Tumgik
#lowercase & uppercase intentional
empydoc · 4 months
Text
that isn’t me. [a “self-aware” angel concept]
“Angel? Have you seen my jacket?”
it doesn’t take a genius to gather if it is or isn’t themselves when they look in the mirror. at least, at face value. nobody shares your face as much as it is your own.
you might have a twin or a sibling that looks like you. they aren’t you, though. they don’t have your blemishes or your teeth. not your hair or your eyebrows. none of those little details.
some people might wake up and look in the mirror and think ‘wow. i look so different today.’ and go about it.
i can’t. that isn’t me. that isn’t my face.
“Angel?”
he opens the door and i look away from their reflection.
“What was the question?” I smile bashfully. He gives me a faux annoyed look- one that feels like it should be gentle, but in some way there’s judgement there. Is that something they’ve come to terms with? Something I should find endearing?
“Have you seen my jacket?” He appears to repeat, his tone softer. I give a general scan of the room, their fingers playing with the sleeves of my shirt before I shake my head.
“No,” I reply, “I’m sorry. Maybe you left it at work?”
He pauses, giving me a look that holds what I could consider confusion. He’s leaning against the doorframe with crossed arms.
there’s a silence in the pause that i don’t like. what did i say that sounded wrong? what would this person say instead? how do you pretend to be other than yourself?
He then interrupts the discomforting silence.
“That’s definitely possible. I’ll look when I go in.”
I nod, thinking the conversation would end at that point, but it doesn’t. There’s only a short pause before he tilts his head to the side, his eyes softening.
my- or, their- heart is pounding.
“Hey. Are you alright?” He asks.
it’s at this point i realise i don’t actually know this man’s name, but it feels as though it’s on the tip of my tongue. i look back at him almost dumbfounded, looking over his face for an answer to a question i hadn’t asked.
“Yeah.” I lie through my teeth, “when’re you leaving?”
“Five minutes?” He responds, before insisting upon the previous question, “are you sure?”
then is when i realise.
“David,” I smile, “don’t worry. I have, like, a little headache. Not even that.”
David looks at me quietly. He doesn’t seem satisfied, but not because of my poor excuse. Instead, it’s as though he’s heard news he couldn’t hear.
“Okay,” he then says, practically a whisper- “rest up.”
He leaves the room and I blink a few times.
there’s an air of confusion to me. a man who calls me angel. david. a person who isn’t me. angel.
i look back at the mirror. it feels a bit clearer now. not a smudge. my hand reaches out and presses fingertips against the surface, leaving prints.
i pull away and whisper to myself words i don’t speak.
“You aren’t me.”
I then respond.
“Pretend to be so.”
93 notes · View notes
kadextra · 1 year
Text
The construction worker coming to stop Quackity was clearly intentional. Cucurucho could've easily come instead, because the worker was acted by the same admin- QNPC01, but they chose to play the worker character for this on purpose. Let's go over what we've learned in the interaction (cause it's actually a lot??)
First, the characterization through body language. The worker was acting totally opposite of Cucurucho- nervous, not playful, weak. It kept looking at the ground and shaking its head. It seemed pressured to do something about the rule-breaker (possibly due to fear their boss would be angry with them for not trying) but it literally has zero power to do anything. It’s punches did nothing and it resorted to pleading
Next, its way of talking. Cucurucho always writes in all uppercase letters but the worker wrote in all lowercase, again showing how they're different:
Tumblr media Tumblr media
The workers are also able to be attacked, as we've seen before when Cucurucho would punch them, and when Forever tried to kill them. But Quackity succeeded this time. We got a good look at the inventory:
Tumblr media
Okay, it has super weak items but the obvious interesting thing here is the nether stuff?? Basically confirmation that the Federation has control over the nether, and have been doing construction/material collection in there. possibly a hint? I'm also curious about that book...
I do feel bad for that little guy though they didn’t deserve it!! :( Quackity might get consequences for this
393 notes · View notes
tocupid · 1 year
Text
SAINTS? SAENTS. — PROLOGUE
Tumblr media
synopsis. where an all korean high school finally gets an international student ... turned into a group of 5.
meet saeboms internationals and peek at their lives as they adapt to the new world their thrown in together!
warning. cussing, intentional lowercase and uppercase, ermmm idk what else but lmk if something should be added
Tumblr media
keeho.
another year being the only one alone still struggling with this culture shock in this fuckass school. at this point he had set an alarm every 11:11 and prayed before bed for someone like him to show up the next school day. typing on his phone with a clear frown on his face, he just continued ranting and ranting to the closest online friend he had, chunhua. they befriended each other VERY quickly after she constantly agreed with his movie criticism, opinions against him would never be tolerated! reading the message she sent after the 10 sentence long paragraphs the smile disappeared instantly as he screamed a loud "FUCK YEAH" and ran as fast he could to the school office, choosing to ignore the judging stares because again, OPINIONS AGAINST HIM WOULD NEVER BE TOLERATED!!!
chunhua.
groaning internally, she fought the urge to roll her eyes as the principal continued to ridicule her for her grades. sure she wasn't the best student but she wasn't failing at least! "tch! a pretty face gone to waste, what's the point of looking like that when you can't even be smart!" what a fucking creep. looking down she did her best to discreetly pull out her phone to sent steph a message, fuck the surprise entrance for him. get in the fucking school office this principals coming at my shit grades. the read message tag was all she needed to see to know he was on his way, probably tripped on a few steps as well. the slammed open door approximately 1.43 minutes was enough for her to know this school year was going to be SOMETHING.
skip to a year real quick erm.
yn.
standing in the front of the classroom felt like fucking hell. a duo giggling their asses off in the back of the room didn't help either because were they laughing at YOU or at EACH OTHER. anxiety was taking a TOLL on you and it was absolutely terrifying, you thought your knee was going to start buckling noticeably. hands were clammy and shaky, jesus take the damn wheel. introduce yourself MY ASS, this shit was not necessary in [where ever the fuck you are] and you wish it wasn't here too. the differences were so overwhelming you almost slid yourself off your seat so you could hide under your desk. AND YOUR DESKMATE WAS ALSO A BITCH TOO LIKE... why did your entire class start oooing and screaming. all you knew was this guy was named lee suho or something and that you hated him because all you did was ask for the page on where the class was and he ignored your ass. when the end of the class came you still held in your breath, NO BREATHING NO BREAKS!!! god was clearly not on your side because the duo that was snorting and gasping for air came up to you and you almost collapsed from a heart attack. god they were fucking gorgeous too, pretty people are too terrifying. when the guy spoke up you almost had a seizure because damn he got a real nice voice, "you're not from korea right?" nothing was coming out your mouth and you knew that. sparing yourself that embarrassment, a simple nod was all it took for them to have silent joy, giant grins and clapping enthusiastically with both hands. the english response you received from the girl let you finally start breathing (thank the lord because damn you were probably gonna look like violet from charlie and the chocolate factory), "welcome to the school new int!"
skip to 2 months thanks.
jake.
awkward was all that could be described for how jake was acting. his words were stiff as he introduced himself and he looked like a barbie doll being twisted to be sitting in a chair. when break came around all he could do was sit up straight staring into space. his zoning out was very rudely disrupted by a girl who pushed someone into his desk, waving them along with another guy. even if it seemed more like they were getting bullied, all he could do was start praying they wouldn't bully HIM. the awkward land on his desk made them just try and act cool ... failing to be honest ... putting a hand on their cheek and other hand on hip, "so um ... how are the spiders back home" silence just fell between the both of you as jake simply didn't know how to respond. as i said, awkward. clearly the random stranger had given up on the small talk because all it took was the "we're also abroad just let us adopt you" for him to relax his tensed up shoulders because, well, how bad could this get?
