Jump to content

Blogs

Our community blogs

  1. C’est l’une des nouveautés les plus intéressantes des nouveaux iPhone, du moins sur le papier, les iPhone 8, 8 Plus et X bénéficient enfin d’une technologie de recharge rapide. Pour autant, Apple n’a pas fourni de chargeur spécifique dans la boîte de ses nouveaux appareils et laisse le consommateur se débrouiller pour trouver le bon. coque iphone 8 Les premiers tests des utilisateurs démontrent toutefois que cette charge rapide agit bien différemment selon qu’on possède un iPhone 8 ou un iPhone 8 Plus et selon le type de chargeur utilisé.

    apple-iphone8-plus-live-18-640x480.jpg

    Apple a beau avoir introduit une technologie de recharge rapide dans ses nouveaux iPhone, il a « oublié » de fournir les chargeurs adéquats dans leur boîte. Ces derniers sont donc encore livrés avec de piteux chargeurs de 5 Watts, au temps de recharge particulièrement longuets. Comme indiqué sur la page d’aide officielle d’Apple, pour bénéficier de la recharge rapide, il est nécessaire d’utiliser « le câble USB-C vers Lightning d’Apple et un des adaptateurs suivants : Adaptateur secteur USB-C 29 W, 61 W ou 87 W d’Apple ou Un adaptateur secteur USB-C tiers comparable qui prend en charge l’alimentation par USB (USB-PD) ». Bien, merci Apple. Mais lequel choisir ?

  2. I'll admit something. If there's one topic I typically stay away from because it seems like everyone has a consensus on the subject, it's cloning Windows installations from an HDD to an SSD. The consensus is it's always better to just reinstall the OS. While there are some practical reasons, the most common ones I've heard to avoid cloning is because you'll encounter a plethora of issues. I've found this puzzling considering:

    • I've cloned multiple times with no ill effect
    • I don't understand how there could be system software issues if the only thing that's changed is the hard drive. That's like saying if you upgrade your video card, reinstall Windows otherwise it'll freak out that it has a new video card.

    And as far as I understand about modern computer architectures, storage drives are basically virtualized and abstracted to the point where a storage drive is a storage drive. Well, the software still has to know how to talk to it, but as far its concerned, from an operational point of view there is no difference between a Samsung SSD, a Hitachi HDD, or a CF card talking over a SATA converter.

     

    So I'm going to do a cloning project with my secondary computer, my Dell Inspiron 15 7559. It has a Samsung EVO 850 M.2 SSD and a Seagate SSHD. The plan is going to be like so:

    • Install Windows on the HDD
    • Make note of storage related services that Windows enabled.
      • Notably check to see if Superfetch is enabled and if the drive is marked for defrag scheduling
    • Install all of the drivers and programs I normally would've used on it.
    • If I have importable settings from my primary computer, like from Firefox, then I'll import those.
    • I'll install a few games on it. It won't be used much for gaming though when/if I do game on it.
    • Give it a day or so to "settle" after running a few tests.
    • Use Samsung's software to clone the HDD install over to the SSD
    • Verify the SSD boot works, then wipe the HDD
    • Check to see if the following has changed
      • Superfetch (should be disabled)
      • Defrag schedule (drive should not be available or is unchecked)
      • TRIM is enabled
      • If the above has not changed, continue on anyway, but make note of it
    • Use the laptop for a few weeks
      • Will mostly be doing light loads and maybe the occasional gaming if it's not too hard on the poor 960M
      • Will also monitor any issues that come up
    • After that, check to see if the following has been set
      • Superfetch (should be disabled)
      • Defrag schedule (drive should not be available or is unchecked)
      • TRIM is enabled
      • Note that even if these aren't enabled, that doesn't really affect anything since you can enable these settings.

    I was thinking about working with the laptop with just the HDD for more time, like a few weeks, but I don't want to stretch this project out too much.

     

  3. In the modern world, privacy is an integral aspect of everyday life. This is particularly true in the privacy of your own home. At work, in public and in other areas of your life the idea that someone may be monitoring you is almost to be expected; it’s an important part of public safety in most cases. However, at home, you expect some level of control over your own life.

     

    In which case, the idea that your microwave could be used to spy on you is not a comforting thought. You might be able to excuse your knives and forks from suspicion (for now), but there are plenty of other devices in your home which could be guilty of being more than a useful household necessity.

     

    So, behind closed doors what innocuous home devices could actually be hiding a more nefarious purpose?

     

    1) Smartphone

     

    As one of the necessities in life, the smartphone is essential for many people, after all who is reading this on their smartphone right now or has it close at hand at least? This makes it a prime target for hackers or spies to keep tabs or outright spy on you, both at home and at large. Traditionally, this was through the physical use of the phone. The microphone is a necessity, clearly, but if your phone is hacked whole conversations could be at risk.

     

    More technology-minded hackers could monitor or pull information using the smart features of your phone. With interconnected apps, your private information is shared in an intricate web throughout the device. Of course, app development is keenly aware of this in 2017 and strives to protect your data as much as possible.

     

    2) Modem

     

    Living without the internet is something many people struggle with, but could you do it if you thought your modem had been hacked? As the bringer of internet and Wi-Fi throughout your home, perhaps your modem should be the prime suspect when it comes to household device spies.

     

    3) Video Games

     

    The internet is essential for many things in your home. Including your entertainment such as gaming. Whether using your desktop or a console, the internet is vital to your gaming experience and thus it can also make your device a very effective spy. Whether to track your spending habits, how long you game each week, what you play or even as a way to access your payment details (as with the PlayStation hack in 2011), your gaming devices can be worse than spies!

     

    4) Fridges

     

    Yes, even your fridge has a microphone in 2017. Now spies around the world can listen to your milk sour in brilliant high definition.

     

    5) Baby Monitors

     

    Here’s a plot twist the likes of a prime-time television episode, using your own spying devices to spy on you. Depending on if you use a sound or video monitor, it can be hacked to listen in or worse to some of the most intimate scenes of your life.

     

    6) Toys

     

    Along the same vein, your children could be used to spy on you through the innocent eyes of their favourite dolls. ‘Smart toys’ are becoming more and more prevalent as children’s exposure to technology increases.

     

    7) Entertainment Devices

     

    Wireless sound systems, music streamers (such as the recently retired iPod, RIP) and other such devices can make your home a fun place to be. But, they also become ready-made spying devices in many cases. With microphones and even cameras, they can easily be manipulated to track your listening or viewing habits at home.

     

    8) Lighting

     

    If you have a truly interconnected home then your lighting system could be used to track your habits. With data about when you turn your lights on and off, potential robbers could have all the data that they need to work out when you are out of your home and for how long. Giving them ample time and opportunity to orchestrate a burglary.

     

    It may seem fantastical. But as our homes grow smarter, so too do the methods of infiltration.

     

    9) Security Systems

     

    The device that keeps you safe could also potentially be used against you. Not only can smart burglars use your lighting against you, they can also hack into your security device and outright make your home defenceless. After working out the perfect time you are out of the home and removing the threat of your alarm, your homes smart devices could be gone in one fell sweep.

     

    10) Webcam

     

    One of the biggest warnings of hacking in the early 2000s came surrounding the webcam. Growing in popularity for quick and easy international communication, the webcam connected to your desktop or inbuilt in laptops was suddenly watched around the world by strangers. Or so many believed. Covering of the webcam, then, became commonplace in modern homes. This paranoia passed for the most part, but should it have? The webcam is still a major source of spying potential in your home today.

     

    11) Tea Kettles and Coffee Makers

     

    Convenience is at the heart of many of your modern appliances. So, a coffee machine or tea kettle that springs into action the moment your alarm signals in the morning is the very definition of convenience. This could also be very easily used to monitor your routine and drinking habits.

     

    12) Satnav

     

    Technically outside of the home, but still an important aspect of your everyday life, the Satnav does not contain a microphone. The GPS functionality that is so useful for guiding you to exotic and exciting new places, however, can also be used to track where exactly you are going. From work to home to the local supermarket, your every move could potentially be recorded.

