there is, he admits it and wants to fix. He is not going to be happier if we tell him that he should just be happy with what he have. He wants to have a healthy/happy romantic relationship with someone and he deserves it, and it is not a problem to have to work to fix it.
I had the same problem in the past and as a hacker I made a plan to fix it. I can tell you that it worked really well and I barely recognize myself from 5 years ago. But this change wasn't easy and was related to lots of areas in my life: friends, family, fitness, nutrition, work, interests in life. More than wanting to date someone, I invested in becoming someone people want to date.
I really love this: "I invested in becoming someone people want to date." Very wise words.
Although this sentence (about the kind of people people want to date) from La Bruyere's Characters flashed cynically into my mind a moment later. :-)
A man who is vain, indiscreet, a great talker and a mischievous wag, who speaks arrogantly of himself and contemptuously of others, who is boisterous, haughty, forward, without morality, honesty, or commonsense, and who draws for facts on his imagination, wants nothing else, to be adored by many women, but handsome features and a good shape.
Also it reminded me of George Clooney writing somewhere that he started getting acting work after he totally changed his mindset in auditions–from asking, pleading give me something I want, to seeing himself as offering his talents, contributing something unique to the production–he had something they wanted, or should.
Yes, most of the tests come directly from the docs, that way, by having full test coverage, means that at least a big part of the functionality is not only tested but also documented somewhere.
It does if you weight the chunks correctly. Combine pairs of numbers and keep a weight of the remaining odd number. Either cut the weight in half of the odd number every time or use it in the average if an iteration has an even number of numbers.
Facebook has a trusted devices feature where logins from that device will not require 2FA login. Maybe the hacker is using such a device. Could be an sold smartphone/laptop or maybe a public computer.