#NegativeWords
Explore tagged Tumblr posts
manfrommars2049 · 2 years ago
Photo
Tumblr media
Army of My Sins by Paweł Latkowski via SpecArt
37 notes · View notes
steveezekiel · 3 months ago
Text
youtube
Is your faith under attack? Discover the top 5 "Faith Killers" that could be quietly draining your spiritual strength! 🙌✨
In this video, we dive into:
Negative Words: How harmful words can impact your faith and how to safeguard yourself.
Overreliance on the Five Senses: Why focusing too much on the physical can weaken your spiritual life.
Wrong Worship Centers: The impact of your worship environment on your faith journey.
Toxic Relationships: How the company you keep can either uplift or diminish your faith.
Ignorance of the Truth: Why engaging with God’s Word is crucial for a vibrant, active faith.
Click to watch and be edified! 🌟📖
God bless you.
Reblog and share with friends who need a faith boost!
0 notes
sublimespiritoracle · 3 years ago
Photo
Tumblr media
Stay protected under His refuge. #cancel #rebuke #curse #negativewords #spokenovermylife (at Mumbai, Maharashtra) https://www.instagram.com/p/CdHyVORKZ4f/?igshid=NGJjMDIxMWI=
0 notes
rajricki · 3 years ago
Photo
Tumblr media
Stay Away From Still People😲 #toxicfemales #toxic #toxicmother #psychic #negative #consciousrelationships #highviberelationships #tagwagai #energyvampires #negativewords #toxicfamilies #money #toxicfriends #loveyourself #healingfromtoxicrelationships #mindfulrelationships #healthyrelationships #job #toxicfamily #psychics #successfulrelationships https://www.instagram.com/p/CU4m8u_lTEV/?utm_medium=tumblr
0 notes
kishorkumar559 · 4 years ago
Photo
Tumblr media
“People give up their dreams to live it and to uplift himself or herself toward the best possibilities of their lives “people make negative comments to others on social media and in society and it absolutely hurts someone. It affects mental health and their thoughts because negative things come from negative thought. . . . . .#artist #psychics #tagwagai #negativeenergy #shamanism #society #energy #friends #photo #negativepeople #tagwagai #relationships #job #negativity #family #herbs #negativewords #money #girlfriend #loveyourself #boyfriend #thoughts #negative #loveyourself #relationships #positive #life #herbs #money #society #blackandwhite #family #artist #girlfriend #energy #tagwagai #negativepeople #film #psychics #positivity #negativity #bw #negativeenergy #job #love #friends #boyfriend #thoughts #art @tagwagapp (at Hyderabad, Sindh) https://www.instagram.com/p/COBeNd9gvo8/?igshid=tx3oqw373k2t
0 notes
thespecialstories · 5 years ago
Video
What are you thinking right now? We keep thinking and talking to ourselves for long hours. And it happens a lot of time when we are saying the negative words to ourselves, criticizing our self for our steps that didn't turn well. It's called NEGATIVE SELF-TALK. 💭💭 If you too do so, Try 7 Best tips to deal with your inner negative thoughts . . #negativeselftalk #negativeself #negativeenergy #negativity #selftalk #thinking #negativewords #thinkpositive #trainyourmind #trainyourbrain #selfassessment #besttips #selfcare #selfcaretips #dealyourself #beactive #bepositive #instalike #instablog #instagood #instagram #instaself #blog #blogging #bloggers #thespecialstories #bloggerlifestyle #blogging #writer #writingblog (at Mind Thoughts) https://www.instagram.com/p/B_pgNnUjR5n/?igshid=1a91xzjnzot6h
0 notes
smartcherryposts · 5 years ago
Text
Dont Give Importance Or Respect To The Boys Who Uses Negative Words To Explain Girl
Tumblr media
Dont Give Importance Or Respect To The Boys Who Uses Negative Words To Explain Girl. I Know Alot Of Boys Uses Negative Words, Discomfortable Words To Explain Women. I Want You To Avoid Those Boys. I Want You To Be Far From Those Boys.
Tumblr media
I Want You To Stop Connecting With Those Boys. If You Be With Those Kind Of Boys, Even You Will Start Using Negative Words And Discomfortable Words. Negative And Discomfortable Words Means, Abusive Words. The Words Which Pulls A Girl Down.
