Binary Options Trading Signals- 85 - 90% Win Rate - 3 Days ...

Forex Signals Reddit: top providers review (part 1)

Forex Signals Reddit: top providers review (part 1)

Forex Signals - TOP Best Services. Checked!

To invest in the financial markets, we must acquire good tools that help us carry out our operations in the best possible way. In this sense, we always talk about the importance of brokers, however, signal systems must also be taken into account.
The platforms that offer signals to invest in forex provide us with alerts that will help us in a significant way to be able to carry out successful operations.
For this reason, we are going to tell you about the importance of these alerts in relation to the trading we carry out, because, without a doubt, this type of system will provide us with very good information to invest at the right time and in the best assets in the different markets. financial
Within this context, we will focus on Forex signals, since it is the most important market in the world, since in it, multiple transactions are carried out on a daily basis, hence the importance of having an alert system that offers us all the necessary data to invest in currencies.
Also, as we all already know, cryptocurrencies have become a very popular alternative to investing in traditional currencies. Therefore, some trading services/tools have emerged that help us to carry out successful operations in this particular market.
In the following points, we will detail everything you need to know to start operating in the financial markets using trading signals: what are signals, how do they work, because they are a very powerful help, etc. Let's go there!

What are Forex Trading Signals?

https://preview.redd.it/vjdnt1qrpny51.jpg?width=640&format=pjpg&auto=webp&s=bc541fc996701e5b4dd940abed610b59456a5625
Before explaining the importance of Forex signals, let's start by making a small note so that we know what exactly these alerts are.
Thus, we will know that the signals on the currency market are received by traders to know all the information that concerns Forex, both for assets and for the market itself.
These alerts allow us to know the movements that occur in the Forex market and the changes that occur in the different currency pairs. But the great advantage that this type of system gives us is that they provide us with the necessary information, to know when is the right time to carry out our investments.
In other words, through these signals, we will know the opportunities that are presented in the market and we will be able to carry out operations that can become quite profitable.
Profitability is precisely another of the fundamental aspects that must be taken into account when we talk about Forex signals since the vast majority of these alerts offer fairly reliable data on assets. Similarly, these signals can also provide us with recommendations or advice to make our operations more successful.

»Purpose: predict movements to carry out Profitable Operations

In short, Forex signal systems aim to predict the behavior that the different assets that are in the market will present and this is achieved thanks to new technologies, the creation of specialized software, and of course, the work of financial experts.
In addition, it must also be borne in mind that the reliability of these alerts largely lies in the fact that they are prepared by financial professionals. So they turn out to be a perfect tool so that our investments can bring us a greater number of benefits.

The best signal services today

We are going to tell you about the 3 main alert system services that we currently have on the market. There are many more, but I can assure these are not scams and are reliable. Of course, not 100% of trades will be a winner, so please make sure you apply proper money management and risk management system.

1. 1000pipbuilder (top choice)

Fast track your success and follow the high-performance Forex signals from 1000pip Builder. These Forex signals are rated 5 stars on Investing.com, so you can follow every signal with confidence. All signals are sent by a professional trader with over 10 years investment experience. This is a unique opportunity to see with your own eyes how a professional Forex trader trades the markets.
The 1000pip Builder Membership is ordinarily a signal service for Forex trading. You will get all the facts you need to successfully comply with the trading signals, set your stop loss and take earnings as well as additional techniques and techniques!
You will get easy to use trading indicators for Forex Trades, including your entry, stop loss and take profit. Overall, the earnings target per months is 350 Pips, depending on your funding this can be a high profit per month! (In fact, there is by no means a guarantee, but the past months had been all between 600 – 1000 Pips).
>>>Know more about 1000pipbuilder
Your 1000pip builder membership gives you all in hand you want to start trading Forex with success. Read the directions and wait for the first signals. You can trade them inside your demo account first, so you can take a look at the performance before you make investments real money!
Features:
  • Free Trial
  • Forex signals sent by email and SMS
  • Entry price, take profit and stop loss provided
  • Suitable for all time zones (signals sent over 24 hours)
  • MyFXBook verified performance
  • 10 years of investment experience
  • Target 300-400 pips per month
Pricing:
https://preview.redd.it/zjc10xx6ony51.png?width=668&format=png&auto=webp&s=9b0eac95f8b584dc0cdb62503e851d7036c0232b
VISIT 1000ipbuilder here

2. DDMarkets

Digital Derivatives Markets (DDMarkets) have been providing trade alert offerings since May 2014 - fully documenting their change ideas in an open and transparent manner.
September 2020 performance report for DD Markets.
Their manner is simple: carry out extensive research, share their evaluation and then deliver a trading sign when triggered. Once issued, daily updates on the trade are despatched to members via email.
It's essential to note that DDMarkets do not tolerate floating in an open drawdown in an effort to earnings at any cost - a common method used by less professional providers to 'fudge' performance statistics.
Verified Statistics: Not independently verified.
Price: plans from $74.40 per month.
Year Founded: 2014
Suitable for Beginners: Yes, (includes handy to follow trade analysis)
VISIT
-------

3. JKonFX

If you are looking or a forex signal service with a reliable (and profitable) music record you can't go previous Joel Kruger and the team at JKonFX.
Trading performance file for JKonFX.
Joel has delivered a reputable +59.18% journal performance for 2016, imparting real-time technical and fundamental insights, in an extremely obvious manner, to their 30,000+ subscriber base. Considered a low-frequency trader, alerts are only a small phase of the overall JKonFX subscription. If you're searching for hundreds of signals, you may want to consider other options.
Verified Statistics: Not independently verified.
Price: plans from $30 per month.
Year Founded: 2014
Suitable for Beginners: Yes, (includes convenient to follow videos updates).
VISIT

The importance of signals to invest in Forex

Once we have known what Forex signals are, we must comment on the importance of these alerts in relation to our operations.
As we have already told you in the previous paragraph, having a system of signals to be able to invest is quite advantageous, since, through these alerts, we will obtain quality information so that our operations end up being a true success.

»Use of signals for beginners and experts

In this sense, we have to say that one of the main advantages of Forex signals is that they can be used by both beginners and trading professionals.
As many as others can benefit from using a trading signal system because the more information and resources we have in our hands. The greater probability of success we will have. Let's see how beginners and experts can take advantage of alerts:
  • Beginners: for inexperienced these alerts become even more important since they will thus have an additional tool that will guide them to carry out all operations in the Forex market.
  • Professionals: In the same way, professionals are also recommended to make use of these alerts, so they have adequate information to continue bringing their investments to fruition.
Now that we know that both beginners and experts can use forex signals to invest, let's see what other advantages they have.

»Trading automation

When we dedicate ourselves to working in the financial world, none of us can spend 24 hours in front of the computer waiting to perform the perfect operation, it is impossible.
That is why Forex signals are important, because, in order to carry out our investments, all we will have to do is wait for those signals to arrive, be attentive to all the alerts we receive, and thus, operate at the right time according to the opportunities that have arisen.
It is fantastic to have a tool like this one that makes our work easier in this regard.

»Carry out profitable Forex operations

These signals are also important, because the vast majority of them are usually quite profitable, for this reason, we must get an alert system that provides us with accurate information so that our operations can bring us great benefits.
But in addition, these Forex signals have an added value and that is that they are very easy to understand, therefore, we will have a very useful tool at hand that will not be complicated and will end up being a very beneficial weapon for us.

»Decision support analysis

A system of currency market signals is also very important because it will help us to make our subsequent decisions.
We cannot forget that, to carry out any type of operation in this market, previously, we must meditate well and know the exact moment when we will know that our investments are going to bring us profits .
Therefore, all the information provided by these alerts will be a fantastic basis for future operations that we are going to carry out.

»Trading Signals made by professionals

Finally, we have to recall the idea that these signals are made by the best professionals. Financial experts who know perfectly how to analyze the movements that occur in the market and changes in prices.
Hence the importance of alerts, since they are very reliable and are presented as a necessary tool to operate in Forex and that our operations are as profitable as possible.

What should a signal provider be like?

https://preview.redd.it/j0ne51jypny51.png?width=640&format=png&auto=webp&s=5578ff4c42bd63d5b6950fc6401a5be94b97aa7f
As you have seen, Forex signal systems are really important for our operations to bring us many benefits. For this reason, at present, there are multiple platforms that offer us these financial services so that investing in currencies is very simple and fast.
Before telling you about the main services that we currently have available in the market, it is recommended that you know what are the main characteristics that a good signal provider should have, so that, at the time of your choice, you are clear that you have selected one of the best systems.

