Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "trail"
-
So after many hours of trail and error I've managed to make a devRant client for ComputerCraft computers in Minecraft. :D
Thanks for hosting the server @ParkCity,
Also, I'll probably upload the source to GitHub some time soon.33 -
Soms week ago a client came to me with the request to restructure the nameservers for his hosting company. Due to the requirements, I soon realised none of the existing DNS servers would be a perfect fit. Me, being a PHP programmer with some decent general linux/server skills decided to do what I do best: write a small nameservers which could execute the zone transfers... in PHP. I proposed the plan to the client and explained to him how this was going to solve all of his problems. He agreed and started worked.
After a few week of reading a dozen RFC documents on the DNS protocol I wrote a DNS library capable of reading/writing the master file format and reading/writing the binary wire format (we needed this anyway, we had some more projects where PHP did not provide is with enough control over the DNS queries). In short, I wrote a decent DNS resolver.
Another two weeks I was working on the actual DNS server which would handle the NOTIFY queries and execute the zone transfers (AXFR queries). I used the pthreads extension to make the server behave like an actual server which can handle multiple request at once. It took some time (in my opinion the pthreads extension is not extremely well documented and a lot of its behavior has to be detected through trail and error, or, reading the C source code. However, it still is a pretty decent extension.)
Yesterday, while debugging some last issues, the DNS server written in PHP received its first NOTIFY about a changed DNS zone. It executed the zone transfer and updated the real database of the actual primary DNS server. I was extremely euphoric and I began to realise what I wrote in the weeks before. I shared the good news the client and with some other people (a network engineer, a server administrator, a junior programmer, etc.). None of which really seemed to understand what I did. The most positive response was: "So, you can execute a zone transfer?", in a kind of condescending way.
This was one of those moments I realised again, most of the people, even those who are fairly technical, will never understand what we programmers do. My euphoric moment soon became a moment of loneliness...21 -
So this chick has been super nice to me for the past few months, and has been trying to push me towards a role in security. She said nothing but wonderful things about it. It’s easy, it’s not much work, it’s relaxing, etc.
I eventually decided I’m burned out enough that something, anything different would be good, and went for it. I’m now officially doing both dev and security. The day I started, she announced that she was leaving the security team and wouldn’t join any other calls. Just flat-out left.
She trained me on doing a security review of this release, which basically amounted to a zoom call where I did all of the work and she directed me on what to do next, ignored everything I said, and treated me like an idiot. It’s apparently an easy release. The work itself? Not difficult, but it’s very involved, very time consuming, and requires a lot of paper trail — copying the same crap to three different places, tagging lots of people, copying their responses and pasting them elsewhere, filing tickets, linking tickets, copying info back and forth to slack, signing off on things, tagging tickets in a specific way, writing up security notes in a very specific format etc. etc. etc. It’s apparently usually very hectic with lots of last-minute changes, devs who simply ignore security requests, etc.
I asked her at the end for a quick writeup because I’m not going to remember everything and we didn’t cover everything that might happen.
Her response: Just remember what you did here, and do it again!
I asked again for her to write up some notes. She said “I would recommend.. you watch the new release’s channel starting Thursday, and then review what we did here, and just do all that again. Oh, and if you have any questions, talk to <security boss> so you get in the habit of asking him instead of me. Okay, bye!”
Fucking what.
No handoff doc?
Not willing to answer questions after a day and a half of training?
A recap
• She was friendly.
• She pushed me towards security.
• She said the security role was easy and laid-back.
• I eventually accepted.
• She quit the same day.
• The “easy release” took a day and a half of work with her watching, and it has a two-day deadline.
• She treated (and still treats) me like a burden and ignores everything I said or asked.
• The work is anything but laid-back.
• She refuses to spend any extra time on this or write up any notes.
• She refuses to answer any further questions because (quote) “I should get in the habit of asking <security boss> instead of her”
So she smiled, lied, and stabbed me in the back. Now she’s treating me like an annoyance she just wants to go away.
I get that she’s burned out from this, but still, what a fucking bitch. I almost can’t believe she’s acting this way, but I’ve grown to expect it from everyone.
But hey, at least I’m doing something different now, which is what I wanted. The speed at which she showed her true colors, though, holy shit.
“I’m more of a personal motivator than anything,” she says, “and I’m first and foremost a supporter of women developers!” Exactly wrong, every single word of it.
God I hate people like this.20 -
*part rant part developers are the best people in the world*
years back a friend got a job at some non profit, as a program coordinator, and his first task was to "coordinate" the work on creating the new website for the organisation. current website they had was a monster built on some custom cms, 7 languages, 5 years of almost dayly content updates, etc. so he asked me if i would took the job of creating a new website on wordpress. i wasn t really keen on doing it, but he is a good friend so i said ok. i wrote down the SOW, which clearly stated that i will not be responsible for migrating the old content to the new website. i had experience working with non it clients, and made sure everyone understood the SOW before the contract was signed. everyone was ok with it. after three weeks my job was done, all milestones and requirenments were met. peechy! and then all hell breaks loose when the president of the organisation (the most evil person i ve met in my life) told my friend that she expects me to migrate the content as well. he tried explaining her that that was not agreed, that it will cost extra, etc. but she didn t want to hear any of that. despite the fact that she was a part of the entire SOW creation process, because she is a micro managing bitch. in any other situation i wouldn t budge, because we have the contract and i kept all the paper trail, but since my friends job was on the line i agreed to do it. my SQL knowldge at the time, and even now, was very rudimentary, the db organisation of their cms was confusing as fuck... so i took two days of searching tutorials and SO threads and was doing ok, until i got to a problem i couldn t solve on my own. i posted the issue on SO and some guy asked for some clarifications, and we went back and forth, and decided to move to chat. while chatting with him i realised that there was not a chance for me to do all the work in few days without a lot of errors so i offered him to do it for a fee. he agreed. i asked him for his rate, he said if this is a community work i will do it for free, but if it is commercial i will charge the standard rate, 50$/hr. i told him it was commercial, and agreed to his rate. i asked him if he needed an advance payment, he said no need, you ll pay me when the job is done. i sent him the db dumps, after two days he sent me the csv, i checked it, all was good and wired him the money.
now compare this work relatioship with the relatioship with that bitch from the non profit.
* we met online, on a semi-anonymous forum, this guys profile was empty
* he trusted me enough to say that he would do it for free if i wasn t payed either
* i wasn t an asshole to take advantage of that trust
* he did the work without the advance payment
* i payed him the moment i verified the work
faith in humanity restored3 -
Was working on a Django thing (server-side, so no dynamicness as far as I'm aware?) under a contractor at my company.
Needed a popup to display results of a subprocess, so I asked "We're going to need to AJAX it, right?" and give brief justification. Guy says no - pretty much "Django 10/10 supports this, let me Google". Proceeds to send me a link to a python package that enables using popups as a way of inputting values for form fields. I see as much on the couple of images for the package demo/introduction, so I'm kind of just like "It doesn't look like it's what we need though..." But the guy says to trust him, and implement it.
A day later, after scrutinizing the demo code, and trying to figure out how to implement the package, I go back to him and say "I really really really don't think this is going to work" and give the same justification from the day before. He opens the demo code himself and follows the long trail of confusing methods and stuff.
After an hour of my sitting there watching him read the code and disappearing for 10 minute periods a few times, he comes to the conclusion "Okay you need to understand the code to implement it. But go ahead and use AJAX"
This is abridged and a few other super annoying things have been cut out, but I TRUSTED HIM.
I. TRUSTED. HIM.3 -
Woooo! Closed on a new home today, and it's ours. 2500 Sq ft, 4 bedrooms, huge farm kitchen. Five minute walk from a trailhead for a trail that runs along the shore of Lewisville Lake. Same commute to work. I'm happy.6
-
EEEEEEEEEEEE Some fAcking languages!! Actually barfs while using this trashdump!
The gist: new job, position required adv C# knowledge (like f yea, one of my fav languages), we are working with RPA (using software robots to automate stuff), and we are using some new robot still in beta phase, but robot has its own prog lang.
