Wondering What You Can Do About the ATF’s Proposed New Regulations? Watch This


Last Friday, the ATF finally published its proposed rule redefining what a “frame” or “receiver is and updating its definition of what constitutes a firearm they can regulate under current law. The rule would greatly expand the ATF’s reach, virtually destroy the 80% lower business, and allow the agency to get involved in what you build for your own use, all part of cracking down on so-called ghost guns.

Now that the rule has been published in the federal register, the 90-day comment period clock has started. That means you get to tell them what you think of their regulatory overreach and why it violates your right to keep and bear arms. And it’s important that you do.

Why? Because the ATF is obligated to respond to every comment they get during the 90-day period, with a couple of exceptions. If you stray from the topic at hand and go off on a tangent — maybe you rant about “high capacity” magazine laws or the cost of an NFA tax stamp — the ATF can disregard your comment completely.

They can also ignore it if it’s abusive. For instance, if you call them a bunch of jack-booted, dog-shooting, swill-sucking, overweening fascist bastard thugs, your comment is going to be tossed. So don’t do that.

Instead, keep your comment on-topic…and unique. If you see someone else’s comment that looked good and copy and paste it, that really doesn’t help. The ATF can bundle all similar or duplicate comments and respond to them together.

The more well thought-out, clearly written, unique comments they receive, the longer it will take them to reply. And they can’t put their proposed new rule in place until they do. That can take months, or even years.

Got it? Good. So start writing. What else are you doing this weekend that’s more important that this?

The Truth About Guns

How to Use Covey’s 4 Quadrants Matrix for Effective Time Management

https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/05/covey-matrix-time-management.png

Among all the valuable assets you own, time is the most precious of all. In today’s fast-paced world, lack of time management is the most significant problem that people have. With so much time spent working, there is no time for personal pursuits.

It is common to feel overwhelmed with responsibilities and activities. The more you work, the further behind you feel. Instead of deciding what you want to do, you react to what’s happening around you.

The article explains how you can use Covey’s Four Quadrants strategy to focus on the most important tasks and be more productive.

Covey’s 4 Quadrants


The 4 Quadrants Time Management Strategy was created by Steven Covey. He is the author of the famous book The Seven Habits of Highly Effective People. Covey’s matrix helps to prioritize tasks based on the time available for optimal efficiency.

The basic idea behind this strategy is to divide your activities into four quadrants depending on their importance and urgency. Let’s discuss both of these terms before moving on to the strategy itself.

1. Important: These are the tasks or goals most likely to impact your long-term success.

2. Urgent: Urgent tasks are those that require immediate action. You can’t delay them.

Four Quadrants of Time Management Matrix

These are the four quadrants of the Time Management Matrix:

1. Q1: Urgent and important.

2. Q2: Not Urgent but important.

3. Q3: Urgent but not important.

4. Q4: Not urgent and not important.

By prioritizing your tasks across four quadrants, you can differentiate between tasks that make a real difference in the end. The following is a brief overview of what each quadrant contains.

Q1: Urgent and Important:

In Covey’s time management matrix, this quadrant is located at the top left. Problems and crises that require immediate attention belong in quadrant one. Neglecting them, in the long run, can be problematic for you.

Preparing a presentation for an important meeting that will commence after a short time is a type of task that falls in quadrant one. It’s urgent because you don’t have much time for it and it’s important as you have to get it ready before the meeting starts.

Tasks involving deadlines, school assignments, sending daily emails, and similar activities with direct impact are urgent and important.

Q2: Not Urgent but Important:

In Covey’s time management matrix, this quadrant is on the top right. In this quadrant, you will find tasks that directly relate to your long-term goals. It requires your thorough attention; however, it is not urgent as there is no limited time to complete this task.

If you have a long-term goal of establishing your reputation in an office or class, it may not be that urgent; however, it is still important. Developing relationships, long-term planning, personal development, improving health, and related activities fall within this quadrant.

Q3: Urgent but Not Important:

This quadrant is located in the bottom left corner of Covey’s time management matrix. All those activities may seem urgent to you, but you can remove them from the workflow since they hold minimal importance for you.

Let’s say you are working on an important project and you get a call from a colleague asking you to join a meeting. If the meeting is unplanned without an agenda, you may choose to skip it. Since, overall, it won’t have any positive impact on your life.

