![]() Reid, Tara, and Matt race to the scene to try and catch the unsub, but all they wind up finding are a) blood-soaked walls b) a recording of a man’s screams c) a laptop showing a loop of one of the murders (meaning the unsub isn’t streaming these “films” live), and another index card that simply says, “Made you look, bitches, I remain GP” and c) THE HEADS OF THE FIRST TWO VICTIMS RESTING ON BEDPOSTS HOLY CRAP. Things get even creepier when Garcia warns the others that the unsub is apparently filming his murders and putting them online. But, Reid wonders, why would he quit medical school to go work as a courier? It seems quite a change in career. If he worked in the mail room at WorldSend, that, along with his “going postal” reference in his poem, would explain his experience with wrapping boxes. The unsub is apparently quite the gift-wrapping expert – the body parts are well-packed and secured, as are the boxes themselves. Two kinds of behaviors means a possible variety of motives. They’re also struck by the fact that the unsub kills his male victims, whom he seemed to know personally, and psychologically traumatizes the women. And since it’s not easy to cut up a body, the team concludes that their unsub clearly has a lot of medical experience. They also learn that both men were tortured while alive – the unsub had given them a drug that paralyzed them and allowed them to watch what they were going through. Luckily, they have one avenue to look into right off – the packages were sent via an overnight courier service called WorldSend, and one of the victims, Dwayne, worked there. It’s soon revealed that the body parts are tied to two men, so now the team has to learn more about those people, and see if and how they and the women targeted are connected. What’s more, all the boxes included an index card, each with snippets of an odd rhyme, which Reid recites for everyone: “All the king’s Porsches and all the king’s Benz couldn’t put this bitch back together again. The various body parts were wrapped and sealed inside boxes, and include two arms without hands, two legs without the feet, and a headless torso that was split in two. None of the women reported any male family members or friends going missing, so that makes the motive harder to pin down as well. Two of the women were at home when they got their packages, four were at work, and they’ve all got different jobs and are of varying ages. But the fact they’re all women is where the similarity ends. As the team soon learns, five other women reported getting body parts sent to them as well. That poor woman isn’t the only one to receive that kind of gruesome “present”. Or it could also be a portion of some random person’s body. She ordered some sort of toy recently, so perhaps, she figures, it’s that. At the local IRS building, a couple employees are musing over what could be inside a box that’s been sent to a female employee. The postal service is up and running, and mail is being delivered to D.C. It’s quite the busy morning as the episode begins. On the personal side of things, we also got to spend a bit of time with Matt’s family this episode, so that was nice, too. Still, even with that issue, we still had a case that was intriguing and unpredictable, a couple very colorful characters for the team to deal with, and an attempt to bring a new twist on this show’s common trope of internet-obsessed unsubs. It seemed kinda all over the place, which made sense given the type of unsub they were dealing with, but which made it harder to really address all the issues at hand all that well. In some ways, I kinda feel like that might’ve been a better angle for the show, because I don’t know that this episode’s case really highlighted the actual idea of rule 34 all that well. ![]() A lot of fans, upon reading this title, thought that the episode might deal more in the fandom realm, with an unsub who’s involved with creepy porn versions of some show/movie/celebrity/whatever that people were into. This episode, as the title indicates, tries to touch on that very concept, to mixed results. ![]() We’ve all no doubt got some stories of stumbling upon something screwy online – maybe not always on the level of rule 34, but something that could be classified as just plain weird, at the very least. Even if one wasn’t familiar with rule 34, though, I’m sure the fact that the internet has some dark areas is not exactly news to anyone who’s spent any length of time online, or, for that matter, has watched the news. Those that don’t no doubt got quite an interesting crash course regarding that concept. Rule 34: If it exists, there is porn of it.Ĭhances are good most viewers of this show knew the definition of that phrase going into this episode.
0 Comments
