Diary of a Narcissist’s Supply: The Ugly Truth Behind the Fake Love

Diary of a Narcissist’s Supply: The Ugly Truth Behind the Fake Love

What really happens after a Breakup

Most of the time it isn’t even the fact that you broke up with that is the bigger picture but the relief and exhaustion of having to deal with them.    It isn’t something I encourage people to experience.   A narcissist only wants to control and power and manipulation.    That’s what they like and think they deserve to be the center of the world.  It however isn’t something that is ever been talked until recently.   We have so many people with this condition that it isn’t even funny.   It’s dysfunctional at the very least and toxic at the core of a relationship.   When you finally start seeing the signs of the narcissist relationship and even the dynamics it can be too late.     Some of the signs they have issues are quite hard to see at the beginning of the relationship.

  • Idealization –  They put you on a Pedistal and make you feel like your the most important person in the world.   It is usually the first step but can be also included in love bombing techniques.
  • Love Bombing – This is usually their first and second step to grab you and start the process to prevent you from leaving to soon.  They will flatter you and give you all the attention but that’s just the ploy.
  • Devaluation –  This is where they start to dismiss your feelings and gaslight you into doubting your own truth.  They don’t care about your feelings or truths and they only want you to give to them.   This is the problem with kind people they don’t understand that having boundaries is a good thing.   Narcissist love kind people because they hope you don’t notice the cycles until it is too late. This stage they usually stop chasing you and hope you don’t stop chasing them.
  • Repeat Cycle –  I call this the hair washing cycle.  Rinse, lather, repeat.   They will continue to do this cycle.  It’s basically Love bombing and devaluation cycles back and forth until you are walking on eggshells.
  • Discard Phase – If you get to this one you are mostly done for the time being.   This is where they will find a way to get you to leave or make it so you can’t do anything but have to leave.  if you leave on your own, this will cause them to double down and try to get you back.  This never ends well for the person unless they decide to do a no-contact and block them every place they can.

Narcissist Abuse is real!

It can be hard to understand unless you have had this before but when you are in a relationship with a narcissist, it is doubling hard to see the next relationship any better.  You’ll always looking for those red flags and even when you see green flags you are still looking for them acting like a narcissist.   They will leave a long term mark on you thoughts and it takes a strong man or woman to call it out.   Having said that, it can be quite a challenge for anyone who has been the victim of a narcissist relationship.  The Narcissist will not give up though, if you leave or they discard you they may come around again to get their supply of you attention or whatever they may consider to them they need for love.    It’s usually an ego that needs stroking and they will come back when they don’t have anyone lined up to continue the process.

Hovering, Flying Monkeys, and even Triangulation

I put these together because they basically are Narcissist ways of controlling you.  They have friends and family who will let them know what you are doing after the relationship.   They will use every tactic in the book to keep you isolated and make sure they can hoover or control you from afar.  This is why it is best to block their friends and family and ready for this when they decide they want to come back to you for their attention and other things they need.   Flying monkeys will tell the narcissist if you are in a relationship and they will go so far as to smear your name to your next relationship just to show they have control over you.  The real problem is they want to feel powerful and control every aspect of the relationship even after your have broken up.   This can be rather harsh for people to accept but you will have several months to even years before they forget you and go on to another supply.   You’ll just need to stand your ground and learn what to do to fight back and set boundaries.  They will use triangulation to make it sound like they were the victim and you were the problem so it can be quite difficult to keep going after that unless you are far enough away to not be bothered by the smear campaigns.

 

Learn the Signs here are some good websites to visit to learn even more about narcissist abuse and toxic relationship”

The Narcissistic Relationship Cycle

 

https://www.verywellmind.com/narcissistic-abuse-cycle-stages-impact-and-coping-6363187

Stages of a Narcissistic Relationship

Digital Convert boxes for Feburary 17, 2008

It being close to the change over, I’d figure I’d show you some of them and talk about them. To better help people make up there minds on what might be there choice of a Digital Converter Box. This is to help people get the most out of there products.

