Everywhere
  • Everywhere
  • Articles
  • Pages
  • Forum
  • Files
  • More Options
  1. Dashboard
  2. Members
    1. Recent Activity
    2. Users Online
    3. Staff
    4. Search Members
  3. Forum
  4. Downloads
  5. ISeeT Main Site
  • Login
  • Register
  • Search
  1. Dashboard
  2. Members
    1. Recent Activity
    2. Users Online
    3. Staff
    4. Search Members
  3. Forum
  4. Downloads
  5. ISeeT Main Site
  1. Dashboard
  2. Members
    1. Recent Activity
    2. Users Online
    3. Staff
    4. Search Members
  3. Forum
  4. Downloads
  5. ISeeT Main Site
  1. ISeeT Forums
  2. Members
  3. ISeeTWizard
  • Sidebar
  • Sidebar

Posts by ISeeTWizard

  • Reverse DNS

    • ISeeTWizard
    • October 26, 2025 at 10:29 AM

    If you ever needed a Machine Name for an IP Address you can simply try this PowerShell command (always run as administrator).

    Code
    $ComputerIPAddress = '10.10.10.10'
    [System.Net.Dns]::GetHostEntry($ComputerIPAddress).HostName


    There is an alternative to get more information while connection to the Active Directory (if available).

    Code
    import-module activedirectory
    $ComputerIPAddress = '10.10.10.10'
    Get-ADComputer -property * -filter { ipv4address -eq $ComputerIPAddress }
  • DNS commands

    • ISeeTWizard
    • October 26, 2025 at 10:28 AM

    Here are some useful commands regarding the DNS cache, resolve etc.


    Code
    #Display the DNS Cache
    ipconfig /displaydns
    
    #Empty the DNS Cache
    ipconfig /flushdns
    
    #Display DNS Cache (Powershell only)
    Get-DnsClientCache
    
    #Empty the DNS Cache (PowerShell only)
    Clear-DnsClientCache
    
    #Test a connection to a computer (ping like PowerShell command)
    Test-Connection ComputerName
    
    <# Provides information about network latency and network loss at intermediate hops between a source and destination. 
    This command sends multiple echo Request messages to each router between a source and destination, over a period of time, and then computes results based on the packets returned from each router. 
    Because this command displays the degree of packet loss at any given router or link, you can determine which routers or subnets might be having network problems. #>
    pathping ComputerName
    
    #Performs a DNS name query resolution for the specified name
    Resolve-DnsName ComputerName
    
    #Find DNS records for a specific computer
    nslookup -debug ComputerName
    Display More
  • Block IP trough Firewall

    • ISeeTWizard
    • October 26, 2025 at 10:25 AM

    I had recent attacks on my Linux server and so I was searching on how to add an IP drop with my firewall.

    On my Sites I have a security system that blocks already many things but unfortunately not all.

    And so here I show you an example on how to do it (at least how I did it).

    Code
    #add the ip 91.92.252.176 to the connection reject list
    firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="91.92.252.176" reject'
    
    #reload the firewall with the new settings
    firewall-cmd --reload
    
    #see the state of the firewall engine
    firewall-cmd --state
    
    #see the current settings
    firewall-cmd --list-all
    Display More


    Example - You want to add an IP that is already exisiting


    Reload firewall - if all is ok you'll get a success


    Checking the state will show you if it's running or it's stopped


    With list-all you gonna see the current settings - so also what is allowed (here logicaly obfuscated)

  • Type of Networks

    • ISeeTWizard
    • October 26, 2025 at 10:20 AM

    PAN

    Personal Area Network A personal area network (PAN) is a computer network for interconnecting electronic devices within an individual person's workspace. A PAN provides data transmission among devices such as computers, smartphones, tablets and personal digital assistants.

    LAN

    Local Area Network A local area network (LAN) is a collection of devices connected together in one physical location, such as a building, office, or home.

    WLAN

    Wireless Local Area Network A wireless local area network (WLAN) is a network that transmits information using electromagnetic waves or light, allowing devices to connect to the internet or other devices without the need for physical cables. WLANs are commonly used for wireless internet access in homes, offices, and public places.

    CAN

    Campus Area Network A campus area network (CAN) is a computer network that spans a limited geographic area. CANs interconnect multiple local area networks (LAN) within an educational or corporate campus. Most CANs connect to the public Internet.