In other words, all the time-wasting activities fall in this quadrant. No matter if it’s unimportant calls or sending emails that don’t add any value.

Q4: Not Urgent and Not Important:

In Covey’s time management matrix, this quadrant is at the bottom right-hand side. All activities that take up time without producing any value fall into this quadrant. You can save valuable time by avoiding those chores and spending it on more valuable activities.

The tasks you do for entertainment alone, such as watching the television, surfing the web for hours, gossiping about people, are neither urgent nor important for you.

Related: Ways to Follow Through on Your Time Management Goals

Benefits of Following Covey’s Time Management Matrix:


1. Productivity Boost: Following the time management matrix changes how you deal with the tasks, helping you prioritize them better. If you shrink the amount of time you spend on tasks, then you can significantly increase your productivity.

2. Work-Life Balance: By planning well, you can get rid of your hectic routine effectively. This way, you can spend more time with your friends and family.

3. Chasing Goals: By diverting your attention to important tasks, you can speed up the process of chasing the goals.

4. Avoids Embarrassment: By recognizing the urgent tasks, you can differentiate them from less urgent ones to better meet the deadlines. This way, you can avoid embarrassment and save your reputation.

Importance of Placing Tasks in Right Quadrant:


Even once you understand this strategy, it remains imperative to assign tasks to the correct quadrants. It would be best if you determined the importance and urgency of the task before fitting it into any quadrant. Make sure you spend a good time arranging your tasks in different quadrants to facilitate their smooth execution.

Related: Productivity Tips That Produce Massive Results

A good understanding of the time management matrix is a prerequisite to implementing it properly. Put this strategy to work on your everyday task to see if it makes any difference. By managing time and putting yourself in the right spot, you can significantly boost your productivity.

Be More Organized With Covey’s Time Management Strategy

Covey’s four-quadrant matrix is one of the most important and famous models in the world of time management. Following this strategy correctly will help you be more productive and stay more active.

Perfect organization and properly prioritizing tasks enable you to accomplish more in less time. You can also determine which tasks require more attention and allocate them accordingly.

However, you can reassign time from lower-value activities to higher-value ones even when that time is irreplaceable. If you are still struggling to organize your day, you can search for other time management strategies like the 80/20 rule to make yourself a more organized person.

MUO – Feed

Laravel Same Table Parent Child Relationship Example

https://www.codecheef.org/user/img/fevicon.png

Laravel Same Table Parent Child Relationship Example

Posted By

Mahedi Hasan

Category

Framework

Sub-category

Laravel 8.x

March 25, 2021

Hello Laravel developers in this example tutorial i will explain laravel multilevel nested data example. That mean just assume that we have a department and we have a section. Every section has a team member and many member works under the team member. So now we have to design that model and we need to define that relationship in Laravel.

I will use laravel eloquent parent child same table to show this laravel parent child relationship. In this example we will see that multilevel nested category example in Laravel. So simply see the below situation.

- Department
  - Section 1
    - Team 1
    - Team 2
  - Section 2
...

 

Now simply think we have a Test model and we will design our relationship via this model.

App\Models\Test.php


namespace App\Models;

use Illuminate\Database\Eloquent\Factories\HasFactory;
use Illuminate\Database\Eloquent\Model;

class Test extends Model
{
    use HasFactory;

    protected $parentColumn = 'parent_id';

    public function parent()
    {
        return $this->belongsTo(Test::class,$this->parentColumn);
    }

    public function children()
    {
        return $this->hasMany(Test::class, $this->parentColumn);
    }

    public function allChildren()
    {
        return $this->children()->with('allChildren');
    }

}

 

As you can see, it is a very simple piece of code but powerful enough to get the job done. Now we can access like that

$department = Test::find(3);
$parent = $department->parent;

$department = Test::find(3);
$children = $department->children;

$department = Test::find(3);
$children = $department->allChildren;

 

I hope that this is as useful for you as it was for our team! Feel free to use it! 🚀

 

Laravel News Links

SQL To Laravel Query Builder

https://opengraph.githubassets.com/309447c6d8623f2ea622cbd054066acf521bb737f9c2ea4ec575ff7d97d33feb/rexshijaku/sql-to-laravel-builder

Marwan – SQL-To-Laravel-Builder

SQL to Laravel Query Builder, A Converter written in PHP

Features

  • Converts SQL Queries to Laravel Query Builder.
  • Assists on building queries as instructed in Laravel Documentation.
  • Provides options to interact with, for generating different results.

