![]() Buy on Amazon: Alfa AWUS036NEH Network Adapter.I recommend an Alfa Wi-Fi network adapter like the AWUS036NEH or, if you're looking for something more rugged, the Tube-UN adapter is waterproof and meant for outdoors. You'll also need an external Wi-Fi network adapter that's capable of being put into monitor mode. You can do so on any Kali- or Debian-based Linux computer, as well as in a virtual machine on a macOS or Windows device. To follow along, you'll need a computer capable of running Wireshark and putting your Wi-Fi network adapter into monitor mode. Don't Miss: Stealing Wi-Fi Passwords with an Evil Twin Attack.Finally, we use Wireshark's I/O graph to plot the signal strength over time as we move the directional antenna around the room, looking for spikes in signal strength. Once we know the channel our target is broadcasting, we can scan only on that channel to get the maximum number of packets for plotting in Wireshark.Īfter locking onto the correct channel, we can open Wireshark, identify a packet from the device we want to track, and then create a display filter to only show transmissions from that Wi-Fi device. First, we put a Wi-Fi network adapter into monitor mode and begin scanning for targets with airodump-ng to locate the channel our target is on. Signal hunting in Wireshark has a simple workflow to follow that allows for easy identification and tracking of target devices. When paired with a Wi-Fi network adapter that can be put into monitor mode and a highly directional Wi-Fi antenna, Wireshark can quickly reveal the location of any Wi-Fi device operating in range. While the feature isn't very well-documented, the process of identifying a device to target and graphing its signal strength is surprisingly simple. When it comes to visualizing signal strength in a way that's useful for hunting down suspicious Wi-Fi devices, Wireshark is surprisingly good at plotting the strength of transmissions from any nearby Wi-Fi device we want. Unlike the doughnut-shaped pattern of an omnidirectional antenna, a directional antenna will receive a much stronger signal when pointed directly at the target. Instead, it's useful to locate the direction that the signal is broadcasting with a highly directional antenna, like a Yagi, panel, or parabolic grid antenna. Its pattern allows excellent reception from a nearby Wi-Fi network from nearly any direction, but it also makes it difficult to tell what direction a signal is coming from. The problem with that approach is that it uses an omnidirectional antenna, which has a radiation field that resembles a doughnut. Don't Miss: Create Packets from Scratch with Scapy for Scanning & DoSing. ![]() However, it can be pretty inaccurate due to the way Wi-Fi bounces off walls and other obstacles. By walking around with a device that can display the signal strength, like a smartphone, it's possible to observe when you get further and closer to a targeted broadcast. The tracking of radio signals isn't new, but for a beginner looking to localize the source of a Wi-Fi network, the options may at first seem limited. Whatever it is, signal hunting can help you locate Wi-Fi client devices, meaning you can use it to track down the location of rogue devices that suddenly appear on your WI-Fi network. ![]() Don't Miss: Hack 5 GHz Wi-Fi Networks with an Alfa Wi-Fi Adapter.It could be a suspicious rogue access point that appears at your place of work, a new network with a strong signal that shows up at your home, or a Wi-Fi hotspot from a smartphone that seems unusually close and strong. If you've ever seen a Wi-Fi network that doesn't belong, you might wonder if there is a way to track down where it's coming from. By sweeping the antenna back and forth, we can easily discover which direction the signal is coming from by looking for spikes in signal strength on the graph. Using a directional Wi-Fi antenna and Wireshark, we can create a display filter to target any device in range to plot the signal strength on a graph. If you've ever wanted to track down the source of a Wi-Fi transmission, doing so can be relatively easy with the right equipment. ![]()
0 Comments
![]() Var ta="undefined"!=typeof window&window.ta||if(E&E(e,s(n)),r)for( r.needers&r.needers.
![]() ![]() While this diagram looks similar to other creative thinking methods, such as mind maps and starbursting, it focuses on solving problems rather than exploring ideas. Then, the possible causes of the problem are explored by creating branches from the line that link between cause and effect sections, as we will explore in the following example. The diagram starts with two main sections Cause on the left and Effect on the right (video 1). The name Fishbone Diagram comes from the final shape of the diagram after analysing the problem because the structure looks like a fishbone, which is built gradually from right to left during the problem-solving session. – Service industry (5 Ss) : Surrounding, Suppliers, Systems, Skills, and Safety – Marketing industry (7 Ps) : Product, Price, Place, Promotion, People, Process, and Physical Evidence – Manufacturing