    MAN

    Metropolitan Area Network A metropolitan area network (MAN) is a network that covers a smaller geographical area such as a city or a large college campus system. Good examples of MANs are the local telephone company and your local cable TV company. MANs are also widely used in large companies and in governments to interconnect their computers.

    WAN

    Wide Area Network A wide-area network (WAN) is the technology that connects your offices, data centers, cloud applications, and cloud storage together. It is called a wide-area network because it spans beyond a single building or large campus to include multiple locations spread across a specific geographic area, or even the world.

    SAN

    Storage Area Network A Storage Area Network (SAN) is a network of storage devices that can be accessed by multiple servers or computers, providing a shared pool of storage space.

    SANS

    System Area Network A system area network (SAN) is a group of devices that are linked by a high-speed, high-performance connection. A SAN connection uses Internet Protocol (IP) addresses, which are assigned by TCP/IP to each SAN network interface controller (NIC), to determine data routing.

    POLAN

    Passive Optical Local Area Network A Passive Optical Network (PON) utilizes fiber-optic technology to distribute data from one source to multiple endpoints. The term "passive" denotes the use of optical fiber cables linked to an unpowered splitter, which transmits data from the service provider's network to numerous customers.

    EPAN

    Enterprise Private Network An Enterprise Private Network (EPN) is a computer network built by a business to interconnect its various company sites such as production sites, offices, and shops. This private network allows companies to share resources and communicate effectively.

    VPN

    Virtual Private Network A VPN protects its users by encrypting their data and masking their IP addresses. This hides their browsing activity, identity, and location, allowing for greater privacy and autonomy. Anyone seeking a safer, freer, and more secure online experience could benefit from a VPN.

  • Best Network Security Solutions

    • ISeeTWizard
    • October 26, 2025 at 10:19 AM

    Virtual Private Network - VPN

    • NordVPN
    • ExpressVPN
    • Cisco AnyConnect
    • Juniper Networks VPN


    Cloud Based Security Brokers - CASB

    • Microsoft Cloud App Security
    • Bitglass Total Cloud Security
    • Netskope Security Cloud
    • McAfee MVISION Cloud


    Antivirus / Antimalware

    • Symantec Endpoint Protection
    • McAfee Endpoint Prtoection (now Trellix)
    • Kaspersky Endpoint Protection
    • ESET Endpoint Protection

    I personally recommend to just use the Microsoft Defender


    Endpoint Detection and Reponse (EDR)

    • CrowdStrike Falcon
    • SentinelOne
    • Carbon Black (part of VMWare)
    • Sophos Intercept X


    Firewalls

    • Cisco ASA with FirePOWER
    • Palo Alto Networks Next-Generation Firewalls
    • Fortinet FortiGate
    • Check Point Next Generation Firewall


    Identity and Access Management (IAM)

    • Okta
    • Microsoft Azure Active Directory
    • Duo Security (Cisco)
    • SailPoint IdentiIQ


    Intrusion Detection and Prevention Systems (IDPS)

    • Snort
    • Cisco Firepower
    • Palo Alto Networks Threat Prevention
    • Check Point SandBlast


    Security Information and Event Management (SIEM)

    • Splunk Enterprise Security
    • IBM QRadar
    • LogRhythm NextGen SIEM Platform
    • AlienVault USM (AT&T Cybersecurity)


    Secure Web Gateways (SWG)

    • Zscaler Internet Access
    • Symantec Web Security Service
    • McAfee Web Gateway
    • Forcepoint Web Security


    Network Access Control (NAC)

    • Cisco Identity Services Engine (ISE)
    • Aruba ClearPass
    • Forescout Counter ACT
    • Portnox CORE


    Email Security

    • Trustifi AI-Security
    • Barracuda Email Security Gateway
    • Proofpoint Email Protection
    • Mimecast Secure Email Gateway
    • Cisco Email Security


    Data Loss Prevention (DLP)

    • Symantec Data Loss Prevention
    • Digital Guardian
    • McAfee Total Protection for Data Loss Prevention
    • Forcepoint DLP
  • Diablo IV - Vessel of Hatred

    • ISeeTWizard
    • October 25, 2025 at 9:23 AM
    Rating
    4/5
    Good

    Ratings

    These ratings are my personal opinion - Your Opinion maybe different than mine!


