation, long before the coming of the Incas. Its earliest inhabitants, they said, possessed supernatural powers, for which they were able miraculously to lift stones of off the ground, which "...were carried [from the mountain quarries] through the air to the sound of a trumpet"
Shaman known to locals in San Agustin as "magicians" & the religious practices and astronomical worship of the Mother Goddess complex (Venus, the Dogon Sirius observation and the Venus worship of the Olmecs, the use of the ax in the worship of Shango among he Yoruba of West Africa and the use of the ax in Olmec worship as well as the prominence of the thunder God later known as Tlalock among the Aztecs)
Lastly, something ive wanted to mention ...In the Early 17th century, known as the 'old charges' tell how everything dear to mankind existed before the disastrous Flood and had to be reconstructed by the survivors. Serpent wisdom is always accompanied wth the mother Goddess(Isis) & Venus which is represented as a five-pointed star. The smaller star found depicts more than 7, its not Venus at all. . It’s the ‘missing star’ above the ‘missing pillar’ of Enoch.
If Dr Griaule was alive, he and any other initiate of could tell you that the Masonic Landmark symbolizes the ‘cause’ of the disastrous Flood. That's the “Sun of Righteousness”—
Its The Freemason’s blazing star, the Tibetan Bal Star..i mentioned Griaule because the Dogon refer to it as 'that Celestial intruder 'Ni-biru'
submitted by
Adventurous-Ear9433 to
GrahamHancock [link] [comments]
2023.05.17 23:29 North-Ad-9202 How To Hack Blackboard Exams
CONTACT MAIL: [
[email protected]](mailto:
[email protected])
Knowing how to hack the blackboard on your student portal without experience is not common. Hacking requires expertise and immersive knowledge of encryption, cyber-security, portals, security systems, and more to hack your grade.
Getting an unsatisfactory grade can mess things up. It can get tough to score good grades, especially if the coursework is extensive and the subject is complex. That is why it sometimes is easier to hack and change university grades rather than going through the ordeal of studying for the subject again.
Failing or getting bad grades is not only a disappointment to yourself but can also be something we can’t always share with our parents. And with the expenses of studying and the piling student loans, a bad grade can be devastating.
Knowing how to hack the blackboard on your student portal without experience is not common. Hacking requires expertise and immersive knowledge of encryption, cyber-security, portals, security systems, and more to hack your grades.
[
[email protected]](mailto:
[email protected])
Ways of Hacking Blackboard To Change Your Grades
Blackboard is a Learning Management System(LMS)- a tool that is widely used by school and college faculties to provide materials to their students. It is also where the grades and the assignment information is stored. Hacking Blackboard can essentially be done with two types of hacking of how to hack a school website and change your grades.
One is the temporary type of hacking where the grade you change will not appear changed to anyone but you. This is done through inspecting elements tools. This method is especially useful when you do not want to go through the backlash from your parents for poor grades. You can show them the change and the hacked page once you have stored the web-page after changing your grades.
The steps towards making a temporary grade change by hacking into your student portal are as follows:
Go to your blackboard student portal site
Log in with your student login information
You will now see all your grades and your CGPA in front of you, along with any overdue assignments
Right-click on the black part of the page and select Inspect Element
Next, you will see the section of your page with manual controls in front of you
Select and highlight the grade you wish to change and right-click to select inspect element
Then in the inspect element tab, which will also be highlighted, change your numeric grade accordingly
Make sure you properly align the number with the grading system
Then look for your Grade letter and change it according to your numeric grade
Then select the overdue assignments if you have any and remove them one by one
Make sure to remove the column so that it doesn’t look odd
Once you’re done making the changes you want, cut the inspect element tab
Then right-click and click on save as
Then in the pop-up, make sure you are saving it as “web-page complete”
Select save and then open it up whenever you need to show your grades to someone
Other Ways of Hacking Blackboard To Change your Grades on Student Portal
The other way to permanently change your grade involves a lot of technicalities that are too complex for anyone without any IT or hacking experience. It should involve the Brute Force or the DoS methods, which are reliable when hacking for grades.
[
[email protected]](mailto:
[email protected])
Brute Force to Hack Grades
Using brute force to hack college grades is one of the attribute of a hacker. To use such service, you need to hire a hacker to change grades for you. Must grades are stored online and you need few hacking techniques to accomplish this desire results.
When you are able to obtain admin password, you need protection to gain access and have admin privileges to establish connection with the school database.
A brute force attack uses trial and error to guess login info, encryption keys, or find a hidden database, web pages. A expert hacker can work through all possible combination of keywords and millions of passwords to get the correct admin logins.
It’s a tedious task but a expert hacker has collection of password, leak information which they have setup as collection to password archived.
[
[email protected]](mailto:
[email protected])
Ddos University Website to Change your Grades
For the sake of security reason, we can list of techniques hackers use. This can possibly be a way to stop this attack by many school university. To hack university database online, a few experience hackers are major actors on the hacking community. Pro hacker service provides solution to your hacking need.