Tumblr media
I Know A lot Of Boys Because, Of Various Reasons, They Throw Negative Comments On Girls And Uses Negative Words To Explain About A Girl. One Hundred Percent I'm Sure That If A Girl Is Hating You Or If A Girl Is Avoiding You Or A Girl Have Negative Opinion On You. I Don't Think You Will Be Successful Or I Don't Think You Will Get Positive Results For The Work You Do.
Tumblr media
If You Observe Or Read Any Religious Book, You'll Know All The Boys Or All The Men Who Was Against To Girls Or Women Failed Badly. History Says Women Is The Most Powerful Weapon. Women Is The Most Powerful Thing Compare To Men.
Tumblr media
I Dont Want You To Fight With A Girl Or Women. You Will Definetly Face Bad Situations If You Go Against To A Girls Thinking. So,Be Kind With Girl, Be Good With Girl, Be Nice With Girl, If You Have Women Support, I Promise You, You Will Achieve Anything That You Wanted. And Also I'm Sure You See All The Failures If You Work Against To The Girl.
Tumblr media
If You See The Laws Of Different Lands, I Means Laws In Different Countries Mostly Supports Women. So, Be Careful, Be Kind, Be Good, Give Love To Girl. I Hope That This Information Helped You In Understanding Girl And Women Importance. Thanks For Reading. Share And Subscribe To Smart Cherry For Interesting And Intellectual Topics. Bye. Read the full article
0 notes
rickygadvisor · 5 years ago
Photo
Tumblr media
Try saying #nothing negative for 24 hours straight and watch your life #Change! @rickygadvisor . . #negativity #love #positivity #positive #positivevibes #negative #energy #psychic #girlfriend #chakra #loveyourself #negativeenergy #friends #negativepeople #family #negativewords #spiritualadvisor #spiritual #relationships #chakraofbalance #aura #spiritualenergy #psychics #career #chakraenergy #loveone (at Miami, Florida) https://www.instagram.com/p/Byd8BsnHtK4/?igshid=94paoh3anu19
0 notes
squarequotes-blog1 · 6 years ago
Photo
Tumblr media
And I deserve more and better than you think. May be it was mistake to go for goods that weren't worth. But I've taken it as lesson. I may not become as mean and selfish as you are, because in trying I failed to console myself. . . #writersnetwork #positivequotes #negativewords #thegoodquote https://www.instagram.com/p/BwfZNUJBo_k/?utm_source=ig_tumblr_share&igshid=1fsd98o8mzh77
0 notes
hudsonpsychic · 6 years ago
Link
psychic,tarot,reiki,palm,party entertainment, paranormal,and much more !!
0 notes
wrekonizeyourself · 7 years ago
Photo
Tumblr media
Monday Motivation: No Matter What You Do Boo, People Will Critisize You. But Don't Let Negative Words Affect Your Self Worth. Just Keep Doing YOU. Good Monday @dashnimoradofficial #dontletnegativewordsaffectyourselfworth #negativewords #selfworth #keepdoingyou #live #life #love #qotd #quote #dailyquote #instaquote #quoteoftheday #quoteofthenight #beapoet #beawriter #beyourself #beaneagle #wrekonize #wrekonizeyourself #wrekonizeworldwide #weareone #thehawramispirit #7082017 #2017 #1111 11:11 #makeawish
0 notes
lbcybersecurity · 7 years ago
Text
toolsmith #129 – DFIR Redefined: Deeper Functionality for Investigators with R – Part 2
You can have data without information, but you cannot have information without data. ~Daniel Keys Moran
Here we resume our discussion of DFIR Redefined: Deeper Functionality for Investigators with R as begun in Part 1. First, now that my presentation season has wrapped up, I've posted the related material on the Github for this content. I've specifically posted the most recent version as presented at SecureWorld Seattle, which included Eric Kapfhammer's contributions and a bit of his forward thinking for next steps in this approach. When we left off last month I parted company with you in the middle of an explanation of analysis of emotional valence, or the "the intrinsic attractiveness (positive valence) or averseness (negative valence) of an event, object, or situation", using R and the Twitter API. It's probably worth your time to go back and refresh with the end of Part 1. Our last discussion point was specific to the popularity of negative tweets versus positive tweets with a cluster of emotionally neutral retweets, two positive retweets, and a load of negative retweets. This type of analysis can quickly give us better understanding of an attacker collective's sentiment, particularly where the collective is vocal via social media. Teeing off the popularity of negative versus positive sentiment, we can assess the actual words fueling such sentiment analysis. It doesn't take us much R code to achieve our goal using the apply family of functions. The likes of apply, lapply, and sapply allow you to manipulate slices of data from matrices, arrays, lists and data frames in a repetitive way without having to use loops. We use code here directly from Michael Levy, Social Scientist, and his Playing with Twitter Data post.
