自戀 literally means self loving
MengLin 你居然會!How can you!
-------------------------------------------
Here is How You Are Ruining Your Relationships - Duration: 4:17.
If there is one skill that everyone would want to master, I guess it would be maintaining
good relationships with the people around us.
Because most of the times when we find ourselves in a conflict with others, we simply use our
favourite strategy, which is - blaming the other person!
Unfortunately, that doesn't helps at all and even makes the situation even worst!
But what if there is an alternative way to deal with this problem, what if you could
simply avoid all of these conflicts in the first place!
And thats exactly what you will learn in this video!
There are three ways that you are constantly using to destroy your relationships, all what
you need to do is to stop using them!
Its as easy as that, so lets start with the first one!
1. you are criticising when you should not!
Usually when we criticise, we don't realise how our criticism effects the other persons
emotions, because from our point of view, we are just trying to be honest, in fact we
think that we are actually helping them.
But the problem is that they don't necessarily consider it like that.
If a friend of yours criticise the way you are dressed, you probably will defend yourself
even if he might be right!
And thats nature of any human being!
When people criticise us, our ego forces us to believe that the are simply trying to show
off, to look better than us or appear more knowledgeable.
Especially when its done in public, since that drives negative attention to us, which
is something nobody would want! it's much better to keep your opinion within
yourself You don't have to always express your opinion
and say what ever comes into your mind.
Trust that will save you from a lot of arguments and you will maintain a better relationship
with others.
I am not trying to say that you should never ever criticise anyone again, but rather learn
first how to do that properly, because most of the times, we usually do it in the wrong
time and place!
2.
Secondly, You are ignoring their emotions
When People run into problems, they start worrying and panicking.
From a side that looks pointless for you because you can clearly see the problem and you can
clearly see that worrying or panicking isn't going to help at all.
But the people who are in that situation don't view it in that way because their emotions
are in charge and they are not thinking rationally at that moment, just remember the times when
you were worrying about something, I am sure that you found it really difficult to control
your emotions at that time.
And the last thing you would want at that moment is someone telling - just stop worrying
and calm down!
That never helps, thats why, you should not do it as well.
Your job is very simple in such situations, don't criticise, don't blame them for being
stupid even if it was their fault.
Don't try to explain to them logically.
You just have to provide them with the emotional support so that they calm down.
First if all, thats the only thing that will help them at that moment and secondly, that
will have a significant positive impact on your relationship!
3.
And lastly, You aren't taking them seriously
What we don't usually realise is that, what is important to others, might not necessarily
be important to us, but that doesn't mean we have to act like we don't care at all.
When someone is asking for your opinion, that means, they really care about what you think,
they really value your advice, and its really important to take that seriously even if you
are not interested at all in what they are saying.
It even might be something you don't understand at all.
Like, When you spouse asks wether to wear the blue or the red dress, to you it doesn't
matter at all, but to her its an important decision, so instead of usually replying that
you don't know and it doest matter, take a moment and choose one, because that means
a lot to her!
In short,
Try to criticise as less as possible Never ignore their emotions
and make sure you always take them seriously with these 3 things in mind, you relationship
with your family and friends will certainly get much better!
and now its your turn, what do you think?
what would you add to this list?
Lets me know in the comments below!
And as always, hit that like button if you have enjoyed this
video and if you don't want to miss the next video, then hit that subscribe button
and the bell besides it.
Thanks for watching and I will see you in the next one
-------------------------------------------
Kayvahn - Without You (ft. Billie-Rae) - Duration: 2:48.
Kayvahn - Without You (ft. Billie-Rae)
-------------------------------------------
Here in my Kitchen (Tai Lopez Parody) - Duration: 6:46.
Here in my kitchen cooking, my pasta linguini
It's a whole lot of fun hearing, my children, say that they're, not going to eat it
Really, brings joy to my heart you know
but the one thing that i love more than the disappointed tears of my children is
picture books i
Read five picture books every night putting, my son to sleep
This is an old bookshelf that, we deconstructed from an old desk?
Thinking it would make it easier for my four-year-old to consistently hand me a book
One after the other after the other after the other
Until it's midnight and your bleary-eyed and you can barely focus on what word is what and?
then the words come to my mind
It's a benadryl and duct tape kind of day
Now, you may have seen, my other videos where i talk about being a trainer at mom and i'm not just a train wreck
Chef you know, brag that i'm a train, wreck i'm a train wreck because i have kids
And my kids are a perfect. Showcase
as
to
Why i'll never be perfect, and?
That's why i'm a train wreck
They're, the perfect reminder for all the dreams i had before i had children
Like a clean house
and
Perfectly, well behaved children, who never speak back to me and always eat all the food i always cook, for them
Back before i had kids i thought it was possible to get a full night's of sleep
instead i
Have him handing me book after book to read
that one
that one
before i had kids i had never
stepped on an ankylosaur toy i
Never had gummy snacks stuck in my hair and i never scoured the inside of a three-week-old. Chocolate, milk sippy cup
Do you know, what happened something miraculous happened in my life
What happened i had my first kid
And that first kid is a wide open shocker to a lot of people about
what kind of parent they're, gonna wind up being i
Wanted to be the perfect parent i wanted to be the perfect, mom i wanted to be the pinterest perfect mom
out of this room i
wanted to be that mom who brought handmade cupcakes and cute little valentine's that were handmade and
That never happened
Because while i was trying to be perfect?
My kid was growing up and?
Then i got a divorce then i got married
Had two bonus daughters?
Then, we had a son and that right there
Starts to really sink in about how. You can't always, worry, about being perfect
And you can't always, worry, about being that mom or that parent
because eventually
You, don't have the chance to be the parent
Eventually they're, gonna leave and all they'll have are the memories of you trying to be perfect
instead of being there for them
This, is the good life
this is
You know, we don't always have health wealth fame and fortune but, we have each other, we have love?
And that's typically all you need?
Wise wise people said that once all you need is love you might, want to look into that
did a little video
About the secrets of being a train wreck mom i'll put a card up here somewhere it's usually over here i think and
So that you can go ahead and check that out it's free. You know i'm not gonna charge you to go
Check, this video out but definitely go check that out and learn, my secrets at being a train wreck mom now
This, isn't the pinterest perfect, scene i'm not promising
You once you see this video that you're going to sit there and automatically, wake up tomorrow. Morning with
Your kids listening to you, and you're in the middle of a 1950s sitcom wearing your pearls and you dress in the heels
While you're, baking a turkey, okay it's not that scene i know
Some people are gonna watch that video and they're, gonna go
Oh, this trainwreck thing that that's not for me and that's
Okay, it's not for everyone you know the trainwreck lifestyle is not for everyone, we didn't choose the trainwreck, life the trainwreck life
Chose us you know, we do what we can, and try to get by
But there are going to be people that are going to sit there and go, oh my god
i'm a trainwreck, and there's others out, there like, me
Yes, we are out there like, you doing, what we can, to, make life a little less chaotic
So if you're. A tiger mom or pinterest mom or a helicopter mom you, don't have to click the link
Okay, i'm not gonna be offended i understand
But you might be sitting there and wondering what the trainwreck life is all about and if you are interested go ahead
click that link and
Find out are you a train wreck and there's no shame in that okay there's no shame being a train wreck
Because trademark life is all about learning, to live with the fact that it's just gonna have to be good enough
And your deal may not be pasta linguini your
Deal may be brushing teeth it may be getting
Your kid to eat something more than just chicken nuggets or putting up the tablet at 9 o'clock at night
That might be your struggle
So i'll see you in my
Video it's like
Said it's absolutely free it doesn't cost anything to click on it and check it all out
It's just going to cost you your sanity, and pride i'm excited to share this with you
because i really
Want to be your real in life mentor for what it means to be a train wreck mom and
If you're, wanting even more about
This, aside from the videos you can go ahead and check out my
book
Platitudes of gratitude which is on self right now on amazon in ebook and paperback
For even more detail on what it, means to be a train wreck mom
-------------------------------------------
ADD A DAD: SCREAM - Duration: 2:35.
(ominous music)
(beep)
(phone rings)
- Shit.
Yes?
- Hello, sweetheart.
(coughs, clears throat)
Sorry, it's Dad.
I was gonna come downstairs, but I thought,
it's easier to call from the cell.
- What do you want?
- I got a good one.
A ham sandwich walks into a bar, orders a beer.
The bartender says, sorry, we don't serve food, huh?
(laughs)
- Is this some kind of joke?
- All right, all right.
Hey, I'm trying to remember the name of that actor,
you know he had that catch phrase:
party time, excellent, party time, excellent.
- Don't do this, I can't.
- Sure you can, we just rented the tape, you know,
the guy from "So I Married an Axe Murderer."
- Michael, Michael Myers.
- Yes, you are so good!
Funny stuff, huh?
Oh, also, do you know the actor who played George,
on Seinfeld, yeah, something...Alexander?
- Jason, Jason, Jason!
Jason, Jason!
- Are you sure it wasn't Justin?
- No, it's not, it was Jason.
