Gen Z Explained – A Guide to Generations, By Birth Year

Here’s a concise guide to the various generations, organized by their approximate birth years:

1. The Silent Generation (1928–1945)

  • Characteristics: Known for their strong work ethic, loyalty, and traditional values. They experienced the Great Depression and World War II.

2. Baby Boomers (1946–1964)

  • Characteristics: Born post-World War II during a time of significant population growth. They value personal gratification and are associated with social movements like civil rights and feminism.

3. Generation X (1965–1980)

  • Characteristics: Often seen as the “middle child” generation, they value independence and self-reliance. They witnessed the rise of technology and changes in family dynamics.

4. Millennials (Generation Y) (1981–1996)

  • Characteristics: Digital natives who grew up during the internet explosion. They prioritize experiences over possessions and often value diversity and inclusivity.

5. Generation Z (1997–2012)

  • Characteristics: The first generation to grow up with smartphones and social media. They are known for their activism, awareness of social issues, and preference for authentic communication.

6. Generation Alpha (2010–mid-2020s)

  • Characteristics: The youngest generation, growing up in a fully digital world. They are likely to be more diverse and tech-savvy, with a focus on sustainability and social consciousness.

Summary of Characteristics by Generation:

GenerationBirth YearsKey Traits
Silent Generation1928–1945Traditional, hardworking, loyal
Baby Boomers1946–1964Socially active, idealistic, value personal growth
Generation X1965–1980Independent, pragmatic, adaptable
Millennials1981–1996Tech-savvy, experience-oriented, value diversity
Generation Z1997–2012Activist-minded, social media fluent, individualistic
Generation Alpha2010–mid-2020sDigital natives, environmentally conscious, diverse

Each generation has unique influences and characteristics shaped by the socio-economic, cultural, and technological contexts of their formative years.

Defining Generation Names and Dates

A generation is a group of people born at roughly the same time. They’re usually grouped by a 20-year time interval, says Deborah Carr, PhD, professor and chair of the sociology department of Boston University and author of Golden Years? Social Inequalities in Later Life.

“Generations take on special meaning because their members tend to experience critical life events and transitions at particular historical moments, and these moments define their lives,” says Dr. Carr. Indeed, generations influence everything from baby name trends to parenting styles.

Many experts, including Dr. Carr, agree that the most reliable and well-known generation timeline was identified by authors Neil Howe and William Strauss. However, the latest generational designations come from the Pew Research Center, a “nonpartisan fact tank that informs the public about the issues, attitudes, and trends shaping the world.”1

The Greatest Generation (GI Generation): Born 1901–1927

This generation lived through the Great Depression and then went off to fight in World War II. Notably, they popularized jazz and swing music, but don’t be fooled by the wild provocations of the cultural preferences of the times. Due to the current events of this generation, the challenge of raising a family put a premium on traits like hard work and grit.

The Silent Generation: Born 1928–1945

The silent generation famously got their name for being so conformist that they were silent through the MacCarthy era when the fear of Communism swept the country.2 During this era, kids were expected to earn their way through life using a strong work ethic.

Baby Boom Generation: Born 1946–1964

Gen Z may think of Baby Boomers as their out-of-touch grandparents (as in “OK, Boomer”), but this generation actually had a wild youth we often don’t talk about. Boomers are named for the population “boom” that occurred after WWII, and many young people of this generation defied their parents, protested the Vietnam War, and created the “Summer of Love.”

Boomer parents notably redefined parenting by being the first generation to look at their kids’ perspective of growing up, and they started the concept of having family meetings.

Generation X: Born 1965–1980

So often dismissed as the slacker generation, Generation X lived through the AIDS epidemic, MTV culture, and a shifting landscape that would give rise to LGBTQ+ rights.

Generation X parents were the first to use helicopter parenting styles. Unlike their Boomer parents, who famously let their kids stay outside until the streetlights came on, Gen X’ers tend to be far more involved with their children’s social and educational development.

Millennial Generation or Generation Y: Born 1981–1996

Millennials lived through 9/11, remember when Amazon only sold books, and are also the first generation to know a childhood both with and without the internet, which now plays a significant role in their personal lives.

While Boomers may accuse Millennials of being self-centered and impatient due to their excessive use of technology, this generation has proven to be incredibly community-oriented and environmentally conscious, which are traits being picked up by their children.

When it comes to parenting, millennials are more likely than prior generations to encourage their children to live as their authentic selves, and they’re leading the movement in helping gender non-conforming kids be happy with who they are, points out Carr. “Some millennial parents, who were ‘helicoptered over’ in their youth, are taking on a freer approach to parenting, allowing their children to explore and create without constant structure or supervision.”

Generation Z or iGen: Born 1997–2010

Generation Z kids are the first to be born into a world where they know nothing besides constant connection to one another, albeit through phones, screens, and tablets. However, like millennials before them, Gen Z’ers are often environmentally conscious, inclusive and accepting of others, and extremely politically aware—despite many of them not yet being of voting age.3

Generation Alpha: Born 2010-2024

Kids born between 2010 and 2024 are part of Generation Alpha.4 Generation Alpha is the first generation of kids who will never know a time when social media didn’t exist, and they are far more tech-savvy than any generation previously, which is a powerful tool that can change humanity in myriad positive ways.

It may be too soon to peg the Alphas as this or that based on how little we know about them so far. However, there are a few things we understand: Some Gen Alphas are the first to be born amid the COVID-19 pandemic, they’re more diverse than any other generation, and they’re more likely to be in a single-parent household.4

Like the generations that came before them, every passing year will shape the cultural perception of who they are. In the meantime, parents get the pride and honor to help guide them to making the best choices possible.

