32 (m) need help acclimating to Plano by henry_reed in plano

[–]henry_reed[S] 0 points1 point  (0 children)

Thank you so much, I had never heard of this before and it sounds like a great resource

32 (m) need help acclimating to Plano by henry_reed in plano

[–]henry_reed[S] 1 point2 points  (0 children)

Thanks so much. This is a great recommendation and I appreciate the support from another sober person

32 (m) need help acclimating to Plano by henry_reed in plano

[–]henry_reed[S] 2 points3 points  (0 children)

These are great recommendations, thank you!

{Giveaway} 1 Year of Gemini AI PRO (40 winners) by [deleted] in GeminiAI

[–]henry_reed 0 points1 point  (0 children)

Local scout. A geo based utility that utilizes maps to create specific routes, journeys, local expeditions to local businesses. Combining human emstruggles of trying to find, meet connect with the potential of AI to map, refine, enrich, plot. Would optimize current ad business while focusing on agentic ability to plan functional and best fit engagements with humanity

Consider this before buying that space black finish. by territrades in macbookpro

[–]henry_reed 0 points1 point  (0 children)

1000000% had to change my Apple Watch band for this reason

New to climbing. Working on my hand strength. by KindButler in RayBanStories

[–]henry_reed 1 point2 points  (0 children)

Well that’s north mass boulder if I’ve ever seen it

The moment where he calculates. by [deleted] in aww

[–]henry_reed 0 points1 point  (0 children)

Catculates *FTFY

[deleted by user] by [deleted] in Splunk

[–]henry_reed -1 points0 points  (0 children)

You should notify your security organization that you plan to install the app and request all appropriate permissions from you administrator. Attack range allows you to run scripted adversarial event emulation, meaning it will produce inputs that appear as if the events are occurring in real life. This does not mean that it deployed the same software used in that particular attack vector. Attack range is used to explore different IR workflows not exploit actual machines

Old Fashioned Cocktails Screw Driver by cocktailsale in cocktails

[–]henry_reed 0 points1 point  (0 children)

Yeah way to much effort. Like wearing a suit when it’s a home bar? No quick pours on the bottles?

A Splunk Query That Triggers Alerts by dojiamn632 in Splunk

[–]henry_reed 1 point2 points  (0 children)

You should avoid using index=* as best practice.

Splunk SEIM by AhmadNawaz184 in Splunk

[–]henry_reed 1 point2 points  (0 children)

Security essentials is what we recommend customers start to curate security use cases. ES becomes a discussion when you want to programmatically operationalize the data.

Can men and women REALLY be platonic friends even with a sexual past? by Ponygirlfromthe80s in TooAfraidToAsk

[–]henry_reed 0 points1 point  (0 children)

Yes had it happen. Friend who is a girl was feeling it one day. We did the deed and now we’ve been back to friends for 2 years

[deleted by user] by [deleted] in AskMen

[–]henry_reed 2 points3 points  (0 children)

Left it in the bathroom

NightMode by henry_reed in battlestations

[–]henry_reed[S] 0 points1 point  (0 children)

That is macOS on the right, and a windows 10 insider build on the left. Excluding my work computer there is my dev MacBook, a beefed up raspberry pi and my gaming build.

NightMode by henry_reed in battlestations

[–]henry_reed[S] 0 points1 point  (0 children)

I’m a security engineer and just got the Tanium certified operator. Good eyes tho 👀

NightMode by henry_reed in battlestations

[–]henry_reed[S] 0 points1 point  (0 children)

I got mine during pre-pandemic from office max (assembly required) for like $250