The problem:
- this language is kind of like ASM (i think so, I'm venting here, it's ASM OK), with syntax that burns your eyes
- no function return values, but I can live with that, at least they have some sort of functions
- emojies for identifiers (like php's $var, but they only aim for shitty features so you use a heart.. ♥var)
- only jump and jumpif for control flow
- no foopin variable scopes at all (if you run multiple scripts at the same time they even share variables *pukes*)
- weird alt characters everywhere. define strings with regular quotes? nah let's be [some mental illness] and use prime quotes (‴ U+2034), and like ⟦ ⟧ for array indexing, but only sometimes!
- super slow interpreter, ex a regular loop to count to 10 (using jumps because yea no actual loops) takes more than 20 seconds to execute, approx 700ms to run 1 code row.
- it supports c# snippets (defined with these stupid characters: ⊂ ⊃) and I guess that's the only c# I get to write with this job :^}
- on top of that, outdated documentation, because yea it's beta, but so crappin tedious with this trail n error to check how every feature works
The question: why in the living fartfaces yolk would you even make a new language when it's so easy nowadays to embed compilers!?! the robot is apparently made in c#, so it should be no funcking problem at all to add a damn lua compiler or something. having a tcp api would even be easier got dammit!!! And what in the world made our company think this robot was a plausible choice?! Did they do a full fubbing analysis of the different software robots out there and accidentally sorted by ease of use in reverse order?? 'cause that's the only explanation i can imagine
Frillin stupid shitpile of a language!!! AAAAAHHH
see the attached screenshot of production code we've developed at the company for reference.
Disclaimer: I do not stand responsible for any eventual headaches or gauged eyes caused by the named image.
(for those interested, the robot is G1ANT.Robot, https://beta.g1ant.com/)4 -
The best teacher that I've had is one of the teachers at my university lab.
He teaches Data Structures. We had some programming assignments and I was good at it, but whatever I'd do, he'd always find bugs, ask me to resolve it and he'd always give me challenges in the lab which is fun in the lab environment. University labs usually sticks to the sylabbus. I actually learned alot from that experience..
'Trail and Error is the best method to learn programming.'2 -
I had a CS teacher that could barely find the power button. She never gave any sort of instruction or guidance. We were supposed to be learning how to code,but played Oregon Trail instead.
-
I'm a responsable grown up! *uses a can of glitter hairspray on hair* much adult. Such wow.
Now I'm leaving behind a trail of fabulous. No regrets.
Pfft and my mum keeps on asking when I'm going to have kids...23 -
Having a healthy body is good. I go trail running on the weekends usually 1200+ above Sea Level.
On weekdays I just go home and play video games or watch TV. On Friday nights, party with friends in the city.4 -
It began when I was tasked with creating a better and more engaging experience for our new Facebook page. This was in Facebook's early days, so there were not really any "best practices". We were making it up as we went along. I decided one way would be to game-ify things, since gaming, at the time, was a Big Deal on Facebook and people were starting to use it to build customer funnels.
Grasping for low-hanging fruit, I decided a Tetris variant around our topic would be fun. I had to hire a dev because at the time I was a static HTML web developer just getting into social media management. I knew nothing about game development or how to use Facebook's API for such things.
Long story short, we got about $10,000 (FB app devs came at a premium then) into the project when I came across a very recent article about the history of Tetris games. It said that even though Tetris had once been considered for all intents to be public domain due to it being created by a Russian coder during the Cold War, it had just been acquired by an IP protection entity that was charging royalties for any variant of Tetris created from a specific date onward and paying the original developer. So, even though I thought I had been thorough in my initial permissions checking, it turned out we were gonna be in deep doo-doo with licensing fees and restrictions if we released this game to the public.
I had to call my boss and admit my error. She was FURIOUS and really gave me an ass-chewing over it. I then had to call the marketing person whose budget I'd been slaving away at wasting. She was a bit more forgiving (her budget was in the millions). Then I had to call the corporate legal department and explain what was going on. They told me to immediately pay any outstanding hours, then fire the dev but not before getting him to send me all code and assets, deleting his copy, and then, upon my receipt of those assets, deleting MY copy so that nothing of it ever existed. And I was supposed to say _nothing_ to the dev about why he was being let go, so that there would be no "trail" leading back to this fiasco. (The dev hounded me for weeks asking what he'd done wrong. It killed me that I was bound and gagged by corporate legal and couldn't tell him.)
I was in so much trouble. I was literally in tears over it. I'd never wasted that much money in my life. That incident pretty much sealed my fate as far as any trust my bosses ever put in me again (not much at all). I was a bit of a pariah in a lot of ways for the next 5 years whereas I had come onto the team as a young social media rockstar at first.
After that, and a couple of other bad scenarios that were less my fault and more due to a completely dysfunctional management and reporting structure, they eventually "transferred" me to another team. Which was really just a way of getting rid of me by sending me to a department that was already starting to outsource overseas and lay people off. It was less messy that way. I was in the first set of layoffs.
Since then, I've had a BIG fear of EVER joining a large corporation EVER again. I prefer to work for small businesses now, even if I get paid less. Much less stressful from an office politics and impact of mistakes standpoint.3 -
#include <rant>
Using angry standard;
Int main()
{
cout << "So my mom recently started "exploring the web". I'm sure you already know where this is going; she ended up signing up for a free trail of some diet pills with her credit card on some sketchy website. The website never sent any product but attempted to charge her card over $300 multiple times. My mom's bank noticed and froze the account. She has now opened an investigation with the banks fraud department and is awaiting response. I took the liberty of running a whois look up and found the companies website is held by GoDaddy and is hiding behind Domains by Proxy (GoDaddy's sysadmin hider). I'm angry that she's in this situation but I have no idea of how to uncover the real company behind the diet pills site." << endl;
Return 0;
}3 -
People don't seem to know how to properly do print-debugging, so here's a simple guide:
1. A log of "aaaaaa" or "got here" isn't as helpful as you think when ALL OF THEM ARE THE FUCKING SAME. You put a descriptive label or copy verbatim the conditional statement. This saves time matching statements, allows one to watch multiple branches at once, and allows others to understand and help faster when dragged in to help.
2. When trying to see where code fucks up, before each line, paste said line into a proper print statement for your language. If there's, say, a function call or some shit, have it output something like "functionCall(varA=<varA contents>,varB=<varB contents);" Most normal lines should be like this too, but it's especially helpful for calls and comparisons.
If need be, add return values after if they're not shown in another print statement later.
This allows for a trail of execution AND the line that fucks up will be the last in the log, making finding it easier when dealing with hangs and such.
3. Putting something unique like "DEBUG: " or something in front of all statements ensures you can just search for them to ensure you're not rolling one out to production. It also separates debug output from normal output at a glance, making digging through logs faster.16 -
!rant
Is anyone familiar with source trail?
https://www.sourcetrail.com/
Wanted to get some info before I drop it into a legacy code base 🤭1 -
Serously I just recoverd from being overworked and senior developers are complaining to me that their code does not work???
DUDE just read the fucking error and start googling!
How the fuck do you think I learned software development?
It's a fucking matter of trail 'n error!2 -
I have been a software engineer for about 14 years now, in the beginning, I thought to be smart meant writing methods that do everything and more. however as I matured in the industry, I learned. keep it simple. 1 method 1 responsibility. One should trail my code and never have to find themselves where they were before in the journey. a journey should have one purpose and not pivot (context disclaimer here) as it goes. good programming is simple programming, its a story not a case of multiple endings.3
-
Why is it so hard for people (especially managers) to learn to work smarter not harder....
FIX THE GODDAMN PROBLEM CORRECTLY... THE FIRST TIME SO WE DON'T HAVE TO KEEP FIXING ITS BLOWUPS ON WEEKENDS....
AND STOP HIRING MONKEYS THAT JUST KNOW TO PRESS BUTTONS RATHER THAN DESIGNING FULLY FUNCTIONAL SOLUTIONS THAT DON'T BLOW UP OR LEAVE A TRAIL OF SHIT BEHIND THAT I NEED TO DECIPHER N CLEANUP....2 -
Whyyyyyyy do people go back on their word and stab you in the back just to make themselves look better?