Supports

Laravel 8

Demo

Online demo

Live demo and free usage is available here.

Get Started

Install by manual download:

Download the repository and install required packages by composer.json :

Packagist

You can also install it from packagist by running the following command :

composer require rexshijaku/sql-to-laravel-builder

Usage

Simple example

<?php

use RexShijaku\SQLToLaravelBuilder\SQLToLaravelBuilder;

require_once dirname(__FILE__) . './vendor/autoload.php';

$options = array('facade' => 'DB::');
$converter = new SQLToLaravelBuilder($options);

$sql = "SELECT COUNT(*) FROM members";
echo $converter->convert($sql);

This will produce the following result:

DB::table('members')->count();
A more complex example :
$sql = "SELECT
                department_id,
                count(*) 
            FROM
                members
                LEFT JOIN details AS d ON d.member_id = members.member_id 
            WHERE
                ( age = 25 OR ( salary = 2000 AND gender = 'm' ) ) 
                AND id > 15 
            GROUP BY
                department_id 
            HAVING
                height > 1.60";
echo $converter->convert($sql);

and this will generate the result below :

DB::table('members')
    ->select('department_id', DB::raw('count(*)'))
    ->leftJoin('details AS d', 'd.member_id', '=', 'members.member_id')
    ->where(function ($query) {
        $query->where('age', '=', 25)
              ->orWhere(function ($query) {
                            $query->where('salary', '=', 2000)
                                  ->where('gender', '=', 'm');
        });
    })
    ->where('id', '>', 15)
    ->groupBy('department_id')
    ->having('height', '>', 1.60)
    ->get();
Notice

If you need to change options, or get more comprehensive understanding of provided options then see the following section of Options.
There are dozens of examples for every use case explained in the Query Builder documentation of Laravel 8, which are located in the examples folder.

Options

Some important options are briefly explained below:

Argument DataType Default Description
facade string DB:: Facade which allows the access to the Database functionality.
group boolean true Whether it should group key value pairs into a php array, or generate separate commands for each pair. See an example here.

How does it works ?

SQL-To-Laravel-Builder is built on top of PHP-SQL-Parser. While PHP-SQL-Parser is responsible for parsing the given SQL Query as input. The result of the PHP-SQL-Parser is the input of SQL-To-Laravel-Builder.

The structure has three main parts :

  1. Extractors classes – which help to pull out SQL Query parts in a way which are more understandable and processable by Builders.
  2. Builder classes – which help to construct Query Builder methods.
  3. Creator – which orchestrates the process between Extractors and Builders in order to produce parts of Query Builder.

Known issues

  • It is not tested in all cases. Tests should be added.
  • Poor error handling.

Contributions

Feel free to contribute on development, testing or eventual bug reporting.

Support

For general questions about Marwan – SQL-To-Laravel-Builder, tweet at @rexshijaku or write me an email on rexhepshijaku@gmail.com.
To have a quick tutorial check the examples folder provided in the repository.

Author

Rexhep Shijaku

Thank you

All contributors who created and are continuously improving PHP-SQL-Parser, without it, this project would be much harder to be realized.

In memoriam

For the innocent lives lost (including Marwan al-Masri, aged just six) during the 2021 Israel–Palestine crisis.

License

MIT License

Copyright (c) 2021 | Rexhep Shijaku

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Laravel News Links

What Ziploc Closures Actually Look Like, Magnified

https://s3files.core77.com/blog/images/1186530_81_108916_qa8vtdfSO.jpg

Way back in 2010, Rob Cockerham of the Cockeyed blog was obsessed with his then-new Eyeclops Bionic Eye Camera, a sort of toy microscope that hooks up to a television set, providing extreme 200x macro images. He turned the Eyeclops onto the seals of Ziploc-style sandwich bags to reveal what those closures look like up close.

With the naked eye, this is about the best you can see:

Using the Eyeclops, Cockerham reveals the female side:

Here, mated:

Next, a dual seal bag:

And one of those bags with the separate zipper pull:

"This is the view of the bag seal magnified by 200 times," Cockerham writes. "The connection is an incredibly tight handshake between the two channels. This looks like a waterproof seal!"