     

    13) Pacemakers

     

    Your house can be hacked, so why not your body? As an electrical device, a pacemaker is as hackable as a computer according to some. Not many consider the fact that someone may hack into a pacemaker and so the security functions of the devices are not as sophisticated as they could possibly be.

     

    14) Smart TVs

     

    Watching an episode of your favourite show has never been riskier. With internet capabilities, social media uploading and streaming your TV is no longer the safe household device of yesteryear. Its smart capabilities make it a perfect device to monitor for big corporations behind the television and movies. They can monitor your watching habits on a mass scale, meaning they can then tailor their content to match what the majority of their viewers want.

     

    Not only can Hollywood keep on eye on you, but it’s a perfect location for bugs. In fact, some government agencies have reportedly already worked out how to do so already!

     

    15) Alexa

     

    Of course, the most infamous example of a device that is most definitely spying on you in your own home: Alexa. Also known as the Amazon Echo, this nifty little home helper has been making headlines recently thanks to a number of robotic mishaps. From granting the wish of cuddly toys to small children to answering any question that may spring to mind, for example, “what is the traffic like this morning, Alexa?” The device is equal parts helpful and equally as intrusive.

     

    With built-in Wi-Fi, speakers and several microphones, not only can you hear this device, it can hear you. With its built in connection to The Cloud this feature used to hear you from all areas of a room could be used by hackers as well as Alexa to hear your every word. A feature which makes Alexa a prime suspect in the home appliance spy game.


     

    Overall, the more modern our homes become, the more potential there is to create an opportunity for people to spy. Of course, anyone listening in might not gain much from your constant chats with your pet's about their lack of contribution to the household. Unless you’re an important diplomat or a spy yourself, your microwave listening to you might not be a worry you have to face.

     

    Still, best keep an eye on the toaster just in case.


     

  4. The first thing we had to do was get Frank's scary dog out of the RV. So, we did the classic cartoon "give a dog a bone" routine and Cujo became Scooby Doo just like that.

     

    Frank's RV was pretty much what I expected—drug dealer trash chic. But it wasn't as serial killer as I feared. We ransacked the place and found what Chloe didn't want us to find...

     

    I'm sorry Chloe had to see the pictures of Rachel posing for Frank, even if she did care about him. To her it's just another betrayal, just another loved one dumping on her. Everybody she ever loved she lost one way or another. Only I came back from the past... for what? To make Chloe's life more painful? I just wish I could use my rewind power to go all the way back to the days when we were covered in pancake flour... Life was simple...

    • 1
      entry
    • 0
      comments
    • 32
      views

    Recent Entries

    Ever since my original post about slowly upgrading/rebuilding a PC, I have gained a few responses that have inspired me to keep going. Here goes, let's make a blog! xD

     

    So, first off, my plan is to slowly build up my PC, replacing a component one by one, so I am not sure how long this is going to take me.

     

    Every time I have to replace a component, have an interesting find, good indications for the projects, and bad indications for the project, I will post a blog for it. As I have said in my previous blog post, specs, but I will place them here too.

     

    Specifications:

     

    • Case: I have no clue what it is called. (I know, we are already off to a great start!) But I know that it is the stock case for the ASUS Essentio CM1730. Looks like this.
    • Motherboard: The kind of old, m4A7BLT-m in all its glory.
    • CPU: AMD Phenom(TM) II X6 1065T Processor, coming in at 2.90 GHz. (Also, sorry if on another post I referred to it as 2.80 GHz, xD)
    • Graphics: AMD 760G (integrated(?))
    • RAM: 8.00 gb (7.75 usable)
    • Storage: (Once again), not sure. I do know that still has 786 gb free of 921 gb. I can check certain things if the hard drive/disk is important to you, but so far I have had no luck with the places I have checked.
    • PSU: (crappy) Okia-450atx, and yes, I know that I need to replace it. You can check out other people's ideas over here, but I would recommend any new (if needed) suggestions land on this post for organizational reasons.

    So, as you can tell, not a great PC, I mean, it can barely land on a somewhat decent framerate on Garry's Mod, gm_flatgrass, no mods.

     

    So, what are my current plans?

     

    Well, more copy+paste from my other post.

     

    • Case: A new MicroATX case, probably somewhere on Newegg, as my motherboard is MicroATX, and some of the case options look quite nice to me. Here is a list. Priority: Low
    • Motherboard: No clue: ??? Priority: ???
    • CPU: I don't think an upgrade is in place, but I doubt this is the high priority. Correct me if I'm wrong. Priority: Low
    • Graphics: GTX 1050 (ti(?)) Priority: Medium
    • RAM: Later on, I plan on (possibly) getting 16 gigs for my PC, as it seems compatible. Priority: Low
    • Storage: Maybe a new Harddrive, possibly SSD. Priority: Low
    • PSU: looking for suggestions, though the "be quiet! PURE POWER 10-CM 500W" seems like a good option, tell me your thoughts. Priority: Medium/High

    Also, when I say priority, I mean right at the moment of making this. Once I upgrade a part, the priority list will change a lot.

     

    Here are some responses from one of my latest forum posts.

     

    Quote

    I like these kinds of projects, it's a great way to break into an otherwise expensive and time consuming hobby.

     

    A fresh power supply is a great start. No need to go super fancy, even a (grey label) Corsair CXM would be a good basis for a budget rebuild. There's a good PSU tier list on this forum that you should definitely make use of, it is maintained by some very knowledgeable forum members.

     

    That old Phenom II X6 was a powerhouse in it's day, you can keep that for now and work with it even with the somewhat limited motherboard. You could buy a solid new board, like an MSI 970 Gaming and overclock the bejesus out of that fossil, but I would say save your pennies for now unless you can find a used one for peanuts. It's not a critical component at this time.

     

    A case wouldn't be a bad idea and if you want to think ahead to future upgrades; you might want to go with an ATX case instead of MicroATX, just to keep your options wide open.

     

    A good GPU is the second step and I agree with your selection of a GTX 1050 (Ti would be best) as that will jive well with the aging performance of your Phenom II, and will work well with whatever you upgrade to in the future without breaking the bank now.

     

    One thing I will add is get an SSD as fast as possible. It will seriously enhance the responsiveness of the system and make everything much snappier. It's a seriously good investment.

    I agreed to pretty much everything that he said. (It was ApolloX75's reply, by the way, go follow his profile!)

     

    I also got:

     

    Quote

    Mhmm ok then, slowly building up isn't a bad idea , you just need to keep your heads up for the deals &sales that's going on. 

    Since a new psi is your main issue right now, I recommend you look into the evga supernova 650 gs. Good price and fully modular. Thermaltake Smart Pro RGB 650W is another one that's in the same price rang,all depends on your tastes

     Also, a pc case is what you should consider next if you are up grading slowly, this will narrow down your researches a lot.

    a mid-tower is usually the best choice for a first-timer, good compatibility, and have a lot of budget friendly choices.

    Once again, thanks to another user (Diones), go follow him/her on him/her's profile!

     

    Anyways, I have decided that I want to start with upgrading the Power Supply Unit (PSU), as the one in my system is one of those cheapo PSU's that company's use because they are cheaper, and I don't want to use that!

     

    I am currently looking into these PSU's, and I will get back to you when I decide on one. I also know the PSU tier list is a great place to look.

     

     

    I'll try to take advantage of any sales that come across, but for now, that is my list.

     

    I'll update once I figure something else out!

     

    Thanks for your time,

     

    Enderess

  5. I am currently working on a personal project but so far, I've created a simple python script (with many comments to try and explain what is going on!) to pull data from the default tac_plus.acct (AAA Accounting file) that is created with tac_plus.

     

    By default this file is saved in /var/log/tac_plus.acct and records user sessions (whether it is authenticated via TACACS+ or by the local database on our cisco router (10.0.100.1). The script takes an argument used to filter the specific 'username' for the total time they have accessed this device.

     

    The script technically pulls total time accessed to ALL devices with that username, but in my case I have only a single router configured in GNS3 with the ubunutu VM as a docker. I am looking to improve this script so I can either filter by ALL devices/IPs or a single IP matching a username.

