On Tuesday, March 2, at 10:30 AM , Thomas DeVane McGee transitioned peacefully to his heavenly home surrounded by his family, ending his battle with brain cancer. DeVane was born in Panama City, Florida, September 18, 1947 to J. T. and Helen McGee.
DeVane was an amazing husband, father, and “Papa” to his grandchildren. DeVane met his wife, Mary Jarman, in high school and they became good friends. He and Mary graduated from Rutherford High School in 1965 and they married in August 1967. They had two children: Kelly Denise Ball and Kevin Bruce McGee.
In Illinois, possessing so much as a single round of ammunition without a Firearms Owner ID (or FOID) card is a serious crime.
How serious?
Well, residents of Lake in the Hills, Illinois got a first hand view of that law being enforced last Thursday, when a SWAT unit rolled up on a house where a 20-year-old man was believed to be possessing ammunition without a permit. //
In most of the country this wouldn't be a crime at all. Illinois, Connecticut, Massachusetts, and New Jersey are the only states where a permit or license is required to purchase or possess ammunition, and California and New York require background checks on the sale of ammunition. //
Illinois' FOID card requirement has been ruled unconstitutional more than once, but each time the state Supreme Court has reversed those decisions on technical grounds while avoiding the underlying constitutional question. My hope is that Illinois residents will one day not have to worry about the FOID card, but for now be aware that any bullets you might possess without the proper paperwork could lead to a very loud, chaotic, and potentially deadly visit by the police.
Pipes and Tubes - Imperial vs. Metric Sizes
SI vs. Imperial pipe sizes.
The size of pipes, fittings, flanges and valves are often given in inches as NPS - Nominal Pipe Size, or in metric units as DN - 'Diametre Nominal'.
Typical weight and dimensions of industrial PVC and CPVC pipes equal to steel pipes schedule 40 and 80 are indicated in the table below.
- ASTM D1785 Standard Specification for Poly(Vinyl Chloride) (PVC) Plastic Pipe, Schedules 40, 80, and 120 is manufactured to meet the needs of a broad range of industrial, commercial and residential piping systems. ASTM D1785 covers pipes made for water distribution and irrigation systems.
- ASTM F441 Standard Specification for Chlorinated Poly(Vinyl Chloride) (CPVC) Plastic Pipe, Schedules 40 and 80
DN Diametre Nominal & NPS Nominal Pipe Size Table
Metric Pipe Sizes DN per ISO and NPS equivalent for DN6 to DN2200, NPS Schedule 5 to 30
Dear Men Who Think They Are Winning When They Are Actually Losing,
You cannot find a woman of genuine character if you are not operating as a man of genuine character yourself. That is not unfair. That is just how it works. //
You want a woman who chose you. Not settled for you, not defaulted to you because you were convenient, not attached to you because of neurochemistry you both generated before you even knew each other's last names. CHOSE you. With her eyes fully open, knowing who you are, and deciding you are worth building with.
That woman exists. She is probably not the most exciting woman in the room. She is probably the one who is a little harder to access, a little slower to give herself away, a little more certain about what she is looking for and not particularly interested in apologizing for it.
Stop chasing the race. Start choosing wisely.
Careless big-time users are treating FOSS repos like content delivery networks //
its repository site is at risk of being overwhelmed by constant Git pulls. The team has dug into this and found that 82 percent of the demand comes from less than 1 percent of IPs. Digging deeper, they discovered that many companies are using open source repositories as if they were content delivery networks (CDNs). So, for example, a single company might download the same code hundreds of thousands of times in a day, and the next day, and the next. This is unsustainable. //
Fox revealed that last year, major repositories handled 10 trillion downloads. That's double Google's annual search queries if you're counting from home and they're doing it on a shoestring. Fox described this as a "tragedy of the commons," where the assumption of "free and infinite" resources leads to structural waste amplified by CI/CD pipelines, security scanners, and AI-driven code generation.
To bypass the bottleneck, companies are turning to Merkle Trees, a data structure that uses cryptographic hashes and other math to verify the contents of large amounts of information using a small fraction of material used in more traditional verification processes in public key infrastructure. Cloudflare has a much deeper dive into Merkle Trees here.
Merkle Tree Certificates, “replace the heavy, serialized chain of signatures found in traditional PKI with compact Merkle Tree proofs,” members of Google’s Chrome Secure Web and Networking Team wrote Friday. “In this model, a Certification Authority (CA) signs a single ‘Tree Head’ representing potentially millions of certificates, and the ‘certificate’ sent to the browser is merely a lightweight proof of inclusion in that tree.”
The Bitwarden web app provides the richest Bitwarden experience for personal users and organizations. Many important functions such as setting up two-step login or administering an organization must be done from the web app.
