Packet tracer 5.3.1 deb torrent

A Note About Strength Training

2024.06.01 12:49 TFVooDoo A Note About Strength Training

Given the recent discussion of Shut Up And Ruck’s strength programming, I thought it might be appropriate to address a few lingering comments.
First, we’re not immune to criticism. It is perfectly reasonable to criticize whenever and whoever you want, even me. Clearly, the anonymity of the internet provides ample license to do so. I’m not infallible and I make at least one mistake every fiscal year. I get downvoted all the time and I recognize that many things that I say are taken as gospel based on my years of providing accurate information. I don’t take this leniency lightly. I’ve earned this gift and I don’t look gift horses in the mouth. I certainly don’t shy away from criticizing others, but I always seek to do so from a position of best intentions of the outcome. But if you think that it’s appropriate to draw conclusions like “He definitely doesn’t know what he’s talking about”, “It violates basic principles”, or my favorite “It looks like he stole this from X, Y, or Z” and you’re basing that on one tiny screenshot of one sample day of one singular domain absent of context of the entirety of the programming then you must be special. I wish I had that sort of clairvoyance.
Second, our programming is not a mistake. Is it aggressive? Absolutely. Is it wrong? Absolutely not. It is deliberate and intentional. A few points to consider:
-The higher percentages and rep ranges occur at the end of each cycle. You don’t start off at the high end, you finish there. The passage cited is 9 weeks post 1RM testing. At a minimum the higher % come 5 weeks after testing. You get stronger and the programming reflects that.
-Just because you’ve never done anything like this doesn’t mean much. We follow the evidence, and the literature clearly indicates that our recommendations are appropriate. Aggressive, but appropriate. Here are 6 sources, including some meta-analyses that bring the body of knowledge to several hundred; there are many more.
Source 1
Source 2
Source 3
Source 4
Source 5
Source 6
Your experience not withstanding, our programming is entirely valid. This is especially true given the other variables. 1) we prioritize intensity and we manifest that through heavy weights 2) you only lift each exercise 2 times in every 5 day cycle - plenty of time for macro recovery 3) you are resting up to 4 minutes between sets - plenty of time for micro recovery 4) you are only doing 3 lifts in a day and only one for that domain - you aren’t doing 3 sets of barbell bench, then 3 sets of incline, then 3 sets of decline, then some cable cross-overs, then some dumbbell flys, then finishing with some drop sets on the Smith machine. 1 exercise, at maximal intensity. No need to pace yourself. 5) we are seeking to balance strength and endurance. It’s impossible to fully address both simultaneously. There will inevitably be friction. 6) we are seeking to challenge you, not accommodate you. 7) we emphasize self-reflection, data analysis, and agency. If you are struggling to meet the listed criteria then we encourage you to program accordingly. It’s foundational to our approach.
But allow me to let you in on a little secret. Even though we cite no small amount of literature, you can find lots of literature that argues against our programming. In fact, there is so much ‘literature’ out there that you can find supporting information for damn near everything and anything. So, back to my first point, you are welcome to criticize. But you should at least provide some counter-evidence beyond “in my experience”. In the Taxonomy of Information, anecdotal testimony is the least rigorous. We have presented our arguments, you are invited to present yours. Or be a little more graceful in your criticism.
We are well aware of Prilepin’s optimal reps (for powerlifting), and the NASM 5 Phase Optimum Performance Training Model (which we follow) and the NSCA Performance Pyramid (which we follow). We don’t disagree that they are to be well considered. We did a full and complete survey of the information environment. But we stated in our introduction and made available for free our philosophy…we have no interest in preserving the credentialed protectorate of the fitness industry. SFAS is different, so shall the programming be.
Third, we didn’t “steal” another program and stack it on top of our own stuff. That’s not how this works. If you survey all of the programs and methodology out there, you will find a ton of overlap. If you follow established principles and seek consensus, then you end up looking a lot like the other stuff. Did we look at other programs? Yes, dozens of them. Did we steal them? No. The fact that we favor a more intense program that most programs don’t should make this argument moot. This is a serious accusation and should be reserved for the most egregious circumstances. You might not have experience with this type of programming, you might not be familiar with recent literature, and you are only seeing a very minuscule event absent of any of the other programming and ancillary elements.
Fourth, and finally, I want to address the unhinged discussion of cost. We’re particularly sensitive to this topic because we know that our target population skews younger and likely less affluent, so cost matters. And I don’t like calling guys out necessarily, but u/Certain-Exam-2577 and u/Potential_Presence67 ? You two can go fuck yourselves. You anonymous peices of shit decided from your castles on top of Mount Holy that we are looking for a “money grab”? I could have charged hundreds, I could put all of my content behind a paywall, and I could simply pump and dump and walk away to stack cash. But that’s not the case.
What do you two fucking genius economists think would be appropriate for 8 months of daily programming for strength, conditioning, rucking, mental prep, mobility, skills, recovery and much more? We charge 60 dollars. Let’s take a very small survey the prep environment and see where we stack up:
Evoke - 3 months, requires additional programming prerequisites, $65
Performance First - 3 months, $90
18A Fitness - 4 months, $179
Gritty Soldier - 3 months, $30
Mountain Tactical - 12 months, $329
Blue/Green Training - 11 weeks, $129
We’re looking pretty competitive given these numbers. And these are the better programs. We mostly like them (and others) and we have tremendous respect for their creators and coaches. We don’t think they are as good as ours, especially our ruck programming, but they’re in the ballpark. Many guys in this sub have used them and speak highly of them. There are also near endless shit programs out there. AI generated, generic, point-of-sale trash with slick marketing and zero support.
We are a complete program that covers every single domain, and we have well established our expertise for SFAS. But we don’t rely on reputation, we deliver. We research, analyze, synthesize, and present the most comprehensive program out there. For just 60 bucks. Hell, you’ll spend over half that on a blank journal…we’ve recommended this excellent journal many times. But that’s just a cool journal. Zero programming. So we think we’re not “grabbing” too much.
Our resident pricks go on to say that RUSU wasn’t worth $50. Good thing we only charge $40. And perhaps you’d prefer the 15+ year old, lack-luster competition? They’re in the same price range. They even take a cheap shot at our Muster events as just a ‘wAlK iN tHe wOoDs tHaT yOu cOuLd do for FrEe’ or ‘info you could probably find online’. Our “competition” is $750 and one of the programs isn’t even taught by a military guy, much less a Green Beret. You two retarded laureates haven’t even attended an event, so your opinion is irrelevant.
And I should put a pin in all of this money grab, predatory, grifter talk by reminding them that this is all voluntary. You don’t have to spend a single dime if you don’t want to. Lots of guys don’t do anything extra and they get Selected all the time. But if a guy wants to be compensated for his hard work and another guy wants to allocate the cost of a night out drinking, then maybe your keen criticism could be stymied a bit. I offer plenty of free advice and commentary every day. I note that neither of you provide anything of value.
So, that’s my assessment of the situation. You don’t have to be a part of the conversation, but I thought that I should let you know how I see it. I endlessly tell you about the importance of foot care, so it’s only fair that I weigh in on this important topic. I should note that there was also some very reasoned comments and lots of guys understanding the intent of the programming AND of the program. And the OP reached out via DM and we had a very reasonable and productive discussion. He gets it. And the number of guys commenting is <1% of the number of guys reading the actual full program. I like that guys are passionate about this stuff. If you get 10 Green Berets in a room you’ll get 11 different opinions on damn near every topic. You know what they say about opinions…
submitted by TFVooDoo to greenberets [link] [comments]


2024.06.01 12:42 No-Physics7479 Microprocessor

Microprocessor, also known as CPU (Central Processing Unit), is an electronic component that plays a central role in the circuit, acting as the "brain" of the system. It is made up of billions of tiny transistors integrated on a single microchip, capable of performing mathematical and logical calculations and processing information quickly and accurately.
Main functions of the microprocessor:
• Execute instructions: The microprocessor receives instructions from the program, decodes and executes them sequentially.
• Data processing: The microprocessor performs mathematical and logical operations on data, transforming information according to the program's requirements.
• System management: The microprocessor coordinates the operation of other components in the circuit, ensuring that the system operates stably and efficiently.
Microprocessor Classification by Function
  1. General-purpose processors (GPP) are designed to perform a wide variety of tasks.
Central Processing Unit (CPU):
• Function: The "brain" of the computer, responsible for performing mathematical and logical calculations, processing data, and controlling the overall operation of the system.
• Characteristics:
o Multitasking capability: CPUs can perform multiple tasks at the same time, meeting the increasing usage demands of users.
o Compatibility: CPUs are supported by a wide range of operating systems and software, making it easy for users to choose and use.
o High performance: Modern CPUs have very fast processing speeds, meeting the demands of processing intensive tasks such as gaming, video editing, programming, etc.
o Applications: Personal computers, servers, workstations, etc.
o Popular CPU names:
 Intel: Core i9, Core i7, Core i5, Core i3, Pentium Gold, Celeron
 AMD: Ryzen 9, Ryzen 7, Ryzen 5, Ryzen 3, Athlon
  1. Application-specific processors (ASPs) are designed to perform a specific task.
Microcontroller (MCU):
• Function: A simple, low-cost microprocessor used in embedded devices such as washing machines, refrigerators, microwaves, etc. MCUs have the ability to perform basic control and data processing tasks.
• Characteristics:
o Low cost: MCUs are cheaper than other types of microprocessors, making them suitable for low-cost applications.
o Power efficiency: MCUs consume less power, making them suitable for mobile and embedded devices.
o Easy to use: MCUs are easier to use and program than other types of microprocessors.
• Applications: Washing machines, refrigerators, microwaves, air conditioners, electronic toys, etc.
• Popular MCU names:
o Microchip: PIC16F88, PIC18F452, PIC24FJ64GB204,..
o STMicroelectronics: STM32F103C8T6, STM32F407VG, STM32L476RG,…
Graphics Processing Unit (GPU)
Function: Specialized in processing complex graphics tasks such as gaming, video editing, 3D graphics design, etc.
Characteristics:
• Powerful graphics performance: GPUs can handle millions of mathematical calculations per second, meeting the high graphics demands of modern applications.
• Video decoding capabilities: GPUs can decode high-quality video, providing a smooth video experience.
• Artificial intelligence support: GPUs are used in artificial intelligence applications such as machine learning, natural language processing, etc.
Applications: Gaming computers, graphics computers, render servers, cryptocurrency mining devices, etc.
Popular GPU names:
• NVIDIA: GeForce RTX 3090, GeForce RTX 3080, GeForce RTX 3070,…
• AMD: Radeon RX 6950 XT, Radeon RX 6900 XT, Radeon RX 6800 XT,…
Digital Signal Processor (DSP)
Function: Specialized in processing audio, video, and other digital signals. DSPs can perform mathematical and logical operations on digital signals quickly and efficiently.
Characteristics:
• Efficient digital signal processing: DSPs are designed to process digital signals with high accuracy and speed.
• Power efficiency: DSPs consume less power than other types of microprocessors, making them suitable for mobile and embedded applications.
• Programmability: DSPs can be programmed to perform various signal processing functions, meeting the diverse needs of users.
Applications: Mobile phones, televisions, digital cameras, medical devices, etc.
Popular DSP names:
• Analog Devices: SHARC ADSP-21489, Blackfin BF561, TigerSHARC ADSP-TS201S,…
• Texas Instruments: C6727, C6713, C6457,…
Network Processing Unit (NPU)
Function: Specialized in processing network tasks such as data transmission, routing, encryption, decryption, etc. NPUs can handle large amounts of network data quickly and efficiently.
Characteristics:
• High processing speed: NPUs can process millions of packets per second, meeting the ever-increasing data transmission demands.
• High energy efficiency: NPUs are designed to optimize power efficiency, helping to minimize operating costs.
• Programmability: NPUs can be programmed to perform various network functions, meeting the diverse needs of users.
Applications: Network devices such as routers, switches, network storage devices, etc.
Popular NPU names:
• Qualcomm: Snapdragon Hexagon 80 DSP, Snapdragon Hexagon 900 DSP,..
• Apple: Neural Engine (A11 Bionic chip and later)
Security Processing Unit (SPU)
Function: Specialized in processing security tasks such as encryption, decryption, authentication, etc. SPUs can perform complex security algorithms quickly and securely.
Characteristics:
• High level of security: SPUs are designed with advanced security features to protect data and systems from cyber threats.
• Powerful performance: SPUs can handle complex security algorithms quickly, meeting the ever-increasing security demands.
• Scalability: SPUs can be scaled to meet the growing security needs of the system.
Applications: Mobile devices, personal computers, servers, Internet of Things (IoT) devices, etc.
Popular SPU names:
• ARM: TrustZone
• NXP: Secure Element
Machine Learning Accelerator (MLU)
Function: Specialized in processing machine learning tasks such as classification, recognition, prediction, etc. MLUs can perform complex mathematical calculations related to machine learning quickly and efficiently.
Characteristics:
• High performance: MLUs can handle complex machine learning algorithms quickly, accelerating machine learning model training and deployment.
• Scalability: MLUs can be scaled to meet the growing machine learning demands of the system.
• Power efficiency: MLUs are designed to optimize power efficiency, helping to minimize operating costs.
Applications: Facial recognition systems, self-driving cars, robots, medical applications, etc.
Popular MLU names:
• Intel: Nervana Neural Network Accelerator
• AMD: MI25 Accelerator
IDEs and Programming Languages for Microprocessors
Choosing the right IDE and programming language for a microprocessor depends on several factors, including the type of microprocessor, the intended use, and the programmer's personal preferences. Here are some suggestions:
Microprocessor Type:
Intel:
• IDE: Visual Studio, Eclipse, Intel Microchip Studio
• Programming languages: C, C++, Assembly
NXP:
• IDE: CodeWarrior, Eclipse, Keil MDK
• Programming languages: C, C++
ARM:
• IDE: Visual Studio Code, Eclipse, Keil MDK, Arm Development Studio
• Programming languages: C, C++, Assembly
Arduino:
• IDE: Arduino IDE
• Programming language: C++ (Arduino)
Popular IDEs and Programming Languages for Microprocessors:
Visual Studio: A powerful IDE that supports multiple programming languages, including C, C++, and C#. Visual Studio is a popular choice for Windows and .NET application development.
Eclipse: A free and open-source IDE that supports multiple programming languages, including Java, C, and C++. Eclipse is a popular choice for Java and Android application development.
Arduino IDE: A free and easy-to-use IDE for Arduino programming. Arduino IDE supports the C++ (Arduino) programming language.
Keil MDK: A powerful IDE for ARM microcontroller programming. Keil MDK supports the C and Assembly programming languages.
Compilers for Microprocessors
Compilers translate programming code into a format that can be understood by a microprocessor. The specific compiler you need will depend on the type of microprocessor you are using. Here are some of the most popular compilers for different microprocessor architectures:
Intel:
• Intel C++ Compiler (ICC): This is a powerful and highly optimized C++ compiler for Intel CPUs. ICC supports many modern features such as C++20, AVX-512, and more.
• Intel Fortran Compiler (IFORT): IFORT is an efficient Fortran compiler for Intel CPUs. It supports many modern Fortran features, including Fortran 2018, OpenMP, and more.
• Intel Assembly Language (NASM): NASM is an assembly language compiler for Intel CPUs. It supports many different Intel architectures, from x86 to x86-64.
ARM:
• GNU Arm Compiler Collection (GCC): GCC is a popular free and open-source C/C++ compiler for ARM CPUs. It supports many modern C/C++ features and many different ARM architectures.
• Arm C Compiler and Integrated Development Environment (Arm IAR): Arm IAR is an integrated development environment (IDE) that provides a powerful C/C++ compiler for ARM CPUs. It supports many advanced features such as static analysis, debugging, and optimization.
• ARM Assembly Language (ARM Assembly): ARM Assembly is the assembly language for ARM CPUs. It supports many different ARM architectures and can be used to write highly efficient code.
Arduino:
• Arduino IDE: The Arduino IDE is a free and open-source integrated development environment (IDE) for Arduino. It includes a C/C++ compiler that is optimized for Arduino boards.
• PlatformIO: PlatformIO is an extension for the Visual Studio Code IDE that provides powerful support for Arduino development. It includes a C/C++ compiler and many other advanced features.
In addition, there are many other compiler tools for different microprocessors, such as:
• Microchip XC8: A C compiler for Microchip's PIC microcontrollers.
• Texas Instruments Code Composer Studio (CCS): An IDE that provides a C/C++ compiler for Texas Instruments' MSP430 and TMS320 microcontrollers.
• Renesas RX Compiler: A C++ compiler for Renesas' RX microcontrollers.
Choosing the Right Compiler:
The choice of the right compiler depends on many factors, including the microprocessor architecture, operating system, features needed, and your personal preferences. Some factors to consider when choosing a compiler include:
• Microprocessor architecture support: Make sure the compiler supports the microprocessor architecture you are using.
• Features: Identify the features you need, such as C/C++ support, performance optimization, debugging, etc.
• Operating system: Choose a compiler that is compatible with the operating system you are using.
• Ease of use: Choose a compiler that has an easy-to-use user interface and comprehensive documentation.
• Community: Consult the programming community for recommendations on suitable compilers.
Notes:
• Some compilers are free and open-source, while others may be paid.
• Some compilers come with an IDE, while others can be used as command-line tools.
• Please refer to the compiler's documentation for detailed usage instructions.
Methods for Programming Microprocessors
To program a microprocessor, you need to use the appropriate tool for that type of CPU. Here are some examples:
Intel CPUs:
• Programmers:
o JTAG: Commonly used for Atmel and Microchip chips.
o ISP: Commonly used for PIC chips.
o In-System Programming (ISP): Some Intel chips support programming directly through the JTAG or SWD port.
• USB Cables:
o USB JTAG Cable: Connects the JTAG programmer to the computer.
o USB ISP Cable: Connects the ISP programmer to the computer.
• Programming Software:
o Intel Flash Programming Tool (IFPT): Used for Intel FPGA and SoC chips.
o Intel Platform Flash Tool (IntelPFT): Used for Intel Atom and Celeron chips.
o Flash Programmer: Supports a variety of Intel chips.
ARM CPUs:
• Programmers:
o JTAG: The most common type for ARM chips.
o SWD: A newer and more efficient programming protocol than JTAG.
o Bootloader: Some ARM chips can be programmed through a bootloader.
• USB Cables:
o USB JTAG Cable: Connects the JTAG programmer to the computer.
o USB SWD Cable: Connects the SWD programmer to the computer.
• Programming Software:
o OpenOCD: Supports a variety of ARM chips.
o STMicroelectronics ST-Link: Used for STM32 chips.
o NXP LPCFlashProgrammer: Used for NXP LPC chips.
Arduino CPUs:
• USB Cable: Arduinos are programmed directly through a USB cable.
• Programming Software:
o Arduino IDE: The integrated development environment (IDE) for Arduino, which includes a built-in programmer.
Other CPUs:
In addition to the types of CPUs listed above, there are many other types of CPUs with their own programming tools. You will need to refer to the CPU manufacturer's documentation for more information.
Programming Software for Microprocessors
There are many different software programs used to program microprocessors, depending on the type of microprocessor and operating system you are using. Here are a few popular examples:
For Intel Microprocessors:
• Intel Flash Programming Tool (IFPT):This is Intel's official tool for programming firmware and flash memory on Intel microprocessors. IFPT is available for Windows, Linux, and macOS.
• Intel HEX Flash Utility:This is a simpler tool for flashing HEX files to Intel microprocessors. HEX Flash Utility is available for Windows.
For NXP (Nexperia) Microprocessors:
• NXP LPCFlashProgrammer: This is NXP's official tool for programming firmware and flash memory on NXP microprocessors. LPCFlashProgrammer is available for Windows, Linux, and macOS.
• OpenOCD:This is an open-source debugger and programmer that supports a variety of microprocessors, including NXP microprocessors. OpenOCD is available for Windows, Linux, and macOS.
For ARM Microprocessors:
• ARM Development Toolchain:ARM provides a free development toolchain that includes a programmer for ARM microprocessors. The ARM Development Toolchain is available for Windows, Linux, and macOS.
• OpenOCD: OpenOCD also supports a variety of ARM microprocessors.
For Arduino:
• Arduino IDE:The Arduino IDE includes a built-in programmer for flashing Arduino boards. The Arduino IDE is available for Windows, Linux, and macOS.
• Avrdude:Avrdude is a command-line tool for flashing AVR microcontrollers, including many of the microcontrollers used on Arduino boards. avrdude is available for Windows, Linux, and macOS.
There are many other programming software options available, depending on your specific needs. You can find more information about programming software on the microprocessor manufacturer's website or by searching online.
Note: Before programming a microprocessor, you must make sure that you have selected the correct software and have the appropriate configuration settings. Using the wrong software or settings can damage your microprocessor.
The microprocessor industry is a dynamic and ever-evolving industry that plays a critical role in the development of modern technology. With continuous advancements, microprocessors will continue to drive innovation in a wide range of fields, from computers and smartphones to automobiles and medical devices. Key trends for the future include:
• Miniaturization: The size of transistors on microprocessors is constantly shrinking, allowing for more transistors to be placed on a chip and improving performance.
• Increased Cores: Many modern microprocessors have multiple processing cores, enabling them to handle multiple tasks simultaneously and improve multitasking performance.
• Specialization: Different types of microprocessors are being designed for specific applications, such as graphics processing units (GPUs) for gaming and video editing, network processing units (NPUs) for networking devices, machine learning processors (MLUs) for artificial intelligence, and 3D processors for graphics rendering.
• 3D Processors: 3D processors will stack multiple layers of transistors on top of each other to increase the number of transistors on a chip and improve performance.
• Quantum Computing Systems: Quantum computers use the principles of quantum mechanics to perform calculations, with the potential to offer far superior performance than traditional computers.
• System-on-Chip (SoC): SoCs integrate various components such as CPUs, GPUs, memory, and peripheral controllers onto a single chip, reducing the size, cost, and power consumption of electronic devices.
• Artificial Intelligence (AI): AI will play a more significant role in designing and optimizing microprocessors, leading to improved performance and energy efficiency.
• New Material-Based Processors: New materials such as graphene and silicon photonics could be used to create faster and more energy-efficient microprocessors.
Many Sources
submitted by No-Physics7479 to BblackHhorse02 [link] [comments]