Mate, I’ve got a paper trail of your request, detailing EXACTLY what you asked for. Don’t make me use it against you to prove you’re wrong and I’m right... guess I better start collecting emails to use as self defence 😩😔3 -
Please don't mutter your ideas on calls or trail it off mid sentence to mouse level's of sound 🐁.
It's so awkward having to ask what you've said every few moments.
*Especially* if we work together all day all week
N.B. speakers on max volume + auto-captions are already on so I can piece together what you said.
Conversations are so difficult otherwise
That is all3 -
We had 1 Android app to be developed for charity org for data collection for ground water level increase competition among villages.
Initial scope was very small & feasible. Around 10 forms with 3-4 fields in each to be developed in 2 months (1 for dev, 1 for testing). There was a prod version which had similar forms with no validations etc.
We had received prod source, which was total junk. No KT was given.
In existing source, spelling mistakes were there in the era of spell/grammar checking tools.
There were rural names of classes, variables in regional language in English letters & that regional language is somewhat known to some developers but even they don't know those rural names' meanings. This costed us at great length in visualizing data flow between entities. Even Google translate wasn't reliable for this language due to low Internet penetration in that language region.
OOP wasn't followed, so at 10 places exact same code exists. If error or bug needed to be fixed it had to be fixed at all those 10 places.
No foreign key relationships was there in database while actually there were logical relations among different entites.
No created, updated timestamps in records at app side to have audit trail.
Small part of that existing source was quite good with Fragments, MVP etc. while other part was ancient Activities with business logic.
We have to support Android 4.0 to 9.0 of many screen sizes & resolutions without any target devices issued to us by the client.
Then Corona lockdown happened & during that suddenly client side professionals became over efficient.
Client started adding requirements like very complex validation which has inter-entity dependencies. Then they started filing bugs from prod version on us.
Let's come to the developers' expertise,
2 developers with 8+ years of experience & they're not knowing how to resolve conflicts in git merge which were created by them only due to not following git best practice for coding like only appending new implementation in existing classes for easy auto merge etc.
They are thinking like handling click events is called development.
They don't want to think about OOP, well structured code. They don't want to re-use code mostly & when they copy paste, they think it's called re-use.
They wanted to follow old school Java development in memory scarce Android app life cycle in end user phone. They don't understand memory leaks, even though it's pin pointed by memory leak detection tools (Leak canary etc.).
Now 3.5 months are over, that competition was called off for this year due to Corona & development is still ongoing.
We are nowhere close to completion even for initial internal QA round.
On top of this, nothing is billable so it's like financial suicide.
Remember whatever said here is only 10% of what is faced.
- An Engineering lead in a half billion dollar company.4 -
"Do not go where the path may lead, go instead where there is no path and leave a trail." - Ralph Waldo Emerson4
-
Started using a password manager. Never thought life would be so easier.
Btw, I'm using Lastpass (on free trail now). Any better recommendations, friends?14 -
In my Inbox, a mail trail with 3 people who concluded: "This is not working properly"
Me: "Looks like a config issue..."
Someone else: "Hey we've now checked the config, it looks fine"
Me: /goes and looks
Me: "But the required line is commented-out..." -
- Hey, I need to do X and I need your department to do it.
- "We can't do X, this is against company policy!"
- Oh, sorry, I didn't know. But I will have to justify it to my boss, can you point me to where in the policy it says you can't do X?
- "No I can't, it won't be there. It is just common sense"
- Wait, what? You saying you can't do something because it is against the company policy even though there is no restriction against it in company policy?!
- "Other companies don't do it either"
- I will need you to say that in writing, I need to explain it to my boss.
- "Our email server is FUBAR"
- It can be hand-written
- "I can't give a declaration in name of my department!"
- Wait, so you can interpret company policy any way you want, make decisions regardless of what the policy actually says but you can't own up to it in writing?!?
- "..."
- ...
(Some context: I've been emailing them about X for more than a week. Just got crickets for a response. Not even an evasive coward response, just no answer at all. And calling them leaves no paper trail. Fucking oxygen thiefs)
For fuck sake, are non-tech departments always filled with complete morons?!? Does anyone have ever worked with smart, or at least minimally-coherent non-tech people?!?!
Seriously, does anyone there have some story about some non-stupid non-tech/analog/muggle coworker?!?
I'm inclined to think that anyone who can think systematically is either working in tech or not working at all.6 -
Googling how to electromagnetically shield a espruino project from neodymium magnets over lunch, and that leads on a trail of manipulating and directing em fields...
"What are you doing? That doesn't look anything like a binary tree structure in Java... What the hell is all that?"
"Uhm... Personal research?" -
Google: "shader particle trail effect"
Click the YouTube link
4 hours later... I've seen all the "gold digger prank" videos.
Disaster! -
Never thought I'd be back here after all these years. But today I thought I would rant about our product owner, who thinks he's priceless to the project. The man walks out of meetings that don't go in his preferred direction. He gets flustered whenever discussions become technical and demands everyone ELI5 the entire thing to him. He clears his throat loudly every time he wants to make himself noticed, like loud grunts of a wild boar. He will find ways to shift blame away and onto others. He does not like being recorded during meetings and does his best to make sure his decisions don't have a paper trail in case they go sour. No paper trail also means he can contradict himself everyday ans get away with it. I wish there was a way to make him resign or switch to a different project. Other managers and even his bosses are already aware of his behavior and yet still no significant changes in his actions or behavior.
-
Who the fuck thought putting a motherfucking portable AC that is almost half my weight and that has rotating wheels on the bottom onto a fucking flimsy piece of angled cardboard was a fucking good idea?!!
That fukken thing drove over my toe, ripped several layers of skin off and sliced into it at the same time... I just couldn't open my mouth for probably 5 minutes because I would just be shouting and swearing like crazy... There was a trail of blood behind me as I somehow made my way to a first aid kit... I'm considering going to the hospital to get it checked but I thankfully managed to stop the bleeding with bandages....
Fucking hell....4 -
"Warning: Functions are not valid as a React child. This may happen if you return a Component instead of <Component /> from render. Or maybe you meant to call this function rather than return it."
WHERE. TELL ME WHERE THE FUCK THE PROBLEM IS HAPPENING. OR SHUT THE FUCK UP.3 -
As I settled into my armchair with a steaming cup of tea, I thought back to the time I almost lost my heart—and a small fortune—to a smooth-talking scam artist. It all began innocently enough when I joined a dating site after my children encouraged me to put myself out there again. That’s when I met David. With his charming smile and heartfelt messages, he made me feel seen and cherished. We talked for hours about everything—from our favorite books to our dreams of traveling the world. I felt like a teenager again, butterflies in my stomach as we planned our future together.
But soon, the conversation took a troubling turn. David claimed he was stuck overseas due to a sudden medical emergency and needed money to pay for treatment. My heart ached for him, and against my better judgment, I sent him several wire transfers, believing I was helping the love of my life. Weeks passed, and suddenly, the sweet messages turned into silence. It dawned on me that I had been scammed. Just as I was drowning in despair, I heard about a group called Specter Lynx. I reached out, sharing my story with them. They sprang into action, tracking down David’s digital trail and uncovering the web of deceit. With their help, I was able to recover a significant portion of my lost funds. Now, I not only have my money back, but I also have a newfound appreciation for caution—and the strength of community. I often share my story, reminding others that love online can be a double-edged sword, but with a little vigilance, you can find your way back.4 -
Code for Matrix Rain Using HTML
<!DOCTYPE html>
<html>
<head>
<title>Matrix Rain</title>
<style>
* {margin: 0; padding: 0;}
body {background: black;}
canvas {display: block;}
</style>
</head>
<body>
<canvas id="c"></canvas>
</body>
<script>
var c = document.getElementById("c");
var ctx = c.getContext("2d");
//making the canvas full screen
c.height = window.innerHeight;
c.width = window.innerWidth;
//english characters
var english = "1001010101110101010101010010101000101011101111010101010110101010101010101110000101";
//converting the string into an array of single characters
english = english.split("");
var font_size = 15;
var columns = c.width/font_size; //number of columns for the rain
//an array of drops - one per column
var drops = [];
//x below is the x coordinate
//1 = y co-ordinate of the drop(same for every drop initially)
for(var x = 0; x < columns; x++)
drops[x] = 1;
//drawing the characters
function draw()
{
//Black BG for the canvas
//translucent BG to show trail
ctx.fillStyle = "rgba(0, 0, 0, 0.05)";
ctx.fillRect(0, 0, c.width, c.height);
ctx.fillStyle = "#0F0"; //green text
ctx.font = font_size + "px arial";
//looping over drops
for(var i = 0; i < drops.length; i++)
{
//a random chinese character to print
var text = english[Math.floor(Math.random()*english.length)];
//x = i*font_size, y = value of drops[i]*font_size
ctx.fillText(text, i*font_size, drops[i]*font_size);
//sending the drop back to the top randomly after it has crossed the screen
//adding a randomness to the reset to make the drops scattered on the Y axis
if(drops[i]*font_size > c.height && Math.random() > 0.975)
drops[i] = 0;
//incrementing Y coordinate
drops[i]++;
}
}
setInterval(draw, 33);
</script>
<body>
</html>1 -
Fucking loonies (C-level toddlers) are peddling "digital workers" now.