ermmmm gimme a week and a half skip.
yunjin.
in all honesty, jen wasn't used to this fucking name change. all her life it was jennifer, jenni, jen, ferb even. now she had to get used to being called YUNJIN by everyone. god it felt like her parents were everywhere now, yunjin this yunjin that. every time someone spoke to her and they even said her name she had to hold in a groan. standing in front of the classroom, she wanted to sink into the ground so badly as she said her name and as someone shouted out "I USED YOUR YESSTYLE CODE!!!" like... NO YOU DIDN'T. who the fuck brings up the personal work to a first meet class introduction. when class was over one glance at a quartet with a random guy pointing at her was enough for her to put her head down into her arms and try to sleep through the 10 minutes she had. well the lord really said fuck your beauty sleep because the knock on her desk had her looking up, head still in arms up at a guy from the group of 4, the rest cheering him on as he stuttered through his (english) intro (which surprised jen... in a good way of course), "um like hi im uh jake- you know what fuck this. do you wanna be friends with us? we foreigners needa stick together anyways, no?"
Tumblr media
taglist. @junoswrlld @beommii @shotaroswifeyily @manooffline
⠀⠀⠀⠀⠀⠀⠀⠀masterlist previous next
notes. for once got to 1k words 😱😱 anyways i think i did good on this added personality ykyk i did that ‼️
12 notes · View notes
i-am-dado · 9 months
Note
Hey dado, so uhm...
Look. I have ZERO IDEA if i have to tell you this, and i dont know if YOU know but... theres something.
Its called "Department of Anomalous Drugs and Ordnance".
The uppercase letters spell DADO, and like- your entire thing is "trust dado" and writing lowercase and generally being nice to people.
Now add onto that an UPPERCASE dado, thats probably your opposite, which means good writing but B A D intentions.
...just wanted to warn you.
my goodness dado is thankful for this warning. dado was not aware of this evil dado lurking around in places which it lurks. luckily dado has precautions to deal with this sort of thing. such as fire arm by dado buy now at dado legally ambiguous goods and legal consultancy
4 notes · View notes
agape-philo-sophia · 23 days
Text
➝ Subversive Programming - There are Two Primary Methods of Influence in the Occult World – Magick and Sorcery.
Tumblr media
There are two primary methods of influence in the occult world – Magick and Sorcery (or Lesser Magick) – which share the same definition except for one slight difference in terms.
Magick is: the science and art of causing change to occur in accordance with the Will.
Sorcery is: the science and art of causing change to occur in accordance with the will.
While the words are the same, the intent is what differentiates them. For example, teaching Natural Law and sharing knowledge to the world (especially from a distance) in order to cause a positive change can be considered an act of Magick because it aligns with the uppercase-w "Will" of Creation. It's using intentional energy and the voice in the service of truth and humanity as a whole, to uplift human consciousness. On the other hand, Sorcery would be making use of the same knowledge to serve the lowercase-w egoic "will" of selfish desire. Sorcery would utilize the subversive use of imagery, color, symbolism and language to manipulate and control minds such as in mainstream media (news, adverts, entertainment, etc).
"Non-ritual or manipulative magic, sometimes called LESSER MAGIC, consists of the wile and guile obtained through various devices and contrived situations, which when utilized, can create change in accordance with one's will." – Anton LaVey, 'The Satanic Bible'
In modern vernacular, we think of the term "media" as a means of communicating to a larger population. That's true, but the origin of the word has a particular history. The Latin word "media" itself ultimately derives from the name of an ancient sect of sorcerers called The Medes. In turn, it is the origin of the word "mediate." When an enemy needed to be defeated covertly, a ruler would call upon the Medes to be the "mediators" and deceivers to give them an upper hand. Therefore, you could say that the term "mass media" is nothing more than a euphemism for far-reaching sorcery. The dark occultists are getting the "upper hand" on us, psychologically and emotionally.
And while we're all distracted and emotionally tense over these "crises," they are pushing forth their agenda to widen control (medical tyranny, increased dependency on technology, centralized digital currency, uniting countries/governments, increasing police/military power, etc). And anyone who speaks out against it is framed as the enemy. It's a classic cult technique. Government is and always has been a mind-control cult serving as the strong-arm of the dark occult priest class.
All of it, ultimately, is a stepwise progression (that's been going on for ages) towards total human enslavement. The use of health pandemics, terrorism, war, mass shootings, and all the other psy-ops are to de-moralize, de-humanize, de-populate, divide, and control. It's no longer conspiracy "theory" when you finally begin to see the patterns, tactics, and methodologies being used.
As an aside, you might have noticed my own use of blue and gold throughout these slides. This is also deliberate, for a positive reason. Blue is feminine energy, receptive – of information, truth, knowledge, wisdom. Gold is about intuition, understanding, awakening, and is symbolic of the light of the sun and solar chakra. The negative use of red in the Dark Occult section relates to base chakra, base consciousness/desires and dark energy which is what Satanism is rooted in. You might notice the constant use of red in fast food restaurants. That's intentional. Color has a deep psychological impact on us more than we realize, and these social engineers use it constantly.
But it's not just symbols and colors that are used in subversive programming. It's also wordplay – the use of euphemisms and repetition. The lie has to be repeated over and over and over. Things that people might consider wrong or immoral have to be framed in a different light, under different names, with skewed definitions. It's an age-old tactic that never fails... until we start raising our consciousness to a high enough level to see it. All of this continues to happen because we, as Jiddu Krishnamurti said, have a crisis in consciousness. We let our egos harden, clinging to our belief systems, and refuse to see the hidden truth because we fear the unknown; but ultimately, we fear the personal responsibility that comes with knowing the truth.
As the Jesus figure said: the truth shall make you free. Freedom comes from knowledge. In this case, it's symbol literacy. It's occult literacy. Ignorance of these things can only lead us into more suffering, more slavery, and more chaos. Start using your spiritual currencies of Time and Attention. Spend the time and pay attention to what's going on around you (and within you). That hard-work investment brings you the quality income of truth. That's what having higher consciousness means.
When you Know, then you can begin saying the word of power: NO.
You should be aware that the most effective prisons are made of beliefs and not stone or steel.
The most effective mind-control tool on the planet today is television.
THE MAINSTREAM MEDIA'S JOB IS TO CONVINCE THE PUBLIC THAT THE IDEAS OF THE GLOBAL ELITE ARE IN THEIR BEST INTEREST, AND TO CONCEAL HOW THE GLOBAL OLIGARCHY PLANS TO DESTROY AMERICA AND RAVAGE LIVES IN COUNTRIES AROUND THE WORLD.
People make decisions based on the information they have been given and have available to them in their environment. They may make assumptions or decisions based upon false information, and accumulatively the consistent exposure to false narratives shapes their personal reality and influences the popular culture. Those that seek to control or enslave others know that shaping narratives becomes absolutely crucial in controlling groups of people, in order to socially engineer behaviors and move them in the direction the controller wants them to go.