»Must send us information on the main currency pairs

In this sense, one of the first things we have to comment on is that a good signal provider, at a minimum, must send us alerts that offer us information about the 6 main currencies, in this case, we refer to the euro, dollar, The pound, the yen, the Swiss franc, and the Canadian dollar.
Of course, the data you provide us will be related to the pairs that make up all these currencies. Although we can also find systems that offer us information about other minorities, but as we have said, at a minimum, we must know these 6.

»Trading tools to operate better

Likewise, signal providers must also provide us with a large number of tools so that we can learn more about the Forex market.
We refer, for example, to technical analysis above all, which will help us to develop our own strategies to be able to operate in this market.
These analyzes are always prepared by professionals and study, mainly, the assets that we have available to invest.

»Different Forex signals reception channels

They must also make available to us different ways through which they will send us the Forex signals, the usual thing is that we can acquire them through the platform's website, or by a text message and even through our email.
In addition, it is recommended that the signal system we choose sends us a large number of alerts throughout the day, in order to have a wide range of possibilities.

»Free account and customer service

Other aspects that we must take into account to choose a good signal provider is whether we have the option of receiving, for a limited time, alerts for free or the profitability of the signals they emit to us.
Similarly, a final aspect that we must emphasize is that a good signal system must also have excellent customer service, which is available to us 24 hours a day and that we can contact them at through an email, a phone number, or a live chat, for greater immediacy.
Well, having said all this, in our last section we are going to tell you which are the best services currently on the market. That is, the most suitable Forex signal platforms to be able to work with them and carry out good operations. In this case, we will talk about ForexPro Signals, 365 Signals and Binary Signals.

Forex Signals Reddit: conclusion

To be able to invest properly in the Forex market, it is convenient that we get a signal system that provides us with all the necessary information about this market. It must be remembered that Forex is a very volatile market and therefore, many movements tend to occur quickly.
Asset prices can change in a matter of seconds, hence the importance of having a system that helps us analyze the market and thus know, what is the right time for us to start operating.
Therefore, although there are currently many signal systems that can offer us good services, the three that we have mentioned above are the ones that are best valued by users, which is why they are the best signal providers that we can choose to carry out. our investments.
Most of these alerts are quite profitable and in addition, these systems usually emit a large number of signals per day with full guarantees. For all this, SignalsForexPro, Signals365, or SignalsBinary are presented as fundamental tools so that we can obtain a greater number of benefits when we carry out our operations in the currency market.
submitted by kayakero to makemoneyforexreddit [link] [comments]

Part 2: Tools & Info for Sysadmins - Mega List of Tips, Tools, Books, Blogs & More

(continued from part 1)
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments or suggestions.
u/crispyducks
submitted by crispyducks to sysadmin [link] [comments]

[MtF] Coming Out

I came out to most almost a year after starting HRT over the course of several months. These are my notes about how I decided that it was the right time for me, how I did it, lessons learned, tips I wish I had known when I started, and what I wish I could have told myself at the start.
This is one entry in a series of posts drawn out of notes and journal entries. A link to all of the posts can be found in my transition journey.
As with all my posts, this is comprised of notes from my journey, from someone that knew something was off since childhood and transitioned well past puberty had done its thing. Your journey will be different, YMMV applies to this community more than most, and there is no right or wrong way.
There are many different ways to come out, this was just my experience and yours can and will be very different.

Coming out

There is no rule that says you have to come out to anyone or that you have to come out to everyone. Alternatively, you can pick and choose who you come out to. You might tell friends and family, but not tell your work and just start a new job as the new you. It is up to you to decide who needs to know.
If and when you do come out you are not asking their opinion, you are letting them know what is going on.
If coming out feels like a confession and you are seeking acceptance and understanding you want to shift away from that to one where you are just letting them know what is going on. They will or won't be accepting and you have no say in that. Coming out is not about gaining acceptance.
You might lose some friends, but you will probably be gaining some new ones like any transition in life such as when you move, change school/jobs, have kids, etc. Some will be accepting, some won't be, some will take time. Some will go through the seven stages of grief. Some might be open and happy for you, but months later they will stop inviting you to events. Some might hit on you.

My "plan"

From the start my plan was delay telling others until after I was male failing. To be clear male failing is one person on the street seeing a woman from just a glance at me, not everyone, not all the time. This started happening occasionally between month 9 and 11. Around month 10 even those that saw me frequently started noticing and would ask what's up. That occurring is what caused me to create a more firm schedule for coming out socially.
Of course, this plan makes for an annoying catch 22

The bell curve of when others notice

There was no magic day where everyone's brain flip how they gender you. Some flip early, some flip late, some you have to explicitly tell as they will never figure it out. Unfortunately the time span of this bell curve isn't measured in days or weeks, but months from my experience.
Another woman I work with that had transitioned years before (and was open about the fact) figured it out crazy early, but was incredibly polite and didn't say a thing until I approached her for advice.
Those that have seen other individuals transition were able to spot my transition. Lack of facial hair and early changes to my voice stand out to them. The first unexpected person to figure it out that I came out to was one of these individuals. Later I found out there were several more that knew for over a year, but were all polite until I formally came out.
Those I interacted with the most were the last to notice my changes and they were not the first to gender me correctly. I call this boiling the frog or gender warping and the result is that they had the hardest time.
On the flip side, those that have never seen me before at shops and restaurants consistently would see me as a woman even when those at work that saw me every day had "no clue".
Different people gender individuals differently, placing different importance on different things from appearance to voice to smell. With the face it might be the skin tone, nose shape, or brow ridge that is the most important, you just don't know how any one's brain genders.
When a few people started noticing I was all excited to come out, but really the lesson I learned the hard way was that I needed to slow down. I was at the beginning of the curve. Just because a few figured it out doesn't mean most would and being told that 'they never would have guessed' because they still see a guy hurts. The longer I waited the less common that reaction was.
To further highlight the "speed" here are some dates to show how long I waited to come out at work compared to when I first started to be seen as a woman in public.

Deciding when to come out

Originally I was going to wait to tell most until after I had FFS which was scheduled for month 16, but a few were figuring it out at month 10 and I really didn’t want to wait.
In the end, I told very close friends first, immediate family, and worked my way out in my social circle saving coming out formally at work for last and so there wasn't a specific day I told everyone, but it happened many times over the course of around three months.
Because I wanted to tell people in person there was a time period where some knew, but others did not which gets annoying and was a little depressing at times.

Switching pronouns and name

I held off asking those that knew really early on to switch to use my new name and female pronouns until I was male failing and told a wider circle of friends. I did not want to live through others trying when I was clearly still presenting male which would result in me getting constantly misgendered not to mention someone slipping up around someone that did not know. It was just too messy and this was easier socially even if it was sad for me.
I did ask those that never interact with others to switch my name and pronouns immediately such as the woman that I went to for laser, which made my visits amazing. In fact, she never knew me by my deadname and one day I left smiling when I told her my deadname in a conversation and she said it was weird. I never "came out" to those individuals, they only ever knew me as the new me which was great.

1 minute coming out speech

Before I came out officially at work a handful of people figured it out. One even asked me my name/pronouns and told me later they assumed they had missed the announcement. I realized that I needed something for these cases where someone approaches unexpectedly. I put together a little speech that I can say in a minute that hits all the bullet points that I kept on my phone.

Don't beat around the bush

Early on (month 10-11) there were a few people that figured out what was going on, but didn't say anything. If you realize this is happening don't beat around the bush or play coy games to see if they can figure it out. It is much better all around to just be upfront and tell them that you are transgender, transitioning, and give the above 1 minute coming out speech. Don't turn it into a long awkward thing.
My apologies to the person that I did this to before I had the 1 minute coming out speech and was still terrified of telling people and really wanted them to figure it out and say something first. If you are really sure they know, just tell them.

Shorter is better

It is tempting when coming out to want to sit down and share everything that you have been keeping quiet about. Further, there can be a desire to convince them and seek validation. Long term though you want to try to stick more to the 1 minute speech and less the 1 hour discussion. Many of the things you share you will later wish you never had.

A one liner is also okay

One person I came out to really early on I did it in an off handed way. They overheard something with my new name and so I told them that I will be going by a new name in a month or two and that I am transgender. That was it, no further conversation was had. I simply told them of a change in my life, like it was exciting as buying a new winter coat or something. In a way, I think I liked this way of coming out more than anything else because they immediately switched and life moved on without a big drawn out event.