You can use Ddos to hack university servers, hack canvas, blackboard and many other security website. To access this information without getting detected. Hackers have advance software to easily access security website, university portal online anonymously.
[
[email protected]](mailto:
[email protected])
Knowing how to hack the blackboard on your student portal without experience is not common. Hacking requires expertise and immersive knowledge of encryption, cyber-security, portals, security systems, and more to hack your grades.
submitted by
North-Ad-9202 to
u/North-Ad-9202 [link] [comments]
2023.05.13 16:25 baskinforsuredidit Is canva down for anyone else? 😭I am trying to login in chrome and on safari but it’s just loading (not a wrong password or anything)
Works fine on my phone too. figured it was my internet or something but that doesn’t seem to be the problem either
submitted by
baskinforsuredidit to
canva [link] [comments]
2023.05.12 18:29 Fit_Strawberry_2641 How To Hack Blackboard Exams
CONTACT MAIL: [
[email protected]](mailto:
[email protected])
Knowing how to hack the blackboard on your student portal without experience is not common. Hacking requires expertise and immersive knowledge of encryption, cyber-security, portals, security systems, and more to hack your grade.
Getting an unsatisfactory grade can mess things up. It can get tough to score good grades, especially if the coursework is extensive and the subject is complex. That is why it sometimes is easier to hack and change university grades rather than going through the ordeal of studying for the subject again.
Failing or getting bad grades is not only a disappointment to yourself but can also be something we can’t always share with our parents. And with the expenses of studying and the piling student loans, a bad grade can be devastating.
Knowing how to hack the blackboard on your student portal without experience is not common. Hacking requires expertise and immersive knowledge of encryption, cyber-security, portals, security systems, and more to hack your grades.
[
[email protected]](mailto:
[email protected])
Ways of Hacking Blackboard To Change Your Grades Blackboard is a Learning Management System(LMS)- a tool that is widely used by school and college faculties to provide materials to their students. It is also where the grades and the assignment information is stored. Hacking Blackboard can essentially be done with two types of hacking of how to hack a school website and change your grades.
One is the temporary type of hacking where the grade you change will not appear changed to anyone but you. This is done through inspecting elements tools. This method is especially useful when you do not want to go through the backlash from your parents for poor grades. You can show them the change and the hacked page once you have stored the web-page after changing your grades.
The steps towards making a temporary grade change by hacking into your student portal are as follows:
- Go to your blackboard student portal site
- Log in with your student login information
- You will now see all your grades and your CGPA in front of you, along with any overdue assignments
- Right-click on the black part of the page and select Inspect Element
- Next, you will see the section of your page with manual controls in front of you
- Select and highlight the grade you wish to change and right-click to select inspect element
- Then in the inspect element tab, which will also be highlighted, change your numeric grade accordingly
- Make sure you properly align the number with the grading system
- Then look for your Grade letter and change it according to your numeric grade
- Then select the overdue assignments if you have any and remove them one by one
- Make sure to remove the column so that it doesn’t look odd
- Once you’re done making the changes you want, cut the inspect element tab
- Then right-click and click on save as
- Then in the pop-up, make sure you are saving it as “web-page complete”
- Select save and then open it up whenever you need to show your grades to someone
Other Ways of Hacking Blackboard To Change your Grades on Student Portal
The other way to permanently change your grade involves a lot of technicalities that are too complex for anyone without any IT or hacking experience. It should involve the Brute Force or the DoS methods, which are reliable when hacking for grades.
[
[email protected]](mailto:
[email protected])
- Brute Force to Hack Grades
Using brute force to hack college grades is one of the attribute of a hacker. To use such service, you need to hire a hacker to change grades for you. Must grades are stored online and you need few hacking techniques to accomplish this desire results.
When you are able to obtain admin password, you need protection to gain access and have admin privileges to establish connection with the school database.
A brute force attack uses trial and error to guess login info, encryption keys, or find a hidden database, web pages. A expert hacker can work through all possible combination of keywords and millions of passwords to get the correct admin logins.
It’s a tedious task but a expert hacker has collection of password, leak information which they have setup as collection to password archived.
[
[email protected]](mailto:
[email protected])
- Ddos University Website to Change your Grades
For the sake of security reason, we can list of techniques hackers use. This can possibly be a way to stop this attack by many school university. To hack university database online, a few experience hackers are major actors on the hacking community. Pro hacker service provides solution to your hacking need.
You can use Ddos to hack university servers, hack canvas, blackboard and many other security website. To access this information without getting detected. Hackers have advance software to easily access security website, university portal online anonymously.
[
[email protected]](mailto:
[email protected])
Knowing how to hack the blackboard on your student portal without experience is not common. Hacking requires expertise and immersive knowledge of encryption, cyber-security, portals, security systems, and more to hack your grades. submitted by
Fit_Strawberry_2641 to
u/Fit_Strawberry_2641 [link] [comments]