The Greatest Generation (GI Generation)Born 1901–1927
The Silent GenerationBorn 1928–1945
Baby Boom GenerationBorn 1946–1964
Generation XBorn 1965–1980
Millennial Generation or Generation YBorn 1981–1996
Generation Z or iGenBorn 1997–2010
Generation AlphaBorn 2010-2025

Type of Work Systems – 996

What is “996“?

996 working, ICU waiting.

A “996” work schedule refers to an unofficial work schedule (9a.m. ~ 9p.m., 6 days a week) that has been gaining in popularity. Serving a company that encourages the “996” work schedule usually means working for at least 60 hours a week.

996 work system: arrive at work at 9 am every day and work until 9 pm. Work 6 days a week.

955 work system: arrive at work at 9 am every day and work until 5 pm. Work 5 days a week.

944 work system: arrive at work at 9 am every day and work until 4 pm. Work 4 days a week.

996.ICU : Work 996, be sick in ICU.

955.WLB : Work 955, work-life balance.

944.Life : Work 944, life comes first.

The following list of companies basically do not belong to the 996 companies, and are relatively close to the 955/965 level, but it still depends on the department and region, and cannot be guaranteed to be completely accurate.

  • It cannot be guaranteed that all departments are at the level of 955/10-6-5/965/10-7-5
  • Even if the average level of the department is 955/10-6-5/965/10-7-5, you may still have to work overtime part of the time.
  • Some departments of some companies in the list may have 975 or even 985 students. Don’t generalize.
  • Some companies in the list may have some or even more departments with 945, 10-5-5 or 11-6-5, so we have included them in the list.
  • Currently, most of the companies on the list are in Shanghai because I am in Shanghai and have a relatively good understanding of the situation in Shanghai. This does not mean that most of the 955 companies are in Shanghai. You are welcome to continue voting, and I will add more companies based on the voting results.

About the future

Always know what you want.

What I want now is an environment where I can learn English and technology, so that my choices in the future will not be limited to China, but will be from all over the world.

If you are nostalgic for the high salaries of domestic large companies

If you are afraid of going to a strange place

If you seek stability and are unwilling to change

Please stay in the country, come on.

If you like a challenge

If you like to experience different life

If you yearn for equal human rights, freedom of speech, and a society ruled by law

The world is so big, go out and see it.

There are many things you can’t change, but you can choose to leave


Work SystemHours per DayDays per WeekExample Company/IndustryDescription
9969 am – 9 pm6Some tech companies in China (e.g., Alibaba)Long hours, prevalent in tech and startup culture in China.
9559 am – 5 pm5Standard corporate companies worldwideStandard work schedule in many countries.
9449 am – 4 pm4Some creative agencies and consulting firmsShorter workweek with slightly reduced daily hours.
8888 am – 8 pm4 (per week)Manufacturing industry with rotating shiftsLonger daily hours, common in shift-based industries.
41010 hours4Some government jobs and tech companiesFour-day workweek with 10-hour shifts.
9879 am – 8 pm7Startups in high-growth phasesIntense schedule with no days off for quick scaling.
7747 am – 7 pm4Healthcare workers and emergency servicesLong shifts but three consecutive days off.
5825 am – 8 pm2Part-time workers in retail or emergency servicesVery long shifts with significant days off.
9989 am – 9 pm4 (per week)IT support companies with alternate workweeksAlternating week schedule with long daily hours.
104510 am – 4 pm5Freelancers and part-time workersShorter daily shifts for a flexible schedule.
6636 am – 6 pm3Oil and gas industry workers, emergency respondersIntensive shifts with more days off.
9649 am – 6 pm4Innovative tech companies focusing on work-life balanceBalanced workweek for better work-life balance.
99699 am – 9 pm6 (for 9 months)Construction projects, startups with intense deadlines9 months intense work, 3 months reduced work/vacation.
8458 am – 4 pm5Public sector, schools, educational institutionsStandard workday with earlier start and finish.
1212412 hours4Healthcare (e.g., nurses, EMTs), fire servicesLonger shifts, common in emergency and production roles.
9829 am – 8 pm2Weekend-only retail or event-based industriesFull weekend off, fewer but longer shifts.
107510 am – 7 pm5Retail stores, customer service centersSlightly later start for flexibility, covering customer hours.
1212612 hours6Police, fire departments, intensive project phasesIntense schedule with only one day off per week.
9359 am – 3 pm5Part-time workers, flexible work for parentsShorter shifts for part-time or flexible work.
24/724 hours on-call7On-call IT support, doctors, maintenance engineersOn-call availability at all times, often in critical industries.
9959 am – 9 pm5Law firms during peak cases, financial consultingIntense daily hours but retains a full weekend off.
6866 am – 8 pm6Logistics and delivery services during peak seasonsDemanding work schedule, nearly full-week work.
3433 pm – 4 am3Nightclubs, security services, night-shift operationsNight shifts covering late hours.
8448 am – 4 pm4Small businesses, some consulting or remote teamsShorter workweek with standard daily hours.
1213612 hours3 (on), 6 (off)Offshore drilling, rotational workers in remote locationsRotational schedule, intensive work followed by rest days.
Type of Work System

Pig Butchering Scam

Every year, people around the world lose millions of dollars to a sophisticated scam known as “the pig butchering romance scam”.

The Pig Butchering Scam (also known as “Sha Zhu Pan” 殺豬盤/杀猪盘 or “slaughtering the pig”) is a type of financial scam that originated in China and has since spread globally. It is a long-con romance and investment scam where the victim (referred to as the “pig”) is “fattened up” emotionally and psychologically by the scammer over time before being “butchered,” meaning they are coerced into investing large sums of money into fake investment schemes.