2024.06.01 12:39 jjdewit NordVPN.com Review

NordVPN.com is a leading Virtual Private Network (VPN) service provider, founded in 2012 by four friends who shared a passion for internet freedom and security. Since its inception, NordVPN.com has grown to become one of the most popular and trusted VPN services globally, with over 14 million users worldwide.
Early Years (2012-2014)
NordVPN.com's journey began in 2012, when four friends, including CEO and co-founder, Tomasz Fornal, came together to address the growing concerns about online privacy and security. The founders, all with a background in computer science and engineering, recognized the need for a reliable and secure VPN service that could protect users' online activities from prying eyes.
In the early years, NordVPN.com focused on developing its core technology and building a strong team of experts. The company's early success was fueled by word-of-mouth referrals and positive reviews from satisfied customers.
Expansion and Growth (2015-2018)
As NordVPN.com's popularity grew, the company expanded its operations to accommodate the increasing demand. In 2015, NordVPN.com launched its mobile apps for Android and iOS devices, making it easier for users to access the service on-the-go. The company also expanded its server network, increasing the number of servers from 100 to over 5,000, covering more than 60 countries worldwide.
In 2017, NordVPN.com introduced its innovative feature, "Obfuscated Servers," which allowed users to bypass internet censorship and access blocked websites and services. This feature further solidified NordVPN.com's position as a leader in the VPN industry.
Mission and Values
At the heart of NordVPN.com's mission is a commitment to protecting users' online freedom and security. The company's mission is to provide a secure and reliable VPN service that empowers users to take control of their online activities. NordVPN.com's values are built around three core principles:
1. Privacy: NordVPN.com is committed to protecting users' privacy and ensuring that their online activities remain confidential.
2. Security: The company prioritizes the security of its users' data, using advanced encryption and security protocols to safeguard against cyber threats.
3. Transparency: NordVPN.com is transparent about its operations, providing users with clear information about its services, policies, and practices.
Awards and Recognition
NordVPN.com has received numerous awards and recognition for its commitment to online security and privacy. Some notable awards include:
· PCMag Editors' Choice: NordVPN.com has been recognized as a PCMag Editors' Choice for its exceptional performance and features.
· Top VPN Service: NordVPN.com has been rated as one of the top VPN services by various reputable sources, including CNET, Wirecutter, and Tom's Guide.
· Trustworthy VPN: NordVPN.com has been recognized as a trustworthy VPN service by organizations such as the Electronic Frontier Foundation (EFF) and the Open Technology Fund.
Conclusion
NordVPN.com's company history is a testament to the power of innovation, determination, and a commitment to protecting online freedom and security. From its humble beginnings to its current status as a leading VPN service provider, NordVPN.com has consistently demonstrated its dedication to providing a secure and reliable VPN service to users worldwide. As the company continues to evolve and adapt to the ever-changing online landscape, its mission remains steadfast: to empower users to take control of their online activities and protect their online privacy and security.

Features and Benefits

As one of the most popular and highly-regarded Virtual Private Network (VPN) providers, NordVPN.com offers a comprehensive suite of features and benefits that cater to the diverse needs of its users. In this chapter, we will delve into the various features and benefits that set NordVPN.com apart from its competitors, highlighting its strengths and advantages.
Security and Encryption
NordVPN.com's primary concern is the security and privacy of its users. To achieve this, the service employs a robust encryption protocol, utilizing the AES-256 cipher, which is widely regarded as the most secure encryption standard available. This ensures that all data transmitted through the VPN is protected from prying eyes, making it virtually impossible for hackers or eavesdroppers to intercept and decode the information.
Server Network and Locations
NordVPN.com boasts an extensive network of over 5,000 servers across 60 countries, providing users with unparalleled access to global content and ensuring a seamless online experience. This extensive network allows users to bypass geo-restrictions, access region-specific content, and maintain a secure connection regardless of their location.
Server Selection and Filtering
NordVPN.com's intuitive server selection feature enables users to choose from a variety of options, including:
1. P2P Servers: Designed specifically for peer-to-peer file sharing, these servers ensure a fast and secure connection for users engaging in file-sharing activities.
2. Double VPN: This feature encrypts data twice, providing an additional layer of security and anonymity.
3. Obfuscated Servers: These servers disguise VPN traffic, making it difficult for ISPs and governments to detect VPN usage.
4. Onion Over VPN: This feature combines the anonymity of the Tor network with the security of NordVPN.com's encryption.
Additional Features
NordVPN.com's comprehensive feature set includes:
1. Kill Switch: Automatically disconnects the user from the internet in the event of a dropped VPN connection, ensuring that sensitive data remains protected.
2. Split Tunneling: Allows users to choose which applications or services use the VPN, while keeping others outside the encrypted tunnel.
3. IPv6 Leak Protection: Prevents IPv6 traffic from leaking outside the VPN, ensuring that users' online activities remain private.
4. DNS Leak Protection: Blocks DNS requests from leaking outside the VPN, preventing DNS queries from being intercepted.
Benefits
The combination of NordVPN.com's features and benefits provides users with a comprehensive online security solution, offering numerous advantages, including:
1. Unparalleled Security: NordVPN.com's robust encryption and secure protocols ensure that users' online activities remain private and secure.
2. Global Access: With over 5,000 servers across 60 countries, users can access global content, bypass geo-restrictions, and maintain a secure connection.
3. Anonymity: NordVPN.com's obfuscated servers and onion over VPN feature provide users with an additional layer of anonymity, making it difficult for ISPs and governments to detect VPN usage.
4. Ease of Use: NordVPN.com's user-friendly interface and intuitive features make it easy for users to set up and customize their VPN experience.
5. Customer Support: NordVPN.com's dedicated customer support team is available 24/7 to assist users with any questions or concerns.
In conclusion, NordVPN.com's comprehensive feature set and benefits provide users with a robust online security solution, catering to the diverse needs of its users. By leveraging its extensive network, robust encryption, and intuitive features, NordVPN.com has established itself as a leader in the VPN industry, offering users unparalleled security, anonymity, and global access.

Encryption and Protocols

In today's digital age, online security and privacy are more crucial than ever. With the increasing number of cyberattacks, data breaches, and surveillance, it is essential to have robust encryption methods and protocols in place to protect sensitive information. NordVPN.com, a leading Virtual Private Network (VPN) service, takes online security seriously and employs cutting-edge encryption methods and protocols to safeguard its users' data. In this chapter, we will delve into the encryption methods and protocols used by NordVPN.com to ensure the confidentiality, integrity, and authenticity of user data.
Encryption Methods
NordVPN.com uses the Advanced Encryption Standard (AES) with a 256-bit key size to encrypt user data. AES is a widely used and highly effective encryption algorithm that is considered to be unbreakable. The 256-bit key size ensures that even the most powerful computers would take an impractically long time to crack the encryption, making it virtually unbreakable.
Protocols
NordVPN.com supports multiple VPN protocols, each with its strengths and weaknesses. The choice of protocol depends on the user's specific needs and the type of device being used. The most commonly used protocols are:
1. OpenVPN: OpenVPN is a widely used and highly secure protocol that is known for its stability and reliability. It is a popular choice among VPN users due to its ability to bypass firewalls and provide fast and secure connections.
2. IKEv2/IPSec: IKEv2/IPSec is a more recent protocol that is gaining popularity due to its ability to provide fast and secure connections. It is a widely supported protocol that is compatible with a wide range of devices and operating systems.
3. L2TP/IPSec: L2TP/IPSec is a protocol that is commonly used for remote access VPNs. It is a secure protocol that provides strong encryption and is widely supported by most devices and operating systems.
Key Exchange and Authentication
NordVPN.com uses the Diffie-Hellman key exchange algorithm to establish a shared secret key between the user's device and the VPN server. This algorithm ensures that the shared secret key is not compromised during transmission.
NordVPN.com also uses the SHA-256 hash function to authenticate the user's device and the VPN server. This ensures that the user's device and the VPN server are who they claim to be, preventing man-in-the-middle attacks.
Additional Security Measures
In addition to the encryption methods and protocols mentioned above, NordVPN.com employs several additional security measures to ensure the security and integrity of user data. These measures include:
1. 256-bit SSL/TLS encryption: NordVPN.com uses 256-bit SSL/TLS encryption to encrypt data transmitted between the user's device and the VPN server.
2. DNS leak protection: NordVPN.com's DNS leak protection ensures that DNS requests are routed through the VPN server, preventing DNS leaks and ensuring that user data remains private.
3. Kill switch: NordVPN.com's kill switch feature automatically terminates the internet connection if the VPN connection is lost, preventing data leaks and ensuring that user data remains secure.
4. Split tunneling: NordVPN.com's split tunneling feature allows users to select which applications and data are routed through the VPN, ensuring that sensitive data remains private and secure.
Conclusion
In conclusion, NordVPN.com's encryption methods and protocols provide a robust and secure way to protect user data. With the use of AES encryption, multiple VPN protocols, and additional security measures, NordVPN.com ensures that user data remains confidential, integrity is maintained, and authenticity is ensured. As the digital landscape continues to evolve, it is essential to stay ahead of the curve and employ the latest encryption methods and protocols to ensure the security and integrity of user data.