Coming out lessons

Guidelines I have learned the hard way.
Do not under any circumstances assume that the person you are coming out to is supportive. There are countless stories of being surprised at how others react. They might call you by your new name to your face, but never anyone else. They might be supportive say you are brave, but gossip about you negatively to their friends. Be especially watchful of those that might be openly hostile to you.
With each coming out the overall lesson I learned was to tell less.

Who needs science

Before I came out I had a list of scientific articles and was ready and happy to discuss it in greater detail with anyone that wanted to. To my surprise, everyone either was just happy that I was happy or had already made up their mind and wasn't really interested in that sort of discussion.

Telling parents

My parents lived nearby and so I made sure to regularly see them so it wouldn't be a jarring visit with me looking different. I had spent months crafting a letter to give to them. The letter served several roles. First and foremost it was to articulate what is going on in as clear of a way as possible as well as answer the most common questions they might have. Beyond that, I knew that when I left their house they would still have this letter and use it as a FAQ of sorts to be able to go back and see what I had written.
When the day actually came they told me that while they didn't really understand they still loved me. I regularly went back and hung out with them so they could see that I am still me. On the second visit it there was a lot more questions and push back to the point that they were trying to debate how I felt when I was a child as though they might know better than me. No matter what I felt about that, I calmly let them talk because I could see what they were doing and I know that this is all new for them and it will take some time. I kept going back, each time being calm and as time went and they learned more they seemed to became more accepting and supportive.
Family is family and giving them time to adjust and not giving up I felt was the right thing to do. When I came out I wasn’t wearing a dress and was still presenting androgynous, but each time they saw me after I slowly changed my presentation. Not only could they adjust to my presentation, but HRT continued to do its slow magic, and each time I was more feminine. I don't have a magic solution for dealing with parents, but I am being much more patient than I am with anyone else.
If I have to cut a family member out of my life I want to know that I first did everything possible to maintain our relationship.

Acceptance and Support

When asked how others are responding to me coming out I like to describe in terms of acceptance and support as two separate axis on a graph. I have those that are supportive, but not accepting, those that are not accepting and not supportive, and those that are supportive and accepting and everything in the middle.
For many that are not accepting it is because they are not informed. They make a million assumptions based on what little information they have seen in the media. Simply talking to them helps bring to light a lot of these misconceptions and can move that axis.

Its all about sexuality right???

Some individuals have a really really hard time separating sexuality from gender. They will bring the conversations constantly back to that topic and they just can't conceive that I am not doing this for sexual reasons. When I discuss my transition it is almost never about sexuality and every time they bring it up I clarify and move the conversation elsewhere. I try to discuss sexuality as little as possible because I want to send a clear message that it is not part of the conversation. Sometimes I have to be as blunt as I am willing about this topic as they might have just insane ideas.

People talk

Do not trust that people won't talk. Assume if you tell someone they will tell someone else. Someone at my work figured it out and told his wife (via chat on his phone) before we even finished my coming out conversation. Within the world of gossip, this ranks insanely high. If someone asks if you are going through something early on you can just say 'personal stuff' and leave it at that, you do not have to tell anyone before you are ready. There are plenty of stories where someone came out to a friend or supposed ally only to find out that they told everyone. Even though I was prepared for it when it happened to me it took me by surprise. Even telling another trans individual doesn't guarantee they won't talk.
The safest thing is to not tell anyone until you are ready for everyone to know.
On the flip side, this can be used for coming out at work, the neighborhood, etc. Tell the person that gossips and just stand back. Or tell a close group and let them know it is not a secret and you plan on formally coming out in a few weeks. They will talk and when you "come out" it won't surprise many. It will be news for a few weeks and then people will hopefully move on. Cis individuals by and large don't understand how serious outing you is.
As for myself those that are closest to me would almost always tell their spouses shortly after I told them. Friends, family, boss, acquaintances, at each level of the circle, the possibility of someone telling everyone grows. It is really juicy gossip from their perspective and not a medical or safety issue like it is to us.

Delay until next week

When going through the process of telling everyone if you delay telling an individual a week it is only better. As I started coming out more and more events were conspiring as they do, to delay things. That might have been telling a neighbor or getting my name changed or telling an extended family member. In each case I really wanted to do it yesterday, but also took a breath and didn't worry about it. The important thing was that it was going to happen. And in fact, the extra week or month was actually a positive thing. A few more weeks for HRT to do its thing, for me to work on my voice, wardrobe, facial hair, everything. So I didn't stress when I realized something I originally was hoping to do at month 11 would happen at month 13. This happened a number of times and in each case, I was simply more prepared in the end. I started not trying to cram everything as close together as possible, but just tell those when the time is best.

And then ... nothing

I told the majority of individuals over the course of two months. Not too surprisingly very quickly it became yesterday's news, but what was more interesting was how the news wasn't timely. I wasn't going to a family wedding, high school reunion, or similar. If I had waited another month or three to start telling everyone it would have been okay.

Work

I told my boss when a few early individuals started to figure it out just in case something happened and I wanted him to be in my corner, but this was months before actually coming out at work. At the same time I reached out to HR so that they would be in the loop both for my own documentation/legal purposes and if they wanted to help. I am not sure if they were unprepared or if I live in a more liberal state than I realized because the response was only a link to the documentation on how to change my name in the various corporate systems.
I delayed the general announcement until almost 14 months. I was full time everywhere except work and itching to be me at work too, but given that it is my income, how I pay for food and housing I played it very safe. It was only once I had my legal name change and needed to update my name for payroll that I decided to come out at work. My face had changed enough that after I came out I was told one person said: "about time".
I crafted a simple email that my director sent out. It was in the style of a new hire email just a photo and an introduction. Not only did having them send it out give it authority behind the announcement, but they got to use the female pronouns in the email when referring to me. I also had a long legal type HR email ready in case we needed to send it to anyone in specific if there was trouble.
The email that went out was very short, just a few paragraphs that covered the following points:
I told my immediate colleagues before the mass email went out because I consider them my friends and because they saw me almost every day they didn't realize I had been changing and were surprised. After the announcement I got to go around changing my name and photo in various systems and got a new badge all on the same day.
I received a lot of congratulatory emails and then after a few hours I was just back to doing work. It took a few days for the news to filter out and over the next few days others kept finding out and either stopping by and saying hi or sending me an email.
I work in a casual environment and the day after coming out I switched my wardrobe, but to help others adjust kept it more on the androgynous style with jeans and t-shirts to start. I had been hiding my chest fairly well so trading my compression bras and large sweaters for tops that fit and a regular bra resulted in a fair number of stares for a few days. As the weeks went by I slowly started introducing more femme pieces and wearing jewelry.
In the end coming out at work went better than I expected. There were a few name and pronoun mistakes, but as time went on that decreased and work continued on as it had before. Seeking feedback on how it went someone told me that when I am not around they switched to my new name which made my day to hear.

Work and sexual discussions

Discussing what it means to be transgender has a lot of topics that are sexual in nature. Be extraordinarily careful about what you say or do as you might actually be reported to HR because it makes someone uncomfortable. Have conversations in private areas because individuals that eavesdrop in publicly held conversations area might also report you. Because the nature of coming out, stuff normally not discussed day to day at work is. Extra care should be taken to not put your job in jeopardy as you navigate answering those that have questions.

Outer circle

There are a number of individuals that I would classify as on the outer circle. They know me from before, but I infrequently interact with them. These include places like my dentist, hairdresser, eye doctor, library. An option you have at any time is to just go somewhere else. The new place won't have that baggage of you having to come out to them or the possibility of being misgendered like those that need to adjust. I kept going to many of the same places, but if I had to do it over this might choose differently both to get the validation and have one less thing to stress over.

Account and Names

Working in software I know just how dangerous it can be to ask to have a name updated. It is very common that the old name isn't deleted or changed, but there is just some note saying the new name is X, but the original name is still there or the name is just copied from one system to the next. Even if you think you updated everything eventually something screws up and the first name in the account is used. So even if it was a bit more work whenever possible I created a new account and then deleted the old account so there would be no chance for the old name to be accidentally used down the road. This applied for big things like Facebook, but also to little things like online purchases from places like Etsy and even my library card.
A good example is Amazon.com where your name is copied all over the place rather than having a single account holder and so you will be playing whack a mole trying to find all the places your old name is used if you continue using your old account.
As I would come out to others when it applied I would tell them about my new accounts and switch communicating with them exclusively there.
I highly recommend when possible creating new accounts and deleting the old ones.