Confirm that you completed the last two steps correctly by using the pwd command (to confirm that you are in the lab02 directory) and the ls command (to confirm that you successfully copied Welcome.java).Copy the file /cs/shr/cs149/code/Welcome.java into the lab02 directory:Ĭp /cs/shr/cs149/code/Welcome.java Welcome.java.Create a folder inside your home directory named lab02.Create a cs149 folder in your home directory.Refer back to the Unix Tutorial for Beginners if you need to refresh yourself on the necessary commands. Compiling and Executing Java in the TerminalĮach of the steps below should be completed entirely inside the terminal: no GUI applications allowed. You may work on this lab individually or in a group of no more than three people. The goal for this lab is to gain experience editing, compiling and executing Java programs in the terminal and through the JGrasp IDE. I really do not fully understand why this is not working or how to get it working.Lab02: Java Comand Line and JGRasp Compiling Java Lab 2A Introduction Where I am completely stuck and confused, is that I do not know how to get the drawing into the applet. I then need to create a new class that draws a silly picture of an alien, which I have also done. I need to create an applet that displays a grid of command buttons which I have done. View Replies View Related Calling Method Into Applet Apr 8, 2014 How do I call a method that exist within a class into the main method? When I try to call the method in the main, it does not work. I am just trying to test this array, for a locker combination program that involves classes.but the array is printing out the whacky numbers for the location. I have to make new string array in the method and return words without four letters in the main method View Replies View Related How To Call A Method That Exist Within A Class Into Main Method Feb 13, 2014 ("How many words would you like to enter?") For example if cat, dog, moose, lazy, with was entered, then it would return the exact same thing except for the words with and lazy.Ĭurrently, my code so far just prints and im stuck. I have to write a method called censor that gets an array of strings from the user as an argument and then returns an array of strings that contains all of the original strings in the same order except those with length of 4. What structure i should use? View Replies View Related Writing A Method That Returns Words Without Four Letters Back To Main Method May 27, 2014 I want to print the array but doesn't work for arrays apparently. I'd like to know how to return a new array, I wrote in a method below the main method. Java Result: 1 View Replies View Related How To Return Array From A Method / Back Into Main Method That Prints Out Stuff May 27, 2014 tDefaultCloseOperation(_ON_CLOSE) Įxception in thread "main" Īt (Applet.java:169) Here is the code i have in my main method: I have a frame which I want to load an applet inside it. View Replies View Related Calling Applet From Another Class Main Menu Aug 20, 2014 Return Int X To Main Method And Print It Out.How To Have Multiple Classes But Only One Main Method.Recall Main Method After Calling Of JVM?. ![]() Java Applet - Using Constructor To Populate Deck Of Cards Instead Of Method.Applet Viewer - Show Status Method Not Working.Creating Applet With Dropdown Lists - Method Not Abstract.Main Method Separated From Other Method.How To Call A Method That Exist Within A Class Into Main Method.Writing A Method That Returns Words Without Four Letters Back To Main Method.How To Return Array From A Method / Back Into Main Method That Prints Out Stuff.Calling Applet From Another Class Main Menu.Write a program that uses this class to make a message and print it. A method append that appends a line of text to the message body a method toString that makes the message into one long string like this: A constructor that takes the sender and recipient A message has a recipient, a sender, and a message text. The assignment states: Design a class Message that models an e-mail message. I have been trying to get this code to work but in jGrasp it give the no main method, applet, or IMDlet. JGrasp - No Main Method / Applet Or IMDlet Sep 30, 2014 Atlas placed the apples on the ground and picked up the globe. He begged Atlas to take the globe for a moment while he put some padding on his head. Heracles agreed but asked Atlas if he could get more comfortable. At his return Atlas found he could go on living quite happily without the weight of the world on his shoulders, so he asked Heracles,if he could carry the worldly globe another few months. While Heracles hoisted up the globe, Atlas trotted off to retrieve the three golden apples. ![]() ![]() Heracles killed the dragon with an arrow over the garden wall and took the burden over his shoulders. Atlas was willing to steal the apples if Heracles relieved him of his burden of holding up the heavens, but only if the hero first did something about Ladon. When Heracles as one of his Labors sought the golden apples, he had to enlist the aid of the Titan Atlas to overcome the mighty Ladon. So Ladon would lay in the garden, coiling himself around the tree, and Hera feared no one would steal her apples. Hera had chosen Ladon, a monstrous dragon with a hundred heads, to guard the precious tree which Gaia (Mother Earth) had given to her, Queen of the Heavens, at her wedding to Zeus. Ladon might be given multiple heads, a hundred in Aristophanes' The Frogs (a passing remark in line 475), which might speak with different voices. In the second century CE, Pausanias saw among the treasuries at Olympia an archaic cult image in cedar-wood of Heracles and the apple-tree of the Hesperides with the dragon coiled around it. ![]() The image of the snake-dragon coiled round the tree, originally adopted by the Hellenes from Near Eastern and Minoan sources, is familiar from surviving Greek vase-painting. Ladon is the Greek version of the West Semitic serpent Lotan, or the Hurrian serpent Illuyanka.He is variously described as the