Server Locations and Availability

NordVPN.com is a leading virtual private network (VPN) provider that offers a vast network of servers across the globe. In this chapter, we will delve into the details of NordVPN.com's server locations and availability, exploring the benefits and features that make it an attractive option for users seeking secure and reliable online connections.
Overview of NordVPN.com's Server Network
NordVPN.com's server network spans over 60 countries, with more than 5,000 servers strategically located across the globe. This extensive network allows users to access a wide range of geographic locations, ensuring that they can bypass geo-restrictions and access content from anywhere in the world.
Server Locations
NordVPN.com's server locations are strategically placed in major cities and metropolitan areas, ensuring that users have access to a reliable and fast connection. Some of the key locations include:
1. North America: United States, Canada, Mexico, and Brazil
2. Europe: Germany, France, United Kingdom, Spain, Italy, and more
3. Asia-Pacific: Japan, South Korea, China, Australia, and Singapore
4. South America: Brazil, Argentina, Chile, and Peru
5. Africa: South Africa, Egypt, and Morocco
6. Middle East: Israel, Turkey, and the United Arab Emirates
Server Types
NordVPN.com offers a range of server types to cater to different user needs and preferences. These include:
1. Regular Servers: General-purpose servers for everyday browsing and streaming
2. Streaming Servers: Optimized for streaming popular services like Netflix, Hulu, and Amazon Prime
3. P2P Servers: Designed for peer-to-peer file sharing and torrenting
4. Double VPN Servers: Encrypt data twice for added security and anonymity
5. Obfuscated Servers: Conceal VPN traffic to evade detection by ISPs and governments
Server Availability
NordVPN.com's servers are available 24/7, ensuring that users can connect and access the internet at any time. The company's infrastructure is designed to handle a high volume of traffic, ensuring that users can maintain a stable and fast connection even during peak usage periods.
Server Maintenance and Updates
NordVPN.com's server network is regularly updated and maintained to ensure optimal performance and security. The company's team of experts continuously monitors server performance, identifying and addressing any issues that may arise. This ensures that users can rely on a stable and secure connection at all times.
Conclusion
NordVPN.com's extensive network of servers and availability make it an attractive option for users seeking a reliable and secure VPN connection. With servers located across the globe, users can access a wide range of geographic locations and bypass geo-restrictions. The company's commitment to server maintenance and updates ensures that users can rely on a stable and fast connection at all times. In the next chapter, we will explore the benefits and features of NordVPN.com's encryption and security protocols.

No-Logs Policy

As a leading Virtual Private Network (VPN) provider, NordVPN.com takes the privacy and security of its users very seriously. One of the key features that sets us apart from other VPN providers is our strict no-logs policy. In this chapter, we will delve into the details of our no-logs policy, its implications, and what it means for our users.
What is a No-Logs Policy?
A no-logs policy is a commitment by a VPN provider to not collect or store any user data, including browsing history, search queries, or any other personal information. This means that NordVPN.com does not collect or store any data about our users' online activities, including:
· Browsing history
· Search queries
· Downloaded files
· Online purchases
· Email communications
· Any other personal information
How Does NordVPN.com's No-Logs Policy Work?
NordVPN.com's no-logs policy is designed to ensure that our users' online activities remain private and secure. Here's how it works:
1. No Data Collection: NordVPN.com does not collect any data about our users' online activities. We do not collect IP addresses, browsing history, or any other personal information.
2. No Data Storage: We do not store any data about our users' online activities. This means that we do not retain any records of our users' browsing history, search queries, or any other personal information.
3. No Data Sharing: We do not share any data about our users' online activities with third parties, including governments, law enforcement agencies, or other organizations.
Implications of NordVPN.com's No-Logs Policy
NordVPN.com's no-logs policy has several implications for our users:
1. Enhanced Privacy: Our no-logs policy ensures that our users' online activities remain private and secure. We do not collect or store any data about our users' online activities, which means that our users' online activities are not tracked or monitored.
2. Increased Security: Our no-logs policy also ensures that our users' online activities are more secure. Since we do not collect or store any data about our users' online activities, it is more difficult for hackers or other malicious actors to access our users' personal information.
3. Compliance with Data Protection Regulations: Our no-logs policy ensures that we comply with data protection regulations, such as the General Data Protection Regulation (GDPR) in the European Union. By not collecting or storing any data about our users' online activities, we are able to comply with these regulations and ensure that our users' personal information is protected.
Benefits of NordVPN.com's No-Logs Policy
NordVPN.com's no-logs policy offers several benefits to our users:
1. Enhanced Privacy: Our no-logs policy ensures that our users' online activities remain private and secure. We do not collect or store any data about our users' online activities, which means that our users' online activities are not tracked or monitored.
2. Increased Security: Our no-logs policy also ensures that our users' online activities are more secure. Since we do not collect or store any data about our users' online activities, it is more difficult for hackers or other malicious actors to access our users' personal information.
3. Compliance with Data Protection Regulations: Our no-logs policy ensures that we comply with data protection regulations, such as the General Data Protection Regulation (GDPR) in the European Union. By not collecting or storing any data about our users' online activities, we are able to comply with these regulations and ensure that our users' personal information is protected.
Conclusion
In conclusion, NordVPN.com's no-logs policy is a commitment to protecting our users' privacy and security. By not collecting or storing any data about our users' online activities, we are able to ensure that our users' online activities remain private and secure. Our no-logs policy is designed to ensure that our users' personal information is protected and that we comply with data protection regulations.

Speed Tests and Results

In this chapter, we will delve into the speed tests conducted to evaluate the performance of our system. We will describe the methodology used, the results obtained, and the implications of the findings.
Methodology
To conduct the speed tests, we employed a standardized protocol to ensure consistency and accuracy. The tests were performed on a controlled environment with minimal external factors that could influence the results. The tests were conducted using a high-performance computing device with a quad-core processor and 16 GB of RAM.
The tests were designed to simulate real-world scenarios, including:
1. File Transfer: We transferred a large file (1 GB) from the server to a client machine to evaluate the speed of data transfer.
2. Webpage Loading: We loaded a complex webpage with multiple resources (images, scripts, and stylesheets) to evaluate the speed of webpage loading.
3. Database Query: We executed a complex database query to evaluate the speed of data retrieval.
Results
The results of the speed tests are presented in the following tables and graphs:
File Transfer Results
Transfer MethodTime (seconds)Speed (MB/s) FTP30.1233.33 SFTP25.6739.12 HTTP20.4549.12
Webpage Loading Results
ResourceLoad Time (seconds)Size (KB) Images2.12100 Scripts1.8550 Stylesheets1.4520 Total5.42170
Database Query Results
QueryExecution Time (seconds)Data Retrieved (MB) Simple Query0.8510 Complex Query2.1250 Aggregate Query1.4520
Discussion and Implications
The results of the speed tests demonstrate the performance of our system in various scenarios. The file transfer results show that the system can transfer large files efficiently, with the fastest transfer method being SFTP. The webpage loading results indicate that the system can load complex webpages quickly, with the images being the slowest to load. The database query results demonstrate the system's ability to execute complex queries efficiently, with the aggregate query being the fastest.
The implications of these results are significant. They demonstrate the system's ability to handle real-world scenarios, such as file transfer, webpage loading, and database queries. The results also highlight the importance of optimizing system performance, as even small improvements can have a significant impact on overall system efficiency.
Conclusion
In conclusion, the speed tests conducted demonstrate the performance of our system in various scenarios. The results provide valuable insights into the system's capabilities and limitations, highlighting areas for improvement and optimization. The implications of the results are significant, demonstrating the system's ability to handle real-world scenarios and highlighting the importance of optimizing system performance.

Server Performance and Optimization

As a leading Virtual Private Network (VPN) provider, NordVPN.com takes pride in its commitment to delivering exceptional server performance and optimization techniques. In this chapter, we will delve into the intricacies of NordVPN.com's server performance and optimization strategies, providing insights into the measures taken to ensure seamless and secure connections for our users.
Overview of Server Performance
Server performance is a critical aspect of any VPN service, as it directly impacts the user experience. NordVPN.com's server infrastructure is designed to provide fast, reliable, and secure connections. Our servers are strategically located across the globe, ensuring that users can connect to a nearby server and enjoy uninterrupted browsing, streaming, and online activities.
Server Architecture
NordVPN.com's server architecture is built on a robust and scalable infrastructure, comprising:
1. Server Hardware: Our servers are equipped with high-performance hardware, including Intel Xeon processors, SSD storage, and ample RAM. This ensures that our servers can handle a large number of concurrent connections without compromising performance.
2. Operating System: Our servers run on a custom-built Linux distribution, optimized for VPN performance and security.
3. Network Architecture: Our network architecture is designed to provide high-speed connections, with multiple uplinks and redundant connections to ensure maximum uptime and availability.
Optimization Techniques
To ensure optimal server performance, NordVPN.com employs a range of optimization techniques, including:
1. Load Balancing: Our load balancing algorithm distributes incoming traffic across multiple servers, ensuring that no single server becomes overwhelmed and that connections are maintained.
2. Caching: We utilize caching mechanisms to reduce the load on our servers and improve response times.
3. Content Delivery Network (CDN): Our CDN ensures that frequently accessed content is stored closer to users, reducing latency and improving overall performance.
4. Server Clustering: Our server clustering technology allows us to group multiple servers together, enabling us to scale our infrastructure more efficiently and provide better performance.
5. Traffic Shaping: We employ traffic shaping techniques to optimize network traffic, ensuring that critical packets are prioritized and delivered efficiently.
Security Measures
NordVPN.com takes the security of our users' data extremely seriously. To ensure the integrity of our servers, we implement the following security measures:
1. Encryption: All data transmitted between our servers and users is encrypted using AES-256, ensuring that sensitive information remains protected.
2. Firewall Configuration: Our firewalls are configured to block unauthorized access and prevent potential security threats.
3. Regular Security Audits: We conduct regular security audits to identify and address potential vulnerabilities.
4. Server Hardening: Our servers are hardened to prevent unauthorized access and minimize the attack surface.
Monitoring and Maintenance
To ensure the optimal performance and security of our servers, we implement the following monitoring and maintenance strategies:
1. Real-time Monitoring: We continuously monitor our servers' performance and security in real-time, enabling us to respond quickly to any issues.
2. Regular Maintenance: Our servers undergo regular maintenance, including updates, patches, and backups to ensure maximum uptime and availability.
3. Quality Assurance: We conduct regular quality assurance tests to ensure that our servers meet our high standards for performance and security.
Conclusion
In conclusion, NordVPN.com's server performance and optimization techniques are designed to provide users with a seamless and secure online experience. By leveraging cutting-edge technology and implementing robust security measures, we ensure that our users can trust our service to protect their online activities. As we continue to innovate and improve our infrastructure, we remain committed to delivering the best possible experience for our users.

User Interface and Design

NordVPN.com.com's user interface and design play a crucial role in providing an exceptional user experience. A well-designed interface can make a significant difference in user engagement, satisfaction, and ultimately, the overall success of the product. In this chapter, we will delve into the details of NordVPN.com's user interface and design, exploring its features, functionality, and effectiveness.
Overview of the User Interface
NordVPN.com's user interface is clean, intuitive, and easy to navigate. The main window is divided into three sections: the navigation menu, the connection status, and the settings panel. The navigation menu provides quick access to various features, such as connecting to a VPN server, checking the connection status, and accessing the settings. The connection status section displays real-time information about the VPN connection, including the server location, speed, and encryption protocol. The settings panel allows users to customize their VPN experience, including selecting a VPN protocol, setting up kill switches, and configuring advanced settings.
Design Principles
NordVPN.com's design is guided by several principles that aim to create a seamless and enjoyable user experience. These principles include:
1. Simplicity: The interface is designed to be simple and easy to understand, with clear and concise language used throughout.
2. Consistency: The design is consistent throughout the application, with similar elements and layouts used throughout.
3. Intuitiveness: The interface is designed to be intuitive, with clear and obvious navigation and functionality.
4. Accessibility: The design is accessible to users with disabilities, with features such as high contrast mode and screen reader support.
5. Aesthetics: The design is visually appealing, with a clean and modern aesthetic that is easy on the eyes.
Key Features
NordVPN.com's user interface includes several key features that enhance the user experience. These features include:
1. Server Selection: The interface allows users to select from over 5,000 servers in 60 countries, with options to filter by country, city, or server load.
2. Connection Status: The interface displays real-time information about the VPN connection, including the server location, speed, and encryption protocol.
3. Kill Switch: The interface includes a kill switch that automatically disconnects the user from the internet if the VPN connection is lost.
4. Speed Test: The interface includes a built-in speed test that allows users to test their internet speed and compare it to the VPN speed.
5. Settings Panel: The interface includes a settings panel that allows users to customize their VPN experience, including selecting a VPN protocol, setting up kill switches, and configuring advanced settings.
Effectiveness
NordVPN.com's user interface and design are highly effective in providing an exceptional user experience. The clean and intuitive design makes it easy for users to navigate and use the application, while the features and functionality provide a high level of customization and control. The interface is also highly responsive and fast, making it easy to use on a variety of devices and platforms.
Conclusion
In conclusion, NordVPN.com's user interface and design are critical components of the application's overall success. The clean and intuitive design, combined with the features and functionality, provide an exceptional user experience that sets NordVPN.com apart from other VPN providers. By understanding the design principles and key features of NordVPN.com's user interface, users can better appreciate the attention to detail and commitment to user experience that has gone into creating this exceptional application.

submitted by jjdewit to easyvpn [link] [comments]


2024.06.01 12:18 miroljub-petrovic Configure Intel AC 8260 wifi card as second interface on Proxmox