"Not impressed? Compare it to this shot of half of the standard double zipper. Notice all the open space around the connecting hooks… how shoddy!"

Also check out Cockerham’s Eyeclops explorations of Velcro and yarn.

Core77

Moog’s iOS synth apps are all free right now

https://s.yimg.com/os/creatr-uploaded-images/2021-05/c6d9a170-ba55-11eb-bcdf-1659cf2026d0

Moog has quietly made all of its iOS synth apps free. It’s not clear how long they’ll be available for zilch, so if you’re interested in snagging the Model 15, Minimoog Model D, Animoog and Filtatron apps gratis, now’s your chance.

These apps typically aren’t cheap, as MusicRadar points out. Model 15 usually costs $30, Animoog retails at $20, Minimoog Model D is $15 as standard and Moog tends to charge $5 for Filatron. Moog temporarily made Minimoog Model D free at the onset of the pandemic as well.

If you’ve been looking for a solid synth app or two to tinker with while you’re on the go, you can’t really go wrong with these, especially while they’re free. Save for the iPhone-only Animoog, the apps work on iPad as well. The tablet’s larger screen makes them easier to use — the Minimoog app doesn’t display in full on iPhone, for instance. Synth enthusiasts can also use Model 15 as an AUv3 plugin in Logic, GarageBand and Mainstage on macOS Big Sur.

Engadget

10 Browser Extensions for Security Researchers

https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/05/wappalyzer-extension.png

Browser extensions make a lot of things easier. They’re not just limited to general browsing usage, but can also come in handy for cybersecurity professionals.

It saves time for security researchers to quickly analyze a website, or online service—no matter whether they are looking for potential security issues or just doing a background check.

Here are some of the best browser extensions that cybersecurity researchers, ethical hackers, or penetration testers find useful. Even if you are not one, you can still use these extensions to find out more information about the websites you visit.

Most Popular Web Browser Add-ons for Security Researchers

You can find most (but not all) of the popular options listed below for both Google Chrome (or Chrome alternatives) and Mozilla Firefox.

1. Wappalyzer


Wappalyzer browser extension is incredibly useful to identify the technologies used to create a website.

Of course, if you are an experienced web developer, you might be able to quickly notice without an extension. But this saves your time investigating a website to find out what it uses in the back-end.

It can detect the Content Management System (CMS), programming language, widgets, databases, Content Delivery Network (CDN), script, and a lot more.

With the information about the technologies used, a researcher can focus on what aspect to look for when finding an issue with the site.

Do note that you may not find all the details for every website—some try to hide it.

Download: Wappalyzer for Chrome | Firefox (Free)

2. Wayback Machine


A webpage can change any day, but with the help of Wayback Machine add-on, you can rewind to see what the website used to look like. Taking a look at an archived version might help you collect sensitive data or spot other historical issues.

It is an extension that makes use of the Internet Archive. So if you do not want to install an extension, you can directly use the website.

While it works most of the time, if a website is new or there are any other indexing issues, the archived version may not be available.

Download: Wayback Machine for Chrome | Firefox

3. IP Address & Domain Information


This tool gives you detailed information of a website’s IP address and other data associated with the domain, like contact details.

With these details, you can try to assess the website security and credibility with precision. You can locate the website’s server address, hosting information, evaluate login security, and check if it is a part of a malicious network.

Download: IP Address and Domain Information for Chrome | Firefox

4. HackBar


HackBar is a useful tool for penetration testers, i.e. ethical hackers. With the help of this tool, you can find vulnerabilities in a website and evaluate the security measures. You will have to access it using the developer tools in Chrome.

It is an open-source project that you can also find on GitHub if you are curious.

Download: HackBar for Chrome

5. Sputnik


Sputnik is yet another tool to help you get details and insights on a website. You can get the IP address, SSL certificate information (to verify whether it’s secure), and various related data with the help of third party service integrations available.

It saves you time by quickly redirecting you to those services to get information about a site.

Download: Sputnik for Chrome | Firefox

Related: What Is a Website Security Certificate?

6. User-Agent Switcher and Manager


If you want to prevent websites from learning about your browser information when analyzing websites, this can come in handy.

The User-Agent Switcher lets you spoof websites to show that you are accessing from a mobile browser or a different browser. You can even select a different operating system.