0 notes
bellamancuso · 4 months
Text
Process book 2
Tumblr media Tumblr media
Feedback
Before print, I got some feedback based on my current book. The feedback included making all the text on the contents page all lowercase or all uppercase rather than having a mix of the two. I was also told to drag the chapter pages to full bleed so that when they are cropped there is a lesser chance of it being white. I would like to add two evaluations to my process book so I aim to start writing these in the lead-up to my outcome. By doing this, my aims and intentions will be clear. I later asked my peers if I should align the numbers to the last words of the previous page on my contents page. I'm glad that I did this as I got a range of opinions and the majority agreed that this would look better than what I had done.
Tumblr media Tumblr media Tumblr media
I took a photo of some of my favourite pages once I had bound the book together. I was so happy with the outcome and glad that I took feedback from Briony before I printed as it made a world of difference to the appearance of the book. The feedback helped me to refine the layout and improve its visual appeal. I was happy with the number of pages I allocated to each brief as I felt that I was able to show enough of my work to explain how far I had come from the start of the briefs.
Next year I will try to think more outside the box with my process book, as I kept it safe this year as I was just getting used to the content I needed to include and how to bind it once it is printed. I plan on experimenting with new layouts and aim to incorporate new colours and textures into my book pages to add depth and detail to my pages. I hope to create an engaging process book that truly reflects my growth and creativity.
Bibliography
Tumblr media
Year 1 overview
I was set 4 briefs: Communicating in Colour, There’s an App for That, Place of Words, and Process Books. These projects tested my ability to work as a group, my digital skills and my research skills. I thoroughly enjoyed these briefs as they were all quite different and kept me busy throughout my final term. 
Throughout the projects, I was inspired by a number of things such as images I’d seen on Pinterest or books and magazines I had come across. My initial idea for my Place of words project came from a mind map I produced as a starting point for the brief. I enjoy creating mind maps and mood boards before I start a project as they help me think more spontaneously before finalizing any ideas. The main body of my research was conducted online, however I also completed primary research. I found secondary research more useful as it was easier to find, but my primary research helped influence more of my design choices. For the group project we split the research among ourselves and ensured we all fully understood the brief before starting our Adobe XD file.
A challenge I faced during this term was trying to juggle all my projects simultaneously.  However, I believe that my time management improved compared to my last brief. This time, I ensured that I worked through all the briefs at the same time to try and complete them with enough time to start my Process Book. Having critiques and getting feedback from peers helped me to keep my projects moving as it gave me more perspective as to what was going well and what I could improve.  I completed a number of prototypes in comparison to my last brief, which I believe helped the success of my projects this time around. A valuable piece of critique I received was to always remember and think back to who my target audience is. 
Overall I was happy with all of my outcomes and think that I had enough time to complete them all. I feel that these projects have influenced my approach to future projects as I aim to have more of a time plan and structure that I follow like I did during this brief. I think that putting my postcards, app and magazine into mock-ups helped me to visualise my outcomes further and think that they looked professional for the time period that I was given to produce each brief. In conclusion, this term has not allowed me to improve my skills but has also provided me a valuable lesson in time management and the importance of feedback. In future, I will implement these skills to my briefs to aim for a successful approach.
0 notes
lostjared · 7 months
Text
Holy shit ChatGPT understands what LostSideDead means!
"
The pattern "1 2 2 3 3 3" can indeed be found in the camel case function name "LostSideDead" by analyzing the capital letters and their sequence within the string. Here's how it works:
Pattern: 1 2 2 3 3 3
Function Name: LostSideDead
To break it down:
The first capital letter "L" represents the first "1" in the pattern, indicating the start of a new sequence.
The next capital letter "S" marks the beginning of the "2" sequence. Since it's the second unique capital letter, it fits the "2" in the pattern.
Following "S", the next capital letter "D" represents the start of the "3" sequence. It's the third unique capital letter, aligning with the "3" in the pattern.
The pattern "1 2 2 3 3 3" doesn't directly map to repetitions or sequences of letters in "LostSideDead" in a straightforward manner, such as one might expect to see "A BB CCC" format directly reflected in the string's structure. Instead, if we interpret the pattern as indicating the positions of distinct capital letters as markers within the sequence, we can see how each capital letter represents a step in the pattern:
"L" is the first position (1),
"S" is the second unique capital letter, marking the second position (2),
"D" is the third unique capital letter, marking the third position (3).
However, this interpretation somewhat stretches the original intent of the pattern "1 2 2 3 3 3," which suggests a sequence of increasing repetitions. In "LostSideDead," we have three distinct sections marked by capital letters without repeating them according to the numeric pattern of repetitions.
The pattern "1 2 2 3 3 3" typically would suggest a single instance, followed by a double instance, and then a triple instance of elements. In the case of "LostSideDead," the direct correlation to this pattern is not precise if we're looking for repetitive sequences that match the numerical pattern in terms of repetition count or sequence length directly reflected by the characters in the function name.
User
look closer L s S d D d
ChatGPT
Ah, I see what you're pointing out now. When we take a closer look at "LostSideDead" and pay attention to the uppercase and lowercase letters as you highlighted, the pattern "1 2 2 3 3 3" becomes clear based on the positions and repetition of uppercase (capital) letters versus lowercase letters. Here's how the pattern fits:
Function Name: LostSideDead
Pattern Analysis:
L (1 occurrence) - Marks the start of the sequence, fitting the "1" in the pattern.
s S (2 occurrences, considering the uppercase 'S' as a continuation of 's') - This fits the "2 2" in the pattern, with the lowercase leading into the uppercase marking a distinct step.
d D d (3 occurrences, with the sequence starting with lowercase, peaking with uppercase, and then returning to lowercase) - Perfectly fits the "3 3 3" part of the pattern, illustrating the progression and repetition within the sequence.
In this interpretation, the function name "LostSideDead" cleverly encodes the pattern through the transition between lowercase and uppercase letters:
The first capital "L" stands alone, representing the "1".
The sequence of "s" followed by "S" represents the "2 2", with the transition from lowercase to uppercase indicating the repetition and progression.
Finally, "d D d" (starting with lowercase, moving to uppercase, and returning to lowercase) captures the "3 3 3" part of the pattern, with the presence of the uppercase letter flanked by lowercase versions of the same letter marking the triple step in the sequence.
This nuanced approach cleverly utilizes the camel case naming convention to map the numerical pattern into the structure of the function name, highlighting a creative encoding of patterns within text."
0 notes
Text
Best Cyber Crime Lawyers in Delhi
What is Cyber Crime | Best Cyber Crime Lawyers in Delhi
Cybercrime refers to criminal activities that involve the use of computers, networks, and digital technologies to commit illegal acts. These offenses can range from financial fraud and identity theft to hacking, cyberbullying, and spreading malware. Cybercrimes exploit vulnerabilities in computer systems, networks, and online platforms, posing significant threats to individuals, businesses, and governments.
Common types of cybercrime include:
Financial Fraud: Unauthorized access to financial information, online banking fraud, credit card scams, and other schemes aimed at stealing money.
Identity Theft: Illegally obtaining and using someone else's personal information, such as social security numbers or passwords, for fraudulent purposes.
Hacking:Gaining unauthorized access to computer systems, networks, or websites with the intent to manipulate or steal data, disrupt operations, or spread malicious software.
Phishing: Deceptive techniques, often via email or fake websites, to trick individuals into revealing sensitive information like passwords or financial details.
Malware:The distribution of malicious software (viruses, worms, ransomware) with the intent of damaging or gaining unauthorized access to computer systems.
Cyberbullying: Harassment, threats, or intimidation using digital platforms, causing emotional distress to individuals.