I want to set static 192.168.1.100 for ethernet card (which works) and 192.168.1.101 for wifi card which doesn't work. Wifi card hardware is functional, I am certain in that.
This is the wifi card:
root@pve:~# lspci grep -i network 02:00.0 Network controller: Intel Corporation Wireless 8260 (rev 3a)
The current configuration:
Screenshot: https://i.postimg.cc/43kzCwjh/image.png
Configuration in: /etc/network/interfaces
``` root@pve:~# cat /etc/network/interfaces
auto lo iface lo inet loopback
iface eno1 inet manual
auto vmbr0 iface vmbr0 inet static address 192.168.1.100/24 gateway 192.168.1.1 bridge-ports eno1 bridge-stp off bridge-fd 0
auto wlp2s0 iface wlp2s0 inet manual wpa-conf /etc/wpa_supplicant/wpa_supplicant.conf
auto vmbr1 iface vmbr1 inet static address 192.168.1.101/24 gateway 192.168.1.1 bridge-ports wlp2s0 bridge-stp off bridge-fd 0
root@pve:~# ```
Wifi config in /etc/wpa_supplicant/wpa_supplicant.conf
```
root@pve:~# cat /etc/wpa_supplicant/wpa_supplicant.conf ctrl_interface=DIR=/varun/wpa_supplicant GROUP=netdev update_config=1 country=US
network={ ssid="my-ssid" psk="my-pass" } root@pve:~# ```
Wifi status:
root@pve:~# wpa_cli -i wlp2s0 status bssid=08:36:c9:69:cf:52 freq=5220 ssid=NTGR_CF52_5G id=0 mode=station wifi_generation=5 pairwise_cipher=CCMP group_cipher=CCMP key_mgmt=WPA2-PSK wpa_state=COMPLETED p2p_device_address=14:ab:c5:82:3a:ad address=14:ab:c5:82:3a:ac uuid=91f1b983-b4e8-511d-a211-57340c8ec29f ieee80211ac=1 root@pve:~#
Scan and list wifi networks:
``` root@pve:~# wpa_cli -i wlp2s0 scan OK
root@pve:~# wpa_cli -i wlp2s0 scan_results bssid / frequency / signal level / flags / ssid 08:37:c9:67:cf:52 5220 -56 [WPA2-PSK-CCMP][ESS] NTGR_CF123_5G ```
Virtual bridge with wifi card shows it is down:
root@pve:~# ip link show vmbr1 9: vmbr1: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 3a:aa:52:5c:ef:ba brd ff:ff:ff:ff:ff:ff root@pve:~#
Virtual bridge with ethernet is up:
root@pve:~# ip link show vmbr0 8: vmbr0: mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000 link/ether 00:23:24:b0:ef:fa brd ff:ff:ff:ff:ff:ff root@pve:~#
Ifconfig all interfaces, vmbr1 is not running:
``` root@pve:~# ifconfig eno1: flags=4163 mtu 1500 ether 00:23:24:b0:ef:fa txqueuelen 1000 (Ethernet) RX packets 5634 bytes 2094851 (1.9 MiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 3740 bytes 2226327 (2.1 MiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 device interrupt 16 memory 0xdf200000-df220000
lo: flags=73 mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid 0x10 loop txqueuelen 1000 (Local Loopback) RX packets 2118 bytes 198372 (193.7 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 2118 bytes 198372 (193.7 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
vmbr0: flags=4163 mtu 1500 inet 192.168.1.100 netmask 255.255.255.0 broadcast 0.0.0.0 inet6 fe80::223:24ff:feb0:effa prefixlen 64 scopeid 0x20 ether 00:23:24:b0:ef:fa txqueuelen 1000 (Ethernet) RX packets 2521 bytes 924490 (902.8 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 1573 bytes 1021645 (997.7 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
vmbr1: flags=4099 mtu 1500 inet 192.168.1.101 netmask 255.255.255.0 broadcast 0.0.0.0 ether 3a:aa:52:5c:ef:ba txqueuelen 1000 (Ethernet) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 0 bytes 0 (0.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
wlp2s0: flags=4163 mtu 1500 ether 14:ab:c5:82:3a:ac txqueuelen 1000 (Ethernet) RX packets 261 bytes 13051 (12.7 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 11 bytes 1551 (1.5 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
root@pve:~# ```
Proxmox version:
root@pve:~# pveversion pve-manage7.3-6/723bb6ec (running kernel: 5.15.85-1-pve)
Router sees wifi card is connected but on 0.0.0.0 instead of 192.168.1.101.
https://postimg.cc/LYGFJsnt
How to get wifi to work and have it available on 192.168.1.101?
submitted by miroljub-petrovic to HomeNetworking [link] [comments]


2024.06.01 11:55 miroljub-petrovic Configure Intel AC 8260 wifi card as second interface on Proxmox

I want to set static 192.168.1.100 for ethernet card (which works) and 192.168.1.101 for wifi card which doesn't work. Wifi card hardware is functional, I am certain in that.
This is the wifi card:
root@pve:~# lspci grep -i network 02:00.0 Network controller: Intel Corporation Wireless 8260 (rev 3a)
The current configuration:
Screenshot: https://i.postimg.cc/43kzCwjh/image.png
Configuration in: /etc/network/interfaces
``` root@pve:~# cat /etc/network/interfaces
auto lo iface lo inet loopback
iface eno1 inet manual
auto vmbr0 iface vmbr0 inet static address 192.168.1.100/24 gateway 192.168.1.1 bridge-ports eno1 bridge-stp off bridge-fd 0
auto wlp2s0 iface wlp2s0 inet manual wpa-conf /etc/wpa_supplicant/wpa_supplicant.conf
auto vmbr1 iface vmbr1 inet static address 192.168.1.101/24 gateway 192.168.1.1 bridge-ports wlp2s0 bridge-stp off bridge-fd 0
root@pve:~# ```
Wifi config in /etc/wpa_supplicant/wpa_supplicant.conf
```
root@pve:~# cat /etc/wpa_supplicant/wpa_supplicant.conf ctrl_interface=DIR=/varun/wpa_supplicant GROUP=netdev update_config=1 country=US
network={ ssid="my-ssid" psk="my-pass" } root@pve:~# ```
Wifi status:
root@pve:~# wpa_cli -i wlp2s0 status bssid=08:36:c9:69:cf:52 freq=5220 ssid=NTGR_CF52_5G id=0 mode=station wifi_generation=5 pairwise_cipher=CCMP group_cipher=CCMP key_mgmt=WPA2-PSK wpa_state=COMPLETED p2p_device_address=14:ab:c5:82:3a:ad address=14:ab:c5:82:3a:ac uuid=91f1b983-b4e8-511d-a211-57340c8ec29f ieee80211ac=1 root@pve:~#
Scan and list wifi networks:
``` root@pve:~# wpa_cli -i wlp2s0 scan OK
root@pve:~# wpa_cli -i wlp2s0 scan_results bssid / frequency / signal level / flags / ssid 08:37:c9:67:cf:52 5220 -56 [WPA2-PSK-CCMP][ESS] NTGR_CF123_5G ```
Virtual bridge with wifi card shows it is down:
root@pve:~# ip link show vmbr1 9: vmbr1: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 3a:aa:52:5c:ef:ba brd ff:ff:ff:ff:ff:ff root@pve:~#
Virtual bridge with ethernet is up:
root@pve:~# ip link show vmbr0 8: vmbr0: mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000 link/ether 00:23:24:b0:ef:fa brd ff:ff:ff:ff:ff:ff root@pve:~#
Ifconfig all interfaces, vmbr1 is not running:
``` root@pve:~# ifconfig eno1: flags=4163 mtu 1500 ether 00:23:24:b0:ef:fa txqueuelen 1000 (Ethernet) RX packets 5634 bytes 2094851 (1.9 MiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 3740 bytes 2226327 (2.1 MiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 device interrupt 16 memory 0xdf200000-df220000
lo: flags=73 mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid 0x10 loop txqueuelen 1000 (Local Loopback) RX packets 2118 bytes 198372 (193.7 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 2118 bytes 198372 (193.7 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
vmbr0: flags=4163 mtu 1500 inet 192.168.1.100 netmask 255.255.255.0 broadcast 0.0.0.0 inet6 fe80::223:24ff:feb0:effa prefixlen 64 scopeid 0x20 ether 00:23:24:b0:ef:fa txqueuelen 1000 (Ethernet) RX packets 2521 bytes 924490 (902.8 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 1573 bytes 1021645 (997.7 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
vmbr1: flags=4099 mtu 1500 inet 192.168.1.101 netmask 255.255.255.0 broadcast 0.0.0.0 ether 3a:aa:52:5c:ef:ba txqueuelen 1000 (Ethernet) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 0 bytes 0 (0.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
wlp2s0: flags=4163 mtu 1500 ether 14:ab:c5:82:3a:ac txqueuelen 1000 (Ethernet) RX packets 261 bytes 13051 (12.7 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 11 bytes 1551 (1.5 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
root@pve:~# ```
Proxmox version:
root@pve:~# pveversion pve-manage7.3-6/723bb6ec (running kernel: 5.15.85-1-pve)
Router sees wifi card is connected but on 0.0.0.0 instead of 192.168.1.101.
https://postimg.cc/LYGFJsnt
How to get wifi to work and have it available on 192.168.1.101?
submitted by miroljub-petrovic to homelab [link] [comments]


2024.06.01 11:53 miroljub-petrovic Configure Intel AC 8260 wifi card as second interface on Proxmox

I want to set static 192.168.1.100 for ethernet card (which works) and 192.168.1.101 for wifi card which doesn't work. Wifi card hardware is functional, I am certain in that.
This is the wifi card:
root@pve:~# lspci grep -i network 02:00.0 Network controller: Intel Corporation Wireless 8260 (rev 3a)
The current configuration:
Screenshot: https://i.postimg.cc/43kzCwjh/image.png
Configuration in: /etc/network/interfaces
``` root@pve:~# cat /etc/network/interfaces
auto lo iface lo inet loopback
iface eno1 inet manual
auto vmbr0 iface vmbr0 inet static address 192.168.1.100/24 gateway 192.168.1.1 bridge-ports eno1 bridge-stp off bridge-fd 0
auto wlp2s0 iface wlp2s0 inet manual wpa-conf /etc/wpa_supplicant/wpa_supplicant.conf
auto vmbr1 iface vmbr1 inet static address 192.168.1.101/24 gateway 192.168.1.1 bridge-ports wlp2s0 bridge-stp off bridge-fd 0
root@pve:~# ```
Wifi config in /etc/wpa_supplicant/wpa_supplicant.conf
```
root@pve:~# cat /etc/wpa_supplicant/wpa_supplicant.conf ctrl_interface=DIR=/varun/wpa_supplicant GROUP=netdev update_config=1 country=US
network={ ssid="my-ssid" psk="my-pass" } root@pve:~# ```
Wifi status:
root@pve:~# wpa_cli -i wlp2s0 status bssid=08:36:c9:69:cf:52 freq=5220 ssid=NTGR_CF52_5G id=0 mode=station wifi_generation=5 pairwise_cipher=CCMP group_cipher=CCMP key_mgmt=WPA2-PSK wpa_state=COMPLETED p2p_device_address=14:ab:c5:82:3a:ad address=14:ab:c5:82:3a:ac uuid=91f1b983-b4e8-511d-a211-57340c8ec29f ieee80211ac=1 root@pve:~#
Scan and list wifi networks:
``` root@pve:~# wpa_cli -i wlp2s0 scan OK
root@pve:~# wpa_cli -i wlp2s0 scan_results bssid / frequency / signal level / flags / ssid 08:37:c9:67:cf:52 5220 -56 [WPA2-PSK-CCMP][ESS] NTGR_CF123_5G ```
Virtual bridge with wifi card shows it is down:
root@pve:~# ip link show vmbr1 9: vmbr1: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 3a:aa:52:5c:ef:ba brd ff:ff:ff:ff:ff:ff root@pve:~#
Virtual bridge with ethernet is up:
root@pve:~# ip link show vmbr0 8: vmbr0: mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000 link/ether 00:23:24:b0:ef:fa brd ff:ff:ff:ff:ff:ff root@pve:~#
Ifconfig all interfaces, vmbr1 is not running:
``` root@pve:~# ifconfig eno1: flags=4163 mtu 1500 ether 00:23:24:b0:ef:fa txqueuelen 1000 (Ethernet) RX packets 5634 bytes 2094851 (1.9 MiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 3740 bytes 2226327 (2.1 MiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 device interrupt 16 memory 0xdf200000-df220000
lo: flags=73 mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid 0x10 loop txqueuelen 1000 (Local Loopback) RX packets 2118 bytes 198372 (193.7 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 2118 bytes 198372 (193.7 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
vmbr0: flags=4163 mtu 1500 inet 192.168.1.100 netmask 255.255.255.0 broadcast 0.0.0.0 inet6 fe80::223:24ff:feb0:effa prefixlen 64 scopeid 0x20 ether 00:23:24:b0:ef:fa txqueuelen 1000 (Ethernet) RX packets 2521 bytes 924490 (902.8 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 1573 bytes 1021645 (997.7 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
vmbr1: flags=4099 mtu 1500 inet 192.168.1.101 netmask 255.255.255.0 broadcast 0.0.0.0 ether 3a:aa:52:5c:ef:ba txqueuelen 1000 (Ethernet) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 0 bytes 0 (0.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
wlp2s0: flags=4163 mtu 1500 ether 14:ab:c5:82:3a:ac txqueuelen 1000 (Ethernet) RX packets 261 bytes 13051 (12.7 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 11 bytes 1551 (1.5 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
root@pve:~# ```
Proxmox version:
root@pve:~# pveversion pve-manage7.3-6/723bb6ec (running kernel: 5.15.85-1-pve)
Router sees wifi card is connected but on 0.0.0.0 instead of 192.168.1.101.
https://postimg.cc/LYGFJsnt
How to get wifi to work and have it available on 192.168.1.101?
submitted by miroljub-petrovic to Proxmox [link] [comments]