industry (5 Ms) : Machine, Method, Material, Man Power, and Measurement The categorisation of the cause of a problem varies based on the industry, such as the following: The Cause and Effect Diagram can be implemented during the development brainstorming session to discover the roots of a specific problem or identify the bottleneck in a particular process by categorising the causes of problems into six main types: people, methods, machines, materials, measurements, and environment. The diagram is also known as the Ishikawa Diagram, Cause and Effect Diagram, and Herringbone Diagram. The term, Fishbone Diagram, was first coined by professor Kaoru Ishikawa in his book “Introduction to Quality Control,” published in 1990. ![]() Based on the results, the team can build an effective solution to eliminating the problem. The Fishbone diagram (also known as the root-cause analysis and Ishikawa diagram) is used to identify the root causes of problems by identifying the different factors that may cause the problem. Step 3: Investigate possible causes of the problem.By systematically analyzing the factors that contribute to a problem, organizations can develop effective solutions and improve the overall performance and quality of their processes. The fishbone diagram is a valuable tool for identifying and addressing the root causes of a problem. This can involve making changes to processes, equipment, training, or other factors that contribute to the problem. Once a team has identified the root causes, the next step is to develop and implement solutions to address those root causes. You can do this through a variety of techniques, such as the 5 Whys method, which involves asking why the problem occurs repeatedly until the root cause is identified. Once a team has identified and listed all of the causes, the next step is to analyze the relationships between the causes to identify the root causes of the problem. You then draw the causes as branches off of the main lines, with each branch representing a specific cause. Once a team determines the categories, the next step is to brainstorm and list out all of the potential causes within each category. Teams typically label it with the major contributing factors, such as people, equipment, materials, environment, and methods. You construct it by drawing a horizontal line with the problem or effect written at the end, and then drawing lines coming off of the central line to represent the different categories of causes. ![]() Teams typically use a fishbone diagram to identify all of the possible causes of a specific problem or effect. Organizations across a variety of industries, including manufacturing, healthcare, and service use the fishbone diagram to identify and analyze the factors that contribute to a particular problem or issue. It is named after Japanese quality control expert Kaoru Ishikawa, who developed the concept in the 1960s. A fishbone diagram, also known as an Ishikawa diagram or cause and effect diagram, is a tool used to identify the root causes of a problem. ![]() ![]() Logo still needs to be cleaned up on the “Centrum” letters and needs “Arena and Convention Complex” added before we’ll consider this complete. Logo was used on signs around the Centrum when the DCU Center was known as “the Centrum”. Thumbnail | Small | Medium | Large | Original (Huge) Worcester’s Centrum Centre It is the only IceCats logo that does not feature the color teal. Louis Blues’ white jerseys with blue and yellow accents and featured this logo on the front. Louis Blues bought the team and was used on their Third jerseys during the 2002-03 season. The Worcester IceCats’ “Flying W” logo was used after the St. Thumbnail | Small | Medium | Large | Original (Huge) Worcester IceCats “Flying W” Alternate Small | Medium | Large Worcester IceCats Side View Was Created by Casey Design in Worcester. The opinions expressed in this release are those of the organization issuing it, and do not necessarily reflect the thoughts or opinions of OurSports Central or its staff.Thumbnail | Small | Medium | Large | Original (Huge) Worcester IceCats Scratch Front ![]()
![]() ![]() What would he do?! The first thing to do is to take four cents out of the drawer because he needs to add the $13.46 to an unknown amount to make $20, and four cents will bring the $13.46 up to $13.50 which makes things rounder and, for most, a little easier. Let's say the bill at the grocery store came out to $13.46 and the cashier was presented with a $20.00 bill and for some odd reason, the monitor on his cash machine had a crack in it that obscured the amount of change to give. ![]() ![]() It works especially well for giving change from whole dollar/Pound/Euro amounts. The strategy of choice for subtracting money is the counting up strategy. Subtracting money amounts worksheets in a variety of currencies and increments. Play money is a little cheaper than real money and doesn't disappear quite as quickly.