offspring of or of. In one version, Heracles did not kill Ladon. Ladon was given several parentages, each of which placed him at an archaic level in Greek myth: the offspring of Phorcys and Ceto or of Typhon and Echidna or of Gaia herself, or in her Olympian manifestation, Hera: "The Dragon which guarded the golden apples was the brother of the Nemean lion" asserted Ptolemy Hephaestion. ![]() The collection page lists all the products within a collection. By default, the list-collections.liquid file will output the collections in alphabetical order. In this example, the collection name will be displayed, as well as a featured image for the collection, if one has been uploaded. cartĪ collection list is a page that displays all the collections in a store. This code example includes product thumbnails, as well as remove, checkout and continue shopping buttons. The checkout form is what customers use to review their cart, remove any unwanted products, and proceed to checkout. This code will display the user’s instructions in a textarea element. Cart notes are submitted with a customer's order, and will appear on their order page in the Shopify admin. You can add a text area to the cart page that allows customers to share special instructions for their order. This section will allow merchants to optionally add a call-to-action (CTA) button to the homepage using the theme editor. navigationĬall-to-action buttons allow merchants to drive visitor engagement to specific products, or carry out a specific activity such as creating an account or accessing content. blogĪ breadcrumb navigation, also known as breadcrumbs, can reduce the number of actions a visitor needs to take in order to navigate to a higher-level page, and improve the discoverability of a website’s sections and pages. This component displays all the tags that exist on the current blog. Blog tags also provide a means of navigation for customers browsing for similar blog posts. blogīlog tags are a type of taxonomy, or labelling system, and are often used to list the keywords of a blog article. In this case, the visibility of the article author and published date can be enabled or disabled from the theme editor. This component contains the Liquid and HTML needed to display article title, author, published date, content, and tags. The blog article page displays the content of an individual blog article. This component contains the Liquid and HTML needed to display article titles, featured images, article excerpts, article tags, authors, and dates. This code displays a list of blog posts, or blog articles associated with a specific blog. When added to a theme, this static section can be displayed on the homepage or on all pages, and can be configured from the theme editor. navigationĪn announcement bar allows merchants to display custom updates and promote discounts. Splitting products, blog articles, and search results across multiple pages is a necessary part of theme design, as you are limited to 50 results per page in any forloop. These ordered page numbers enable users to navigate through a series of pages where content has been split up for design purposes, usability, faster loading, and so on. Pagination is an ordered numbering of pages usually located at the top or bottom of a webpage. ![]() If you have some reviews under your belt, You should include the essence of your service in a single sentence.ĭesign two unique logos of your company or brand in 24 hours with unlimited Let’s say you are selling a logo designing Objective of your gig that you first mentioned in your gig title. Your gig introduction should reiterate the Let us run through each element in detail. Ideally, your description should include the following You can create your gig description usingġ200 characters. Or break your freelancing career on Fiverr. Tagline, it’s time to create a captivating Fiverr gig description that can make How to create an outstanding Fiverr gig description This helps to present myself as a focused seller on Fiverr and my profile description reflects this reality accurately. I only offer WordPress-based services on Fiverr. You will notice that I have mentioned my WordPress experience upfront. Revisiting the example of the logo designerĭuo, you will notice that their Fiverr profile description contains all the 4 Have you received any 5-star feedback on your Fiverr gigs? If yes, flaunt it. Research in your field or create handcrafted header designs. You a logo designer or a virtual assistant, or maybe you are a magic spellĬaster? Next, how long have you been doing the thing you are selling? Have youīeen creating logo designs for 2 years or 10 years? Mention it. ![]() You have 600 characters to play around with here, use them They proudly claim to be the best logo and header designers on Fiverr since 2015.ĭid you get the point? How to create the best Fiverr profile descriptionĭescription part. The top-selling graphic designer duo on Fiverr. Just look at the profile tagline of one of Just writing “I am a logo designer” sounds too generic, but when you include an adjective like top-notch or first-rate, you appear as if you’re a premium seller. Using an adjective boosts your perception in the eyes of the buyer. The formula to use here is adjective + what you are or which service you provide + your experience in the field. Graphic designer with more than 5 years’ experience.” Then create a profile tagline like “Top-notch Use it to describe yourself and your expertise in one line.