     

    #!/usr/bin/env python
    
    import time
    import sys
    
    def getUserTime(username):
    	#Default location for accounting file below. It won't be created if AAA accounting is not
    	#configured on the device...
    	accFile = open('/var/log/tac_plus.acct','r')
    	splitFile = accFile.readlines()
    
    	#2 lines should involve a session (Connect + Disconnect)
    	sessions = len(splitFile) / 2
    
    	print 'Total Sessions in accounting file: {0}\n'.format(str(sessions))
    
    	#Variables for splitting the file + counters
    	session_index = 0
    	session_list = []
    
    	count = 0
    	user_sessions = 0
    	user_time_index = 0
    	user_time = 0
    	#--------------------------------------#	
    
    	while session_index < sessions:
    		#Check if username exist in accounting file
    		if any(username in s for s in splitFile[count:count+2]):
    			#Increment user sessions, since more than 1 connect/disconnect have been found
    			user_sessions = user_sessions + 1
    			#Print below is for debugging/seeing output when running the script
    			print 'Found session for user: {0} ({1})...'.format(username, user_sessions)
    			#Append connect/disconnect session from splitFile list to a new list of lists...
    			if any("elapsed_time=" in t for t in splitFile[count:count+2]):
    				session_list.append(splitFile[count:count+2])
    		#Counter is incremented by 2 because of session is made from: connect and disconnect
    		count = count + 2
    		#Session_index tells us what session we are on in the file...Stops the while loop
    		session_index = session_index + 1
    
    	print '\nTotal sessions for user **{0}** = {1}'.format(username, user_sessions)
    
    	#Reset incase I use count again...
    	count = 0
    
    	#For each 'session' (which we have filtered 'elapsed_time=' to a username
    	for session in session_list:
    		user_time_index = session[1].split() #Split all variables in disconnect session
    		#Index 14 SHOULD be 'elapsed_time=', replace it so now we have the variable in 'user_time'
    		user_time = user_time + int(user_time_index[14].replace('elapsed_time=',''))
    
    	#using 'time' module, to output the format
    	user_time = time.strftime('%H:%M:%S', time.gmtime(user_time))
    	print 'Total time logged in: ' + str(user_time)
    
    	#Write to temp_time so a PHP script in /var/html/www can pull the total time for the user...
    	new_file = open('/var/www/html/temp_time.txt','w')
    	new_file.write(user_time)
    	new_file.close()
    
    getUserTime(sys.argv[1])

    The purpose of this was to rent out a lab (where the customer needs to log in via an access server) and be able to gather/display information regarding the total time they have spent on the lab.

     

    So the access server can be configured with AAA (and accounting exec command) to authenticate with this linux VM. Then the customer will be able to somehow view a webpage that gathers the time he has logged in until the password is reset (and he needs to book another 24hr frame to get access again)... The basic PHP script to access this time value in the text file is:

    <html>
      	<div class="lab-remain-time">
    		<p>User netdbackup - Total used LAB time </p>
    		<hr>
    		<?php
    			$myfile = fopen("temp_time.txt", "r") or die("Unable to open: temp_time.txt");
    			echo fread($myfile, filesize("temp_time.txt"));
    		?>
    	</div>
    </html

     

    Here is an example of all of this in action:

     

    The script can filter total sessions + total time on a username:

    7H08Xoa.png

     

    The best css formatting you'll ever see (php script reading the time)

    iY57eOM.png

    • 1
      entry
    • 0
      comments
    • 57
      views

    Recent Entries

    8uhbbhu8
    Latest Entry

    Currently got a new build log going. Voodoo2s and pentium 3s incoming!!

     

     

     

  6. xGHMw.png

    I guess I gotta talk about the current state of Reptar, or rather, I'm kinda inclined to.

     

    If you want TL;DR, me planning on what I wanted to spend my money on is why I didn't go for the R7.

     

    Now that the TL;DR is out of the way, I amassed $220USD in total the night before my birthday, September 20th. I then started weighing my options. "Should I bust my load right here right now or should I have some money to spend then save for R7 around Christmas?"

    I am getting money from a test soon enough, and I'm getting $300USD out of it. This would've easily put me in the green for getting an R7 1700, but something in my head was like "should I really spend all that money right now?" I then convinced myself that a temporary CPU would suffice for me.

     

    "Why did you get yourself an Athlon and not an R3?"

    Simple: I don't want to disappoint myself. I won't go much further than that but that's the explanation I decided on.

     

    Without further ado, this is what I ordered:

     

    PCPartPicker part list / Price breakdown by merchant

    CPU: AMD - Athlon X4 950 3.5GHz Quad-Core Processor  ($59.99 @ Newegg) 
    Motherboard: ASRock - AB350M Micro ATX AM4 Motherboard  ($59.99 @ Newegg) 
    Memory: Patriot - Viper 4 8GB (1 x 8GB) DDR4-2400 Memory  ($69.99 @ Newegg) 
    Case: Cooler Master - N200 MicroATX Mini Tower Case  ($49.12 @ Amazon) 
    Total: $239.09
    Prices include shipping, taxes, and discounts when available
    Generated by PCPartPicker 2017-09-23 01:18 EDT-0400

     

    I guess my future plans with my rig will be getting the aforementioned R7 1700, going for a new power supply and hopefully getting a new GPU and putting my 7850 to rest. There's really not much I need to say here.

    • 1
      entry
    • 2
      comments
    • 63
      views

    Recent Entries

    PCPartPicker part list: https://pcpartpicker.com/list/FLRp6X
    Price breakdown by merchant: https://pcpartpicker.com/list/FLRp6X/by_merchant/

    CPU: AMD - Athlon X4 860K 3.7GHz Quad-Core Processor  ($59.99 @ Amazon) 
    Motherboard: MSI - A68HM-GRENADE Micro ATX FM2+ Motherboard  ($46.49 @ Amazon) 
    Memory: Crucial - Ballistix Sport 8GB (1 x 8GB) DDR3-1600 Memory  ($52.54 @ Amazon) 
    Storage: Western Digital - Caviar Blue 250GB 3.5" 7200RPM Internal Hard Drive  ($16.99 @ Amazon) 
    Video Card: Asus - GeForce GT 1030 2GB Phoenix Fan OC Video Card  ($76.99 @ Amazon) 
    Case: Fractal Design - Core 1100 MicroATX Mini Tower Case  ($44.99 @ NCIX US) 
    Power Supply: Corsair - CXM 550W 80+ Bronze Certified Semi-Modular ATX Power Supply  ($36.99 @ Newegg) 
    Total: $334.98
    Prices include shipping, taxes, and discounts when available
    Generated by PCPartPicker 2017-09-19 19:53 EDT-0400

  7. something to do with Linux

     

     

    cough cough sig cough cough

    • 1
      entry
    • 0
      comments
    • 58
      views

    Recent Entries

    Harinder siwach
    Latest Entry

    IMG_20170914_110601.jpg

    IMG_20170915_085120.jpg

  8. Dear Ubisoft,

     

    I have come forth today to confess.

     

    I was a bad customer. No really. I was a really bad customer.

     

    I didn’t pre-order the game. I didn’t buy the Season Pass. I didn’t buy the game at launch. I didn’t even pay the AAA standard $59.99 USD price for the base game.

     

    But that’s actually ok. Because despite paying “only” $30 USD, I feel a little ripped off and a little bit like you had lied to me.

     

    Firstly, it would be difficult to talk about Watch_Dogs 2 without mentioning it’s status as a game. It is a Nvidia GameWorks Title. This is a very anti-consumer move and I am thoroughly unimpressed. In fact, I hope that this is the last GameWorks title I ever purchase. Nvidia has had a history of using the GameWorks marketing program as a means to convince most consumers that they should buy the latest Nvidia GPUs by sabotaging the performance of both AMD and previous generation Nvidia GPUs. This is not at all acceptable.

    The recommended requirements for this game details just how bad this atrocity actually is.

