

Have her talk to a doctor about Demodex Mites.


Have her talk to a doctor about Demodex Mites.


Let’s try this a different way…
How do you want to indicate something should be retained? What is the single, physical act you want to perform to tell the operating system “this thing needs to be captured”?


The screenshot folder itself is certainly not limited to just screenshots. Any file you can save can be kept in there. To my mind, the “entry point” is “saving a file to this particular folder”, regardless of the specific method used to do the saving. The screenshot is just an extremely convenient way to do that.
I just thought of a way to improve this technique with Tasker. Tasker can work with the clipboard, edit files, and take a screenshot. So, you could set up a gesture to trigger a task in Tasker. Tasker can then take the screenshot, dumping it into the folder. Tasker can then check the clipboard; if there is text in your clipboard, it can prepend it to a single “TODO.txt” in your screenshot folder.
Linux could be configured much the same way, using shutter and xclip to capture the screenshot and clipboard, respectively.


What always got me personally is exactly that — over time I’d end up with multiple “entry points” depending on context (screenshot, chat, browser, notes…).
So long as you’re manually processing everything, screenshots work for all of that. You can take a note in any text box anywhere, and screenshot it. Chat message? Screenshot. Browser? Screenshot. Notes? Screenshot. You can even take a photo and then screenshot it to capture it into your workflow.
I have Shutter (apt install shutter) on my desktop, and I’ve changed the Print Screen key to shortcut to “shutter -s”. This lets me capture an area of my screen with one button (and a mouse drag). Bam, more screenshot.
The downsides of screenshot are obvious, of course: Extracting the text from the screenshot is a bit of a pain in the ass. If you really want to keep the same entry point, though, you could setup a script to OCR newly captured screenshot/photos to extract the text. An OCR-friendly font might make that pretty reliable.
Now I want to improve my setup…


On my phone, my Screenshot folder is syncthing’d to my desktop, so most of the time, capturing something in the moment is as simple as dragging three fingers down my screen. My Camera and default Download folders are also syncthing’d, so just taking a picture or saving something from a browser has it captured across my devices.
I also use Tududi, which has Telegram integration, for the quick note. Taking the note is just a matter of sending a message in Telegram, which is available on all my devices. Signal’s “Note To Self” feature is also useful; I trust it more than Telegram for sensitive data. In Firefox on my desktop, I have “Automatic Tab Opener” (Browser extension) pulling up my Tududi inbox every hour, reminding me to actually deal with the notes I have previously taken.


Syncthing functions as a sort of decentralized Dropbox or Google drive, by keeping folder content synchronized across any number of devices. I haven’t tried the iOS clients, but android, Linux, and windows work great.


I was in real estate. We collected earnest money from a particular buyer, and held it in an escrow account. The deal fell through, and we were required to return the money. However, the buyer ghosted us. We couldn’t reach them to return it.
Our escrow account is audited by the state. We have to account for every transaction to or from that account. If we don’t have paperwork to justify the transfer, we could get fined or have our licenses revoked. We didn’t have paperwork for this buyer, so we had no legal authority to do anything with this money.
Any account with any business can potentially have the same problem: a legal obligation to transfer money to a known person, but no way of actually completing the transfer.
The solution is to transfer the money to the state’s “unclaimed funds” division. When the state audits our account, we can show that these funds are the state’s problem, not ours.
The funds I’ve found were from a couple class action suits where I was apparently a member of the class. It amounted to tens of dollars. They were apparently filed long after I had moved, but I had never updated my address with the defendants.


You aren’t understanding my point.
My point is that you can continue to import and sell the exact same physical device, just with a little change in marketing, and possibly software.
My point is this: Once you have acquired the device, there is fuck all the FCC can do about you converting your “ham radio” back into a consumer-grade router.


This only applies to routers.
It’s not widely known outside the ham radio community, but part of the 2.4GHz wifi band overlaps the 13cm amateur radio band. If you turn off 5GHz wifi and lock the 2.4GHz AP to Channel 1, it qualifies as a ham radio, and can be sold as a ham radio instead of an AP/Router. You do need a ham radio license to operate it as a Ham AP, but you do not need a license to buy a Ham AP.
If the end user wants to turn on 5GHz after the fact, there is not a damn thing the FCC can do about it.


