![]() With MovieSlate on your iOS device: lost clapper boards will be a thing of the past. Choose behaviors, sounds, and themes (clapper stick designs, backgrounds, fonts, and colors)- even display your production logo on the slate and in reports. History/Notes can be exported/emailed as: HTML, XML, Final Cut 7/X, Avid ALE, Adobe Prelude/Premiere, CSV, and TAB formats.Ĭustomize MovieSlate’s behavior and appearance to suit your workflow and tastes. Each shot, all production, GPS location, and timecode data is stored to a Shot Log History, where you can view, edit, or rate shots. Get fast, searchable access to shot info, without wading through hours of footage. Enter notes using the microphone, camera, keyboard- or insert snippet phrases (such as “Interview”, “Question”, or “Tail Sticks”). Example: when shooting interviews you can create notes to timecode-mark when a particular question was asked, or something remarkable was said. Optional credits animations briefly display each production field, full screen.įor each shot, you can: circle a take rate sound/picture quality write multiple shot notes record voice notes take picture notes. ![]() The sticks open and clap closed, creating an audible/visible marker. To begin a shot, photograph the slate’s production info, then tap the clapper sticks. ![]() With an optional 30 day, $10 auto-nenewable subscription (in-app purchase), members can share projects and settings with colleagues, and create unlimited backups. SOUND DEPARTMENT PLUGIN (optional in-app purchase)Įasily log all sound department data, and quickly generate comprehensive Sound Reports. Simultaneously log data and shot notes for up to 26 cameras. MULTICAM PLUGIN (optional in-app purchase) Sync timecode, slate data, and chat messages over WiFi between multiple MovieSlates. Sync timecode over WiFi with Timecode Buddy hardware. Sync timecode with compatible cameras, sound recorders, LTC generators via the headphone jack. TIMECODE SYNC PLUGIN (optional in-app purchase)Ĭo-developed with Denecke. Sync timecode to the clock, or between multiple iOS Devices (iPad/iPhone/iPod touch) via Bluetooth- or with a song from your iTunes music library (for use in “Music Video” mode). ![]() Setting timecode is simple and fast using our specialized keypad. Or swipe up/down on fields to increment/decrement numbers. Use the optimized keypad to quickly enter numeric info like: roll, scene, take, timecode. Choose info from default/custom snippets, contacts, or saved history. All at a mere fraction of a bulky digital clapperboard’s cost. A convenient, all-in-one digital slate, clapper board, shot log, and notepad is used for film, TV, documentaries, music videos, and interviews, this professional production tool is the easy way to log footage and take notes as you shoot- saving you valuable time later when capturing/editing footage, and creating reports. “MovieSlate® is the the Rolls-Royce of slates” says. ![]()
0 Comments
![]() ![]() During the process, you may be prompted to enter an administrator’s password to make the deletion take effect. ![]() Or choose right click Trash icon, choose Empty Trash, and Empty Trash again in the pop-up dialog.īesides, you also can trash the app from the Launchpad interface. Step 5: Choose Finder > Empty Trash from the Menu bar.Step 4: If prompted, enter administrator password and hit OK to allow the change.Also, you can right-click/control click Nisus Writer Pro 2.1.7 icon and then choose Move to Trash option from the sub menu. Step 3: Search for Nisus Writer Pro 2.1.7 in the /Applications folder, then drag its icon to the Trash icon located at the end of the Dock, and drop it there.Step 2: Launch Finder on your Mac, and click Applications in the Finder sidebar.Step 1: Quit Nisus Writer Pro 2.1.7 as well as its related process(es) if they are still running.Here’s the regular steps to uninstall Nisus Writer Pro 2.1.7 on Mac: In most circumstances you can take the drag-and-drop way to delete Nisus Writer Pro 2.1.7 from your computer. Most Mac apps are self-contained, and the trash-to-delete option works on all versions of Mac OS X and later. Question 1: How can I uninstall Nisus Writer Pro 2.1.7 from my Mac? So, when you decide to uninstall Nisus Writer Pro 2.1.7 on Mac, you will need to tackle the following two questions. The trash-to-delete method may leave some junk files behind, resulting in incomplete uninstall. That means, if you simply trash the app and think the removal is done, you’re wrong. Additionally, some apps may create supporting files, caches, login files scattering around the system directory. General knowledge: Once installed, an app is typically stored in the /Applications directory, and the user preferences for how the app is configured are stored in ~/Library/Preferences directory. If you have no clue how to do it right, or have difficulty in getting rid of Nisus Writer Pro 2.1.7, the removal solutions provided in the post could be helpful. This page is about how to properly and thoroughly uninstall Nisus Writer Pro 2.1.7 from Mac. Removing applications on Mac is pretty straightforward for experienced users yet may be unfamiliar to newbies. Perfect Solutions to Uninstall Nisus Writer Pro 2.1.7 for Mac ![]() ![]() It will only be red when the number of guards is less than 3/4 that of the intruders.