    Graphics

    5 out of 5

    Difficulty

    4 out of 5

    Steam Deck

    4 out of 5

    ROG Ally - Bazzite

    4 out of 5


    Description

    Vessel of Hatred is a paid expansion for Diablo 4 that comes with new ways to play and new evils to vanquish. Players get to choose whether they want to continue playing the base game of Diablo 4 or purchase the expansion and experience its contents.

    EMBRACE THE SHADOWS!
    A new region of Hell is coming to Diablo IV on October 8 - 2024! Vessel of Hatred is the first expansion and next chapter of the genre-defining, award-winning series by Blizzard Entertainment. Pre-purchase now for immediate access to in-game rewards and prepare for the darkness that awaits you as the first expansion charges through the land of Sanctuary.

    NEW CLASS: SPRIRITBORN
    Ranked among the apex predators of the jungle, the Spiritborn is an entirely new class to the Diablo series. They are battle-hardened with mystical synergies that could only be awakened deep within the jungles of Nahantu. Become one of the Spiritborn and embrace the ethereal Spirits entwined with this ancient civilization.

    NEW REGION: NAHANTU
    Explore Nahantu, the new jungle region in Diablo IV full of secrets, dangerous new Dungeons, Strongholds, and ferocious demons from warring Tribes.

    CONTINUE THE CAMPAIGN
    Set immediately following the events of Diablo IV, Vessel of Hatred continues the dark story as you fight to save Neyrelle from Mephisto's tightening grip on her soul, still reeling from the choice she made to contain him. The search for Neyrelle takes you deep into the ancient jungle as she grapples with the imprisoned Prime Evil. Attempt to unravel Mephisto’s dark plot while new foes encircle your every move, planning your demise. The fate of Neyrelle’s soul - and her ability to stop this Prime Evil from destroying Sanctuary - rests in your hands.

    Never fight alone as new Mercenaries can join you on your quest to fight in the dense undergrowth of Nahantu and beyond. These powerful allies grow in power as they progress, and each are equipped with unique abilities to help you in combat.

    NEW GAME UPDATES
    Vessel of Hatred also has huge updates for all Diablo IV players with new class skills, paragon boards, legendary glyphs, dungeon types, Tree of Whispers activities, and more.

    A new co-op PvE mode where you work with your friends to complete objectives and slay the boss in a multi-level dungeon, while getting loot and rewards.

    My Opinion

    As I can't play daily it always take some time until I finish my test but what should I say? I simply love Diablo IV as I loved the Diablo games before.

    The new class is great as also the new area.

    The story continues which is great and it take several hours to finish it but there is such abrupt ending...
    I thought it would continue but it was the end and so we can say the next DLC will come with the continuing story...

    For end gaming content I'm not the one to ask - here you need to ask people that don't have any life and play daily for hours and hours.

    But I would always recommend this game 🙂


    Requirements


    Minimum

    Operating System (OS)

    Windows 10 64Bit (1909 or higher)

    Processor (CPU)

    Intel Core i5-2500K
    AMD FX 8350

    Memory (RAM)

    8 GB

    Graphics processing unit (GPU)

    Nvidia Geforce GTX 660
    Intel Arc A380
    AMD Radeon R9 280

    DirectX

    12

    Network

    Broadband internet connection

    Disk Space

    90 GB

    Additional Comment

    1080p native resolution
    720p rendered resolution
    low graphics settings
    30 FPS
    SSD required


    Recommended

    Operating System (OS)

    Windows 10 64Bit (1909 or higher)

    Processor (CPU)

    Intel Core i5-4670K
    AMD Ryzen 1300X

    Memory (RAM)

    16 GB

    Graphics processing unit (GPU)

    Nvidia GTX 970
    Intel Arc A750
    AMD Radeon RX 470

    DirectX

    12

    Network

    Broadband internet connection

    Disk Space

    90 GB

    Additional Comment

    1080p resolution
    medium graphics settings
    60 FPS
    SSD required


    Trailer etc.

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.


    Related links (non affiliate!)

    Steam
    Blizzard
    Instant Gaming


    Photos / ScreenShots



  • Insecure vs Secure Ports

    • ISeeTWizard
    • October 25, 2025 at 9:18 AM

    There are some default Ports used when working on a network/server but most of these ports exists in a default way and a secure way. Here are some essential ports listed with it's default number and it's secured number.