- All right, keep your voice down, don't yell at me.
I have a serious question now.
Why do chicken coops have two doors?
Because if they had four, they'd been chicken sedans.
(laughs)
I love that one.
- Look, you've had your fun now, so I think
you better just leave, or else.
- Leave my own house?
Or else what?
- Or else my boyfriend will be here
- Whoa, whoa, whoa, whoa.
You told me, you didn't have a boyfriend.
- I lied, I do have a boyfriend, and he'll be here
any second, so you have...
- Wait, do you mean scrawny Steve?
(menacing music)
- How do you know his name?
- Turn on the patio lights.
(laughs)
- Chicken sedans!
(laughs)
- (screams) Oh, God!
-------------------------------------------
Chrissy Teigen's Lips Are Sealed When It Comes To Who Bit Beyonce | TODAY - Duration: 3:53.
For more infomation >> Chrissy Teigen's Lips Are Sealed When It Comes To Who Bit Beyonce | TODAY - Duration: 3:53. -------------------------------------------
How to make him think of you and miss you - Duration: 4:24.
For more infomation >> How to make him think of you and miss you - Duration: 4:24. -------------------------------------------
Scientifically Proven Best Ways to Study - Duration: 5:39.
For those of us in school who are trying to figure out the most effective way to study,
science is here on hand to help.
While it has been traditionally thought by many of us over the years that long hours
in front of the computer or in the library, before an important exam, are required to
maximize study time, this is actually not the case.
So forget about long nights, with eyelids drooping over pages and pages of text, scientific
research has expressed quite clearly that that isn't the way to study smart.
And it turns out smart studying is a lot more fun than we might have thought.
So just what cool techniques work best to maximize those precious days before the big
exam?
That's what we'll find out, in this episode of The Infographics Show, Scientifically Proven
Best Ways to Study.
First of all, an unlikely helper is exercise.
Blood chemistry has been proven to change the way the brain works, as the brain, the
happy recipient of vital nutrients through exercise, repays the favor by increasing brain
performance in the shape of a better and longer attention span, smoother information processing,
and more fluid problem solving skills.
How does this work?
Well, exercise releases an important blend of mood altering hormones including dopamine,
serotonin and norepinephrine.
This neural cocktail greatly enhances brain performance required for study and information
retention, so in between study sessions, we should seriously consider hitting the gym,
swimming some laps, kicking a ball around, or even dancing a few steps because any kind
of exercise greatly improves brain power.
These exercise sessions also help to break up the study sessions, which is crucial to
avoiding cramming, a scientifically disproven method.
The problem with cramming is that overloaded information does not have a chance to enter
the long term memory.
Short-term memory is the free crazy space within your brain – information rattles
around inside there but what we need to do is turn that information into knowledge.
And that doesn't happen by cramming.
The transformation from short term information into long term knowledge occurs through repeated
exposure to that information, retelling of that information, and reflection of that information.
So if you learn about a topic, put down the book, and then hit the gym and reflect up
on it, or talk to somebody else who has knowledge on the subject, and then you are far more
likely to retain that short term information and turn it into long term knowledge.
You must also vary your study program.
Smart study isn't about just reading the material over and over and over again, ad
nauseam.
Although this may seem like the easiest way, it is totally counterproductive.
A 2010 study from Washington University compared the effectiveness of repeated testing over
repeated studying and found that testing is far more effective than simply rereading.
So in between short exercise and study sessions, why not test yourself now and again?
Or better still find a study partner who is tackling the same subject and test one another,
compare your results, talk about them, and continue your study program, in between exercising.
There is no reason you should study completely alone, and without adequate testing, you will
fail to see where the real information gaps are.
Finally, get as much sleep as you can, because sleep is crucial to brain development.
When awake for the first few hours in the day, our alpha brain waves are most active,
which is the brain state most suited to the acquisition of information and knowledge.
A good study program should not only include exercise, short intense study sessions, and
social learning, it should also include a good night's sleep and perhaps, if your
day allows it, a cheeky power nap in the afternoon.
A nap in the day time will give you two bursts of alpha brain waves for one day's study.
And the benefit of sleep doesn't end there.
When you acquire information, brain cells grow new connections that reach out and connect
with one another.
Sleep helps these cells grow and connect, so if we think of our brain as a tree, sleep
is like the miracle grow, and while we sleep, all the tiny branches will grow and flourish.
Conversely, all night study sessions do not work, as our ability to process information
is hindered by our restlessness, and the information overload is simply overbearing.
Scientific research has shown that it can take up to 4 days for our brains to return
back to normal after we've been awake for an entire night.
We should take breaks every hour and not work straight through.
Study for an hour, do some exercise, speak to a study friend, and return to the source
material.
While some experts might argue, researchers at Stanford School of Medicine agree that
playing certain types of music such as classical may help students engage in the source material.
While some of us prefer complete silence, an uplifting piece of non-distracting music
(without lyrics) may improve mood and increase the chances of information retention.
In active learning studies, some scholars have suggested that dopamine is the brain's
save button, so some light, uplifting music, a favorite warm drink, and a box of cookies
could also help us retain knowledge, as the brain, while in its reward mode, is more receptive
to whatever stimuli is present, including that study material.
Also science has shown us that, as ridiculous as it may seem, striking a power pose before
entering the exam room may be to our benefit.
So think Superman or Wonder Woman – put your hands on your hips, move your legs apart,
chest expanded, deep breath, and say something awe-inspiring.
You may want to do this in private, like in the bathroom before a test, but this is completely
your own choice.
Although you may feel stupid, and will probably look a bit odd, this posturing will reduce
the stress hormone cortisol and increase testosterone, making you scientifically stronger and better
prepared for that test.
So remember take breaks, sleep, exercise, talk about your material with study pals,
strike a pose, and you'll be as good as ready for that test.
Are there other tried and true methods that we failed to mention?
Let us know in the comments!
Also, be sure to check out our other video called Private Schools vs Public Schools.
Thanks for watching, and, as always, don't forget to like, share, and subscribe.
See you next time!
-------------------------------------------
Honest Car Wash Review - Xtreme Xperience - Duration: 5:10.
hey guys I'm rich from Xtreme Xperience, I'm one Juan's our expert
detailer we're gonna put honest wash to the test so we're gonna give you a quick
reviewed and see how it does on this GTR that's been on the racetrack all weekend
stay tuned
so we just mixed up a nice healthy dosage of our hyper mint wash and first
impressions or it's really minty tingling it's got a nice tingling
sensation typically something I go for in my you know toothpaste but maybe
maybe the GTR when we start brushing it will appreciate it as well I can also
now feel the tingling this is interesting
it smells mighty mighty Car Wash-ie
we're gonna test this out see if it can clear brake dust from heavy usage on a
track day this GTR takes a beating probably turned about I don't know
500 laps or so over the past weekend and this will be a really good opportunity
to see whether or not it can handle all the built-up brake dust from performance
brake pads on a high-performance supercar like the GTR see how it stacks up
Juan just hit both the passenger side wheels with the Brake Dust Pro and what
we found out so far is whether or not you're scrubbing it or just letting it
sit for a while it was powerful enough to lift a bunch of that brake dust right
off of the wheels nice to know that we could have something handy at the track
maybe spray it down really quick and just go ahead and spray it off it'll
look pristine for a customer getting ready to jump in for the next few laps
so all's we did is spray and leave it and it came out looking pretty good
already something that we would probably say hey this is good to go if we were at
the track and the car just needed a quick wash so after looking at a little
bit further it got most of the dust and debris but to make sure that this stuff
is show quality which we like to maintain it as such we went ahead and
hit it with a brush but virtually it looks like all the dirt has pretty much
been taken off pretty good rating for something that you just spray on and
leave for a few minutes and wash off so not a bad job by the great dust bro so
far
Juan just hit the entire front of the car with the bug remover
we're gonna see how this does will pick up a lot of like rubber tar different
things from the track sometimes paint sometimes other things obviously a lot
of bugs so as it settles on the car it should start releasing some of
those materials that are a little bit harder to get or something that you
would miss with an actual brush or anything that you would use to clean the
front of your car all right so the bug remover has been applied to the front of
the car we went ahead and brushed that down and at the same time while the car
was still wet Juan is now using the honest wash the hyper mint wash to be exact
with a microfiber wash mitt. Microfiber only for any car if you don't want scratches
so anyways Juan's gonna go ahead and use to wash to go ahead and clear
anything else that hasn't been blown off by any water obviously then you need to
scrub the car down so he used a combination of two different things he
used a wash mint microfiber wash mitt then you also used a brush that had like
really soft material on it kind of like a wash mitt with an actual post to go
ahead and get some leverage onto the car to go ahead and wash it down what we're
noticing about this hyper mint wash is it's it's a pretty soft mix it's not
that ultra foamy soap that you might be used to seeing from other people we'll
see how that plays out on the actual car hopefully the finish looks really nice
and yeah we'll see how it does once everything gets cleared off
we've tested out the bug delete so far looks pretty good as I said before we'll pick
up a ton of debris from the track this could be rubber from tires ahead of us
or it could just simply be bugs typically products like this it'll
remove both they kind of explain how to use it here we applied it the exact way
and looks like the results are pretty good so little to no bugs at all
sometimes yeah sometimes stuff gets stuck we do have a clear bra on here so
that will retain some sediment sometimes but with a wipe over with a microfiber
towel it's all gone so pretty good job two thumbs up
Juan approved.