īuildingAligner: This mod adds a new placement mode that snaps structures into alignment, at different angles and distances. ![]() In case of intruders, the level of the alarm depends on the amount of guards you have to defend your base. In the case of Solar Flares the alarm goes off about 5 seconds before it'll hit. If you detect incoming disasters using the telescope, you'll still need to activate them manually if you want to make sure everyone's sheltered when the event starts. This will only set alarms when the event starts/ends, if an alarm is not yet active. SkipIntro: Allows you to quit the cinematic landing with ESC and start placing structures immediately.ĪutoAlerts: You need to have an operational Security Console for AutoAlerts to work.Īutomatically manages alarms in case of disasters and/or intruders. I suggest making a copy of the file, and when the patch is done your game version should have a at the end.Īnd add the Redirector file, without these none of Jpfanias's mods will work. Follow the file description, my file string was C: > Program Files (x86) > Steam > steamapps > common > Planetbase > Planetbase_Data > Managed All of Jpfanias's mods can be found HERE [All of these mods, save the Planetbase Mod Patcher, go in Documents > Planetbase > Mods.įirst you'll need to run Planetbase Mod Patcher. The instructions I'm listing work for Win 7. ![]() After watching many people on Twitch play, I've asked and found out most don't know that there are mods for Planetbase. ![]() ![]() ![]() One major attraction here is to catch the sunset from the harbour, so it does get very busy. Restaurant tables are set up around the waterside and the small square. The quaint harbour is guarded by a Venetian fort and is filled with small fishing boats. Naoussa Old PortĪ busier area of Paros is the Naoussa Old Port in the north of the island. Meanwhile, above the village, the mountainside is dotted with quaint windmills. In the streets, you will notice some old washhouses, some of which are still used by the locals today. Rest for a moment in one of the shady squares, lined with traditional tavernas and bakeries.Īlong the way, visit the Agia Triada Church, built of marble and flanked by two majestic belfries. Park your car outside the village and enjoy a tour of the narrow alleys on foot. The village is relatively untouched by tourism and gives a true feeling of the culture and traditions of the island. Lefkes is a gorgeous village located on a slope in the mountainous area of Paros. ![]() The beautiful structure is a must-see on a visit to Paros. The monastery is located a few meters from the port in Parikia and is one of the best-preserved Paleo-Christian monuments in Greece.Īfter several reformations over the years, today the church is a complex of Paleochristian, Byzantine and post-Byzantine elements. Helen when she stopped over on the island while on a pilgrimage to the Holy Land. Located in Parikia, Panagia Ekatontapiliani is known as the “Church of a Hundred Doors.” The monastery dates back to the 4th century and is thought to have been founded by St. This beautiful town features a number of must-see attractions, including the Monastery of Panagia Ekatontapiliani below. The white walls and balconies are adorned with colorful bougainvillea and geraniums in a beautiful contrast. The streets are lined with Cycladic cube-shaped houses with blue doors, balconies and shutters. Parikia is the main port of Paros and features a charming maze of streets and passages, all paved with marble. Read on to discover five reasons for spending a beautiful vacation in Paros, Greece. ![]() On arrival, head to your accommodations and drop off your luggage before heading out on a tour of the island. This beautiful island offers a range of accommodation options, including hotels and vacation rental homes in Paros. The island’s capital, Parikia, is a boating and transportation hub for the Cyclades region of Greece, making it an ideal destination. The Greek island of Paros nestles in the Aegean Sea and is known for its idyllic beaches and traditional villages. Travel Blog 5 Reasons For A Beautiful Holiday In Paros, Greece P aros Port Luxembourg - Malta - Monaco - Netherlands - Norway - Portugal - Scotland - Spain - Sweden - Switzerland - Turkey - Wales Home - Africa - Asia - Australia - Canada - Caribbean - Central America - EasternĪndorra - Austria - Belgium - Cyprus - Denmark - England - Finland - France - Germany - Gibraltar - Greece - Ireland - Italy. 5 Reasons For A Beautiful Holiday In Paros, Greece - All World Vacation Station ![]() ![]() ![]() "keys asulesen" to search the registry for any issues. Since the program is German, you'll have to click on the button called ![]() If this is theĬase, please refer to this article to resolve it.įor some reason the normal uninstall does not work, you may have toĭownload AntiVir's registry cleaner utility to remove all traces of itįrom the registry and allow you to reinstall it.