    Insecure Port

    Protocol

    Description

    Secure Port

    Protocol

    Description

    21

    FTP

    File Transfer Protocol (FTP) sends the username and password using plaintext from the client to the server.

    22

    SFTP

    Uses encryption to protect the user credentials and packet of data being transferred.

    23

    Telnet

    All information to & from the host on a telnet connection is sent in plaintext & cand be intercepted by an attacker.

    22

    Secure Shell

    Secure Shell (SSH) on port 22 uses encryption to ensure that traffic between the host and terminal is not sent in plaintext format.

    25

    SMTP

    Simple Mail Transfer Protocol (SMTP) is the default for sending email messages. Since it is unencrypted, data contained within the emails could be discovered by network sniffing.

    587

    SMTP

    The secure alternative is to use port 587 for SMTP using Transport Layer Security (TLS) which will encrypt the data between the mail client and the mail server.

    37

    Time

    Time Protocol may be in use by legacy equipment and has mostly been replaced by using port 123 for Network Time Protocol (NTP).

    123

    NTP

    NTP on port 123 offers between errorhandling capabilities, which reduces the likelihood of unexpected errors.

    53

    DNS

    Domain Name Service (DNS) is still used widely.

    853

    DoT

    However using DNS over TLS (DoT) on port 853 protects DNS information from being modified in transit.

    80

    HTTP

    Hyper Text Transfer Protocol (HTTP) is the basis of nearly all web browser traffic on the internet. Information sent via HTTP is not encrypted and is susceptible to sniffing attacks.

    443

    HTTPS

    HTTPS using TLS encryption is preferred as it protects the data in transit between the server and the browser.

    143

    IMAP

    Internet Message Access Protocol (IMAP) is a protocol used for retrieving emails. IMAP traffic on port 142 is not encrypted and susceptible to network sniffing.

    993

    IMAP

    The secure alterative is to use port 993 for IMAP which adds SSL/TLS security to encrypt the data between the mail client and the mail server.

    445

    SMB

    Server Message Block (SMB) is used by many versions of Windows for accessing files over the network. Files are transmitted unencrypted.

    2049

    NFS

    Network File System (NFS). Although NDS can use encryption it is recommended that NFS not be allowed through firewalls either.

    389

    LDAP

    Lightweight Directory Access Portocol (LDAP) is used to communicate directory information from servers to clients. Since LDAP is not encrpyted it is susceptible to sniffing and manipulation attacks.

    636

    LDAPS

    Lightweight Directory Access Portocol Secure (LDAPS) adds SSL/TLS LDAPS Security to protect the information while it is in transit.

  • 9 Essential Network Protocols

    • ISeeTWizard
    • October 25, 2025 at 9:17 AM

    Within the network there are many different protocols.

    9 of them are more than essential.


    Short Name

    Long Name

    Description

    HTTP

    Hypertext Transfer Protocol

    This is how web pages are requested and delivered on the internet.

    HTTPS

    Hypertext Transfer Protocol Secure

    It's like HTTP but with added security for safer data transfer.

    FTP

    File Transfer Protocol

    It's used to send and receive files over the internet.

    TCP

    Transmission Control Protocol

    It ensures that data sent over the internet arrives intact.

    IP

    Internet Protocol

    It provides addresses for devices on the internet.

    UDP

    User Datagram Protocol

    It's like TCP but faster and less concerned with data integrity.

    SMTP

    Simple Mail Transfer Protocol

    It's used for sending emails between servers.

    SSH

    Secure Shell

    It's a secure way to access and control remote computers.

    IMAP

    Internet Message Access Protocol

    Allow users to access email messages stored on a remote mail server.

  • The OSI Model with possible protocols

    • ISeeTWizard
    • October 25, 2025 at 9:14 AM

    No.

    Layer

    Description

    Device

    Implementations
    Protocols

    7

    Application

    Provides services directly to user applications.
    Identifies communication partners, identifies quality of service, considers user authentication and privacy and determines if adequate ressources are present.

    Gateway

    SMB
    HTTP
    SMTP
    FTP
    SNMP
    Telnet
    AppleTalk

    6

    Presentation

    Performs data transformations and services including formatting, compression and encryption services to provide a common interface for user applications.