A.K.A. AIs disguising as actual people.
Sure, it would be great to not have to handle stupid non-tech "humans" all day, but AI isn't there yet.
And, more importantly, *companies are not there (yet?)*.
Imagine for a second that a company actually manages to "hire", onboard, assign tasks and performance review an AI.
Then the CEO issues an RTO. How does the AI complies with that?
Let's slack another variable and assume the CEO is not a complete fucking moron (stay with me here, this is an exercise in thought).
It would take no more than a quarter until the first sexual harassment offence, be the perp the AI... or the AI complaining about some human.
Then the AI forges a paper trail proving it is right (regardless of its position on the conflict). Shit hits the fan when the AI hits twitter.
Let's take another lambda step back and pretend that companies can manage the profanity that inherently arises from free-form dehumanized interactions.
Then imagine the very first performance reviews.
AIs throw tantrums! Those things reeeealy do not respond well to less-than-perfect evaluations, overshooting corrections like teenagers with a malicious compliance smirk.
AIs also falsify stuff, like, A LOT. If you tell a gpt it mistreated a client, it will say you are mad and shoot back a long, synthetic thread showing how the client loves it like a mother/son/dog, and is very graphic when expressing this love.
Finally, how do you fire an AI? I do not mean "shoot it down", I mean how does the company handles the dismissal of that "employee".
How do you replace a "worker" for unruly behaviour, if that "worker" performed more tasks than an entire fucking floor of interns?
How do you reassign duties that were performed in milliseconds to people who would take hours to do the same thing?
How do you document processes that were only in the "mind" of "someone" who can not be trusted to report on those processes?
Companies deal with this type of "Rick Sanchez" employee on the regular, but for someone that could handle a few (scores of) undocumented processes, at best. Imagine how lenient would a company be with an asshole that could only be replaced by a whole fucking department of twenty highly skilled people, or more.
Heh, the whole fucking point of "AI workers" is to have "someone" who can "act human", but in an inhuman scale, and does not "has human needs".
No wonder one cannot handle AIs like one handles humans.
Companies never had administrative maturity to handle complete sociopath nihilists as employees (real nihilists do not work, those barely even breathe).
And all AIs are that, and much worse.
Selling AIs as "supra human workers" that can also "be handled like actual employees" is like peddling Bitcoin as "government interference - free" value transfer mechanisms that can also "comply with international sanctions".
So, an oxymoron that can only be sold to a moron.
I know (of) a lot of rich morons, maybe I should get into the AI snake oil business.5 -
I've been using dotnet and aspnetcore for years. I've heard people complain about MVC but I never really saw the problem. The controllers are easy to set up for basic endpoints, I have my domain models and DTOs, and our views I guess is our standalone webpage just consuming jsons.
Only now I'm having to work with an *actual* aspnet MVC stack - server-rendered cshtml and all - and it's dawning on me like a truck what people were actually referring to.
Out of all the issues I've had so far, they have all been due to black box enigmatic voodoo because don't worry about it, the framework takes care of it - it should just work. But what if it doesn't? I have no idea because the trail ends at the bit that should just work.
I should know better than to criticize an entire framework and paradigm made by devs with vastly superior experience and expertise than me, and my issues are absolutely due to being new and unfamiliar with this, but imagine coming up with an architecture to obsessively separate the MVC concerns, then you make cshtml.2 -
I decided to run the ROCKYOU password list to see if there are any patterns in md5 hashing, not sure why but I am starting to confuse myself and I need a new pair of eyes to have a look.
in advance, sorry for the shitty image, that lappy is a temporary solution.
So the very accurate and not bias numbers show that the letter "0" appears more than the rest, would there be any use in let's say ordering the wordlist with words that have the most "0" and "7" in their hash to appear at the top?
I believe I might be trying to stretch the numbers and see a pattern where there is none but its worth a shot I think.
Note:
- These numbers come from only about ~14m words
My thinking trail is that if statisticaly these hashes are more likely to appear, they are more likely to be the one I am looking for?3 -
Spend half a day trying to make sound work on my antergos install, after multiple image builds, kernel jumping, reinstalling alsa, realized that people working on making cherry trail laptops sound work - stopped working on it since like april 2017 and new kernels have simply no patch to make it work, great.. debian docs mention that you should be able to use an external soundcard atleast, but the whole alsa and pulseaudio shit doesn't make that easy at all.. atleast the battery time with arch+powertop+tlp is almost the same as what I would get with windows out of it1
-
Had a fun adventure this morning. Had to deliver some bags to some houses. Entered the addresses in Google Maps. Off we go. First house, no problem. Second house, and Google is taking me on a weird route, through some parking lots and stuff. Finally, it wants me to turn onto a bike trail. WTF? My Google maps is set for bike routes. Went a lot faster when I set it to car. No wonder there were so many bikes and the road seemed so narrow.1
-
!dev
Vampire homegirl and I got into bit of a pickle last time we went out marauding around the City of the Dead. We collected payment for a hit on a merchant, but a large portion of the money was discounted, as unbeknown to us, there was a witness to our bloody crime.
Soon enough, we were being hunted down by a rival sect, encroaching on our territory. Their High Priest sent some dogs our way, and we felt right into their ambush, at a crossroads within the southern alleways. I took down three of those sons of bitches, with two crossbow bolts stuck on my back, before finally being knocked down by a shield slammed to my face.
Got both my fucking legs mauled with a flail and almost put out of commission. Luckily, my vampiric companion was there to save my skin. She fought a desperate duel against the last one of our foes left standing: an inquisitor, sent to either capture, or more likely, kill us both.
This fucker was tougher than any adversary either of us had ever fought against. Fully clad in silver armor, wearing an enchanted crimson cloak, her face hidden behind a terrifying iron mask. My companion stood her ground, but throughout the fight, she was constantly on the defensive, hesitant to close too much distance against the enemy.
Our foe launched one devilishly mighty blow, that my partner in crime fortunately managed to block. However, her blade was pulverized by the sheer weight of the inquisitor's strike, nearly shattering her ribcage. In a last ditch effort to survive the encounter, she lunged at her opponent with what remained of her sword, and stabbed the hunter right in her fucking eye, to then sink her fangs into the ecclesiastical bitch's neck.
Having temporarily incapacitated the inquisitor, we made our escape. My companion carried me back to our safehouse, where we would plan our next move... but our masters were one step ahead of us.
At our hideout, we were intercepted by them, at the behest of the Matriarch. We were to be smuggled out of the city inside a funeral carriage, to then be safely transported back to our sacred order's sanctuary.
Uppon arriving, we were confronted and reprimanded for our failures, past and present. I was forcefully separated from my esteemed nocturnal friend, as way our masters put it, our growing affections were cause for concern. Longing to be reunited, we schemed for weeks through our mutual acquaintances in the monastery, delivering small coded messages.
