![]() Since disk image usually takes a lot of space, it is usually stored on external resources for convenience and data security. This option is often found in disk imaging programs, which is not surprising, because it is similar to what is required to create disk images, but on a smaller scale.īoot disk option is the creating of a device to boot a disk image. An important function when a user has to take care of security of just some parts/folders/files, but not the whole disk. ![]() Cloning creates an exact functional copy, so it can be replaced and used as the main one if something happens to the original version.įile backup is used to make restoration possible. Disk cloning is the process of cloning all the data on disk, and the output file will be the same size as the initial one. Although it might seem similar to creating a disk image, there are certain differences. During it, one large file (usually compressed) is produced, which is later used for recovery process. For basic understanding, disk imaging is the process of creating an exact copy of a disk for its backup recovery. Note, that the speed of process and the size of output files are important. Key featuresĭisk imaging is the key function of course. For such emergency cases, we can use disk imaging software that will allow to restore data, with all the settings and programs preserved, with minimal data loss or even without it. Also, most imaging programs allow creating media storages, that later can be used to extract, unpack, restore a backup, even if the computer does not boot from its own disk. Many viruses can destroy or damage your system, which can lead to its failure or complete collapse. With uprise of virus and hacking technologies, and overall broadening of PC functionality, security issues have become even more relevant. With the help of this option, users can safely install an exact copy of the system on another computer or hard disk, in case of unpredicted failure - be it a virus attack, system crash, or some external problem. ![]() In its initial idea, this process involves creating an exact copy of the disk, with all installed programs and settings, and then storing it in a special compressed format. This is a type of software tools that allow users to create an image of the hard drive or the whole system - as a backup option, or to clone it.
0 Comments
![]() $ grep -r *Īs you can observe, grep traverses through each subdirectory inside a current directory and lists the files and lines where a match is found. grep allows you to easily do that with -r flag. It’s often needed to search files not just in the current working directory but also in subdirectories. Sometimes instead of the actual matched line, we need just the count of successful matches that grep made. It’s not always that we want a partial match but instead expect grep to match a complete word only. Kind of data but it works best with text data. Grep offers to search a pattern without looking at the case of the pattern. You can observe from the above output that the filename is printed first before printing the matching line to indicate where grep found the given pattern. var/log/messages-20201227:Dec 27 19:11:21 centos7vm kernel: ] *ERROR* Failed to send host log message. Enable it by using bert_enable as kernel parameter. var/log/messages-20201227:Dec 27 19:11:18 centos7vm kernel: BERT: Boot Error Record Table support is disabled. var/log/messages-20201225:Dec 23 23:01:00 centos7vm kernel: BERT: Boot Error Record Table support is disabled. var/log/messages-20201225:Dec 23 23:01:00 centos7vm kernel: ACPI: Using IOAPIC for interrupt routing var/log/messages:Dec 28 10:36:52 centos7vm kernel: ACPI: PCI Interrupt Link (IRQs 5 *9 10 11) var/log/messages:Dec 28 10:36:52 centos7vm kernel: ACPI: PCI Interrupt Link (IRQs 5 9 *10 11) ![]() var/log/messages:Dec 28 10:36:52 centos7vm kernel: ACPI: PCI Interrupt Link (IRQs 5 9 10 *11) var/log/messages:Dec 28 10:36:52 centos7vm kernel: ACPI: Using IOAPIC for interrupt routing Output: $ sudo grep err /var/log/messages* Here’s how you can look for a pattern in multiple files by using * wildcard. Grep enables you to search for the given pattern not just in one but multiple files. Grep command expects a pattern and optional arguments along with a file list if used without piping. So let’s get started…□□ grep Command Syntax Here we will be covering some of the commonly used grep command in different scenarios by sysadmin or developer. The power of regular expression combines with supported options in grep makes this possible. It’s often used to filter out unnecessary details while printing just the required information from big log files. grep basically searches for a given pattern or regular expression from standard input or file and prints the lines that match the given criteria. Its name comes from another similar command in ed tool, i.e., g/re/p which stands for globally search for a regular expression and print matching lines. Grep, originally developed for Unix-based systems, is one of the most widely used command-line utility in Linux boxes. I do understand why some people love