    Quote

    Graphics: NVIDIA GeForce GTX 780 | AMD Radeon R9 290, with 3GB VRAM or better

    Quote

    Recommended specs above for 1080p , 30+ FPS, High graphic settings

    What a joke! Did you actually expect me to think that giving recommended requirements for 30fps was a good idea? 

     

    What the hell even is this? If you have to list your recommended requirements for 30fps then your game is too demanding or has performance issues which you need to sort out. 

    30fps is not a cinematic experience. I struggled to play this game when it dipped to around 40–50 fps. 60fps was only achievable in some specific circumstances with the use of “Low” or “Medium” presets.

    Both the “Low” and “Medium” graphics presets look bad (well, the “Low” option looks horrendous to be perfectly honest) and yet they require ludicrous amounts of processing power to run the game. I don’t know what engine you used for this game but damn, get your shit in order. I wouldn’t surprised if it was a modified version of Watch_Dogs 1 Engine (Disrupt Engine).

     

    Shipping a broken mess of a release for even $30 USD is not acceptable nor is it acceptable at really any price point. I had to run this game on Low or Medium at 1080p on a GTX 770. I know this is older hardware but I imagine a lot of people still have older hardware for a variety of reasons such as new RX and GTX video cards being bought out by coin miners and also GPU owners wanting more mileage out of their purchase. This alone can make a lot of scenes and situations a lot more unpleasant than they should be. Scenes involving driving at high speeds whether in playing the story or just driving around in the open world. Which leads me onto my next issue, the cops in this game.

     

    The cops in Watch_Dogs2 can only be described as Police Brutality cranked up to 11. Seriously, the cops in Watch_Dogs2 make GTA V’s cops look almost like pacifists. Escaping the cops is a huge challenge and this game is certainly not something you should play on anything above normal. I played on “Easy” and this was quite difficult for something claiming to be actually easy. I might have found it to be easier if the framerate was a lot higher but I can’t 100% say for sure. The mechanics involving being able to have police arrest the AI is really cool and offers a strategic element to completing later missions rather than running and gunning. It’s a shame that this comes so late in the pacing of the game but oh well, at least we got this feature I guess :| .

    The bench/3D printing device used to develop the quad copter and other gadgets is pretty counter intuitive to use and I generally didn’t use it a whole lot. Launching the quad copter or jump thing (yeah, I forgot the name of this when actually writing this review. That’s how important it is in this game -_- ). During the first few times of deploying them for a mission, but being forced to use was annoying at many times due to how tedious it felt. 

     

    I’d like to say that this game delivers around 30 hours of single player missions but you can easily spend more time screwing around and getting lost in the world of Watch_Dogs2. Which is such a shame cos the framerate issues do ruin the immersion for what should otherwise be a really good game. The amount of pre-order and Edition BS is really silly. Selling a ton of cosmetic micro transactions in a AAA full priced release is quite unacceptable and so is having pre-order nonsense. In this case, the season pass contains all the DLC that was released and doesn’t appear to offer a great value for money. I cannot with 100% certainty say this but it certainly looks like a really bad deal considering how little content they contain and how much each DLC costs. 

    Performance was definitely an issue in Watch_Dogs2. Below I’ve attached some graphs for performance I got at different graphics presets when just playing around in the world. I say was because I don’t intend to continue to play the game after I have finished completing all the side missions in it. I’ve finished the entire main story along with most of the side missions.

     

    Here are the performance numbers:

    1*EDFNCoELxV8lCn9V8U8qVQ.png Framerate captured using Fraps over an hour of gameplay. 1*rYaVvV3v1GwAa7RaoLE-XQ.png Framerate captured using Fraps over an hour of gameplay.

     

    In conclusion, Watch_Dogs2 is a game that provides many hours of fun and engaging gameplay ruined by lackluster and mediocre performance, a desire by corporate greedy scum to remove as much cash as possible from your wallet through excessive ways of grabbing your money and a fairly tired animation system along with basic combat mechanics.

    Watch_Dogs 2 is not necessarily a bad game. The developer of this game made some unfortunate decisions such as: partnering with Nvidia for the GameWorks marketing program, using a proprietary in house engine instead of something like Unreal Engine 4 which has a reputation of good looking visuals and good performance.

    Ubisoft Montreal, the developer of this game, have had a genuinely awful track record. From “Assasin’s Creed Unity” and the original “Watch_Dogs” to “For Honor” and “Far Cry Primal”. This developer has a worrying track record which makes me fear for the upcoming “Far Cry 5” and “Assasin’s Creed Origins”. Which brings me to my final point. Ubisoft, I beg of you, please stop screwing up the performance of your games.

     

    Instead of a traditional review score providing score out of 10, I’ll be using a new review scoring system.

     

    Scores:

    Who Should Buy it: Watch_Dogs fans. Ubisoft fans.

    Who Should Not Buy it: Everybody else.

    What I think the game is worth (to those who should buy it) : $30.00 USD . I would strongly advise you to not buy the game above this price point.

    Don’t buy the DLC. It’s not worth the price they ask.

     

    Thank you for reading this, my name has been AluminiumTech.

  9. I needed a new case that was somewhat portable (the P3 was not fun to carry around) because I recently sold my laptop. I settled on the 400C and it is gorgeous. Review coming soon.

    20170809_214056.thumb.jpg.9f26dacf21bcf6bdd7aa5da4ff7ae38d.jpg

  10. While you might have thought that I abandoned this place, I haven't, it's just that the part prices are getting higher and higher on a pretty much weekly basis, and some components, such as GPUs and RAM, are shooting up in price due to limited stock and overall shortage

     

    But no worries, I can still make pretty good budget builds for light to moderate gaming.

     

    I'm going to do a little twist, I'm going to give nicknames to builds, not just "Budget build" or "Content creation monster".

     

    250$ "Spectator"

    Spoiler

    PCPartPicker part list / Price breakdown by merchant

    CPU:  Integrated with Motherboard
    Motherboard: ASRock - J3710-ITX Mini ITX Pentium J3710 Motherboard  ($95.98 @ Newegg) 
    Memory: Mushkin - Essentials 8GB (1 x 8GB) DDR3-1333 Memory  ($44.99 @ Newegg) 
    Storage: Western Digital - Caviar Green 500GB 3.5" 5400RPM Internal Hard Drive  ($26.99 @ Amazon) 
    Video Card: Zotac - GeForce GT 710 1GB PCIE x1 Video Card  ($40.45 @ Amazon) 
    Case: Rosewill - R363-M-BK MicroATX Mid Tower Case w/400W Power Supply  ($44.99 @ Amazon) 
    Total: $253.40
    Prices include shipping, taxes, and discounts when available
    Generated by PCPartPicker 2017-08-07 04:53 EDT-0400

     

    400$ "Whistler"

    Spoiler

    PCPartPicker part list / Price breakdown by merchant

    CPU: AMD - Athlon X4 845 3.5GHz Quad-Core Processor  ($54.88 @ OutletPC) 
    Motherboard: Asus - A68HM-E Micro ATX FM2+ Motherboard  ($40.89 @ OutletPC) 
    Memory: Team - Vulcan 8GB (1 x 8GB) DDR3-1600 Memory  ($51.99 @ Newegg) 
    Storage: Corsair - Force LS 60GB 2.5" Solid State Drive  ($46.99 @ Amazon) 
    Storage: Toshiba - P300 1TB 3.5" 7200RPM Internal Hard Drive  ($42.49 @ Amazon) 
    Video Card: PowerColor - Radeon RX 560 2GB Red Dragon OC V3 Video Card  ($93.98 @ Newegg) 
    Case: DIYPC - MA08-BK MicroATX Mini Tower Case  ($31.98 @ Newegg) 
    Power Supply: EVGA - 430W 80+ Certified ATX Power Supply  ($34.88 @ OutletPC) 
    Total: $398.08
    Prices include shipping, taxes, and discounts when available
    Generated by PCPartPicker 2017-08-07 05:02 EDT-0400

     

    650$ "Maltese"