    Gateway
    Redirectors

    HTTP
    FTP
    Telnet
    SMTP
    AFP
    TDI

    5

    Session

    Establishes, manages and terminates connections between applications at each end.
    Allows 2 applications to communicate over a network by opening a sessions and synchronizing the involved computers.

    Gateway

    NetBEUI
    TCP
    UDP
    SPX

    4

    Transport

    Provides transparent transfer of data between end systems by insulating layers 5-7 from complexities of layers 1-3.
    Responsible for end to end error recovery and flow control and ensures complete data transfer.

    Gateway

    IP
    IPX
    NWLink
    NetBEUI

    3

    Network

    Establishes, maintains and terminates network connections.
    Handles traffic management including addressing, routing, switching, forwarding, local paths and virtual circuits, error handling, congestion control and packet sequencing.

    Router
    Brouter

    IP
    IPX
    NWLink
    NetBEUI

    2

    Data Link

    Divided into two sub-layers:
    The Media Access Control (MAC) sub layer controls how a networked computer gains access to the data and permission to transmit it
    The Logical Link Control (LLC) sub layer controls frame synchronization, flow control and error checking.

    Switch
    Bridge
    Router

    Ethernet
    PPP
    HDLC

    1

    Physical

    Controls transmission of the bit stream data over the physical medium.
    Standards for this layer address transmission at the electrical and menchanical level including signal voltage swing, voltage duration, etc.

    Multiplexer
    Repeater

    Ethernet
    Token Ring
    FDDI

  • The OSI Layer and its possible attacks

    • ISeeTWizard
    • October 25, 2025 at 9:12 AM

    The OSI Layer should be commonly known in the world of ICT but did you know what attack targets what layer?

    Here a table to clarify this...


    LayersAttacks
    7ApplicationExploit
    6PresentationPhishing
    5SessionHijacking
    XSS Attacks / Sessions Side Jacking / Malware
    4TransportReconnaissance / DoS (Denial-of-Service)
    TCP Session Hijack / Fraggle / Syn Flood / Land Attacks
    3NetworkMan in the Middle
    Smurf Attack / Ping of Death / Teardrop
    2Data LinkSpoofing
    MAC Spoofing / MAC Flooding / VLAN Hopping
    1PhysicalSniffing
  • What is/means ICT?

    • ISeeTWizard
    • October 24, 2025 at 2:09 PM

    Information and communications technology (ICT) is an extensional term for information technology (IT) that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals) and computers, as well as necessary enterprise software, middleware, storage and audiovisual, that enable users to access, store, transmit, understand and manipulate information.

    ICT is also used to refer to the convergence of audiovisuals and telephone networks with computer networks through a single cabling or link system. There are large economic incentives to merge the telephone networks with the computer network system using a single unified system of cabling, signal distribution, and management. ICT is an umbrella term that includes any communication device, encompassing radio, television, cell phones, computer and network hardware, satellite systems and so on, as well as the various services and appliances with them such as video conferencing and distance learning. ICT also includes analog technology, such as paper communication, and any mode that transmits communication.

    ICT is a broad subject and the concepts are evolving. It covers any product that will store, retrieve, manipulate, process, transmit, or receive information electronically in a digital form (e.g., personal computers including smartphones, digital television, email, or robots). Skills Framework for the Information Age is one of many models for describing and managing competencies for ICT professionals in the 21st century.

Did you know…?

“No need to hurry. No need to sparkle. No need to be anybody but oneself.”

Virginia Woolf

“Yesterday is but today’s memory and tomorrow is today’s dream.”

Khalil Gibran

“One of the deep secrets of life is that all that is really worth doing is what we do for others.”

Lewis Carroll

“Be where you are; otherwise you will miss your life.”

Buddha

“Don’t take yourself too seriously. Know when to laugh at yourself, and find a way to laugh at obstacles that inevitably present themselves.”

Halle Bailey

“My wish for you is that you continue. Continue to be who you are, to astonish a mean world with your acts of kindness.”

Maya Angelou

“Ambition is the path to success. Persistence is the vehicle you arrive in.”

Bill Bradley

“There is no perfection, only life.”

Milan Kundera

“The art of life is to know how to enjoy a little and to endure very much.”

William Hazlitt

“Life is like riding a bicycle. To keep your balance, you must keep moving.”

Albert Einstein

“If you don’t have any shadows, you’re not in the light.”

Lady Gaga

“You only live once, but if you do it right, once is enough.”