įor example, let’s say that you are a logoĭesigner with 5 years’ experience. You have 70 characters to write your profile tagline. How to create an appealing Fiverr profile tagline You should optimize both the components correctly. There are two parts to your Fiverr profile description: the tag line beneath your profile image and the profile description itself. You want to reassure them that you are the right person for their needs. You might be thinking, why is it so important to have the right description for your profile? That’s because potential buyers on Fiverr will first glance at your profile to assure themselves of your credentials. Let us first start with creating a description for your Fiverr profile. Summary of the perfect Fiverr gig description How to create the perfect description for Fiverr profile ![]() The story of Doss, who died in 2006 at the age of 87, has previously been made into a documentary, but Hacksaw Ridge is the first major film based on his wartime exploits. He was attacked by a sniper while waiting and the bullet shattered his arm bone – after which he rigged up a rudimentary splint and “crawled 300 yards over rough terrain to the aid station”. The Museum of Flight holds one of the largest air and space collections in the US and aims to become the foremost educational air and space museum in the. The citation describes how: “Rather than call another aid man from cover, cared for his own injuries and waited 5 hours before litter bearers reached him and started carrying him to cover.”Īfter being rescued, Doss spotted a more severely wounded man on the journey back to safety and insisted on giving up his place on the stretcher, maintaining that he could afford to delay his own treatment a while longer. Deck side account, 'At 300 yards, the Jap plane took a shell in its left wing and flames spurted out. After repeatedly risking his life, he was wounded in the legs by a grenade on May 21 – but even while injured, still managed to prioritise the lives of his fellow-soldiers. A Japanese Nakajima B6N Tenzan torpedeo bomber is hit by a 5 inch shell while attacking the USS Yorktown aircraft carrier off Kwajalein Atoll, Marshall Islands, North Pacific. This Emmy Award winning documentary begins with the journey home from the camps, then describes the Nisei generation taking over the rebuilding of their community. This eye-opening documentary seeks to critique the myth of failure perpetuated by the infamous images of the complex’s implosion and destruction. In this film his son Arthur returns to his final resting place to deliver a meaningful thank you to the Dutch people during the 2015 Memorial Day Ceremony. For nearly 50 years, Kenji Kawano has been photographing the Navajo Code Talkers of World War II throughout America's southwest. A journey narrated through archival footage and interviews The Pruitt-Igoe Myth is a story of the transformation of the American city in the decades after World War II. Max Chotin who died November 3, 1945, nearly six months after the war in Europe had ended. Buy a cheap copy of Journey Back to Christmas: Based on the Hallmark Channel Original Movie by Leigh Duncan 1947892940 9781947892941 - A gently used book at. The 96-year-old World War II veteran takes center stage in a new, one-hour documentary. ![]() While the events described above would be extraordinary enough on their own, Doss was also recognised for battlefield actions that took place throughout the May of 1945. Return to the Valley: The Japanese American experience after World War II, tells the poignant story of what happened to the Issei and Nisei generation when they came back home after internment. The Journey Back profiles the story of SSgt. But now, deep in his golden years, Waller’s story centers around secrets, regrets and second chances. ![]() Make sure port 69 UDP is also open on your client device earlier, we designated our client as 192.168.100.105. That restart command of iptables above is to force the firewall to re-read configuration file and recognize the conntrack module you just activated. If you only want to open up port 69 to your specific client, then substitute the CIDR notation with the specific IP address of your tftp client– which in this post, we have designated as 192.168.100.105. We’ll open up port 69 to our whole private network: Remember, port 69 still needs to be allowed on our server so that clients can connect. Open the tftp port, or this will be a really short trip. If you happen to have a module already configured here, just append a space along with your second module within the quotes like so: IPTABLES_MODULES="ip_conntrack_ftp ip_conntrack_ tftp" To: IPTABLES_MODULES="ip_conntrack_ tftp" Now that we see how important connection track module is, let’s set it up We must edit the iptables configuration file as follows: ![]() I suspect many of the headaches generated by first-time tftp server set-ups are due to overlooking the implications of the connection track module. By enabling the connection track module, iptables will temporarily and dynamically open up the necessary unprivileged port ranges until your transaction is complete. The default iptables rules will lose track of your tftp session during this port migration and actually start blocking your intended file transfer as a