    Spoiler

    PCPartPicker part list / Price breakdown by merchant

    CPU: AMD - Ryzen 5 1400 3.2GHz Quad-Core Processor  ($156.88 @ OutletPC) 
    Motherboard: ASRock - AB350M Micro ATX AM4 Motherboard  ($59.99 @ Newegg) 
    Memory: Crucial - 8GB (1 x 8GB) DDR4-2133 Memory  ($59.85 @ Amazon) 
    Storage: Western Digital - Caviar Blue 1TB 3.5" 7200RPM Internal Hard Drive  ($59.88 @ OutletPC) 
    Video Card: Zotac - GeForce GTX 1060 6GB 6GB Mini Video Card  ($264.99 @ SuperBiiz) 
    Case: Rosewill - FBM-X1 MicroATX Mini Tower Case  ($26.99 @ Amazon) 
    Power Supply: Corsair - CX (2017) 450W 80+ Bronze Certified ATX Power Supply  ($23.98 @ Newegg) 
    Total: $652.56
    Prices include shipping, taxes, and discounts when available
    Generated by PCPartPicker 2017-08-07 07:45 EDT-0400

     

    1000$ "Zeus"

    Spoiler

    PCPartPicker part list / Price breakdown by merchant

    CPU: Intel - Core i5-6600K 3.5GHz Quad-Core Processor  ($219.29 @ OutletPC) 
    CPU Cooler: Cooler Master - MasterLiquid Lite 120 66.7 CFM Liquid CPU Cooler  ($39.99 @ Amazon) 
    Motherboard: ASRock - Z170 Pro4S ATX LGA1151 Motherboard  ($77.98 @ Newegg) 
    Memory: Team - Elite Plus 8GB (1 x 8GB) DDR4-2133 Memory  ($60.99 @ Newegg) 
    Storage: Team - L5 LITE 120GB 2.5" Solid State Drive  ($50.98 @ Newegg) 
    Storage: Western Digital - AV-GP 2TB 3.5" 5400RPM Internal Hard Drive  ($59.99 @ Amazon) 
    Video Card: Asus - GeForce GTX 1070 8GB Video Card  ($399.99 @ Newegg) 
    Case: Corsair - 100R ATX Mid Tower Case  ($42.98 @ Newegg) 
    Power Supply: EVGA - SuperNOVA G2 550W 80+ Gold Certified Fully-Modular ATX Power Supply  ($72.98 @ Newegg) 
    Total: $1025.17
    Prices include shipping, taxes, and discounts when available
    Generated by PCPartPicker 2017-08-07 07:41 EDT-0400

     

    Thanks for viewing this and I hope you'll have fun time with these builds!

    Comment for any suggestions on optimizing these builds!

    • 0
      entries
    • 0
      comments
    • 142
      views

    No blog entries yet

  11.  

    It is generally accepted that macOS is immune to viruses and malware. In general, this is true, because, for the entire history of the operating system, viruses written for it can be counted on the fingers.

     

    I want to understand why this is happening and what to do in order not to get infected with those rare instances of malware.

     

     Among my acquaintances who use Mac device, there is no a single person who has an antivirus or someone who would say that he got a malicious code or any virus. There are several reasons for this. Of course, one can argue that macOS X is a Unix-like operating system and, therefore, it is invulnerable. We reject this primitive thought since there are some viruses for macOS, which means that the system, like any other, is vulnerable.

     

    The main reason why there are so few viruses written for Mac is that there are very few Mac devices themselves. If we compare the number of Windows personal computers and Macs that exist today in the world, it turns out that the Mac devices make only 7%. Attackers who want to steal credit card numbers are more likely to be interested in the audience of Windows PC users because of their large number.

     

    Some say that to protect your Mac from the hypothetical possibility of installing malicious software, you need to install an antivirus. This is the most logical solution, according to most users.

     

    Here is the list of viruses that I found information about:

     

    1982: Elk Cloner

    1987: nVIR

    1990: MDEF

    1995-1996: Concept / Laroux

    1998: SevenDust 666 / AutoStart 9805

    2004 and 2006: Renepo / Leap-A

    2007: RSPlug-A

    2009: iWorkS-A Trojan

    2011: MacDefender

    2012: Flashback / SabPub

     

    What we have here: only 10 malicious programs. In my opinion, only MacDefender represented a real threat to users of macOS - stealing credit card numbers. As you understand, security updates have already come out for these viruses, and they do not represent threats.

    Let's return to antiviruses. What do you think, given the information written above, how often do you need to update the antivirus database for Mac? The answer is once a year or less.

     

    Antivirus software for macOS is more harmful than useful. There is convincing evidence that Kaspersky AntiVirus very actively collects information about the user and sends it to its servers. There is information that computers with Kaspersky AntiVirus can participate in DDoS-attacks at the discretion of the developer of this antivirus. It's worth thinking about whether you need a Trojan program and also pay for it.

     

    You still have to be careful not to get malware on your Mac device. Some malicious software tools like Safe Finder may also collect your data or show unwanted ads.

  12. (Almost) ALL Topics talking about having LTT/Forums app in 2017

     

    Main post with all statistics:

    2017 Stats (so far)

     

    Total topics created: 14

    Most in month: 4 (January)

    Average in month: 2.4

     

    Aug 2nd

    Spoiler

     

     

    July 19th

    Spoiler

     

     

    May 13th

    Spoiler

     

    May 8th

    Spoiler

     

     

    Apr 27th

    Spoiler

     

     

    Apr 12th

    Spoiler

    (This isn't as clear as many others, but still about same subject.)

     

    Apr 2nd

    Spoiler

     

     

    Mar 31st

    Spoiler

     

     

    Mar 5th

    Spoiler

     

     

    Feb 15th

    Spoiler

     

     

    Jan 23rd

    Spoiler

     

     

    Jan 21st

    Spoiler

     

     

    Jan 14th

    Spoiler

     

     

    Jan 5th

    Spoiler

     

     

    Spoiler

     

     

    • 1
      entry
    • 1
      comment
    • 254
      views

    Recent Entries

    Answer: no 

    reasoning: the App Store has about 6 or 8 split window browsing apps. One of the most popular is Split by Savy soda. The issue is that you have to go back and forth typing new searches. Ideally the app would mirror the first search to get both windows to the first google page, then un-mirror allowing the user to tap through multiple links without pressing the back button which wastes loading time. Then re-mirror and un-mirror. Maybe with some ai or something. A solution to the "back load time" is another app which promises zero latency back presses. That app is called "fastback." But there is no practical purpose for split windows. Searching time actually goes down going back and forth. For background music there are other apps that play in the background. You do not need to sacrifice half your screen to play music. 

  13. RadiatingLight
    Latest Entry
    CPU: AMD - Ryzen 5 1600 3.2GHz 6-Core Processor  ($195.69 @ SuperBiiz)
    Motherboard: ASRock - AB350M Micro ATX AM4 Motherboard  ($65.98 @ Newegg)
    Memory: Team - Vulcan 16GB (2 x 8GB) DDR4-2400 Memory  ($99.99 @ Newegg)
    Storage: PNY - CS1311 120GB 2.5" Solid State Drive  ($52.99 @ Best Buy)
    Storage: Western Digital - Caviar Blue 1TB 3.5" 7200RPM Internal Hard Drive  ($48.44 @ OutletPC)
    Video Card: Asus - GeForce GTX 1070 8GB Dual Series Video Card  ($399.99 @ B&H)
    Case: Inwin - 301 Black MicroATX Mini Tower Case  ($76.98 @ Newegg)
    Power Supply: SeaSonic - 520W 80+ Bronze Certified Fully-Modular ATX Power Supply  ($56.99 @ SuperBiiz)
    Total: $997.05
    Prices include shipping, taxes, and discounts when available
    Generated by PCPartPicker 2017-06-17 03:07 EDT-0400
    • 1
      entry
    • 1
      comment
    • 399
      views

    Recent Entries

  14. This is a perhaps a more eloquent and elaborated presentation of what I was wanting to speak in the thread 7-times Microsoft MVP finds Windows 10 Enterprise collects too much data at minimum, calls for legal action.