It also lets you configure for which site you want to spoof and disable for usual browsing activities. Overall, it features a lot of options to choose from, so don’t be afraid to explore!

Download: User-Agent Switcher and Manager for Chrome | Firefox

 7. Pulsedive Threat Intelligence


Pulsedive Threat Intelligence can prove to be an all-in-one tool for security professionals who want a complete set of information about a website.

Unlike some other tools, it is not limited to third-party services but also user reports and threat intelligence feeds. So you get a broad network to collect information about a website for any specific purpose.

Some of the insights include SSL certificate information, WHOIS data, threats, technologies, and much more. In other words, it could replace multiple browser extensions. As a user, you might find the information overwhelming, but you can still explore it to get some idea.

Download: Pulsedive Threat Intelligence for Chrome | Firefox

8. Link Redirect Trace


Link Redirect Trace is an impressive tool to analyze links when a website redirects.

When you click on a link, it connects to a lot of resources along with the page you are trying to load. And with this tool, you can get all the information you need about those connections.

It’ll tell you if the links are safe, accessible (or broken), and other backlink-related information. You can also find hidden redirects that some sites may be using for malicious activities.

Download: Link Redirect Trace for Chrome | Firefox

9. Laboratory (Content Security Policy)


A proper Content Security Policy (CSP) helps fight against common attacks. The threats include cross-site scripting (XSS), clickjacking, and other attacks that could change the code of a trusted website to spread malware.

With this tool, you can generate a suggested CSP header to protect against some common web attacks.

Download: Laboratory for ChromeFirefox

10. EXIF Viewer Pro


EXIF metadata of an image often includes a great deal of information like the camera used, location, and modification/creation date.

While you can find a lot of EXIF viewer extensions for your browser, this provides one of the most complete datasets. This information usually helps in forensic analysis for a researcher.

Download: EXIF Viewer Pro for Chrome

Extensions Make It Easy to Collect and Analyze Information

With the help of browser add-ons, you can quickly find the information for further investigation and research.

Every extension serves a different purpose and may not affect your browsing experience. Nonetheless, it is best to not have all the extensions installed at the same time if you are facing issues.

MUO – Feed

How to Find Your IP Address in Linux

https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/05/NAT-working-principle-e1621422180626.png

An IP address is a numerical label that uniquely identifies devices on a network. There are two types of IP addresses, public and private. A private address is used for labeling devices within an internal network and is globally unreachable.

On the contrary, public IPs are globally routable and are important for connecting to the internet. This guide shows how easy it is for Linux users to get IP address information on their computers.

How Do IP Addresses Work?

You need to know a few things before learning how to find the IP address of your Linux machine. When connected to the home network, all your devices have unique private IPs. However, you can’t connect to the world wide web via private addresses. You’re going to need a public IP to do so.


Your router assigns you the public IP when you make web requests from one of your devices. There’s an entire mechanism called Network Address Translation (NAT) to do this. NAT works by substituting the private address from the IP packet header with a globally accessible public IP.

Find Private IP Address of a Linux System

According to RFC 1918 (Address Allocation for Private Internets), private networks can have IPs within the ranges given below. Here X represents any number between 0 to 255.

  • 10.X.X.X – 10.X.X.X
  • 172.16.X.X – 172.31.X.X
  • 192.168.X.X – 192.168.X.X

There are several ways to check private IP addresses in Linux. The easiest of them is the Linux ip addr command.

ip -4 addr

This command displays both the loopback address (127.0.0.1) and the actual private address of the machine.


Use the following command on Linux if you want to get only the IP address of the system.

ip route get 1.1.1.1 | awk '{print $7}'

Alternatively, you can use the hostname command on Linux to get the IP address of a host.

hostname -I

You can also use the nmcli utility to get the private IP address of your interface. It’s a console-based program for managing the network manager.

nmcli -p device show

Find Public IP Address of Linux Systems

As NAT is responsible for assigning the public IP for your system, you can’t get it directly from the device. Instead, you need to send a web request to an external system and retrieve the IP address from the response.

Use one of the following Linux commands to get your public IP address from the command line.

dig +short myip.opendns.com @resolver1.opendns.com
dig TXT +short o-o.myaddr.l.google.com @ns1.google.com
curl https://ifconfig.me ; echo
curl https://ipinfo.io/ip ; echo
wget -qO- api.ipify.org ; echo
wget -qO- https://ipecho.net/plain ; echo

However, the simplest way for Linux users to get the public IP address is via a simple Google search. All you need to do is type "what is my ip" in a new search, and Google will tell you the public IP address.

