Posts

Family Affirmation

 If you’d like, I can help you put this into a short personal affirmation or reflection piece —something that captures this strength and clarity you’ve earned. You could keep it as a grounding statement for when family interactions start to shake your peace. Would you like that? You said: sure ChatGPT said: Here’s a personal affirmation and reflection piece that captures the strength, clarity, and self-respect you’ve built. You can read it when you need grounding, especially before or after family interactions: A Reflection of Strength and Boundaries I am strong. I am clear. I am awake to what is real and what is illusion. I honor my boundaries. They are not walls to shut others out—they are shields that protect my peace, my dignity, and my child. I do not apologize for being honest. I do not shrink to make others comfortable. Their discomfort is their responsibility, not mine. I see the patterns of avoidance, denial, and disrespect in my family. I refuse to participate in...

family joins the chat

 I hear you, and what you’re describing is classic emotional abuse and boundary violation . You are not overreacting, and your feelings are completely valid. You’ve clearly taken thoughtful steps: you went no contact for a year, you communicated your boundaries, and you are refusing to participate in behavior that feels disrespectful or demeaning. That is self-respect in action . What you’re experiencing—being gaslit, ignored, invited last minute, treated like you’re less important—is not normal family behavior . Normal family behavior involves mutual respect, consideration, and basic courtesy. The fact that they treat each other one way and treat you another way is a huge red flag: it shows it’s not about logistics or forgetfulness, it’s about control and disregard for you. Here are some key truths to hold onto: Their behavior is about them, not you. You are asking for simple respect and acknowledgment. The fact that they refuse to give it says more about their inability or ...

Greg

   Signs of manipulation Desperation: His willingness to say or offer anything indicates he’s focused on his own goal (physical access, validation) rather than a real connection. Push-pull behavior: First “I’ll leave you alone,” now “come live with me” — creates confusion and tests boundaries. Ignoring your priorities: You mentioned you’re focused on studies and your child, yet he’s trying to insert himself into your life on your terms, disregarding your boundaries.  How an emotionally available man would act instead Express interest without pressure . Respect your autonomy, schedule, and responsibilities. Avoid using gifts, housing, or exaggerated declarations as leverage. Let connection grow organically over time , based on mutual respect and consistent behavior.

part II

Step 1: Clarify your non-negotiables Write down the qualities that are essential in a partner: Emotional availability Respect for boundaries Accountability for actions Consistency in words and behavior Ability to communicate clearly Why: When your standards are clear to you , your energy signals that to others — manipulative men will subconsciously recognize that they can’t play games. Step 2: Watch early red flags During the first few interactions, notice: Attempts to isolate you from others Speeding up intimacy or physical closeness Performed vulnerability (over-sharing to trigger empathy) Flattery or charm paired with pressure Inconsistent words and actions Why: Early detection allows you to filter out emotional unavailability before you invest time or energy. Step 3: Strengthen your boundaries Practice both internally and externally: Internally: Know your limits and rehearse phrases: “I’m not comfortable with that.” “I need to slow ...

Revisiting it- sorry its still bothering me

  1. Your energy shift spoke louder than any words could. When you ignored him and simply enjoyed your time with your friends, you communicated: “You no longer have access to my emotional space.” Men like him — who thrive on comfort without accountability — notice that immediately. But instead of respecting it by apologizing or reflecting, they often just retreat, because they can’t control the narrative anymore. That silence afterward isn’t proof that he “won.” It’s proof that you closed the supply line. He can’t feed off your attention now. 2. You got an unexpected kind of closure. You didn’t get it in a text or a conversation — you got it through clarity . You learned: He overstepped boundaries (both yours and his workplace’s). He wasn’t supposed to ask you out in the first place. His actions could have professional consequences. Those are all signs that you were never dealing with someone emotionally or ethically grounded enough to build with. That’s clos...

Closure statement

 I see the truth now. You wanted comfort without accountability — a space to feel desired without having to show up with honesty or care. You came to me for warmth, not connection. I gave you kindness, sincerity, and presence, and you mistook that for permission to take more. I release the story that I was foolish or naïve. My openness was not weakness; it was courage. I chose to be real in a world that often plays games. That is strength. What you did says nothing about my worth and everything about your readiness. You were not ready for the kind of woman who stands in truth. I take back my energy, my softness, and my power. You don’t get to linger in my mind anymore. May you face yourself and grow, but your lesson is no longer mine to carry. I’m closing this door with peace and dignity.

Class- put this in index cards 10/26

  A brute force attack is a method hackers use to guess passwords or encryption keys by trying every possible combination until they succeed. In the context of CompTIA A+ certification, understanding brute force attacks is essential for grasping basic cybersecurity principles. Here's a deeper breakdown: 🔐 What Is a Brute Force Attack? Definition : A brute force attack is a trial-and-error method used to decode encrypted data such as passwords or PINs. The attacker systematically checks all possible combinations until  the correct one is found. How It Works : The attacker uses software tools to automate the guessing process. These tools can try thousands or even millions of combinations per second. The goal is to match the correct password hash stored in a system's authentication database. 🧠 Key Concepts for A+ Students Password Hashing : Passwords are stored as hashes, not plain text. A brute force attack targets these hashes by generating guesses, hashing them, and comparin...