result. Once the initial tftp traffic is established, that traffic migrates over to the unprivileged port ranges. Privileged ports are designated for service transactions which require the permission levels of a privileged user account. Unprivileged port ranges include port 1024 and above– making port 69 a privileged port. The file transfer actually completes across the higher numbered, unprivileged ports. Initial tftp connections occur over port 69 by default however, port 69 is not where the file transfer actually happens. This is not an optional step Iptables will not allow tftpd to work properly without turning up the connection track module. If you’re running iptables on your system, you will need to enable the connection track module for iptables. System Prep Turn up the necessary conntrack module in iptables: You’ll need to know how to use the correct options in order to get the tftpd server listening in stand-alone mode (that is to say, listening without xinetd). If you still insist on running tftpd without xinetd, consult the man pages for in.tftpd. The default settings work just fine and the config file already comes configured once you download xinetd and tftp-server via yum. That’s the default xinetd config file for the tftpd service. you can run tftpd without xinetd however, the xinetd config file keeps all the important tftpd options nice and tidy for you as we can see here: # cat /etc/xinetd.d/tftp When the server receives a request, xinetd will launch tftp with the necessary options so that files can be downloaded by the tftp client as requested. ![]() In this post, xinetd will be used to listen for any tftp requests that come in from clients. Xinetd brings efficiency and security by being a single service that runs as needed– as opposed to having multiple, dormant services running needlessly in the background for most of their run time. You can launch xinetd once and have it wake up other intended services as needed. ![]() Why the need for xinetd? The xinetd daemon is a “super-daemon” or “super service” that listens for connection requests on behalf of other daemons and services. Log on to 192.168.100.5 and download the necessary programs make sure they survive reboots: You will need superuser privileges on both your server and client in order to successfully perform all of these commands. We’ll designate our tftp server and tftp test client as 192.168.100.5 and 192.168.100.105 respectively. Let’s say we’re dealing with a private network– 192.168.100.0/24. Knowing how to setup a tftp server comes in quite handy when circumstances like these arise. tftp can also be used for network based installs or for booting up diskless systems. Many network devices such as Cisco routers and switches use tftp in order to download their IOS config updates. ![]() As of version 67 of Firefox, fingerprinting and cryptominers are also blocked. You can’t see them, but you can feel them slowing down your browser. Most trackers are just scripts that run in the background on a number of websites. Using a browser that blocks third-party trackers isn’t just important for privacy - it usually means it runs much faster, too. What you do online literally shouldn’t be anyone else’s business.Īnother browser feature that should be a given is the ability to prevent websites and companies from tracking your browsing and shopping data - even in normal browsing mode. In this area, all seven of the browsers compared here score points. At a minimum, a browser should offer some version of “private browsing mode” that automatically deletes your history and search history so other users on the same computer can’t access it. It’s not unreasonable to expect a high level of data protection and privacy from the products we regularly use to get online. Which browser is best at keeping things confidential? Security and Privacyīlocks third-party tracking cookies by default So, without further ado, let’s compare Google Chrome, Firefox, Safari, Opera, Brave, Microsoft Internet Explorer and Edge - and see which best suits your needs. So is your browser the best one for what you do online? The right browser can make a big difference in how you experience the web. ![]() But at a time when online ads seem to follow us everywhere and data breaches are a fixture of news headlines, a lot of people are starting to demand more privacy and respect from their browser. In recent years, Google Chrome has been the browser of choice for many. Since your browser is your gateway to the internet, speed, security, privacy and utility are paramount. ![]() To learn more about routing, you could also refer to the official Laravel routing documentation. I described various related concepts regarding routes such as regular expressions and names for the routes. In this installment of the series, I discussed routing in Laravel 5.5. Similarly, for redirecting to this URL, the proper syntax would be: return redirect()->route('table') Conclusion Now, I could re-generate the URL for this route through: $url = route('table') I will now create a basic route that will print the table of 2. Routes can contain multiple sets of directions and can. Learn more about CSRF protection in Laravel official docs. Routes: Used by the GPS device to create a route from one recorded point to another recorded point. The workout represents a fast way to finish the entered route while at the same time trying to