Do you have Juan-thumb or two thumbs? Juan-thu...
Dos!
thanks for watching guys make sure you like comment and subscribe below we'll
see you on the next lap
-------------------------------------------
Spill BAKING SODA IN YOUR BED and AFTER 30 MINUTES, you will Be SURPRISED OF RESULTS!! - Duration: 2:55.
For more infomation >> Spill BAKING SODA IN YOUR BED and AFTER 30 MINUTES, you will Be SURPRISED OF RESULTS!! - Duration: 2:55. -------------------------------------------
How to Make Your Own Ice Packs - Duration: 7:03.
How to Make Your Own Ice Packs
Compresses, ice packs and gel pouches that you can keep in the freezer are a necessary item around the house.
When you have children, or even as an adult, you've got to have ice packs in your freezer.
They're comfortable, practical, and ideal for any bumps, bruises, therapy for any injuries, and even when you have a fever.
These gel packs can be obtained at any drug store.
Sometimes, however, they can wind up costing you a lot of money.
At Step to Health, we want to help you save the most money possible.
To do that, today we want to share two excellent ideas for making your own flexible ice packs.
How to make flexible ice packs.
There are plenty of ways to make these handy items, but the "flexible" part is the real challenge.
You can achieve this using rubbing alcohol, which prevents the water inside the plastic from freezing solid.
The combination of water and alcohol reaches temperatures that are as cold as ice but without crystallizing.
This will provide you with an ice pack you can reuse as much as you want, unlike ice cubes – which simply melt.
If the bag "melts" or warms up, all you have to do is put it back in the freezer to restore it.
We'll show you two different ways to make your own ice packs.
1. Using rubbing alcohol
What do you need?.
1 cup of rubbing alcohol (250 ml) – remember that the higher the alcohol percent, the softer the bag will be, 2 cups of water (500 ml), 2 ziplock bags, Coloring (optional).
What should you do?.
Pour the water and rubbing alcohol into one of the bags and mix well.
If you want to add a little coloring, now is the time.
You can make it any color you like, but if you want it to look like the commercial products, you'll only need two drops of blue food coloring.
Close the bag while removing as much air as possible and insert it into the second bag.
Freeze for at least 12 hours before the first use.
As you can see, this is very easy and affordable.
If you don't have rubbing alcohol at home, however, there's another easy option for you.
2. Using dishwashing detergent
What do you need?.
Dishwashing detergent, 2 ziplock bags.
What should you do?.
Pour a healthy amount of detergent (equivalent to one small bottle) into one of the bags.
Close it tightly, removing as much air as possible.
Place this bag inside the other to avoid any leaks.
Store it in the freezer for six hours before using it.
Why is a cold gel compress even necessary?.
Cold compresses are used to treat a wide variety of injuries because they reduce pain from cuts and bruises.
These types of compresses can be very helpful when you have muscle spasms or injuries that have involved bleeding, because they can speed up the recovery process from any injury.
They prevent the formation of bruises in the area by relaxing the blood vessels and keeping blood from collecting under the surface.
The cold from ice can burn the skin, and its also sometimes annoying thanks to the water that forms when it melts.
You solve these problems when you use cold gel compresses.
Theyre reusable, so you can freeze and thaw them whenever you want.
They're always ready, since theyre stored in the freezer.
They're very comfortable, as they can fit any part of the body.
If you have an injury to your knee, neck, or a wrist, they will mold to it.
We recommend that you use these compresses with care.
While it may sound strange, you should use a light cloth to protect your skin from direct contact to avoid burns from the cold.
-------------------------------------------
MeRIT Webinar: Digital Self Defense - Tips, Tools, and Best Practices to Stay Safe Online - Duration: 53:03.
>> CINDY SOBIERAJ: Today's webinar is titled: Digital Self Defense: Tips, Tools, and Best
Practices to Stay Safe Online. Our presenter is Ben Woelk, president and manager of the
security management at RIT, where he developed a leading security awareness program.
Ben is a member and former co-chair of the EDUCAUSE security awareness and training working
group of the higher education information security council. He's also former director
and community affairs I'm sorry. Former director and community affairs committee chair for
the society for technical communication and a current scholarship committee chair.
Ben is a certified information systems security professional. A certified professional technical
communicator accredited trainer and an iTIL, Version 3 certified.
He holds degrees from the University of Florida, Trinity International University and the University
of Rochester and an enhanced certificate in technical information design from RIT.
Ben is also adjunct faculty at RIT, teaching classroom and online courses computing security
fundamentals and technical communication. Prior to joining RIT, Ben provided technical
communication and change management consulting to number of area Fortune 500 companies. His
current interests include working with other security awareness practitioners to develop
effective security awareness programs and providing mentoring and coaching to new and
aspiring introverted leaders and speaking of presenting workshops on introverted leadership
creating security awareness programs and technical communication.
Thank you for joining us today, Ben. This is your second time back with us, and we're
thrilled to have. Let's get going. >> BEN: Okay, thanks, Cindy, and thanks everybody
for joining us today. It's a rather daunting introduction but we'll move past that.
Today we're going to talk about digital self defense and digital self defense is what we
branded our security awareness program here at RIT, and this is a slight variation to
in person class we provide to staff five or 6 times a year. We'll save the questions at
this time end but we'll have a couple of times of interactivity through the presentation.
So we're going to start with a cartoon, I'll read it for you but it has data security as
the announcement of what the event is. And in this corner, we have firewalls encryption,
antivirus software, et cetera, and in the corner, we have Dave.
I apologize to the Daves that may be on the call.
In general, what this cartoon is telling us that it doesn't really seem to what technical
concerns we have in PlayStation or what we do to protect other people or even ourselves
'cause we always manage to make a mistake at some point or another, and we're also faced
typical human adversaries and they are very creative and they will find new ways to attack
us as well. So I'm going to postulate that you are all
are targets, every single one of us. When you take a minute to enter your ideas into
the chat about why you think you personally might be a target and we'll share some of
those ideas. >> BEN: So we're getting a good variety of
responses. A lot of it, honestly, just comes down to the fact that we're online and we're
vulnerable and that we do a lot of shopping and other types of things where we where it
may put our identity on the risk. This is a word cloud. It's not one I put together.
So when people ask me about specific things in there, like "bogies," I don't really
have what they meant by that but the idea here is to give you an idea of all the possibilities
why you might be attacked and why, again again, why you're a target again.
So basically it doesn't matter if you have a million dollars in your bank account it
doesn't if you have $1,000 or less in your bank account you're still going to be targeted
by online scams of some kind or other because they have good return on their investment.
So another thing to enter in the chat here this is prefacing a little bit of research
I'll have that going to share in one slide and it's not a bunch of research but Google
did some research a couple of years ago they published, I think, in the summer of 2015
they interviewed security experts who had ideas of what people should do to stay on
safe online, but they also interviewed normal people and for the we'll is normal and the
question I have for you all, what would you tell someone to do to Stay Safe Online? What
are the biggest things they need to do. And, again, you can enter your recommendations
into the chat on that as well. >> BEN: And there are really no wrong answers
with this but again I haven't seen what y'all have been putting in the chat yet.
>> BEN: So it looks like most of what we've got up here so far has to do with passwords
and what they call authentication. However, the lasting one keeping your operating system
and B I/OS up to date and this is the second time I've presented in the last 3 years since
that research essence come out where anybody has actually come up with that answer so congratulations
on that from the security expert's view that's the thing you need to do. To install your
software updates. My computer security says never give that
as one of the things you should Stay Safe Online so given the if you plan to be experts
on this and normal people don't normally answer this question this way tells us there's a
real gap in communicating what people really need to do to Stay Safe Online.
Now, the reason that it's so important to install software updates is because what will
typically happen is that someone will discover a vulnerability or a way to exploit or break
into a program I mean, they're all building millions of lines of code and all it takes
is a little error or something that when the excuse me, when the program was developed
wasn't a problem that could be now. So what happens with the software updates is the vendors,
whether it's Adobe or Microsoft or something else, they release these patches or software
updates and this addresses those holes or vulnerabilities or weaknesses, and they said
that's really the most important thing to do.
Now, looking at the rest of the list you can see on the nonexperts top online safety practices
which we're assuming here. You think intestine software virus is on the list and other things
primarily about a couple of them are about passwords. There's about one only visiting
websites they know that makes for a very small internet and maybe safe but I think it kind
of ruins the experience, and to not share personal information which makes perfect sense.