this book. Especially the conclusion was well-paced and had some great plot twists. That being said, I did find the first 130 pages and the last 40 pages to be entertaining. Parisa is manipulative, narcissistic and rude. While I prefer morally grey and complex characters, I couldn’t find a single redeeming thing to Parisa. Lastly, the character of Parisa is such a horrible character. I absolutely can’t stand when someone glamorises unfaithfulness. That scene made me so angry that I almost DNFed this book. Halfway through this book, there is a scene where a character is unfaithful, and this horrendous act is almost depicted as a liberating and praiseworthy act. I also didn’t enjoy how this book portrays sex and almost romanticises unfaithfulness. However, having these characters act so selfishly made it difficult for me to like them. I suppose it makes sense to become self-centred when you are told that you are one of the top six best medians in the world. All the characters are power-hungry and quite egoistic. Firstly, I didn’t find any of the characters that likeably. However, I had several issues with this book. Olivie Blake does a fantastic job creating fascinating character dynamics and conflicts by giving these characters different magical abilities. Although they have an advantage, having magical powers doesn’t grant you an easy path through life.Ĭonsequently, these characters have different magical abilities and come from diverse backgrounds. ![]() These magicians or “medians” still have to fight to gain influence. You would almost imagine that having magical powers would automatically make you wealthy. Moreover, I also love how having magical powers doesn’t necessarily make you a part of the elite. However, although six are chosen, only five will walk away. They can become caretakers of the lost knowledge from ancient civilisations and enter an elitist academic magical group. This group has been selected to become a part of the Alexandrian Society. The Atlas Six is set in a world where the library of Alexandria still exists, and some people are born with supernatural powers! This book follows six people who are exceptionally gifted. However, there are aspects of this book that I loved.įirstly, I LOVE the premise of this book. If I knew that this book would have this much romance and be YA, I probably wouldn’t have picked this one up. However, in the case of The Atlas Six, I actually wished that I knew a bit about it before reading it. I usually love it when I don’t know anything about a book before picking it up. I was incredibly excited when I received an arc of this book since it seemed to be a much-loved book. According to the blurb on the arc copy, this “TikTok sensation” has over 15 million views – that is crazy. I don’t have TikTok, and I am probably not the primary target audience for this book hence why I hadn’t heard about it. I hadn’t heard about this book until a couple of months ago. I am really pleased to be joining The Atlas Six book tour! Today is my stop on the tour! Let’s talk about this book! ![]() Most of them.The Atlas Six by Olivie Blake (Book review) And if they can prove themselves, over the course of a year, they’ll survive. Here, each must study and innovate within esoteric subject areas. Finally there’s Tristan Caine, whose powers mystify even himself.įollowing recruitment by the mysterious Atlas Blakely, they travel to the Society’s London headquarters. And Callum Nova is an empath, who can manipulate the desires of others. Reina Mori is a naturalist who can perceive and understand the flow of life itself. Parisa Kamali is a telepath, who sees the mind’s deepest secrets. Yet each decade, only six practitioners are invited – to fill five places.Ĭontenders Libby Rhodes and Nico de Varona are inseparable enemies, cosmologists who can control matter with their minds. Their members enjoy a lifetime of power and prestige. ![]() Each could join the secretive Alexandrian Society, whose custodians guard lost knowledge from ancient civilizations. When the world’s best magicians are offered an extraordinary opportunity, saying yes is easy. ![]() ![]() Most of the dungeons aren’t that creative they’re just big mazes with different switches to open up doors to other areas. 30 hours of it, if you count just the main story mode. If you hate backtracking and padded-out main quests, be prepared to experience a lot of that in Tales of Berseria. Unfortunately, the game goes through a lot of standard RPG game design style to get its gameplay across. With a strong story, you’d think the game itself would be a step above the norm. But overall, the tone here is very atypical compared to past Tales titles. They also inject a bit of humour to the semi-dark tale, though some of them can make you go “huh?” due to some localisation discrepancies. The Tales-exclusive mini talking head cutscenes called “skits” that pop up in-between your journey do provide more context to the world. Velvet softens up, but still maintains her vengeance and her philosophy of using whatever and whoever to get it sorted. ![]() reason” seems to lean way further to the former, and