Telling others your deadname

When you first come out, everyone knows your deadname, but from then on you will start meeting people who don't know your deadname but might know you are trans. The moment these individuals learn what your deadname is they often will feel compelled to say it out loud, almost like they are trying it on to see how it fit you. This experience never once has felt good. Like coming out, you can never undo telling someone your deadname. Worst of all they can (and sometimes will) tell others what it was. But overall after experiencing this a few too many times I no longer tell someone my deadname even when asked saying I wouldn't be comfortable telling them and dropping it. If they find out through some other means that is okay, but there is no reason for me to volunteer that.

Social Media

Coming out on Facebook, LinkedIn, Reddit and similar places was the very last major thing I was planning on doing. In preparation for that, I had scrubbed photos of myself from the internet, created new email addresses, and took a new "stock" photo of myself to use as a profile photo everywhere.

Facebook

I always assumed I would have a big coming out message on Facebook. But as it got closer and closer to when I thought I might do that I realized I didn't really need to do that. Facebook just has a collection of individuals I knew over the last decade, not my close friends. And what did I really have to gain by posting there? Anyone I wanted to tell I told in person and they were now friends on my new account. And then I looked over my friend's list and realized that a number had actually deleted their account. Facebook isn't used like it once was. I could just delete my old Facebook account without an announcement and it wouldn't be a big deal.

Accepting at first, but...

Some individuals are very accepting at first, but on the second or third time, you see them they are less so even to the point of being hostile. Unfortunately, those same individuals can come off as extremely supportive at first and it is very tempting to open up to them. Because of this, I switched to holding back initially and only open up over time as I learned I could trust them.

For some I have been transitioning for only a few months ...

I came out to most people between months 9 and 14. Some told me they started noticing and suspected something was up as early as month 8. While I might have been living with this since I was a child, seriously dealing with it for several years and I have been on HRT for more than a year to them it is very new. I would even go as far as saying some think I have been transitioning for only a few months.

Ways that I outed my transition before coming out

Some of the things I did before coming out made it much more obvious I was transitioning. I wrote down what other people told me they noticed. If I had ever seriously worried about my job as income or wanted to go stealth by quitting my job and starting over in a new city these are things I should not have done.
In summary, if you want a group of people to not know you are transitioning don’t be stupid, just don’t start socially transitioning in front of them.

How-old.net

Before coming out at work I admit that I submitted way to many photos to how-old.net to see how I was being gendered. It had the addictive nature that initially only occasionally would it rewarded me by saying I looked female, but as time went on more and more were being marked as female. A big reason I was using it was as a gauge for when I could come out. But after coming out I found myself no longer using it because it didn't matter. If the site saw me as male or female it didn't help me at all because I was now out.

That photo where I am fat

I lived a life before I transitioned and pretending I didn't is silly. Within that lifetime I took photos and videos, wrote articles for publications, gave talks and much more. I don't want to pretend that this never happened.
Someone told me it is like I have an old vacation photo that I love, but I happened to be fat during that time. I loved that experience, don't want to pretend it never happened, but just don't care to show anyone the photo because of how I looked. I have used this allegory a few times to good success to explain to others how I feel about old photos or places that still have my old name.

Being screwed over

Someone will screw you over. You just don't know who it will be. Perhaps they will decide that it is their business to tell everyone sooner than you were planning. Maybe they will find you offensive and cause you problems on social media or at work. Maybe they will stir the pot on purpose to cause issues in your relationship. Maybe they will call you sir or deadname and misgender you in every single sentence just to voice their opinion. You don't know who it will be, but be prepared and try not to engage with them and be defensive in every single person you come out to.
And just to make it extra challenging they might be accepting and supportive in the first conversation, but only in the second conversation does it becomes clear that they are not an ally.
Most of the people I told were very supportive and accepting, but there were those few that I surprised me at their behavior and if I had to guess at the start I never would have said it would have been them. You just don't know who it will be.

Misgendering

The best advice seems to be for those that know you have changed, but are misgendering you is to be firm, calm and consistent in correcting people from the very start. Correcting with a single word, completely neutrally in tone with no explanation and move one without waiting for a response.
I practiced with a close friend when the day came for them to switch. Explicitly telling them I needed to practice worked out great for both of us because they would still use the old name and pronouns from habit and I needed to build up the reflex of calling it out while knowing that they wont attack me.
For those that don't know you the best advice I have heard is to act confused and be confident in your gender like any cis individual would behave.
At work record down on paper when it happens in case you need to give it to HR down the road.
A pattern I have seen happen is that many individuals are very good with names and pronouns for a short while (the first or second time after I tell them), but later on when it was not on the forefront of their mind that they made mistakes. At first I was excited at how easy it seem to be for everyone to switch, but they all started accidentally using my deadname. Now I realize that when it was less at the front of their mind they were much more likely to make mistakes until the new name became habit. I never thought that they were being malicious (usually that is very obvious) but realized that it will just take some time to switch their automatic behavior.

Pronouns for before

When asked what pronouns should be used when telling old stories I didn't have a good answer and initially let the question slide. When thinking about myself in the past I would see someone presenting male and it was a bit confusing. By not clarify an answer to this question I noticed a few things:
Switching back and forth just makes it harder for everyone, especially parents to retrain themselves.
As time went on and as I looked more feminine, was read and treated as a woman day in and day out, having other people use my deadname and use male pronouns hurt more each time.
While they often ask about talking about stories when you were six it hurts way more when they are talking about you from just a few years ago while using your deadname and male pronouns.
Something I couldn't articulate at the time, but u/nubivagance did very well with this comment:
I've always looked at this from a linguistic perspective. Pronouns and names serve the purpose of designating who you are referring to right now in the moment. Even when talking about the past, you are still indicating "there, that person. This is about them" linguistically. In that way, using a person's old name doesn't make sense. You are referring to a person who goes by X so using Y to refer to them doesn't make sense and will only serve to confuse the message you are trying to convey with words.
What I should have said from the start was that unless the fact that I was presenting male is relevant to the story to not mention it otherwise they should say "when [name|our daughter] was pre transition" and keep on using female pronouns.
While I understood how much harder switching pronouns when talking about memories, over time I expect everyone to switch.

Overall

Overall coming out went way better than I was expecting it would. I had really low expectations and many individuals surprised me. There were a number of cases where those that I was sure would be a problem were a strong ally in the end and those that I assumed would be an ally were unexpectedly nasty. You just don't know until you tell them. The vast majority of individuals switched to my new name and life moved on.
In every coming out conversation the topic of me becoming a "completely different person" would come up. It didn’t see to matter what I said and it seems like it was only once they got to see with their own eyes that I was pretty much the same person after going full time did they believe me.
I had a fair amount of anxiety around not knowing how it would turn out was and it was a big relief once everyone knew.
While I initially wanted to do it in one big moment spreading it out and delaying a week or month here and there was not a big deal and I don’t regret a single instance where I had to wait to tell someone. The same goes for clothes, rather than switching in a big bang, slowly shifting what I wore of the course of several months worked very well, both to help make everyone comfortable, but also to help give myself more time to build up a wardrobe.
Would I have had the same experience if I had come out earlier or later? That is something I can never know and I could probably make arguments for and against coming out at a different time, but at the end of the day, this is what I was comfortable with and worked well for me. I know there are others that come out pre-HRT or never and that is cool too, the point being that they came out when they wanted and felt ready.

Validation

One year later (At 2+ years HRT) one evening I went to my parent's house for the first time in a long time and they misgendered me and deadnamed me all evening. It didn't seem malicious, just habitual and I corrected them each time. They had been good in the past so the behavior was a little surprising, but what was truly surprising was how I felt about it. When I first came out the approval and validation of others (including my parents) meant a lot to me. Transitioning is a big scary choice and I was looking for support. When someone would disapprove or misgender me it would hurt. As time marched on I gained a lot of self confidence in who I am and I discovered that their behavior didn't phase me because I no longer needed that validation. It was disappointing, but I didn't go home and cry or anything. What it really taught me was just how much validation was tied up in my coming out.
As you come out to others be aware of your own confidence and how that can play into the situation. Over explaining, trying to convince with science, and being hurt and distraught when they just don't understand. (Cis individuals not understanding what it feels like to be trans? shocker!) No matter how sure I was about being trans at the time I was still insecure and that made coming out much harder than it needed to be.