(Coughing.) >> BEN: On the right side, the security experts
top online security practices most of those are around passwords or around passwords of
some type and we'll talk about these things and the other is install software updates
but what's interesting is that the using antivirus software is not on that list of the top 5
things that the experts think you should do, and we still have a requirement for doing
that at RIT and you should still have it, but I think part of the issue here is that
people may assume that having antivirus software protects them completely, while on a typical
day it might recognize maybe 65% or 85% of the different threats out there so it doesn't
really provide the level of protection that we might expect.
There was a really interesting survey and the results came in kind of surprisingly.
So in terms of protecting your computer and information the links on this slide are are
two resources here at RIT and what the information security office has provided. And we're going
to cover a couple of these things during this presentation today but a good part we're not
going to do but this is more information about things that you need to think about. Policy
and standards are things that you will probably run into in your workplace where you have
requirements about what you need to do in terms of using whatever the computing structure
that you have there. I have another cartoon, and some of you have
probably seen this but we're going to take a minute on this one and give you all time
to read through it. It's pretty dense. I think you can probably read it unless you're viewing
off a mobile device. But let's take a minute and then we're going to talk about what this
cartoon means. >> BEN: Like I said, a very long cartoon.
It gets a little confusing because they talk of bits of entropy, and that gets into complexity
and I'll talk about that in a minute but it's not something that you really need to be aware
of that part of that. What they're showing it here is the way security
experts have told people they need to construct passwords in the last 15 or 20 years is wrong.
They told us they need to be very complex now, troubadour and 3 is not completely because
the idea is they made us put together passwords so they're hard for humans to remember. And
because of that, we end up using the same password over and over again and make a slight
variation maybe it would be Troub4dor & 3 & 4, and people will save it on their desktops
and an Excel file and what happens you got a very limited amount of the passwords our
using something to remember those passwords by which isn't secure.
What's interesting correct horse battery staple which are four common English words -- if
you make it together, it makes a really strong password. I wouldn't use correct horse battery
staple because it's been out for a while and I'll tell you why it's really good news that
this cartoon is talking about. There's a password staple but what this kind
of does kind of measure how strong is to break based on its complexity. Now, it's a little
confusing because you could put in the word password and it would say it would take how
many things to break it something very simple so it's really only looking at things in terms
of complex not use of common passwords so if you look at the screen you can see it's
got this brute force search space analysis and you'll see that change as we go through
the example, but down at the bottom you're going to see time required to exhaustively
search this password space and that means how long to break the password and they've
got a couple of scenarios whether it's one computer online attacking you or it's somebody
has actually gotten access to your computer directly and then they've got this massive
crack erase and massive computers and they have a botnet all trying to break that password.
So let's see this haSAK.com shows us here. So 6 letter passwords, very basic password.
It's all lower case. Now, if you look at it, you'll see in that search space analysis it
says it has 6 characters and the search space is 26 because there's 26 different characters
in our alphabet. But the more important thing is when you go and look how long it takes
to break the thing if you look especially at the second tubing I think they're probably
more relevant your offline fast attacks scenario is.00321 seconds. So much faster than I was
even able to talk about it. So that's with 6 letters. So what we're going to do now we're
going to increase the complexity a little bit. And we're going to do that by adding
a number on substituting a number for the 0 because I want to keep it the same lengths
right now. So what you see the search space depth you've got 26 letters and 10 different
numerical characters to be removed and there's a lot of things for cracking tool to search
through and we've updated it to .0224 seconds so we're like 7 times more secure than we
were the first one but, obviously, not very helpful. At all. So what else could we do
to make this password stronger? You can see that we've got the lower case is checked,
the digit is checked and we'll add a symbol and make one of the letters upper case and
let's see what it does. Changing one letter to upper case all of a sudden, we're at .577
seconds. Still not good but much, much stronger than we were before. And if I make one of
these letters a symbol, all of a sudden, we're at 7.43 seconds. So it's far more far stronger
than the password was that we talked about initially. It's still not going to do it.
Obviously, you know, a 6 character password if they've got access to your computer it's
going to take 7 seconds, roughly, to break it. And hardly any time at all they've got
multiple computers that are trying to break into it.
So we're going to talk about what we can do to make it stronger. I've done all the complexity
things. We've got the upper case and the lower case and the digits and the symbols but what
I want to start doing now I want to make it a little bit longer. So right now it's at
6 so we're going to go to 8. And let's move that to 18.62 hours for the offline fast attack
or 1 minute with a massive cracking erase scenario which sounds really exciting in theory.
We're going to go to 10 characters. Now, it's gone to 19.24 years for the offline fast attack
and a week on the massive crack erase scenario. Let's go to 12 characters and see what has?
So by the time you get to 12 characters even in this massive cracking erase scenario they're
at 1.74 centuries to break that password so not something we have to worry about and 1.74,000
centuries in terms of the offline fast attack scenario where somebody has got access to
your computer. So what this really tells us in I'll talk about it in a little bit more
is that complexity was really important but where we saw the biggest games and a strong
password was by making it longer. Now, if I tell people oh, you're going to be perfectly
safe which I'll never say but if you'll be safer using a 201character password you got
to be out of your mind I'm not doing every 20 character password I know I'm supposed
to have a different one for each one but that's just way too much trouble so let's talk about
some of the options here. Let's talk about something called a pass phrase. Now, the text
I have it was a dark and stormy night which should be familiar to many of. That comes
from a couple of places. One if you're a peanuts fan there's a cartoon Snoopy's on top of the
dog house, typing out: It was a dark and stormy night. It's actually Bluwer Lytton fiction.
It's by a late Eighteenth Century Englishman named Bluwer Lytton, and he put together a
one sentence introduction to a novel, which I'm not reproducing here but it went on and
on and on, and it's really regarded as the worse introduction to a novel in British history.
So, of course, what they did they made a contest and every year they have a contest where someone
submits the worse possible opening to a novel and they kind of rate it and score it and
whoever wins the trophy has got the worse introduction fun fact but, obviously, not
critical to what we're doing. So I'm going to use it with a dark and stormy
night for my pass phrase and I'm going to turn it into something that's actually useable
and would work for us in the computer age here. I need to increase the complexity. We've
got one upper case and all lower case letters so I'm going to change it to it was a dark215&StormyNight
and it gives us special characters and it gives us all of those different elements that
we need. Now, what's interesting is that as you've
seen looking at the previous example with the haystack thing that length is really far
more important than complexity when you're constructing passwords.
So looking at this pass phrase in that calculator, even with a magnification cracking scenario
it's at 89.14 trillion, trillion centuries to break that password. So I think we aren't
going to worry about that one too much. So that's great. Now all you have to do is have
a 25-character pass phrase for every account how hard is that going to be. That's not going
to a very good thing. So we're going to talk about something called
a password manager, and I'm going to jump because I've got a poll question here basically
ask do you use a password manager? And I would like you to complete the poll while I'm talking
about it here, but what a password manager does it manages your passwords so the examples
we have up there KeePass, Password Gorilla, LastPass are all examples of different password
management tools, and the way they work and I used LastPass about 10 years now. The way
they work is you construct this really good pass phrase kind of as your key to your Vault
where you're saving all these other passwords and it will save all the passwords for you
for all the websites that you go to. It will create complex passwords which are going to
be long passwords which have all the complexity that we know that we're supposed to have and
we'll basically provide a way for you to have a password manager on your desktop or with
your browser and be able to have a different password for pretty much every single account
you have online which is the ideal thing because you don't want to use your banking password
for your social media account because if somebody breaks it or tricks you into giving it up,
they're going to have access to your bank account.
So how did we do on the poll here? Do we have any responses yet?
>> CINDY: I'm opening it now. >> BEN: It looks like we've got a very small
percentage of users that are currently using the password managers and nobody said not
sure which is probably a good answer. (Laugh.)
>> BEN: But it's something that I haven't seen a lot of people do somebody told me about
it. They said it's really going to revolutionize the way you use the internet because now you
can have all of these different passwords. And, of course, the big question that comes
up how do I know my passwords are safe doing something like this? Because, obviously, if
you use something like LastPass -- it's a vault that's online and
it's storing millions and millions of different passwords so it's going to be a big target
so what happens with this is that the passwords are stored in an encrypted format. It's a
strong encryption and, yes, there's always a risk with information security. I will never
tell somebody you're going to be 100% secure. We just can't ever say that, but what the
tradeoff has been that I've seen is this helps you use more passwords, which we know is strong
which we know is a good practice. It's stronger to do and you've got some risk in terms of
passwords being exposed but it hasn't happened so far. I mean, lots of people are trying
to get into it and it's the kind of thing if it does happen, you're going to get a notification
and you'll have to change some passwords but again in terms of your working life it's a
lot easier to do this. So I have no stake in these password manager companies but I
do recommend one that you take one of them at least.
And the next thing I want to talk about is something called Multi Factor Authentication.
Now, I think the Google search might have called this two factor authentication. I don't
know, but Multi Factor Authentication. And some of you may recognize some of the pictures
on the slide. But Multi Factor Authentication is normally when you go online you have to
indicate who you are and something that indicates your secret passwords so that you can get
in. So that's they only call it one factor and only using one thing to prove who you
are. With Multi Factor you have something else so you have this password you know and
you have something else which is used to log in.