ġ) Click on the following link to visit the Avira Download Page and download the AntiVir Registry Cleaner to your desktopĢ) Create a folder on your desktop called Antivir and Unzip the file to your desktopģ) Double-click on the file called RegCleaner.exe to run it Security Center even when its been uninstalled properly. Issue with AntiVir will cause it to still show up in the Windows What if Windows Security Center Shows AntiVir or other muliple Antivirus products installed Follow these instructions to accomplish this.ģ) Find AntiVir in the Programs list and highlight itĤ) Click Remove and follow the prompts to uninstall Antivir You should run a spyware removal program such as Malwarebytes to clean your computer of any other possible spyware or malware programs.Normal UninstallThe first thing you want to try is to locateĪntiVir in the Add/Remove Control Panel and try to remove it from If your computer is infected malware programs posing as an antivirus program, it is strongly recommended that they be uninstalled. ![]() One of the better-known ones to have plagued many computer users is called AntiVirus 2011. There are fake antivirus programs on the Internet and they can do harm to a computer or help someone steal your information. There is also the possibility that the antivirus program attempting to be uninstalled is actually a spyware or malware. Windows Live uninstaller (direct download). Panda Cloud uninstaller (direct download). Norton Antivirus uninstaller (direct download). Below is a list of known uninstall links for many of the major antivirus scanner companies. In these situations, you must download an uninstaller program from the antivirus scanner company to remove all files associated with the antivirus. In some situations, a legitimate antivirus program cannot uninstall because it or the software used to uninstall it is corrupt, bad, or missing. In Safe Mode, the antivirus program is not loaded and running, making it possible to uninstall using either method mentioned earlier. If the program cannot be disabled, uninstall the antivirus in Windows Safe Mode. Sometimes, the uninstall process may not be able to proceed because the antivirus program is currently loaded and running in Windows. If the antivirus program is not listed in the Add or Remove Programs, you may have a bad antivirus install or a rogue antivirus. If you're unable to uninstall the antivirus through Add or Remove Programs because of an error, skip to uninstalling from Safe Mode. Make sure you've uninstalled all associated parts of the antivirus before rebooting the computer or installing another antivirus. Some antivirus programs may be listed several times in the list of programs. Once the antivirus program is selected, above the column headers, click the Uninstall option as shown in the picture below to initiate the uninstall process. In the list of installed programs, find the antivirus program and select it by clicking it once with the left mouse button.Open the Add or Remove Programs utility.The second way is to utilize Add or Remove Programs. If this is available, click the uninstall option and follow the prompts to complete the uninstallation of the antivirus. ![]() When you find the antivirus program in the list, locate the uninstall option, which should be in the same folder. To do this, click Start, All Programs, and look for the antivirus program in the list of programs. Uninstall through the Start menuįirst, try utilizing the built-in uninstall feature of the program by finding the folder for the antivirus program in your Windows Start menu. If you are uninstalling the antivirus because you believe it is causing problems, you can also temporarily disable the antivirus before uninstalling, see: How to disable my antivirus program in Windows. ![]() ![]() ![]() You’re excited, right?! Get started with Priority Matrix now by entering your email in the box below:Īlong with that, you can prioritize to your heart’s content! With numerous options, including the Eisenhower Matrix, SWOT Analysis, and the GTD Method, you can mix and match your perfect prioritization methods and see what’s best for your individual employees and what works best for your team as a whole. Check things off as done instead of deleting them or doing the classic “color fill to grey”.Add new tasks without creating a new row or shifting things around.Sync due dates to your calendar with automatic updates, no matter what calendar you use.Assign tasks to coworkers, without having to ping them to ask them to check a spreadsheet.What if I told you there was a tool that would allow you to: There are better tools than Excel!Įvery 12 to 18 months, computers DOUBLE their capabilities. So, since 1987 when Excel was released, we’ve definitely made something better, and more powerful. ![]() You can formalize this section or leave it more as a miscellaneous area without much rhyme or reason. ![]() Step Six: Make A Notes ColumnĬomments? Questions? Concerns? Special instructions or directions? Here’s the place for them. Have you ever assigned a task and then the deadline rolls around no one has completed it, because the person who was supposed to do it didn’t know it was their responsibility? Do you see duplicated work because multiple team members felt responsible for the same task?