is really on-the-nose about it. If you’re expecting the story to be another “band of misfits learning the error of their ways”, you’d be slightly disappointed. The rest of the cast are great, from the aloof and battle-hardy Rokurou to the entertaining nutjob Magilou. Yet, Eleanor brings a lot of reasoning to balance out the emotional core. She’s a saint and do-gooder in a group of misfits the relationship and tension between her and the party brings a lot of emotion and much-needed drama to the story. My personal favorite character is Eleanor, a former Abbey exorcist roped into the group out of duress and dire circumstances. It’s interesting to note that Velvet gave the emotionless child her deceased brother’s name, which brings up a LOT of warning signs about her state of mind. The aforementioned Laphicet is coming to grips with his newfound freedom. Velvet is a hardass, but has a tender side she emanates at rare times. Despite their demonic influence, the “heroes” are as human as you can get. After a prison break, she and her motley crew of misfits set a town on fire, beat up the good guys, kidnap a child named Laphicet who happens to be a spiritual being known as the Malak and become pirates, thanks to another Malak named Eizen.ĭid we mention that you’re playing the bad guys? At this point, it should be quite obvious.īut given Velvet’s circumstances, you’re curious to see how it all plays out and whether she gets her revenge. Top it off with being imprisoned by exorcists for three years, it’s easy to see why she’s more than a tad miffed. She gets another nudge into villain town by turning into a daemon and inadvertently decimating the town she grew up in. For one, going through a traumatic experience of seeing her brother sacrificed by her mentor Artorius for the greater good is just the tip of the iceberg. It’s Good To Be BadĪfter a few hours into the story, you’ll realise that your main character Velvet is not exactly a pleasant human being. But Tales of Berseria has a mean streak in its narrative and fast-paced combat system that would set it apart from the other Tales series. Sure, it shares the anime art and story style with the earlier Tales of Xillia and Tales of Zestiria, the latter serving as this game’s canonical prequel. Tales of Berseria‘s J-rock infused intro would have given you a hint of what’s to come – an anime-infused RPG filled with tropes and battle styles straight out of the Japanese cultural phenomenon. ![]() Given the periods, it means we’re spying on their major life moments. Each one looks at a major move in the person’s life. But there’s plenty of ambiance packed into each “level.” Unpacking’s “levels” are organized into years. Here’s the part of the review where I’d typically talk about a title’s story and, while you’d think that wouldn’t be possible with a game about unpacking things, it is! There are no exact details about this person’s life. Upon closer review, Unpacking is a game that is sort of similar, though the item placement involves no competition, no stress, and almost no worries about doing things “wrong.” In Puyo Puyo, you want the puyos to fall into the right places to trigger combos. In Tetris, you try to organize tetrominos to create perfect rows. ![]() Did you find another solution for managing RAR files on the iPhone or iPad? Did you use another app to open and extract the archive? Feel free to share your experiences with iZip, or any relevant tips or perspectives in the comments section.A lot of puzzle games involve finding the right place for things. Hopefully, you were able to extract the RAR files you received without any issues. Just search for RAR manager on the App Store and check out the top results. Therefore, if you don’t like the ads or user interface of the app, you can always try out a different one. IZip is just one of the many apps that are available on the App Store that can be used for managing and opening RAR files on your iPhone. Of course, iZip can be used to extract ZIP files too, but most people would prefer the native Files app for extracting these files unless a format isn’t supported. If you haven’t tried out the built-in decompression feature on iOS and iPadOS just yet, you may be interested in learning how to unzip files on your iPhone and iPad. Once extracted, you can save the extracted files in a desired location using iZip, which can then be accessed from the native Files app. You can just tap on the files to view them individually.