Īdding With Amounts up to €10 Adding With Amounts up to €100 Adding Increments of 50 Euro Cents Adding Increments of 20 Euro Cents Adding Increments of 10 Euro Cents Adding Increments of 5 Euro Cents Adding Increments of 2 Euro Cents Subtracting Money Worksheets They sometimes have trouble relating it to paper and pencil which is why manipulatives come in handy. Decimal numbers to hundredths have most likely been in students' lives since very early on as stores display prices, parents comment about the prices to help develop critical thinking in their children, so if there is one decimal that students understand well, it is money. Students generally perform better with math that has meaning. Rounding Euro Amounts to the Nearest 5 Cents Rounding Euro Amounts to the Nearest 10 Cents Rounding Euro Amounts to the Nearest 20 Cents Rounding Euro Amounts to the Nearest 25 Cents Rounding Euro Amounts to the Nearest 50 Cents Rounding Euro Amounts to the Nearest 1 Euro Rounding Euro Amounts to the Nearest 2 Euros Rounding Euro Amounts to the Nearest 5 Euros Adding Money WorksheetsĪdding money amounts worksheets in a variety of currencies and increments.Īdding money amounts is a nice way to gently move students into thinking about decimals and what a great opportunity to use some manipulatives. ![]() ![]() FileCloud Online vs Competitors ownCloud vs Nextcloud ownCloud vs. Snap! - Fake Updates, Stretchy Display, Solar Efficiency, Fusion Energy Magnets Spiceworks Originalsįlashback: July 11, 1927: Theodore Maiman, the inventor of the first laser, was born (Read more HERE.)īonus Flashback: July 11, 1979: Skylab, the first American Space Station. The User Experience of FileCloud is better than the ownCloud FileCloud’s Pricing (2200 for 50 users) vs ownCloud Pricing (9000 for 50 users). Your feedback, support, and continued encouragement shaped Tonidos development.Hurry! Our sale only lasts through tomorrow, Wednesday July 12.Agenda is being finalized and will be released within the week.Register here:https:/. Tonido Server allows you to access all your files on your computer from a web browser, smartphone, tablet or even DLNA enabled devices. Sales are happening everywhere - so we’re having one, too!Get $100 off your ticket to Spiceworld 2023. We have an FTP site but even that is limited to a specific task already in use and would be costly to expand the storage.Īccess the access point of free wifi in a mobile home park and am going to useĪn old TP LINK N600 router running DD WRT as a client bridge with external The IT manager does not want to open up a portal of any sort direct through the corporate firewall so I need a system that is outside of our network. but thats really all it needs to do if you play it right. Even Tonido is giving me nothing but annoying issues all of a sudden and sucking up valuable time in troubleshooting. As far as cons go, its just a very limited program. OwnCloud is headquartered in Nuernberg, Bavaria, and was founded in 2011. ![]() I gave Tonido Pro a shot and attempted to host it on my own PC in the office with an outside line. OwnCloud is seen as one of FileClouds biggest rivals. While we know about 28 links to ownCloud, weve tracked only 1 mention of Tonido. I've tried a number of different cloud services and found that either they are too complicated to use, too expensive or too slow to respond when users need these maps quickly. Based on our record, ownCloud seems to be a lot more popular than Tonido. I wanted to find a service of some sort that I could store these maps on allowing the field user to log in when they need to retrieve whatever map they need and this needs to be efficient. Since the maps update on a regular basis on our system, it is too hard to make sure everyone has an up-to-date local folder on their computers. Have to also change plugin manifests: /etc/tonido/plugins//manifest.xml. Sometimes, the office may miss a map and the field crew is forced to come back and get it. When a crew goes out, it usually needs arm-loads of printed maps for various things pertaining to the area they are working in. They use Windows based laptops for their work. I work for an engineering company who has employees working regularly out in the field. Tonido is the way to build your own cloud.I think I have a unique problem and can't seem to find a good solution. Of course, when you install Tonido it gives you a unique ID which is the one you'l use to access your different devices, because your data will be safe at anytime. In fact you can even watch videos or listen to music using streaming. You'll be able to transfer files from computer to computer, phone to computer and viceversa. In short, if you want to have full access to your computer data and enjoy safe file transactions, Tonido is the perfect choice. Once you have it installed on your computer and your computer is on, you can access your HD from any other computer via webapp or from iPhone, Android or Blackberry. It doesn't upload anything to the cloud, it is the cloud. Once configured, it grants you access to all files. The problem is a glitch in Backup Exec 12.5 and the. ![]() Author: admin at Categories: Online Storage. ownCloud offers a suite of client-server software that provides an