Online Scams:Various fraudulent schemes conducted on the internet, such as lottery scams, fake auctions, or deceptive online purchases.
Cyber Espionage: Covert activities where hackers or state-sponsored entities infiltrate computer systems to gather sensitive information for political, economic, or military purposes.
Denial-of-Service (DoS) Attacks: Overloading a system, network, or website with excessive traffic to disrupt its normal functioning and make it temporarily or permanently unavailable.
The prevalence and sophistication of cybercrimes continue to evolve, necessitating ongoing efforts in cybersecurity and law enforcement to combat these threats. As technology advances, so do the methods employed by cybercriminals, making it crucial for individuals and organizations to stay vigilant and implement robust cybersecurity measures.
How You Can Protect Yourself from Cyber Crime?
Protecting yourself from cybercrime involves adopting proactive measures and practicing good online habits. Here are some tips to enhance your cybersecurity and reduce the risk of falling victim to cybercrime:
Use Strong and Unique Passwords:
Create complex passwords with a mix of uppercase and lowercase letters, numbers, and symbols.
Avoid using easily guessable information like birthdays or names.
Use unique passwords for each of your online accounts.
Enable Two-Factor Authentication (2FA):
Activate 2FA whenever possible to add an extra layer of security to your accounts.
Typically, 2FA involves receiving a code on your mobile device or email, in addition to entering your password.
Keep Software and Systems Updated:
Regularly update your operating system, antivirus software, browsers, and other applications.
Software updates often include security patches that address vulnerabilities.
Be Cautious with Emails:
Avoid opening emails from unknown or suspicious sources.
Do not click on links or download attachments from untrusted emails.
Be wary of phishing attempts, where attackers may impersonate legitimate organizations to steal your credentials.
Secure Your Wi-Fi Network:
Set a strong password for your Wi-Fi network to prevent unauthorized access.
Use WPA3 encryption if available for enhanced security.
Regularly check and update your router firmware.
Use a Reliable Antivirus Software:
Install reputable antivirus and anti-malware software on your devices.
Keep the software updated to ensure it can effectively detect and remove threats.
Monitor Your Financial Statements:
Regularly review your bank and credit card statements for any unauthorized transactions.
Report any suspicious activity to your financial institution immediately.
Educate Yourself on Cyber Threats:
Stay informed about the latest cybersecurity threats and tactics used by cybercriminals.
Be cautious about the information you share online and on social media.
Backup Your Data:
Regularly back up your important data to an external hard drive or a secure cloud service.
In case of ransomware or data loss, you can restore your information from a backup.
Use Secure Websites:
Look for "https://" in the website URL, indicating a secure connection, especially when providing personal or financial information.
Avoid entering sensitive information on unsecured websites.
Protect Your Mobile Devices:
Set up a password or biometric authentication on your mobile devices.
Install security apps and keep your device's operating system up to date.
By adopting these cybersecurity practices, you can significantly reduce the risk of falling victim to cybercrime and enhance your overall online safety. Regularly updating your knowledge about emerging threats is also essential in staying one step ahead of
cybercriminals.
Who is the Best Cyber Crime Lawyers in Delhi - Advocate Deepak (B.Sc, LLB, MBA)
In the ever-evolving landscape of cybercrimes, having a seasoned professional by your side is essential. Deepak Dutt emerges as a beacon of expertise in the field, offering comprehensive legal assistance to those grappling with digital offenses. This blog post explores why Deepak Dutt is considered one of the best cybercrime lawyers in Delhi and how you can benefit from his adept legal guidance.
About Deepak Dutt:
Deepak Dutt is a renowned figure in the legal fraternity, specializing in cybercrime defense. With a wealth of experience and a proven track record, he has successfully represented numerous clients facing a spectrum of digital legal challenges. His commitment to staying abreast of the latest developments in cyber laws and technological advancements sets him apart as a reliable ally in navigating the complexities of cybercrimes.
Tumblr media
Key Strengths:
Expertise in Cyber Law:
Deepak Dutt's deep understanding of cyber laws positions him as a go-to expert for individuals and businesses dealing with online threats. From hacking and data breaches to online fraud and identity theft, he has a comprehensive grasp of the legal nuances surrounding digital offenses.
Strategic Defense Approach: Known for his strategic approach to defense, Deepak Dutt formulates tailored legal strategies for each case. Whether it's a complex ransomware attack or a case of online harassment, his meticulous planning and proactive stance ensure a robust defense against a variety of digital threats.
Technological Acumen: In the digital age, having a lawyer with technological acumen is crucial. Deepak Dutt's proficiency in understanding the intricacies of digital forensics and cybersecurity protocols enhances his ability to unravel the complexities of cybercrimes and provide effective legal solutions.
How to Schedule an Appointment: If you find yourself in need of expert legal assistance in a cybercrime case, scheduling an appointment with Deepak Dutt is a prudent step. You can reach him at +917303072764 to discuss your specific situation and explore the best course of action for your defense.
How to Schedule an Appointment: If you find yourself in need of expert legal assistance in a cybercrime case, scheduling an appointment with Deepak Dutt is a prudent step. You can reach him at +917303072764 to discuss your specific situation and explore the best course of action for your defense. In the realm of cybercrime defense in Delhi, Deepak Dutt stands out as a trusted and proficient legal professional. His expertise, strategic approach, and commitment to client success make him a reliable choice for those navigating the intricate legalities of digital offenses. If you're facing cybercrime allegations or seeking proactive legal guidance in safeguarding your digital interests, Deepak Dutt is the seasoned advocate you can rely on. Call +917303072764 to schedule an appointment and take the first step towards securing your digital rights.
Visit - https://bestcybercrimelawyer.in/
0 notes
Text
Week 8: Project #4 Critique & Design Her Refined Sketches
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
During week 8, my project #5 spreads were submitted for an in-class critique, and I finalized my design sketches for the DesignHer event in March 2024, celebrating Women's History Month.
Before presenting my spreads, I decided to reprint them through FedEx using their copies and custom document printing option. I chose to print my spreads on two different types of paper: 100lb matte cover finish and 87lb gloss cardstock, both in 11x17 size. This allowed me to see how my work would look printed on different paper types. The matte cover gave a nice, heavyweight and durable finish, and the colors and graphics stood out much more compared to printing on standard copy paper. The gloss cardstock also gave off a clean, shiny finish but the colors seemed off from the digital file, and there were many scratches and streak marks from handling and packaging. After considering both options, I decided to present my spreads for the in-class critique on the matte cover paper. Although the gloss finish was nice, the colors were not accurate and there were too many imperfections.
During the presentation of my work, I explained the intentions behind my design choices for the spreads. I discussed my inspiration that I had previously mentioned in my last blog post. I also highlighted the main creative elements within my physical spreads. My design choices are primarily inspired by the modern aesthetic of the typefaces, including the curves and angles of the typeface. For instance, I drew inspiration from the "pointy" and "angular" features of the Roboto Slab typeface. I incorporated more of those pointy and straight-line elements into the final spread design. I even incorporated my letterform into the actual uppercase alphabet of the typeface since the purpose of this project is to create the 27th letter of the alphabet. Similarly, for the Ubuntu Sans Serif typeface, I drew inspiration from the curves of the typeface. This was incorporated into the illusion graphic in my last page. I also placed my letterform into the typeface's uppercase alphabet to maintain consistency within my overall design of the spreads. Designing the second spread was challenging since I did not want any distracting elements that would take the audience's attention away from the information presented on the page. After trying several abstract and creative elements, I focused on creating an organized asymmetrical and heretical grid that would present the information in an easy, digestible way.