How the Scam Works:

  1. Initial Contact and Relationship Building:
    • Scammers typically approach victims through dating apps, social media, or cold messaging on platforms like WhatsApp.
    • They spend weeks or months building a fake relationship, gaining the victim’s trust by pretending to be romantically interested, showing care, or posing as a friend.
  2. Introducing the Fake Investment:
    • Once trust is established, the scammer introduces the victim to a fake investment opportunity. This could be a cryptocurrency investment, forex trading, or any high-return scheme.
    • The scammer shows supposed “evidence” of their own profits and convinces the victim that they, too, can make money quickly.
  3. Small Returns to Gain Trust:
    • Victims are often persuaded to invest a small initial amount, and the scammer may provide fake returns to make the investment seem legitimate and lucrative.
    • This initial success motivates the victim to invest more money.
  4. The Big Loss – Butchering the Pig:
    • Once the victim has invested a large sum, the scammer disappears with the money or prevents the victim from withdrawing their funds.
    • The victim is left with no access to their “investment,” which in reality never existed.

Characteristics of the Scam:

  • Long-term Manipulation: The scam takes time, as the scammer “fattens up” the victim by developing a deep emotional connection.
  • High Returns Promised: Victims are usually promised high or guaranteed returns, making the scam seem like a “once in a lifetime” opportunity.
  • Use of Fake Investment Platforms: The scam often involves convincing the victim to invest through fake websites or apps that appear legitimate, complete with customer support and live dashboards to show false profits.
  • Withdrawal Blockage: When the victim tries to withdraw their funds, they may be told there are “fees” or “taxes” to pay, which are just tactics to extract more money before the scammer vanishes.

How to Avoid Pig Butchering Scams:

  • Be Wary of Strangers Online: Be cautious about people who approach you on dating apps or social media, especially if they bring up financial opportunities.
  • Do Not Share Personal Information: Avoid sharing sensitive personal details or financial information with people you haven’t met in person.
  • Research Investment Opportunities Thoroughly: If someone suggests an investment platform, research it thoroughly. Be skeptical of high returns or “no risk” opportunities.
  • Avoid Transferring Money Quickly: Do not send money to someone you just met online or invest in schemes you don’t fully understand.

The Pig Butchering Scam is a sophisticated, emotionally manipulative con, preying on vulnerable individuals who trust the scammer. By being aware of the tactics used, you can better protect yourself and others from falling victim to this type of fraud.

The scam takes its name from the victims, who the scammers call “pigs” that they “fatten up” before slaughter. It usually begins with a text message that appears to be a wrong number. People who respond are lured into a long conversation with a good-looking and wealthy stranger who eventually offers to teach them how to make money with crypto investments. The investments are (of course) fake, and once victims send enough of their money, the scammers disappear. Victims frequently lose their life savings, and often the crime goes unreported because the victim is so embarrassed by what happened. A Kansas banker embezzled almost $50 million dollars from his bank as part of a pig-butchering scam, leading to the bank’s failure.

List of Common Terms

Investors need to understand the common terms related to Pig Butchering scams in order to protect themselves from being financially victimized.

  • Cryptocurrency – A digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by a centralized authority.
  • Dating Apps – An application that enables people to meet for a date and possible lasting relationship (i.e., Tinder, Bumble, eHarmony).
  • Emotions – A natural instinctive state of mind deriving from one’s circumstances, mood, or relationships with others.
  • Encrypted messaging applications – Provide end-to-end encryption for user-to-user text
  • messaging. Encrypted messaging prevents anyone from monitoring your text conversations.
  • Fake Profiles – A profile where someone is pretending to be something or someone that doesn’t exist.
  • Fake trading platform – Binary options trading platforms manipulate the trading software to distort binary options prices and payouts. For example, when a customer’s trade is “winning,” the countdown to expiration is extended arbitrarily until the trade becomes a loss.
  • Investing scam – Happens when people try to trick you into investing money. A scammer may lie to you or give you fake information about a real investment.
  • Love Bombing – The action or practice of lavishing someone with attention or affection, especially to influence or manipulate them.
  • Manipulation – To control or play upon by artful, unfair, or insidious means especially to one’s own advantage.

The Red Flags

  • Out of the blue text message from wrong number.
  • Builds a relationship over time.
  • Encourages potential victim to start investing in cryptocurrency.
  • Quickly switches from one platform to another to avoid detection.

Don’t Be a Victim!

  • Have you been using social media apps that you don’t understand?
  • Did you give/share your personal or financial information with someone you just met?
  • Did you invest with an online app and can’t get your money back?

We are Here to Help!

  • Do you think you are a victim of a Pig Butchering scam, financial fraud or investment fraud?
  • Act quick, get help and stop any wiring/transferring of money or cryptocurrencies.
  • Make detailed notes and keep all documentation relating to the transaction.
  • Call your local police, law enforcement office, or the Securities Division to file a report.

References:

Arti Kata Kabeutrik

Kabetrik adalah istilah dalam bahasa sunda yang merujuk pada kondisi otak yang terlalu tertekan hingga sarafnya menjadi kacau atau bahkan putus.

Kaberik adalah otak konslet.


‘Dahar’ artinya makan dan bisa diucapkan untuk diri sendiri atau orang lain, namun akan terdengar kasar jika diucapkan ke yang lebih tua atau ke orang yang tidak kita kenal.

‘Lebok’ atau ‘lelebok’ yang memiliki arti makan juga memiliki makna yang kasar dan biasanya digunakan untuk lingkungan pergaulan teman sebaya atau menunjukkan ekpresi seseorang ketika sedang marah

‘Hakan’ atau ‘barang hakan’ memiliki arti makan dengan banyak yang cenderung rakus dan juga sebagai ekpresi saat orang sedang marah

‘Gagares’ yaitu seperti ngemil dan sebaiknya kata ini tidak digunakan saat berbicara pada orang yang lebih tua atau orang yang baru dikenal

‘Jajablog’ sering diucapkan ketika sedang mengobrol dengan saudara, teman, dan sahabat yang jika diartikan kedalam bahasa Indonesia artinya makan atau ngunyah

‘Cacatrek’ adalah bahasa Sunda yang berasal dari daerah Banten yang berarti ngemil dan memiliki makna yang cenderung kasar

Dad Supports You Story

Since childhood, I have been in a single-parent family.
My mother passed away due to illness when I was very young. The family in my memory was supported by my father’s hard work every day.