Īll of this can be avoided by making a clear “person” column insert your employee’s name next to their specific assignment and there will no longer be any confusion on who has to do what. Here you can specify what level of importance each assignment has whether high, medium, or low, your team will know what needs to be done sooner rather than later. Well your savior is here: The Priority Level Column. How many times have members of your team asked you this? More than you’d like? “Is this important? Can I do this after I finish the my other projects? I’m going out of town soon, what assignment should I focus on before I leave?” If there is an exact time that the project is due, include that in the date. This part is pretty simple make sure to include the month and day (ex: “April 4”) and possibly the year if you feel it’s needed. This is the most important column in your Excel spreadsheet because you and your team might make a fantastic product or finish an incredibly difficult project, but if miss the deadline for it, all of your work goes to waste. If the assignment has a specific name then you can use that like “The Green Case”, or if there isn’t a specific name just write a blurb that briefly explains what the task entails, such as “Fix The Car”. Just like the name of the spread sheet, the name of the assignment is best when kept simple. Setting up a column with specific assignments keeps everything organized and in one place. Think of the excel spreadsheet as your new and improved homework organizer, only now that you’re an adult you’re tech savvy: grown up work means a grown up organizational system. Remember back in school when you had homework organizers with specific places to write your assignments down? In the case of prioritizing, try using a title with the project name, and if there is a specific timeline, include that as well.Īn example might be “March Priorities” or “Increase Sales by 5% – March 2016″ Step Two: Make An Assignments Column Usually having a simple title is helpful. You may go for a Google Doc which can be shared with others on the web.Ĭome up with a title that captures what information they will find located in the spread sheet. Make an Excel spreadsheet that is available for all your team members to see. If you’re intent on managing your team priorities excel, here is a step-by-step guide to improve your efficiency! Managing Priorities in Excel in 5 Simple Stepsįind our step by step instructions on the most effective strategy for managing priorities in Excel, below. However, when managing tasks, projects or a group of people, it can be difficult to prioritize and stay organized communication through email, over the phone, or even in person can get lost in translation or even forgotten about.įrom task names, due dates, and details, Excel has it’s strengths and weaknesses. Managing Priorities in Excel is one of the most common ways individuals and teams stay on top of their workload. ![]() ![]() ![]() Note that /etc/sysconfig/postgres_exporter_pg# & postgres_exporter_pg#_per_db are the default sysconfig files for monitoring the database running on the local socket at /var/run/postgresql and connect to the “postgres” database. etc/sysconfig/postgres_exporter_pg#_per_db If you need to modify them, see the notes in the files for more details and recommendations: You should take some time to review them. The following files contain defaults that should enable the exporters to run effectively on your system for the purposes of using pgMonitor. Setup Setup on RHEL/CentOS 7 (preferred) Service Configuration See the CHANGELOG for full details on both major & minor version upgrades.This includes the primary and all secondary servers. ![]() The client package is run on the PostgreSQL server(s) to be monitored. Contains both the WMI Exporter and the postgres_exporter. PgMonitor client#.#_86_64.exeĬontains the needed metric exporters for monitoring the health of a PostgreSQL server. After installing via these packages, continue reading at the Windows Server 2012R2 section. The following Windows Server 2012R2 packages are available to Crunchy Data customers. ![]() etc/blackbox_exporter/crunchy-blackbox.yml System following pgMonitor configuration files should be placed according to the following mapping: pgMonitor Configuration File The following pgMonitor configuration files should be placed according to the following mapping: pgMonitor Configuration File The following pgMonitor configuration files should be placed according to the following mapping: pgmonitor Configuration File Sudo install -m 0700 -o ccp_monitoring -g ccp_monitoring -d /var/lib/ccp_monitoring/node_exporter You will need to create a user named ccp_monitoring which you can do with the following command: User and Configuration Directory Installation Package containing postgres_exporter