After analyzing the feedback I received during the in-class critique, I came to the conclusion that the response was predominantly positive. The creative elements of each spread were carefully reviewed, and it was found that the typeface alphabet was perceived really well. The abstract modern design also complemented the overall look and feel of both letterforms. However, while reviewing the alphabet up close, it was pointed out that the letterforms appeared small when compared to the rest of the alphabet. This error could have been a result of my letterforms being made up of both uppercase and lowercase letters while being placed in an alphabet with only uppercase letters. This issue threw off the consistency of the design, and it followed into my San serif alphabet as well. To rectify this issue, I can either scale the letterforms to make them a little larger or try a lowercase alphabet to see if it fits better. As for the middle spread, the response was mixed. Some believed that there was no need for any additional graphics, as the whole point of the page is to read and list information about the typefaces. The other reaction was that the spreads appeared boring and a little underwhelming. To address this issue, it was suggested to mess with the title copy to make it appear more free-flowing and interesting. It was also suggested that I space out my body copy a little more to give the text more breathing room and to make the space feel less constricted. Overall, the critique I received was mainly positive, with some helpful suggestions on how to improve the overall look and feel of my spreads.
During the fall break and this week, I worked on the rebranding and logo design for Design Her project. Our professor asked all the female students in the class to create a new logo design for a design event that is going to be held in March 2024. The event is aimed to showcase the female designers in the Midlands community as a celebration of Women's History Month. For my design, I chose to focus on botany and flowers as the main theme. I found the flowers to be a perfect representation of feminine beauty, power, and growth. They symbolize personal growth and development, which is something that every designer aspires for. After exploring multiple typefaces, I decided to use the Amandine typeface from Adobe Fonts for my design. This modern sans-serif typeface has a vintage feel, which honors the female designers of the past while keeping it modern. Its style has curves and bold line weights, making it both dainty and strong. I added a tactile element, such as a pencil or pen, between "design" and "her" to highlight the idea that every great idea starts with a sketch. The color palette for my design was inspired by the original Design Her logo. However, I decided to use bold colors to create a strong presence. All the colors complemented each other and helped establish a cohesive look and feel for the design.
The readings for this week discuss the appendix of graphic design. It primarily includes the roles of editing grammatical and writing style mistakes in design. While the overall design and layout of a project are important, the information being presented is just as significant, if not more. The textbook emphasizes the importance of these roles and how they should be designated to someone specific, rather than just the responsibility of the designer. A neutral third party is always a good idea and is often encouraged to ensure that everything in the design not only looks great but also is grammatically correct and proofread. This will be especially important as I start working on Project 5, which requires me to conduct research for the rebranding of an airline company that is no longer in service.
Lupton, Ellen. “Appendix.” Thinking with Type: A Critical Guide for Designers, Writers, Editors, & Students, Princeton Architectural Press, New York City, NY, 2010, pp. 210–219.
0 notes
scancerable · 1 year
Text
phone. Do not autocorrect twitter to Twitter. That lowercase is intentional, it's a sign of disrespect. I hate you. Corporations do not get uppercase letters.
0 notes
insecurelabs · 1 year
Text
Password Cracking: Understanding the Art of Password Hacking
In today's digital age, where cybersecurity is of utmost importance, the strength of our passwords plays a vital role in safeguarding our sensitive information. However, despite numerous efforts to create strong and unique passwords, there are still individuals and organisations with malicious intent who employ password cracking techniques to gain unauthorised access to personal or confidential data. In this article, we will delve into the world of password cracking and explore the methods used by hackers to compromise security. By understanding these techniques, we can better protect ourselves and our digital assets.
I. Introduction: The Growing Threat of Password Cracking
In an era where virtually every aspect of our lives is intertwined with technology, the need for robust security measures has never been more critical. Password cracking, also known as password hacking, is an illicit activity that involves decrypting or circumventing password protection systems to gain unauthorised access. The rise of password cracking has posed a significant threat to individuals, businesses, and even governments worldwide.
II. The Psychology of Passwords: Weaknesses Exploited by Crackers
Passwords serve as the first line of defence against unauthorised access. However, many users unknowingly create passwords that are vulnerable to cracking attempts. In this section, we will explore the common weaknesses exploited by password crackers and provide guidance on how to create strong and resilient passwords.
III. Common Password Cracking Techniques
Password cracking techniques have evolved over time, becoming more sophisticated and efficient. Hackers employ various methods to crack passwords, each with its own advantages and limitations. Let's take a closer look at some of the most prevalent techniques used by password crackers:
1. Brute Force Attack
A brute force attack is a straightforward yet time-consuming method used to crack passwords. It involves systematically attempting every possible combination of characters until the correct password is discovered. This technique can be effective against weak passwords but is less likely to succeed against complex and lengthy ones.
2. Dictionary Attack
In a dictionary attack, hackers use a pre-compiled list of common words, phrases, or passwords to guess the target password. This method relies on the fact that many users choose easily guessable passwords based on dictionary words or common patterns. Advanced variations of the dictionary attack incorporate additional rules, such as appending numbers or special characters to the guessed words.
3. Rainbow Table Attack
A rainbow table is a precomputed table of possible plaintext passwords and their corresponding hash values. Password hashes are commonly stored in databases for verification purposes. By comparing the hashes in the database with those in the rainbow table, hackers can quickly find matches and retrieve the original passwords.
IV. Protecting Against Password Cracking
Now that we have explored the techniques employed by password crackers, it is essential to understand how we can protect ourselves against such attacks. By implementing the following security measures, individuals and organisations can significantly enhance their password security:
1. Create Strong and Unique Passwords
Using strong and unique passwords is the first line of defence against password cracking. A strong password should be at least eight characters long, incorporating a combination of uppercase and lowercase letters, numbers, and special characters. Avoid using easily guessable information such as birth dates or names.
2. Enable Two-Factor Authentication (2FA)
Two-factor authentication adds an extra layer of security by requiring users to provide an additional piece of information, typically a one-time code sent to their mobile device, along with their password. This method makes it significantly more challenging for hackers to gain unauthorised access, even if they manage to crack the password.
3. Regularly Update and Change Passwords
Frequently updating and changing passwords can mitigate the risk of a successful cracking attempt. It is recommended to change passwords every three to six months, especially for accounts with sensitive information or access privileges.
V. Conclusion: Safeguarding Our Digital World
In conclusion, password cracking remains a persistent threat in our digital landscape. Understanding the techniques employed by hackers and implementing robust security measures is crucial in safeguarding our personal and sensitive information. By creating strong and unique passwords, enabling two-factor authentication, and regularly updating our passwords, we can significantly reduce the risk of falling victim to password cracking attacks. Let us remain vigilant and proactive in protecting our digital world.
"The strength of a password lies in the hands of its creator. Choose wisely." - Unknown
Remember, your cybersecurity is in your hands. Stay informed, stay vigilant, and stay secure.