2024.06.01 10:20 NoCompetition7454 audio(mp3, wav) and video(mp4) files not opening after upgrading to linux mint 21.2

i have tried purging - rebooting- and re-downloading celluloid to no avail
here is my info
System:
Kernel: 6.5.0-1023-oem x86_64 bits: 64 compiler: N/A Desktop: Cinnamon 5.8.4 tk: GTK 3.24.33
wm: muffin dm: LightDM Distro: Linux Mint 21.2 Victoria base: Ubuntu 22.04 jammy
Machine:
Type: Desktop Mobo: Micro-Star model: B450 TOMAHAWK MAX (MS-7C02) v: 1.0
serial: UEFI: American Megatrends v: 3.70 date: 06/09/2020
CPU:
Info: 6-core model: AMD Ryzen 5 3600 bits: 64 type: MT MCP arch: Zen 2 rev: 0 cache: L1: 384 KiB
L2: 3 MiB L3: 32 MiB
Speed (MHz): avg: 2510 high: 3600 min/max: 2200/4208 boost: enabled cores: 1: 3483 2: 2185
3: 2125 4: 2200 5: 2200 6: 2068 7: 3589 8: 2106 9: 2174 10: 3600 11: 2200 12: 2200
bogomips: 86402
Flags: avx avx2 ht lm nx pae sse sse2 sse3 sse4_1 sse4_2 sse4a ssse3 svm
Graphics:
Device-1: NVIDIA TU116 [GeForce GTX 1660 SUPER] vendor: ZOTAC driver: nvidia v: 535.171.04 pcie:
speed: 5 GT/s lanes: 16 ports: active: none off: DP-1,DP-3,HDMI-A-1 empty: DP-2 bus-ID: 26:00.0
chip-ID: 10de:21c4
Display: x11 server: X.Org v: 1.21.1.4 driver: X: loaded: nvidia
unloaded: fbdev,modesetting,nouveau,vesa gpu: nvidia display-ID: :0 screens: 1
Screen-1: 0 s-res: 6400x1080 s-dpi: 94
Monitor-1: DP-0 pos: center res: 1920x1080 dpi: 90 diag: 623mm (24.5")
Monitor-2: DP-4 pos: primary,left res: 2560x1080 dpi: 94 diag: 749mm (29.5")
Monitor-3: HDMI-0 pos: right res: 1920x1080 dpi: 37 diag: 1511mm (59.5")
OpenGL: renderer: NVIDIA GeForce GTX 1660 SUPEPCIe/SSE2 v: 4.6.0 NVIDIA 535.171.04
direct render: Yes
Audio:
Device-1: NVIDIA TU116 High Definition Audio vendor: ZOTAC driver: snd_hda_intel v: kernel pcie:
speed: 8 GT/s lanes: 16 bus-ID: 26:00.1 chip-ID: 10de:1aeb
Device-2: AMD Starship/Matisse HD Audio vendor: Micro-Star MSI driver: snd_hda_intel v: kernel
pcie: speed: 16 GT/s lanes: 16 bus-ID: 28:00.4 chip-ID: 1022:1487
Device-3: Astro Gaming A50 type: USB driver: hid-generic,snd-usb-audio,usbhid bus-ID: 1-3.1:5
chip-ID: 9886:002c
Device-4: Blue Microphones Yeti Stereo Microphone type: USB
driver: hid-generic,snd-usb-audio,usbhid bus-ID: 1-9:9 chip-ID: b58e:9e84
Sound Server-1: ALSA v: k6.5.0-1023-oem running: yes
Sound Server-2: PulseAudio v: 15.99.1 running: yes
Sound Server-3: PipeWire v: 0.3.48 running: yes
Network:
Device-1: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet vendor: Micro-Star MSI
driver: r8169 v: kernel pcie: speed: 2.5 GT/s lanes: 1 port: f000 bus-ID: 22:00.0
chip-ID: 10ec:8168
IF: enp34s0 state: up speed: 1000 Mbps duplex: full mac:
Drives:
Local Storage: total: 1.36 TiB used: 680.42 GiB (48.7%)
ID-1: /dev/nvme0n1 vendor: Samsung model: SSD 970 EVO 1TB size: 931.51 GiB speed: 31.6 Gb/s
lanes: 4 serial: temp: 34.9 C
ID-2: /dev/sda vendor: Samsung model: SSD 870 EVO 500GB size: 465.76 GiB speed: 6.0 Gb/s
serial:
Partition:
ID-1: / size: 915.32 GiB used: 680.41 GiB (74.3%) fs: ext4 dev: /dev/nvme0n1p2
ID-2: /boot/efi size: 511 MiB used: 6.1 MiB (1.2%) fs: vfat dev: /dev/nvme0n1p1
Swap:
ID-1: swap-1 type: file size: 2 GiB used: 0 KiB (0.0%) priority: -2 file: /swapfile
Sensors:
System Temperatures: cpu: N/A mobo: N/A gpu: nvidia temp: 38 C
Fan Speeds (RPM): N/A gpu: nvidia fan: 29%
Repos:
Packages: 2770 apt: 2746 flatpak: 24
No active apt repos in: /etc/apt/sources.list
Active apt repos in: /etc/apt/sources.list.d/official-package-repositories.list
1: deb http: //packages.linuxmint.com victoria main upstream import backport
2: deb http: //mirror.steadfastnet.com/ubuntu jammy main restricted universe multiverse
3: deb http: //mirror.steadfastnet.com/ubuntu jammy-updates main restricted universe multiverse
4: deb http: //mirror.steadfastnet.com/ubuntu jammy-backports main restricted universe multiverse
5: deb http: //security.ubuntu.com/ubuntu/ jammy-security main restricted universe multiverse
Active apt repos in: /etc/apt/sources.list.d/vscode.list
1: deb [arch=amd64,arm64,armhf] http: //packages.microsoft.com/repos/code stable main
Info:
Processes: 347 Uptime: 7m Memory: 31.28 GiB used: 3.21 GiB (10.3%) Init: systemd v: 249
runlevel: 5 Compilers: gcc: 11.4.0 alt: 11/12 Client: Cinnamon v: 5.8.4 inxi: 3.3.13
submitted by NoCompetition7454 to linuxmint [link] [comments]


2024.06.01 10:02 Popular-Freedom-3459 Nay Varan Bhat Loncha Kon Nai Koncha (2022) How to Watch & Download just 5 minutes


  1. Open google - simple right!!
  2. Stop your antivirus - pause is a better word or let it run and check for yourself
  3. Adblocker on or off - not sure
  4. Just search the movie name or key words on google such as (movie name+download+free+torrent) etc.
  5. Check the one with mp4movies in the search
  6. Open instagram and follow vishi_insane (link attached :D :P)
  7. continue with mp4movies in the search and click it
  8. Keep trying and the download will start
  9. Image attached is from VLC player and not some random google image
  10. Think for a minute and go back to point 6 if you haven't done and respect the bro code
submitted by Popular-Freedom-3459 to u/Popular-Freedom-3459 [link] [comments]


2024.06.01 09:19 Yazeed1x I'm Just Pissed Off .

I'm Just Pissed Off .

Title: Help Needed: "Failed to Create SDL Window" Error on Dark OS with Wine

I'm running into a frustrating issue and could really use some help. I'm trying to run games on Dark OS, a Windows emulator that uses Wine on Termux and Termux X11 on my Android device. Here's a quick rundown of my setup:
  • Device: Helio G80 with Mali G52 MC2 GPU, 8-core processor
  • OS: Android 14
  • Emulator: Dark OS
  • Wine Version: Tried multiple versions including 9.0 Proton non-wow64, 9.3 wow64, and 8.18 staging wow64
  • Graphics: Using VirGL drivers with OpenGL 4.0
  • Issue: Whenever I try to run Half-Life or similar games, I get a "Failed to create SDL Window" error.

What I've Tried So Far:

  1. Wine Configuration:
    • Set Windows version to Windows 10.
    • Added SDL overrides (sdl2 and sdl set to native, builtin).
    • Enabled "Automatically capture the mouse in full-screen windows."
    • Allowed the window manager to decorate and control the windows.
    • Tried emulating a virtual desktop with various resolutions.
  2. VirGL Settings:
    • Ensured OpenGL 4.0 is selected.
    • Set Mesa loader to virpipe.
    • Set Gallium driver to virpipe.
    • Configured the GPU type to match Mali G52.
  3. DXVK Versions:
    • Tried the latest stable DXVK version 2.3.1 and other versions down to 2.0.
  4. Running with Debugging:
    • Used WINEDEBUG=+sdl wine hl.exe to gather detailed logs.

Current Error:

Despite all these efforts, I still receive the "Failed to create SDL Window" error. Below is a screenshot of the error: ![Error Screenshot](URL_TO_ERROR_SCREENSHOT)

Additional Information:

  • Other .exe files run without issues.
  • All related software (Termux, Wine, Termux X11) is up to date.
submitted by Yazeed1x to EmulationOnAndroid [link] [comments]


2024.06.01 06:59 Moto_sx Current state of warzone right now

Current state of warzone right now submitted by Moto_sx to ModernWarfareIII [link] [comments]


2024.06.01 06:46 davedcne Ubiquiti Router with Wireguard VPN. VPN clients unable to access hosts wired to router.

So as the title implies I have a router. UDM SE. Setup with a number of wired hosts. I also have the wireguard VPN setup on the router. Router subnet is 192.168.1.0/24 Vpn subnet is 192.168.5.0/24. Dynamic DNS is setup and vpn clients can connect to the vpn. The problem is that clients on the vpn can't talk to clients on the router. After much googling I've seen lots of people with this problem 3-4 years in the past but no solutions. So I figure I would ask here to see if anyone has had any luck with what I thought was going to be a rather basic setup.
There are no custom traffic rules configured, there is no port forwarding configured. There are no custom traffic routing, or static routes configured.
The router firewall is configured with the default rules:
Accept All Internet In "Allow Established/Related Traffic"
Drop All Internet In "Drop Invalid Traffic"
Drop All Internet In "Drop All Other Traffic"
Accept All Internet Local "Allow Established/Related Traffic"
Drop All Internet Local "Drop Invalid Traffic"
Accept UDP Internet Local "Allow Wireguard"
Drop All Internet Local "Drop All Other Traffic"
Accept All LAN In "Accounting Defined Network 192.168.1.0/24"
Accept All LAN Out "Accounting Defined Network 192.168.1.0/24"
Accept All Internet v6 In "Allow Established/Related Traffic"
Drop All Internet v6 In "Drop Invalid Traffic"
Drop All Internet v6 In "Drop All Other Traffic"
Accept All Internet v6 Local "Allow Established/Related Traffic"
Drop All Internet v6 Local "Drop Invalid Traffic"
Accept IPv6-ICMP Internet v6 Local "Allow Neighbor Solicitation"
Accept IPv6-ICMP Internet v6 Local "Allow Neighbor Advertisements"
Drop All Internet v6 Local "Drop All Other Traffic"
Accept All LAN v6 Out "Allow Packets To Corporate Networks"
I feel like I'm missing something really simple that I just didn't do or didn't remember to make this work and I can't for the life of me think of what it might be. Any help would be vastly appreciated.
submitted by davedcne to Ubiquiti [link] [comments]


2024.06.01 05:26 Repulsive_Risk_1242 Dog Dog Fruit: Model: Cerberus concept creation [OC]

Art image link: https://www.reddit.com/OnePiece/comments/1cktegm/inu_inu_no_mi_model_cerberus_oc/
Animal background:
Cerberus is the legendary and powerful three-headed hellhound who is the pet of the Greek God Hades. He guards the entrance of the Underworld in Greek Mythology, preventing souls from escaping as well as illegal entry into the afterlife. Heracles had to defeat and borrow Cerberus for a while to present to King Eurystheus as his final Labor before returning him to Hades. He is also said to have manes made of snakes with a snake's head for a tail in some depictions (Mine just has the snake tail), as well as sharp teeth, jaws and claws that can bite and rend through almost anything, he can also devour souls. Cerberus devil fruit is bigger and superior to Garm's.
Awakening: Guardian of Hades
User in Beast or Hybrid form becomes bigger and jet black in color, with a red veil of soul energy wrapped around their body, their head manes and snake head's mane becomes red and flowing. User becomes way stronger, faster, more durable in this form, can also spilt themselves into 3 hellhounds. User's soul manipulation powers grow exponentially and can open portals to the Underworld, as well as summon countless black chains to bind and whip opponents with.

Abilities:
1) Keen senses of sight (Also has night vision), smell and hearing (Can smell and track down people from anywhere via the scent of their souls)
Techniques:
- Soul seeker: User concentrates, smelling their target's scent and marks their target's distinct soul and haki, so as to be able to track them from anywhere in the world no matter where they are. User cannot be fooled by transformation techniques and illusions, can immediately tell an opponent's identity no matter what as long as they have their scent recognized.
- Styx hado: User can predict their opponent's movements and attacks by reading their soul.

2) Multiple heads, powerful sharp teeth and jaws that can bite through almost anything, sharp claws, powerful howl, temporarily splitting into three single-headed individuals
Techniques:
- Cerberus mauling: User in beast form lunges at their opponent jaws first, biting and ripping their opponents to pieces. (Can be enhanced with haki)
- Cerberion ripper: User in beast or hybrid form grabs their opponents head with their main head and opponents arms with their two other heads and jaws, and rips apart their opponents heads and arms off instantly.
- Hell fang pistols: User in beast or hybrid form enhances their fangs and jaws with haki and unleashes three biting shockwaves that home in and gouge holes into whatever they bite.
- Cerberus claw: User in beast or hybrid form slashes their enemies apart with their sharp claws. (Can be enhanced with haki)
- Cerberus meteor fall: User leaps high into the air in beast form, then crash lands into the opponent paws first to crush them to death, creating a crater upon impact.
- Hell howling: User in beast form howls loudly, creating a powerful sound wave attack that blasts opponents back and knocks them out with haki.
- Ten finger pistol: Black fangs: User in hybrid form coats all ten of their fingers and claws in haki and quickly stabs their opponent in the chest, before tearing them in half.
- Tempest kick: Cerberus three: User in hybrid form unleashes a powerful air shockwave with their foot claws that splits into three and bounces toward the enemy before causing a big explosion.
- Tempest kick: Dark moon arc: User in hybrid form unleashes a powerful haki-enhanced air shockwave with their foot claws in a wide black arc that cuts and slashes enemies in a wide area.
- Thanatos Rokuogan: User in hybrid form holds their opponents arms with their two other heads and jaws before unleashing a devastating haki-enhanced shockwave with both clawed hands that blasts a hole through their opponent.
Awakened Techniques:
- Hades fang pistols: User in their awakened beast or hybrid form unleashes three haki and soul-enhanced biting shockwaves that are more powerful than their standard fang pistols.
- Hellhound's ravaging: User in their awakened beast or hybrid forms run at their enemies at high speeds and goes on a bloody rampage, biting, clawing, devouring and ripping apart anyone who stands in their way.
- Cerberion claw: User in their awakened beast or hybrid forms unleashes a more powerful haki and soul-enhanced claw attack that creates large arcs of air slashes that slices apart opponents.
- Tempest kick: Great serpent: User in their awakened hybrid form unleashes a huge, fast black air slash attack from their foot claws that quickly slithers towards enemies in a snake-like fashion, slicing apart anything in its path.
- Hand pistol: Heart breaker: User in their awakened hybrid form coats their clawed hand in haki and soul energy and then stabs through their opponents chests to rip out their heart before crushing it.
- Cerberus trio: User in beast or hybrid form temporarily splits into three individuals in their awakened form, forming a small pack.
Hungry hellhounds: The three users gang up on and bite and tear apart their opponents at high speeds until they are dead and devoured.
Fang pistol storm: The three users unleash a barrage of fang pistol attacks to bite apart and destroy everything in their wake.
Thanatos Rokuogan: Drei: The three users in hybrid form surround their opponent and then unleash Thanatos Rokuogan simultaneously to utterly destroy their enemy from all angles.