     

    The relevant links from that thread are these:

     

    Windows, Spying, and a Twitter Rant

    Screenshots showing high levels of contact with Microsoft servers after employing all efforts to stop data-transmission

    Additional screenshots of further Microsoft server activity, discovered later

     

     

    I would like to give some personal commentary to the subject that those links are about.

     


    If a politician steals millions of taxpayer dollars, which is only a few cents from each person, they go to jail. So what about when Microsoft is continuously piggy-backing on everybody's PC systems to enrich themselves? Microsoft is using people's own hardware, software licenses, electricity, computing power, data, time, and private activity for non-sanctioned business use, and the profit of Microsoft's executives.

     

    Microsoft's data-mining is no different than a virus that is distributed to people's PCs to min mines digital coins using their CPU and CPU power, with the earnings being deposited in the e-wallet of the virus' creator. You could also look at it like someone setting up a mining farm, but connecting all their systems to their neighbour's electricity supply - except that in the case of Microsoft's data-mining, they are not using their own hardware, software licenses, and everything else, but those of the people whose systems are sending data to Microsoft... and so the coin-mining virus is a more suitable analogy.

     


    Every aspect of Microsoft collecting data from people's PC systems and personally-owned Windows licenses is already established in law as being illegal. But some people are taking a bit of time to work through the understanding that leads to that recognition, because software-license owners are traditionally just not on the lookout for stuff like this and usually just focus on using their software, and not technical legal aspects or ethical implications behind its operation. Also, Microsoft being a well-known company whose products people have used for years throws a lot of people for a loop, I think, because they are used to just assuming that whatever they're doing must check out, somehow. Well, this doesn't. It's illegal from head to toe.

     

    It's theft, but it's also Unjust Enrichment - which is the situation where one party is making profit for itself at the unjust expense of others. A current UE case involves ZeniMax targeting Samsung for Unjust Enrichment over VR technology that ZeniMax claims belongs to them but is profiting Samsung.

     

    If you unilaterally utilize somebody property, or copyrights to make yourself money, who is legally entitled to the proceeds? Legal entitlement goes to whom the required property and rights that the profit is dependent upon belong to. 

     


    A person who argues that by using Windows 10 a person agrees to send Microsoft their data would be wrong, because sending Microsoft data is not essential to making use of the software functionality that was paid for when buying a Windows license, and so conditioning usage of the paid-for functionality on unrelated and Microsoft-profiting access to personal and private data would not pass the Reasonable Person test.

     

    Also, such an argument would be in ignorance that the data sent to Microsoft doesn't come from only the owned software license, but also a person's personally-owned  hardware, electricity, computational time, uniquely-generated data, and personal / private activity - things for which there can be no entitlement for Microsoft to use any more than a car salesperson can claim that if you buy a vehicle from them, then they have access to use your garage and everything in it, including the power source hooked up to it.


    Additionally, the idea that Microsoft could exert any authority over an instance of the Windows OS after they've sold the license that represents the OS instance to somebody is a violation of the first-sale doctrine, which makes clear that such authorities and privileges pass to the owner of the property, in this case, the owner of the software license and the instance of the OS it represents, once it is sold. And the SCOTUS has just made a unanimous, 8 - 0 in favour, re-affirmation that decision-making rights leave from the seller to the buyer at the first-sale of an item.

     


    I fully believe that seven-times Microsoft Most Valuable Professional award recipient Mark Burnett is right when he says "What we need to do is fix this, even if that means getting lawmakers involved. It can only get worse from here". Though, I believe it is important for big reasons beyond simple control and security of the OS.

     

    Microsoft is stealing digital property, computational power, and electrical resources from everybody, and is making non-licensed usage of people's hardware property, the housing of that hardware, and are exploiting people's personal behaviours while those people are staying within their personal and private spaces (non-online activities). And in the process of violating Windows license-owners' rights over their property, resources, time, and behaviour, Microsoft is unjustly enriching its company and executives.

     

    If action is not taken against those who commit these violations, then all established societal and legal notions of what property is, who possesses decision-making rights over it, how much a person can use their position to unfairly exploit others against their natural desire... then all existing understanding of those things becomes argued against, and a precedent is established where a person's property is anyone's to use by unilateral decision, and a seller of goods can enslave and overrule aspects of people's own private lives and property as part of their conditions for their sale. Effectively, a sale becomes not a transaction of goods for money, but a mechanism for enslavement and subjugation, with the seller acting as if they held a commercial license over a plethora of the buyer's possessions and entitlements.
     
    A person whose personal and private PC system environment (non-online spaces) is sending data to Microsoft through telemetry, data-collection, and analytics of their behaviour is an employee of Microsoft who does not get paid, or receive any company benefits.

    • 1
      entry
    • 1
      comment
    • 316
      views

    Recent Entries

    Ma name jeff
    Latest Entry

    Is this rig good for gaming at 1080p@60+fps highest preset?

    https://pcpartpicker.com/user/mohammed15/saved/

  15. Hello,

     

    So the other day, I was bored and thought, "You know what, I want to learn how to design a working instruction set," and thus I have been working out the details for a simulated processor using my own custom instruction set rather than getting some homework done that I really should be doing.

     

    Here is what I currently have worked out:

    Croltex SM8 (simulated processor) specs
    ------------------------------------
    L1 Cache - 64 bytes
    L2 Cache - 128 bytes
    L3 Cache - 256 bytes
    L4 Cache - 512 bytes (Because I want to have L4 cache)
    
    Instruction Set - Multimode 8-bit (M8)
    
    M8 Instruction set definitions
    ------------------------------
      /------------ Function group
      |    /--- Operation
      |    |
    0000 0000
    
    Instruction set Data Tags (0000)
    
    	0000 0000 (00 00) = T-CBH (Marker - Command Begins Here)
    	0000 0001 (00 01) = T-CCH (Marker - Command Continues Here)
    	0000 0010 (00 02) = T-CEH (Marker - Command Ends Here)
    	0000 0011 (00 03) = T-VBH (Marker - Variable Begins Here)
    	0000 0100 (00 04) = T-LBH (Marker - List Begins Here)
    	0000 0101 (00 05) = T-SBH (Marker - String Begins Here)
    	0000 0110 (00 06) = T-IBH (Marker - Integer Begins Here)
    	0000 0111 (00 07) = T-FBH (Marker - Float Begins Here)
    	0000 1000 (00 08) = T-FBH (Marker - Boolean Begins Here)
    	0000 1001 (00 09) = T-OBH (Marker - Operator Begins Here)
    	0000 1010 (00 10) = T-NVH (Marker - Null Value Here)
    	0000 1011 (00 11) = T-PBH (Marker - Parameter Begins Here)
    	0000 1100 (00 12) = T-PEH (Marker - Parameter Ends Here)
    	0000 1101 (00 13) = T-FBH (Marker - File Begins Here)
    	0000 1110 (00 14) = T-FEH (Marker - File Ends Here)
    
    Variable operations (0001)
    	0001 0000 (01 00) = V-CEV (Variable - Create Empty Variable)
    	0001 0001 (01 01) = V-LVC (Variable - Lock Variable Content)
    	0001 0010 (01 01) = V-UVC (Variable - Unlock Variable Content)
    	0001 0011 (01 03) = V-SVC (Variable - Set Variable Content)
    	0001 0100 (01 04) = V-GVC (Variable - Get Variable Content)
    	0001 0101 (01 05) = V-MVL (Variable - Make Locally Available)
    	0001 0110 (01 06) = V-MVG (Variable - Make Globally Available)
    
    List operations (0010)
    	0010 0000 (02 00) = L-CEL (List - Create Empty List)
    	0010 0001 (02 01) = L-LLC (List - Lock List Content)
    	0010 0010 (02 02) = L-ULC (List - Unlock List Content)
    	0010 0011 (02 03) = L-SVC (List - Set Value's Content)
    	0010 0100 (02 04) = L-GVC (List - Get Value's Content)
    	0010 0101 (02 05) = L-MLA (List - Make Locally Available)
    	0010 0110 (02 06) = L-MGA (List - Make Globally Available)
    	