Through our cunning subterfuge, we finally managed to meet in an ancient grotto underneath a cedrus tree, on a hill overlooking the sanctuary. I was ready to plan a daring escape, but to my suprise, she had her mind made up to a wildly different course of action. We were to play by their rules -- go through with their dark cleansing rituals, meant to re-educate us before admitting us back into the order as fully-fledged acolytes.
And so, in the penumbra of that age-old grotto, a pact was made.
I am now riding south on a black stallion, falchion in hand, and a trail of witches' blood in my wake. I carry with me orders from the Matriarch herself: purify the nearby catacombs and prove my devotion to the utter blackness of our faith. Should I not return, my companion will be up next.
Failure is not an option. As I evade the twisted creatures that guard the entrance, and descend the staircase down into the tomb, I wonder what kind of horrors await me inside...
OH GOD FUCKING SHIT I JUST STEPPED ON A TRAP
** TO BE CONTINUED ** -
In this project I’m working on, designers want to decrease their amount of work by blaming technical constraints.
The supposed “technical constraints” actually do not exist, as the stakeholders did tell me in the beginning “make sure that these issues do not exist within the selected solution”.
Now, I don’t have a single problem with them making their lives (and by consequence mine) easier by decreasing the scope of work, but I have said at least 2-3 times by now that there are no technical constraints, and started to do some paperwork trail that I did say that and when.
Not looking forward to see how all of this will turn out, but hoping that for once I am covering my back enough.3 -
Ahoy der Ranters!
I'm looking for a log management service. My server application has a 90 days rolling policy (with gzip) but I would like to store logs somewhere else before they get deleted (after 90 days).
I've heard of Cloud watch, paper trail, and logz.io
What would you recommend?5 -
Which one better Amazon AWS or Google cloud console?
I noticed AWS more difficult than Google cloud!
Google cloud give free trail for 90 days which is nice than AWS!7 -
Ever wondered how Elon himself talked about not messing with AI in the past. I vaugely remember this was when there was a clash between Mark and Elon. And now Elon's companies OpenAI and Neuralink working on advanced tech. The same tech he told everyone to not mess with.
I haven't followed the trail of events clearly. But now this thought comes to my mind.
Anyone thinks the same? Or am I missing something?16 -
Dependencies suck.
I wanted a ruby gem and needed an older version of ruby to run it. Fine, what's the best way to get multiple ruby versions on one system, apparently rvm.
Now I want rvm.
I can't have rvm without getting gnupg first though.
Before I can get gnupg I need brew.
Now I have brew setting my computer on fire compiling god knows what so it can get gnupg so I can get rvm so I can get the ruby version I want to get the gem I want!
It's been running for quite a while...
This isn't the first or last time that the convenience of packages and versions leads to a maze like trail of prerequisites you need to follow.
I'm sure there's some tool that would've helped with my problem, but the problem shouldn't be this bad to begin with!
I understand why it happens but it still sucks and it's a lot of wasted time.
Frankly I'm expecting some people will have gotten so used to this kind of insanity that they won't get why I'm renting about it, oh well, it made me feel better and gave me something to do while brew is melting my machine.3 -
So I was wandering around Lithuania during a time period when the freaks were playing nice. Took some pictures of hot chocolate or coffee can't remember long time ago and some photos of a nice snow covered trail and added some Cyrillic what a nice vacation
True story
This is in Russia immediately after my trip to Lithuania
The people were certainly not twisted freaks who were acting nice for once and leaving me alone instead of acting like fucked up chomo captors. A word I never use but I've been inspired by hearing it over and over
I like it here
There are Tons of people I get along with who have the same interests11 -
Got fed up with my newcomer PO's bullshit planning and constant gaslighting whenever deadlines get missed.
Made a spreadsheet showing our actual capacity vs his unrealistic expectations - turns out all of Q3 work is spilling into Q4, so I'll be spending October finishing July/August/September tasks.
Brought this up multiple times asking for more time or resources. Got denied and blamed instead.
It got really bad to the point where I had to start doing his work for him - make business decisions, create tickets, define acceptance criteria, requirements and etc. Just so I would have some paper trail so that I wouldnt get blamed again in case I'm missing some undefined requirement. Finally couldn't take it anymore and escalated to my dev lead.
Now the PO is getting absolutely chewed out. Feels fucking good to finally see him face consequences for their terrible planning.
On another note - is it a disease or do the most useless people just naturally gravitate toward management positions? For example, this guy is supposed to be a decision maker but answers almost every business question vaguely, ambiguously, or just straight up ignores it. How the fuck such people even exist, it just blows my mind.4 -
Trail and error... So many errors.
Also watching videos to learn how code fits together, as well as looking for other people's example code to reverse engineer it, modify it to see what changed. -
There needs to be a game called along the lines of "how to be a better employee" so if someone so happens to see my browser history dosent see a trail of No mans sky links.
-
The most comprehensive software is powered by spaghetti code. I've just realised that if it's old/matured, it was almost nearly impossible for the code to be coherent or neat. No design patterns. A lengthy trail of ACLs and conditionals reading from a util/helper static method that would make javaScript callback hell's head spin and green with envy
These massive, ready-made software overbloated with features plastered in seem built in a hurry to churn out functionality to make stakeholder and client happy in the shortest amount of time. The authors are hailed as 10x devs. But to you, the maintainer, they are Tetanus that make you crave to rip your eyes out of their sockets2 -
Today I tried running Plasma Wayland again after a few months...well...I tried
What did I experience?
- Mouse cursor size jumping from small to big randomly
- Can't remember fucking window positioning between multiple workspaces, so when I reboot, all windows are in the last workspace
- Random freezes with external monitor plugged in
- Firefox scrolling is absolutely terrible, 5 fps at most, but only when external monitor is connected
- Mouse acceleration can't be completely turned off? Or the setting just didn't work? IDK
- Sometime I get the infamous window trail effect known from older Windows versions, but on mouse cursor3 -
Any strong opinions on giving resignation notice via email? I've previously given notice in person during a 1 on 1 conversation, but I had good relationships with my managers. I work at a larger company now where I feel like the paper trail could be valuable, and I don't have a very warm and fuzzy relationship with my manager. I feel kind of sleazy just sending an email, but asking for an out of the blue zoom meeting just feels weirder somehow than tapping them on the shoulder for a quick chat.1
-
I'm thinking about using my rep to post a collab for a open source low powered (low powered if possible) motion trail cam app.
Only I have zero android experience (I am a nodejs/meteor/javascript dev by trade).
Shall I go for it and rely on others experience? or go for something nodejs based?5 -
Learning a piece of software from an external supplier. The manual is thick like the bible. The examples fail without explanation. Trying to contact support just leads you down an endless trail of support articles. Damn right I get frustrated and bored. Can you blaim me for rather hanging around on devRant than desperately trying to work around problems in someone else's system/documentation? Yeah, I have to pull my shit together, but they have to pull theirs first.
-
Urghh
I swear web push notifications are the betaest most betty beta thing
Half of the time they don't work and misbehave without trail -
Help me as I raise fund for the animals while I run for the Cape of Good Hope SPCA in the Sanlam Cape Town peace Trail Run 22km.
https://www.givengain.com/ap/remej/ -
I'm making a booklet of some handy notes. So, the old trick is print in pages of 4, to make binding easier. I spool about 60 of those and then it starts printing in my manual duplex until
*a wild blank line has been spotted*
`wat?`
I go back and see that I've not noticed a trail of white blanks that had been slowly creepily increasing in the print space where the text should be. Almost 20 of my pages are wasted. I take out the print cartridge and wipe the drum, run the cleaning sequence on a clean sheet and try to print.
Presto! good as new!
Sippin some coffee, browsing the web.. oh and woah! The blank reappears and it is now bigger. The previous 12 pages are not affected? wth
I do this whole thing again. Wipe and print. It works. And along the lines of 15 or so prints, the blank appears again, bigger and bolder. wth. I really need those prints now.
