Magic was probably the first instance of where I learned that sometimes it's ok to not try to "solve" games or put too much thought into being competitive.
I'm not sure how my friend group found Magic originally, but it was around like 3rd edition or so? We all really liked it and spend way too much money on cards. We would play around the kitchen table in a single game, 5, 6, 7 people all with decks a mile high building huge armies before someone finally gave in to break the peace and attack, usually resulting in everyone else attacking them. Great fun.
I had some access to the internet at work and during a break I started looking up stuff about Magic and found a deck that won a tournament recently. It was a red burn deck, and the tournament was a draft, which I had no idea what that meant, but I had a "winning" decklist and I had most of the cards in there. I traded with my friends for the other stuff I was missing and we set about to play. I think I killed everyone one after another with that "stupid deck" with cards the others just flat out gave to me because they were "bad". I took that deck to a tournament a couple of weeks later and found out what the difference between drafts and constructed decks were, mainly that my deck needed 20 more cards. I still get fourth place and a box of booster packs.
My friends one by one stopped playing not too long after that. I went on to win most local tournaments and play in a handful of pro tour events, but none were ever as much fun as sitting around the kitchen table.
Many, many years ago I was at a company where a manager (M1) wanted full root access to all of the internal servers (mostly file/web servers, router/firewall and the mail server). It's lost to the sands of time as to why, but he was persistent.
There was quite a bit of back and forth between the team that managed the servers, the owners of the company and M1. After a few weeks M1 was finally given access. Within a couple of days he brought a complaint against another manager (M2) that M2 had hijacked M1's personal email and was storing it on one of the internal servers.
Meetings were held into the night to discuss what should be done. M2 was called in, credentials revoked and they were placed on leave while an investigation could take place. Overnight every single server was compromised and no one could get in to anything.
M2 brought in a lawyer, the company brought in a lawyer and all of management and most of the employees were sat down in a room to figure out what to do about this mess.
Turns out M1 had re-used the same "password", which was a single lowercase english word, on EVERYTHING. His personal email, any account on any service maintained by the company and had changed his secure password on the superuser accounts he had just been given to the same one.
There was a literal paper trail of M1 providing this password to the majority of the people in the company. Provided in printed memos asking to have accounts set up, emails asking to have accounts set up, other people having it on the standard sticky note on monitors, M1 saying "and make the password..." in the common workspace for anyone to overhear, etc etc.
Of course, one of the servers had SSH open for remote access... and you can see where this is going.
Expensive forensics team was brought in, servers recovered, and it was determined that M1's account on the SSH server was targeted by automated logins not too long after he was added to the company's website.
M2 is cleared and brought back, M1 had their role decreased and was gone not soon after.
If you're in the US, contact your state attorney general. This is a widespread, known issue that a few are building cases about. They have back channels to facilitate getting the account back.
I've done sub-sub-contract work for a few government and military orgs where standard procedure would be I would be mailed a thumb drive of what should just be images and word docs to add functionality to a small section of an internal website. Every single time there would be things on there, totally unrelated to the project, that I should definitely not have been given.
I am not surprised at all. Maybe 7 years ago I got called in to clean up a website "hack" where the site had a bunch of malicious JS on it. Site was hosted on GoDaddy.
Pulled the site down locally and started the regular process of find/remove, but nothing was showing up. Hosting the site locally, the JS wasn't being put on the page. Checked all the server files for stuff like php.ini, user.ini, etc etc. Nothing was showing up.
Created a plain info.php file on the account. That had the JS injected into it.
Started searching for other sites with the same JS, found a bunch, dozens. Started a search for "neighbor" sites to the one I was investigating, ones that most likely were on the same server. They ALL had the JS injected. Server was owned.
I alerted the client and sent a note into GoDaddy, like you need to check this out. Got a response that it was impossible for the server to be compromised and I should buy their Sitelock service for security. Instead we requested a migration to another server and that cleared up the issue.
My situation was unique because my Facebook account administered the pages of government agencies and they were very helpful in putting pressure through back channels to get it sorted out. It still took over 30 days after they acknowledged that they dropped the ball to get the account back, and 60 days to get everything back and running.
But I'll pass along this link to my AG as they're collecting stories like this, and there's hundreds we've found so far.
There's $20-30 looper pedals on Amazon and Ali Express that do the job just fine.
Most any USB audio interface will have an "instrument" input/mode that will allow you to plug directly in and will work with Mac/Windows/Linux directly with low latency. Most of the come with some software bundles as well with free amp and pedal models.
I remember seeing one of the first Pentium's, it was either a 60 or 66mhz, but it was STUPIDLY fast. Way faster than any 486 we had at the time. We were just watching someone play Windows 3.11 solitaire on it and laughing when they won because the card "waterfall" animation took what felt like 1 second to complete. It was probably longer, maybe 3-4 seconds, but on our 486's it was probably 10-15 seconds.
I'm not sure how my friend group found Magic originally, but it was around like 3rd edition or so? We all really liked it and spend way too much money on cards. We would play around the kitchen table in a single game, 5, 6, 7 people all with decks a mile high building huge armies before someone finally gave in to break the peace and attack, usually resulting in everyone else attacking them. Great fun.
I had some access to the internet at work and during a break I started looking up stuff about Magic and found a deck that won a tournament recently. It was a red burn deck, and the tournament was a draft, which I had no idea what that meant, but I had a "winning" decklist and I had most of the cards in there. I traded with my friends for the other stuff I was missing and we set about to play. I think I killed everyone one after another with that "stupid deck" with cards the others just flat out gave to me because they were "bad". I took that deck to a tournament a couple of weeks later and found out what the difference between drafts and constructed decks were, mainly that my deck needed 20 more cards. I still get fourth place and a box of booster packs.
My friends one by one stopped playing not too long after that. I went on to win most local tournaments and play in a handful of pro tour events, but none were ever as much fun as sitting around the kitchen table.