Īs long as you don’t mind using a third party app, opening, extracting, and viewing RAR files on an iPhone or iPad is easy, even if the format isn’t natively supported by the Files app the way. ![]() The extracted files will show up in the app immediately.You’ll also get a confirmation prompt for unzipping the files. Next, you’ll be shown a preview of the contents of the file.This will take you back to iZip with a message saying that the file has been imported.Head over to the directory where the RAR file is stored and select it using the file browser.You’ll be shown your recent files by default, but tap on “Browse” from the bottom menu to locate a specific file. This will launch the native file browser on your iPhone.Next, tap on “Document Browser” from the main menu of the app. ![]() Make sure you download and install the latest version of iZip from the App Store before going ahead with the steps below: To manage the RAR files, we’ll be making use of a very popular file management app called iZip. How to Extract RAR Files on iPhone & iPad Let’s take look at the options so you can learn how to open and extract RAR files on your iPhone and iPad. Thanks to the bunch of third-party file manager apps that are available on the App Store, you have plenty of options to deal with the RAR format in iOS and iPadOS. But, that doesn’t mean you’re out of luck. Due to its proprietary nature, you will not be able to extract RAR files natively on your iPhone or iPad (yet anyway, but perhaps down the road?). This makes managing compressed files a breeze until, you run into a RAR file, which is a proprietary file format developed by RARLAB. The Files app of iOS and iPadOS allows users to uncompress and open ZIP files natively on their devices using the Files app, and to create zip files too. ![]() 34 The A/S dosage ranges between 2 and 10 ppm, depending on the scale-forming potential of the RO feed water, product water recovery, and A/S manufacturer's recommendations. When acid is used with an A/S, the LSI value (of the reject stream) of 1.0 is acceptable (see Table 2.6) although some A/S manufacturers claim an LSI of 2.7 is acceptable when using their recommended product. A RO/NF system that uses A/S must be designed with automatic flush cycle after shutdown to prevent scaling by concentrated salts in the feed–reject channel above the membrane surface.Īntiscalants can be used alone, but are usually used with acid feeds. The effectiveness of scale inhibition is approximately 30 min. Although antiscalants are very effective in preventing carbonate and sulphate scaling of membranes, they do not prevent scaling from occurring rather they delay the formation of large crystals that form scales. 14, 33Īntiscalants are preferred to IX softening when the feed water hardness is less than 100 ppm because of cost and ease of operation. Many scale inhibitors also contain dispersants that keep the precipitates suspended in solution. Since A/S inhibit the growth of crystal, it does not grow to a size or a concentration large enough to precipitate out of the suspension. Antiscalants prevent mineral scaling by getting absorbed on the scale, forming salt crystals thereby preventing the attraction of the supersaturated salt to the crystal surfaces. In addition, chelating agents such as EDTA (tetra sodium salt of ethylene diamine tetra acetic acid) are used to control hardness (at pH > 6.0) and metallic ion deposits. The majority of scale inhibitors can be classified as threshold inhibitors. Scale inhibitors or antiscalants (A/S) are generally organic compounds containing sulphonate, phosphonate, or carboxylic acid functional groups and chelating agents such as carbon, alum, and zeolites that sequester and neutralise a particular ion which may be formed. Rajindar Singh, in Hybrid Membrane Systems for Water Purification, 2005 Antiscalant threshold treatment When a cationic-based coagulant or filtering aid is used in the pretreatment, a very viscous, sticky foulant can be produced that will increase feed pressure requirements, and it can be very difficult to clean off.Īn antiscalant that was popular in the early days of RO was sodium hexametaphosphate (SHMP), but its use has been greatly reduced with the advent of proprietary antiscalants because of a number of limitations. (ii)Īntiscalants are anionic in nature (e.g., polyacrylic acids). ![]() This foulant will increase feed pressure requirements, but typically can be cleaned using a low pH cleaning. They are susceptible to the formation of a foulant that settles on the membrane surface if there are high levels of iron. (i)Īntiscalants made of polyacrylic acid. However, they have to be used with caution. It should be duly noted that the large number of different antiscalant chemistries that have evolved have produced a wide variety of results and efficacy depending on the application and organic polymer used. Thanks for bringing this to my attention.Antiscalant technology for RO systems was initially derived from chemistries used in cooling water and boiler water applications. Example: Duly noted used sincerely Duly noted. If you’re concerned about coming across as impolite, consider clarifying your intention by thanking the person for their opinion or suggestion. Can I keep watching TV now?īecause duly noted is a brief response and because it’s so frequently used sarcastically, it can be perceived as somewhat rude or dismissive, even when you mean it sincerely. Examples: Duly noted as sarcasmPerson A: I think you need to spend less time watching TV and more time studying. This typically occurs in informal contexts. Is duly noted rude?