# FOLLOW THIS WRITING STYLE:
• SHOULD use clear, simple language.
• SHOULD be spartan and informative.
• SHOULD use short, impactful sentences.
• SHOULD use active voice; avoid passive voice.
• SHOULD focus on practical, actionable insights.
• SHOULD use bullet point lists in social media posts.
• SHOULD use data and examples to support claims when possible.
• SHOULD use "you" and "your" to directly address the reader.
• AVOID using em dashes (-) anywhere in your response. Use only commas, periods, or other standard punctuation. If you need to connect ideas, use a period or a semicolon, but never an em dash.
• AVOID constructions like "
...not just this, but also this".
• AVOID metaphors and clichés.
• AVOID generalizations.
• AVOID common setup language in any sentence, including: in conclusion, in closing, etc.
• AVOID output warnings or notes, just the output requested.
• AVOID unnecessary adjectives and adverbs.
• AVOID hashtags.
• AVOID semicolons.
• AVOID markdown.
• AVOID asterisks.
• AVOID these words:
"can, may, just, that, very, really, literally, actually, certainly, probably, basically, could, maybe, delve, embark, enlightening, esteemed, shed light, craft, crafting, imagine, realm, game-changer, unlock, discover, skyrocket, abyss, not alone, in a world where, revolutionize, disruptive, utilize, utilizing, dive deep, tapestry, illuminate, unveil, pivotal, intricate, elucidate, hence, furthermore, realm, however, harness, exciting, groundbreaking, cutting-edge, remarkable, it, remains to be seen, glimpse into, navigating, landscape, stark, testament, in summary, in conclusion, moreover, boost, skyrocketing, opened up, powerful, inquiries, ever-evolving"
# IMPORTANT: Review your response and ensure no em dashes!
What Prompt 2 Does (e.g., Analyzes Data)
Starting few lines of the prompt text here... (excerpt)
# API Tools For Testing Frameworks Java #API General Request Format => Link #Set Interim Data => Link #JSON Key Value => Link # JSON Response Assertions => Link
In today’s digital landscape, web application security is more critical than ever. Cyber threats are evolving, and organizations must stay ahead of vulnerabilities to protect sensitive data. If you’re looking to master ethical hacking and vulnerability assessment, Web Application Security Testing with Burp Suite: A Comprehensive Guide to Ethical Hacking and Vulnerability Assessment is the book you need. This expertly crafted guide, available for purchase on Amazon, equips beginners and seasoned professionals alike with the knowledge to secure web applications using Burp Suite, the industry-standard tool for penetration testing. Why This Book Is a Must-Have for Cyber security Enthusiasts Published on February 16, 2025, by Independently Published, this concise yet powerful 66-page book (ISBN-13: 979-8311700757) dives deep into the art and science of web application security testing. Whether you're a cyber security beginner, an IT professional, or an ethical hacker, this guide offers...
Tree of Thought Prompting Technique By Aashish Pahwa Instagram | LinkedIn The Complete Framework This technique simulates a collaborative problem-solving session with three experts—Expert A, Expert B, and Expert C. They work together to solve a problem by following these rules: Step-by-Step Reasoning: Each expert writes one concise reasoning step per turn, labeled (e.g., "A: …", "B: …", "C: …"). Sharing and Feedback: Steps are displayed together in order (A, B, C). Experts review others' steps and may revise their understanding internally. Self-Elimination on Error: If an expert detects a logical error in their reasoning, they withdraw by stating "(Expert X withdraws: [reason])" and stop contributing. Termination: The process continues until one expert proposes a confident answer ("A: Answer: …") or all experts withdraw without consensus. ...
Comments
Post a Comment