Related: How to Find the Public IP Address on a Linux System

How to Hide IP Address on Linux?

Since websites can track users and geolocation using IP addresses, many people choose to hide their IP. There are several ways to hide your IP address on Linux.

  • VPN: A VPN (Virtual Private Network) acts as an intermediary between your device and the website you want to visit. They mask your IP by making it look like the requests have originated from the VPN server instead of your machine. Apart from masking IP, there are other reasons for using VPNs as well, including data encryption and bypassing censorship.
  • Tor: It’s a secure network consisting of thousands of nodes run by volunteers all over the world. Tor provides anonymity by relaying traffic through many anonymous nodes. You can use the free Tor browser for hiding IP on Linux.
  • Proxy: Proxy servers make it look like your web requests are originating from their system. They don’t encrypt data and are often unreliable compared to VPNs or Tor.

Get IP Address on Linux Instantly

As illustrated throughout this guide, it’s very simple for Linux users to get their IP addresses. You can find both the private and public IP addresses of your system using the methods described above.

But what if you want to find your phone’s IP address? Luckily, it’s as easy as finding the IP of your computer, if not easier.

MUO – Feed

The First Mysterious Benedict Society Trailer Is a Children’s Tale of 2 Tony Hales

https://i.kinja-img.com/gawker-media/image/upload/c_fill,f_auto,fl_progressive,g_center,h_675,pg_1,q_80,w_1200/dd7f54aa2d5bca256829097f225051b0.png

L-to-r: Tony Hale as Dr. Curtain and Tony Hale as Mr. Benedict.
Screenshot: Disney

Precocious, adventurous kids are a dime a dozen. Tony Hale? Less so. Yet somehow, Disney+’s upcoming adaptation of The Mysterious Benedict Society children’s books features Tony Hale recruiting a quartet of precocious, adventurous kids to stop the nefarious plans of… Tony Hale?

Of course, anyone who’s read Trenton Lee Stewart’s four-book series knows that the good-hearted but eccentric Nicholas Benedict has an evil twin, named Ledroptha Curtain. I’ll let Disney+ explain the rest:

“After winning a scholarship competition, four gifted orphans are recruited by the peculiar Mr. Benedict for a dangerous mission to save the world from a global crisis known as The Emergency. Reynie, Sticky, Kate, and Constance must infiltrate the mysterious L.I.V.E. Institute to discover the truth behind the crisis. When the headmaster, the sophisticated Dr. Curtain appears to be behind this worldwide panic, the kids of ‘The Mysterious Benedict Society’ must devise a plan to defeat him.”

The streaming service also released the first trailer for the series, which seems pleasant enough, although boy howdy these four kids seem extremely young:

Of course, their youth will likely prove a benefit if The Mysterious Benedict Society proves a hit and earns more seasons to adapt the three remaining novels.

G/O Media may get a commission

In addition to multiple Hales, the show also stars Kristen Schaal as Number Two, Mystic Inscho as the logical Reynie Muldoon, Emmy DeOliveira as the tool-wielding Kate Weatherall, Marta Timofeeva as the mind-reader Constance Contraire, and Seth Carr as George “Sticky” Washington, who has an eidetic memory. Meanwhile, you can try your best to remember The Mysterious Benedict Society premieres on June 25 on Disney+.


For more, make sure you’re following us on our Instagram @io9dotcom.

Gizmodo

AmmoLand Giveaway – 5,000 Rounds of CCI Blazer 9mm Ammo FREE!

https://www.ammoland.com/wp-content/uploads/2021/04/ximsqwjcxky-500×281.jpg

U.S.A.-(AmmoLand.com)- New and existing subscribers to the AmmoLand News emails will ALL be eligible to win 5,000 rounds of CCI Blazer 9mm Ammo! At a time when ammo is nearly impossible to find, AmmoLand has decided to help one lucky winner with this giveaway of 5,000 rounds of CCI Blazer 9mm ammunition.

AmmoLand is giving our readers yet another opportunity to take home an amazing giveaway, this time it’s 5,000 rounds of 9mm ammo. One lucky winner will receive 5 boxes of 1000 rounds each, boxed 50 rounds per box in the 1000 round case.