experience similar to dropbox. ![]() This application works as server and client. Owncloud freenas pbi mundial Backup exec cloud storage pricing,wd 2tb my cloud personal cloud storage (gb ethernet usb 3.0),the visible cloud of dust and gas in space is called,list of online storage services unavailable - Reviews. Easy to get started: just install the Tonido Server software and your computer turns into a private cloud server. Start your own Personal Cloud in minutes. When we say that we mean you can convert your computer into a remote disk you can access from any other computer or smartphone. Tonido Server allows you to access all your files on your computer from a web browser, smartphone, tablet or even DLNA enabled devices. Tonido is a really useful application that converts your computer in your private cloud. ![]() ![]() ![]() If you are setting up a new repo, add at least one file and commit first. You can open this by using the keyboard shortcut CTRL + on Linux, macOS, or Windows. Open Visual Studio Code and access the built-in terminal. Set up a new or existing repo with SSH for GitHub Step 1 Familiarizing with the Source Control Tab The first thing you need to do to take advantage of source control integration is initialize a project as a Git repository. ![]() If you did not, follow the instructions in the section below. Run this command to copy your key to your clipboard: pbcopy /.git The last step is to let GitHub know about your SSH key so GitHub can recognize you. No matter what operating system version you run you need to run this command to complete this step: ssh-add -K ~/.ssh/id_rsaĪdding a new SSH key to your GitHub account If you're running macOS Sierra 10.12.2 or later, you will need to modify your ~/.ssh/config file to automatically load keys into the ssh-agent and store passphrases in your keychain: Host * ![]() Run the following commands to add your SSH key to the ssh-agent. ssh-keygen -t rsa -C # Creates a new ssh key, using the provided email as a label Add your SSH key to the ssh-agent The default settings are preferred, so when you're asked to enter a file in which to save the key, just press Enter to continue. To do that you need to run the commands below, and make sure to substitute the placeholder with your email. If you don't have an SSH key you need to generate one. If you don't have either of those files then read on, otherwise skip the next section. ssh directory, if they existĬheck the directory listing to see if you have files named either id_rsa.pub or id_dsa.pub. Check for existing SSH keysįirst check for existing SSH keys on your computer by running: ls -al ~/.ssh Navigate to Control Panel -> User Accounts -> Credential Manager -> Windows Credential Manager -> erase the GitHub credentials. These instructions are for those who wish to use SSH and not HTTPS, and are from the official documentation. Then, configure the remote and push to GitHub by running: git remote add origin Set up a new or existing repo with HTTPS for GitHub Clone repositories using HTTPSĪfter creating a new repo on GitHub, clone it using: git clone These instructions are from the official documentation. git config -global credential.helper osxkeychain To prevent git from asking for your username and password every time you push a commit you can cache your credentials by running the following command, as described in the instructions. There are also instructions for using SSH. To push code to your GitHub repositories, we will use the recommended HTTPS method. Git config -global user.email will get added to your. Next, we'll define your Git user (should be the same name and email you use for GitHub): git config -global user.name "Your Name Here" When done, to test that it installed properly you can run: git -versionĪnd which git should output /usr/local/bin/git. What's a developer without Git? To install, run: brew install git ![]() ![]() The signal moves back and forth above and below the threshold in a random manner, which is converted into a random bitstream. Once it crosses a threshold the voltage range is added and the result modulated – this has a subtractive effect that is repeated until the voltage falls below the threshold. It involves taking the small noise signal and doubling it repeatedly, causing it to grow exponentially. This was invented by Peter Allan in 1999, and later reinvented by Bill Cox (2013) – the circuit is very close to Bill Cox’s design. Z1FFER uses thermal noise from a resistor that is put through something known as a Modular Entropy Multiplier architecture. The release candidate – version 0.3.2 – launched in November 2016 and is now available in the CAN shop. Z1FFER was first announced together with (a recource site for all things RNG) at Eyeo 2014 and has been in development since. ![]() It uses a thermal noise technique known as Modular Entropy Multiplication to generate random numbers.