Syncthing Multi Server Monitor stylized as sm² (or sm2 for convenience)
With the ability to intercept all link-layer traffic (that is, the traffic as it passes between Layers 1 and 2), an attacker can perform other attacks on higher layers. The most dire consequence occurs when an Internet connection isn’t encrypted—something that Google recently estimated occurred when as much as 6 percent and 20 percent of pages loaded on Windows and Linux, respectively. In these cases, the attacker can view and modify all traffic in the clear and steal authentication cookies, passwords, payment card details, and any other sensitive data. Since many company intranets are sent in plaintext, traffic from them can also be intercepted. //
“Even when the guest SSID has a different name and password, it may still share parts of the same internal network infrastructure as your main Wi-Fi,” the researcher explained. “In some setups, that shared infrastructure can allow unexpected connectivity between guest devices and trusted devices.” //
The MitM targets Layers 1 and 2 and the interaction between them. It starts with port stealing, one of the earliest attack classes of Ethernet that’s adapted to work against Wi-Fi. An attacker carries it out by modifying the Layer-1 mapping that associates a network port with a victim’s MAC—a unique address that identifies each connected device. By connecting to the BSSID that bridges the AP to a radio frequency the target isn’t using (usually a 2.4GHz or 5GHz) and completing a Wi-Fi four-way handshake, the attacker replaces the target’s MAC with one of their own. //
For now, client isolation is similarly defeated—almost completely and overnight—with no immediate remedy available.
At the same time, the bar for waging WEP attacks was significantly lower, since it was available to anyone within range of an AP. AirSnitch, by contrast, requires that the attacker already have some sort of access to the Wi-Fi network. For many people, that may mean steering clear of public Wi-Fi networks altogether.
If the network is properly secured—meaning it’s protected by a strong password that’s known only to authorized users—AirSnitch may not be of much value to an attacker. The nuance here is that even if an attacker doesn’t have access to a specific SSID, they may still use AirSnitch if they have access to other SSIDs or BSSIDs that use the same AP or other connecting infrastructure. //
Probably the most reasonable response is to exercise measured caution for all Wi-Fi networks managed by people you don’t know. When feasible, use a trustworthy VPN on public APs or, better yet, tether a connection from a cell phone.
Alysa Liu is an American figure skater whose family fled China and faced harassment and persecution by Chinese authorities. She won gold. You might have missed it. The American press corps chose, instead, to praise Eileen Gu, an American skier with family ties to the Chinese communist party. Gu skied for and was paid by China. The press elevated her over American athletes until shifting to hate our hockey team.
This article describes how to format .csv and .json files for importing into Bitwarden. The formats are identical to Bitwarden vault exports. To select a file type and format, determine the destination vault and which item types you need to import:
Format your file based on whether you're importing to an individual or organization vault.
Bitwarden .csv files only include logins and secure notes. If you need to also handle identities and cards, use a .json file.
With Instant Church Directory, it's never been easier to maintain and distribute a church directory that your congregation will utilize anytime and access anywhere for a variety of reasons and uses.
To move the Windows 11 Start menu from the center to the left, right-click on the taskbar, select "Taskbar settings," then under "Taskbar behaviors," change the "Taskbar alignment" from "Center" to "Left." This will shift the Start button and other icons back to the left side of the screen.
Audit Mode is a special Windows setup environment used mainly by IT professionals and manufacturers. Unlike the normal Windows installation that takes you through the OOBE (where you create user accounts, set up privacy options, and connect to Wi-Fi), Audit Mode allows administrators to bypass this process.
Key characteristics of Audit Mode:
- Bypasses OOBE so the system can be configured before end-user access.
- Allows installation of drivers, applications, and updates.
- Enables creating and capturing Windows images for deployment.
- Provides administrator access without creating new user accounts.
You’ll know you are in Audit Mode if:
- You see a System Preparation Tool (Sysprep) window open automatically after login.
- The PC bypasses the OOBE setup process.
- The desktop shows an administrator account with no other user accounts available.
The most straightforward way to exit Audit Mode is by using the built-in Sysprep tool.
- Boot your PC into Windows 11.
- When the System Preparation Tool window appears, check the options carefully.
- Under System Cleanup Action, select:
- Enter System Out-of-Box Experience (OOBE).
- Check the box Generalize if you want to remove system-specific data (optional, mostly for deployment).
- Under Shutdown Options, choose Reboot.
- Click OK.
If the Sysprep window does not appear automatically or you closed it, you can launch it manually through Command Prompt.
- Press Windows + R, type
cmd, and press Enter. - In Command Prompt, type the following command and press Enter:
C:\Windows\System32\Sysprep\Sysprep.exe /oobe /reboot - Windows will reboot into OOBE, where you can set up your account and finish the installation process.
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links to load the target brand’s real website, and then acts as a relay between the victim and the legitimate site — forwarding the victim’s username, password and multi-factor authentication (MFA) code to the legitimate site and returning its responses.
As a benefit to employees, Enterprise organizations can offer sponsorships for free Families organizations. Sponsored families organizations allow users to securely share personal credentials with up to five family members or friends, encouraging good security habits at home as well as at work.
In an ever-changing industry, knowledge is vital to your job. Since the 1960s, the Franklin Electric AIM manual has been directed at helping you navigate questions related to submersible motor Application, Installation, and Maintenance.