Now, with things like the Google Authenticator, which is the G in Duo, these are online these
are actually apps for your smart phone and mobile device and they work in conjunction
with the site that you're trying to log into so make sure when you log in to a specific
website and for RIT we've protected our Oracle information or my info site for those of you
who have been at RIT and to log into that now you have to have your user name and your
password and you have to interact with Duo and it's very simple because you basically
on the screen you're logging in and it says Duo, send me a push or Duo call my L.A.N.
line and you've got a smart phone and it buzzes and you say, yes, and you get to log right
in. Some of the other examples in here there's a YubiKey, which is a way of storing passwords
credentials that you use to log into a cower there's an RSASecurID and I had one 20 years
ago when I was doing consulting and that number would change every minute and you would have
to enter that number every time you logged in.
The other thing on the slide, Turn It On, that gives instructions for about 100 different
websites in terms of turning on two factor authentication, and it's probably the best
way to protect yourself. Again, security usually makes things a little
harder to do but it's always that tradeoff between your protection and things being a
bit harder. So my next question take a minute here into
the chat, what do you think the most common way is of getting a password. What are your
ideas on that? I'm going to answer Christina's question right now because we're in the space
right now. In terms of passwords, personally I use last
price and that has troubled in price over the last year. It's $24 a year for using it
on your computer and unlimited mobile devices so you're talking $2 a month for the protection.
There's an open source one called KeePass, which I know people who have used it for years.
I'm not really fond of it because it's open source and open source to me means that the
documentation is terrible because it's put together by a group of programmers and they
understand it. But KeePass LastPass, Password Gorilla. There's another one out there that
I'm not remembering right now, but I typically, what I would do I would search Ghoul for password
recommendations and get past the paid ads and look for the ones that may actually do
some review on it, but the important thing is you use one.
So what did we have in terms of common ways of getting passwords? What did people enter
in the chat? You're just asking for it, spoofing spoofing in the sense of pretending that you're
somebody else. Asking for it, address, pet's name or kids' name. Absolutely, people love
to use your pet's name as passwords and they also you have to post pictures of their pet
so it's not real hard to figure out but in general the and the other question that came
up here and I'm trying to read the chat one and talking which is a mistake but the dash
link the one I can't remember the name of it was, and I personally have not looked into
that very much, but the key things you're talking that I'm seeing in here so far they're
trying to fool people into giving up their passwords and that's the far most effective
way to do it there's very little risk to the attacker they want have to be clever or buy
tools to figure it out or break a password like we showed earlier. The easiest thing
is just asking for that password. Now, the nice thing about the Multi Factor
Authentication is that even if you give up that password, because it's requiring that
other piece of information, they don't have actions to it. So your account is still protected.
So that's the really that's why we think it's such an important thing in terms of protecting
account credentials. And the other trick, of course, is people
said spoofing and I'm going to use phisching in terms of people fooling you into giving
up your password. The tricky part is finding out if it's a issue if fishing account, and
if you don't have a PayPal account and you get an email from PayPal, it's obvious it's
not yours. For years it was easy to tell because the grammar would absolutely be terrible and
as long as you're not in too much of a hurry you could tell something was wrong with the
request that had come in. But essentially those kind of problems have been taken care
of because attackers can now buy kits online to do phisching attacks and it takes care
of these nice templates making it easier for you to fool with. So the rule of thumb we
have and I've got the slide out of order. Don't give up your password. No one legitimate
is going to ask you a password send you an email to ask for it. They don't need it to
reset it so just don't do it, so that he gets this slide I have up here the one on fraud
scams and malware gets into the other types of social engineering types of attacks where
they try to trick you into doing things there's been a lot of talk, you know we've all seen
lots of things about the elections lately about Russia attempting to do social engineering
and that has been their practice for many, many years. It's like we've finally woken
up this time. But the big deal is to trick people into doing things or get people to
do things they wouldn't normally do. So the kind of things we see in fraud, scams
and malware malware is malicious software which usually would be an attachment or something.
But we see requests like they came from the president's office asking for a copy of everybody's
W2 Forms. Or can you transfer the $500,000 amount and do a wire transfer quickly. We're
behind we need to get this thing paid and it looks like it's come from the chief financial
officer requesting somebody do that, and it's all where they try to trick people and it's
all different types of attacks. Say I'm a small nonprofit locally we've seen a steady
stream of fake invoices trying to trick our treasurer looking like it comes from the president
and tricking the treasurer into paying something. This is not just directed against long groups,
it's pretty much directed at all of us. The rule of thumb you don't want to take the bait
and don't give up your password and this section we're going to talk now of protecting your
identity and your online safety when you're doing social media and things like that.
So the newer threat we've seen that started probably about 2 years ago and we're seeing
more and more of is something called Ransomware and you can see this is a screen shot and
I think it says you have to pay $300 or 250 or something like that to get your files back.
But the way Ransomware works is that they trick you into installing a piece of software,
malicious software and that software goes and encrypts all the data on your computer,
and the better ones, air quotes around that, if you're connected to a network share or
a portable hard drive, it will also go in and encrypt that information as well. So the
problem is that once it's done it's too late to do anything about it and if you're lucky
maybe you're antivirus detected it before it started maybe you've unplugged your computer
really quickly and it didn't get very far into it. And you still have to figure out
what happened after you plug it back in but the key once you've been attacked it's too
late and you want to see things about the last year or two about the police departments
had their data encrypted and having to pay a large amount of the money. A large health
care system was attacked in the United Kingdom years and I believe to pay a lot of pounds
to get their data unlocked again. So the real issue is how do you protect against something
like this? You have to protect against it ahead of time. You have to back up your data
and we're all Leah about this sort of thing and it's like oh, we know we'll be okay and
we know our hardware might crash sometime but, of course, we're going to get some kind
of warning that it's going to happen which, of course, doesn't happen, and even online
accounts like Dropbox and things like that some of this Ransomware is sophisticated to
reach up into those accounts and encrypt it also. Best rule of thumb with protecting yourself
against Ransomware making sure you have a copy of your data and that means regular backups
and it means not just having a portable hard drive connected to your computer where you
copy files over. You actually need use some kind of a program for it. But so Ransomware
is probably or one of the scariest things come down the line last year.
Now, this point in time I usually pop up this slide and some of my audience I'm sure is
old enough to remember this, but these are the old duck and cover drills where everybody
hid under our seats to protect themselves from atomic bombs which, obviously, wasn't
going to do any good but it made us feel like we were doing something and I got a lot of
people in the audience who look like deer in the headlights and I want to talk about
some of the things you can protect yourself rather than telling you all the bad things
that can happen. Again, the Number 1 thing don't get hooked.
Never respond to email requests or phone calls or text messages or anything health that are
asking for your password. That's an easy one. If we just did that we'd be in great shape.
The other question I've got as we launch into this is I'm assuming most of you have mobile
devices, smart phones or tablets of some kind or other. The question I have for you we have
a question, yes. Is do you have a mobile security app on your phone? If you do, please it's
a poll so please answer the poll. I'm interested to see what the responses are here. 'Cause
I know how it goes when I'm doing this as a live in person.
>> BEN: It's not looking too good for the yes but someone it has. 2 people. So here's
part of the issue we have and all of you know this. Especially if you're an iPhone users
and I don't want to bash Apple on this but Apple has never made but they made things
easier for users and they've given a nice interface. They don't talk about security
very much and iPhones can be attacked and androids can be attacked and pretty much any
of the operating systems that are out there on smart phones and tablets and the things
like that. The list here is kind of a short list like the things like find my iPhone but
some things are actually apps that you can add from your marketplace or your Google Play
Store depending what you're using and they provide additional security. They'll scam
the applications that you're trying to install. They'll make sure they're okay and they'll
tell you if you've got weird permissions you're asking for if they're able to do things more
often than not. Again, I encourage you to research various, you know just do your Google
search of mobile security apps for whatever kind of device you have and see what the recommendations
are. You'll find that will secure things and the reason why this is so important I think
most of us are aware that over the last several years there have been far more smart phones
and iPad things and tablets stolen than regular computers and what it means for the cybercriminal
who's out there trying to trick us and get our money they're going to go after those
mobile devices. That's where people are and that's where they're going to invest their
money. And they're not as easy to protect. One of the questions I typically ask in the
class is how do you tell where a link goes to on a mobile device? And we're not going
to ask it as a question now but what happens is you can't hover your cursor over it like
you would over a computer. You can't really hover your finger over it either, and if you
just touch the link it takes you there. If you find out where it goes you actually have
to push down on the link with your finger and hold it down until it shows you where
it goes. And that is not a good design. Obviously, if you let up on your finger too soon it's
taking you to that link. So this is one of the reasons, I think, that mobile devices
are attacked so much 'cause they're just harder for us to think about defending.
Now, what's interesting is that Google question that came up really easy where the most important
thing to do was to install software updates we do that on our phones. We know we need
to do that on our phones. We get them daily for all these different apps so it's the same
thing with your computers you want to make sure things are kept up to date.