3) Snake head tail with venomous fangs, poison generation (Venom effects include giddiness, bleeding and pain)
Techniques:
- Venom fangs: User uses their snake head to bite their opponents and inject them with venom
- Venom Plague: User uses their snake head to spray poison gas at their opponents.
- Venom missile: User uses their snake head to shoot a fast powerful blob of acidic venom that burns and explodes on contact.
- Cerberion coils: User uses their snake head to lunge and coil around their opponents, and constrict them to death.
Awakened Techniques:
- Venom hunting ground: User in awakened beast or hybrid form uses their snake head to unleash an enormous cloud of poison gas that covers the battlefield, killing and weakening all enemies in that area, while the user hides in the poisonous mist and ambushes unsuspecting foes too.
- Venom fang pistol: User in awakened beast or hybrid form quickly unleashes a venom coated biting shockwave from their snake jaws that melts and poisons whatever it bites into.
- Tri serpent tear: User in awakened hybrid form splits into three and uses all 3 of their snake tails to constrict, bite and rip apart their opponents in one go.

4) Soul devouring and soul manipulation, counter to soul-based devil fruit powers, the more souls the user devours and collects the stronger they become
Techniques:
- Soul ripper: User in beast or hybrid form gathers soul energy and then rips out the soul of their enemies with their teeth and jaws to devour it.
- Hades vortex: User in beast form unleashes a torrent of souls from a large underworld portal in the form of a tornado that blows away and rips apart opponents caught up in it, before collecting any deceased souls back into the underworld.
- Soul hound scout: User in beast or hybrid form summons a soul collected from the underworld and forms it into a hellhound scout to search and track down opponents as well as attack them with.
- Soul hound body lock: User in awakened hybrid form summons multiple soul hound scouts that bite and restrain their opponent to hold them in place so the user can finish them off.
Awakened Techniques:
- 13th labor: Cerberion Legion: User in their awakened hybrid form summons a huge portal that unleashes a legion of soul hounds to attack large groups of enemies with.
- Tartarus howling: User in awakened beast form gathers all their soul energy and unleashes a devastating haki-enhanced howl of soul energy that blasts away anyone in their wake, as well as decimating the landscape.
- 14th labor: Raging Cerberion Pack: User in awakened hybrid form splits themselves into three and unleashes a legion of soul hounds, all three users and their legion gang up on their target, biting, clawing and ripping them apart in a flash before smashing them to the ground. (Inspired by Akuma's raging demon attack and Naruto's Uzumaki Barrage)
- 15th Labor: Cerberion Soul Beast Bomb: User in awakened beast form gathers all their soul energy in their jaws and unleashes a combined condensed bomb of souls that creates a massive explosion upon contact and can destroy mountains, user can collect any souls lingering in the decimated area after their enemies are dead.

5) Creating portals to the underworld, black chain summoning and manipulation
Techniques:
- Hell port: User in beast form or hybrid form creates a portal to the underworld, they can escape from danger by escaping into the underworld or drag people with them, as well as teleporting short distances.
- Chains of hades: User summons chains from the underworld to drag opponents as well as their souls into the underworld.
- Black chain whip: User summons a single chain from the underworld to whip and strike their opponents with, sending them flying.
- Portal guillotine: User summons portals, drags opponents to the portals headfirst and closes the portals to decapitate them.
Awakened Techniques:
- Black jaws of death: User in awakened beast or hybrid form disappears into a portal, they then summon multiple portals that they emerge with their multiple heads from, biting and tearing apart their opponent from all angles.
- Cerberion trio storm: User in awakened hybrid form creates multiple portals, then splits themselves into three and jumps from portal to portal while biting and slashing their enemies to pieces simultaneously.
- Black chain execution: User in awakened beast or hybrid form unleashes multiple chains from portals that impales opponents and rips them apart.
- Black chain binding: User in awakened beast or hybrid form unleashes multiple chains from portals that binds opponents and restrains them, making it easier for the user to kill them.
- Black chain lash out: User in awakened hybrid form splits themselves into three and unleashes multiple portals and from those portals multiple black chains that lash out, whipping and destroying everything in their vicinity.

6) Weapon techniques: Hybrid form wields dual chained hook blades (Hades reaper claws) that can slash and tear through almost anything, can be coated in venom, and also be enhanced with soul energy to rip souls from the bodies of enemies (Based on Claws of Hades weapons from God of War series) (Can be enhanced with haki)
Techniques:
- Soul reaper: User launches their chained hook blades at their opponents chests to rip the souls out of their enemies.
- Hook harpoon: User launches their chained hook blades at their opponents to impale them and drag their opponents closer for a follow up attack.
- Chained evisceration: User launches their chained hook blades at their opponents to impale them and rip their chest open.
- Cerberion head snatcher: User launches their chained hook blades to impale their targets head and yank their chains to rip their targets head clean off. (If this fails to impale and rip off opponents heads, opponents will still get slashed and cut by the hook blades)
- Cerberus chain cycle: User runs towards their enemies and spins their chained hook blades in dual arcs, slicing apart anyone caught up in this attack.
- Cerberus chain choke: User launches their chained hook blades at their opponents and wraps their chains around their opponents necks to strangle them to death.
- Cerberus chain slingshot: User launches their chained hook blades into the ground beside their opponent, the user then stretches the chains further back before jumping and slingshoting themselves towards their opponent at blinding speeds to send them flying or tear them in half.
- Savage ripper: User uses their multiple heads and jaws, and their chained hook blades to rip their opponents apart at close range.
- Hades venom cross: User coats their chained hook blades in venom and haki and unleashes a huge venomous cross slash onto their opponents to poison and slice them apart.
- Cerberus venom arcs: User coats their chained hook blades in venom and haki and unleashes multiple poison flying slashes that poisons and slices apart all in their wake.
Awakened Techniques:
- 12th labor: Cerberion Rage: User in awakened hybrid form creates multiple hell portals and quickly slashes their opponents from all angles with their haki-enhanced chained hook blades via the portals, before dashing towards them and finishing them off in a single almighty slash.
- Soul reaper cyclone: User in awakened hybrid form gathers a large amount of soul energy into their chained hook blades before spinning them rapidly to summon a large tornado of souls at their opponent to slice them apart and blow them away.
- Soul pack's revenge: User in awakened hybrid form splits into three, then slashes their opponents to death with their chained hook blades from multiple angles in varying combos.
- Claws of Hades: Frenzy: User in awakened hybrid form rapidly slashes their opponents apart with their chained hook blades at blinding speeds from a distance, not relenting until their target is dead.
- Claws of Hades: Titan's flash: User in awakened hybrid form gathers all their soul energy into their haki-enhanced chained hook blades before unleashing 4 gigantic arcs of black flying slashes that can carve and tear apart mountains.


Weaknesses:
Standard devil fruit weaknesses of being unable to swim and sea prism stone, as well as soul ripping not working well against strong-willed opponents.
User's keen senses of sight, smell and hearing can be countered by bright flashes of light, horrific odors and high pitched noises.
User in full beast form is particularly aggressive and bloodthirsty, making them hard to reason with once they go on a killing spree in beast form.
User in their awakened form becomes extremely violent, ferocious and even more aggressive, becoming a threat to both allies and enemies alike, after their awakened state ends, user becomes tired and exhausted.
User can only split to three individuals in their awakened form, after awakening state is done user forms back into one unit, when split into three all users speed increases but their power decreases.
User's soul constructs will disappear if hit by a powerful attack, user has limits as to how long they can summon souls for as it is tiring.
User's summoned black chains can still be destroyed by strong opponents.
User cannot use certain powerful finishing moves twice in a row as they take up energy to do so.
User's heads can still grow back if cut off but takes up lots of stamina to do so.
User can still be hurt and injured by powerful haki-enhanced attacks.

submitted by Repulsive_Risk_1242 to DevilFruitIdeas [link] [comments]


2024.06.01 05:19 poopysocked Pretty cool rare find.

Pretty cool rare find. submitted by poopysocked to FORTnITE [link] [comments]


2024.06.01 04:58 FocusedWolf Deposit 500k in a single Plunder match is not tracking

Deposit 500k in a single Plunder match is not tracking submitted by FocusedWolf to ModernWarfareIII [link] [comments]


2024.06.01 04:52 Upstairs-Pound-7205 The ugly duckling classroom.

I was responding to the post about Type B teachers and decided this was better to be a post all its own. I've been in the same classroom for over 10 years. It's a former woodshop, and it has a story that's important to me. This is a long story, but it would be worth reading if you are the type who likes a redemption arc.
TL:DR: I inherited a crazy hoard, and slowly cleaned it up.
To preface, I'm a type B person. I grew up in the house of a pack rat, and I adopted a lot of the same habits as a result. Once the amount of stuff I have gets to a certain point, I stop noticing the mess and it grows and grows. The only way that I keep organized is minimalism at this point: not only to make it easy to clean but also to lower the number of decisions I have to make on a given day.
When I got hired as a computer teacher, I got the woodshop as my room. You might be thinking, OoOoO, I'd love to have a woodshop! Wood floors, big room, what's not to love? Well no-one wanted that room. Why? Because it had been the place of 3 decades of hoarding and neglect.
Every square inch of the room was covered in graffiti. Every cabinet door was hanging on by a thread. Every lock was either broken or the latches were missing. Garbage was piled 4 feet high taking up 2/3s of the room. By garbage I mean a huge collection of broken objects that were clearly meant to be projects for the future by the well meaning woodshop teacher. Pieces of drawers, old dresser parts, massive rusted metal bookshelves, broken carts, rusted chicken wire. Sawdust filled every gap.
More than half the shelves were broken or bending under the immense weight of ancient textbooks, unfinished projects, random trinkets, sky high packets of paper, and ungraded student work. The old teacher had put up a homespun barricade in front of his hoard, and only using 1/3 of the room to teach. He was clearly only using hand tools because the machines were completely buried. That wood floor? Warping everywhere, with some boards sticking 3 inches out of the ground.
Attached to the room was a storage room, meant for hardware and lumber. There was just enough space to open a door about 2 feet and then climb over about a 5 foot high pile that filled the entire room. More projects that never got done, or jigs that were made for some long forgotten project that were kept just in case.
I opened my classroom computer case and found it choked with a layer of sawdust that felt like it was going to spontaneously combust. Ironically, the fire alarm was in a protective plastic casing, that was also choked full of sawdust. The only visible machine, the drill press, was used as a shelf for lesson packets. The room had two external walls that offered almost no insulation from the outdoors. In the summer it got stupid level hot in there because the closet contains a transformer that pukes heat. In the winter I would open the closet door to try to heat the room up, because the only other source of heat was a hot water blower fan that was located 15 ft up on the ceiling, and its power switch was - you guessed it - 15 feet up on the ceiling.
At one point the room had a drinking fountain that had been removed. There was a huge hole in the wall with pipes sticking out. To solve this, the previous occupant had bolted a long piece of corrugated sign board over it. This too, was of course, covered in drawings of phalluses and messages attesting to who was here and in what year.
So yeah, no-one wanted the room for a reason.
What was worse was it was the dumping ground for everyone else throughout the years. Staff had gotten used to offloading their damaged furniture/crap there. Sometimes I would come back and find a new gum-ridden folding table with a sheared off leg had been tucked behind the barricade.
The clean up
This took years.
Being a new teacher I was initially hesitant to just throw stuff away. What if I threw away something valuable? Something that someone was expecting back one day? I started by just vacuuming up sawdust and throwing out reams upon reams of paper packets. Many of them were stuck together with spilled finish and wood glue.
Eventually I got bolder. I got some super thick gloves and threw out anything that was heavily rusted. The old chicken wire, coffee cans full of nails and random screws. Wood that was loaded with bent rusted nails/screws. Then I threw out the broken porcelian, warped and cracked drawer parts. I coordinated with the custodians to pitch the tables/chairs with missing legs, snapped tops, etc. I managed to cobble together enough lock parts and hinge components to get 1 cabinet working and locking - I had to dig through the school to find a working key.
Over time, I eventually pitched the vast majority of the unfinished projects. I finished a few of them myself and gave them back to their respective owners who were frankly astonished to see them. I found 12 library books that had been checked out during the Dewey Decimal system/card catalog days - and the librarian was amazed that they still were intact. With the permission of the district/school I dispersed the student tools to custodial staff/maintainence who could better use them. I didn't need 20 hand saws for instance.
I repaired the drill press, the belt sander, 3 scroll saws and the band saw. The lathe was sadly beyond saving and apparently the table saw was long gone for some reason - though I am sure it pre-dated safety. Each of those tools went to maintainence.
It took a very long time to get rid of the paints, the finishes and other caustic crap. Massive red tape obviously. Eventually it was all gone though. The lumber got taken by another woodshop teacher, along with any remaining useable hardware.
I kept a small reserve of tools for myself for repairs and fabrication.
I remember when I finally reached the back of the room and took a heavy rusted bookshelf off of the shop counter. The counter was is in pristine condition - unlike the rest of the room. It had been buried long ago before the teacher had let kids get away with non-stop graffitti, carving, cutting and drilling into the hardwood tops.
With the room completely clear of crap, I began fixing/replacing all the broken cabinet hardware. I took out all the non-broken shelves and began scrubbing them down, along with the cabinets themselves and their doors. I repaired my desk, which of course had only one working drawer at first. Two were jammed and another was falling to pieces - held together by an improvised job using wire brads. I properly disassembled, scraped, sanded and glued/clamped the drawer and repaired the tracks on the other two.
I called in several work orders. The carpenters tried their best to salvage the wood floor but it was so warped that they ended up replacing sections with plywood. Not the best looking, but at least it was flat. I had the electrician remove the power cut off, since I didn't want a kid shutting off a room full of computers because he wanted to see what the big red buttons around the room did. The plumber capped the old fountain pipes behind the wall and the mason put a fresh coat wall section over it. The painters came in and did a full scale remediation over the summer of what could very well have been lead paint peeling all over the cieling. The HVAC guys cleaned out a metric f-ton of dust out of the duct work in my room, and now my room recieves proper heat and AC. Bear in mind this happened over a decade of time, not right away.
This year I finally managed to replace the last of the missing cabinet locks and got them all on a universal key. There were so many empty cabinets that I gave the space to the students to store their backpacks and jackets during class.
Every time a new teacher comes in and says "wow I wish this was my room" my across the hall co-worker says "you should have seen it when he got it." It is now a lab with multiple 3D printers, a dedicated repair station for electronics, and plenty of space for students to grab a laptop, pull up a chair and work together on coding, CAD, pretty much anything.
This summer my storage room will finally be cleared of the last of the crap. The school rotated its derelict and outdated computer gear in there for the last 4 years (since my storage was the only nearly empty one at the time). I figured if my storage was going to be the repository for any crap it may as well be computers that my students could take apart and learn from. However, that's all going away.
When I look back at this whole process, and really I only wrote a snippet of it here despite this being a Reddit book - I'm amazed that someone like me could even do this. I struggled cleaning my room as a kid. Now I conquered a mountainous horde and came out the other end with a minimalistic, clean room that is easy to maintain. It's weird how students respect a space that is already clean, and I've had way fewer instances of kids damaging the space or even leaving trash behind.
So this is the message to you type B people out there like me. You don't have to manage every little thing, just whittle it down to something you can handle and make things as simple as possible for yourself. You can do it.
submitted by Upstairs-Pound-7205 to Teachers [link] [comments]


2024.06.01 03:24 towdow3 emp.dll

  1. hogwarts Legacy
  2. DODI Repacks
  3. threadripper 2970wx 64gb memory rtx4090
  4. trying to redownload the torrent
  5. error says EMP.DLL was not found
im pretty sure ive done everything and none of the executables work
submitted by towdow3 to PiratedGames [link] [comments]


2024.06.01 01:08 Electronic-Image1359 Building a new PC for gaming, could use feedback.