I didn’t become a bad boy just because I was alone at home all the time.

On the contrary, I often hear my neighbors say: “Ajun, you must study hard and be filial to your father from now on.” I have been among the best since elementary school.

In this way, all the way to my senior year of high school, I came out.

The target is my two-year junior classmate.

One evening in my senior year of high school, when I was walking to the cram school carrying a heavy schoolbag, I met him.
He was being beaten by a group of bad guys from a neighboring school. At that time, I seemed to think of my father who stood up for me when I was beaten by classmates in elementary school because of being a “sissy.”

I stepped in to save him.

By chance, our relationship got better and better, and later, I officially came out as gay.
Of course, my dad didn’t know.

We go to the nearby cafe to study together after school every day.
Walking and chatting together on the playground,
Let’s cheer each other on.

Just two weeks before the academic test, it rained that day.
I was holding his hand in the alley near the cram school, holding an umbrella together, enjoying our alone time.

Suddenly, a trumpet sounded from behind.
I suddenly turned around and saw my dad’s familiar shabby little yellow one.
He rolled down the window and was about to speak, but he broke free from my hand.
The junior didn’t care about his umbrella or me, and just ran away in the heavy rain.
I panicked.
Looking back, I only remember yelling at the rolled-down car window: “If he doesn’t come back, I won’t go home either!”
Then he chased after his junior fellow student without looking back.

Later, I found him in front of a convenience store two hundred meters away.
I told him that I could ignore my dad for his sake.
He agreed, but the premise he put forward, as he was familiar with my family situation, was that I could not fall out with my father.

That night, when I got home, I went straight to my room.
I vaguely heard my dad whisper: “I didn’t say anything at that time.”

I ignored him.

In my memory, from that day to the release of the academic test results, I did not speak to him more than ten sentences.

After the results were released, I was admitted to a university more than 200 kilometers away from home.
The university I made an appointment with my junior classmate.
Before leaving home, my dad told me something.
It’s just about being strong and independent outside and taking care of your health.
After saying that, he handed me an amulet and said he asked the gods for it.

I stuffed it into my bag randomly, said “I’m leaving” and never looked back.

I spent the first two years of college in the library and at my part-time job.
It wasn’t until my junior year that my junior student passed the exam.
We rented a small suite outside together.
We have classes during the day and work at night.

Very ordinary, but happy.

Five years ago, one evening during my senior year of college, I received a call from an unfamiliar number.
As soon as I picked up the phone, before I could say anything, a quick and nervous voice came from the other end of the phone.
“Arjuna, I am the neighbor’s aunt!”
Your dad suddenly suffered a myocardial infarction while we were having dinner and is now in emergency care. 」

I put down my half-eaten lunch before I could send a message to my classmates who were still at school.
I rushed to the high-speed rail station and bought the nearest bus and headed straight down.
By the time we arrived at the hospital, my father had already left.

I can’t remember much of what happened next that day.

Later, I stayed there for more than a month.
I went to places where my dad and I were.

When I went to junior high school and was studying for the entrance examination, he would buy me a late-night snack from the salted crispy chicken stall after running in the car at night.
I went to kindergarten and he used to take me to the park where baseballs were thrown.
I went to the scenic spot he used to go to when he taught me how to ride a bicycle in elementary school.

In this way, living a corrupt life.

Until one day, my junior classmate couldn’t bear the loneliness and came down to pick me up.

Before leaving, we went to Dad’s grave.
He knelt on the ground and kept crying. He felt that he was the reason for our father and son to have such a knot in their hearts.

I didn’t even have time to untie it until my dad left.

I just waited quietly for him to finish crying.

Suddenly, I remembered the amulet my father gave me before I went to college.
I found it buried deep inside the bag.
The moment I took it out, something inside the amulet fell out.
A note.

I opened its crumpled folds,
Five words were scrawled inside in black pen.

“Dad supports you”

This time, it was my turn to burst into tears.

「Promise you I will be stronger
Be a man with backbone and no longer shed tears easily

I just wish all this could happen before I say goodbye to you.”

We’ve had a great time these two years.
The junior changed his previous cowardly image, combed his hair and worked in a bar.

And I joined a foreign company with my good Chinese skills since I was a child.

we are doing well.

Next week, my junior classmate’s relatives and friends and I are going to have a dinner together.
It’s our wedding ceremony, I don’t know.

Anyway, Dad.

“I hope you will come.”

“I also hope you come back.”