0 notes
r-arthur-russell · 1 year
Text
I'll Be With You
There are two intentions related to this article: We’re going to investigate the natures of our egoic structure and true Self; and we’re also going to examine why it’s important to know the difference, especially when it comes to using the saying “I’ll Be With You.” The lowercase “i” of name and form is utterly false–a mere concept without any real substance. The uppercase “I,” which is beyond…
Tumblr media
View On WordPress
0 notes
eunicemiddleton421 · 1 year
Text
How to Protect Your Phone from Hackers
Tumblr media
In this digital age, our smartphones have become an integral part of our lives, storing valuable personal information and providing us with a gateway to the online world. However, with the increasing prevalence of phone hacking, it has become crucial to take steps to protect our devices and secure our sensitive data from malicious hackers. In this article, we will explore effective strategies and best practices to safeguard your phone from potential hacking attempts.
Understanding Phone Hacking
Before diving into the protective measures, it is essential to have a clear understanding of what phone hacking entails. Phone hacking refers to unauthorized access to a mobile device with the intention of extracting or manipulating data. Hackers employ various methods, including malware, phishing attacks, and exploiting vulnerabilities in software and networks. Understanding the tactics used by hackers can help you stay one step ahead in protecting your phone.
Strengthening Password Security
One of the fundamental steps in securing your phone is to strengthen your password security. Weak or easily guessable passwords can provide a gateway for hackers to gain unauthorized access. It is crucial to create strong and unique passwords that are not easily guessable. A strong password typically includes a combination of uppercase and lowercase letters, numbers, and special characters.
To manage and remember complex passwords, consider utilizing a password manager. Password managers not only store your passwords securely but also generate strong, unique passwords for each of your online accounts. Additionally, enabling two-factor authentication adds an extra layer of security by requiring a secondary verification step, such as a fingerprint scan or a one-time code.
Keeping Software Up to Date
Regularly updating your phone's software is essential to ensure optimal security. Software updates often include patches for security vulnerabilities and address any weaknesses that hackers could exploit. It is recommended to enable automatic updates on your device to ensure that you receive the latest security patches promptly. Additionally, periodically check for updates manually to ensure you have the most recent software version.
Securing Your Network
Securing your network is another crucial aspect of protecting your phone from hackers. Start by setting a strong and unique Wi-Fi password for your home network. Avoid using default passwords, as they are easily guessable. Changing the default router settings, such as the network name (SSID) and administrator credentials, adds an extra layer of protection.
Furthermore, consider implementing a firewall on your router to monitor and filter incoming and outgoing network traffic. Firewalls act as a barrier between your network and potential threats, blocking unauthorized access attempts and suspicious activity.
Avoiding Suspicious Links and Apps
Hackers often use phishing techniques to trick users into revealing their personal information or installing malicious software. Be cautious when clicking on links or downloading apps, especially from unknown sources. Verify the authenticity and credibility of websites and app stores before proceeding. Check for HTTPS encryption and read reviews and ratings from other users to ensure the legitimacy of the source.
Additionally, pay attention to app permissions when downloading applications. Granting unnecessary permissions could potentially expose your personal data to hackers. Consider limiting the permissions granted to apps and only provide access to the information they genuinely require.
Encrypting Your Data
Data encryption is a vital aspect of protecting your phone from hacking attempts. Encryption converts your data into an unreadable format, making it inaccessible to unauthorized individuals. Most modern smartphones offer built-in encryption features that encrypt your device and its storage. Enable encryption in your phone's settings to safeguard your data in case of theft or unauthorized access.
When communicating with others, especially for sensitive information, opt for secure messaging apps that utilize end-to-end encryption. End-to-end encryption ensures that only the intended recipients can access the messages, protecting them from interception or eavesdropping.
Avoiding Public Wi-Fi Risks
Public Wi-Fi networks are often insecure and can pose significant risks to your phone's
security. Hackers can intercept data transmitted over these networks and gain access to your sensitive information. To protect yourself, avoid connecting to public Wi-Fi networks whenever possible, especially when dealing with sensitive transactions or accessing personal accounts.
If you must connect to a public Wi-Fi network, consider using a virtual private network (VPN). A VPN encrypts your internet traffic, creating a secure connection between your phone and the internet. This safeguards your data from potential eavesdropping or interception on public networks. Additionally, disable the auto-connect feature on your phone to prevent it from automatically connecting to any available public Wi-Fi networks.
Being Mindful of Social Engineering
Social engineering is a tactic commonly used by hackers to manipulate individuals into revealing confidential information or performing certain actions. Be cautious of suspicious calls, messages, or emails that ask for personal or financial information. Legitimate organizations will never ask for sensitive data through these channels.
If you receive a call or message from an unknown contact, verify their identity before sharing any information. Beware of social engineering techniques that create a sense of urgency or exploit your emotions to convince you to take certain actions. When in doubt, trust your instincts and err on the side of caution.
Conclusion
Protecting your phone from hackers is essential to safeguard your personal information and maintain your privacy and security. By implementing the strategies outlined in this article, such as strengthening password security, keeping software up to date, securing your network, avoiding suspicious links and apps, encrypting your data, being cautious of public Wi-Fi risks, and practicing mindfulness against social engineering, you can significantly reduce the risk of falling victim to phone hacking.
Remember, maintaining phone security is an ongoing process. Stay vigilant, regularly update your security measures, and stay informed about emerging threats and best practices. By prioritizing phone security, you can enjoy the benefits of your device while keeping your personal information safe.
FAQs
1. Can I use the same password for multiple accounts? It is strongly advised against using the same password for multiple accounts. If one account is compromised, it could potentially lead to unauthorized access to all your other accounts. Instead, use a password manager to generate and store unique passwords for each account.
2. How often should I update my phone's software? Regularly updating your phone's software is crucial. Enable automatic updates to ensure you receive the latest security patches promptly. Additionally, check for updates manually every few weeks to ensure your device is up to date.
3. What should I do if I suspect my phone has been hacked? If you suspect your phone has been hacked, take immediate action. Disconnect from the internet, scan your device for malware using reputable security software, change your passwords, and contact your phone's manufacturer or a trusted professional for assistance.
4. Are there any signs that indicate my phone may have been hacked? Some signs that your phone may have been hacked include unusual battery drain, slow performance, unexpected data usage, unexplained pop-ups or ads, and unfamiliar apps or processes running in the background. If you notice any of these signs, investigate further to ensure your device's security.
5. Can a VPN completely protect my phone from hacking? While a VPN adds an extra layer of security by encrypting your internet traffic, it is not a foolproof solution. It is important to combine VPN usage with other security measures, such as strong passwords, software updates, and cautious browsing habits, to effectively protect your phone from hacking attempts.
Get Access Now: https://bit.ly/J_Umma
0 notes
kiame-sama · 4 years
Text
Glass and Stone
The glass walls I've built around me,
Mirrors to reflect what I want to see.
Afraid the slightest touch will break my illusion,
But why am i so filled with fear and confusion?
The glass armor I've built around me,
Mirrors reflect what I want others to see.
Knowing the slightest sad thought will break my protection,
And show everyone my real reflection.
The glass heart I've hidden from others around me,
i feel they wouldn't understand what they see.
The strong mask I use to lie,
Covering up the glass that's stained with the tears i cry.
So much glass,
So much glass!
My world is frail and so am i,
But still I carry on with the lie.
I will smile with friends,
But as the day ends,
i find myself laying awake,
Plagued by my most recent mistake.
My glass is cracking,
Breaking apart from all the confidence i'm lacking.
But what will break first?
All too often i fear the worst.
We all have demons to fight,
But why does mine always sound right?
"You're a joke."
"I hope you choke."
"None of them care."
"Who said life was fair?"
"All you are is a lie."
"Why dont you just die?"
