Confessions about 'Hate'

Page 213 of 244

I confess that i have said foul language to my husband during a quarrel because of hate and anger about his behavior, but i was also thinking that this could let him aware that how i hate his bad behavior deeply and hope that he would change! My approach of expressing my anger was not the correct!

I confess that i have said foul language to my husband during a quarrel because of hate and anger ab...

Hate

they ratted me out of so many things and no one really likes them. they are just on a ride for a hoax

they ratted me out of so many things and no one really likes them. they are just on a ride for a hoa...

Hate

so since march or april and may I have been getting heaps of certifications passes in IT and stuff and all this bitch at nutrijerk could say to me was "so what do you just want to sit at home and get certificate after certificate and do nothing else for the rest of your life" just cuz I was doing a allied health course and it was really hurtful for her to show such disrespect. because I couldn't get the customers she was getting. I have no major talents but I think I am over-looked and devalued, but I said no of course not to this bitches question because I do want to do a lot more with my life but I was insulted by her flippant direct attacks on me, and I just don't know how to get what I want out of life, I have tried all avenues I know or were told or that I could come up with. I know nutrjerk will not make me a rich bitch or flying around the world like her, selling shit is no longer an easy thing now. people just don't care much now.

so since march or april and may I have been getting heaps of certifications passes in IT and stuff ...