Reflecting on how I came out 2 years later

On the internet people like to obsess over the question: "what is a woman". I might know I am a woman in the same way I know I am right handed, but in the eyes of other people, I am only a woman because they now see a woman and treat me like other women. Once I realized this had happened I become very bitter because it just further reinforces that you only are what you look like. This caused me to question everything I did when I came out because clearly very little of what I said actually mattered, all that mattered what how I looked to them.
When I came out I was itching to be me full time and tell everyone everything, so I might have ignored any advice, and I still can't say it it is any better than what I did, but if I could go back I would tell myself the following:

What to tell

As little as possible
I told people so much personal and private stuff that they had no need to know and I can't take back. If I tried to justify it by saying I was convincing them, I now know that was pointless and just waited would accomplish that better. And it didn't matter! Coming out isn't about validation or acceptance or any of that, but about telling them what is going on and nothing more. I knew who I was, that is the reason I was doing this.
A few conversations could have been in-depth, but the vast, vast majority of conversations only needed the bullet points I listed in my work email, and in some cases I could have done even less.

Who to tell

Fewer people
When I started I was under the impression I had two choices, go stealth like those in the 80's/90's and reset my life or alternatively because it is 2020 and people are more accepting, tell everyone, post it all over social media and more.
It isn't so binary, you can tell all your friends personally, but you don't have to come out on social media. You can also wait to switch your name at work until you start a new job. A few key choices can result in needing to come out to dramatically fewer people.
No, every neighbor didn't need to be personally told. No, I didn't have to tell my hairdresser. No, the friend at work who was leaving shortly before I came out didn't need to know.

When to tell

Later is better
I know waiting is really hard. I remember crying in bed at only 3 months on HRT knowing I could not socially transition yet when I knew to my core this was right. I stick by my choice of waiting until I male failed, but I would say to wait another 6-9 months after that to get through as much of the androgynous phase as possible. Then again maybe if I had simply told less I would be happier with when came out.

Next

After a lifetime of imagining what it would be like, preparing, waiting, and finally coming out I finally start living full time as a woman and starting to experience the trials and tribulations that entails.
submitted by 2d4d_data to TransProTips [link] [comments]

Tools & Info for MSPs #2 - Mega List of Tips, Tools, Books, Blogs & More

(continued from part #1)
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments.
Graham | CEO | EveryCloud
Fyi - I've set up a subreddit /itprotuesday, where we feature / encourage posts of some additional tools, tips etc. throughout the week. Pop over and subscribe if you’re interested.
submitted by crispyducks to msp [link] [comments]

IT Pro Tuesday #64 (part 2) - Mega List of Tips, Tools, Books, Blogs & More

(continued from part 1)
Captura is a flexible tool for capturing your screen, audio, cursor, mouse clicks and keystrokes. Features include mixing audio recorded from microphone and speaker output, command-line interface, and configurable hotkeys. Thanks to jantari for the recommedation.
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments.
Graham | CEO | EveryCloud
submitted by crispyducks to ITProTuesday [link] [comments]

New Atlantia: The ruins of Greenway "concept pitch" 01.01.03.1

name of the game:

-

New Atlantia: The ruins of Greenway

---

project pages:

-

https://docs.google.com/document/d/13PHPZeRcitKKL6JtJd1Aod5JtPcPNMHfHqcG_4jYQQs/edit?usp=sharing

---

some descriptive terms:

-

an open source cross-platform title (also works on mobile), openGL powered and created in conjunction to blender

uses Godot Engine and is fully moddable through use of mod.io API (softwares)

makes heavy use of procedural generation and uses a random HEX seed that you can enter manually to set the generation environment up

persistent sandbox game with fully destructible environment including ablation of the ground and hill/mountain-sides through use of explosives, lasers, and drills/diggers

game makes use of other open source projects such as chromium for the integrated web-browser and tox for chat and voice. The game automatically starts an instance of I2P and plays exclusively over the darknet, though exit nodes should be available and darknet can be disabled for censorship related purposes, but games/server instances needs to have exit node enabled to allow censored players to join the I2P network through the exit node

the only advertising is the official greenway splash in teh beginning of the game when you start it up that explains a bit about the game and asks you to please join operation greenway and join the effort to create a green and good greenway

the game is meant to be played online, but there is a single player offline option as well

---

licensing:

-

open source honestyware
https://defuse.ca/honestyware.htm

---

funding:

-

the game will be funded by a 30 second timed monero miner that deposits the crypto into the operation greenway "trustfund". donations in other currency will be accepted and then converted directly into monero deposited into the secured fund for this project. no funds from teh project may be diverted into other government projects, but other relevant government projects may deposit funds into this one if their funding structure supports the transfer of funds to relevant projects. GreenSoft will receive 20%=
---

mission:

-

"to provide the most playable and fun sandbox on the open source market, and make the first fully open source 3D game of its kind, to simulate Greenway up from the ruins, and bring civilization back into outer space. to foster creativity and fun along with promotion of greenway and awareness to issues with various political systems in the civics mode of the game. to gather support for operation greenway through a donate and involvement buttons right on the front loading screen of the game"

---

disclaimer and excitement:

-

this may sound like a coders nightmare with all the parallel integrations and imbedded VMs running linux with open ended compilers within the code, but trust me, in the future, people will look back at this project as one of the most noble software engineering feats ever pulled off for the sake of open source community (and advertising a micronation!). the goal is to blow not only the people but developers themselves away with an entirely new set of in game mechanics based ont only on useability but underlying software paradigms like cloud resource computing and network cluster driven computation acceleration (experimental distant scene rendering over network). I guarantee that after all is said and done and if the project ever gets finished or damn near close, that the payoff will be big and the greatest reward will be hearing all the happy people talking about THE KILLER APP FOR ALL SYSTEMS.

one major issue is game overhead, and the fact that the game will need to run either a lot of processes or one large bloated process with an internal task manager to manually adjust game settings to get compatibilities just right and fine tweak the system; the game will be small enough and huge at the same time, with the inclusion of multiple tools and imbedded software releases in each version

this is a HUGE PROJECT for a HUGE OPERATION, one for all, and all for one, to promote and secure domestic tranquility, greenway's government will most likely be releasing "New Atlantia: The ruins of Greenway" before the artificial island is built, which will foster a flood of hoestyware payments and donations (honestyware payments disable the 30 second donation and cryptocurrency miner script)

don't feel daunted by the task. when you are in doubt, turn to something else on the LONG LIST OF THINGS TO DO or even just make some concept art sketchups on the computer or play the currently progressed version of the alpha/beta game

i think that an etherpad based editor for making the game would increase the flow of ideas sharing. more open source collaboration softwares should be researched and discussed for greenway and for the purpose of this document, particularly focusing on the digital side of things such as this game concept

!create this decade's killer app, "New Atlantia: The ruins of Greenway" and help support operation greenway's mission to gather attention in the international public's eye and earn free advertising forever!

---

plotlines:

-

based loosely off of ideas found in atlantis (a lost civilization), fallout 3 (video game), ark: survival evolved (video game), eve online (video game), space engineers (video game), half life 1/2 (video game), halo wars (video game), no man's sky (video game), aliens versus predator 2 (video game), metal gear solid 3: snake eater (video game), altered carbon (show on netflix), crysis series (video game), defcon (video game), portal (video game), xxx

an alternate universe with some parallel timeline characteristics (E.g. the lost civilization of atlantis, heisenburg {"heisenbohr"}, xxx)

antimatter warheads were launched in a global nuclear war on an alien planet in a distant galaxy far far away, star wars, with humanoids called prometheans who had advanced technology all over the planet because of developments in private industry that took off with the freedom in Greenway

you start off in the ruins of greenway, everything looks like fallout 3
you are born to parents who lived in the sewers (common spawning story at a random sewer in game)
you quickly learn to make fire and weapons from wood and rocks, moving to slingshots and crossbows, and later eventually graduating to ar-15s and plasma casters
raid the ruins to find useful items including tools, weapons, and ammunitions
you also learn to make a shelter, house, fort, and even an entire city with the blueprints you will discover throughout the game
later in the game, you will be able to build a spaceship, spaceport, and even a frigate and mothership, all in the spirit of space mechanics, where you first forge the pieces and then put them together either by template (blueprint) or manually by hand
like ark survival evolved, you will need to scavenge and hunt for resources on your own time
destroyed objects typically contain scavengeable parts

adventure through the ruins of a highly-advanced technological civilization
advance from meager sewer person to founder of New Greenway
re-create greenway in all its glory and adventure into space to explore and colonize

form a clan and play through the game to decide your faction. you can declare a truce with a player of that faction and work with them to earn respect in that faction again, getting to neutral and then friendly again. factions work like a tree with branches, you start in the trunk neutral with everybody and as you progress through the game, you naturally will align with one of the branches and finally a sub-set branch, where your position is indicated by a coloration of each branch (and a "leaf"?)