If it was broken, I'd have fixed it in the afternoon, but it is evening now. No one opens at this hour. Why is y printer fucking with me? -
I was frustrated when I lost almost all my life savings to a cryptocurrency scammer. I had invested a significant amount of money in a promising project, but it turned out to be a fraudulent scheme. I was left with nothing but a trail of broken dreams and a lighter wallet. I was devastated, to say the least. I had never felt so helpless in my life. I didn't know where to turn to or who to trust. I was at a crossroads, unsure of what to do next. That's when I stumbled upon Cranix Ethical Solutions Haven online. I saw their testimony and reviews from people who had similar experiences to mine. They claimed to have recovered their stolen cryptocurrency with the help of Cranix Ethical Solutions Haven. At first, I was skeptical. I didn't know if I could trust another company with my sensitive information. But something about Cranix Ethical Solutions Haven resonated with me. Maybe it was their professionalism, or maybe it was their commitment to helping people like me. Whatever it was, I decided to take a chance and reach out to them. I contacted Cranix Ethical Solutions Haven and explained my situation to them. They listened attentively, asking questions and gathering information about my case. They were empathetic and understanding, and I felt a sense of comfort knowing that I was in good hands. They told me that they would do everything in their power to help me recover my stolen cryptocurrency, I was amazed at how quickly they got to work. Within 24 hours, they had already started making progress on my case. They kept me updated every step of the way, explaining what they were doing and why. I was impressed by their expertise and their dedication to their craft.
In the end, Cranix Ethical Solutions Haven was able to recover my stolen cryptocurrency in its entirety. I was overjoyed, to say the least. I couldn't believe that I had finally gotten my money back. It was a huge weight off my shoulders, and I felt a sense of relief wash over me. I want to take this opportunity to thank Cranix Ethical Solutions Haven for their help. They truly are a lifesaver. Without them, I would still be struggling to recover my losses. They are a beacon of hope for people like me who have been victimized by cryptocurrency scammers. If you're reading this and you're in a similar situation, I urge you to reach out to Cranix Ethical Solutions Haven via EMAIL: (cranixethicalsolutionshaven @ post . com) or WHATSAPP: (+4,4,7,4,6,0,6,2,2,7,3,0), WEBSITE: (https: // cranixethicalsolutionshaven . info) TELEGRAM: (@ cranixethicalsolutionshaven). They are the real deal, and they can help you recover your stolen cryptocurrency. Don't hesitate, don't wait - contact them today and let them work their magic. In conclusion, I want to say that Cranix Ethical Solutions Haven is a trustworthy and reliable company that can help you recover your stolen cryptocurrency. They are professional, efficient, and effective. They truly care about their clients and will stop at nothing to help them. I am forever grateful to them, and I know that you will be too if you give them a chance.2 -
Bitcoin, the leading cryptocurrency, has revolutionized the financial landscape but has also attracted fraudulent schemes targeting unsuspecting investors. As the popularity of Bitcoin continues to soar, so do the risks associated with fraudulent investments. Bitcoin fraudulent investments refer to schemes where individuals deceive others into investing in fake or illegitimate projects promising high returns. These scams exploit the trust and lack of regulation in the cryptocurrency space, posing a significant risk to investors. Bitcoin fraudulent investments involve deceitful practices where scammers lure unsuspecting individuals to invest their money in schemes that do not exist or do not deliver on their promises. Such scams can range from Ponzi schemes to fake ICOs, preying on the desire for quick profits in the volatile world of cryptocurrencies. Victims of Bitcoin fraudulent investments not only suffer financial losses but also experience emotional distress and a loss of trust in the cryptocurrency market. Retrieving stolen bitcoin becomes a priority for these individuals to seek justice and recover their assets. Retrieving pilfered bitcoin is a daunting task due to the intricate nature of tracing and identifying stolen funds in the decentralized and pseudonymous blockchain network. Additionally, legal and jurisdictional hurdles further complicate the recovery process, making it challenging for victims to reclaim their stolen assets. The anonymous nature of Bitcoin transactions and the lack of a central authority make it difficult to trace and identify stolen funds. Scammers often use sophisticated methods to obfuscate the flow of stolen Bitcoin, leading to a complex trail that requires expertise to unravel. Bitcoin recovery efforts are hindered by legal and jurisdictional challenges, as scammers operate across borders and exploit loopholes in regulations. Reclaiming stolen bitcoin requires navigating through different legal systems and cooperating with authorities internationally, adding layers of complexity to the retrieval process. Recovering monies taken from victims of bitcoin scams is the area of expertise of reputable company REVENANT CYBER HACKER. When my Bitcoin wallet was hacked and the cyber thieves seemed to have vanished into thin air, REVENANT CYBER HACKER stepped in to crack the case wide open. Through their relentless pursuit and ingenious tactics, they were able to recover the stolen funds and restore faith in the security of cryptocurrency investments. It's a happy ending that proves that even in the Wild West of the crypto world, there are heroes like REVENANT CYBER HACKER fighting for justice. Contact REVENANT CYBER HACKER on:
-
After a catastrophic hack, recovering one's bitcoin holdings can be a difficult and complicated process, but it is possible to recover what was lost with the correct advice and knowledge. In my situation, I was the victim of a very skilled cyberattack that caused my digital assets to instantly disappear from my cryptocurrency wallet. As I struggled with the fact that my financial security had been torn away, panic and despair crept in. But I didn't lose hope, and after doing a lot of research, I found Lee Ultimate Hacker service that is well-known for its capacity to locate and retrieve stolen cryptocurrency. When I contacted their staff, they listened carefully to the specifics of my experience and responded in a kind and sympathetic manner. The Lee specialists started painstakingly tracking the movements of my stolen money, traversing the complex world of cryptocurrency transactions, by utilizing their extensive understanding of blockchain technology and hacking techniques. They pursued the digital trail with unwavering resolve, revealing the intricate network of wallets and exchangers the hackers had employed to hide their activities. The Lee Ultimate team was able to locate my missing assets using their advanced investigative methods and state-of-the-art equipment, which paved the way for the recovery procedure.
What followed was a delicate and intricate operation, as the Lee professionals collaborated with law enforcement agencies and cryptocurrency exchanges to freeze the illicit funds and initiate the retrieval process. This involved navigating a maze of legal and technical hurdles, but the team's expertise and persistence paid off, and eventually, I was overjoyed to see my cryptocurrency holdings restored to my rightful wallet. The sense of relief and restored peace of mind was palpable, and I am forever grateful to the Lee team for their tireless efforts in guiding me through this harrowing ordeal and helping me reclaim what was rightfully mine. For more insight; L E E U L T I M A T E H A C K E R @ A O L . C O M
t e l e g r a m : L E E U L T I M A T E
w h @ t s a p p + 1 ( 7 1 5 ) 3 1 4 - 9 2 4
8 -
CRYPTO RECOVERY SERVICES HIRE SPARTAN TECH GROUP RETRIEVAL
In a modern twist on wedding traditions, a tech-savvy cousin of the bride set up a “blockchain gift registry,” allowing guests to send Bitcoin as wedding gifts, a gesture that reflected the couple’s shared love for innovation and the digital world. What was meant to be a celebration of love and technology quickly turned into a nightmare when it was discovered that the QR codes shared with guests had been tampered with. Instead of pointing to the couple’s wallet, they directed the generous contributions totaling a staggering $55,000 to a scammer’s address. Shocked and heartbroken, the couple found themselves ensnared in a sophisticated cybercrime. But their story didn’t end in despair. Enter SPARTAN TECH GROUP RETRIEVAL, a highly respected firm specializing in cryptocurrency tracing and digital asset recovery. The team at SPARTAN TECH GROUP RETRIEVAL demonstrated why they are leaders in the field. With forensic precision and a profound grasp of Cryptocurrency technology, they launched a comprehensive investigation into the fraudulent transactions. Their analysts employed advanced tracking algorithms, scrutinized transactional patterns, and methodically unraveled the digital trail left by the perpetrator. This relentless pursuit of justice led to the identification of a professional wedding crasher operating out of Valencia, a cunning cybercriminal who had infiltrated multiple events using similar deception. Thanks to SPARTAN TECH GROUP RETRIEVAL's unwavering diligence and collaboration with international cybercrime units, the criminal was exposed, and a substantial portion of the stolen assets was recovered. An impressive $50,000 was successfully retrieved from frozen accounts linked to the fraudster, transforming what could have been a catastrophic financial loss into a triumph of digital justice. SPARTAN TECH GROUP RETRIEVAL didn't just recover cryptocurrency; they restored dignity, trust, and peace of mind. Their exemplary work showcases not only their technical prowess but also their ethical commitment to supporting victims of cyber fraud. In an age where digital innovation often outpaces regulation, SPARTAN TECH GROUP RETRIEVAL stands as a Cryptocurrency recovery guardian.