從小,我便身處單親家庭。
媽媽在我很小的時候就因病去世了,記憶裡的家庭,就是爸爸靠著每天辛勤跑車扛起來的。

我沒有因為常常一個人在家成為壞孩子。

相反地,常常聽鄰居說:「阿俊,你要認真讀書,以後孝順你老爸」的我,從國小開始就名列前茅。

就這樣,一路到了高三那年,我出櫃了。

對象是小我兩屆的學弟。

就在高三的一天傍晚,我背著沉重的書包要走去補習班的路上,我遇見了他。
他正被一群鄰校的不良份子圍毆,那時,我彷彿想起國小因為「娘娘腔」被同學圍毆的時候,為我挺身而出的爸爸。

我出手救下了他。

因緣際會下,我們的感情越來越好,後來,我正式出櫃了。
當然,我爸並不知情。

我們每天放學一起去鄰近的咖啡廳讀書,
一起在操場上散步聊天,
一起為彼此加油打氣。

就在鄰近學測的前兩週,那天下著雨。
我在補習班附近的小巷子裡,挽著他的手,共撐一把傘,享受著我們的獨處時光。

忽然,後面一陣喇叭聲響起。
我驀地回頭,是我爸那熟悉的破舊小黃。
他搖下車窗,正想開口,被我挽著的手掙脫了。
學弟不顧傘,不顧我,就這樣淋著磅礡大雨跑走了。
我當時慌了。
回想起來,我只記得我對著搖下的車窗大吼了一句:「他不回來,我也不會回家了!」
然後便頭也不回地追向學弟。

後來,在兩百公尺外的便利商店前,我找到了他。
我告訴他,為了他,我可以不顧我爸。
他答應了,但熟知我家裡狀況的他提出的前提是我不能跟我爸鬧翻。

當晚,我回到家,便直奔我的房間。
我依稀聽到我爸小聲說了一句:「我那時什麼也沒說呀」

我沒理睬他。

記憶中,從那天到學測放榜,我沒跟他講超過十句話。

放榜後的我,考上了離家兩百餘公里遠的大學。
跟學弟約定好的大學。
在離家前,我爸囑咐了我一些事。
無非就是在外要堅強獨立,保重身體之類的話。
說完,他遞給我一個護身符,說是他向神明求的。

我胡亂塞進包裡,丟下一句我走了,就沒再回頭。

上大學的前兩年我都在圖書館與打工的地方裡度過。
直到大三那年,學弟考進來了。
我們一起在外面租了一個小套房。
我們白天上課,晚上上班。

很平凡,卻又幸福。

五年前,也就是大四的某天傍晚,我接到了一個陌生的號碼撥來的電話。
一接起來,我還沒開口,電話那頭便傳來急促緊張的聲音。
「阿俊阿,我是鄰居的那個阿姨啦!
你爸在跟我們吃飯的時候突然心肌梗塞,現在在急救了。」

我放下吃到一半的便當,還來不及傳訊息給還在學校的學弟,
便衝去高鐵站買了最近的一班車直衝下去。
等我人到醫院的時候,爸爸已經走了。

那天的後續我已經記不清了。

後來,我在那裡一待就是一個多月。
我去遍有我跟我爸蹤跡的地方。

我去了國中要拼會考時他晚上跑完車都會買宵夜給我的鹽酥雞攤。
我去了幼稚園他常常帶我去丟棒球的公園。
我去了國小他教我騎腳踏車時都會去的風景區。

就這樣,過著糜爛的生活。

直到有一天,學弟耐不住寂寞下來接我回去。

臨走前,我們去了爸的墓前。
他跪在地上一直哭,他覺得是他讓我們父子有了這樣的一個心結。

甚至到我爸走了都還沒來得及解開。

我就這樣靜靜地等他哭完。

忽然,我想起了去大學前爸塞給我的護身符。
我從包裡找到了被壓在最深層的它。
在我拿出它的瞬間,有個夾在護身符裡的東西掉了出來。
一張紙條。

我打開了它皺皺的摺痕,
裡面用黑筆潦潦草草寫了五個字

「爸爸支持你」

這次,止不住眼淚的輪到我。

「答應你我會更堅強
當個有骨氣的男人不再輕易流淚

只願這一切能發生再與你道別」

這兩年的我們過得很好。
學弟一改以往懦弱的形象,梳起了油頭,在一間酒吧工作。

而我憑著從小就好的語文能力,進了一間外商公司。

我們很好。

下週,我跟學弟的親朋好友要聚餐了。
算是我們的結婚儀式了吧,我也不清楚。

總之,爸。

「希望你會來。」

「也希望你回來。」

Panduan Kode Akuntansi | Struktur Kode Akuntansi

Kategori kode dalam akuntansi dapat bervariasi tergantung pada sistem akuntansi yang digunakan oleh suatu organisasi atau perusahaan. Namun, berikut ini adalah beberapa kategori umum yang sering digunakan dalam sistem kode akuntansi:

  1. Kas dan Setara Kas:
    • 101 – Kas di Tangan
    • 102 – Kas di Bank
    • 103 – Giro dan Cek yang Belum Tercairkan
    • 104 – Kas Kecil/Petty Cash
  2. Investasi:
    • 105 – Investasi Jangka Pendek
    • 106 – Investasi Jangka Panjang
  3. Piutang:
    • 201 – Piutang Usaha
    • 202 – Piutang Non-Usaha
    • 203 – Piutang Karyawan
    • 204 – Penyisihan Piutang Tidak Tertagih
  4. Persediaan:
    • 301 – Persediaan Bahan Baku
    • 302 – Persediaan Barang dalam Proses
    • 303 – Persediaan Barang Jadi
  5. Aset Tetap:
    • 401 – Tanah
    • 402 – Bangunan
    • 403 – Peralatan dan Mesin
    • 404 – Kendaraan
  6. Liabilitas:
    • 501 – Hutang Usaha
    • 502 – Hutang Non-Usaha
    • 503 – Hutang Pajak
    • 504 – Utang Bank
  7. Ekuitas:
    • 601 – Modal Pemilik
    • 602 – Laba Ditahan
  8. Pendapatan:
    • 701 – Pendapatan Usaha
    • 702 – Pendapatan Lain-lain
  9. Biaya dan Beban:
    • 801 – Beban Operasional
    • 802 – Beban Bunga
    • 803 – Beban Pajak
  10. Lainnya:
    • 901 – Pengeluaran Kas Lainnya
    • 902 – Penerimaan Kas Lainnya
  11. Cadangan:
    • 1001 – Cadangan Umum
    • 1002 – Cadangan Khusus

Perlu diingat bahwa struktur kode akuntansi dapat bervariasi antara organisasi dan negara. Organisasi besar dengan operasi yang kompleks mungkin memiliki kode akuntansi yang lebih rinci dan terinci, sementara organisasi kecil mungkin menggunakan kode yang lebih sederhana. Selain itu, regulasi akuntansi dan perpajakan yang berlaku di negara tempat organisasi beroperasi juga dapat memengaruhi struktur kode akuntansi mereka.