your goal is th befriend bots and real people to help you rebuild civilization and re-establish greenway, from anarchy to law and order. the game has persistent bots with progressively learning AI that will learn from your previous actions and interaction dialogues. you first make a city, then you unlock civics, and then your goal is to rebuild greenway and launch into space to colonize and scavenge for blueprints in engineers manuals and high tech including fully working antimatter powered ships in the holding bay of some ships.

game style is all vs all and cooperative through factions and clans, with PvAI and PvP gameplay, such as shooting a friend to steal their blueprints or having your fort attacked by a mob of angry AI. there is a setting to disable PvP in private servers but PvP is enabled in the official servers. there are "quests" you perform like in fallout 3 that progress you further towards colonizing outer space. players and AI can work together to build up civilization again from the ruins. one cooperative element is a donation library where books/blueprints are available from donations by players for checkout for limited periods of time (1 week of in game time). there is a clan management interface

greenway was an artificial island mass created in 1200bce relative to the game time by the prometheans as an escape from the authoritarians growing up around and warring among them. greenway eventually fell to the world war and the civilizations surely crashed beneath them. the startup videos show animations of greenway when it was green and good, being nuked with antimatter weapons in the year 1120bce. greenway took off into space but dies out due to an infection of aliens who are still lurking in intact ships within the galaxy waiting for you to discover the horror; by the year 400bce most of the underground cities died out and only the sewer dwellers in between remained; you are spawned in 0ce and the game has its own progression of time from there

you must first develop a boat and explore the surrounding islands to find the blueprints needed to create an airplane and fly to the nearby landmass about 250km away from greenway, then from there procedural generation takes place and all is free game, but there you will discover triangle craft blueprints and now you can fly around the world and into outer space once you reach the tech level to build them.

players can barter with each other and bot traders will trade with you too based on your disposition towards them; you can eventually find small towns with bazaars and markets to browse; open a store and start a business, evolve into an enterprise including enforcing security and/or mercenary contracts that you can pickup at a local bar or from select bots or any real player

players work together to make the civilization thrive again, from anarchy and ruins to a metropolis in outer space, greenway needs you to join the efforts on this game

realistic game mechanics where habitable worlds are within the goldilocks zone for their sun. deploy a garrison of bots you employ to terraform and colonze the planet's surface for greenway or your own nation

political simulator and sim city / tycoon like overview of your installation/s; Write a constitution for your state and federal government; Machine readable converter automatically marks up your document in AIML to simulate your text as a civilization (experimental); also you can choose the easy version which has templates of various useable texts for your political experiment!

the game is the first of its kind with an open universe fully destructible sandbox with persistent bots with deep-learning AI

the game also houses several mini games including the ganja seed card trader game (cryptocurrency backed seed growing and collector card game) and new atlantia: pirates which is based off of otys (board game)

---

game features and mechanics:

-

hire private security to protect your installations/bases/forts

work jobs to earn items

real time strategy war elements for fights like halo wars (video game)

imitate the jurassic world evolution game and make it possible to extract dinosaur DNA from fossils/amber and create dinosaurs (requires high tech level); downside is that in the future their could be hella dinosaurs everywhere

imitate the alien/predator movies and make it so that you can discover dead xenomorph or predator DNA and resurrect them by incubating in a sea mollusk or embryo, which you can discover the method by finding a journal or random chance

realistic DNA editor and genome sequence simulator that uses cloud resources of all gamers to compute and is redirectable to a local cluster computer with optional resource share (all resource sharing is adjustable in game with defaults based on hardware performance ratings versus settings and adjustable system overheads)

life on other planets; collect specimens to keep in a panspermic zoo and collect DNA from specimens to create splices

jumpgate codes and star maps for foreign systems (requires 0% discovery to have all solar system details)
puzzle solving and "hacking" to get into locked down areas, enable power, decode transmissions on your full-spectrum broadband transceiver, and disarm bombs for example

panspermia stuff with contagions on ships as a possibility which will form a biofilm in your shuttle and make you sick or cause a zombie plague

player ownership is primarily established by dominance but later on in the game there will be private security for hire to protect your shit and also police in the cities and sheriffs on the outskirts until the anarchist nomad zones which are areas that do not have enough established dominance or near enough to a city to be considered claimed territory since claims are too heavily disputed and non-enforced; you respawn naked back in the sewers where you started and need to work your way back up to get into your stashes until you are back in business

mining can be done for multiple reasons along with archeological digs to find artifacts and lost underground areas/cities

enable craft to dive into the oceans/lakes/rivers/streams for cover and enable underwater cities

bug reporting with screenshots and "frapping" (video/audio camera roll) built in and crash reporting directly to the team

underground cities and caves that go into pockets of underground water (clean water)
bullet time (single player only)

fog of knowledge (like fog of war)

grow a garden outside or indoors and even inside of your personal cruiser a few plants in a little closet, like cannabihopa plant that is effectively hops and cannabis in one with smokable buds rich in myrcene and thc/cbd/etc...

the ruins in space will be the most interesting, with scavenging having big payoff for big danger, like reactors that melted down after the craft were struck by antimatter rockets, and having to pass through a reactor room in your suit and get to the "Detox station" in time before you are fully radiated and your health drops to zero
i would also like to have HEV suits you discover in a partial map of the black mesa compound in a desert area on your home planet. the black mesa compound has all sorts of tech you can scavenge but is highly disputed by private military (bots) which also have robots and drones who will chase after you to kill you

the space component of the game will have dead highways of jumpgates that require power supplies to be repaired and the correct system and code sequence to be entered to bring you where you want to go. some gates have unlocked systems, but those owned by a foreign nation will have a passport code you will need to have a valid passport for to use or know a skeleton code (skeleton codes only work for their player and are a very rare random thing to find, sometimes the best place to look is a pirate ship or an anarchist lifeboat

you can fly all over the planet (flight simulation), but you start off in the ruins of greenway, in new atlantia, where the library of congress is, and you have to discover it among the ruins after you travel to a completely distant part of the map in your country of ruined greenway

advanced players will have entire industries under their control, and an "empire manager" is available as a "HUD" in game where micromanagement of your industry can take place all over in outer space and your commands be transmitted at the speed of light through a wormhole (you must create all the necessary infrastructure)

realistic solar systems and procedurally generated goldilocks planets that also enable non-goldilocks planets to be used with realistic heat, chill and bio-zones

heavy focus on user interface and user experience; futuristic steampunk look

other bots and players on the map can start forts and make cities and start their own nations, particularly the bots on other parts of the map who will work with or against you and your fledgeling nation of new civilization.

eventually there will be dinosaurs and aliens along with predators running around which will slow down everybody, and we need to try and ensure that the mechanics of the game make reproducing viable offspring require a high tech level to create so there are far less instances of "festering plagues"; aliens/predators and dinosaurs can sneak into your forts, cities, and even ships and come along for a ride to kill you and your crew and screw up everything; this feature will be disabled in at least one of the official servers to prevent infected plagues of servers which you die in 10 seconds every time since the aliens are everywhere since their bots and AI keep reproducing (evolutionary genetic based algorithm for AI traits)

discoveries and quest accomplishments along with defeating enemies and hitting certain wealth proportion and empire goals earn you XP which levels you up, building will increase your construction level for example, with no cap on available levels

extensive server administration interface with "resource injection" commands and "bot spawning" commands

dynamically changing environment with real erosion from water flows and seasons and weather and daytime nighttime, and procedurally generated fauna which are harvestable and actually follow population mechanics and statistics; it is possible to hunt animals down to extinction but unless every part of the animal is used, DNA can be extracted and it can be made again in a lab with high enough tech skill even viable to reproduce in the wild

splice dna from different fauna to create new creatures; custom create dna from scratch to make newer creatures with the creature designer

tame creatures to work for you and even ride them; use creatures to form a caravan and carry your stuff; creatures will stay loyal to you as long as you do not hit them much and cause damage, otherwise they will flee (some will immediately fight back based off of intrinsic aggression and predatory traits); imprint on creatures created in the lab often like the alien to make them your loyal children and unleash hell upon your enemies