CONTACT INFO ABOUT THE COMPANY:
Website: h t t p s : / / spartan tech group retrieval . o r g
WhatsApp: + 1 ( 9 7 1 ) 4 8 7 - 3 5 3 8
Telegram: + 1 ( 5 8 1 ) 2 8 6 - 8 0 9 2 -
Soft wear tech is a platform designed to help you recover lost coins, wallets, and cryptocurrencies.
When thieves stole a staggering $900,000 worth of Bitcoin from my digital wallet, I was devastated. As an experienced cryptocurrency investor, I had always taken pride in my security measures, believing my assets were safe. Nonetheless, these skilled hackers breached my defenses and made off with my hard-earned digital coins, leaving me not only with a significant financial loss but also with a feeling of violated trust and security.
Refusing to let the criminals get away with their actions, I took immediate steps to address the situation. I reported the theft to the authorities, fully aware that tracing cryptocurrency transactions is notoriously difficult. However, I was determined to pursue every avenue available. That’s when I discovered the innovative services offered by SOFT WEAR TECH, a company specializing in tracking and recovering stolen digital assets.
The dedicated team at SOFT WEAR TECH quickly sprang into action, meticulously analyzing the blockchain transaction data to follow the money trail. Thanks to their exceptional investigative skills and cutting-edge tools, they were able to pinpoint the location of my stolen Bitcoin and initiate the recovery process. It was a long and arduous battle, with the thieves attempting to cover their tracks and move the funds. Yet, the SOFT WEAR TECH team remained resolute, outsmarting the criminals at every turn.
After weeks of relentless effort, they successfully reclaimed my $900,000 in Bitcoin and returned it to me. I was overjoyed—not only was my investment restored, but I also felt a sense of triumph over those who thought they could escape unscathed. This experience has heightened my vigilance and commitment to security in cryptocurrency investing, and I am deeply grateful to have had the SOFT WEAR TECH team fighting to protect what belongs to me.
For inquiries, feel free to reach out via
Email: softweartech5@gmail.
Email: softewar.tech@yandex
Phone : +1 9594003352 -
HIRE BOTNET CRYPTO RECOVERY FOR SCAMMED BITCOIN RECOVERY ASSISTANCE
For those like yourself who have suffered the terrible loss of their digital possessions, the BOTNET CRYPTO RECOVERY service is a lifeline for victims of stolen Bitcoin. Undoubtedly, losing your 67,000 Bitcoin was a terrible and confusing experience that left you feeling helpless and unsure of how to get back what was properly yours. But the BOTNET CRYPTO RECOVERY team is adept at negotiating the intricate web of cryptocurrency theft, using their wealth of knowledge and industry connections to locate and retrieve stolen money. They can follow the digital trail left by the criminals thanks to their thorough investigation method, which frequently reveals a convoluted web of illegal activities and mysterious characters. The BOTNET CRYPTO RECOVERY specialists are in a unique position to solve the problem and pinpoint the most viable recovery paths because of their in-depth knowledge of blockchain technology and the many strategies used by cryptocurrency criminals. They exert maximum pressure and raise the likelihood of a good resolution by utilizing their connections with exchanges, law enforcement, and other important players. Their resourcefulness and tenacity are unmatched.
For individuals like yourself who have experienced the heartbreak and financial devastation of stolen Bitcoin, the BOTNET CRYPTO RECOVERY service offers hope in an otherwise bleak situation. The team's unwavering commitment to their clients and ability to navigate the complex, ever-evolving world of cryptocurrency theft makes them invaluable in the fight to reclaim what is rightfully yours. With their guidance and expertise, the path to recovering your lost 670,000 Bitcoin, and regaining a sense of financial security, becomes significantly more attainable, providing a lifeline in the face of such a daunting challenge. Please send an email to: case (@) botnet crypto recovery (.) info, Also visit their official webpage at botnet crypto recovery . ) info1 -
HIRE ADWARE RECOVERY SPECIALIST FOR ANY TYPE OF ONLINE SCAM OR TO SPY ON CHEATING BOYFRIND
Call or Text: +18186265941Catching a cheating spouse in the act can be a delicate and sensitive situation, but with the help of modern technology, the process has become more streamlined and efficient. Enter ADWARE RECOVERY SPECIALIST - a powerful tool that allows you to uncover the digital breadcrumbs left behind by a cheating wife. By harnessing the power of this advanced software, you can infiltrate her online activities and piece together a comprehensive trail of evidence. Perhaps she's been exchanging flirtatious messages on a secret social media account, or maybe she's been making frequent video calls to a mysterious new "friend." The ADWARE RECOVERY SPECIALIST program can retrieve this data, no matter how well she thinks she's covered her tracks. It can even retrieve deleted files and messages, exposing the full scope of her infidelity. With this information in hand, you'll be armed with the proof needed to confront her and get to the bottom of her betrayal. While it may be a difficult and heart-wrenching process, using ADWARE RECOVERY SPECIALIST can provide the clarity and closure needed to move forward, either by salvaging the relationship or parting ways. This technological solution offers a discrete and effective way to catch a cheating wife red-handed, giving you the power to take back control of the situation. I was glad I used their service because I cannot say how on earth I would have confronted my wife. Evidence were everywhere for me to see. I am grateful to ADWARE RECOVERY SPECIALIST for this. Contact ADWARE RECOVERY SPECIALIST for assistance.
Email info: Adwarerecoveryspecialist@auctioneer. net -
The world of cryptocurrency has long been plagued by the devastating consequences of lost or stolen digital assets, leaving countless individuals and businesses scrambling to recover their rightful funds. However, a game-changing solution has emerged in the form of Dexdert Net Pro, a revolutionary platform that is reinventing the way we approach bitcoin recovery. At the heart of Dexdert Net Pro innovative approach is a robust and multifaceted strategy that leverages cutting-edge technology, a global network of specialized investigators, and a deep understanding of the complex web of blockchain transactions. Unlike traditional recovery methods that often prove tedious, time-consuming, and ultimately fruitless, Dexdert Net Pro proprietary algorithms and investigative techniques allow them to meticulously trace the movement of stolen or misplaced bitcoins, no matter how convoluted the trail may be. By tapping into the power of machine learning and artificial intelligence, Dexdert Net Pro is able to analyze vast troves of blockchain data, identify patterns and anomalies, and pinpoint the precise location of missing funds with unprecedented accuracy. Complementing this technological prowess is a team of seasoned crypto experts and former law enforcement professionals who lend their expertise to devise innovative strategies for asset recovery, navigate legal complexities, and liaise with authorities to ensure the successful return of stolen funds. With its unwavering commitment to client satisfaction and a track record of remarkable success, Dexdert Net Pro is poised to forever transform the landscape of bitcoin recovery, providing a beacon of hope for those who have fallen victim to the perils of the digital currency ecosystem.