So I'm going to talk about a few other things here about protecting your information. Great
drawing created by a student who worked in our office at one point in time and it's very
it's a good illustration what's out there because something may appear to be a sheep
but it's really a wolf in the background and you cannot tell by what you see online. You
cannot tell. Friend requests hey, great. But who knows what they're really like. It's not
saying criminals can't look great either for that matter.
So my Number 1 rule of thumb we can never assume on privacy whatever we share online
we have to assume at some point it's got to be revealed. We had no control over what happened
with Equifax with them revealing all of those passwords or Yahoo! I think they revealed
2 billion passwords. They had 2 billion passwords. They revealed every account password they've
had and we have very little control but we do have control over the types of information
we share and that really comes into social media. A lot of times you'll sign up for Facebook
or some other social media account and it may ask for your birthday or hometown or ask
you where you went to school. You can provide that information but you need to think about
the types of information it's asking for and makes sure you're comfortable with providing.
But again, even if it says it's secure and private you've got to assume at some point
it will be revealed. The next screen which is probably not readable
is privacy settings that's actually from my Facebook account and what was interesting
about this is when I went down and I looked at who can look me up and the second thing
on there said who can look you up using the phone number you provided and it said everyone.
I never remembered giving Facebook permission to do that. So that must have been a default
setting, and what I recommend is that every few months go into your privacy settings in
these different social media accounts, make sure that nothing has changed and make sure
that they're all settings that you're comfortable with and change them now if they're if you're
not comfortable with them. Do what you can to protect your information.
Now, something they also provide that are good are log in alerts which you can sign
up on the various social media accounts. I was speaking in a conference in New England
in the fall and while I was there I got 6 or 7 messages from Facebook that somebody
was trying to log into my account. And they knew actually, I think they were coming from
Australia of all places, but it alerted me that was happening which was a little discomforting
but also told me I didn't need to change the password but the good news is when you log
into Facebook and let's say you log from out of town you'll get these alerts because you're
not the internet the IP address that you are connecting from and it will let you know.
A couple other tips here use something called Google alert that you can set up. You can
monitor used of your name and put in your email address and anytime that appears online
in this place Google indexes it will give you a report on that. And you can aggregate
it so you can get it maybe once a day and you can use this alert to follow various subjects,
sports teams, all sorts of things like that as well. So it's got some things it's got
some play value also. Google also has my account dashboard -- if
you're a Gmail user, which is probably 90% of the world, at least at this point, one
thing you can do is go to is go to my account dashboard and it will allow you to do a security
checkup and privacy checkup and I encourage you to do that again just so you know what
you're sharing. You can see below privacy checkpoint it will show you the activity which
has been associated with your account and if there's things on there that you haven't
done then that account has been hacked at some point.
Another nice trick which somebody told me about is doing something a Google reverse
search. I don't know how many of you have used LinkedIn and I will connect with anybody
and it looks pretty bizarre. There's fake accounts on LinkedIn and like fake accounts
on Facebook and others, and it will allow you to select the imagine depends on if you've
got Chrome and it will show you all the places that image is used. I've got a connection
request from probably one of these people right here on the right here but that same
picture was used with at least 4 different LinkedIn accounts so it's so it's a generic
picture so maybe it's one of those people but it's a good way to check to see it's the
image that's commonly used on the internet and they're using it for a fake account and
they want you a fake account because they want to get you over to your connections.
So another issue and again, it's not typically an issue with faulty or staff or audience.
You want to protect your your only image is what they see about you online. This example
here is from a poster from the University of Wisconsin and would you hire this guy and
somebody's told me at one point they think it would be milk. I'm not buying it. But the
idea again is that understanding whatever you do online people are going to make decisions
about you and make judgments about. So that is the presentation and I'm going
to pop up my next which is my website, while we're talking here, but what questions do
you all have? And thank you for the opportunity. >> CINDY: Thanks, Ben.
There are a couple coming in. So if you have additional questions, folks, please send them
in through the chat box. A couple of things that have come up what if you do not put your
portable hardware drive online. Will the Ransomware still attack it?
>> BEN: As long as the portable hardware drive is connected to your computer, yes. Depending
on the strain of Ransomware, it will go into everything you're connected to. So the idea
if I was using a portable drive for backups, I would back up and then I would unplug it
and I would plug it back in when I'm going to use it, you know, back up to it again.
Typically, my experience we use those as additional space and not backup space. We really need
to think of it as an opportunity to back it up and again, back it up and just disconnect
it and it's not going to jump into it if it's not connected.
>> CINDY: Okay, a question from Pete. What's an example of a mobile security app?
>> BEN: Well, depending on your phone and depending on how old it is, you will kind
of dictate what you really need. So one example of a mobile security app is something called
LastPass and not LastPass I've got that wrong. Lookout. It's called Lookout. Lookout what
it does you stall it from your app store and it scans all the applications that you install
to make sure there's nothing malicious in them or whether they're asking for weird permissions
like why do they need access to your computer and that sort of thing. Lookout also has the
built in thing that iPhone users have enjoyed where you can find your phone through Lookout
and what you can do is you can bring up a map and it will show you where your phone
is within 75 feet, I think, it is. And you can also get it have your phone emit a high
pitch squeal noise, and that will help in terms of trying to find it.
The main thing it does is it looks at your applications and make sure none of those are
malicious and they do sneak out occasionally where they are bad. I used a program by Sophos
for my smart phone, and it was very aggressive in terms of what it would warn me about and
it would start talking about low reputation application and it told me Google Play was
a low reputation application and a bunch of other things and it was probably a little
bit too hypersensitive so I had to kind of turn those notifications down some. But the
idea it's a third party application that you would add to your smart phone or other mobile
device. A very long answer to a short question. >> CINDY: That's okay. Thank you.
Adam has a question. What is the best way to implement a safe home network where my
spouse and I can count on safe robust backups that can be automated by software and then
what software might that be? >> BEN: Yeah, I think this is probably a question
is a little bit beyond the scope of what I was prepared to talk about. But in general
you want to use a router and some of the I'm trying to remember whether our router does
this or not I've got what they call a Cloud drive which essentially allows me to back
up to it in the house. I've got the system set up to back up to it and then it will back
up that data to the Cloud and I don't do not remember what the cost is per gigabyte or
whatever or storage but storage prices are going down and down. But ideally what you
do to protect your data is you make you get a copy of it and you have that copy somewhere
besides where the computer is located because there should be a break in or fire or anything
else, you don't want to have lost every bit of digital information you have. We've become
too dependent on it. >> CINDY: All right, um, question on that
came in from I don't know who did that come from? Jim? Is there value to use the traditional
antivirus software that works on a mobile device?
>> BEN: Yeah, so when I'm talking about a mobile security app, they will have antivirus
built in. Cybercriminals are still crafting malicious software to attack phones. A banking
Trojan a couple of years ago, which was still out there and I'm drawing a blank on the name
of it, but what the Trojan means it's like the Trojan house it looked like something
else and there was a banking Trojan and what it did it captured all your banking activity
online. It didn't worry about anything else you were doing but anytime you went to a bank
it would capture that information and send it out to somebody. The antivirus I think
what you'll find I'm not sure you can get strictly an antivirus for your phone at this
point. They'll all be more robust security suites of software.
And the good news is most of them are free. Or at least have free versions, and the reason
for that is it is it helps all of us to get this security software out in the marketplace
because it reduces the amount of the attacks that go on.
>> CINDY: Thank you. Another question came in from Adam. Do you
know if Mint.com is a good third party app for a bank security?
>> BEN: It's not anything I have used but my rule of them point of view I want to get
a good idea how many people are using it. I'm not aware of any breaches which is what
they would call the releases with Mint.com, but they be associated with Intuit which has
Turbo Tax and there have been occasional problems, but I'm a Turbo Tax user myself and I haven't
worried about that. The biggest issue is people asking for passwords and people giving them
up. In terms of Verizon security and privacy app,
I'm not familiar with it. I tend not to use I have Verizon but I tend not to use their
built in stuff. I don't like it. It takes up room that I would rather use for something
else. But in general I'm going to give you the same response. Do a Google search and
look for reviews and see what they have to say about it, and, unfortunately, it's going
to be pretty much my responses to any specific security app or software questions today because
it changes. It changes monthly depending on which one is more effective.
>> CINDY: So if I've got malware on my device, what do I do?
>> BEN: Take it to somebody to look at. If you're associated and I can't tell you exactly
who to take it to look at. If you're around here around RIT in the community I think you'd
probably go to the digital den and ask them for their recommendations on it. Worse case
you just reset the device and wipe and return it to factory specs and that should take care
of any malware that's on the device. >> CINDY: Okay. Here's a question that came
in about looking for advice for parents to communicate to young adults and students about
not sharing their personal online ID, if they're uncomfortable doing it. Any thoughts for frustrated
parents out there? >> BEN: Yeah, a couple of things. Parents
don't tend to use the same applications they're kids do and I think that's deliberate on the
part of the kids. But they'll use things like Snapchat which is supposed to be this very
brief period of time a picture is available or something like that. But people can take
a screen shot of it. They can take a picture of the device that the picture came in on.
