Pokey succulent

  • 0 Posts
  • 11 Comments
Joined 1 year ago
cake
Cake day: June 16th, 2023

help-circle



  • “Mallyhacked” - meaning something that is broken or destroyed. I heard this phrase a lot from older folks during my childhood, but never by anyone who wasn’t from my area. My SO didn’t believe it was a real word so I did some digging and I think that it is likely a very regionally accented version of “malahack”.

    Urban Dictionary says that malahack comes from the Lumbee-English slang of southern North Carolina. I don’t think that’s quite accurate because I’m not from anywhere close to North Carolina. My preferred reference is from The Vocabulary of East-Anglia: An Attempt to Record the Vulgar Tongue of the Twin Sister Counties Norfolk and Suffolk, as it Existed in the Last Twenty Years of the Eighteenth Century, and Still Exists: with Proof of Its Antiquity from Etymology and Authority; in Two Volumes · Volume 2 by Robert Forby, 1830:

    Malahack, v. A word ludicrously fabricated, which means to cut or carve in an awkward and slovenly manner.







  • Modal or bamboo underwear - soft, stretchy, silky, the solution to everything I hated about cotton underwear. They are usually more expensive than Walmart (or other box store) brands and take more care when washing, but to me are definitely worth it. You can find them for fairly good prices on Amazon if you don’t want to splurge on name brands, but you have to do the research and check the reviews. You can get them in boxers, briefs, and thongs for men and even more styles for women.


  • This is good advice if your phone is actively being hacked in real time when you turn it off. Otherwise all you’re doing is delaying or temporarily interrupting any data collection that’s going on in the background. Any apps that are sophisticated enough to run undetected by a normal user are also going to restart themselves as soon as the phone boots up again.

    Also, if you are being targeted by a hacker that is knowledgeable enough to actively get into your device (especially an iPhone) without physical access then you’re better off destroying it and buying a new one, along with doing a full reset of all of your passwords, 2FA setup, and anything else you think you’re relying on for “security”.