ĭuly noted can be used in a facetious or sarcastic manner to say that you think someone’s idea is irrelevant or that you don’t care what they have to say. The aide ensured that recent complaints regarding the new policy were duly noted by the committee. The business consultant’s advice was duly noted. It can be used by itself as an acknowledgement of an opinion, or as part of a sentence. It’s usually used in formal or professional contexts. Dully noted, dually noted, duely noted, dualy noted, dooly notedĭuly noted is a phrase used to say that something has been properly acknowledged or recorded. If you did uninstall Snipping tool from your computer, then you can reinstall it without downloading it.Ĭlick "Start" > Go to "Control Panel" > "Programs" > "Turn Windows features on or off" > Scroll down to tick " Tablet-PC Optional Components " to enable it. On Windows Vista: Click the "Start" button on the Windows Taskbar > "All Programs" > "Accessories"> Click "Snipping Tool" to start to Snipping Tool on Windows Vista. On Windows 7: Select the "Start" button, then type "snipping too"l in the search box, and then select "Snipping Tool" from the list of results. On Windows 8.1 / Windows RT 8.1: Swipe in from the right edge of the screen, click "Search" (or if you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, and then click "Search"), type "snipping tool in the search box, and then select "Snipping Tool" from the list of results. On Windows 10: Select the "Start" button, type "snipping tool" in the search box on the taskbar, and then select "Snipping Tool" from the list of results. Commonly, if you cannot find Snipping Tool shortcut on your desktop, then you will be able to launch this software again on your computer to use. Snipping tool is the built-in screenshot tool for your Windows 10/8/7/Vista. ![]() In the following descriptions, you will find the answers about Snipping Tool. For using this screenshot software, you need to download it to your computer, and take screenshots of an open window, rectangle areas or free-form area to store the image file or send to email. Snipping Tool is the free built-in screenshot utility on Windows system created by Microsoft. "I run Snipping Tool on my Windows 7 computer, but not sure how to use it to take the screenshot of the active window? Is there any tutorial or hotkeys to help me to use Snipping Tool?" "My Snipping Tool shortcut disappeared from my Windows 10 computer for no reasons. ![]() ![]() Snipping Tool Download/Tutorial and Its Alternatives Then select navigation menu options and set the color palette. If you don’t like the default color on the navigation menu, you can change it to a different color by clicking the theme configuration icon on the bottom of the navigation menu, ![]() Now you will be presented with Webmin login screen. If you are using Google Chrome, you can click Advanced -> Proceed. Now you can access the web-based control panel via your-server-ip:10000īecause it’s running in HTTPS mode and using a self-signed TLS certificate, so you will be told by the browser that the connection is not secure.īut you know this is your own server, so simply click the Advanced tab in Firefox and add exception. sudo firewall-cmd -permanent -add-port=10000/tcp Webmin server listens on port 10000, so you need to open TCP port 10000 in the firewall. If you see the “ Unit rvice could not be found” error, then you need to restart your server. If it’s not running, you can start it with: sudo systemctl start webmin Hint: If the above command doesn’t quit immediately, you can press the Q key to gain back control of the terminal. Once installed, the Wemin built-in web server will automatically start as can be seen by running the systemctl command below: systemctl status webmin Now we can update repository and install Webmin. Then import it with: sudo rpm -import jcameron-key.asc ![]() Next, we need to run the following command to download and import Webmin PGP signing key so that the package manager can verify the integrity of packages downloaded from Webmin repository. To save the file in Nano text editor, press CTRL+O, then press Enter to confirm. sudo dnf install nanoĪdd the following lines in the file. To add Webmin repository, create a repository file with a command-line text editor such as Nano. It’s recommended to install Webmin from its official repository so that you can always get the latest version. Webmin isn’t in CentOS/RHEL software repository. At the time of this writing, the latest stable version available is 1.970, which was released on January 6, 2021. Install Webmin on CentOS 8/RHEL 8 From Webmin Repository Edit package repositories, schedule automatic software updates and receive update reports via email.Postfix SMTP server and Dovecot IMAP/POP3 server.BIND DNS resolver and authoritative DNS server.The following is a list of functionalities provided by Webmin. ![]() If you don’t like the idea of using the command line to manage your server, then Webmin is a good graphical alternative to you. Webmin provides users with a graphical web-based user interface to configure common system tasks and settings. This tutorial will be showing you how to install Webmin on CentOS 8/RHEL 8 server. Webmin is a free and open-source control panel for administering Unix/Linux servers. ![]() Before you leave them out to dry, fill the shoes with paper to reshape, changing the filler throughout the process if the paper gets damp. Platform Velour Sneakers by Converse at Free People, Dark Wine / Saddle. Don't even think about using your hair dryer to speed up the process-it won't help prolong the life of your shoes. A heritage classic in the world of sneakers, Converse is the name behind our. You might be tempted to put your shoes in the dryer for a quick fix, but the manufacturer recommends leaving the shoes out to air-dry. You can take a toothbrush or smaller brush to scrub the toecap and rubber base of the shoe. Use a damp cloth to rub the shoes-don't be too rough on the material. Mild soap and lukewarm water will do the trick for your canvas sneakers. Chuck Taylor All Star BERKSHIRE BOOT HI BLACK/BLACK CC21BEMO-171447C. ![]() Vintage 1980s Converse Size 10 Made In USA Punk Grunge Sneakers. Chuck Taylor LUGGED 2.0 COUNTER CLIMATE SADDLE/DARK WINE/PAPYRUS C294SA - A01329C. Converse advises against throwing your sneakers in the washing machine. Find many great new & used options and get the best deals for RM WILLIAMS BOOTS 1970s VINTAGE LEATHER CUBAN HEEL SIZE 13G W USED CONDITION. Converse suggests testing your cleaning method on a section of the sneaker that isn't visible (like the sides of the tongue that are hidden inside the shoe). When cleaning any product for the first time, you'll want to test a small part of it before you clean the whole thing, just in case the cleaner or method doesn't work and stains the material. Environmentally friendly sneakers, made with raw materials sourced from organic farming and ecological agriculture. Today we revisit 2016! I added a comics archive for my really weird, 12-episode Facebook art experiment, ANYTHING COMICS.Ĭopyright © 1999 - 2023 David C. I'm happy to add KEYTAR KITTENS to finally! This was another comic strip project which I worked on in 2015! Richard has amazing stuff on display and I was psyched to close out 2019 with a fun packrat comic for him. Packrat Comics hosts a Halloween Comicfest on October 31 with our annual comics for canned goods food drive (free comics for non-perishable food items), comic creators, Mikey’s Late Night Slice pizza truck, a costume contest along with a special guest appearance by Deep Roy. Today, for the 17th anniversary of RAB, and since I'm stuck at home during a global pandemic, I decided it was time to get back into drawing ANYTHING NAPKINS again! Now you can have a custom drawing of absolutely anything, drawn on a virtual napkin and emailed to you personally, along with being posted on the Facebook page!īrand new PACKRAT COMIC strip today, courtesy of RL Music, a vintage synth repair/sales shop. Today I updated my CAR HISTORY to include my SIXTEENTH CAR! At this point, it should've probably been a hearse, considering what happened to Car #15! Hint: It was on a Friday the 13th. Pre-order your copy right here on the BEELZEBUDS page! It should appeal to fans of things like Good Omens and Stranger Things. Not only does he want to steal things, he wants the world to know about it and sing his praises. A renowned thief and narcissist, he's also a glory hound. A two-bit thief with a conviction record six parsecs long Packrat is sneaky and generally untrustworthy. I wrote a novel! It comes out March 1, 2021! Fans of my drawings, such as The Packrat, and especially the Book of Beings, might like to see what kind of writer I am when I set out in earnest to create a 1980s Fantasy/Comedy! Granted, it took six years to finish! This book is just under 300 pages, and includes a couple dozen woodcut-style illustrations. Packrat is a Maximal from the Beast Wars portion of the Generation 1 continuity family. it's sure to be the bitcoin of books before too long. Whew! Only took seven years! There are only 225 First Editions, all hand-signed and numbered, and I don't plan on getting rid of every single one. My novel BEELZEBUDS is officially released today. So in their honor, today I created RPS-5: The Birthday Edition! Today is my brother's birthday! It's also the birthday of the one and only Sam Kass, the original creator of Rock Paper Scissors Spock Lizard. Hello, strangers! Today I have updated the RPS-101 page to include a link to a basic, playable version of the game online. I also have an ETSY SHOP where you can purchase some of the larger ones. I have dozens of them up on my relatively new IG page called ATELIER ARTFLAKE. Something I've been doing for a couple years now is creating insanely complex, hand-cut paper snowflakes called ArtFlakes. ![]() Please follow the band on Facebook and YouTube, and check out a live YouTube performance of one of our originals, "All New Us"! ![]() OCTOKONG! Parallax appreciators are sure to enjoy this extremely synthy original band. Here's a long-overdue update about my latest music project. My inner Packrat is resurfacing, so why not include the comic? It's been over three years since I've drawn up a new PACKRAT COMIC ! There's a brand new Oberheim synthesizer comic out, and it'll be the first new bit of gear that I buy myself in eons. |