I would strongly suggest Pangolin for that use case. It combines a reverse proxy with a VPN tunnel between your local network and your VPS. You can host your services on your local machine, and serve them from the VPS. Pangolin also sets up your letsencrypt certs for https.
It also provides a security layer: if enabled for a site, you have to be logged in to Pangolin before Pangolin will proxy traffic to your site.


I remember distinctly. It was at a station that didn’t offer pay-at-the-pump, years after it had become the norm.
I filled up as usual, drove off as usual, and realized several minutes later that I hadn’t gone in and paid.


At that time, a cross would have carried about the same meaning as a noose.


Yes. And I am being serious.
When JD Vance has a Congress that will back him (which he will have in 10 months), he, and a majority of the Cabinet, can invoke Section 4 of the 25th amendment. He can declare the President incapable of performing his duties, and step up to the plate. Congress then has the opportunity to decide whether to support his coup, or reinstate Trump to the presidency.
To be successful, he will have to immediately blame Trump for attempting to block the midterm elections, and appoint a special prosecutor to look into the full scope of Trump’s numerous, unadjudicated crimes.
For (most) of the next 10 months, JD Vance will have to continue to appear to support Trump’s presidency, and Trump will have to continue his own Trumpiness.


But once we get approval to for thermonuclear detonations in the middle east, we can modify the plan. We don’t need to dig a new canal if we just blow up any Iranian sites capable of attacking ships in the strait.


Parents, schools, employers, and governments, already use content controls to restrict users from accessing undesirable sites and services on the internet.
Searching the terms “content blocking” or “parental controls” will get you lists of apps and services doing just that.
Parents already have the capability. This law doesn’t provide any additional capability for parents to parent their kids. This law seeks, instead, to remove the power and responsibility of parenting from the parents, and assign it to pornographers. They want the operators of adult websites around the world to be the ones determining whether or not to provide content to their kids.
What this law actually does is provide a means for a website to determine whether an adult or a child is trying to access their content, and to use that information to decide what content to provide. The thinking is that a respectable services like Netflix will be able to decide to provide only age-appropriate content, blocking kids from adult content.
However, that also means that services like “KidGroomer dot com” will be able to provide different content to adults than it does to children. To an adult, they can portray themselves as a site that provides information on how to protect kids from grooming. But when a kid visits, this law lets the site know it is a kid. The site can now show them kid-targeted content, like how to get in contact with the nearest candy-giving stranger.
Perhaps we don’t actually want a website to be able to determine whether there is a kid on the other side of the screen.


The UK uses single phase to the house. This is provided via one 240v hot and a neutral. Their final distribution transformer bonds one side of the output coil to ground and use it as a neutral, which makes the other side of the coil 240v relative to that ground.
The US uses split phase to the house. This is 240v provided via two opposing 120v hots and a common neutral. Their final distribution transformer is almost identical to the UK version: end to end, they have a 240v output. The difference is that instead of bonding one end of the output coil to ground and using it as a neutral for the other end, they instead bond the center of the output coil to ground and use that as a common neutral for both ends.


Not just solar - most grid-scale generators have this problem. “Black start” is the search term you want to look for, and Practical Engineering has a good video on the subject.
Basically, only a relative few grid generators are actually capable of black starts. The rest need the grid to be already functioning before they can tie in and start producing.


Ohio does something like that. We have separate contracts with a heavily regulated grid operator for distributing power, and our choice of generation companies for providing power.
The grid operator does our metering and billing, but forwards our generation charge to the provider we select.


Are you saying that electrical power should only be provided by government entities?
Should you be allowed to plug in a solar panel and provide power back to the grid?
Are you a government entity?
If you think you should be allowed to backfeed your own meter, you are calling for the grid to be operated as some sort of market. A regulated market, sure. But a market nonetheless.
My state is one that has recently adopted age verification requirements. Adult sites seem to be complying through IP geolocation, requiring users in my state to establish accounts. I think they are requiring a credit/debit card on file as evidence of age, but I cannot say that with any certainty.
VPN servers in less-oppressive jurisdictions bypass the account-creation requirement.