I pretty much have decided that nobody will ever understand my walk with God and essentially it is because nearly nobody is truly following Christ.
EpiphanyGirl682's Thoughts
Friday, October 31, 2025
Saturday, May 31, 2025
Wisdom
There are so many things in life that no longer matter to me and that is because I look at life differently since I was saved.
Something deep has taken place in my heart and mind and it’s like trivial things in this world are everywhere and it’s really only the golden nuggets that I want anymore.
I don’t want friends, I’m not trying to earn approval or look for outside validation, and I do not wish to aquire physical things in this world.
I know the prize is Jesus because of what He has done for me. I know that all that matters to me is to truly know Him and carry out my special orders to which I honestly feel He has entrusted me to.
So many people do not strive to do what is right, better and or harder or to be continually changed by God, but I do. It is what matters most to me in this life.
I don’t desire many material things but if I am completely honest there are many that I do love to have but luxury has never been my thing or who I am. I don’t require showy or flashy things. I just want to be comfortable with what I have and I want to like what I have.
As far as people go, I do not try to make friends. The right people come into my life when they are supposed to and I have faith in that. Over the years I have watched how God has thinned out my interactions with others and removed people who were not meant to stay or only were there for a short time and a lesson.
People come and go. I do not try anymore to put too much effort into things unless I know that God is orchestrating them or behind them. I do not trust others to have my best interest and I have learned over the years to be wise about who I share things with. People are sinful beings and I wait for God to orchestrate interactions and connections with people.
I watch characters also. I am on the lookout for qualities both good and bad in the people I see around me.
I see many who are two-faced and not authentic and I am wary of those ones. I am careful to watch how people act and if they can be trusted or not. I see many liars and hypocrites around me and I do not associate with them on a deeper level.
Do not get me wrong however, I keep my enemies closer than friends like the saying goes because I don’t let people get close enough to burn me.
I watch my words and make sure that my actions align with how I speak and treat people and that I don’t gossip or give people an opportunity to catch me being the person that is that way. People who gossip are not on my friends list and it’s not a characteristic that I trust. I watch people and let them show me who they are.
Friday, May 30, 2025
The Secret Life of Frampton’s Beef
I don’t want anyone to really know me. I hide my coolness and only show it to the best and worthy ones.
Tuesday, May 20, 2025
🧺
I sought God today to do a healing in my heart. My past is something that I brought to Him. The memory of that time when I couldn’t stand the pain from Lisa’s betrayal and I got drunk and Natalie had happened to call me right in the middle of it. I was hysterical and remember being in my bedroom at my parents house. That was in 2004. March maybe? Or maybe it was sooner. I remember the drugs became my way to escape how badly it hurt. I think by March I’d been hospitalized in my first detox. March 2004. I haven’t revisited these thoughts in over a decade.
Thursday, November 28, 2024
Blog #10-Using HTML to Create a Website
I started creating a web page using HTML for the first time by following the instructions in my take-home assignment. Initially, I was able to follow the steps and learned how to open a webpage's source code by right-clicking and selecting "View Source." However, I couldn’t figure out how to close it until I used ChatGPT and did some research, discovering that Ctrl + U opens the source page and Ctrl + W closes it. I’m still unsure how to access or close source view directly in the browser, so if anyone knows, let me know.
To begin my web page, I used the opening <html> and closing </html> tags, which tell the browser I’m using HTML. Setting the page title was confusing because the instructions didn’t clearly explain it, and I couldn’t see the title I wrote which was "Sandwiches". I’ll need to work on that.
For the <body> section, I styled the background color as purple using <body style="background-color: purple;">, and that worked. However, I was unsure if I needed another <body> tag because the example included it, even though it didn’t seem necessary.
One thing that worked well was adding scrolling text using the <marquee> tag with the words "They are yummy," which scrolled across the purple background. However, I ran into issues when adding an image. I copied a URL from a Google search for a sandwich vector image and inserted it into the <img> tag. Unfortunately, the image appeared as a tiny square in the top-left corner instead of being large, as I intended.
Overall, I’m learning, but I still have questions about some aspects of HTML and need to refine my skills.
Extra Note: So I had attached the webpage to this blog but each time I open it, it shows that it's blocked. I would take more time to work on this but I have so many other assignments that I have to leave it as is. This assignment challenged me and I was glad that I got it to work somewhat. I would push myself to improve it since my last update in class but I didn't feel I could take the time.
Friday, November 22, 2024
Cybercrime-Blog # 9
Hello! This is a much more positive blog than the one before this :) Here are the types of cyber crime that I have been a victim of:
Phishing
- Definition: A cyberattack where an attacker pretends to be a trustworthy entity to trick individuals into providing sensitive information.
- Example: Receiving an email that appears to be from your bank, asking you to verify your account by clicking on a fraudulent link.
Adware
- Definition: Software that automatically displays or downloads advertisements, often without the user's consent.
- Example: A browser extension that bombards users with pop-up ads after being installed.