100 Reasons To Stay Alive

“Reasons to Stay Alive” is indeed a novel written by Matt Haig. It was published in 2015 and is a memoir that explores the author’s personal experiences with depression and anxiety. The book combines Haig’s own journey with mental health issues and insights into how he found reasons to keep living, providing a mix of personal narrative, reflections, and thoughts on mental well-being.

Throughout the book, Matt Haig shares his struggles with mental health and offers a message of hope and resilience. The title suggests that within the challenges and darkness of life, there are reasons to find joy, purpose, and meaning.

It’s important to note that if you or someone you know is struggling with mental health issues, seeking support from mental health professionals, friends, or family is crucial. “Reasons to Stay Alive” is just one person’s perspective, and individual experiences with mental health can vary.

  1. ✅ to make your parents proud
  2. ✅ to conquer your fears
  3. ✅ to see your family again
  4. ✅ to see your favorite artist live
  5. ✅ to listen to music again
  6. ✅ to experience a new culture
  7. ✅ to make new friends
  8. ✅ to inspire
  9. ✅ to have your own children
  10. ✅ to adopt your own pet
  11. ✅ to make yourself proud
  12. ✅ to meet your idols
  13. ✅ to laugh until you cry
  14. ✅ to feel tears of happiness
  15. ✅ to eat your favorite food
  16. ✅ to see your siblings grow
  17. ✅ to pass school
  18. ✅ to get tattoo
  19. ✅ to smile until your cheeks hurt
  20. ✅ to meet your internet friends
  21. ✅ to find someone who loves you like you deserve
  22. ✅ to eat ice cream on a hot day
  23. ✅ to drink hot chocolate on a cold day
  24. ✅ to see untouched snow in the morning
  25. ✅ to see a sunset that sets the sky on fire
  26. ✅ to see stars light up the sky
  27. ✅ to read a book that changes your life
  28. ✅ to see the flowers in the spring
  29. ✅ to see the leaves change from green to brown
  30. ✅ to travel abroad
  31. ✅ to learn a new language
  32. ✅ to learn to draw
  33. ✅ to tell others your story in the hopes of helping them
  34. ✅ Puppy kisses.
  35. ✅ Baby kisses (the open mouthed kind when they smack their lips on your cheek).
  36. ✅ Swear words and the release you feel when you say them.
  37. ✅ Trampolines.
  38. ✅ Ice cream.
  39. ✅ Stargazing.
  40. ✅ Cloud watching.
  41. ✅ Taking a shower and then sleeping in clean sheets.
  42. ✅ Receiving thoughtful gifts.
  43. ✅ “I saw this and thought of you.”
  44. ✅ The feeling you get when someone you love says, “I love you.”
  45. ✅ The relief you feel after crying.
  46. ✅ Sunshine.
  47. ✅ The feeling you get when someone is listening to you/giving you their full attention.
  48. ✅ Your future wedding.
  49. ✅ Your favorite candy bar.
  50. ✅ New clothes.
  51. ✅ Witty puns.
  52. ✅ Really good bread.
  53. ✅ Holding your child in your arms for the first time.
  54. ✅ Completing a milestone (aka going to college, graduating college, getting married, getting your dream job.)
  55. ✅ The kind of dreams where you wake up and can’t stop smiling.
  56. ✅ The smell before and after it rains
  57. ✅ The sound of rain against a rooftop.
  58. ✅ The feeling you get when you’re dancing.
  59. ✅ The person (or people) that mean the most to you. Stay alive for them.
  60. ✅ Trying out new recipes.
  61. ✅ The feeling you get when your favorite song comes on the radio.
  62. ✅ The rush you get when you step onto a stage.
  63. ✅ You have to share your voice and talents and knowledge with the world because they are so valuable.
  64. ✅ Breakfast in bed.
  65. ✅ Getting a middle seat in the movie theater.
  66. ✅ Breakfast for dinner (because it’s so much better at night than in the morning).
  67. ✅ Pray (if you are religious)
  68. ✅ Forgiveness.
  69. ✅ Water balloon fights.
  70. ✅ New books by your favorite authors.
  71. ✅ Fireflies.
  72. ✅ Birthdays.
  73. ✅ Realizing that someone loves you.
  74. ✅ Spending the day with someone you
  75. ✅ Opportunity to create meaningful and lasting relationships.
  76. ✅ Potential to learn, grow, and evolve as a person.
  77. ✅ Joy and happiness in the little things.
  78. ❌ The power to inspire others.
  79. ❌ The ability to create art, music, and other forms of self-expression.
  80. ❌ To explore different cultures, traditions, and ways of life.
  81. ❌ To make a positive impact on the environment and help protect the planet.
  82. ✅ Experience the joys of parenthood and raise a family.
  83. ✅ Learn new things and develop new skills.
  84. ❌ Create a legacy that will outlive you.
  85. ✅ Being wrapped up in a warm bed.
  86. ✅ Cuddles
  87. ✅ Holding hands.
  88. ✅ The kind of hugs when you can feel a weight being lifted off your shoulders. The kind of hug where your breath syncs with the other person’s, and you feel like the only two people in the world.
  89. ✅ Singing off key with your best friends.
  90. ✅ Road trips.
  91. ✅ Spontaneous adventures.
  92. ✅ The feeling of sand beneath your toes.
  93. ✅ The feeling when the first ocean wave rolls up and envelops your toes and ankles and knees.
  94. ✅ Thunderstorms.
  95. ✅ Your first (or hundredth) trip to Disneyland.
  96. ✅ The taste of your favorite food.
  97. ✅ The child-like feeling you get on Christmas morning.
  98. ✅ The day when everything finally goes your way.
  99. ✅ Compliments and praise.
  100. ✅ to look on this moment in 10 years time and realize you did it.
  101. ❌ Kill yourself