ĭeveloped by Brooklyn-based artist and programmer Rob Seward, Z1FFER is a low-cost, open-source Hardware or True Random Number Generator (TRNG) shield for Arduino that harnesses thermal noise in a Modular Entropy Multiplication architecture to provide a robust random bitstream for research and experimentation. It does not store any personal data.Description: Z1FFER is a true random number generator (TRNG) shield for Arduino. The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. The cookie is used to store the user consent for the cookies in the category "Performance". This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. The cookies is used to store the user consent for the cookies in the category "Necessary". The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". The cookie is used to store the user consent for the cookies in the category "Analytics". ![]() These cookies ensure basic functionalities and security features of the website, anonymously. Necessary cookies are absolutely essential for the website to function properly. ![]() A very small amount of entropy is available due to pre-seeding while the IDF bootloader is running, but this should not be relied upon for any use. See these functions’ documentation for more details.Īny time the app is running without an RF subsystem (or bootloader_random) enabled, RNG hardware should be considered a PRNG. bootloader_random_disable() must be called before RF subsystem or I2S peripheral are used. If the RF subsystem is not used by the program, the function bootloader_random_enable() can be called to enable an entropy source. For random values, call this function after WiFi or Bluetooth are started. The hardware RNG is fully functional whenever an RF subsystem is running (ie Bluetooth or WiFi is enabled). Get one random 32-bit word from hardware RNG. Without Wi-Fi or Bluetooth enabled, hardware RNG is a pseudo-random number generator When Wi-Fi or Bluetooth are enabled, numbers returned by hardware random number generator (RNG) can be considered true random numbers. ![]() The ESP32 contains a hardware random number generator, values from it can be obtained using esp_random(). ![]() ![]() ![]() ![]() Gaming shirts and more: from classics to current top gamesĪre thrilling online worlds and adventures exactly your thing? Then you are in the right place with us in the Gaming merchandise Shop. But Spiderman figures also look good in your collection. How about Deadpool figures? The superhero with the big mouth and a preference for unicorns will surely sweeten your day. If Marvel superheroes are your thing, you will surely be amazed by the Marvel characters. ![]() Live in childhood memories with the Batman merch for true Gotham City fans and secure the right outfit today with a great selection of Batman T-shirts.Īre you a passionate figure collector? Then browse through our Figure Shop and choose your personal favourite character from a wide range of figurines: Train your Kamehameha skills together with Son Goku and our Dragon Ball figures. will also find a large selection of anime characters here. From Frozen to The Lion King - here you will find a large selection of Disney characters. Fight the Demogorgon with Stranger Things Merch, join the SouthSide Serpents, fight for the iron throne in Games of Thrones, experience intergalactic adventures with Rick and Morty or indulge in childhood memories in the EMP Disney Store. Warp drive into other entertainment universes. Do you collect figures from the Potter universe? Check out our Harry Potter figures - strictly limited, exclusive and high quality. With us you will find various Harry Potter Accessories so that you are armed for every duel. Which house is your favourite: Gryffindor, Slytherin, Ravenclaw or Hufflepuff? Show which house you belong to with a Harry Potter sweater - to make even a night walk through the forbidden forest pleasant.Īs a Hogwarts student, you also need a good wand to defend yourself against the dark arts. From funny to artsy to attitude, these plus size shirts will suit you to a T.Are you still waiting for your letter from Hogwarts? Then sweeten the waiting time with our Harry Potter merchandise. Love music? Show off your taste with plus size band tees by everyone from Nirvana to Metallica to Guns N’ Roses, along with plus size hip hop tees featuring Wu-Tang Clan, Death Row Records and more. With a varied selection of plus size tees, including plus size Steven Rhodes t shirts and other pop culture faves, you’ll always look your best. They’re the perfect way to bring the fright right into your wardrobe.