Cyberbullying
- Definition: The use of electronic communication to harass, threaten, or intimidate someone.
- Example: Sending threatening messages or posting hurtful comments about someone on social media.
Data Breach
- Definition: An incident where sensitive, protected, or confidential data is accessed or disclosed without authorization.
- Example: The Equifax data breach in 2017 exposed the personal information of 147 million individuals.
The Cybersecurity and Infrastructure Security Agency (CISA) is a U.S. federal agency under the Department of Homeland Security (DHS), established to enhance national cybersecurity and protect critical infrastructure. CISA was created in November 2018, when the DHS elevated its cybersecurity and infrastructure protection functions into a standalone agency. This move acknowledged the growing importance of cybersecurity to national security. With the increasing sophistication of cyber threats and reliance on digital infrastructure, CISA plays a pivotal role in safeguarding essential systems from potential attacks. Its partnerships with both government and private sectors ensure a comprehensive approach to national cybersecurity challenges.
The article https://www.forbes.com/sites/chuckbrooks/2024/11/18/5-cybersecurity-priorities-for-the-trump-administration/ outlines the top five cybersecurity priorities for the Trump Administration's second term, emphasizing the pivotal role of the Cybersecurity and Infrastructure Security Agency (CISA). Here's a summary:
Protecting Critical Infrastructure
Safeguarding vital physical and digital systems essential for national security and economic stability remains a top priority.Interagency and Public-Private Cooperation
Collaborative efforts among government agencies and private entities are essential for effective cybersecurity measures and information sharing.Building on Government Cyber Risk Management Strategies
Leveraging frameworks like "Zero Trust" and "Security by Design" to mitigate vulnerabilities and enhance security across government systems.Addressing Emerging Technologies
Preparing for the dual impact of advancements like AI and quantum computing, which present new opportunities and security challenges.Ensuring the Cybersecurity of Space Systems
With increasing dependence on satellites, securing space-based assets has become crucial for communication, navigation, and defense.
Thursday, November 21, 2024
Artificial Intelligence, Machine Learning & Convergence-Blog # 8
Trigger warning and or warning of aggressive and frustrated speech with strong language, discussion drugs, abuse, and dark matter: I am honestly not excited about A.I. Honestly, its hard enough for me to have made the comeback in my life that I have and then have to deal with this younger generation who are so sensitive to any words that aren't politically correct. I feel like I have to censor myself more than I want to, or than is healthy for me in my recovery. But coming back to college after everything that I have gone through is hard as hell and I am tired of constantly worrying about weather or not what I say is going to offend somebody else. Well honestly, fuck that! I don't care!!!!!!! And A.I. can suck it. I hate A.I. except when it helps me do my homework. But here's some answers for this blog. I had to do some research honestly to think about how this life-robbing technology is going to ruin everything. Que insane laugh! Ok, end of vent. Professor Andrew Fry, you said that we could say whatever we want on here and get credit. So I better get credit for this. Be nice and say please Shannon. Okay, Please. Thank you Shannon. Wow this chick….Okay so Robotic Process Automation (RPA): Software bots that handle repetitive tasks like data entry, saving time and money while allowing employees to focus on more meaningful work. Humanoid Robots: Robots that look and act like humans. They’re being used in areas like customer service, healthcare, and education to improve interactions and efficiency. Data entry clerks: Replaced by RPA tools that handle data workflows. Customer service representatives: Replaced by AI-powered chatbots and virtual assistants. Financial analysts and bookkeepers: Replaced by AI systems for financial forecasting and reporting. Factory and warehouse workers: Automated through robotics and intelligent systems. Basic coding roles: Simplified by AI that can write and debug code. Fun stuff! Closer to the end of days when Jesus comes. Do you know him???? By the way, demons are real. I have been choked and tormented by them for years when I first got clean. In my bed at night. Tell that to SOME of the Gen Z kids who live in little bubbles of la la land and see if they can hang. Then God rescued me from an abusive relationship with a drug-addicted narcissist who used to hold me hostage while he dug through dumpsters to find shit to pawn for his dope habit. It was fun HAAAAA. God started to radically pursue me, showed me angels in jail and and fix my life October 11, 2017.
- Sorry if I offended anyone which I know I did. I needed to just speak my mind and test the waters to see if it's ok to say things that are controversial and weather or not sombody is going to be freaked out and or think I'm crazy. Can't I just be human and sometimes say things that are wild?
Humanity without Christ is doomed
I pretty much have decided that nobody will ever understand my walk with God and essentially it is because nearly nobody is truly following ...
-
Over the weekend, I watched Startup.com, a 2001 documentary that tells the story of the rise and fall of GovWorks.com. It begins with a c...
-
In class last week, we discussed the Dot.com Boom and subsequent Bust from the 1990s, a pivotal period in the tech industry that was charact...
-
Trigger warning and or warning of aggressive and frustrated speech with strong language, discussion drugs, abuse, and dark matter: I am hone...