There's also been cases where it's like oops, somebody broke into the Snapchat servers and
they found all this information that was really supposed to be ephemeral.
The best place I would tell you to look is go to a website called Stay Safe Online, and
it's a Government website that's set up and it has a whole section on parents and teens
and preteens and what kind of information to share with them. I think that will be your
best option to Stay Safe Online. >> CINDY: Okay, thank you.
Are there any additional questions? If not, we're putting that website for Stay Safe Online
into the chat box. So I guess if there are no additional questions
we will wrap up. So thanks to Ben for coming back and being
a presenter for this second time. If you do have a digital question, you can email at
to lumbar RIT.EDU_alumni with the hash tag meRIT with the webinars, and we'll try to
get you some information for the panelists today.
As a reminder all of you will receive an email from us in the next few days with a link to
today's webinar recording. Ben I can't think you enough for being our
presenter today and thanks to all of you out there for participating in today's webinar.
Our next webinar is Thursday, March 8th, called Build a Better Brand from the Office of Career
Services with Kris Stehler. Look for your special invitation and your email coming shortly.
Again, thanks to everyone for joining. You can exit this webinar by simply closing the
WebEx window and has do let us know what you thought of the webinar with by taking the
brief survey which pops up when you exit the webinar. Thanks. And have a great day.
-------------------------------------------
Lane LifeTRANS Headquarters Tour (Mineral Ridge, Ohio) - Duration: 6:36.
- Well hello everyone,
I'm standing here in Mineral Ridge, Ohio.
At the Lane LifeTrans Headquarters building.
And what's really neat about this building,
is this was my grandmother's house.
This is where my father was born.
And it's where I spent an awful lot of time growing up
because it was about 30 feet
from the side of the funeral home.
The old funeral home was actually out on 46,
just about, oh maybe a hundred yards from here,
and this building was, if we're looking
towards the red truck there, if you can see that.
It was to the left of that about 30 feet.
That's where this house was located.
And what my dad decided to do around 1983, 84
was to move his childhood home, my grandmother's house
back here so we would have you know, some use of it
and not just tear it down when
we rebuilt the funeral home here.
So, it has been a rental,
it has been a couple of different things,
but for quite a while now
it's been the headquarters for Lane LifeTrans.
What I wanted to was just, again,
share a little bit more of our world and what goes on
behind the scenes with the Lane company.
We're gonna go inside
and we'll give you a little bit of a tour.
Alright, we're here in, I guess,
what this used to be the main living room
of my grandmother's house, this is where we had Christmas.
But now, you know, now, it's where we have Holly Lyons.
- Hello.
- And she is Chief Randall Pugh's assistant.
And she basically helps keep this building coordinated.
Can I say that Randy? Is that fair?
- Yes she does, she absolutely does.
- So, she catches everything that comes in the door,
and tries to send everybody to the right place,
or back out the front door, whichever it takes right?
- Which ever it takes, that's right.
- But, yeah, it's just, every time I come in here,
it's really cool, again, because I remember being here
with family at the holidays and it was really,
it was special, so every time I come here it just gives me
a little bit of something to smile about.
Well we're gonna go take a peak in the back a little bit,
and then we're gonna go upstairs,
and it's really more of Randy's world,
and he'll tell ya a little bit about what happens upstairs.
This was the dining room in the old house,
boy when I was four this seemed a lot bigger than it is now.
But, this was the dining room and of course
a little kitchen in the back.
And my grandmother, who lived to be a little over 90,
she got to the point when she was cooking back here,
I was a young guy, I had to set her stove
with little red x's for bake and broil.
That's the only she could cook.
And she would make all her meals based on
whether she was in, you know, one color or the other.
And yeah, like I said, every time I come here,
fond memories for sure.
But we're gonna go upstairs now,
we're gonna go upward to the chief's office.
(flute music)
Was this my dad's bedroom, no, this was my aunt.
This was my two aunts, Charlotte and Marguerite.
This was their bedroom, yeah.
Dad's was over in the corner. Mama Hallie's was over there.
I can remember, I can remember, I was this big.
Like I said downstairs, it was just a lot bigger back then.
But we've been here how long Randy? Do you have any idea?
- We've been in this building probably twelve years.
- Okay, we've moved around a little bit,
this was a nice use of this building,
and again, it's the family, sort of the family home.
So it's just nice to have it being used.
You know, that's better than just having it as a rental,
So, we sorta like having it, you know.
We may need more room someday but for now,
we can make it work, right Randy?
- [Randy] We can make anything work, yeah.
- And this is where Randall does all his interviews
on TV that a lot of people get to see.
They do, not chase him down but,
it's nice to know that Randy's the guy they go to,
I mean, seems to be that when
the media is looking for an answer
that has anything to do with EMS in the valley,
they tend to go to Chief Randall Pugh for comments.
Right Randy?
- Well, I, like the last one,
nobody else wanted to comment on it.
I believe it was a situation that need addressed
by somebody who could give some light to the situation,
and really answer the questions that were posed.
- And, you know, they know they're gonna get
a straight forward answer from the Chief.
You know, again, there's a lot of experience.
I mean, Randy's been here, how long now Randy?
- I'm in my 38th year, yeah.
- So, 38 years with the green and white.
Just a little bit of experience there, huh Randall?
So, again it makes sense that when they're looking
for answers they go to to Randy.
And I'm glad that they don't necessarily ask me,
because all I would do would be
get on the phone and call Randy.
You know, say, "what's going on?"
So, yeah, he stays on top of things,
and I don't worry about things here,
this world runs quite well and you know, it's just,
I just stop and visit most of the time,
because things I don't have to worry about you know.
Gets taken care of here.
Now one thing I will say that, if any of you saw the video
where the tables upstairs in my office in Canfield,
and we had to take it through a window.
We didn't have to do that with this one, so.
We were able to get this one upstairs and put the,
put the table in here.
And see I thought it was in over here.
See that just shows,
that shows when the last time I was up here.
- That's correct. Yeah, yeah.
So, our strategically mapping of our personnel.
Those are all our full-time people.
- That's a lot of people, a lot of lives,
a lot of personalities and we have a lot of seats to fill
on those green and white trucks so,
it is a, it is a constant challenge.
And I'm glad he's doing it and I don't have to.
- Specially known as the War Room.
- The War Room, I like that, yeah, here we go.
(jazz music)
Everybody tells us that this may be haunted,
so it's probably just my grandmother.
She's probably checking on us.
'Cuz every once in a while people say they feel somebody
push on their back when their on the steps or something so,
it may be my grandmother just checking on things
and making sure we're making good use of the house.
(jazz music)
-------------------------------------------
How a Whole Home Chlorine Filter can benefit your water - Duration: 1:07.
Does your water have the unpleasant taste and smell of bleach? It could be
caused by high levels of chlorine in your water. These issues may mean it's
time to consider a Whole Home Chlorine filter to purify and reduce the chlorine
in the water throughout your entire house. By reducing the chlorine, the
filter could improve the taste and smell of your drinking and cooking water as
well as help to increase the longevity of your plumbing fixtures, potentially
saving you money on repair and replacement costs. The filter is
installed at your main water line providing you and your family with
reduced levels of chlorine from every water source in your home. The Reliance
chlorine filter meets NSF standards, is performance tested and
professionally installed by our licensed plumbers. To learn more about Whole Home
Chlorine Filters and other water purification solutions, book an in-home
consultation with one of our trusted water purification advisors. The advisor
will test your water and discuss your needs to determine the best solution for
you and your home. For all your water purification needs call on Reliance.
-------------------------------------------
10 Things You Should Never Say To Your Wife - Duration: 3:58.
-------------------------------------------
KADAR ||COVER BY VICKY SINGH || MANKRIT AULAKH || SPEED RECORDS - Duration: 3:29.
For more infomation >> KADAR ||COVER BY VICKY SINGH || MANKRIT AULAKH || SPEED RECORDS - Duration: 3:29. -------------------------------------------
Why playing outside in the rain just might be good for you - Duration: 2:21.