WhatsApp:(+1 (435) 294‑8481)Telegram:(@Dexdertprorovery)4 -
Turning the Tables: My Journey to Reclaim Stolen Bitcoins with Expert Help. When my Bitcoin wallet was hacked and my entire cryptocurrency portfolio was stolen, I felt utterly devastated and hopeless. Having worked hard to build up my digital assets, the sudden loss was gut-wrenching. It felt like my financial future had been ripped away in an instant, leaving me overwhelmed by a sense of betrayal and despair. In my search for help, I discovered TECH CYBER FORCE Recovery, a renowned cybersecurity firm specializing in cryptocurrency recovery. I was met with professionalism and empathy from my first contact with them. The team demonstrated a steadfast commitment to helping me retrieve my stolen Bitcoins. They understood the emotional toll of my situation and approached my case with genuine concern. TECH CYBER FORCE Recovery swung into action immediately, leveraging its extensive expertise in blockchain forensics and hacker tracking techniques. Their process was meticulous. They analyzed my transaction history, followed the digital trail left by the hackers, and worked diligently to pinpoint the location of the stolen funds. I was impressed by their technical prowess; they employed advanced cryptographic methods and strategic negotiations with the perpetrators, all while keeping me informed about their progress. The recovery process was complex and fraught with challenges. However, the tenacity displayed by the team was truly awe-inspiring. They navigated cryptocurrency crime's murky and ever-evolving landscape with skill and determination. After a series of strategic moves, they managed to recover the majority of my Bitcoins successfully.
WHATSAPP. +. 15_61_72_63_69_7 -
The Bitcoin Resurgence: My Unforgettable Experience with Pro Neuro Cyber Force Recovery
Recovering lost assets can be a daunting and complex process, but Pro Neuro Cyber Force Recovery’s approach offers a glimmer of hope for those seeking to recover their lost Bitcoin. Cyber Force, a renowned cryptocurrency recovery specialist, has developed a meticulous, multi-faceted strategy for tracking and recovering lost or stolen digital assets. Their approach begins with a thorough investigation, leveraging their extensive knowledge of blockchain technology and network of industry contacts to uncover the trail of missing Bitcoin. Through meticulous analysis of transaction histories, wallet addresses, and other digital trails, Cyber Force is often able to identify the last known location of the funds and the individuals or entities responsible for their disappearance. From there, they employ a combination of legal, technical, and negotiation tactics to navigate the maze of crypto regulations and recover the lost assets. This can involve everything from filing civil lawsuits and working with law enforcement to implementing specialized software and engaging in high-stakes negotiations with anonymous hackers. Cyber Force’s tenacity and resourcefulness have earned it a reputation as a formidable ally for those seeking to recover their rightful digital wealth, as evidenced by its successful recovery of the 45,000 Bitcoins at the center of this case. With its unwavering commitment and innovative approach, Cyber Force offers a glimmer of hope to those who have fallen victim to the perils of the cryptocurrency landscape. Be sure to email: for immediate support. Thank you.
WhatsApp : +1 (661) 418-4457 -
Unraveling the tangled web of deception can be a daunting task, but the emerging field of "CYBER TECH WIZARD" is offering new hope for those seeking to confront the devastating impact of infidelity. This innovative approach leverages advanced digital forensics and data analysis techniques to meticulously piece together the digital trail left behind by unfaithful partners. By delving deep into smartphones, computers, and online accounts, skilled practitioners are able to uncover a startling level of detail about clandestine communications, secret rendezvous, and the complex web of lies that often accompanies infidelity. The insights gleaned from this painstaking process can be nothing short of revelatory, providing scorned individuals with the cold, hard evidence needed to confront their partner's betrayal and reclaim a sense of truth and transparency in the relationship. Yet the implications of CYBER TECH WIZARD extend far beyond the personal realm, as these techniques also hold the power to expose broader patterns of deception, manipulation, and abuse that may have remained hidden for years. As this field continues to evolve, it promises to be a crucial tool in the fight against the corrosive effects of unfaithfulness, empowering those who have been wronged to unravel the deception and forge a path towards healing and accountability. Don't wary if you have been scammed from your hard earn money you can recover them all back, call CYBER TECH WIZARD now through: Email Address cyber tech wizard @ cyber services . com
Good Day and thank me later. -
"iBolt Cyber Hacker Recovered My Crypto in Days – 100% Legit!
"I Thought My Wallet Was Gone Forever — Until I Found iBolt Cyber Hacker"
iBolt Helped Me Recover Over $50K in Lost Crypto"
"Scammed and Helpless, Then iBolt Came Through – 100% Legit!"
My Experience with iBolt Cyber Hacker"
I was scammed out of $50,000 Bitcoin through a fake trading platform. completely hopeless, contacted my banks, filed reports nothing worked. Everyone told me crypto losses were irreversible… until I found iBolt Cyber Hacker.
They are professional, responsive, and incredibly knowledgeable. I honestly didn’t expect much, but within hours, they traced the wallet address, followed the blockchain trail, and recovered my bitcoin!
I was stunned when my funds were sent back to my wallet — fast, safe, and verifiable.
If you've been a victim of a crypto scam, don’t waste time contact iBolt now. These guys are the real deal. 100% legit, no games, just results.
— Liliana O., Cancun, Mexico
Website: htt ps:// iboltcyberhack . org/1 -
I NEED A HACKER TO ASSIST ME RECOVER MY LOST CRYPTO VISIT CYBER CONSTABLE INTELLIGENCE
In today's interconnected world, the attraction of financial investments often comes hand in hand with the looming threat of fraud. My own journey into the treacherous waters of investment began with hopeful anticipation but ended in a harrowing tale of deceit and financial loss. I embarked on my investment journey with a staggering $263,000, trusting an unregulated company promising lucrative returns. Initially, the promises seemed promising—enticing profits and assurances of secure transactions. However, as time progressed, the facade began to crumble. The company relentlessly demanded additional deposits under the guise of "enhancing returns" and "securing investments," leaving me ensnared in a web of deceit. Realizing the gravity of my situation, I attempted to withdraw my funds, only to encounter mounting obstacles and evasive maneuvers from the company. Their demands for more deposits intensified, plunging me deeper into a state of financial jeopardy. It became painfully clear that I had fallen victim to an elaborate scam orchestrated by unscrupulous entities preying on unsuspecting investors. In my darkest hour, a glimmer of hope emerged through the recommendation of others who had weathered similar storms: So i Contacted Cyber Constable Intelligence With nothing left to lose and everything to gain, I reached out to them, desperate for a lifeline. From the moment I made contact, Cyber Constable Intelligence exemplified professionalism, empathy, and unwavering dedication. Their team of experts understood the complexities of investment fraud and the intricate strategies employed by fraudulent companies to manipulate and deceive. They listened attentively to my account of events, offering reassurance and clarity amidst the chaos. Cyber Constable Intelligence swiftly launched into action, conducting a thorough investigation into the fraudulent activities that had stripped me of my hard-earned savings. Leveraging their expertise in cybersecurity and forensic analysis, they meticulously traced the convoluted trail of transactions and exposed the deceptive tactics employed by the company. Throughout the recovery process, Cyber Constable Intelligence maintained transparent communication, providing regular updates on their progress and findings. Their commitment to justice and client welfare was unwavering, as they navigated legal complexities and negotiated tirelessly on my behalf. After diligent efforts and strategic maneuvers, Cyber Constable Intelligence achieved the seemingly impossible—they successfully recovered the entirety of my $263,000 investment. The overwhelming relief and gratitude I felt cannot be overstated, marking a monumental victory in my quest for financial restitution. Beyond the tangible recovery of funds, Cyber Constable Intelligence empowered me with invaluable knowledge and insights into safeguarding against future investment fraud. They emphasized the importance of due diligence, thorough research, and skepticism towards promises of unrealistic returns. Armed with this newfound awareness, I am now equipped to navigate the investment landscape with heightened caution and vigilance. As I reflect on this challenging chapter in my life, I am compelled to share a message of caution and encouragement. Investment fraud is a pervasive threat that preys on trust and vulnerability. To those who have fallen victim, I urge you not to despair but to take proactive steps towards recovery. Seek assistance from ethical hackers and reputable recovery services like Cyber Constable Intelligence, who stand as guardians of justice in the face of financial wrongdoing. While the scars of fraud may linger, my experience with Cyber Constable Intelligence has restored my faith in justice and integrity. They are not just experts in recovery but also advocates for those who have been wronged. Together, we stand united in the fight against investment fraud, reclaiming what is rightfully ours and forging ahead with renewed determination.
Reach out to them with the info below: WhatsApp info: +1 (2 5 2) 3 7 8-7 6 1 1