Mae West

“I may not have gone where I intended to go, but I think I have ended up where I needed to be.”

Douglas Adams

You cannot change what you refuse to confront.

“Always do your best. What you plant now, you will harvest later.”

Og Mandino

“It is better to be hated for what you are than to be loved for what you are not.”

Andre Gide

“Dreaming, after all, is a form of planning.”

Gloria Steinem

“To succeed in life, you need three things: a wishbone, a backbone, and a funnybone.”

Reba McEntire

“Once you face your fear, nothing is ever as hard as you think.”

Olivia Newton-John

“We pass through this world but once.”

Stephen Jay Gould

“Get busy living or get busy dying.”

Stephen King

“All dreams are within reach. All you have to do is keep moving towards them.”

Viola Davis

“In three words I can sum up everything I’ve learned about life: It goes on.”

Robert Frost

“Good friends, good books, and a sleepy conscience: This is the ideal life.”

Mark Twain

“Coming together is a beginning; keeping together is progress; working together is success.”

Henry Ford

“Spread love everywhere you go. Let no one ever come without leaving happier.”

Mother Teresa

“We have to dare to be ourselves, however frightening or strange that self may prove to be.”

May Sarton

“You don’t always need a plan. Sometimes you just need to breathe, trust, let go and see what happens.”

Mandy Hale

“The simple things are also the most extraordinary things, and only the wise can see them.”

Paulo Coelho

“There are no regrets in life. Just lessons.”

Jennifer Aniston

“When you have a dream, you’ve got to grab it and never let go.”

Carol Burnett

“The purpose of life is to live it, to taste experience to the utmost, to reach out eagerly and without fear for newer and richer experience.”

Eleanor Roosevelt

“Always go with your passions. Never ask yourself if it’s realistic or not.”

Deepak Chopra

“Just when you think it can’t get any worse, it can. And just when you think it can’t get any better, it can.”

Nicholas Sparks

“Never let the fear of striking out keep you from playing the game.”

Babe Ruth

“We are here to add what we can to life, not to get what we can from life.”

William Osler

“Be sure you put your feet in the right place, then stand firm.”

Abraham Lincoln

“Do one thing every day that scares you.”

Eleanor Roosevelt

“Dream big and dare to fail.”

Norman Vaughan

“I’m not going to continue knocking that old door that doesn’t open for me. I’m going to create my own door and walk through that.”

Ava DuVernay

“You may not control all the events that happen to you, but you can decide not to be reduced by them.”

Maya Angelou

“It is better to fail in originality than to succeed in imitation.”

Herman Melville

“Life is made of ever so many partings welded together.”

Charles Dickens

“You have to believe in yourself when no one else does.”

Serena Williams

“Life is what happens to you when you are busy making other plans.”

John Lennon

“We make a living by what we get, but we make a life by what we give.”

Winston Churchill

“Some people want it to happen, some wish it would happen, others make it happen.”

Michael Jordan

“I believe that if you’ll just stand up and go, life will open up for you. Something just motivates you to keep moving.”

Tina Turner

“Everything you can imagine is real.”

Pablo Picasso

“Always remember that you are absolutely unique. Just like everyone else.”

Margaret Mead

“Whatever we are, whatever we make of ourselves, is all we will ever have—and that, in its profound simplicity, is the meaning of life.”

Philip Appleman

“Life is very interesting…in the end, some of your greatest pains become your greatest strengths.”

Drew Barrymore

“If you have knowledge, let others light their candles in it.”

Margaret Fuller

“The great courageous act that we must all do is to have the courage to step out of our history and past so that we can live our dreams.”

Oprah Winfrey

“Keep your face towards the sunshine and shadows will fall behind you.”

Walt Whitman

“Find out who you are and do it on purpose.”

Dolly Parton

“There’s love enough in this world for everybody, if people will just look.”

Kurt Vonnegut

“Don’t worry about failure, you only have to be right once.”

Drew Houston

“You will face many defeats in life, but never let yourself be defeated.”

Maya Angelou

“Be yourself; everyone else is already taken.”

Oscar Wilde

“Life has no limitations, except the ones you make.”

Les Brown

“Life isn’t about finding yourself. Life is about creating yourself.”

George Bernard Shaw

“Success is stumbling from failure to failure with no loss of enthusiasm.”

Winston Churchill

“It does not matter how slowly you go, as long as you do not stop.”