polWordTables =    sapply(pol, function(p) {     words = c(positiveWords = paste(p[[1]]$pos.words[[1]], collapse = ' '),                negativeWords = paste(p[[1]]$neg.words[[1]], collapse = ' '))     gsub('-', '', words)  # Get rid of nothing found's "-"   }) %>%   apply(1, paste, collapse = ' ') %>%    stripWhitespace() %>%    strsplit(' ') %>%   sapply(table) par(mfrow = c(1, 2)) invisible(   lapply(1:2, function(i) {     dotchart(sort(polWordTables[[i]]), cex = .5)     mtext(names(polWordTables)[i])   }))
The result is a tidy visual representation of exactly what we learned at the end of Part 1, results as noted in Figure 1.
Figure 1: Positive vs negative words
Content including words such as killed, dangerous, infected, and attacks are definitely more interesting to readers than words such as good and clean. Sentiment like this could definitely be used to assess potential attacker outcomes and behaviors just prior, or in the midst of an attack, particularly in DDoS scenarios. Couple sentiment analysis with the ability to visualize networks of retweets and mentions, and you could zoom in on potential leaders or organizers. The larger the network node, the more retweets, as seen in Figure 2.
Figure 2: Who is retweeting who?
Remember our initial premise, as described in Part 1, was that attacker groups often use associated hashtags and handles, and the minions that want to be "part of" often retweet and use the hashtag(s). Individual attackers either freely give themselves away, or often become easily identifiable or associated, via Twitter. Note that our dominant retweets are for @joe4security, @HackRead,  @defendmalware (not actual attackers, but bloggers talking about attacks, used here for example's sake). Figure 3 shows us who is mentioning who.
Figure 3: Who is mentioning who?
Note that @defendmalware mentions @HackRead. If these were actual attackers it would not be unreasonable to imagine a possible relationship between Twitter accounts that are actively retweeting and mentioning each other before or during an attack. Now let's assume @HackRead might be a possible suspect and you'd like to learn a bit more about possible additional suspects. In reality @HackRead HQ is in Milan, Italy. Perhaps Milan then might be a location for other attackers. I can feed  in Twittter handles from my retweet and mentions network above, query the Twitter API with very specific geocode, and lock it within five miles of the center of Milan. The results are immediate per Figure 4.
Figure 4: GeoLocation code and results
Obviously, as these Twitter accounts aren't actual attackers, their retweets aren't actually pertinent to our presumed attack scenario, but they definitely retweeted @computerweekly (seen in retweets and mentions) from within five miles of the center of Milan. If @HackRead were the leader of an organization, and we believed that associates were assumed to be within geographical proximity, geolocation via the Twitter API could be quite useful. Again, these are all used as thematic examples, no actual attacks should be related to any of these accounts in any way.
With the abundance of data, and often subjective or biased analysis, there are occasions where a quick, authoritative decision can be quite beneficial. Fast-and-frugal trees (FFTs) to the rescue. FFTs are simple algorithms that facilitate efficient and accurate decisions based on limited information. Nathaniel D. Phillips, PhD created FFTrees for R to allow anyone to easily create, visualize and evaluate FFTs. Malcolm Gladwell has said that "we are suspicious of rapid cognition. We live in a world that assumes that the quality of a decision is directly related to the time and effort that went into making it.” FFTs, and decision trees at large, counter that premise and aid in the timely, efficient processing of data with the intent of a quick but sound decision. As with so much of information security, there is often a direct correlation with medical, psychological, and social sciences, and the use of FFTs is no different. Often, predictive analysis is conducted with logistic regression, used to "describe data and to explain the relationship between one dependent binary variable and one or more nominal, ordinal, interval or ratio-level independent variables." Would you prefer logistic regression or FFTs?