    
    Mathematical operations (0011)
    	0011 0000 (03 00) = M-SAO (Math - Standard Addition Operation)
    	0011 0001 (03 01) = M-SSO (Math - Standard Subtraction Operation)
    	0011 0010 (03 02) = M-SMO (Math - Standard Multiplication Operation)
    	0011 0011 (03 03) = M-SDO (Math - Standard Division Operation)
    	0011 0100 (03 04) = M-SEO (Math - Standard Exponential Operation)
    	0011 0101 (03 05) = M-SRO (Math - Square Root Operation)
    	0011 0110 (03 06) = M-SCO (Math - Standard Ceiling Operation)
    	0011 0111 (03 07) = M-SFO (Math - Standard Floor Operation)
    	0011 1000 (04 08) = M-SRO (Math - Standard Rounding Operation)
    	0011 1001 (04 09) = M-SAO (Math - Standard Absolute Operation)
    	0011 1010 (04 10) = M-SCO (Math - Standard Cosine Operation)
    	0011 1011 (04 11) = M-SSO (Math - Standard Sine Operation)
    	0011 1100 (04 12) = M-STO (Math - Standard Tan Operation)
    	0011 1101 (04 13) = M-ACO (Math - Anti Cosine Operation)
    	0011 1110 (04 14) = M-ASO (Math - Anti Sine Operation)
    	0011 1111 (04 15) = M-ATO (Math - Anti Tan Operation)
    
    Comparison Operations (0100)
    	0100 0000 (04 00) = C-VAI (Comparison - Values Are Same)
    	0100 0001 (04 01) = C-VNI (Comparison - Values Not Same)
    	0100 0010 (04 02) = C-VTS (Comparison - Value Types are Same)
    	0100 0011 (04 03) = C-VTI (Comparison - Value Type is)
    	0100 0100 (04 04) = C-VTA (Comparison - Value Types Are)
    	0100 0101 (04 05) = C-FVG (Comparison - First Value is Greater)
    	0100 0110 (04 06) = C-FVL (Comparison - First Value is Lesser)
    
    String operations (0101)
    	0101 0000 (05 00) = S-CVS (Strings - Concatenate Values as String)
    	0101 0001 (05 01) = S-CVL (Strings - Concatenate Values as List)
    
    RAM Operations (0110)
    	0111 0000 (07 00) = R-SFD (Storage - Search for Devices)
    	0111 0001 (07 01) = R-SDI (Storage - Select Device ID)
    	0111 0010 (07 02) = R-GMC (Storage - Get RAM Capacity)
    	0111 0011 (07 03) = R-GMU (Storage - Get RAM Usage)
    	0111 0100 (07 04) = R-CNF (Storage - Create New File)
    	0111 0101 (07 05) = R-GFI (Storage - Get File ID)
    	0111 0110 (07 06) = R-GFS (Storage - Get File Size)
    	0111 0111 (07 07) = R-SAF (Storage - Select Active File)
    	0111 1000 (07 08) = R-RFC (Storage - Rewrite File Content)
    	0111 1001 (07 09) = R-AFC (Storage - Add File Content)
    	0111 1010 (07 10) = R-DFE (Storage - Delete File Entry)
    
    Storage Operations (0111)
    	0111 0000 (07 00) = S-SFD (Storage - Search for Devices)
    	0111 0001 (07 01) = S-SDI (Storage - Select Device ID)
    	0111 0010 (07 02) = S-GSC (Storage - Get Storage Capacity)
    	0111 0011 (07 03) = S-GSU (Storage - Get Storage Usage)
    	0111 0100 (07 04) = S-SSF (Storage - Search Stored Files)
    	0111 0101 (07 05) = S-CNF (Storage - Create New File)
    	0111 0110 (07 06) = S-GFI (Storage - Get File ID)
    	0111 0111 (07 07) = S-GFS (Storage - Get File Size)
    	0111 1000 (07 08) = S-SAF (Storage - Select Active File)
    	0111 1001 (07 09) = S-SFN (Storage - Change File Name)
    	0111 1010 (07 10) = S-RFC (Storage - Rewrite File Content)
    	0111 1011 (07 11) = S-AFC (Storage - Add File Content)
    	0111 1100 (07 12) = S-DFE (Storage - Delete File Entry)
    
    System Operations (1000)
    	1000 0000 (08 00) = P-CNP (Processor - Create New Process)
    	1000 0001 (08 01) = P-CNP (Processor - Kill Process)
    	1000 0010 (08 02) = P-GPL (Processor - Grab Process List) 
    	1000 0010 (08 04) = P-GDL (Processor - Grab Device List)
    	1000 0000 (08 05) = P-LIM (Processor - Load Instruction from Memory)
    	1000 0001 (08 06) = P-PLI (Processor - Perform Loaded Instruction)

     

  16. Xanthe_2871
    Latest Entry

    Welcome to the first edition of my Lyft blog series. In this series I will tell you some interesting stories from my Lyft rides. Some of these are personal stories customers tell me while I drive, others are events that occurred in the car itself while I was driving. This volume represents the most interesting stories from my first 100 rides (excluding two special ones I'm saving for a top 10 list later this year).

     

    Before we get started, I'd like to offer a disclaimerAll guest's names will be changed, as well as any other personal details such as location, age, etc. This little blog series is intended to entertain you, not to embarrass the customers. Additionally, I do not know these people beyond my meeting them during their ride, so I can not confirm all personal stories are accurate; all back seat stories are accurate as they occurred in my car during the ride itself.

     

    I don't know yet how many of these entries I'll make or how popular they may or may not become, but to maintain a clean appearance each story will be enclosed within a spoiler tab. Some stories are longer than others, so this should help keep things looking clean and organized. 

     

    Enjoy!

     

    Ride #3, a warm up for what's to come...

    Spoiler

    This is my third ride, ever. My first two went pretty well, I was able to drive them to their destination without killing anyone, my customers in both rides were happy with my 'fancy' phone charger setup and my WiFi, and the app navigated me without any major issues. I ignorantly believed all my rides would be fast, easy, and mildly entertaining. Then I got my third ride, and reality came crashing down on my hopes and dreams... ok, it wasn't that bad, but this is when I realized my rides were not all going to be calm and peachy.  

     

    I picked up a young woman (18) and a young man (similar age) at a house in the suburbs of Sunnyslope, WA. When I arrived I saw several bags and luggage items in the front yard, so my first guess was "Oh, I must be taking this young couple to the airport." No, not at all. When the couple came out of the house I got out of the car and helped them load their items in the trunk. I could immediately see the young lady was upset, but the male, presumed boyfriend, was not. I wasn't sure what to make of that, but I didn't say anything.

     

    The ride was very quiet at first, I welcomed them to my car and answered the lady's question about which charger worked with her phone, but otherwise no conversation. This silence only lasted about 5 minutes though, as shortly after leaving the neighborhood the female passenger began crying. I offered her some tissues, and she opened up about her whole situation to me. Apparently her step father doesn't approve of her decision to become a professional cartoonist, so he beats her. Today he was drunk, got into some sort of fight with her, and kicked her out of the house. She feels powerless because she doesn't have enough money to move out but she's 18 now so she can't report child abuse. Of course I listened to her and let her vent, but I kept my opinions to myself. 

     

    She got really emotional. The man didn't do much, but eventually offered her a "Blueberry & Chocolate Cheesecake W/ Truffle Oil" vape. I don't allow smoking or vaping in my car but she was so upset, I didn't say anything. The vape didn't calm her down though; she kept going on and on about how this step father was ruining her life and how she wanted to be left alone but she couldn't afford to move out, etc. I keep a few tiny teddy bears in the front of my car for children, so I gave one of them to her and she appreciated it. Now, her story changed to how much she missed her biological father, and how he would give her teddy bears all the time, and how she lost him too early, and I could see there was no way to make this girl happy!

     

    When we finally got to her destination (which turned out to be the man's home) the couple thanked me for listening to the story, and for giving her the bear and the tissues. I helped them move their luggage, the woman realized she had dropped her vape oil somewhere, searched my car for a few minutes, then gave up and told me she would give me a "huge tip" and asked that I call her if I found the oil.

