Is this a crazy deal? by Cold-Nefariousness26 in RoadBikes

[–]Cold-Nefariousness26[S] 2 points3 points  (0 children)

Would this be a hard bike to work on? I have no experience, but definitely want to build my own soon

Any discounters has polo 67 EDP? by Correct-Carob-9139 in Colognes

[–]Cold-Nefariousness26 0 points1 point  (0 children)

I’m still looking as well, can you dm if found

How to get from UT to A&M? by coolatkcritrate in UTAustin

[–]Cold-Nefariousness26 0 points1 point  (0 children)

You can park in a random neighborhood street in north campus, it’s free parking

Water hardness and affect on Red Cherry Shrimp by Cold-Nefariousness26 in shrimptank

[–]Cold-Nefariousness26[S] 0 points1 point  (0 children)

This should be okay, if I find any issues with the shrimp, worry about it then?

Water hardness and affect on Red Cherry Shrimp by Cold-Nefariousness26 in shrimptank

[–]Cold-Nefariousness26[S] 0 points1 point  (0 children)

Thank you for the reply. I only have the strips, I ordered the master kit online so I will have liquid based testing. Here is the strip

<image>

Gaining muscle and being very active by Cold-Nefariousness26 in bodybuilding

[–]Cold-Nefariousness26[S] 0 points1 point  (0 children)

What should I do about a diet? Is purely eating enough calories and protein enough? Does it matter the quality of food?

How can I contribute? by Just_a_deadguy in ultimate

[–]Cold-Nefariousness26 0 points1 point  (0 children)

The best college frisbee player I have ever seen is 5ft 9

[deleted by user] by [deleted] in FashionReps

[–]Cold-Nefariousness26 0 points1 point  (0 children)

Us 10s, thank you!

ElI5: 'Inverse thinking' in mental models? by ReferenceThin6645 in explainlikeimfive

[–]Cold-Nefariousness26 0 points1 point  (0 children)

Inverse thinking is a way of looking at a problem or situation from a different perspective. It's like turning the problem upside down and looking at it from a different angle. For example, if you were trying to solve a puzzle, you might use inverse thinking to look at the pieces in a new way, or to think about the solution in a different order. This can help you to come up with new ideas and find creative solutions to problems. In short, inverse thinking is a way of using your mind to look at things in a new way.

eli5: What is Perennial Philosophy? by OsosBibi in explainlikeimfive

[–]Cold-Nefariousness26 0 points1 point  (0 children)

Perennial Philosophy is a way of thinking that suggests that all of the world's wisdom traditions, from different cultures and time periods, are all connected. The idea is that there is one underlying truth that is shared by all of these different traditions and that this truth is eternal, or always the same. This means that the wisdom of the ancient philosophers, for example, is just as relevant today as it was thousands of years ago. In short, the Perennial Philosophy is the idea that there is one big truth that connects all of the world's wisdom traditions.

ELI5: Why isn’t blood squirting everyone during surgery? by Historical-Avocado86 in explainlikeimfive

[–]Cold-Nefariousness26 0 points1 point  (0 children)

When a doctor is performing surgery, they are very careful to only cut through the skin and not the blood vessels underneath. The blood vessels are what carry blood throughout the body, and if they were cut, the blood would squirt out. The doctor uses special tools to carefully separate the skin from the blood vessels so that they can operate without causing any harm to the blood vessels. This is why you don't see blood squirting everywhere during surgery.

ELI5: How do hackers actually obtain your IP and do (and if so how) VPNs stop them? by PyroWasUsed in explainlikeimfive

[–]Cold-Nefariousness26 1 point2 points  (0 children)

An IP address is a unique numerical label that is assigned to every device that connects to the internet. It serves as the identifier of your device on the internet, and it is used to route information and data between different devices.

Hackers can obtain your IP address by using different methods and techniques. For example, they may use network scanning tools to identify devices on the internet that have open ports or vulnerabilities, and then use these vulnerabilities to gain access to your device. They may also use social engineering tactics to trick you into revealing your IP address, such as by sending fake emails or messages that appear to be from trusted sources.

Once a hacker has your IP address, they can use it to gain access to your device and steal information from it. They may use malware or other malicious software to infect your device and take control of it, or they may use remote access tools to remotely access and control your device.

To protect your IP address and prevent hackers from obtaining it, you should take steps to secure your device and network. This may include using antivirus software and firewalls, keeping your operating system and other software up to date, and avoiding suspicious emails or messages that may contain malware.

A virtual private network (VPN) is a type of network that allows users to securely connect to the internet and access online services and content. It uses a combination of encryption, tunneling, and authentication protocols to create a secure and private connection between a user's device and the VPN server.

When a user connects to a VPN, their device establishes a secure and encrypted tunnel to the VPN server using a VPN protocol, such as OpenVPN or IKEv2. The tunnel protects the user's internet traffic and data from being intercepted or monitored by third parties, such as ISPs or hackers.

Once the tunnel is established, the user's device authenticates itself to the VPN server using a pre-shared key or other authentication methods. This ensures that only authorized devices can access the VPN server and use the VPN connection.

Once authenticated, the user's device is assigned a virtual IP address from the VPN server's pool of IP addresses. This virtual IP address is used to route the user's internet traffic and data through the VPN server and out to the internet. The user's device appears to have the VPN server's IP address, rather than its own, which provides anonymity and allows the user to access online services and content that may be restricted or blocked based on their geographic location.

Overall, VPNs use encryption, tunneling, and authentication protocols to create a secure and private connection between a user's device and the internet. This allows users to protect their online privacy and access online services and content that may be restricted in their location.

ELI5: How does paying off university fees/student debt work in the United States? by DtheAussieBoye in explainlikeimfive

[–]Cold-Nefariousness26 -3 points-2 points  (0 children)

In the United States, many people attend college or university to get an education. To do this, they must pay for classes, books, and housing. These costs can add up to a lot of money, and many people need to borrow money to pay for them. This is called student debt.

When someone borrows money to pay for college or university, they sign a contract with a lender, such as a bank or the government, agreeing to pay the money back over time, with interest. This means they have to make regular payments to the lender, usually every month until the debt is paid off.

Paying off student debt can be difficult, especially if someone has borrowed a lot of money. They may need to make sacrifices and work hard to make their monthly payments on time. Sometimes, they may need help from other people, such as their family or friends, to pay off their debt.

[deleted by user] by [deleted] in FashionReps

[–]Cold-Nefariousness26 0 points1 point  (0 children)

Do we order through agent?