Figure 5: Thanks, I'll take FFTs
Here's a text book information security scenario, often rife with subjectivity and bias. After a breach, and subsequent third party risk assessment that generated a ton of CVSS data, make a fast decision about what treatments to apply first. Because everyone loves CVSS.
Figure 6: CVSS meh
Nothing like a massive table, scored by base, impact, exploitability, temporal, environmental, modified impact, and overall scores, all assessed by a third party assessor who may not fully understand the complexities or nuances of your environment. Let's say our esteemed assessor has decided that there are 683 total findings, of which 444 are non-critical and 239 are critical. Will FFTrees agree? Nay! First, a wee bit of R code.
library("FFTrees") cvss cvss.fft plot(cvss.fft, what = "cues") plot(cvss.fft,      main = "CVSS FFT",      decision.names = c("Non-Critical", "Critical"))
Guess what, the model landed right on impact and exploitability as the most important inputs, and not just because it's logically so, but because of their position when assessed for where they fall in the area under the curve (AUC), where the specific curve is the receiver operating characteristic (ROC). The ROC is a "graphical plot that illustrates the diagnostic ability of a binary classifier system as its discrimination threshold is varied." As for the AUC, accuracy is measured by the area under the ROC curve where an area of 1 represents a perfect test and an area of .5 represents a worthless test. Simply, the closer to 1, the better. For this model and data, impact and exploitability are the most accurate as seen in Figure 7.
Figure 7: Cue rankings prefer impact and exploitability
The fast and frugal tree made its decision where impact and exploitability with scores equal or less than 2 were non-critical and exploitability greater than 2 was labeled critical, as seen in Figure 8.
Figure 8: The FFT decides
Ah hah! Our FFT sees things differently than our assessor. With a 93% average for performance fitting (this is good), our tree, making decisions on impact and exploitability, decides that there are 444 non-critical findings and 222 critical findings, a 17 point differential from our assessor. Can we all agree that mitigating and remediating critical findings can be an expensive proposition? If you, with just a modicum of data science, can make an authoritative decision that saves you time and money without adversely impacting your security posture, would you count it as a win? Yes, that was rhetorical. ->->
Note that the FFTrees function automatically builds several versions of the same general tree that make different error trade-offs with variations in performance fitting and false positives. This gives you the option to test variables and make potentially even more informed decisions within the construct of one model. Ultimately, fast frugal trees make very fast decisions on 1 to 5 pieces of information and ignore all other information. In other words, "FFTrees are noncompensatory, once they make a decision based on a few pieces of information, no additional information changes the decision."
Finally, let's take a look at monitoring user logon anomalies in high volume environments with Time Series Regression (TSR). Much of this work comes courtesy of Eric Kapfhammer, our lead data scientist on our Microsoft Windows and Devices Group Blue Team. The ideal Windows Event ID for such activity is clearly 4624: an account was successfully logged on. This event is typically one of the top 5 events in terms of volume in most environments, and has multiple type codes including Network, Service, and RemoteInteractive.
User accounts will begin to show patterns over time, in aggregate, including:
Seasonality: day of week, patch cycles, 
Trend: volume of logons increasing/decreasing over time
Noise: randomness
You could look at 4624 with a Z-score model, which sets a threshold based on the number of standard deviations away from an average count over a given period of time, but this is a fairly simple model. The higher the value, the greater the degree of “anomalousness”.
Preferably, via Time Series Regression (TSR), your feature set is more rich:
Statistical method for predicting a future response based on the response history (known as autoregressive dynamics) and the transfer of dynamics from relevant predictors
Understand and predict the behavior of dynamic systems from experimental or observational data
Commonly used for modeling and forecasting of economic, financial and biological systems
How to spot the anomaly in a sea of logon data?
“Triple Exponential Smoothing (Holt-Winters method) is one of many algorithms used to forecast data points in a series, provided that the series is “seasonal”, i.e. repetitive over some period.”
Winters improved on Holts double exponential smoothing by adding seasonality in 1960 and published Forecasting sales by exponentially weighted moving averages 
Let's imagine our user, DARPA-549521, in the SUPERSECURE domain, with 90 days of aggregate 4624 Type 10 events by day.
