Feb 7, 2018

New Adventures: Bend, Oregon

Thrilled to announce we are relocating to Bend, Oregon!

My wife, TB boy 1, and TB boy 2 are embarking on the next exciting chapter of our FIRE (financially independent, retired early) adventure.

We are downsizing our home, selling for $475,000 and buying a new home in Bend for $395,000.  In the process, we're eliminating our mortgage and will be purchasing this (hopefully) forever home with CASH!

This will leave our investment portfolio of $440,000 the main priority (previously we were focusing on paying off our mortgage).  With frugality and consistency we hope to grow this to $850,000 to support an annual budget of $34,000 and allow us (me... my wife is a stay at home mommy) to retire early.  Currently we are 30 years old, so with an annual contribution to this portfolio of around $20,000 at first and hopefully increasing over time... my calculations put us at a FIRE date of approximately 40 years old, or 10 more years.

This blog has been a fun project where I've both shared knowledge with you unknown people on the internet at very little charge to myself (yes, I PAY to have this blog... not earn...  !) but it brings me joy, so I'll keep going.  Click on one of the ads on my site in case you'd like to support!

Moving forward, I'll share perspectives on retirement planning, updates on my personal net worth and spending, as well as write about any other topics that come to mind.  Thank you for reading!

Net worth 2/7/18: $840,000 (no debt).

TB

1 comment:


  1. ★ HACKING is a broad term Engagement.
    It depends on what you want to hack. Mobile device,PC or Website, emails etc
    I will brief you through the process of hacking and securing Website since most of the Hackers are after it. All the startup owners or aspirants should know.
    In order to hack you need Information hell of alot.📂📔📗📘📖

    Wanna hack website Or A Database ?

    • You need to get it’s Ip addresses, Open Ports,file transfer medium (FTP or SSH),Email addresses,Detecting Insecure code(SQLi & SSH),System architecture ( 64 bit, 32 bit).🔍🔍

    • Ok so why do we need these informations???❓❓❓

    • Open Ports : If there is an open port that means website is ready to listen to connection . Take example of FTP open ports. If it’s open then it can be bruteforced ).🔆🔆

    • Tip: Use SSH instead of ftp, it’s secure and encrypted mean when you send files over SSH first thing it does is encrypts your files So even if hacker gain access to your files they will see encrypted files not plain texts.✅✅

    • Emails? Email is needed for social engineering. With just a one click a backdoor will be installed in your system/browser. There is incredibly powerful software for exploiting that is BEEF pre-installed in kali All you need is to do is send hook.js file to your victim and trick him to click(Which is easy) and BAM start doing evil things.⏯⏯

    • Tip : if you type whois http://yourdomain.com in Linux you will find details like Domain registrar email address,phone number his address etc . So when you register your domain and purchase hosting do buy icann protection with it, it does not cost that much. in this way you will be able to protect your info.

    • Detecting SQLi vulnerability is easy just write single inverted comma after url php?id=1 Like php?id=1′ if it returns an error .Then It’s ready to be hacked.

    • TIP Use PDO instead of Mysqli or Mysql. If you are not familiar with PDO(can also be used with MYSQLi) then make sure you use htmlspecialchars and htmlentities. Example: Lets say you are getting value from browser. Do below thing to make your code secure
    if(isset($_POST[“Name”])
    {
    $name=htmlentities($_POST[“Name”]);
    }

    This is the least you can do to protect yourself from hackers agianst SQLi.

    Sorry i cant go into details here.😷😷

    Kindly Contact Us For More Details And For ALL Kinds Of Hacking services you desire via Compositehacks @ gmail . com 👌🏽👌🏽

    However Let Me Quickly Brief You About My Team:

    • COMPOSITE HACKS is a Team Of Professional HACKERS , a product of the coming together of Legit Hackers from the Dark-Web (pentaguard, CyberBerkut, White Hack and Black Hat,) whose system is a very strong and decentralized command structure that operates on ideas and directives.✅✅✅

    ★ COMPOSITE HACKS offers BEST quality professional hacking services that can't be matched with other hacker for hire company. Our professional hackers have most advanced hacking technique to hack Facebook, Twitter, Instagram, Email accounts, SmartPhone, Website, Database and many more. Also you can request for customized hack. These days hiring a Legit hacker is difficult. You might get scammed for wrong hacking services or by fake hackers on the Internet. Don't get fooled by scammers that are advertising false professional hacking services.❌❌❌❌

    * What Exactly is your Desire? Have you been hacked? Need to recover your stolen password? Want to monitor your kids,wife/husband,girlfriend/boyfriend? Even something to do with Database ? Hundreds to a large number of individuals have their phones, social media account, email accounts, servers, and PCs hacked consistently. Our professional hackers for hire team is highly qualified and can hack anything without notifying the Target ‼️

    ★ Contact Us For Your Desired Hacking Services Via : compositehacks @ gmail . com

    * You Can Also Check Our Blog For Helpful Tips: www.compositehacks.blogspot.com ‼️

    ★We Treat Every Request With Utmost Confidentiality★ 🙌🏽

    ReplyDelete