Confucius

“Nothing is impossible. The word itself says ‘I’m possible!’”

Audrey Hepburn

“Living might mean taking chances, but they’re worth taking.”

Lee Ann Womack

“The only thing we have to fear is fear itself.”

Franklin D. Roosevelt

“The future belongs to those who prepare for it today.”

Malcolm X

“It is during our darkest moments that we must focus to see the light.”

Aristotle

“I’m not going to continue knocking on that old door that doesn’t open for me. I’m going to create my own door and walk through that.”

W.P. Kinsella

“The future belongs to those who believe in the beauty of their dreams.”

Eleanor Roosevelt

“It’s amazing how a little tomorrow can make up for a whole lot of yesterday.”

John Guare

“Life does not have to be perfect to be wonderful.”

Annette Funicello

“And when you want something, all the universe conspires in helping you achieve it.”

Paulo Coelho

“If you don’t like the road you’re walking, start paving another one.”

Dolly Parton

“Let us make our future now, and let us make our dreams tomorrow’s reality.”

Malala Yousafzai

“Be persistent and never give up hope.”

George Lucas

“The world you desire can be won. It exists... it is real... it is possible... it’s yours.”

Ayn Rand

“The future is not something we enter. The future is something we create.”

Leonard I. Sweet

“There are so many great things in life; why dwell on negativity?”

Zendaya

“There is no passion to be found playing small—in settling for a life that is less than the one you are capable of living.”

Nelson Mandela

“Next time, ask ‘What’s the worst that will happen?’ Then push yourself a little further than you dare.”

Audre Lorde

“For the great doesn’t happen through impulse alone, and is a succession of little things that are brought together.”

Vincent Van Gogh

“Before anything else, preparation is the key to success.”

Alexander Graham Bell

“You can be everything. You can be the infinite amount of things that people are.”

Kesha

“When I let go of what I am, I become what I might be.”

Lao Tzu

“The fear of death follows from the fear of life. A man who lives fully is prepared to die at any time.”

Mark Twain

“Live in the sunshine, swim the sea, drink the wild air.”

Ralph Waldo Emerson

“Failure is a great teacher and, if you are open to it, every mistake has a lesson to offer.”

Oprah Winfrey

“The biggest adventure you can take is to live the life of your dreams.”

Oprah Winfrey

“It is never too late to be what you might have been.”

George Elliot

“We must let go of the life we have planned, so as to accept the one that is waiting for us.”

Joseph Campbell

“If you live long enough, you’ll make mistakes. But if you learn from them, you’ll be a better person.”

Bill Clinton

“For me, becoming isn’t about arriving somewhere or achieving a certain aim. I see it instead as forward motion, a means of evolving, a way to reach continuously toward a better self. The journey doesn’t end.”

Michelle Obama

“Don’t judge each day by the harvest you reap but by the seeds that you plant.”

Robert Louis Stevenson

“The new dawn blooms as we free it. For there is always light if only we’re brave enough to see it, if only we’re brave enough to be it.”

Amanda Gorman

“Tomorrow is a new day. You shall begin it serenely and with too high a spirit to be encumbered with your old nonsense.”

Ralph Waldo Emerson

“Life is a daring adventure or it is nothing at all.”

Helen Keller

“Keep smiling, because life is a beautiful thing and there’s so much to smile about.”

Marilyn Monroe

“You can’t help what you feel, but you can help how you behave.”

Margaret Atwood

“Dreams do not come true just because you dream them. It’s hard work that makes things happen. It’s hard work that creates change.”

Shonda Rhimes

Latest Posts

  • 3dfx - Voodoo Graphics

    ISeeTWizard February 3, 2026 at 10:47 AM
  • ATI 3D Rage (II)

    ISeeTWizard February 3, 2026 at 10:46 AM
  • Matrox Mystique

    ISeeTWizard February 3, 2026 at 10:45 AM
  • PowerVR PCX1

    ISeeTWizard February 3, 2026 at 10:44 AM
  • S3 Virge Series

    ISeeTWizard February 3, 2026 at 10:40 AM
  1. Privacy Policy
  2. Contact
  3. Legal Notice
Powered by WoltLab Suite™
Style: Ambience by cls-design
Stylename
Ambience
Manufacturer
cls-design
Licence
Commercial styles
Help
Supportforum
Visit cls-design