items common for all versions of postgresĬrunchy optimized configurations for node_exporterįor non-package installations on Linux, applications can be downloaded from their respective repositories: Library Note that each major version of PostgreSQL has its own extras package (pgmonitor-pg96-extras, pgmonitor-pg10-extras, etc) Available Packages Package NameĬrunchy optimized configurations for postgres_exporter. After installing via these packages, continue reading at the Setup section. The following RPM packages are available to Crunchy Data customers through the Crunchy Customer Portal. Crunchy Data customers can obtain Linux packages through the Crunchy Customer Portal for Windows packages, contact Crunchy Data directly. Have questions about the Blackbox exporter? Contact us.The Linux instructions below use RHEL, but any Linux-based system should work. Other features of the DNS prober include being able to select TCP or UDP, checking the response code, and checking authoritative and additional resource records that are returned. source_labels: target_label: _param_target 8.8.4.4 # Test various public DNS providers are working. job_name: 'blackbox_dns ' metrics_path: /probe params: You can then use this in your prometheus.yml as you would any other Blackbox module: scrape_configs: As mentioned in a previous post, you can also add the debug parameter to see the full DNS response: :9115/probe?module=dns_rp_mx&target=8.8.8.8&debug=true. For A and AAAA records you're generally better off using an icmp/tcp/http probe to see if the service as a whole is working, which will implicitly also test DNS. In reality you'd usually point this at your own authoritative DNS servers using a sample query rather than verifying that a public DNS service is working - though you could also use it like this to check that records like MX are present. If you visit :9115/probe?module=dns_rp_mx&target=8.8.8.8 this will be tested against Google's Public DNS, and should succeed. "robustperception.io.\t.*\tIN\tMX\t.*google.*" Let's try it out by checking if DNS servers are returning that robustperception.io is using Google for receiving email: wget As with other probe types, DNS probes are intended to be used to run one query against many different DNS servers by Prometheus, and verify that the DNS servers are working. ![]() ![]() ![]() There are even some very mild puzzles and backtracking. There is a story to discover by finding scraps of paper and listening to voicemail messages. There are some jump scares, and some chases. So for $3 this is actually a pretty fun game. A small part of me hopes that there is a better game hidden behind that door, but there is no way I am going to ever find out. The thing is, that right at the start of the game, it basically puts you in front of a locked door and tells you the only way to open it is to find all 100 canisters. As I mentioned earlier Hanwell is actually very large, and the thought of searching every inch of it does nothing for me. There is nothing to help you locate them other than the small hum when you are within a few feet of one. One collectible in particular is finding 100 canisters hidden throughout the town. There are three types of collectables, but honestly after completing the game I couldn’t care less about finding them. Really that is the whole goal of the game. The main point of the game is to collect six pieces of an identification card, hidden in six different (and unlabeled on the map) buildings in order to enter yet another building and fight the boss. Unfortunately this happens only for a few minutes, so once it is done, it’s over. It is not fully explained as to how you got this ability but if you try not to think about it too much I didn’t mind this new twist. At one point you get blinded and need to use a sonar style gameplay which allows you to “see” for a brief second but also gives your position away. You have a block and attack button, but most enemies will come straight for you making them a very minor inconvenience, except for those spawning enemies which really suck once they come at you in droves. I also like B-Horror movies for this very reason. It is passable, but one character in particular is extremely overacted.Īgain, this game feels like it is trying very hard to be something better than it is and I can’t fault it for that. The dialogue audio is very dialed in, by which I mean that any dialogue is actually heard on answering machines and voice mail. You are giving a radio that you can use to let you know when enemies are nearby, but these spawning enemies give you no warning which eliminates the usefulness of this tool. This gets really frustrating when for the last third of the game you have enemies that literally spawn right in front of you in order to prevent you from walking anywhere unless you can dodge them. Now later in the game you do encounter one or two enemies outdoors, but by that point it seems like the weapons all disappeared. And once you leave the building, the weapon you dropped is gone. So I hope you enjoyed holding that sword that you didn’t use at