Hey what's up guys Dustin Williams here with Dustin Williams Performance and
Precision Fitness and today's topic why playing in the rain might be good for
you and for your workouts. So, I don't know if it is raining where you're at
right now but I can tell you that here it's coming down pretty good. We
got a pretty decent amount of rain coming in expected to continue to keep
raining for a few days. Now here's the thing I want to talk just for a minute
about your brain. I'm gonna tell you that I am NOT the world's best
person at drawing things, but I'm gonna draw a little brain here for you
so that you can kind of understand what's going on. So, it's
beautiful I know, that's your brain and your brain has what's called a
feeding pattern which essentially means the way the energy and the nutrients
is getting to your brain and it goes from bottom to top and from back to
front. So, what that means is that your energy
levels and your nutrients start here and then work their way to the front side of
the brain last. The part of movement lives closer to the front of
the brain all right that's where the movement part of your brain is right
before that part right in here is our sensory part of the brain. Sensory being
like the ability to tell the difference between hot and cold the ability to be
able to like feel when people touch you, to be able to feel when something pricks
you. That's the sensory part of the brain now,
if that part of your brain isn't working as well as it should be that means when
this energy is coming through, when this energy is coming through to
this area, this area is requiring more energy than it should. Leaving less
energy for the movement part. When you go outside and you play in the rain you're
getting a lot of sensory feedback it's a way to be able to train the sensory part
of your brain without really even realizing you're doing it. The rain is
typically cold so you get sensory from that. The rain touches all over your body
and you feel the pressure and the touch everywhere you're getting sensory
from that. So, literally just by getting out and playing in the rain you can
potentially make this sensory part of your brain work better requiring less
energy & potentially making the movement part of your brain work even better than
that. So, go outside play in the rain, enjoy it. If you're in this
area its gonna be here for a few days so get outside play in the rain that's your
job for today guys. Take care!
-------------------------------------------
let's walk around London + chat about university ⭐️ - Duration: 8:37.
For more infomation >> let's walk around London + chat about university ⭐️ - Duration: 8:37. -------------------------------------------
You cannot be Disturbed by any Thought - Mooji - Duration: 17:42.
I don't I don't feel I'm a body I can see beyond that and this presence but
still there is some feeling that it needs to be protected and in order of
okay stop respect myself in order if you are not the body what needs protecting
I know no no don't say you know we're not gonna sweep over anything today I
want you to look clearly so that we stop speaking things that we are not clear
about you see if you are not the body and are you clear some of you that you
are not merely the body that's not cursing the body not telling you to harm
the body I'm telling it's not important I'm saying that it is not fundamentally
what you are is not the body saying I am George what is saying I am George what
is saying it
you say that there's a feeling inside you know like you know you know you do
you know who you're talking to do you know who you're talking to you're
speaking with someone do you know who you're talking to huh how dare you talk
to be me like this so who are you exactly
who is speaking this is just some identification that is still there and I
try to identify what is identified with but what if I go through that it's too
much understanding yeah I'm not gonna really grasp what what is and ultimately
I go to this one which yeah you can still using the word I do you have a
license to use this I you're using it very freely I but you know I I try to
look at who is the one who's doing that but what I find is too difficult I I
again I have to try to catch every one of this i that you're speaking I try to
see who is actually doing these things but I just find it is too complicated
for me you being one who is speaking
listen first of all I'm not leading you towards any state of confusion
I am only showing you how confused you are anyway and then to bring you back to
a place of real sanity the only reason why you are not aware that you're mad is
because everybody else is mad because we don't know who we are but it's just like
it's just like a whole village that's bad he lacks a mayor and a nasai a
psychoanalysis out of one of the bad people I'm just saying like this I'm
making little bit of joke about it because we're getting too serious maybe
I don't know but a little bit we don't question this because it might feel I'm
getting more confused the fact is that we are confused but it's just that we
are happily confused for a long time because when everybody is confused we
can decide we can just keep making out that we are together you know we're
really together you know hmm so at least sometimes coming into a state of
confusion is part of growing out of confusion just to show that the ground
that we have been standing on is not quite a ground um we're gonna pass this
to show you your true ground and no one can make you uncounted when you see if
the true ground this ground seems appears as it's falling away one when
after a while I'm being out of the this context and this environment that is
constantly pointing to what am I really
because there is still something not grounded or is still interested even
though I cannot exactly identify with what's there but okay just before we go
too far because if you go too far you going far further into confusion here
now yeah but you are aware that something when you are not here
sufficiently in a physical way that there's something that comes back that
she's a bit ungrounded and a kind of fun grounded nice and so on and then that is
believed you see now this ungrounded Ness that you may feel there's an
awareness of this ungrounded Ness what happens that you are too much believing
in what you see wait you are believing too much in what
you see and you are interpreting with the whole mind with the old regime of
thinking so a feeling is there like oh I don't feel grounded and it's believed
but I don't feel grounded is only a thought being perceived that which is
perceiving the ungrounded Ness thought is that ungrounded does it need to be
grounded you must experience your your discovery and affirm it I'm going to
show you no thought can destabilize you no thought no concept can destabilize
you except if you believe in it because you are there before any concept came
concepts came subsequent to you you are not a concept you are the witness of
them so if you feel that this thought or distort just confuse me that is also a
thought believed in it is the believing in and the identifying with it that
gives it that potency now I want to know if we can finish this part of the lesson
or not otherwise I don't proceed yeah yeah come
hello yeah it it seems that the the sense of I am either in feeling or in
any other way seems very weak so there is still a sense to it but it seems a
weak sense Who I am or what weakness is the weakness of I am yes who or what is
witnessing the weakness or the strength of the sense I am that seems also weak
who whatever this is that that is also weak who is a witness what is witnessing
that even that is weak is it after the I am or before the I am
is it looking back at the I am to say you're me we kill them or is I am in
front of it and send the I am itself is weak this has to be clarified you see we
are not going to leave any blind spot because we do this is how the mind works
it just brushes over something and it's okay but I want you to stop because
these are fundamental paintings it's not many but they are crucial that you
understand them you say something that the I am itself feel weak what is what
do you mean by the I am and who are you who is looking at it
are you strung and the I am itself does it have any quality to be seen to be
weak or strong in order for something to be weak or strong you know it must be
measure against something else what will say though in what in what way
can the sense I am be weak you mean it is it is weak by the sense of perception
that you're not perceiving it clearly enough so it seems weak or that within
itself it has no muscle it's as a kind of I am or what but it means it is weak
the perception of it seems weak perception Israel seems weak and the
perceiver is what strength the perceiver of the perception that which is aware
that even the perceiving is weak come you have to do this or I close up the
evening and we go i watch some TV I want to know from you who who is what is
there to say that it is weak then what way is it weak what is I am you make
sure that the I am is the I am itself not something maybe being created or
imagined
so there's an idea that the IM should be strong okay there's an idea that the IM
should be strong whose idea is it for me it's more like the presence of IM should
be a strong strong presence okay okay this i understand what you mean the
sense I am should feel more strong in the body at present what fear is more
strong than I am in the body
hmm person a person yeah thank you the person feels stronger only because the
person is more loud the person feels more stronger because the press is more
loud the person actually is is the sense of attachment first of all to the body
and to the identity and the importance the identity has become to the
consciousness that perceives the identity the person for the person also
is consciousness but is a very contracted very conditioned very limited
expression of consciousness it's a field of self belief and desire and attachment
I want this this is important to me why did I why did I lose my house I why did
this thing happen to me I don't trust God anymore I don't
believe in any God anymore because I just very has a lot to say and it seems
and somehow to be stronger and then the i am-ness does the i am-ness need of an
effect the only thing that can happen is he either something feels strong because
it's full of history it's full of adventure it's full of intention full of
desire full of attachment so therefore it's loud okay that's one form of
strength or something is so totally empty of any intention in the identity
you see so that it is not a flavor that keeps changing flavours can change in
front of it but it is unchanging and it is strong because it is unchanging how
does something is strong because it keeps changing and keeps going there and
keep going oh whoa whoa like this or it's strong because it never changes it
is it is steady any witnesses the movement but itself is unmoving so who
is to determine what strength is you must define what you mean by strength is
transload ness or is not the loudness of the mind
creates a sense of confusion dissatisfaction pain also hmm rather
than credibility not because a thing is loud means it is more real you see then
the thing which cannot be which doesn't fluctuate it's always steady what is the
criteria for saying something is real or not real its unchanging this it's
unchanging this or very good is the person unchanging oh the person is
always changing if the person is always changing can it be said to be a thing
what is the shape of an amoeba it's more like a verb than a noun and it is being
witnessed by something it is witnessed by the unchanging because if everything
is changing who gauges what is changing most only the thing which is unchanging
perceives correctly the the amount of change that is being perceived so it is
from the state of the unchanging which is the I am sense which is not combined
with any thing that you can percieve the changefulness of the person and then
something says the person seems more real why is it more real because it's
more active it seems to catch all the attention ah because it catches more the
attention
yeah hold on hold on I'm hot at the moment please stay with me
look because of the amount of the attention that goes to it okay because
attention is one of your pal your great powers your that you your great powers
where attention goes it feels like that's my experience okay attention is
very powerful okay but something is able to observe
attention easy so attention goes to the person so the person is said to be more
real meaning it's more loud the attention going to the person is that
not also seen this is what I want you to do you are still in the process of your
inquiry the party attention is going to now even attention goes and so something
is not gone it observes attention going sometimes people say you know I could
not keep my attention fixed on this thing it kept going off somewhere else
so something witnesses the attention going off is this thing going off this
is all I want you to keep staying here keep staying in the place that's not
going somewhere you see and you see that everything else is going somewhere
including the attention attention is one of your secret great powers the next
great power is the is the power to believe and another power is the power
to identify with something you are you are that which is aware of this I can
see that something is believing in all of this you are still unmoved
you
Không có nhận xét nào:
Đăng nhận xét