Figure 9: User logon data
With 210 line of R, including comments, log read, file output, and graphing we can visualize and alert on DARPA-549521's data as seen in Figure 10. 
Figure 10: User behavior outside the confidence interval
We can detect when a user’s account exhibits  changes in their seasonality as it relates to a confidence interval established (learned) over time. In this case, on 27 AUG 2017, the user topped her threshold of 19 logons thus triggering an exception. Now imagine using this model to spot anomalous user behavior across all users and you get a good feel for the model's power. Eric points out that there are, of course, additional options for modeling including:
Seasonal and Trend Decomposition using Loess (STL)
Handles any type of seasonality ~ can change over time
Smoothness of the trend-cycle can also be controlled by the user
Robust to outliers
Classification and Regression Trees (CART)
Supervised learning approach: teach trees to classify anomaly / non-anomaly
Unsupervised learning approach: focus on top-day hold-out and error check
Neural Networks
LSTM / Multiple time series in combination
These are powerful next steps in your capabilities, I want you to be brave, be creative, go forth and add elements of data science and visualization to your practice. R and Python are well supported and broadly used for this mission and can definitely help you detect attackers faster, contain incidents more rapidly, and enhance your in-house detection and remediation mechanisms. All the code as I can share is here; sorry, I can only share the TSR example without the source. All the best in your endeavors! Cheers...until next time.
The post toolsmith #129 – DFIR Redefined: Deeper Functionality for Investigators with R – Part 2 appeared first on Security Boulevard.
from toolsmith #129 – DFIR Redefined: Deeper Functionality for Investigators with R – Part 2
0 notes
impressgd-blog · 8 years ago
Photo
Tumblr media
Dreams. #typographicposter #typography #montserrat #graphicdesign #design #type #texture #geometric #dreams #negativewords
0 notes
thekingspress · 10 years ago
Text
The Power of Negative Thinking
The Power of Positive Thinking by Norman Vincent Peale was the first non-fictional book I read as a child. Thanks to my mother who took extra measures to ensure her daughter grows knowing that she can conquer the world with will-power, determination, and above all, Jesus. Learning to trust in God’s invisible hand of care, a smile on your face, a spring in your step, and music to your thoughts is a stepping stone to success in life.
  Yet, many a times you and I can find ourselves soaring to great heights when, suddenly, a small pebble envious brings you falling to the ground. Hurt. Handicapped.  It is amazing how the impact of one negative comment conceived in envy and malice drowns out hundreds of encouraging voices. I call it, The Power of Negative Thinking.
  So is there an escape to this prison of pessimism that someone else cast on you? Of course, the answer is Jesus!
  We have an active enemy whose ultimate motive is to kill, steal, and destroy. Satan wants us to believe that we are incapable, a failure, a disappointment, and worthless. The truth is, without the grace of God, we all are pitiful creatures trying to build castles in the air.
  But God created you and me with a great purpose and with a high calling. He does not want you to merely survive, but he wants you to thrive. Do not deprive yourself of what God has in store for you!
  When Satan tries to ruthlessly overcome you and flood you with negative thoughts, stand up and fight. You have the steering wheel to your life. You have to make the choice to live to what God has created you for. Believe that if God is for you, no one can be against you. Believe that He has the best in store for you. Believe that he will not leave you or abandon you. Know that he wants you to succeed.
  Do not let negative thoughts or words overcome you. When you feel the weight of them pulling you down because of the people around you, or the situations you face, look to Jesus because he is full of grace, love, and mercy. He will clothe you with strength and go before you to fight. He will fill you with the Holy Spirit who will guide you and counsel you. May you shine for Jesus and live to glorify His Name!
- Rev. Anisha J. Sabu
Tumblr media
0 notes
artisticfarty-blog · 11 years ago
Photo
Tumblr media
1 note · View note
stevenlombardo · 11 years ago
Text
Dangerous Words
One of the most dangerous animals is the tongue that is caged behind the den of our teeth…
Remember there is life and death in the tongue.. It always easier to destroy a building which does not require skilled labor but when a big building is being built it takes great effort…
3 notes · View notes