Hate

have to work today. no holidays at all yet

have to work today. no holidays at all yet

Hate

when I am bored i do these exams Why is security important? A Minimize business risks B Protection of available information C secure confidential information. D All of the above 2) Goals of security: A Authentication and Authorization and Accounting B identify emails as unwanted C establishing a connection to the corporate network via either a dial-up or Internet connection. D Prevention and Detection and Recovery 3) The primary function of a firewall is A Minimize business risks B provides protection for a network by preventing unwanted traffic entering from other networks. C Determining the cost. D Encryption 4) Basic functions of switch are A switching frame based on MAC address B forward packet C divide broadcast domain D divide collision domain 5) Choose the correct A router divide broadcast domain B switch divide broadcast domain C switch divide collision domain D router divide collision domain 6) The Proxy server can provide NAT ��" address translation A True B False 7) Which method should you implement when it is not acceptable for an attack to reach its intended victim? a. IDS b. IPS c. Out of band d. Hardware appliance 8) VLANs are often coupled with a complimentary technology, called _________, which allows switches to share many VLANs over a single physical link. A spanning tree B network address translation C trunking D pruning 9) Which network service(s) allows internal addresses to be hidden from outside networks? A NAT B DMZ C VLAN D VPN 10) Which security zone should contain your Web, FTP, and mail servers? A Intranet B DMZ C Extranet D VPN 11) which networking technology enables a host to securely send its data through an untrusted or public network infrastructure? A Pruning B Tunneling C Extranet D Perimeter network 12) Which of the following methods or resources enable you to qualify a device (verify the workstation meets minimum requirements) before letting the device access the network? a. Port security b. NAC c. IPsec d. VPN 13) Which of the following Privacy settings will block all cookies without a Compact Privacy Policy? A Block all cookies B High C Medium high D Accept all cookies 14) The primary function of a Separation of duties within the security policy A Ensuring that no one individual has too much control over more than one aspect of the business B Allows for working practices to be audited by others to check for fraud. C Determining the cost. D Encryption 15) PII stand for A protocol interface identity B primary injection interface C pin ultimate interface. D personally identifiable information 16) what is the function of acceptable use policy (AUP) A defines what is acceptable behavior when using company resources B Considers aspects such as desktop wallpapers C Defines the limit of personal activities D All the above 17) Types of risk assessment methodologies A Quantitative B DMZ C Qualitative D Quantity 18) what is the choice for risk mitigation strategies A Mitigate or reduce B Accept C Transfer D Ignore E All the above 19) Which of the following documents are found in the disaster recovery plan? A list of the covered disasters B list of the disaster recovery team members for each type of situation and their contact information C A business impact assessment D Backup and restore documentation E All the above 20) The disaster recovery team should include the following: A All network administrators B A member of senior management C Members of the Information Technology department D All backup operators E Representatives from facilities management F Representatives from the user community 21) Which of the following alternate sites have this feature, ready-to-go site with full infrastructure, all facilities, and replicated data from the primary site? A Hot site B Warm site C cold site D none 22) Which of the following risk assessment formulas represents the total potential loss a company may experience within a single year due to a specific risk to an asset? A. EF B. SLE C. ARO D. ALE 23) CSIRT stand for: A customer support internet routing technique B call center support for internet C Computer Security Incident Response Teams D computer security interface team 24) After an incident has occurred A the user should remove themselves from the computer in question and leave it for examination B the user should continue his work C the user should shutdown his computer D the user shouldn’t do any thing 25) An incident response policy is a written policy that covers how to deal with a security incident after it has transpired. True or false? A True B False 26) DDoS tools: A Mstream B Trinity C Trin00 D All the above 27) Map a host’s IP address with its physical address using: A DNS B SYN C MAC D ARP 28) when the attacker places himself between the victim and the Web server that the victim wants to visit its ... attack A DDoS B SYN C Denial of service D Man-in-the-middle 29) To protect your organization from revealing sensitive information to dumpster divers A Keep trash dumpsters in secured areas B Add a ASA C Add a firewall D None of the above 30) ... use properties of the cryptographic algorithm to discover its secret keys A Mathematical attack B Password guessing C Denial of service D None of the above 31) Man-in-the-middle attacks accomplished using: A NetBus B ARP C ICMP redirects D None of the above 32) Using ... uses IP Packet fragmentation techniques to crash remote systems Ping of Death B ARP C ICMP redirects D None of the above 33) PSTN stands for: A Public Switched Telephone Network B Public Switching Telephone Network C Propagation Switched Telephone Network D None of the above 34) ISDN stands for: A Interior Services Digital Network B Integrated Services Digital Network C Integrated Services Digital Network D None of the above 35) DSL stands for: A Digital Subscription Line B Digital Super Line C Digital Subscriber Line D None of the above 36) Dial-up connections use ... to connect to a remote access server A PPP B HSRP C DNS D None of the above 37) RADIUS provides: A Authentication B Authorization C Switching D None of the above 38) L2TP provides tunneling capabilities for A ATM B IP C AppleTalk D None of the above 39) ... can be used with PPTP A TCP/IP B IPX C AppleTalk D None of the above 40) To establish a secure connection using SSH it use: A Public key B Private Key C Encrypted key D None of the above 41) ... is a connection-oriented service A TACACS+ B RADIUS C 802.1X D None of the above 42) When IPSec negotiating which keys to use for symmetric encryption it use : A Asymmetric algorithm B Encryption algorithm C Symmetric algorithm D None of the above 43) IDEA use ... bit for key size A 128 B 24 C 120 D None of the above 44) IDEA stands for A International Data Encryption Algorithm B International Digital Encryption Algorithm C Internal Data Encryption Algorithm D None of the above 45) MD5 stands for A Message Digital 5 B Message Digest v 5 C Message Digitalization 5 D None of the above 46) The attack which Send enough data to overfill the buffer of a given field within an application is: A Denial of service B Buffer overflows attacks C Man-in-the-middle D None of the above 47) LDAP stands for A Logical Directory Access Protocol B Lightweight Directory Access Protocol C Lightweight Data Access Protocol D None of the above 48) LDAP servers must be secured against A Denial of service B Man-in-the-middle C Encryption D None of the above 49) ... can only take logging and alerting types of actions when an attack is identified A Passive system B WAP C HIDS D None of the above 50) ... is operating system-dependent A Host-based B Log-based C HIDS D None of the above 51) ... is capable of real-time detection A Host-based B Log-based C HIDS D None of the above 52) The two types of SNMP are: A Read Only B Read/Write C Random Access Only D None of the above 53) ... is a broadcast-based protocol A NetBIOS B IP C TCP D None of the above 54) ... is data that cannot be read without any manipulation A Ciphertext B Plaintext C Script D None of the above 55) Goals of Cryptography A Confidentiality B Integrity C Authentication D All the above 56) DES stands for: A DUAL Encryption Standard B Data Encryption Standard C Digital Encryption Standard D None of the above 57) IPsec modes are: A Transport Mode B Tunnel Mode C AH+ESP D All the above 58) Common application threats include: A Buffer overflows B Cross-site scripting C SQL injection D All the above 59) DLP stands for: A Digital Loss Prevention B Data Length Prevention C Data Loss Prevention D None of the above 60) Unsolicited and unwanted email called: A Spam B Fraggle C Land attack D All the above

when I am bored i do these exams Why is security important? A Minimize business risks B Protect...

Hate

I thought I would try to make it up to you b

I thought I would try to make it up to you b

Hate

I STILL HAVE NOT FORGIVEN OTHERS.

I STILL HAVE NOT FORGIVEN OTHERS.

Abuse, Hate

no one knows @@ U

no one knows @@ U

Hate

bunnypoeta is a turd girl he/she sounded south american nazi bullshit, that thing was a very abusive freak saying "he worked in machanical cars IT and wanted to have affairs with women who walked past this garage office and seemed to know witchcraft calander dates and causing floods and deaths. this worried me because of his insults and he would write things like "hahahaha I am better then you" and "I am wonderwazn't the clown, and I am going to punish you, fight and attack etc" so I called police because he/she was torturing me and verbally stalking me and making threats of violence towards me and I didn't even know who this person was he said he travelled and lived in portugal and went about nazi wasp and one minute writing weird poetry that made no sense, then acting like wanting to know who this kid was that was his son or something he called his kids little bastards. so weird. super wierd.

bunnypoeta is a turd girl he/she sounded south american nazi bullshit, that thing was a very abusive...