The Specs for this Converter is:

Zenith DTT901 Digital TV Tuner Converter Box

21oyeyvylql_sl160_

  • Digital TV Tuner Coverter Box
  • Analog Pass-Through for Low-Power TV Stations broadcasts
  • On-Screen Program Information with Remote Control
  • Simple Connection to TV with supplied RF Cable
  • Parental Control to Manage TV Programs and advanced Closed Captioning

$59.95 Free Shipping

It could be on sale so check the link for more price options.  I also found this one that is a little more expensive but supposed to be better:
GE 23333 Digital to Analog TV Converter Box

41ht9h42hbl_sl160_

  • Smart Antenna Interface
  • Simple Setup
  • Analog Pass Through
  • Dolby(R) Digital Sound
  • Receives Over-Air Hdtv Signals

$76.99 Free Shipping

These are just some of the ones that I saw online to encourage people to get ready for the change over. If you’re not you need to act quickly because it will come in the next few months. You will need this if your are using an antenna and have no other way to watch shows over the air. This will only work where there is a signal. If you want to see what digital channels you have in your area please check Antenna Web. There they will tell you if you have any local channels in your area.

What is a Virus and Why do I have one

After seeing more and more the updates coming from the net.  I wanted to talk about what a Computer Virus or Trojan is and how you get it.   So how did  you could of gotten a Virus in the first place.   So here are some information to consider:

The vulnerability of operating systems to viruses

So what does that mean to you?  Most of the times when you get a virus you have a vulnerability in some place in your Operating system and it is either something that has not be known by Microsoft, Apple, and Linux or is know as a Zero-day Exploit. [ad#ad2-right]

A zero-day (or zero-hour) attack or threat is a computer threat that tries to exploit unknown, undisclosed or patchfree computer application vulnerabilities. The term Zero Day is also used to describe unknown or Zero day viruses.

[Via Wikipedia]

This is one of the most used because if it is an unknown exploit by the Operating System creators then they have a longer to us the exploit.  Most of the time hackers like to use this because that means there is a possibility of finding even more vectors to infect other systems.  You see if they can get on one system they can then find ways to get on other systems.

In the Old days, you’d ask

How Did I Get This Virus, Anyway?

You get a virus when you copy infected files to your computer, then activate the code inside by running the infected application or opening an infected document. How you copy the infected files is irrelevant: Viruses don’t care if you get them as an e-mail attachment, a download, or via a shared floppy disk, though e-mail attachments are the most prevalent (and easiest) mode of transport.

[via PcWorld] (Dated Oct 13, 2000 11:00 pm)

That was before hackers wanted to infect for more personal gains.   There is a list of things that hackers want to get when they Infect a system and it is usually very few things.   In the Old days they wanted the fame but now they want money and to take control over the internet.  They usually want to infect for Money or to have computers become botnets.  Now We aren’t talking about the Movie, I Robot.   Once a system becomes a bot it doesn’t think for itself but follows a line of command from the Command and Control center.  So lets say we have  several hundred bots on one net, and the hacker blacked mailed a server saying if they didn’t pay up they’d get DoS attacked.  With enough bots going to one site at one time can slow or even bring down a site, that is how A hacker sometimes uses a virus or trojan to get into a system.

Viruses & Trojans try to Avoid detection

So you have a virus, it wouldn’t do a virus any good to be detected right after getting onto a system.   More and more, viruses are trying to avoid being seen and heard.  Most hackers who program are wanting to infect more than one system so they have to make really sure that you don’t find out your infected.    So with that said there are several ways  and I won’t try to explain them because I think the link talks about it better than I could.   It however will give people something to think about.

In the next few days there will be another post on How you will be able to figure out if you have a virus.  I had to talk about this first so people could understand how to figure out if you have in the next post.  So stay tuned for more

Spying on Spyware.ISpynow!!

[ad#digg-right]This is another Virus that is going around and thought I’d tell you about it:

Spyware.ISpyNow monitors files, network traffic, and keystrokes. This Spyware gives the person who installed it a Web-based interface with summaries of logged information on the host computer.

[Via Symantec]

[ad#ad2-left]Now this one isn’t to hard to figure out what happened.  You have to manually install it on your system to get infected.  Symantec has a great way on uninstalling this annoyance.  I also suggest checking out my other program list just in case you don’t want to buy Symantec Anti-Virus programs.  Some other things to check out is:

This is just the beginning in getting your system clean.  You have to keep all you programs up to date and one way I do that is with Appsnap.  This little program keeps you programs up to date from Virus to Firewall.  I hope this helps people prevent and control spyware.