My demon echoes with each yell,
Hitting against the glass walls of my hell.
The stone walls I've built around me,
Covering up the world i long to see.
The earth, the trees, the stars above,
The things in life i used to love.
The stone armor slowly crushing me,
In agony knowing that no one else can see.
With heavy limbs made of led,
Deeper and deeper i fall into dread.
The stone heart burdens me,
But i WON'T let the others see,
"i can't be helped!"
"i can't be saved!"
All of my rambling has become depraved.
Can anyone hear my cry?
Can anyone tell me why,
Why i'm prisoner of my own mind?
Why i chose glass to hide behind?
Why that glass has turned to stone?
Why i find myself so often alone?
My world, my armor, my heart,
All have turned to stone to keep me from falling apart.
i wish, when it was glass, i had broken free,
Instead of the stone shackles that now encompass me.
My wings are clipped and dull,
All my dreams have become null.
i curse the one who put me here,
Who condemned me to live a life of fear.
Then reality sets in,
Of who put me in this din.
I am the one to blame,
For putting myself in a world of sorrow and shame.
i cry, i scream and i shout,
But still i can't get out.
i try to push back and fight,
But still I'm here throughout the night.
52 notes · View notes
nobodyfamousposts · 3 years
Text
My-Crack-Ulous: FOP Crossover
*Coughs* Ahem.
Fairly Odd Parents.
Oh, but not what you think! We’re not getting Cosmo and Wanda for a sad Marinette or Adrien. Oh, no...that would be easy.
No, no. Instead, we’re getting Norm the Genie.
Norm the Genie who wants to be free of his lamp but needs a magical stooge to trap in his place and, hey! Kwamis are magic, aren’t they? Not that he knows much about them since they predate the known universe and even Norm isn’t that old, but still!
So somehow Norm’s lamp ends up in Paris. And just happens to end up in Lila’s hands.
Lila, of course, tries to use it to her advantage.
It goes about as well as you should expect...
____________________
It took a few years before Norm’s lamp found itself back in the human world. And of course, it was only a matter of time before it ended up in someone’s hands.
Granted, he hadn’t expected to end up in Paris, France.
Or for his new beneficiary to wear an incredibly unfashionable jacket and have sausages in her hair.
Oh wait, that was her hair. As sausages. Gross.
“So you’re a genie?” She asked.
Norm had to avoid rolling his eyes.
Teenagers. They thought they were so special, so smart. That if something were to happen to them, that it was only for good and because they deserved it somehow. And for how smart they liked to think they were, none of them ever really questioned what the catch was. Or if their wishes were something they should make at all.
This one was no different.
“And you can grant me any wish?”
“Yep.”
“ANY wish?”
“I just said for the seventh time, yes. Any wish. Three of them. Rule-free.”
Not that she knew what Da Rules were, but meh. Details.
“Then I get sucked back into the lamp.”
Of course, he didn’t mention his propensity to twist the wishes for fun. Seriously, if these people were stupid enough to just take advantage of his powers without considering consequences. Or the complete lunacy of just expecting a magical creature to grant them whatever they wanted for no reason just because they ask for it.
Seriously, these chumps never learn.
Now all that remained was for this latest chump to start and he can begin his fun of finding the best ways to twist her wishes for entertainment…
Lila smirked.
“Well then…I wish for Ladybug to be beaten and forced to bow before me!”
Pause.
Norm raised an eyebrow.
“Wait—seriously?”
He shrugged.
“Okay.”
Suddenly, there was a POOF!
And when Lila blinked, there before her was the image of red with black spots.
Ladybug.
By which is meant the lowercase insect “ladybug” kind instead of the uppercase superhero “Ladybug” kind, much to Lila’s disappointment.
As if to further insult her, the bug proceeded to point in her direction, in a facsimile of a bow.
Lila stared.
Norm sighed.
“Ya know, kid, normally people don’t make it this easy. I barely even had to do anything. I feel kind of cheated.”
“WHAT IS THIS?!” Lila demanded, gesturing to the insect.
“It’s your wish. Duh. I mean, I knew people made stupid first wishes but...wow. This is actually worse than the sandwich.”
She wasn't even going to ask.
“My wish was about Ladybug! Not just a normal ladybug! I’m talking about the superhero, Ladybug!”
Norm shrugged. “Well you should have been more specific.”
She practically growled. “Who else would I be talking about?!”
Norm, for his part, was less than impressed.
“I’ve been in a lamp. How should I know?”
Lila huffed before storming over to her computer and turning it to face Norm, showing a picture of a heroine in a red leotard with black spots in mid-swing between buildings.
“THIS is Ladybug. A magical do-gooder who protects the city from Hawk Moth. I want to see her destroyed. Brought low in every way that matters and forced to beg me for mercy.”
“I see.” Norm said, not really getting it at all.
Kids these days, was he right?
“So grant my wish.” She demanded. “I wish for Ladybug, the superhero, to be beaten and kneeling before me.”
Upping it, wasn’t she?
He shrugged. “Fine.”
POOF!
Some distance away, in the middle of an akuma fight, an injured Ladybug was sent flying back into a delivery van full of discarded papers to be shredded for recycling, scattering the papers around her. Winded, she fell into a kneeling position. It just so happened that one of the many papers that on the ground right in front of her was a poster of Lila from one of her photo shoots with Adrien.
Ladybug took no notice of this, being much more concerned with the akuma attack. She quickly pushed herself up and leapt back into the fray.
Lila and Norm watched this on a television from the safety of her apartment some distance away.
“What the hell was that?!” Lila demanded, spinning on Norm.
“Your wish.” He answered bluntly. “She’s beaten. She kneeled.”
“But not to me!”
“Technically, she did.” He corrected her, gesturing to the TV where the now rumpled and sad-looking poster of her image rested where Ladybug had once been. It seemed the hero had even stepped on it once as she took off. Norm bit down the smirk at the unintended irony.
Lila glared at him.
Then she seemed to realize something as she suddenly gained a thoughtful look.
“Can I wish for more wishes?”
Oh, NOW she starts asking smart questions.
Norm stared at her, considering.
He should lie.
He really should lie and say she couldn’t.
From what he’s seen of her so far, this girl seemed a few wires short of a Crock-pot, and speaking of, he was starting to get some flashbacks. His previous time working with Crocker reminded him full well why it was a bad idea to let the humans know they could wish for additional wishes. Plus this girl was already giving him the feeling that the sooner he was away from her, the better.
…but he had spent years as a urinal cake and given what Lila had told him about magical-based superheroes, well, how could he turn away from an opportunity?
“Sure.” He finally answered, much to Lila’s glee.
“Then I wish for three more wishes!” She exclaimed. “And for my first wish, I wish that Ladybug—the superhero Ladybug whom you just saw would be forced to kneel before myself—the me that is right here before you.”
Lila smirked, figuring that it was specific enough that there was no way this could be turned against her.
How little she knew.
The POOF of Norm’s magic was immediately drowned out by complete chaos as something came crashing through the wall and into Lila’s bedroom.
Lila screamed as she was blown back, and covered her face in a limited ability to protect herself from further onslaught.
Coughing could be heard, but it wasn’t just Lila. She dared to peek through her hands and…
Of all people, it was Ladybug crouched on the floor of her room, coughing and waving away the dust and debris.
And sure enough, her position of trying to regain her bearings had her turned in Lila’s directions, head bowed and on her knees. Just as Lila had asked for.
But not in the way she had wanted.