I intend to use this computer for playing videogames pretty much (mainly Helldivers 2, FF14, and CS2, but some AAA as well like Ghost of Tsushima or AC6); I don't do any AutoCAD/heavy video editing stuff. My budget is a maximum of $5,000 USD.
Things to note:
  1. No Windows OS on it; I intend to install Linux.
  2. I know there are cheaper OLED monitors out there; I'm just interested in this one for the dual mode because I would like a high refresh rate (I play CS2) but I still would like a pretty monitor for "everything else"/I don't want to get a TN monitor.
  3. No RGB.
Thank you in advance! PCPartPicker Part List
Type Item Price
CPU AMD Ryzen 7 7800X3D 4.2 GHz 8-Core Processor $339.99 @ Amazon
CPU Cooler Noctua NH-D15S chromax.black 82.51 CFM CPU Cooler $109.95 @ Amazon
Thermal Compound Noctua NT-H1 3.5 g Thermal Paste $8.94 @ Amazon
Motherboard Gigabyte B650 AORUS ELITE AX ATX AM5 Motherboard $183.99 @ Amazon
Memory TEAMGROUP T-Create Expert 32 GB (2 x 16 GB) DDR5-6000 CL30 Memory $97.99 @ Amazon
Storage Samsung 990 Pro 4 TB M.2-2280 PCIe 4.0 X4 NVME Solid State Drive $309.99 @ Newegg
Video Card ASRock Phantom Gaming OC Radeon RX 7900 XTX 24 GB Video Card $899.99 @ Newegg
Case Fractal Design Torrent ATX Mid Tower Case $232.24 @ Amazon
Power Supply Corsair RM850x (2021) 850 W 80+ Gold Certified Fully Modular ATX Power Supply $114.99 @ Amazon
Monitor LG UltraGear 32GS95UE-B 31.5" 3840 x 2160 240 Hz Monitor $1399.99 @ Best Buy
Prices include shipping, taxes, rebates, and discounts
Total $3698.06
Generated by PCPartPicker 2024-05-31 19:08 EDT-0400
submitted by Electronic-Image1359 to buildmeapc [link] [comments]


2024.06.01 00:49 KidOcelot From the windows... to the wall!

From the windows... to the wall! submitted by KidOcelot to FORTnITE [link] [comments]


2024.06.01 00:26 cdawg-bear Reclassing at end of my contract (11B to 17C/25B)

I’m approaching the end of my contract as an 11B, I did 4 1/2 years. My ets date is 26OCT2024. I am currently starting my packet for 17C but I’m trying to knock out what I can cert wise. I have a few years of experience learning programming languages in my free time(I am comfortable with Python, JavaScript, HTML, and CSS). I also have two programming classes that I’ve taken with UMGC. I currently do not have any certs and am trying to knock out the Google IT Support certificate as well as the Comptia A+. I’m doing good with knocking out the Google course as well as studying for the A+ fairly quickly while still retaining the info. My ST score on the ASVAB is 110 while the requirements say 112 so I’ll need a waiver.
I have a few questions:
  1. Do you think my couple of college classes, Comptia A+ and the Google certificate in my packet will be enough to get accepted? (Assuming I’ll do good on the ICTL and all the other requirements of the packet)
  2. Should I not get my packet accepted, would it be a good idea to just reclass to 25B, attend AIT and put my packet in for 17C once I’m more qualified? Is there a minimum time I have to do after AIT before I can do this?
  3. Can you explain the process for AIT in regard to my wife coming with me? From my understanding because they are such long AITs it’s treated as a PCS move and my wife would come with me but would I be allowed to stay off post with her and how much time would I have off? Weekends, school hours etc.
  4. What would you do in my position and are their other MOS’s that you would recommend? I’m interested in cyber because I’ve been dabbling in web development for years but I just don’t enjoy how code heavy it is and the cyber side of tech feels more meaningful to me.
  5. Should I just reenlist as an 11B to give me time to collect certs and resubmit a packet a few months down the road? What discrepancies come with that? Will I be required to do a year before I can submit my packet again?
submitted by cdawg-bear to army [link] [comments]


2024.05.31 23:03 next3days Local Weekend Lineup of Fun for 1st Weekend in June....