balance this against the rider's power output variability. The rider's progress along the route is calculated using physics. Note: All the post, put and delete requests require CSRF token to be sent along with the request. Turn a real-life route into a custom Zwift workout, personalized based on your rider and bike data and desired intensity. The great thing with using your phone is that you can create a route and upload it to Walkr directly, without. Most are easy to use and you might want to try out a few to find your favourite. I will now discuss how you could create your own routes in Laravel. To use your mobile phone to record a GPX route, simply type 'GPX' into your App Store or Google Play and take your pick from many free and paid for app's. Routes are defined in Laravel within the Route class with an HTTP verb, the route to reply to, and closure, or a controller strategy. Laravel offers the following route methods: During recording, you can add waypoints to highlight important locations. Open the appropriate file (either `web.php ` or `api.php `) and start the code with `Route:: ` This is followed by the request you want to assign to that specific route and then comes the function that will be executed as a result of the request. myTracks turns your iPhone into a fully functional GPS logger. The structure of the route is very simple. The routes/web.php record defines routes that are for your web interface. These records are consequently stacked by your application’s AppProvidersRouteServiceProvider. Views are the frontend of the application and I will discuss the topic in an upcoming installment of this series.Īll Laravel routes are defined in your route files, which are found within the routes directory. Every time this route receives a get request for /, It will return the view welcome. In the above code, a route is defined for the homepage. ![]() ![]() īlackout Tuesday was criticized as a form of virtue signalling for the initiative's "lack of clarity and direction". There was also a hoax spreading around claiming that the event was started by 4chan trolls, but research has shown that to be false. Other users pointed to those participating in the Blackout Tuesday event, but not involving themselves in other forms of activism, such as protesting or donating, as being performative in their activism. Some activists were concerned because the Black Lives Matter related hashtags were being used by activists and others to share information during the ongoing protests, and posting a black square with the incorrect hashtag risked drowning out critical information and updates. Some users posted the black square image using the hashtag #blackouttuesday, #blacklivesmatter or #BLM (an abbreviation of the latter), which in turn led users who were searching for or tracking those hashtags to find nothing but solid black images. It was also proposed that this day be used as “a day to disconnect from work and reconnect with our community” via “an urgent step of action to provoke accountability and change.” "Blackout Tuesday" was originally conceived as a music-industry protest, according to Rolling Stone, and Jamila Thomas and Brianna Agyemang of Atlantic Records meant it to be a call for the industry to "not conduct business as usual." In a statement, Thomas wrote, "Your black executives, artists, managers, staff, colleagues are drained, traumatized, hurt, scared, and angry," adding, "I don’t want to sit on your Zoom calls talking about the black artists who are making you so much money, if you fail to address what’s happening to black people right now." In a separate statement, the pair wrote that "the show can’t just go on, as our people are being hunted and killed." Concerns and criticisms This is only phase one of a multi-phase movement. We are and will be in this fight for the long haul. According to the original statement released by Aygyemang and Thomas, "This is not just a 24-hour initiative. Others suggested it could be an opportunity to take time from work to focus on helping others. Organizations supporting Blackout Tuesday suggested that the day could be an opportunity for reflection on racism and the effects of racism on society. On Facebook and Instagram, users participated by posting a single photo of a black square alongside the hashtag #blackouttuesday. Apple Music stripped down and took over the "Browse", "For You", and "Radio" tabs and replaced them with a single radio streaming station in celebration of Black music. In remembrance of George Floyd, media conglomerate Paramount Global similarly took all of its cable channels, which include MTV, Nickelodeon, and Comedy Central, off the air for 8 minutes and 46 seconds. Spotify announced it would be adding an 8-minute and 46-second moment of silence to certain podcasts and playlists for the day. Black Americans were asked to not buy or sell on this day to show economic strength and unity. īusinesses participated in different ways. This is a global initiative and our efforts will include members worldwide". Agyemang and Thomas have since noted that "These injustices we are facing in America are not limited to just our community. Blackout Tuesday stemmed off of the original initiative #TheShowMustBePaused created by music executives Brianna Agyemang and Jamila Thomas, Senior Director of Marketing at Atlantic Records. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |