file system – How to add strong encryption to an SD card so that I can access it both on my desktop and phone using open source non tracking offline tools?

The question says it all. So far I was able to find out

  1. Default android encrypted SD card can only be read by the phone or by a skilled hacker or their non open source tools
  2. There are tools that are clunky to use or not open source (cannot be trusted) or riddled with bugs (cannot be used with important files)
  3. I know I can zip files but that’s so impractical.
  4. Most apps use weak encryption algorhithms that are not suitable anymore for anything but a kid who finds your phone in a park

Question: Is there no solution like examples: veracrypt (for windows) or luks (for linux)? Such as mounting a volume and accessing it in your file browser like I do now when I insert an SD card in my phone, it then mounts the volume, which I then am able to access in my file browser. That is what I want with encryption ideally, it’s the simplest most practical and natural way to do it, so I assume there is a way to do it…

audit – How can I use macros for revision tracking in Access 2016?

When a field is updated, I want a macro to add information about that change to an audit table. All I need is what changed (table, record, field), the old and new values, and the date/time of the change.

I’ve tried updating via form vs table, changing data types, creating named macros rather than using After Update, and a bunch of other tweaks, and I’ve referenced various official and unofficial documentation/forums/tutorials (including ScottGem’s “Audit Trail using Data Macros”, Access programming articles at the Microsoft support site, and several entries at

I’m troubleshooting this issue by using simplified data in a new, blank database to avoid leftovers from previous attempts:
tblAudit has one manually-entered record with fields for ChangeID (AutoNumber PK) and TableChanged, RecordChanged, FieldChanged, OldValue, NewValue (all Short Text), and ChangeDate (Date/Time).
tblVendors has two records of sample data over three fields (VendorID as AutoNumber PK, plus VendorName and Phone as Short Text). I added an After Update macro through the Table tab’s After Events section (below). This time around, I haven’t changed anything else.

When I change the first record’s VendorName field, I expect the macro to create a corresponding record in tblAudit, but I don’t see any changes. What am I missing?

Code formatted for legibility:

<?xml version="1.0" encoding="UTF-16" standalone="no"?>
    <DataMacros xmlns="">
        <DataMacro Event="AfterUpdate">
                                    <Action Name="SetField">                                    
                                        <Argument Name="Field">
                                        <Argument Name="Value">
                                    <Action Name="SetField">
                                        <Argument Name="Field">
                                        <Argument Name="Value">
                                    <Action Name="SetField">
                                        <Argument Name="Field">
                                        <Argument Name="Value">
                                    <Action Name="SetField">
                                        <Argument Name="Field">
                                        <Argument Name="Value">
                                    <Action Name="SetField">
                                        <Argument Name="Field">
                                        <Argument Name="Value">
                                    <Action Name="SetField">
                                        <Argument Name="Field">
                                        <Argument Name="Value">

Google Analytics funnel tracking traffic from another source

Here’s the issue: I’m trying to setup a goal that tracks form completion (that ends up in payment for a service) in between subdomains. The funnel is as follows:

step 1: (requried switched on).

step 2:

step 3:

step 4:

step 5:

step 6:

step 7:

The problem is, the goal fires with traffic that comes from the primary domain to the subdomain b ( ->

Both sub domains and main domain have the same GA tracking code and the GTM code is configured for cross-domain tracking (even though all documentation says it’s not required as it is setup by default for dubdomains) as well as Decorate Forms.

Main domain is in the Referral Exclusion List, also tried to include both subdomains and still smae result.

I’ve tried applying filters to the vie by just showing/excluding traffic from, also from both domain but if i do this the goals won’t fire.

I’ve tried forcing (cookieDomain: auto), (autoLinker: true) as well as Cross Domain tracking in both subdomains and still getting the same result.

Thank you in advance, any help would be appreciated.

macbook pro – How to increase mouse tracking speed beyond the maximum for MacOS BigSur?

macbook pro – How to increase mouse tracking speed beyond the maximum for MacOS BigSur? – Ask Different

How to remove git tracking but keep file in repo

  1. I do not want to delete the file in the repo.
  2. I do want the file cloned a developers and my machine.
  3. However, I do want to ignore the file from future check in/push.

My goal is that only files that are actually modified .c/.h are what shows up after running a git status. I have already modified the .gitignore but the project was uploaded into GitLab including Makefiles and other miscellaneous files that are necessary for building the project but get modified each time anyone does a build on their machine. It just needless garbage on the screen to sift through.

Does anyone make a single device that does GPS navigation and tracking?

All Garmin devices I’ve seen have the ability of constantly writing GPS track in background. I suppose, every touristic GPS has such functionality. Since GPS device is constantly tracking GPS signal, writing track is a low-cost operation.

I’m using my Garmin to navigate to the geocaches, and I’m always registering GPS track in the same time. It’s a standard function nowadays.

From what I know, there are clocks with GPS that can be used only for GPS tracking because they don’t display maps, but such devices are quite a niche, practical only for speed runners who want to save a bit on weight.

Smartphones, on the other side, are relatively good for GPS navigation, but not for tracking, because GPS drains power from them very quickly. It’s practicable to activate GPS only to see how to go further and then shut up the maps app.

But with tourist GPS, it’s not the case. They are designed to be turned on constantly, and they can work on one battery set quite a long (my Etrex – over 24 hours). Consider buying the device that can work with rechargeable batteries like AA, you can take extra supplies, and in “emergency” case, buy some unrechargeable AAs in any newspaper shop.

issue tracking – Why are reproduction steps helpful for fixing software bugs?

As a thought experiment how many questions does your software ask and answer?

As an approximation search for words like: if, for, while, interface. Sum up their counts. That is a low ball-park figure.

Now when this software executes it plays a choose your own adventure story walking through each question and bouncing to this page or to that page.

A simple program that does 1 thing like copy a file, still has many paths it can take. A Large file vs a small file, from/to a fast/slow drive, across file systems, different filesystem paths.

A complex program has infinite paths, like just about any GUI program. Every user event occurs at different times, in different contexts, producing different layerings of response.

As a very rough thumbnail. Presume your system has roughly operational life time in seconds * factorial(the number of decisions) unique paths. There is a bug in one, or more of those paths. Find it.

If you aren’t quaking about the factorial in that approximation, you really should be. Its get large really fast. The more complicated the program, the even quicker it grows. This is why a large program is guaranteed to have bugs, and why so much effort is put into making programs simpler and smaller.

This is why it is so essential to describe as much information about the bug as possible.

The basics like:

  • What was wrong.
  • What it should have been.
  • Which screen, report, extract, email.
  • When it has occurred
  • Who it has occurred to
  • Which version

… are important. They help close down a lot of possibilities for where the bug could be lurking.

But in a complex software eco-system its just not enough.

Ideally there would be a testing tool that support have access to that allows them to recreate the situation inside an automated test. Even if the test is slow, and does way more than it really needs to. All of that can be worked on. The important part is that it exactly reproduces the issue.

Short of having that the next best tool is a manual test. Do this, then that, click this, and voila. This is also know as steps to reproduce. The more accurate these steps are, the easier it is going to be to find the bug. If these steps are inaccurate/not there then it is pure luck if the developer spots the bug.

Also to the description of a mechanic and a driver, its the wrong analogy. Support are the mechanics. The driver of the vehicle is the client. Developers are the designers working on the car production factory.

Support do need to know what components make up the vehicle, and be able to describe accurately the effects of real world usage on those components. IE. Did you know the computer board A, burns out really quickly for high way driving users? In software speak Did you know that the last day of the month batch process X takes 3 times longer to run, but the input is the same size as every other day that week?

If support just communicates back to the developers. Hey your product is broken. you can expect them to be ignored, because of course its broken. It arrived broken, or it has been misused to the point of breaking. That’s supports problem.

What is not supports problem is a structural defect with the product itself. Not with how it was delivered, or how it was used. They would communicate this exactly like a mechanic would to the car manufacturing company. In circumstance X, Y, Z. Following these normal system usage patterns. Some P% of the time Q happens. Doing F reduces P% or increases P%. If you do M the Q changes to Q2.

bluetooth – Which BLE tag can be programmed for lost item tracking

bluetooth – Which BLE tag can be programmed for lost item tracking – Super User

DreamProxies - Cheapest USA Elite Private Proxies 100 Cheapest USA Private Proxies Buy 200 Cheap USA Private Proxies 400 Best Private Proxies Cheap 1000 USA Private Proxies 2000 USA Private Proxies 5000 Cheap USA Private Proxies - Buy Cheap Private Proxies Buy 50 Private Proxies Buy 100 Private Proxies Buy 200 Private Proxies Buy 500 Private Proxies Buy 1000 Private Proxies Buy 2000 Private Proxies New Proxy Lists Every Day Buy Quality Private Proxies