     

    The next week I got my paycheck, and saw that there was no tip on her fare. Nice!

     

    The Worst Kind of Revenge

    Spoiler

    This story takes place on a cold, rainy Friday evening. I picked a man in his late 30's and a child, an eight year old girl. The girl was too short for my seat belts in the back seat, but dad had a small folding contraption with him that lowered the seat belt height. (I usually turn away parties with small children if they don't have a child seat, I don't need a ticket or worse, and Lyft's policy is clear: it's the parent's responsibility to provide a child/booster seat, not the driver).

     

    The journey was about 2 hours. The girl kept to herself, playing with some sort of foam tablet (maybe a kid's fire tablet or something) and dad was talking with me about simple stuff, like traffic, cars, life in WA, nothing to heavy or serious.

     

    Then about an hour in, the girl had fallen asleep and dad changed the subject to his personal life. He told me about her mother, and why mom wasn't in their life. I'll spare you the details, most of it was the typical stuff that drives couples apart, but there was one part that stuck out: she was pregnant with their second child and tried to use that child as leverage for a marriage. Dad wasn't ready for that yet, and when she saw that he was not going to 'pop the question' she broke up with him, left the then 3 year old child with him, and aborted the second child just shy of the end of the 1st trimester. 

     

    Now, I have my personal feelings about abortion, but I think most sane people, pro choice included, would agree that aborting a child as an emotional attack on the father is not acceptable. From what he explained their relationship was great at first, but it was on again off again for a while, then they had the first girl, stayed together for a year, then he raised her alone for a while, then mom came back, got pregnant, and demanded they be married or she would abort the child. He thought that was a bad idea, because they had "serious shit" to work out, and he didn't think marriage would be appropriate. 

     

    This was all five years ago, and today dad says his daughter has no meaningful relationship with mom. She knows who her mom is, and has seen her a few times but dad tried to keep them apart. Dad justifies that mom had her own husband and children now, her own life, and it's better to avoid breaking his daughter's heart then allow them to regroup just for mom to leave her like she did him. I understand that logic, but without knowing more details I can't say if that's right or not. 

     

    Dad showed me some photos at different red lights, and along with how he speaks about his daughter I believe that she is incredibly important to him. He has fears that mom will try to regain custody in the future since mom and dad never took legal action to secure custody, but I told him that's not too likely when he can show a court evidence that he's been a major part of his daughter's life and that mom has had little interest in reconnecting up to this point. 

     

    It was an interesting ride. I gave his daughter a teddy bear and he tipped me $10 cash. I hope he can find a new mother for that girl! I can't imagine being a single parent is easy... and that mother aborting the child under those circumstances, if they are just as he said, is absolutely horrible. 

     

    Attempted Exhibitionism in the Back Seat

    Spoiler

    Ah, Saturday night. 1 AM. Drunk people in almost every ride. My kind of night! Drunks can be really entertaining, and this is just one example. 

     

    I pick up two young woman and an older man (I'd say the woman were in their 20's and the man was probably 50 something). They were all drunk, and babbling about their plans for later that night. Talking about what kind of cocktails and mixes they could make, who would be there, etc. Typical drunk ride. But then, one of the ladies tries to pull down the man's pants. She wasn't doing too well, so he helped her, but driving all I knew at that moment was there was a lot of bumping and shifting around going on in the back seat. He was in the middle seat, but the road was too curvy for me to take my eyes off the road. 

     

    When I did get a chance to look back I saw the man in his shirt and underwear with one of the girls rubbing his, bulge, and the other filming vertical video. I didn't say anything. I just looked at them and they stopped. He put his pants back on and they remained silent for remainder of the short trip. The girls were embarrassed but the man didn't seem to be.

     

    I dropped them off at their destination and they said nothing, not even goodbye. I received no tip. But the story doesn't end there. The next day I was woken up by my cell phone ringing. When I answered it was one of the girls saying she left her portable battery pack in my car last night. I asked her who she was, since I had many rides that night, and she responded with her name, then clarified "I was in the group that pleasured the man in your back seat." That was hilarious.

     

    P.S: I was not able to locate her battery.

     

    The Magic Drill (My favorite on this list)

    Spoiler

    It's Wednesday afternoon. I receive a request to pick someone up at an extended stay hotel. When I get there a man in his 40's gets in the car, with a drill. He asks for a bottle of water and I give him one. As I drive him to his stop he explains to me that he works as a private detective, and often works with the Seattle PD. He told me he didn't have much time because he's on his lunch break right now (from the hotel? As a PI? Ok...) but that he needs to see his friend. All this time he's cleaning this drill he brought with him. It wasn't new, it has scuff marks and sharpie on it, but he sure seemed proud of it. 

     

    I get to his stop and a woman gets in the back. She honestly looked like Wendy from Breaking Bad. Seriously. Basically, this is his friend:

    Image result for wendy breaking bad

     

    He now wanted me to take him to a second stop, then a third. He only requested me for one stop though, so I asked him to re-request me after I ended the ride. He did, and as I waited for him to re-request his friend started talking to him about the drill. She thought it looked "good", and that it was "pretty cool". She even wondered how he got "such a nice drill". For his second stop I took him to a 2nd friend's house. The first friend, Wendy's doppelganger, stayed in the car and played with my phone chargers while the man ran up to this 2nd friend's door. He spent a whole 12 minutes talking to this friend, presumably about his drill. He showed it off and was holding it as they talked. About 6 minutes in Wendy started eating my strawberry suckers. (I have some candy in the back seat for my guests) It sounded like some wild animal... loud and unorganized slurping and crunching sounds. And as the time elapsed she ate them faster and faster. 

     

    Finally the man got back in my car and I took him and his 1st friend, back to the first friend's house... Why did this woman get in my car to begin with? What is the logic in this ride? How long is his lunch break? WHAT IS SO SPECIAL ABOUT THE DRILL? This guy defies all logic! Who is the lady to him, beyond being a friend? Why does she gobble up candy like those kids in Invader Zim?

    ezgif-3-98a7f84a28.gif.663dbf97af8ae602e6cd8531bb632acf.gif

     

    Living In A Box

    Spoiler

    A short and sad story. I picked up a man at a house and took him home. The ride itself was not very interesting, but the destination was. His 'home' consisted of a wooden box, roughly 4' x 10' x 6' kept under the gap in some stairs at an abandoned hotel. I'm serious, he built himself a little shack just big enough to lie down in and sleep, with no windows and a heavy duty lock on the outside. I hope he can get a better home! I wish I could help but I don't have that kind of money. He seemed fairly healthy, in the mind I mean, not like some homeless individuals. But clearly he has enough money to afford a smartphone with service and a Lyft ride. I don't know, maybe it's just an act to get money out of sympathetic Lyft drivers.

     

    The Trekkie

    Spoiler

    This one is pretty fun. Not a drunk or a sad story, just an interesting one. I picked up a man at the mall and took him to the hospital. He was buying some gifts for a loved one recovering from a car accident. He was very nice and talkative, and he told me about all the Star Trek actors he's met. I went back to my dash cam footage from that day to get this list for you, he claims to have seen: Peter Weller, Jeri Ryan, Kate Mulgrew, Carolyn McCormick, Wil Wheaton, Jennifer Lien, Eric Menyuk, and Marc Alaimo. There were a few more I couldn't make out well enough. 

     

    He talked about how he met these actors at various events, and some he followed to non star trek shows or conventions. The man told me about some of his trips, like his one to Las Vegas. He and his family went to Las Vegas for a convention and on the strip. There were woman dressed in BDSM outfits whipping men's rears as they passed on the sidewalk, and one of them hit his daughter in the back of the head. After dealing with that, he and his daughter went to the convention where they got pictures with a few different actors. He says his "Jr. Trekkie" felt meeting her favorite character made the night worth it. A nerd's dream I suppose!

     

    I like star trek myself, but I think this guy was one of the biggest fans in the community. I think I would skip the show if someone assaulted my daughter...

     

    That's it for now! Some of these are more interesting than others, but like I stated above I'm keeping my 2 best stories for a top 10 list... hope you found at least one of these stories interesting!


×