Pride, Abuse, Hate

dean and loner are after you again widdle grrrrrl troublemaker shagshocker here comes the opps.com from the minjas and ect.

dean and loner are after you again widdle grrrrrl troublemaker shagshocker here comes the opps.com f...

Hate

on meetup this loser carey writes to me about travelling around on his motorbike with him. he was a ugly thug and I called police as he was stalking me then a ferguson started on me and I called police again. I have nothing in common with this people. I don't like bikers and weirdos

on meetup this loser carey writes to me about travelling around on his motorbike with him. he was a ...

Abuse, Hate

i am thinking about changing counsellors, I want someone more willing to discus topics and come up with new ideas rather then old boring ones. anyway at least I told him about the stalker carey and how i called police.

i am thinking about changing counsellors, I want someone more willing to discus topics and come up w...

Hate

yeh that way I can watch my mother cut your throat open k. come on over and get bashed up, if your so dumb. if i were you i would take up with a young model whore tart from vogue no one here wants to know you. we want to meet other more important men we should have meet worth our while who would treat me right. so stuff off ugly scanky hopeless fuck. you were one hopeless fuck. you fuck was so boring and dull. your not all that and you thought you were hot and great and the sex knowall but you didnt know shit from fuck in sex or anything about women or much. you had a ugly face, ugly teeth, ugly body, boring violent personality and you really should have just gone and cemented your face and head or go off with some hot chick that just is not me. i know I deserve better, its the song I am going to keep singing til I die. I would rather fuck any man but you k. so stuff off with your dirty sleazy ugly show games its so boring and we are all past your boring rubbish.

yeh that way I can watch my mother cut your throat open k. come on over and get bashed up, if your s...

Pride, Abuse, Hate

I don't respect m vettel she abused me and I reported her - she is a satanic.

I don't respect m vettel she abused me and I reported her - she is a satanic.

Pride, Abuse, Hate

so busy all I do is study and I need a better income. I am bored and need a proper teacher in a classroom and sick of this ffuuk shit life people are subjecting me to of a grubby old house still with parents no riches for all my hard work, no personal rewards and I already have a degree! and several diplomas

so busy all I do is study and I need a better income. I am bored and need a proper teacher in a clas...

Hate

i wish I could marry the doctor I like or jturner or harry. I wish someone could just like me for me. I never wanted this sort of lifestyle I always wanted to work and have a loving family and marry a great man. i never wanted what joyce wanted for me like ken and rape and neglect. its something inside her that made her abuse me like this, its got nothing to do with me, all the people who helped her should just stay with her and fuck her really. rape her and leave her in a messy house with old people and without a husband and without pretty boyfriends and without her marriage photos in wedding dresses she showed off in her house. she should be with ken I have no need for him at all now.

i wish I could marry the doctor I like or jturner or harry. I wish someone could just like me for me...

Hate

i don't forgive you k and my doctors will not support you back in my life. your a devil worshiper and that is not my scene. you are mentally ill and sexually depraved and need criminal help. i am not interested in you i was never interested in you. I would prefer any man but you! so clear out of here you dirty devilbum. no one in my family likes you. just come over and find out and the police will be taking you away and my mother said she will bash you ! so fuck off. I don't love you. I love the other doctor and harry and jturner and loads of guys but not you. its clear simple english. its never going to change. I don't love you and never did love you. never could love you. go find some new virgin of 27 to rape from vogue magazine and stop bothering me cuz its never gonna change.

i don't forgive you k and my doctors will not support you back in my life. your a devil worshiper an...

Abuse, Hate

i want to win a new house or block of units or win the biggest prize ever in lotto and have a better life, or marry a prince charming somewhere. I am sick of living like a heap of dogs shit.

i want to win a new house or block of units or win the biggest prize ever in lotto and have a better...

Abuse, Hate

I go on other confession sites and rant sites, I go on them all. I search deep into vista and other search engines to find new ones and old ones.

I go on other confession sites and rant sites, I go on them all. I search deep into vista and other...

Abuse, Hate

went out for a walk! I like going out and hate coming home, home is a pig stye, I never wanted this house to end up like this. I never wanted to be living like this. I actually do have some pride about myself and the way I live. I know I need help because everyone has been sick with mental illness or cancer etc and I cant do all the work here. I need someone to help me clean up and fix the house. its crazy I am too afraid to open windows to let in fresh air incase a snake gets in.

went out for a walk! I like going out and hate coming home, home is a pig stye, I never wanted this ...

Pride, Abuse, Hate