all. The game literally make you chose to drop your weapon before entering any building. Unfortunately even though you are well armed, enemies are few and far between outdoors, and once you try to enter any building you are forced to drop your weapon and go in bare handed. Most of these are just lying in the middle of the road which brings up the question of why so many residents laid down their swords before leaving? Also why are there so many swords? Just walking down the road I came across seven crowbars, three cricket bats, a scythe and three long swords. The funny thing about this game is that there are weapons everywhere. That is until you realize just how empty it is. While the layout isn’t straight forward, it does make exploration somewhat interesting. The actual town of Hanwell is actually pretty large and well done. ![]() Think the original Resident Evil, and Silent Hill games, but made as a high school computer science class assignment. Welcome to Hanwell is like a poorly written grade-school love letter to better survival horror games it tries to emulate. Are there worse ways to spend $3? Sure, but there are also a lot of better ways as well. I picked this one up when it went on sale at the eShop for around $3. So hopefully this will help you if you stumbled across this review and wonder if this game is worth your time and money. ![]() If you are reading this, then like me you went to Steam to read a review of this game since there is so little info about it out there. If you bought this for Steam and wonder how it is on the Nintendo Switch, here are my thoughts. ![]() Welcome to Hanwell, Nintendo Switch Review. ![]() ![]() ![]() Undeniably the most recognizable creature from Chinese myth, the snake-like dragon (龙 lóng) appears in Shang-Chi and the Legend of the Ten Rings and with a fitting amount of eminence. Statues of these regal creatures can sometimes be seen at certain Chinese palaces, though the myth exists in other cultures across South East Asia. They helped to establish the role of emperor as a divine one. Qilin were once believed to accompany deities as pets, and their presence were thought to signal the arrival of an immortal or a member of royalty. Old legends state that a pair appeared in the garden of the deified Yellow Emperor, Huangdi, in 2697 BCE and that Emperor Wu of Han caught a live qilin in 122 BC. Bearing horns and several dragon-like features, what Slattery referred to as a "weird horse," was actually a qilin (麒麟)- a mythical creature far older than most others that appear, first appearing in The Commentary of Zuo in the 5th century BC, which is a commentary on another historical chronicle. Just when Shang-Chi, Katy, Xialing and Trevor Slattery thought they had seen it all in the forest surrounding Ta Lo, their car comes to a sudden halt to let larger creatures pass. RELATED: Early Shang-Chi Scripts Featured Other MCU Characters, Says Producer The only liberty they took was their eccentric manes and the huge fangs protruding from their jaws. Their use in Shang-Chi and the Legend of the Ten Rings is therefore not entirely inappropriate, since they are guarding a sacred place. ![]() ![]() Given the regal appearance of these stone lions, they continued to guard the royal palaces, even after Buddhism as a belief lost its place in China. Gradually, they were reimagined and came to play an important role when Buddhism became a major religion during the Han dynasty, as the protectors of dharma - which is the "truth" that Buddhism was founded on, if we were to oversimplify it. They are colloquially referred to as lion dogs or foo dogs/fu dogs, but they are stone lions, or shishi (石獅 shíshī). It is believed that these creatures were inspired by lions that arrived in China through trade with Silk Road merchants during the Han dynasty. Before the men can do any harm Yan arrives in her Huli Jing form hunting the men that dare do harm.These guardian lions often decorate the grounds of ancient Chinese palaces and temples. The woman reaches a dead end and is approached by the group of men chasing her. Meanwhile, a distressed woman runs through the streets of Hong Kong. Wishing her a “Good Hunting,” Liang watches as Yan flies from rooftop to rooftop. Yan through the use of her new body can transform into her Huli Jing form and hunt freely in the city of Hong Kong. Through Liang’s skill, he produces a brand new body for Yan, one that would allow her to hunt. She asks for Liang’s help so that she can hunt the evil men that prey upon the weak. Refusing to lay with the client any further, in a bout of rage, she ripped apart his jaw, igniting her feral desire to hunt once more. A client of Yan’s drugged her and the procedure was forced upon her just because he could only become erect by sleeping with a machine. One night Yan arrives at Liang’s home and reveals to her old friend her body had been transformed into a machine. Liang’s skills grow as he creates autonomous machines, using his skills to bring them to ‘life’ they were almost magic like. ![]() ![]() ![]()
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |