mal

What To Do in Case of Psychic Attack or of Being the Victim of Malevolent Spell

Being a relatively visible public Witch, I get plenty of requests for spells, which I politely decline to do. I tell people two things: One is that it's best to create one's own spells rather than have someone else cast them. The other is a caution against performing any magic that would interfere with the free will of another. The exception to that would be a binding of someone else, making them unable to do further harm.

If you believe someone has put a negative spell on you (usually called a hex), here are a few things you can do to protect yourself, and possibly reverse the spell.


First, purify your person. Take a shower, or better yet, soak for a while in hot water containing sea salt, bath salts, or Epsom salts. Allow the salt and water to neutralize any negativity within yourself; think of this as you soak. Let any contamination be washed away with the water spiraling down the drain, out of your house and out of your life. Drink lots of water to wash out your insides. Wash your hair, brush your teeth, put on clean clothes. You may also wish to drink mint tea or another tea that you find refreshing.


Second, purify your dwelling. Dust, sweep, vacuum, tidy up, polish. Air out the rooms. Wash the windows with a mild solution of vinegar and water. This allows purifying sunlight and moonlight to illuminate the room as well as making the glass more reflective to deflect unwanted energies.[1]


Circulate through the rooms where you live with sage or other purifying incense, making sure to fumigate everywhere -- stairways, closets, underneath stairways, basement, attic, garage if attached. If your dwelling is one that you can circumnavigate, you may wish to walk all around the outside of the building wafting this smoke.


Then mix salt and water and sprinkle it around the house. As with the incense, do this around the outside of the home, too, if you can. Be sure to cense and sprinkle all openings to the outside -- doors and windows, of course, but also skylights, electrical outlets, heating vents, chimneys, ventilator hoods, toilets, and sink, tub and shower drains. Also do this to mirrors.


While you're doing these things, speak the words, "With Earth and Water I purify this space," and "with Fire and Air I consecrate this space," because that's exactly what you're doing.[2]


Third, ward your space. If you're the witchy sort, trace a protective pentacle with the salt water on all doors, windows and mirrors. Rosemary grows in abundance where I live, so I like to use a sprig of it to sprinkle the salt water. Then I like to leave rosemary sprigs on all the window sills.


When you've done all these things, take a step back, be very quiet, look around, listen and note how different your space feels to you now.


You may also wish to perform these acts at other places where you spend a lot of time, such as work, if you can.


One last thing you may want to do, although it's not as easy and practical as the rest. You may wish to hang little mirrors in the windows or on the outside of the building to reflect away negativity. The mirrors aren't really necessary; they're just extra insurance, if you will. You should be fine just doing the other things I've recommended.


Now envision yourself within a bubble. Project this bubble around you and around your home. Nothing can pass through the membrane that has not been invited by you. Anything unwelcome bounces off the bubble. Build a strong image of this bubble in your mind. If you have a small object, maybe a clear quartz crystal or a piece of rosemary, that reminds you of this visualization, carry it in your pocket or keep it someplace handy. You can't be expected to hold this image in your consciousness all the time. But if you have this object, then at times when the image has faded and you feel you need to reinforce your working, take it out and look at it and touch it to reawaken your sense of your protective bubble.


As with all magic spells, you needn't stick with the formula offered here. If other ingredients call to you or other actions spring from you, trust your intuition and go with them.


These are my recommendations. For another approach, here's a Lemon UncrossingSpell (to break a curse). I have never tried this so I can offer no assurance of its efficacy.


[1] For a super-duper heavy cleansing of a home, say if you're just moving in after someone else has been living there, and if you have the time, get some dragon's blood incense and burn it on a piece of charcoal in a container left in the bathtub or shower. As soon as you light it, leave and let it fumigate the entire house. You don't want to breathe much of this stuff. Then return a few hours later and open all the windows to let out the dragon's blood fumes.


[2] Some additional things you can do to cleanse a new or dirty home: Walk throughout the rooms with noisemakers, rattles, a drum to frighten off unwanted spirits. Do this before censing and sprinkling. After censing and sprinkling, ring a little bell at the windows and mirrors.




mal

Back To “Normal”

It’s been over a year since I last posted, and a lot has happened this year, especially in the last 6 (or so) months of it. The biggest thing is maybe that I’ve flown on not one trip but two … Continue reading





mal

Glenmorangie A Tale of Ice Cream Single Malt Scotch Whisky




mal

Estonia 039 s National Animal

Estonia 039 s National Animal



View Comic!








mal

11 Animals That Are Donald Trump's Look Alikes

Well...Can't ignore the resemblance




mal

We Know Diversity is Good for Business, So Why Do Corporate Leaders Remain Predominantly White and Male?

An examination of diversity in senior leadership roles at America’s top companies Diversity is more than just a buzzword, it’s a recipe for corporate success. Multiple studies have shown that a more diverse workforce in terms of age, gender, ethnicity, as well as veteran, disability, and LGBTQIA+ status can bolster innovation.i A more diverse corporate talent pool is […]

The post We Know Diversity is Good for Business, So Why Do Corporate Leaders Remain Predominantly White and Male? appeared first on DiversityJobs.com.




mal

A look at Qwen2.5-Coder-32B-Instruct, which Alibaba claims to match GPT-4o's coding capabilities and is small enough to run on a MacBook Pro M2 with 64GB of RAM

Qwen2.5-Coder-32B is an LLM that can code well that runs on my Mac 12th November 2024 There’s a whole lot of buzz around the new Qwen2.5-Coder Series of open source (Apache 2.0 licensed) LLM releases from Alibaba’s Qwen research team. On first impression it looks like the buzz is well…




mal

YouTube is testing a new feature that will let a small group of creators use AI to “restyle” licensed songs for their Shorts through prompts

YouTube is testing a new feature that will let creators use AI to “restyle” licensed songs for their shorts. The small group of creators with access can enter a prompt to change up different elements in a song, such as its mood or genre, and the expansion of YouTube’s Dream Track AI feature will…




mal

Unplugging With SmallBox Web Design

How did you feel? Well, considering I spent almost no time doing anything but working on the business, this is sorta a tough one to answer. Most of the time when I want to unplug I may disappear for an entire weekend to get away from the daily work habits that flow over into the […]




mal

Explaining Oumuamua and Pioneer anomaly using Time relativity

I find that in theory the weird Speed Boost of the interstellar object ‘Oumuamua should be 0.217 mm/s above the prediction and that ‘Oumuamua should slow down less than prediction, in proportion of which the difference is 4.28×10-8 near the Sun. For Pioneer anomaly I have computed the gap between real and predicted acceleration and...




mal

Step by step rotation in normal and high dimensional space and meaning of quaternion

The orientation of body in space is defined 3 by angles. The step by step rotation process and chain of three-dots multiplication give an easy way to compute pile of rotations in 3D and high dimensional space and give a general orientation system. A visualization of quaternion is proposed. The orientation of a rigid body...




mal

This Foot Locker Commercial Shows a Small Glimpse of What It Would Look Like if Everything Were Right in the World




mal

A Journey to the Hottest Place on Earth: Hydrothermal Vents and the Resilient Pompeii Worm

I have only seen a hydrothermal vent once, during Dive 73 aboard the Monterey Bay Aquarium Research Institute’s Doc Ricketts. Unlike many deep-sea biologists, I…

The post A Journey to the Hottest Place on Earth: Hydrothermal Vents and the Resilient Pompeii Worm first appeared on Deep Sea News.




mal

Wendie Malick Can Only Stand Tall

By Tara Ariano Published: November 11th, 2024




mal

IKEA’s New Charming Christmas Tree Is Winning Over Small-Space Dwellers

Is it too early to start talking about Christmas decor? Probably. But when IKEA drops a genius item like the VINTERFINT Wall Decoration, we can’t keep it under wraps. This space-saving tree is exactly the kind of clever solution we at IKEAhackers love. While nothing quite matches the magic of a traditional live tree, the VINTERFINT offers a chic alternative for those with tight spaces. As homes shrink and urban living spaces become more compact, the traditional Christmas tree is […]

The post IKEA’s New Charming Christmas Tree Is Winning Over Small-Space Dwellers appeared first on IKEA Hackers.




mal

How to Give Your MALM Dresser a Rattan Upgrade

I’ve always had a soft spot for the IKEA MALM. Its sleek, unfussy look is right up my alley. But for many, the minimalist style can be a bit boring. That’s probably why it’s been the subject of so many hacks over the years. And let me tell you, I’ve seen my fair share. I’ve been collecting IKEA MALM hacks for ages and I thought I’d seen it all. Apothecary style? Check. Chinoiserie? Yup. Vinyl wrap, built-ins, metal accents, even […]

The post How to Give Your MALM Dresser a Rattan Upgrade appeared first on IKEA Hackers.



  • Bedroom Storage
  • 20 IKEA Malm Hacks That Will Take Your Furniture to the Next Level
  • Latest on IG


mal

A Connecticut home with a green roof and minimal site impact

Meeting the challenge to gently place a home into a valley below the access road and adjacent to a scenic river, Weston Residence is both a primary residence and an award-winning example of minimal site impact architectural design. [...]




mal

New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls

Cybersecurity researchers have discovered a new version of a well-known Android malware family dubbed FakeCall that employs voice phishing (aka vishing) techniques to trick users into parting with their personal information. "FakeCall is an extremely sophisticated Vishing attack that leverages malware to take almost complete control of the mobile device, including the interception of incoming




mal

Malware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packages

An ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in an attempt to trick them into running cross-platform malware. The attack is notable for utilizing Ethereum smart contracts for command-and-control (C2) server address distribution, according to independent findings from Checkmarx, Phylum, and Socket published over the past few




mal

New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers

Over 1,500 Android devices have been infected by a new strain of Android banking malware called ToxicPanda that allows threat actors to conduct fraudulent banking transactions. "ToxicPanda's main goal is to initiate money transfers from compromised devices via account takeover (ATO) using a well-known technique called on-device fraud (ODF)," Cleafy researchers Michele Roviello, Alessandro Strino




mal

INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime

INTERPOL on Tuesday said it took down more than 22,000 malicious servers linked to various cyber threats as part of a global operation. Dubbed Operation Synergia II, the coordinated effort ran from April 1 to August 31, 2024, targeting phishing, ransomware, and information stealer infrastructure. "Of the approximately 30,000 suspicious IP addresses identified, 76 per cent were taken down and 59




mal

Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps

Cybersecurity researchers are warning that a command-and-control (C&C) framework called Winos is being distributed within gaming-related applications like installation tools, speed boosters, and optimization utilities. "Winos 4.0 is an advanced malicious framework that offers comprehensive functionality, a stable architecture, and efficient control over numerous online endpoints to execute




mal

VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware

An ongoing threat campaign dubbed VEILDrive has been observed taking advantage of legitimate services from Microsoft, including Teams, SharePoint, Quick Assist, and OneDrive, as part of its modus operandi. "Leveraging Microsoft SaaS services — including Teams, SharePoint, Quick Assist, and OneDrive — the attacker exploited the trusted infrastructures of previously compromised organizations to




mal

Malicious PyPI Package ‘Fabrice’ Found Stealing AWS Keys from Thousands of Developers

Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) that has racked up thousands of downloads for over three years while stealthily exfiltrating developers' Amazon Web Services (AWS) credentials. The package in question is "fabrice," which typosquats a popular Python library known as "fabric," which is designed to execute shell commands remotely over




mal

SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims

An ongoing phishing campaign is employing copyright infringement-related themes to trick victims into downloading a newer version of the Rhadamanthys information stealer since July 2024. Cybersecurity firm Check Point is tracking the large-scale campaign under the name CopyRh(ight)adamantys. Targeted regions include the United States, Europe, East Asia, and South America. "The campaign




mal

5 Most Common Malware Techniques in 2024

Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more stable, making them a reliable way to identify specific cyber threats. Here are some of the most commonly used techniques, according to ANY.RUN's Q3 2024 report on malware trends, complete with real-world examples. Disabling of Windows Event Logging




mal

North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS

A threat actor with ties to the Democratic People's Republic of Korea (DPRK) has been observed targeting cryptocurrency-related businesses with a multi-stage malware capable of infecting Apple macOS devices. Cybersecurity company SentinelOne, which dubbed the campaign Hidden Risk, attributed it with high confidence to BlueNoroff, which has been previously linked to malware families such as




mal

New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus

Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a Linux virtual instance containing a backdoor capable of establishing remote access to the compromised hosts. The "intriguing" campaign, codenamed CRON#TRAP, starts with a malicious Windows shortcut (LNK) file likely distributed in the form of a ZIP archive via a phishing email. "What makes the CRON#




mal

Malicious NPM Packages Target Roblox Users with Data-Stealing Malware

A new campaign has targeted the npm package repository with malicious JavaScript libraries that are designed to infect Roblox users with open-source stealer malware such as Skuld and Blank-Grabber. "This incident highlights the alarming ease with which threat actors can launch supply chain attacks by exploiting trust and human error within the open source ecosystem, and using readily available




mal

AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

The threat actors behind the AndroxGh0st malware are now exploiting a broader set of security flaws impacting various internet-facing applications, while also deploying the Mozi botnet malware. "This botnet utilizes remote code execution and credential-stealing methods to maintain persistent access, leveraging unpatched vulnerabilities to infiltrate critical infrastructures," CloudSEK said in a




mal

Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware

Cybersecurity researchers have discovered a new phishing campaign that spreads a new fileless variant of known commercial malware called Remcos RAT. Remcos RAT "provides purchases with a wide range of advanced features to remotely control computers belonging to the buyer," Fortinet FortiGuard Labs researcher Xiaopeng Zhang said in an analysis published last week. "However, threat actors have




mal

North Korean Hackers Target macOS Using Flutter-Embedded Malware

Threat actors with ties to the Democratic People's Republic of Korea (DPRK aka North Korea) have been found embedding malware within Flutter applications, marking the first time this tactic has been adopted by the adversary to infect Apple macOS devices. Jamf Threat Labs, which made the discovery based on artifacts uploaded to the VirusTotal platform earlier this month, said the Flutter-built




mal

Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks

The Iranian threat actor known as TA455 has been observed taking a leaf out of a North Korean hacking group's playbook to orchestrate its own version of the Dream Job campaign targeting the aerospace industry by offering fake jobs since at least September 2023. "The campaign distributed the SnailResin malware, which activates the SlugResin backdoor," Israeli cybersecurity company ClearSky said




mal

Law enforcement operation takes down 22,000 malicious IP addresses worldwide




mal

A tiny marsupial is upending ideas about the origins of flying mammals

Sugar gliders and bats are about as distantly related as any two mammals on Earth, but new Princeton research shows their wings are formed from the same genetic ingredients. 




mal

The Small Gods of Editing

This is me, preparing for an evening of copyediting articles for The Pomegranate: The International Journal of Pagan Studies. There is in fact a small shrine within arm’s length of my desktop computer, but I usually don’t have so many … Continue reading




mal

‘Small Gods’ Is a Zine about Animism

Edited by Dver, a.k.a. Sarah Kate Istra Winter, Small Gods: An Anthology of Everyday Animism is projected to be an annual zine “featuring art, poetry, and essays describing our relationship with, and giving praise to, the smallest of gods — those … Continue reading





mal

Film Screening: Malês

Malês portrays the difficult living conditions of Black men and women in 19th-century Bahia, fighting against extreme racism, poverty, and religious intolerance. The film features a prominent cast, including Rocco and Camila Pitanga, Wilson Rabelo, Bukassa Kabengele, Samira Carvalho, Rodrigo de Odé, Heraldo de Deus, and Patricia Pillar, along with the director Antonio Pitanga. The script is written by Manuela Dias, and the cinematography is by Pedro Farkas. The film, based on historical facts, depicts the Malês Revolt, the largest organized uprising by enslaved people in Brazilian history. The insurrection mobilized the enslaved and free Black population through the streets of Salvador against slavery in 1835. Led by Muslim Africans, called Malês, the rebellion took place at the end of Ramadan, celebrated in January by Islam. After the revolt’s failure, the demonstrators were severely punished, and repression against Black people in Brazil increased. In the feature, Antonio Pitanga plays Pacífico Licutan, one of the leaders of the uprising, who emphasized the importance of participation from different tribes and religions for the revolt’s success and the end of slavery. The film also presents other participants of the revolt, such as Anuna (Rodrigo dos Santos), Manuel Calafate (Bukassa Kabengele), Vitério Sule (Heraldo de Deus), and Luis Sanim (Thiago Justino), along with fictional characters who portray real-life dramas, such as Dassalu (Rocco Pitanga), Sabina (Camila Pitanga), and Abayome (Samira Carvalho).




mal

Tomoyuki Niho Animated ‘Taxi To The Moon’ Music Video In His Distinctively Minimal Style

His style complements the whimsical narrative of a woman taking an unconventional cab ride to the moon.




mal

Top 4 Must-Try Desserts In Paradigm Mall JB (Malaysia)

Time to cross the border to Johor Bahru for a shopping and dining experience. To start this ultimate shopping experience, head to one of the closest malls to Singapore, Paradigm Mall JB, located in Johor Bahru. Paradigm Mall Johor Bahru is also known as the largest shopping mall in Johor Bahru. There are more than ... Read more

The post Top 4 Must-Try Desserts In Paradigm Mall JB (Malaysia) appeared first on Star Two.




mal

The Power of Nutrition: Small Changes That Make a Big Difference

Adopting a healthy lifestyle by making positive changes is not always easy. It involves setting realistic goals and making gradual changes that lead to significant achievements. Generally, small positive changes are more sustainable than sudden ones. Therefore, anyone seeking to improve their diet and lifestyle should consider making minor changes that eventually have a significant ... Read more

The post The Power of Nutrition: Small Changes That Make a Big Difference appeared first on Star Two.





mal

How to spend a weekend in Malaga, the cultural gateway to Andalucía






mal

Malaria is outsmarting blood tests. Can a breath test help?

A parasite that causes the most common form of malaria is evolving to be undetectable by current tests. Some scientists want to zero in on compounds in patients’ breath instead.