For those in Blacksburg, here's a rundown of 28 local events you can enjoy in Blacksburg and throughout the New River Valley as June arrives.
Weekend Rundown of Local Fun: 1. Matt Holloman in Concert Rising Silo Farm Brewery, Blacksburg Friday, May 31, 2024, 6:00 - 9:00 PM Admission: Free Born and raised in southeastern Virginia, Matt Holloman has been playing around Virginia for more than 25 years. Growing up on his older brother’s blues collection, Matt mixed the likes of Howlin' Wolf and Muddy Waters with the experimental sounds of songwriters like Leonard Cohen and Frank Black, creating a style all his own. Always interested in reinventing his live performance, Matt uses a looper so he can improvise and manipulate layers of sound not usually heard from an acoustic performer. You can also expect simple, but memorable songs, reminiscent of storytelling songwriters like John Prine and Bob Dylan. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=777075
2. Friday Nights at the Farm with Music from Jim Korb Beliveau Farm Winery, Blacksburg Friday, May 31, 2024, 6:00 - 9:00 PM Admission: Free Jim Korb is an acoustic musician and guitarist based in Southwest, VA and a member of the band Stonehouse. "Just a singer; a natural-born guitar ringer, playing and singing a mix of Classic Country, Eagles, CCR, Skynyrd, and a little bit of everything else from John Denver to The Blues." Beliveau welcomes a special musical guest every Friday night with live music from 6:30 PM to 8:30 PM and sing along to all of your favorite classics. Enjoy delicious food from their full service kitchen until 8:30 PM and chat over a glass of wine during our extended bar hours until 9:00 PM. Get a $5 Beliveau Buck to use during your next visit for every $50.00 you spend on Friday nights from 6:00-9:00 PM. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=777450
3. Pizza Roll (Bike Ride) Blacksburg Library, Blacksburg Friday, May 31, 2024, 6:00 PM - TBD Admission: Free The New River Valley Bicycle Association (NRVBA) presents a Pizza Roll starting at the Blacksburg Library. Enjoy a five mile bike ride on the Huckleberry Trail and through Virginia Tech's campus, followed by post ride pizza at Benny's provided by Trek Blacksburg. This is a NRVBA ride, meaning waivers are required and can be filled out on site. If you have never ridden with NRVBA before, your first ride is free. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=777778
4. The Grascals in Concert Little River Bluegrass Barn, Radford Friday, May 31, 2024, 7:00 - 10:00 PM General Admission: $30.00, Reserved Tickets: $35.00 Great musicians will always find a way to make good music, but for great musicians to make great music, they must form a bond – one that, more often than not, goes beyond the purely musical to the personal. For The Grascals, that bond has been forged at the intersection of personal friendships, shared professional resumes and an appreciation for the innovative mingling of bluegrass and country music that has been a hallmark of the Nashville scene for more than 40 years. Their cutting-edge modern bluegrass is delivered with a deep knowledge of, and admiration for, the work of the music’s founding fathers. Timely yet timeless, The Grascals make music that is entirely relevant to the here and now yet immersed in traditional values of soul and musicianship. It’s a unique sound that has earned three Grammy® nominations and two Entertainer of the Year awards from the International Bluegrass Music Association, as well as national media attention that seems to perpetually elude acts entrenched in niche genres. Such appearances include The Tonight Show with Jay Leno, Fox & Friends, The Late Late Show with Craig Ferguson, and CBS’ The Talk. The Grascals have over 200 guest appearances on the Grand Ole Opry to their credit and have also performed on the revered stages of Radio City Music Hall, the Ryman Auditorium and the Kennedy Center as well as music festivals such as MerleFest, Stagecoach, and the CMA Music Festival. In addition to performing across the United States and Canada, the awarding-winning band has traveled the world to take bluegrass music to Japan, Greece, France, Germany, Switzerland, Norway, and Belgium. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=777777
5. Line Dancing at Sinkland Sinkland Farms, Christiansburg Friday, May 31, 2024, 7:00 PM - TBD Admission: $10.00 Join Sinkland Farms for a fun-filled night of line dancing. All types of music and all levels of experience welcome. Energetic, enthusiastic instruction begins at 8:00 PM. Adult beverages and food truck will be available for purchase. Weather permitting, there will be outdoor dancing as well. This event is fun for all. Ages 16 & under must be accompanied by an adult. Doors open at 7:00 PM. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778214
6. 2024 Pulaski County Spring Flea Market New River Valley Fairgrounds, Dublin Saturday, June 1, 2024 and Sunday, June 2, 2024, 7:00 AM - 5:00 PM Admission: $2.00, Kids 6 and Under: Free The Dublin Lions Club presents the 2024 Two-Day Pulaski County Spring Flea Market celebrating 49 years. With over 20,000 visitors and 800 vendors spaces, more than a dozen different food vendors offering varied food options and the chance to eat a few of the famous "Lion Dogs", you will not want to miss this event. Check out vendors with crafts, antiques and more at the semi-annual Pulaski County Flea Market. Expect to have a ton of fun hunting for that rare items or the deal of the century. Although over 100 spaces are under roof, it is a largely an outdoor event. All proceeds go to the Dublin Lions and their numerous community causes such as eyeglasses for the needy and hunger relief in the community. This is their primary fundraiser each year. The event is rain or shine and parking is free. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778201
7. Benefit Ride for Bubba Williston's Family KFC, Christiansburg Saturday, June 1, 2024, 9:00 AM - 12:30 PM $15.00-$20.00 Donation per vehicle. The Benefit Ride for Bubba's Family will start and end at KFC. Registration begins at 9:00 AM with kickstands up at 10:30 AM. Help raise money for Bubba Williston’s family. Bubba lost his life on Thursday, April 11th after saving his boys. Bubba leaves behind a wife, Danielle and three small children, Brantley, Kyler and Aubree. Let’s come together as a community and help ease the financial burden. There will also be door prizes, raffle and 50/50 raffle. Lunch will be served following the ride and returning to KFC. All bikes, cars, trucks and all vehicles welcome. Snacks will be provided on ride and lunch and drinks afterward. All proceeds benefit Bubba's wife and his three children. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778242
8. Cabin Fever 12: Six Band Charity Event Cabin Fever, Pilot Saturday, June 1, 2024, 11:00 AM - 10:00 PM Adults: $10.00, Kids 13 & Under: Free Cabin Fever Charity Events presents their semi-annual charitable musical fundraiser event Cabin Fever 12 benefiting the Floyd County Humane Society in honor of Kevin Dodson. A family style buffet and t-shirts will also be available for purchase and there will be both a live and silent auction featuring donations from local businesses and our line-up of seven performers. 100% of the proceeds from all items will be donated to the Floyd County Humane Society. Music Performers include Chris and Chelsea, Seph Custer, Jake and Jess, The Good Ole Boys, The Flying Doves, Hoppie Vaughan and the Ministers of Soul and By All Means. The family style buffet is highlighted by the world class pulled barbecue provided by Cabin Fever friend Hamp Maxwell is $10.00 per person. Credit cards and personal checks will be accepted the day of the event. Pets and children are welcome. Bring your dog and a $25.00 donation will be made on your behalf. All donations made to Cavin Fever Charity are 100% tax deductible. The event is BYOB and lawn chairs are welcome. Parking is free. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778240
9. Summer Reading Kickoff Event Blacksburg Library, Blacksburg Saturday, June 1, 2024, 11:00 AM - 1:00 PM Admission: Free Grab your chalk and head to the library to kick off our summer reading program. Enjoy activities like a chalk walk, face painting, bubbles, and a sweet treat. Available while supplies last. All ages are welcome. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=777959
10. Ride-A-Rescue Cornhole Tournament Bisset Park, Radford Saturday, June 1, 2024, 11:00 AM - TBD Tournament Entry: $25.00 per team, Spectators: Free Ride-A-Rescue and Winterfrost Farm presents their Ride-A-Rescue Cornhole Tournament. Ride-A-Rescue is a local, non-profit, equine rescue that is holding an epic Cornhole Tournament throwdown to raise funds and awareness for their rescue's operation and rescue horses. The Cornhole Tournament is a double elimination tournament and open to all ages. There will also be a Kids Corner open all day and food vendors on site. First, second and third place teams will win big prizes. Teams can battle back in the Losers Bracket for another shot at the championship. All participating teams will also be entered in a drawing for awesome bonus prizes. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=776144
11. Lazy, Crazy, Hazy Days of Summer JBR Vineyards LLC, Pearisburg Saturday, June 1, 2024, 12:00 - 5:00 PM and Sunday, June 2, 2024, 1:00 - 5:00 PM Admission: Free Wine Pricing: Tasting: $5.00, Glass of Wine: $5.00, Bottles of Wine: $15.00-$20.00 plus tax Experience the lazy, hazy, crazy days of summer with a delightful afternoon of wine tasting. Savor fine wine in a relaxed and enjoyable atmosphere. Stroll through the vineyard with a glass of your favorite wine. Credit cards and cash accepted. Dogs and kids welcome. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778155
12. Annual Loyalists in the Backcountry Event Wilderness Road Regional Museum, Newbern Saturday, June 1, 2024 and Sunday, June 2, 2024, 12:00 - 4:00 PM Admission: Free Join the Wilderness Road Regional Museum for the Two-Day Annual Loyalists in the Backcountry Event and learn about both the Patriots and Loyalists in the Backcountry of Southwest Virginia during the Revolutionary War. There will be some mischief afoot. Living history will be presented by the Fincastle Company on both days. Members of the Fincastle Company Living History group will share the history of the complicated interactions of the Patriots, "rascally" Loyalists, Tories, and those trying to stay "unaffected" during the American Revolution. On Sunday, there will be expanded programming including kids activities and a mock round up of the Tories to recreate some actual events in and around the Newbern area during the Revolutionary timeframe to include conspiracies, counterfeiting, and rounding up of the rascals. The event is free, but donations are always welcome and appreciated. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778165
13. 2024 New Town Festival Gospel Sing St. Luke and Odd Fellows Hall, Blacksburg Saturday, June 1, 2024, 12:00 - 6:00 PM Admission: Free The Blacksburg Museum & Cultural Foundation presents the 8th Annual New Town Festival Gospel Sing. The afternoon will be filled with dancing, singing and fellowship as five local groups and soloists perform their favorite current and old-time gospel favorites. Kirk’s BBQ will be onsite with food available for purchase. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778231
14. Speed Friending Program for Ages 20-45 Christiansburg Library, Christiansburg Saturday, June 1, 2024, 1:00 - 3:00 PM Admission: Free Are you interested in meeting new people? Want to make friends in the area, but find it hard to make time? Join the library for a fun and free way to connect with others in the community. Speed Friending will start with a speedy round of conversation starters. Yes, similar to speed dating, questions and conversation will be available for those who need it. Hang around after to chat, enjoy snacks, play games, or make plans with new friends. There will also be door prizes. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778081
15. Saturday Afternoon Music with Leslie Brooks New River Vineyard & Winery, Fairlawn Saturday, June 1, 2024, 2:00 - 5:00 PM Admission: Free Leslie Brooks is a singer-songwriter, performing solo with guitar, playing jazz, folk, blues, rockin' country and popular favorites originally from Kentucky now resides in Virginia. She has played the best venues in a 16-state area, as well as in Norway and Monte Carlo. Opened for Heart, James Taylor, Bob Margolin and Willie Nelson to name a few. Feel to free to select your favorites from her 300-song music menu. Seating is first come, first served. No reservation required. Guests can bring a blanket and/or chair. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778088
16. Spring Garden Day and Flower Art Opening Montgomery Museum of Art & History Gardens, Christiansburg Saturday, June 1, 2024, 2:00 - 4:00 PM Admission: Free This event will feature the "Flower Art in the Garden" Theme Show, showcasing the creativity of local artists. Participants were tasked with decorating "flat flower" templates, thoughtfully crafted by students at Blacksburg High School, which will be placed throughout the site. Participants were encouraged to incorporate native southwest Virginia plants into their artwork, resulting in a vibrant display that celebrates the region's natural beauty and artistic talent. In addition to the art exhibit, Spring Garden Day offers a wonderful opportunity for attendees to explore the Museum Garden with gardeners on-site to answer any questions. Visitors will also have the chance to engage with the Virginia Native Plant Society's plant clinic, Virginia Master Naturalists, and Virginia Master Gardeners, as several booths will be set up to provide information and insights into the rich botanical heritage of Southwest Virginia. Note: This event was originally scheduled for Saturday, May 4th, but was postponed due to inclement weather. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778241
17. Summer Arts Festival Free Classic Movies: Wizard of Oz Lyric Theatre, Blacksburg Saturday, June 1, 2024, 3:00 - 4:45 PM Admission: Free The 2024 Summer Arts Festival kicks of the Free Classic Movies series featuring "The Wizard of Oz". The classic "Wizard of Oz" was originally released in 1939 with a rating of PG and stars Judy Garland, Frank Morgan, Ray Bolger, Bert Lahr and Jack Haley. Synopsis: Dorothy Gale along with her dog Toto is swept away from a farm in Kansas to a magical land of Oz in a tornado and embarks on a quest with her new friends to see the Wizard who can help her return home to Kansas and help her friends as well. The Summer Arts Festival is presented by Virginia Tech and the Town of Blacksburg. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778205
18. Grand Opening in Blacksburg J.H Bards Spirit Co., Blacksburg Saturday, June 1, 2024, 4:00 - 9:00 PM and Sunday, June 2, 2024, 12:00 - 6:00 PM Admission: Free J.H Bards Spirit Co. has moved the distillery from Fairlawn to Blacksburg and can't wait to show you their new completely renovated digs. On Saturday, last call will be ~8:40 PM and on Sunday ~5:30 PM. Parking is available in the Kent Square parking deck, on-street anywhere downtown, or in the municipal lot directly across Washington Street from us. Enter the distillery off of Draper Road. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778076
19. 2024 Oldtown Nights Concert Series Kickoff featuring Miller Holler Band Oldtown Fields (Shawsville Middle School Rec Area), Shawsville Saturday, June 1, 2024, 5:30 - 9:00 PM Adults: $5.00, Ages 12 & Under: Free The Eastmont Community Foundation presents the 8th season of the Oldtown Nights Concert Series Kickoff featuring the Miller Holler Band with a large open green space that is family and children friendly. Miller Holler is a country rock band with southern roots and a hunger for going against the grain and stirring up the music industry in Nashville, Tennessee. Concessions and drinks including adult beverages for those ages 21 & up will be available for purchase. Please bring cash for tickets and beer sales. Only limited credit card sales available. Please bring your own chairs and/or blankets. No tents or umbrellas allowed. Ages 16 & under must be accompanied by an adult. No outside drinks and no pets permitted. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=774327
20. The Wild Wood Band in Concert Long Way Brewing, Radford Saturday, June 1, 2024, 6:00 - 9:00 PM Admission: Free Wild Wood is based in the New River Valley performing country, classic rock & country, folk, bluegrass and originals. Enjoy an old school sound and a very eclectic catalog of music with your favorite sing-along ballads and originals. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778071
21. Baxter Briefly in Concert Rising Silo Farm Brewery, Blacksburg Saturday, June 1, 2024, 6:00 - 9:00 PM Admission: Free Baxter Briefly is a Roanoke, VA musician performing unique and original music in the alternative rock, nu-funk and indie realms. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778232
22. Stand Up Comedy Show with Headliner Heather Joyce Bull & Bones Brewhaus & Grill, Blacksburg Saturday, June 1, 2024, 8:00 - 9:30 PM Admission: $7.00 Comedians Gone Rogue presents a Stand Up Comedy Show with Headliner Heather Joyce in the Banquet Room. Headliner Heather Joyce will be joined by other amazing comediennes from across Virginia and one very strong and independent man. Other performers include: Andrew Gustafson, Katherine Rogue, Christinia Tynes, Chelsea McCreight and Amanda Fitz. The cover goes directly to the talent. For ages 18 & up. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778246
23. 2024 Huckleberry Jam Point-to-Point 8.1 Mile and 1.75 Mile Run / Walk Runabout Sports, Blacksburg Sunday, June 2, 2024, 6:45 - 11:00 AM 8.1 Mile Run: $40.00 (through June 1st), $45.00 (after June 1st) 1.75 Mile Run: $29.00 (through June 1st), $32.00 (after June 1st) Return Shuttle: $5.00 Runabout Sports presents the 4th Annual Huckleberry Jam Point-to-Point 8.1 Mile and 1.75 Mile Runs on the Huckleberry Trail with the 8.1 Mile Run starting at RunAbout Sports in Blacksburg, VA and the 1.75 Mile Run starting on the Huckleberry Trail in Christiansburg, VA at the gate by Uptown Christiansburg's Kohl's store with both runs finishing at the Christiansburg Rec Center. Race Day Registration & Packet Pickup is from 6:45-7:45 AM. The 8.1 Mile Race starts at RunAbout Sports at 8:00 AM. The 1.75 Mile Race starts on Huckleberry Trail near Kohl's side of Uptown Christiansburg at 8:30 AM. Both race distances are point-to-point courses finishing at the Christiansburg Rec Center. Two aid stations will provide water and Gatorade along the way. RunAbout Sports will be donating all net proceeds to the Friends of the Huckleberry Trail. The group uses 100% of donations and funding for the engineering and construction of the Huckleberry Trail and the amenities along the trail. Participants may purchase an add-on shuttle ticket for $5.00 per person when registering. If you have a ride from the Christiansburg Rec Center, you are not required to purchase a shuttle pass. All finishers will receive an engraved rail-road spike finisher award with overall awards for the top three male and female finishers. The top two finishers in each age group also receive awards. Spectators and those picking up runners from the finish may park in front of the Christiansburg Rec Center and walk to the back where the race finishes. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778200
24. 2024 Check Farm Trail Downtown Check, Check Sunday, June 2, 2024, 10:00 AM - 5:00 PM Admission: Free Floyd Country Tourism presents the 3rd Annual Check Farm Trail at seven participating farms and businesses throughout Check, Virginia. This family-friendly experience is an up-close chance to learn about agriculture through demonstrations, tastings and farm tours including plants & animals and more. Food and/or products will be available for purchase at most of the farms and businesses. Carpooling is encouraged and please leave pets at home. Note: Times and hours vary by farm and tour stop. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=778239
25. Youth Spaghetti Fundraiser Blacksburg United Methodist Church, Blacksburg Sunday, June 2, 2024, 12:00 - 6:00 PM Admission: $10.00 The Youth Ministry at Blacksburg United Methodist Church (BUMC) hosts a Youth Spaghetti Fundraiser. This fundraiser will offset cost associated with summer youth mission trip. BUMC’s youth will venture to the Eastern Shore of Virginia to Camp Occohannock on the Bay this summer. During the weeklong mission trip, the youth will work with Chesapeake Housing Mission. Grab lunch from 12:00-2:00 PM or dinner from 4:00-6:00 PM. The menu includes one serving of spaghetti (with or without ground beef), salad, garlic bread and choice of cookie (chocolate chip, sugar or snickerdoodle). For those unable to dine in, carryout will be available. Pre-ordering is available online. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=777765
26. Free Outdoor Acroyoga Class and Jam In Balance Yoga Studio @ VTCRC, Blacksburg Sunday, June 2, 2024, 12:30 - 2:30 PM Admission: Free Learn about the playful practice of Acroyoga in a safe environment. Acroyoga is a physical practice that combines yoga and acrobatics typically involving a base, a flyer, and spotter. No experience or partner is necessary. The first hour will be guided learning, followed by free form jam for an hour. This event will be held outdoors at the corner of Pratt Drive and Kraft Drive. The rain location will be In Balance CRC studio. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=777994
27. Book Club: Mr. Brightside's Italian Adventures with Discussion and Tasting Blacksburg Wine Lab, Blacksburg Sunday, June 2, 2024, 1:00 - 3:00 PM Admission: $40.00 Join the Wine Lab Book Club tasting & discussing featuring Mr. Brightside's Italian Adventures by Ryan Jacobson. After the success of his first humorous travel memoir, "The Adventures of Mr. Brightside", in which he traveled around the world exploring each country he visited on three different budget levels, Ryan Jacobson has now decided to tackle the country of Italy. Ryan travels to all of the Italy's twenty unique regions and splits his time in each by spending half his time on a low budget and half on a luxury budget before moving on to the next. Through the use of his humorous storytelling, Ryan shares what makes each of the regions so special and worthy of visiting. Reservations are required. Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=776425
28. Sunday Mountain Music Series Kickoff with Victor Lawson and the Boogie Chillin Band Mountain Lake Lodge, Pembroke Sunday, June 2, 2024, 4:00 - 6:00 PM Free Admission Mountain Lake Lodge presents their Sunday Mountain Music Series Kickoff with Victor Lawson and the Boogie Chillin Band. Victor Lawson and the Boogie Chillen Band have forged an identity as a good-time party band that plays the real deal blues and down in the mud rock ‘n roll and funk music as well. The tight three-man band takes their name from the song, “Boogie Chillen” which was made famous by late Delta blues icon, John Lee Hooker. From Tennessee to Virginia to West Virginia, in bars and saloons and restaurants and festivals, Victor Lawson and Boogie Chillen’s exuberant, joyful music has made the band one of the area’s premier attractions. Stop by Salt Pond Pub every Sunday from Memorial Day to Labor Day from 4:00-6:00 PM and enjoy live music along with food and drinks. Perfect for relaxing with the whole family (furry friends are welcome too). Link: http://www.nextthreedays.com/FeaturedEventDetails.cfm?E=776813
For all the 65+ big events happening this weekend, check out: http://www.nextthreedays.com/featuredevents.cfm
Thanks for reading and have a great weekend!
submitted by next3days to VirginiaTech [link] [comments]


2024.05.31 21:49 TheTorturedPoets100 How I got out of a 6 day shithole and am NORMAL finally

I finally feel myself after feeling awful the past 6 days (specifically the last 3 days of it were the worst). I was shaking a ton for days/couldn't go longer than 10 minutes without horrible nausea coming up, couldn't eat like anything, couldn't do work or concentrate or physically do much). I was finally able to eat and feel back to normal entirely. I got Chick fil a and devoured it. My stomach is a bit* weird still but the doc said that is from putting my body through a lot the past whole week. He said that your stomach digestive enzymes get messed up during prolonged anxiety, so I went to Whole Foods and bought digestive enzymes to help out. Anyway, here is what I did to help. If it can help me, it can help you too cuz I swear I had it BAD bad. If anxiety attacks had a spectrum, I would be a 8 or 9 out of 10. I rarely get panic attacks but this one randomly came for the first time in years.
  1. I connected with an online doc the morning I realized it was bad bad and immediately got a mild prescription for SSRI. I do not have depression at all, only anxiety. It doesn't even kick in for 3 weeks, so I don't think this contributed to me feeling normal tbh. But whatever, I guess it will just be a bonus in my bloodstream. I am considering not even taking it and going back to my normal life.
  2. I cut off all sad music from my Spotify. I only listen to uplifting stuff or jazz. Any song that triggers me (for exa, my ex boyfriend and I used to listen to John Mayer together) I removed from my playlists. I realized when I was consuming that, I was opening up Pandora's box of crazy emotions + anxiety + sadness. Just cut it off. I also don't listen to any depressing music in general anymore. bye bye. I listen to upbeat stuff like Nicki minaj, EDM, Jazz, Michael Jackson, etc.
  3. I bought CBD / lavender body lotion and body balm.
  4. I took Magnesium glycinate, vitamin b12, iron, and d3 daily. I think that genuinely helped more than the prescription I got 3 days ago. I researched this and learned Magnesium glycinate was used back in the day for psychosis and psych ward patients. I also drank tons of electrolyte packets.
  5. I had my guy best friend come over and sleep with me (not sexually). I asked him to massage my back and it literally helped so much. Knowing someone out there in the world loves you and feeling their physical touch helps a ton.
  6. I did 100 jumping jacks or worked out until my body couldn't feel the anxiety anymore
  7. I cleaned my apartment and distracted my mind entirely. I turned on Bridgerton and just deep cleaned everything
  8. The MINUTE I felt that knot in my stomach come up, I said OUT LOUD to myself - yes out loud..."Pause. Where do you feel the anxiety and why do you feel this way? You were fine 15 minutes ago and the only difference now is you are washing the dishes." It helps ground you and take a step back.
Also side note, if you are someone who gets anxious because you can't eat and then it's a cycle, I promise your body will give up eventually and force you to be hungry. It doesn't last, even when you fee like absolute garbage. So do not get caught up in the loophole of panicking that you aren't eating enough.
Hopefully some of these help.
submitted by TheTorturedPoets100 to Anxiety [link] [comments]


2024.05.31 20:39 Seif495 Software Engineering students that managed to land an internship interview, how did you do it?

Software Engineering students that managed to land an internship interview, how did you do it?
I am about to complete my third year in computer engineering. For the past 2 years, I have been applying to every company I find and with no surprise, I receive the same old rejection email. It's funny how difficult it is to find an internship where they don't even pay you anything considering that computer science is supposed to be "the future". Here you can find my resume. You can notice that I have used a very similar template to "Jake's Resume" and yet I still cannot even reach the second round of the interview. I purposely did not include my personal details in the image for obvious reasons.
https://preview.redd.it/wpc3qne74t3d1.png?width=780&format=png&auto=webp&s=94d2e10802359670f39bb59e92d01797660ed10c
submitted by Seif495 to Egypt [link] [comments]


http://activeproperty.pl/