your camouflage pattern will hide you when you are in a suit. change camo on the suit in the menu like in metal gear solid 3: snake eater; you will have an alertness indicator on your HUD that shows whether or not you have been seen and from who and what angle; become a master of sneak and sabotage, use your skills to rob installations and build up your stock (no penalty for selling stolen items as long as it is not sold to a narc or undercover who is aware of the theft)

there is an ingame internet based on TOR that a user can accumulate through raiding military journals to learn how to build a computer and a mesh-networking router (gigahertz {land/craft} @ 10GB/s & tertrahertz {space} @ 3.333333333333TB/s limited speeds) with b.a.t.m.a.n, which actually runs a simulation of this network protocol and realistic packet failure over wireless networking based on distance and obstruction type

drive a plethora of craft and design your own with either blueprints or from scratch, with every level of detail available (complete mechanical diagrams are modifiable and entirely custom designs can be implemented)

neural design in AI to solve complex puzzles by trial and error and probability based shortcuts to learn new foes and environments quickly as real life does; use of OpenAI (an e_musk/tesla company)

the ship can be set to autopilot either on a set route and defend itself and try to refuel and repair at a nearby station if available (costs items placed in the auto-barter section)

dynamic economy simulation and insights once you attain a high enough bartering skill, when greenway is up and running, a metatrader (software) like interface of available tradeable resources and their relative values tied to the closest thing to a credit in the game, a unitoshi which is the base numeric value of all items traded in game and used to compare item's values to one another by the in game engine

there is a low light amplifier (like in avp2 video game), and vision modes (like in avp2) along with cyborg enhancements such as a telescoping eye with rangefinder and "FLIRed" (technology name for forward looking infrared) binoculars for the poor men who need to stash their tech

dying does not affect your levels and knowledge, because you are re-created as a clone at a cost, including debts where people will come after you after a long enough time has gone by from your last clone, this is from altered carbon (show on netflix), where your new clone body is called a sleeve, and your consciousness is uploaded via satellite and other wireless transmitters to the clone corporation which is always anarcho-capitalist and always has more power than the government because it owns all the "reboots"; rebooting into a sleeve is a phrase in the game; this is equivalent to respawning, but it incurs debt for the bounty to recover your disk. there is always rolling charge to upload your consciousness which is rolling autosaving but on average through an insurance algorithm your rolling update will pay off more than the bounty to recover your disk each time you die, and the charges are lower the less often you die vs the bounty on your disk which only rises each time you die till it is maxed out at like 100,000,000 credits which you have to get by bartering or working for the company collecting disks for bounty; the disk is dropped in a nearby system and you have to go and pick it up for a pittance, or with a high enough tech level and enough contract experience, you can go on deep space missions and travel to distant star systems to collect as many disks as will fit in your cargo bay; disks are a genetically engineered biological computer that stores information quantumly through nanocellulose and diamene coating to make nanotubes that are indestructible and can operate in the tetrahertz microwave range, they are also bioluminescent and ink photovoltaic based, capturing their data through a biological optic cavity system near the pineal gland. they must be inserted as a clone is growing and the pineal gland must have this disk copied into the new biologically formed disk through transcranial magnetic stimulation

plenty of maze like portions of procedurally generated dungeon like caverns and interiors of buildings with no labels inside vast underground cities; plenty of dungeon crawling style excitement; use portals like in portal (video game) to cross into difficult areas secured within the black mesa compound

puzzle solving will also be an important step in fixing things that you do not have a blueprint for

join and exit formations at your leisure and command armies from near and afar

form a strategy and create a work team to build your forts and cities

global map overview like defcon (video game) has the ability to strategically place your formations around a planet, and a 3d outer space voxel based layout grid allows you to command in space and the air, with the grid center projected from the center of the galaxy

build and battle mech suits like the alice combat system (avp2 video game) and iron man (comic book) or animatrix (movie) suits

---

game features:

-

in game DTV broadcast systems project national games and tournaments when they come online in the official servers, and can be hacked to display avi, mkv, and mp4 files of the users desire; smart tv systems that can recognize spoken words from the user mic and follow commands

computers in game have access in an in game internet with websites createable by the user and virtual camera phone/tricorder devices that can capture pictures, audio from the mic, and record video; use webcams to create a security surveillance grid (uses ispyconnect and/or ZoneMinder and virtual camera/s in the game); use a laptop in the field to pilot a drone or an army of drones from your cluster computer in your tribe's fort; there is an in game instance of openStack running enabling limited cloud computing for the DNA sequence calculations; create a real life cloud service computer system or order one to gain computing power in the game (can be a profit point for the team to maintain the dedicated server); multiple cameras available to access reminds me of red faction (video game) or even duke nukem 3d (video game); get military security with encrypted computers running veracrypt, prevents computers from being nearly as hackable; KeePass software protects the computer from easy break ins and bruteforcing is required from another computer; each computer running needs a small amount of system resources and there is cluster computing under openstack (software project) within the game as well as cloud servers hosting the game to bruteforce 8-char max passwords; computers store data on cloud servers hosted by "GreenSoft" alongside the dedicated servers and outproxy nodes for "bridging" into the I2P network; experiment in distributed computing to enable network accelerated VMs though virtualbox tweaks and re-writes

in game internet is wifi mesh networking over b.a.t.m.a.n with (sharded?) tahoe-lafs storage for each user account on each dedicated server cluster

learn to hack in the game using legitimate hacker tools like the kali linux (distro) collection where you collect programs you find in military bases and on holodisks scattered throughout the game

the storage of user datas is distributed throughout the network via multiple redundant shards or shard seeders. the network automatically balances the shards based on checksums of data stored locally on their machine within a veracrypt container that only the zero-trust distributed system knows the master key to (the ceremony is a distributed trust system where all peers generate a portion of a master key, the more people contribute the better, this is part of the initialization time for the game and all servers for through a ceremony

there is an ingame spoof of cryptocurrency where fake FLOPS are taken from machines you build or find/steal/hack and a monero style cryptocurrency using moneta verde mining schema, you have to collect this greencash source code from the state bank ruins in New Atlantia

interstellar mesh networking using lasers as optical network inside the jumpgates which connect to a wormhole device that pipes the signal as UV lasers

smartphones in the game are achieved via QEMU in VM running a legitimate version of replicant that can run apps off of the internal flash or holodisk memory

make microchips in a lab that the gnu octave engine will simulate outputs for and translate to useable elements in game like outputs in a serial console on an atmega (microchip brand name); specifically the microchips will be simulated down to the assembler level and FPGA language (Verilog) will be used to code the logic circuits

audio and video streaming provided via tox and all streams are password protectable

the programming studio built into the game computers debian linux mint is eclipse studio (software) for all programming languages comes with compilers for all major human programming languages, enabling people to create homebrew ingame; includes godot, blender, and mod.io api. capable of compiling FPGA Verilog and running an instance of QEMU and virtualbox within itself;

antimalware engine in game computer is based on real antivirus definitions for linux (clamav, Chkrootkit, xxx)

in game linux has clone mirrors to real versions of the software available to people, with the server administrators manually enabling or disabling separate packages to make available to their users (uses more disk space the more packages are available; repositories point towards the dedicated server and fetch through regular I2P; dedicated server serves as a whitelister and access restriction program that only allows connections to eepsites created using the same server token, effectively creating a sub-darknet because outside access is restricted by token signed in conjunction with the user account public key for that server instance

---

program features:

-

updates implemented through torrents and auto-update scripts and automatic md5 hash checking for integrity with fetch from main server; source code borrowed from qBittorrent; xxx

game available over torrent as alternative to synaptic package manager or download from the ftp/http web server (resume supported from server)

game music is streamed via TOX to all connected clients via the dedicated servers song tracklist; mp3, oog, and wav are all supported (along with experimental midi + instruments over network); single player server runs an instance of tox signed in as the music stream ande you can select the songs like the server admin

sleek interface integrates dedicated server to gameplay and you can play as the mod and spawn items while controlling your server from the same in game UI

possible to run in a VM with guest extensions for 3d rendering installed (makes compatibility for other hardware and distributions "complete")

can order DVD from "greensoft" that means paying postage and cost of the DVD (lightscribed), that is a live CD (debian linux mint) that has the game installed to run with all necessary dependencies and install distro to disk (for the drafts of the greenux OS); .iso is available for download from "greensoft" website

extensive use of procedural generation for textures, landscapes, fauna, in game buildings and crafts, internal mazes, etc...

built in chatbots with bot characters are marked up in AIML and become unique based on independent interactions you have with them

built in spellcheck! and markup check! (borrowed spellchecking from chromnium)

in game console with accessible scripting engine in GDScript (Godot native scripting engine) help includes "cheats" which includes how to enable cheats and each individual cheat with its parameters explained

extended options with expert mode including expanded server operator options

nginx server running to host friendica page for game social media functions, routes over I2P; web server administration like webmin and ispconfig; web site generator WYSIWYG editor for making a frontpage and complete website in game;

in game computers use virtualbox to make a debian linux mint instance run within the game on the player's screen

"anon grade" secured against data leaks and tracking, being the first video game known to be used exclusively on the darknet (outproxy nodes are run by the official servers that are made available as "bridges" into the network); defuse passgen code used to generate hexadecimal keys and also used for cryptography in game

dedicated physics simulation with GNU Octave code and interpreter for events like craft maneuvering and weapons collisions, is used for the waveform in audio playback and for compiling screens on electronics in game (live textures);

an instance of hashcat is included within the game VM to literally bruteforce codes in the game

aircrack-ng is included as an instance to run on your in game computer to crack into neighboring networks including ancient military service lines which go into every sector of the known universe

extensive support for trainers and "auto-minedefender" bots/scripts which are allowed in the official servers

compatible with VR (opens two renders from different vertical positions)

video monitor selection in game and 4k support, triple monitor support

gnu octave used to simulate circuits for design for your electronics
see an electronic simulation software package for GNU octave @ https://github.com/jlmayfield/quantumCircuitSandbox

decentralized login server for cross platform gamers using blockchain technology, auto syncronize with gamer profile in the game; credentials stored with KeePass (software) to protect from hackers

in game chat using tox has nicks for all server players and also there is a global server chat. experiment with chat rooms including audio and video in tox. chat supports announcements that can be recurring or once with scheduling; hexchat (software) repurposed with TOX for the protocol; password locked chats and openPGP interior text encryption support; alternative to tox.io is the eepsite that the integrated browser seamlessly navigates to and enables you to search for friends ingame online

game will run in windows under Cygwin, and all released files are compiled for cygwin

cheats in console require server cooperation or they won't enable; private servers can disable individual commands from running or keep their values within ranges

hard imbed in the source code of each release the most current draft constitution of greenway and when greenway is finally established, hard code in the constitution into the source code (use commenting on the whole thing, put at very bottom of source code, make non-essential to run game {can be stripped out by compilers on demand})

console versions (xbox one and playstation 4) will run an instance of debian linux mint with no xwindows just the game screen, but it should be hackable re-initialize the desktop of lxde which is available through command switch when you execute the game binary (hold down "control" key combination on controller to enable pre-initialization console and use the console screen of your keyboard to type in the command which is available from the greensoft website), and adds wireless keyboard and mouse support for usb devices, allows people to softmod their system using the game as a side loader instead of the system default dashboard

complete forking guide and detailed documentation for all aspects of the game and included programs including the console and a detailed section on "cheats" like god mode and noclip; all lines in source code are commented in a clear and concise fashion that is machine readable

---

message to developers:

-

are you interested in working for this project but not sure if you are up to joining? talk to ghost liberty in operation greenway chat @ https://discord.gg/9RtrTZh or email them at [[email protected]](mailto:[email protected]). make sure to make your subject about "new atlantia game" and we will get back to you about opportunities to join and help foster our project. this game is a much smaller part of a much bigger project to create a new nation for citizens of the world. please understand that you may be paid little to nothing if you work on this game but your name will be legendary for all time amoung the opensource community

---

xxx

submitted by ghost_liberty to u/ghost_liberty [link] [comments]

Binary Options Trading Signals - YouTube Guide ║ binary options trading signals free group trial ... NEW 100% WIN BINARY OPTION FREE TRADING SIGNALS - YouTube Binary Options Trading Signals Trial - Make $5000 A Month Trading Best Binary Options Signals  Binary Signals Free Trial Binary options trading  Binary options signals - YouTube binary option Trading signals on telegram free trial - make money online 100$ day Binary Matrix Pro Free Binary Options Signals Trial

My Binary Options Signals is a one-stop name for those who are going to start their Binary Options trading. We are working for both newbie and trained professionals. We are a reliable source for the best Binary Option and Forex Community. Our Team of experts is working dedicatedly to guide you for the best Binary Options strategy and to follow the global and local trends in predictions. Your ... Binary Options Trading Signals Free Trial. The first thing that I like about Franco’s service is that he offers a free trial. He gives you access to the chatroom for a day to watch his trades and all the members trading commentary. This is reassuring because you can witness what goes on and how people are doing with their day trades. Is it proof that it will work for you? Well, no. Still ... Best Binary Options Signals Binary Signals Free Trial [Binary Options Trading 2016] Minecraft Game. 0:38. binary options pro signals,Binary Options Trading Signals,Copy a Live Trader in Action, Options Pro. Hesterwe. 1:27. Best Binary Options Trading Signals Software 2015 - Top Binary Options Trading Signal Service Bot online Free Call and put Automated Real Time Live Signal Stream Alerts ... Binary Options is a financial trading options where you have to predict the future asset movements to win a trade. Franco is a professional trader who has been doing trading over many years. Mainly Franco is a creator of this trading signal. The main principle of Franco’s binary options trading signals (BOTS) is that you don’t need to follow trading principles and patterns advise by any ... Best Rated Signals for Binary Options. Let the pros show you when and what to trade as you take your first step towards financial success today. Activate Free 7 Day Trial Discover More. Activate 7 Day FREE Trial Now! Fill out the simple form to the right and we will send you your 7 day FREE trial activation link immediately. About our Signals. BOPS trading signals are the easiest way to make ... Real Binary Options Signals – Features and Performance Fully Transparent, Profitable and Consistent Binary Options Trading Signals. User Friendly. There’s no need to sit and wait for the signals for the whole day. With our service you will know exactly when you will get the signals and how many signals you can expect. Read more. Signals by Win Rate. Each signal has an estimated win rate ... Some signals providers have a free trial period so you can evaluate the service. Ideally you want a set amount of daily signals so you can trade consistently. Basic Signals. Binary options trading signals that are communicated to you via email with the aim of increasing your ability to profit from trades. These types refer to specific trades and will advise the user whether to "put" or "call ... Paid signals are more common than free binary options trading signals software. Here, the signal provider will send you trading signals in exchange for a fee. They whether have a monthly or yearly subscription fee for these signals. The paid signals can be provided by an individual trader, a signal system, or through signal software. The frequency of the signals depends from provider to ... The program is known as BOTS (binary option trading signals), and I must remind you that no trading experience is needed for this program. The underlying principle of Franco’s method is that we need not rely on trading patterns, principles, or even advice given by a robo-advisor. Instead, Franco prefers a human approach. It is why you get access to a real live expert speaking to you! And yes ... Binary Options Trading Signals. Today, just about anyone that is interested in Forex or (Nadex) Binary Options, or quite frankly trading in general, should consider it a point to buy a membership to (BOTS) strategy development room.Regardless of your experience level, you can now join in and begin learning from other amazing members.

[index] [4266] [17380] [16548] [22681] [26115] [21190] [23536] [5063] [5831] [15048]

Binary Options Trading Signals - YouTube

Binary options trading Binary options signals Hi there! I'm Lady Trader and today I'll show you my binary options strategy 2020 that I use in binary tradin... Binary Options Trading Signals Trial Focus on super arrows matching trading trend on 1m charts When most recent candles are above blue line, focus on super arrows UP on last candle. When below the ... Hello everyone!:) My name is Anastasia, but it's too hard to pronounce, that's why you may call me just ANA. I'm a pro trader for more than 2 years already a... Do not miss! DEMO ACCOUNT: https://bit.ly/2Lq3NUt You can use this strategy in binary options to win every time but you have to keep following things in mind... Take The Stress Out of Trading - Get Into Binary Options Today! If you've never heard of Binary Options before, you probably trade Forex, Stocks, Commodities... binary option Trading signals on telegram free trial make money online 100$ day,Binary Options Signals are provided to traders to notify them when a new trading opportunity is available. One minute strategy to trade price action trading signals. Watch how I use simple trading rules to increase win rate. Get 10x Trading System: https://trading... Best Binary Options Trading Signals Free Trial - Review the best forex signals on the market - Duration: 1:13. Winning Binary Signals 1,890 views. 1:13. http://dreamingtribe.com/binary-trading-by-beta-testers (Click this link to check out how 6,300 Beta Testers are making an average of $106 an hour.) Many peo...

https://binaryoptiontrade.asnopchaxintiotrad.tk