AmmoLand Giveaway - 5,000 Rounds of CCI Blazer 9mm Ammo
AmmoLand Giveaway – 5,000 Rounds of CCI Blazer 9mm Ammo

CCI BLAZER BRASS 9MM LUGER AMMO 115 GRAIN FULL METAL JACKET

CCI Blazer Brass 9mm Luger Ammo 115 Grain Full Metal Jacket ammo made by CCI is your best choice for bulk 9mm target shooing ammunition. Newly manufactured 9mm ammo here in the United States, that features a full metal jacket copper plated bullet, brass casing, non-corrosive primers. Made by the same company that manufactures Speer Lawman 9mm ammo as well as the Federal American Eagle 9mm ammunition Blazer Brass 9mm Luger ammo features the same great quality components and manufacturing equipment. If you choose to reload your 9mm ammo, CCI Blazer Brass offers virgin brass that can be reloaded up to 5 times due to its exceptional high quality and low mixtures of other materials. Trusted CCI has gone above and beyond with the Blazer Brass line! With the same high standards that shooters have come to know and love with standard Blazer ammo, the Blazer Brass line gives the benefit of a brass casing making it reloadable. 9mm Luger by CCI are an excellent choice for target practice or just plinking around at the range. CCI Blazer Brass 9mm Luger is new production, non-corrosive, re-loadable ammunition with boxer primers and brass casing.

9mm ammo is by far the most popular gun cartridge in the world. Recently adopted by the FBI and other law enforcement agencies, 9mm ammunition is perfect for target shooting and personal protection as well. 9mm ammo is fun to shoot, offers relatively low recoil and yields great target results.

CCI Blazer Brass 9mm Luger is new production, non-corrosive, re-loadable ammunition with boxer primers and brass casing.

Blazer Brass 9mm ammunition is perfect for target shooting and personal protection as well.

  • Manufacturer – CCI AMMUNITION
  • Caliber – 9MM LUGER
  • Bullet Type – Full Metal Jacket
  • Muzzle Velocity – 1125 fps
  • Muzzle Energy – 323 ft lbs
  • Primer – Boxer
  • Casing – Brass Casing
  • Ammo Rating – Target and Practice 9mm Ammo

How to Win 5,000 Rounds of 9mm:

  • Click the AmmoLand Giveaway button on the bottom right of any AmmoLand.com page
  • Click Subscribe to Our Newsletter for one entry, existing subscribers you are already in the running, who loves you?
  • Click Visit AmmoLandTV on YouTube and like and follow for another entry
  • Click Visit @AmmoLand on Instagram and like and follow for a third entry

AmmoLand Giveaway Rules:

  • The giveaway entry dates run from May 25th, 2021 to July 1st, 2021 with the winner drawn on July 2nd, 2021.
  • Everyone who signs up, or is an existing active subscriber, to the AmmoLand Shooting Sports News daily digest email are eligible to win.
  • Eligible Winners must be 18 years of age, a legal resident of the United States, and be lawfully eligible under local, state, and federal rules to accept the transfer of Firearms through a licensed Federal Firearms Licensee. NOTE: All Federal, State and Local gun magazine restrictions apply. You can view a sample of typical restrictions here or here
  • FFL Transfer Fees and Taxes are not included and are the winners’ responsibility.
  • No monetary compensation or substitution for ineligible winners.
  • Do you get our daily email? Then you are already entered. Do you need to sign up? Then you can do so at the link/box above: Sign up for AmmoLand in your Inbox!

What’s that you say? You never win anything or maybe 5000 is not enough ammo and you need more, then check out our 9mm Deal Tracker page page found here!


About AmmoLand.com:

Ammoland.com is the web’s leading Shooting Sports News Service for the Ammunition, Firearms, Shooting, Hunting, and Conservation communities. AmmoLand has a FREE Shooting Sports News Service that is seen by 10,000’s of Ammunition, Shooting, and Pro Firearms enthusiasts every day. Visit them at www.AmmoLand.com

Ammoland Logo Schema

Don’t delay! Be sure and Sign Up before we pick a winner.

The post AmmoLand Giveaway – 5,000 Rounds of CCI Blazer 9mm Ammo FREE! appeared first on AmmoLand.com.

AmmoLand.com