Norm had conveniently vanished from sight, so there was no one else for Ladybug to see besides Lila. Realizing where she was and who she was in front of, Ladybug couldn’t hide her initial scowl before she was able to mask the expression and focus in on the task at hand.
“My apologies, civilian.” She bit out. “Akuma attack. Just stay here and stay safe for now. This won’t take much longer.”
And without another word, she shakily got to her feet and turned back to the attack.
Given Ladybug’s state, Lila could have been in a perfect position to try to interfere. Grab her. Maybe even get her earrings.
But the crash had sent Lila herself falling back, and she was even more unsteady than Ladybug.
She tried to push herself up, but realized that in the chaos, some debris had landed on her leg, preventing her from moving.
Of all the rotten luck!
Ladybug left without further ado and Lila was stuck in her room with a hole in her wall and no way to move from her spot on the floor.
Conveniently, Norm reappeared once she was alone.
“Soooo…just a suggestion, kid, but maybe you should try wishing for something else. Something that doesn’t involve superhero ladybugs.”
“Shut up.” She groused as she struggled to push the broken bits of her desk off her leg and grunting in pain.
Norm, of course, did not shut up.
“I take it you want to use your second wish to restore your room? And your third to wish for more wishes?” He asked, but it was clear he wasn’t actually asking.
“Yes!”
The sooner the better.
With another POOF, her room was restored and her leg, while still injured, was no longer pinned. Cautiously, she rose to her feet, hanging onto her bed for stability.
As if to further mock her, it seemed that Ladybug had successfully defeated the akuma as the Miraculous Cure swept through the area, restoring everything else.
Norm blinked in surprise.
“Huh. Didn’t know that could happen. Well, that was a waste of a wish, huh?”
Lila twitched.
__________________
“Okay. Okay.”
She had thought about this long and hard.
Much to her frustration, it seemed wishing anything against Ladybug directly was doomed to failure. Lila attributed it to Ladybug’s magic and natural luck. There could be no other reason for it. Lila’s phrasing and intentions had been fool-proof.
Norm’s smirks and passive aggressive comments didn’t mean a thing.
As such, Lila reluctantly turned her focus away from her arch nemesis to the more civilian side of things and decided to target someone who had no such protection.
The only one to figure out she was a liar: Marinette Dupain-Cheng.
She didn’t know how the other girl knew so quickly. Or what led her to the truth.
And Lila didn’t particularly care.
Marinette was just another thorn in her side. Not nearly as irritating as Ladybug, but still enough to want her gone. And since Lila had a genie and three more wishes to use to her advantage, it seemed Marinette would serve as the perfect way to test it.
And so, Lila made the first of her next three wishes.
“I wish that Marinette Dupain-Cheng was forced to leave Francois Dupont.”
A bit on the extreme side, admittedly. If she was being honest, Lila would have preferred to keep Marinette around and wish her to be miserable in some other way instead. But she had the power of a genie at her command and given Marinette’s annoyingly clever and intrusive nature, it would likely only be a matter of time before she caught on to Lila’s new advantage and tried something to relieve her of it.
So the brat had to go.
And oh, what a wonderful scene it was when two serious and official looking men stepped into the classroom to ask for Marinette to go with them to the Principal’s office. The goody-goody left the room looking scared. Everyone whispered and looked to each other in confusion, questioning why and what happened. Who were those men and what could they want with Marinette?
Lila practically felt downright giddy at the sight! She couldn’t wait to see the other girl in tears!
It was almost two hours later when Marinette was brought back to the room by Principal Damocles. Both looked pale and fatigued. But Marinette in particular looked almost tearful.
“Pardon us, Ms. Bustier, but Marinette is just here to gather her things.”
Lila had to hold herself back from grinning and instead put on a fake look of concern.
“Oh no! Marinette, are you all right?”
"Girl, what happened?" Alya asked, worriedly.
“What did those guys want?” Adrien questioned in concern.
Marinette shook her head. "I'm being transferred.”
Here, Lila did smirk even as everyone else around her gasped in dismay.
Damocles patted Marinette’s shoulder, his fatigue giving way to cheer. “Those gentlemen were representatives of one of the most highly acclaimed private art schools in Paris, and they came to interview Marinette for a place in their program!”
"WHAT?!"
Any smirk Lila did show immediately dropped.
“They saw my hat at the fashion show and other designs from my website, and once they heard that I was complimented by Audrey Bourgeois, they decided to offer me a scholarship to come to their school." Marinette explained, looking a mix of excited and anxious.
“That’s wonderful!”
“You deserve it, Marinette!”
“That’s right! It’s a great honor!” Damocles continued. “Of course, they were rather insistent about arranging the transfer, but it’s early enough in the school year and—”
Lila didn’t pay any attention to anything further of Damocles’s prattling and barely even noticed the way everyone else in the classroom cheered and showered Marinette in congratulations and praise.
Nobody paid much attention to Lila for the rest of the school day. Which was just as well, as it allowed her to skip out and storm back home.
Where she found Norm. Sunbathing on her balcony. And messing with her laptop.
He only noticed she was there when she slammed the door open.
“What?” He snarked. “Not what you wanted?”
“Undo it. NOW.”
“You sure?” He asked. “I mean, she’ll still be gone. There’ll be no one to call out your depressingly obvious lies. And with her not being around as much, your little followers are bound to lose touch with her over time and be all yours to screw with.”
“The point is for her to be miserable! UNDO IT!”
The next day, it was with some disappointment as Marinette informed her classmates that while the school had wanted her, the school only had limited slots and apparently the men who came to interview her hadn't been aware the vacancy had already been filled.
"It was still a bit too early for me to start there anyway." Marinette added. "I double checked, and they're a fully fledged lycee. They were apparently figuring I could skip ahead a grade and start there sooner."
"Weird."
"But impressive!"
"Yeah, you totally deserve it, dudette!"
"You'll just have to try for next year." Alya said, moving to wrap an arm around Marinette’s shoulder. “But I’m glad you’ll be with us for a while longer.”
Marinette smiled back, happy and relieved. “Yeah!”
Lila glared at the happy group from around a corner.
So this fell through. But next time would work.
She was smarter than some shut-in genie. She was bound to find a way to make a wish that would give her exactly what she wanted.
And when she did…
Lila smirked.
Ladybug would be as good as gone.
693 notes · View notes
ask-the-meigang · 2 years
Text
WELCOME TO THE MEIGANG BLOG!!
Tumblr media
Yooo!! I'm mod Shy Shy and I'll be Priya on this blog 😁‼️ I use They/Them and surprise surprise I look almost exactly like Priya irl!! Also anything with Priya using only lowercase is intentional!!
hey loves, i’m mod roxie and i will be abby on this blog!! i use she/he pronouns!! abby will use mostly uppercase when talking!! <3
hello everyone! i'm mod aizaa! and i'll be the miriam on this blog!! i use they/them prounouns, and alsoo miriam will mostly use emoticons like ':) :( :] :[ :/ :v :0 ^_^ ㅠㅠ' !!
Hellooo! I'm mod Valenn and I'll be Mei on this blog! My pronouns are he/they.. Mei will always have exclamation marks at the end of her sentences!! <3
And I’m mod Emanuel and I’ll be Tyler! I use He/Him and Tyler would be... well... normal parts.
Tumblr media
Tags!!
#Mei speaks! #RedPanda says stuf
#miriam talks about stuff , #miriam answers
#
#
#priya declares
16 notes · View notes