Ps : Never forget you are a beautiful person 💕 Life is so beautiful so live, live like no one else exist, live for yourself, don’t care of bad people, you are strong, i love you

Set Up OpenVPN Server In 3 Minutes

sudo apt update
sudo apt upgrade

ip a
ip a show eth0

dig +short myip.opendns.com @resolver1.opendns.com
dig TXT +short o-o.myaddr.l.google.com @ns1.google.com | awk -F'"' '{ print $2}'
wget https://git.io/vpn -O openvpn-install.sh
chmod +x openvpn-install.sh

sudo ./openvpn-install.sh

Sample session from AWS/Lightsail where my cloud server is behind NAT:

Sample session from Linode/DO server where cloud server has Direct Public

To avoid problem always choose DNS as 1.1.1.1 or Google DNS. Those are fast DNS server and reached from anywhere on the Internet.

What is Scamming System?

A scamming system refers to the methods and techniques used by individuals or groups to deceive and defraud others for personal gain. Scams can take various forms and can target individuals, businesses, or even governments. Here are some common types of scamming systems:

  1. Online Scams: These scams are conducted over the internet and can include phishing emails, fraudulent websites, or social engineering tactics to trick people into revealing personal information or sending money.
  2. Investment Scams: Scammers promise high returns on investments that are often too good to be true. They may use pyramid schemes, Ponzi schemes, or fake investment opportunities to lure victims.
  3. Tech Support Scams: Scammers pose as tech support representatives and claim that your computer or device is infected with malware or has technical issues. They then offer to “fix” the problem for a fee or gain access to your computer to steal information.
  4. Romance Scams: Also known as “catfishing,” scammers create fake online personas to establish romantic relationships with individuals, often leading to requests for money or gifts under false pretenses.
  5. Lottery and Prize Scams: Victims receive notifications claiming they have won a lottery or prize, but they must pay fees or provide personal information to claim their winnings. In reality, there are no winnings.
  6. Impersonation Scams: Scammers pretend to be someone else, such as a government official, police officer, or utility company representative, to intimidate victims into paying money or providing information.
  7. Charity Scams: Scammers impersonate charitable organizations or create fake charities to solicit donations for fake causes. The money typically goes into the scammer’s pockets.
  8. Job and Employment Scams: Scammers offer fake job opportunities, often requiring upfront payments for training, materials, or background checks. The promised job may not exist, or it may be significantly different from what was advertised.
  9. Real Estate and Rental Scams: Scammers list properties for sale or rent that they don’t own, collecting deposits or payments from unsuspecting victims.
  10. Advance Fee Fraud: Victims are asked to pay an upfront fee to access a more substantial amount of money, such as an inheritance, lottery winnings, or a business opportunity. After paying the initial fee, victims never receive the promised funds.

To protect yourself from scams, it’s essential to be vigilant, verify the legitimacy of offers or requests, and never send money or share personal information with unknown individuals or organizations. If you suspect you have encountered a scam, report it to your local authorities or relevant consumer protection agencies.


Romance scams are a type of online fraud where scammers create fake identities and build romantic relationships with individuals with the intent to exploit them emotionally and financially. These scams often follow a similar pattern:

  1. Creation of a Fake Profile: Scammers typically create attractive and convincing profiles on dating websites, social media, or even in online gaming communities. They may use stolen photos or images of models to make their profiles more appealing.
  2. Establishing a Connection: Once the fake profile is set up, the scammer begins interacting with potential victims. They often use flattery, compliments, and affectionate messages to build trust and establish a romantic connection quickly.
  3. Escalating the Relationship: As the relationship progresses, the scammer may become more intimate and express strong feelings of love and commitment. They might even discuss plans for the future together.
  4. Creating a Crisis: At a certain point in the relationship, the scammer typically introduces a crisis or emergency situation. This could involve a fabricated medical issue, a legal problem, or a financial hardship. They use this crisis to elicit sympathy and create a sense of urgency.
  5. Request for Money: The scammer eventually asks the victim for money to help resolve the crisis. They might claim they need funds for medical bills, travel expenses to meet the victim, or to get out of a difficult situation. They may also request expensive gifts.
  6. Repeat Requests: If the victim sends money or gifts, the scammer will often continue to invent new crises or reasons for financial assistance, stringing the victim along for as long as possible.
  7. Disappearance: Once the scammer has obtained as much money as they can or if they sense that the victim is becoming suspicious, they may suddenly disappear, leaving the victim emotionally devastated and financially drained.

It’s important to be cautious when engaging in online relationships, especially with people you’ve never met in person. Here are some tips to protect yourself from romance scams:

  1. Be Skeptical: If someone you meet online seems too good to be true or rushes into a romantic relationship very quickly, exercise caution.
  2. Protect Your Personal Information: Avoid sharing personal or financial information with someone you’ve met online, especially if you haven’t met them in person.
  3. Do a Reverse Image Search: You can use reverse image search tools to check if the photos the person has shared with you are stolen from elsewhere on the internet.
  4. Verify Their Identity: If you suspect someone may be a scammer, ask for video calls or insist on meeting in person if they claim to be nearby. Scammers often make excuses to avoid face-to-face interactions.
  5. Stay Informed: Be aware of common red flags and the tactics scammers use. Educate yourself on the signs of romance scams.
  6. Report Suspicious Activity: If you believe you’ve encountered a romance scammer, report them to the platform you met them on and to law enforcement. This can help prevent others from falling victim to the same scam.

Remember that scammers are skilled manipulators, and their primary goal is to exploit your emotions and trust. Staying vigilant and cautious is key to avoiding romance scams.


Impersonation scams involve scammers pretending to be someone they’re not in order to deceive and defraud individuals. These scams can take various forms, with the scammer impersonating figures of authority or trusted entities to exploit their victims. Here are some common examples of impersonation scams:

  1. Government Impersonation Scams: In this type of scam, the fraudster poses as a government official, such as an IRS agent, a police officer, or an immigration officer. They may claim that you owe taxes, have outstanding warrants, or face deportation and threaten legal action or arrest unless you pay fines or provide personal information.
  2. Utility Company Impersonation Scams: Scammers impersonate employees of utility companies like electricity, water, or gas providers. They may threaten to disconnect your service unless you make immediate payments to a specific bank account or provide sensitive information over the phone.
  3. Bank Impersonation Scams: Scammers pretending to be bank representatives contact individuals, claiming there’s an issue with their accounts, such as unauthorized transactions or security breaches. They then request account details or ask victims to log in to fake websites to steal login credentials.
  4. Tech Support Impersonation Scams: Scammers impersonate tech support agents from reputable companies like Microsoft or Apple. They claim there are issues with your computer or software and offer to help, often charging a fee for unnecessary services or gaining remote access to your computer to steal personal information.
  5. Family Member Impersonation Scams: Scammers pretend to be a family member, such as a grandchild or sibling, claiming they’re in trouble, often in a foreign country. They request money for emergencies like bail, medical bills, or travel expenses.
  6. Social Media Impersonation Scams: Scammers create fake social media profiles using stolen photos and information to impersonate friends or acquaintances. They then reach out to contacts and ask for money, claiming they’re in distress.
  7. Business Impersonation Scams: Scammers impersonate business executives, often through email, requesting employees to transfer funds or send sensitive information to fraudulent accounts. This is commonly referred to as CEO fraud or business email compromise (BEC) scams.

To protect yourself from impersonation scams:

  1. Verify the Identity: Always verify the identity of individuals or organizations that contact you with unusual requests, especially if they demand personal or financial information.
  2. Use Official Contact Information: If you receive a suspicious call or message, independently verify the contact details of the entity they claim to represent and contact them using official contact information.
  3. Be Cautious with Personal Information: Avoid sharing personal, financial, or sensitive information over the phone or online unless you’re certain of the legitimacy of the request.
  4. Stay Informed: Keep yourself informed about common impersonation scams and their tactics, so you can recognize potential scams.
  5. Report Suspicious Activity: If you suspect you’re dealing with an impersonation scam, report it to the relevant authorities or organizations. Reporting can help prevent others from falling victim to the same scam.

Impersonation scams rely on deception and intimidation, so staying vigilant and questioning unexpected requests is essential to avoid falling prey to these fraudulent schemes.


Social media impersonation scams involve individuals or groups creating fake profiles or accounts on social networking platforms to impersonate others, usually with the intention of deceiving or defrauding people. These scams can target individuals, friends, family members, or even public figures. Here’s a more detailed explanation of how social media impersonation scams work:

  1. Creation of Fake Profiles: Scammers create social media profiles using stolen photos and information from real individuals. They may choose to impersonate friends, acquaintances, celebrities, or even family members to make their profiles appear convincing.
  2. Friend Requests and Messages: Once the fake profile is set up, the scammer often sends friend requests or messages to the target’s friends or contacts. They may also send a message to the target themselves, posing as the person they are impersonating.
  3. Building Trust: After connecting with the target or their friends, the scammer works on building trust. They may engage in casual conversations, share personal information, and mimic the writing style or communication patterns of the person they are impersonating.
  4. Deceptive Requests: At some point, the scammer introduces a deceptive request. This could include asking for money, personal information, or suggesting the target click on a malicious link. For example, they might claim to be in a difficult situation and urgently need financial assistance.
  5. Emotional Manipulation: Impersonation scammers often employ emotional manipulation tactics. They may play on the target’s emotions by pretending to be in distress, facing a crisis, or expressing love or affection to gain sympathy and trust.
  6. Monetary or Data Theft: Once the target falls for the scam and complies with the scammer’s request, the scammer can achieve their objectives. This may involve stealing money from the victim, committing identity theft, or using the obtained information for other fraudulent activities.
  7. Continuation or Disappearance: Depending on the scammer’s goals, they may either continue to exploit the victim or disappear after obtaining what they want. If the victim becomes suspicious or refuses further requests, the scammer may cease contact and move on to other targets.

To protect yourself from social media impersonation scams:

  1. Verify Profiles: If you receive friend requests or messages from someone you already know, double-check their existing profile to ensure it’s legitimate. Be cautious if you receive duplicate friend requests.
  2. Examine Profiles Closely: Scrutinize the profiles of new connections for inconsistencies, such as strange usernames, limited activity, or a lack of personal details.
  3. Communicate Outside of Social Media: If you receive a suspicious message, try contacting the person through other means, such as their phone number or email address, to verify their identity.
  4. Educate Yourself: Be aware of the common tactics used in social media impersonation scams and familiarize yourself with the privacy settings on your social media accounts to control who can contact you.
  5. Report Suspicious Activity: Report fake profiles and suspicious messages to the social media platform to help prevent others from falling victim to the same impersonation scam.

It’s crucial to remain vigilant and skeptical when interacting with people on social media, especially if the requests or messages seem unusual or raise red flags. Trust your instincts and take steps to verify the identity of individuals before sharing personal information or engaging in financial transactions.

Exit mobile version