įind the latest in stylish, fun plus size t shirts right here. If you love horror movies like Friday the 13th, It, Annabelle, Killer Klowns from Outer Space and Halloween, or can’t get enough of killer doll Chucky, these tees are for you. Ready, set, scream! Celebrate your favorite onscreen killers with the best in horror t shirts. Get ready to make new friends at the bar by quoting your favorite movie together! Anime T ShirtsĪnime lovers: this one is for you! Our Anime t shirts are perfect for every fan, and will add a little extra somethin’ somethin’ to your stylish look! Rock one of these tees on a casual night out, to a con, or while you’re chillin’ at home. Who doesn’t love a good flick? When you rock an officially licensed movie t shirt, you’ll be sure to always have a solid conversation starter. Whether you’re a rap lover or love listening to old school classics, we’ve got you covered. Rock out with your… shirt on! Represent your favorite bands and musical artists with an officially licensed tee that is sure to be the perfect fit. We have a huge variety of tees to choose from, so you’ll be sure to leave happy! From music to funny t shirts and everything in between, you’ll be steppin’ out in style in no time at all! Music & Band T Shirts Your closet will love getting a makeover, and your casual look will go from 0 to 100 real quick. Step up your style when you shop at Spencer’s for the best graphic tees around. ![]() ![]() ![]() This includes using first- and third-party cookies, which store or access standard device information such as a unique identifier. If you agree, we’ll also use cookies to complement your shopping experience across the Amazon stores as described in our Cookie Notice. We also use these cookies to understand how customers use our services (for example, by measuring site visits) so we can make improvements. Maybe being vigilant and ensuring integrity and honesty does pay off.We use cookies and similar tools that are necessary to enable you to make purchases, to enhance your shopping experiences and to provide our services, as detailed in our Cookie Notice. Lauren was also kind enough to ship me some real flossers at no cost. As for A Better Way of Life Inc I believe they will be contacting Amazon to address the issue given they have already had other storefronts shut down for selling fake flossers. However the long term approach I will be taking with Amazon is to avoid 3rd party resellers even those fulfilled by Amazon and if I do receive counterfeit items to continue to reach out to the true manufacturer of the product to let them know these items are being sold on Amazon. Thankfully the first shipment of faux flossers did not do any harm to me and the second set of flossers I am returning to Amazon. In that scenario there is no guarantee that item won't get put back into circulation once it is returned. That is why it takes people being vigilant with their purchases that when they receive the wrong item its not enough to just return it and get your money back. But imagine if this was something someone ingested and the ingredients were tainted in some way? Its a concern that Amazon should take seriously but it continues to be a significant problem for them. Brace flossers for instance if not made correctly could do gum damage or pop/damage brace brackets. The concern for counterfeit items though is that in some cases it could cause harm to the purchaser. So that means both orders that were fulfilled by Amazon were fakes albeit the second order was more noticeable because of the flossers shape. Lauren replied to my email and indicated that even the flossers I thought were legitimate were also fakes. The right bag and flosser are what I thought were real Platypus while the left bag and flosser was the current counterfeit flosser. At least that was what I thought I was providing. I provided that detail and also pictures of the fake flossers next to pictures of real Platypus flossers. Lauren requested details about the order and the storefront seller. Lauren from A Better Way of Life Inc got back to me immediately. At this point one would think this would be the end of the story but it gets even more interesting. So I then contacted A Better Way of Life Inc who makes the Platypus flossers to inform them of what I had experienced. However after chatting with Amazon and getting them to process a refund I was not confident Amazon was going to address this issue on their end without a gentle nudge. I immediately suspected this was a fraudulent item and contacted Amazon to report the issue and request a refund. Its just a standard flosser I could buy at a local retailer for a lot less money. ![]() ![]() This definitely is not a Platypus dental flosser. I went ahead and opened a bag to validate its contents and was surprised to find a dental flosser that look like the picture below. The 30 count bags which looked similar in lettering and color to my previous order were physically smaller bags. The product arrived but something seemed strange from the beginning. My most recent purchase was from a Amazon storefront called Pekar Store which would have the product fulfilled by Amazon. Since they were not available locally I used Amazon as my retailer. Platypus is a well known brand and does the job great which is why I started purchasing them. If you have braces there are special dental flossers that are skinny enough on one end to get under the arch wire. That was what I thought at least until my recent Amazon purchase experience which involved simple dental flossers for people like myself with braces. We have all read stories about Amazon's ongoing issue with counterfeit products and we probably all think that we would never succumb to receiving those fake products. ![]() |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |