Thứ Ba, 27 tháng 3, 2018

Waching daily Mar 27 2018

自戀 literally means self loving

MengLin 你居然會!How can you!

For more infomation >> [Eng Sub]【HIStory2 越界 Crossing the Line】 How well do you know me? 柏宇篇 (BoYu version) - Duration: 3:04.

-------------------------------------------

Here is How You Are Ruining Your Relationships - Duration: 4:17.

If there is one skill that everyone would want to master, I guess it would be maintaining

good relationships with the people around us.

Because most of the times when we find ourselves in a conflict with others, we simply use our

favourite strategy, which is - blaming the other person!

Unfortunately, that doesn't helps at all and even makes the situation even worst!

But what if there is an alternative way to deal with this problem, what if you could

simply avoid all of these conflicts in the first place!

And thats exactly what you will learn in this video!

There are three ways that you are constantly using to destroy your relationships, all what

you need to do is to stop using them!

Its as easy as that, so lets start with the first one!

1. you are criticising when you should not!

Usually when we criticise, we don't realise how our criticism effects the other persons

emotions, because from our point of view, we are just trying to be honest, in fact we

think that we are actually helping them.

But the problem is that they don't necessarily consider it like that.

If a friend of yours criticise the way you are dressed, you probably will defend yourself

even if he might be right!

And thats nature of any human being!

When people criticise us, our ego forces us to believe that the are simply trying to show

off, to look better than us or appear more knowledgeable.

Especially when its done in public, since that drives negative attention to us, which

is something nobody would want! it's much better to keep your opinion within

yourself You don't have to always express your opinion

and say what ever comes into your mind.

Trust that will save you from a lot of arguments and you will maintain a better relationship

with others.

I am not trying to say that you should never ever criticise anyone again, but rather learn

first how to do that properly, because most of the times, we usually do it in the wrong

time and place!

2.

Secondly, You are ignoring their emotions

When People run into problems, they start worrying and panicking.

From a side that looks pointless for you because you can clearly see the problem and you can

clearly see that worrying or panicking isn't going to help at all.

But the people who are in that situation don't view it in that way because their emotions

are in charge and they are not thinking rationally at that moment, just remember the times when

you were worrying about something, I am sure that you found it really difficult to control

your emotions at that time.

And the last thing you would want at that moment is someone telling - just stop worrying

and calm down!

That never helps, thats why, you should not do it as well.

Your job is very simple in such situations, don't criticise, don't blame them for being

stupid even if it was their fault.

Don't try to explain to them logically.

You just have to provide them with the emotional support so that they calm down.

First if all, thats the only thing that will help them at that moment and secondly, that

will have a significant positive impact on your relationship!

3.

And lastly, You aren't taking them seriously

What we don't usually realise is that, what is important to others, might not necessarily

be important to us, but that doesn't mean we have to act like we don't care at all.

When someone is asking for your opinion, that means, they really care about what you think,

they really value your advice, and its really important to take that seriously even if you

are not interested at all in what they are saying.

It even might be something you don't understand at all.

Like, When you spouse asks wether to wear the blue or the red dress, to you it doesn't

matter at all, but to her its an important decision, so instead of usually replying that

you don't know and it doest matter, take a moment and choose one, because that means

a lot to her!

In short,

Try to criticise as less as possible Never ignore their emotions

and make sure you always take them seriously with these 3 things in mind, you relationship

with your family and friends will certainly get much better!

and now its your turn, what do you think?

what would you add to this list?

Lets me know in the comments below!

And as always, hit that like button if you have enjoyed this

video and if you don't want to miss the next video, then hit that subscribe button

and the bell besides it.

Thanks for watching and I will see you in the next one

For more infomation >> Here is How You Are Ruining Your Relationships - Duration: 4:17.

-------------------------------------------

Kayvahn - Without You (ft. Billie-Rae) - Duration: 2:48.

Kayvahn - Without You (ft. Billie-Rae)

For more infomation >> Kayvahn - Without You (ft. Billie-Rae) - Duration: 2:48.

-------------------------------------------

Here in my Kitchen (Tai Lopez Parody) - Duration: 6:46.

Here in my kitchen cooking, my pasta linguini

It's a whole lot of fun hearing, my children, say that they're, not going to eat it

Really, brings joy to my heart you know

but the one thing that i love more than the disappointed tears of my children is

picture books i

Read five picture books every night putting, my son to sleep

This is an old bookshelf that, we deconstructed from an old desk?

Thinking it would make it easier for my four-year-old to consistently hand me a book

One after the other after the other after the other

Until it's midnight and your bleary-eyed and you can barely focus on what word is what and?

then the words come to my mind

It's a benadryl and duct tape kind of day

Now, you may have seen, my other videos where i talk about being a trainer at mom and i'm not just a train wreck

Chef you know, brag that i'm a train, wreck i'm a train wreck because i have kids

And my kids are a perfect. Showcase

as

to

Why i'll never be perfect, and?

That's why i'm a train wreck

They're, the perfect reminder for all the dreams i had before i had children

Like a clean house

and

Perfectly, well behaved children, who never speak back to me and always eat all the food i always cook, for them

Back before i had kids i thought it was possible to get a full night's of sleep

instead i

Have him handing me book after book to read

that one

that one

before i had kids i had never

stepped on an ankylosaur toy i

Never had gummy snacks stuck in my hair and i never scoured the inside of a three-week-old. Chocolate, milk sippy cup

Do you know, what happened something miraculous happened in my life

What happened i had my first kid

And that first kid is a wide open shocker to a lot of people about

what kind of parent they're, gonna wind up being i

Wanted to be the perfect parent i wanted to be the perfect, mom i wanted to be the pinterest perfect mom

out of this room i

wanted to be that mom who brought handmade cupcakes and cute little valentine's that were handmade and

That never happened

Because while i was trying to be perfect?

My kid was growing up and?

Then i got a divorce then i got married

Had two bonus daughters?

Then, we had a son and that right there

Starts to really sink in about how. You can't always, worry, about being perfect

And you can't always, worry, about being that mom or that parent

because eventually

You, don't have the chance to be the parent

Eventually they're, gonna leave and all they'll have are the memories of you trying to be perfect

instead of being there for them

This, is the good life

this is

You know, we don't always have health wealth fame and fortune but, we have each other, we have love?

And that's typically all you need?

Wise wise people said that once all you need is love you might, want to look into that

did a little video

About the secrets of being a train wreck mom i'll put a card up here somewhere it's usually over here i think and

So that you can go ahead and check that out it's free. You know i'm not gonna charge you to go

Check, this video out but definitely go check that out and learn, my secrets at being a train wreck mom now

This, isn't the pinterest perfect, scene i'm not promising

You once you see this video that you're going to sit there and automatically, wake up tomorrow. Morning with

Your kids listening to you, and you're in the middle of a 1950s sitcom wearing your pearls and you dress in the heels

While you're, baking a turkey, okay it's not that scene i know

Some people are gonna watch that video and they're, gonna go

Oh, this trainwreck thing that that's not for me and that's

Okay, it's not for everyone you know the trainwreck lifestyle is not for everyone, we didn't choose the trainwreck, life the trainwreck life

Chose us you know, we do what we can, and try to get by

But there are going to be people that are going to sit there and go, oh my god

i'm a trainwreck, and there's others out, there like, me

Yes, we are out there like, you doing, what we can, to, make life a little less chaotic

So if you're. A tiger mom or pinterest mom or a helicopter mom you, don't have to click the link

Okay, i'm not gonna be offended i understand

But you might be sitting there and wondering what the trainwreck life is all about and if you are interested go ahead

click that link and

Find out are you a train wreck and there's no shame in that okay there's no shame being a train wreck

Because trademark life is all about learning, to live with the fact that it's just gonna have to be good enough

And your deal may not be pasta linguini your

Deal may be brushing teeth it may be getting

Your kid to eat something more than just chicken nuggets or putting up the tablet at 9 o'clock at night

That might be your struggle

So i'll see you in my

Video it's like

Said it's absolutely free it doesn't cost anything to click on it and check it all out

It's just going to cost you your sanity, and pride i'm excited to share this with you

because i really

Want to be your real in life mentor for what it means to be a train wreck mom and

If you're, wanting even more about

This, aside from the videos you can go ahead and check out my

book

Platitudes of gratitude which is on self right now on amazon in ebook and paperback

For even more detail on what it, means to be a train wreck mom

For more infomation >> Here in my Kitchen (Tai Lopez Parody) - Duration: 6:46.

-------------------------------------------

ADD A DAD: SCREAM - Duration: 2:35.

(ominous music)

(beep)

(phone rings)

- Shit.

Yes?

- Hello, sweetheart.

(coughs, clears throat)

Sorry, it's Dad.

I was gonna come downstairs, but I thought,

it's easier to call from the cell.

- What do you want?

- I got a good one.

A ham sandwich walks into a bar, orders a beer.

The bartender says, sorry, we don't serve food, huh?

(laughs)

- Is this some kind of joke?

- All right, all right.

Hey, I'm trying to remember the name of that actor,

you know he had that catch phrase:

party time, excellent, party time, excellent.

- Don't do this, I can't.

- Sure you can, we just rented the tape, you know,

the guy from "So I Married an Axe Murderer."

- Michael, Michael Myers.

- Yes, you are so good!

Funny stuff, huh?

Oh, also, do you know the actor who played George,

on Seinfeld, yeah, something...Alexander?

- Jason, Jason, Jason!

Jason, Jason!

- Are you sure it wasn't Justin?

- No, it's not, it was Jason.

- All right, keep your voice down, don't yell at me.

I have a serious question now.

Why do chicken coops have two doors?

Because if they had four, they'd been chicken sedans.

(laughs)

I love that one.

- Look, you've had your fun now, so I think

you better just leave, or else.

- Leave my own house?

Or else what?

- Or else my boyfriend will be here

- Whoa, whoa, whoa, whoa.

You told me, you didn't have a boyfriend.

- I lied, I do have a boyfriend, and he'll be here

any second, so you have...

- Wait, do you mean scrawny Steve?

(menacing music)

- How do you know his name?

- Turn on the patio lights.

(laughs)

- Chicken sedans!

(laughs)

- (screams) Oh, God!

For more infomation >> ADD A DAD: SCREAM - Duration: 2:35.

-------------------------------------------

Chrissy Teigen's Lips Are Sealed When It Comes To Who Bit Beyonce | TODAY - Duration: 3:53.

For more infomation >> Chrissy Teigen's Lips Are Sealed When It Comes To Who Bit Beyonce | TODAY - Duration: 3:53.

-------------------------------------------

How to make him think of you and miss you - Duration: 4:24.

For more infomation >> How to make him think of you and miss you - Duration: 4:24.

-------------------------------------------

Scientifically Proven Best Ways to Study - Duration: 5:39.

For those of us in school who are trying to figure out the most effective way to study,

science is here on hand to help.

While it has been traditionally thought by many of us over the years that long hours

in front of the computer or in the library, before an important exam, are required to

maximize study time, this is actually not the case.

So forget about long nights, with eyelids drooping over pages and pages of text, scientific

research has expressed quite clearly that that isn't the way to study smart.

And it turns out smart studying is a lot more fun than we might have thought.

So just what cool techniques work best to maximize those precious days before the big

exam?

That's what we'll find out, in this episode of The Infographics Show, Scientifically Proven

Best Ways to Study.

First of all, an unlikely helper is exercise.

Blood chemistry has been proven to change the way the brain works, as the brain, the

happy recipient of vital nutrients through exercise, repays the favor by increasing brain

performance in the shape of a better and longer attention span, smoother information processing,

and more fluid problem solving skills.

How does this work?

Well, exercise releases an important blend of mood altering hormones including dopamine,

serotonin and norepinephrine.

This neural cocktail greatly enhances brain performance required for study and information

retention, so in between study sessions, we should seriously consider hitting the gym,

swimming some laps, kicking a ball around, or even dancing a few steps because any kind

of exercise greatly improves brain power.

These exercise sessions also help to break up the study sessions, which is crucial to

avoiding cramming, a scientifically disproven method.

The problem with cramming is that overloaded information does not have a chance to enter

the long term memory.

Short-term memory is the free crazy space within your brain – information rattles

around inside there but what we need to do is turn that information into knowledge.

And that doesn't happen by cramming.

The transformation from short term information into long term knowledge occurs through repeated

exposure to that information, retelling of that information, and reflection of that information.

So if you learn about a topic, put down the book, and then hit the gym and reflect up

on it, or talk to somebody else who has knowledge on the subject, and then you are far more

likely to retain that short term information and turn it into long term knowledge.

You must also vary your study program.

Smart study isn't about just reading the material over and over and over again, ad

nauseam.

Although this may seem like the easiest way, it is totally counterproductive.

A 2010 study from Washington University compared the effectiveness of repeated testing over

repeated studying and found that testing is far more effective than simply rereading.

So in between short exercise and study sessions, why not test yourself now and again?

Or better still find a study partner who is tackling the same subject and test one another,

compare your results, talk about them, and continue your study program, in between exercising.

There is no reason you should study completely alone, and without adequate testing, you will

fail to see where the real information gaps are.

Finally, get as much sleep as you can, because sleep is crucial to brain development.

When awake for the first few hours in the day, our alpha brain waves are most active,

which is the brain state most suited to the acquisition of information and knowledge.

A good study program should not only include exercise, short intense study sessions, and

social learning, it should also include a good night's sleep and perhaps, if your

day allows it, a cheeky power nap in the afternoon.

A nap in the day time will give you two bursts of alpha brain waves for one day's study.

And the benefit of sleep doesn't end there.

When you acquire information, brain cells grow new connections that reach out and connect

with one another.

Sleep helps these cells grow and connect, so if we think of our brain as a tree, sleep

is like the miracle grow, and while we sleep, all the tiny branches will grow and flourish.

Conversely, all night study sessions do not work, as our ability to process information

is hindered by our restlessness, and the information overload is simply overbearing.

Scientific research has shown that it can take up to 4 days for our brains to return

back to normal after we've been awake for an entire night.

We should take breaks every hour and not work straight through.

Study for an hour, do some exercise, speak to a study friend, and return to the source

material.

While some experts might argue, researchers at Stanford School of Medicine agree that

playing certain types of music such as classical may help students engage in the source material.

While some of us prefer complete silence, an uplifting piece of non-distracting music

(without lyrics) may improve mood and increase the chances of information retention.

In active learning studies, some scholars have suggested that dopamine is the brain's

save button, so some light, uplifting music, a favorite warm drink, and a box of cookies

could also help us retain knowledge, as the brain, while in its reward mode, is more receptive

to whatever stimuli is present, including that study material.

Also science has shown us that, as ridiculous as it may seem, striking a power pose before

entering the exam room may be to our benefit.

So think Superman or Wonder Woman – put your hands on your hips, move your legs apart,

chest expanded, deep breath, and say something awe-inspiring.

You may want to do this in private, like in the bathroom before a test, but this is completely

your own choice.

Although you may feel stupid, and will probably look a bit odd, this posturing will reduce

the stress hormone cortisol and increase testosterone, making you scientifically stronger and better

prepared for that test.

So remember take breaks, sleep, exercise, talk about your material with study pals,

strike a pose, and you'll be as good as ready for that test.

Are there other tried and true methods that we failed to mention?

Let us know in the comments!

Also, be sure to check out our other video called Private Schools vs Public Schools.

Thanks for watching, and, as always, don't forget to like, share, and subscribe.

See you next time!

For more infomation >> Scientifically Proven Best Ways to Study - Duration: 5:39.

-------------------------------------------

Honest Car Wash Review - Xtreme Xperience - Duration: 5:10.

hey guys I'm rich from Xtreme Xperience, I'm one Juan's our expert

detailer we're gonna put honest wash to the test so we're gonna give you a quick

reviewed and see how it does on this GTR that's been on the racetrack all weekend

stay tuned

so we just mixed up a nice healthy dosage of our hyper mint wash and first

impressions or it's really minty tingling it's got a nice tingling

sensation typically something I go for in my you know toothpaste but maybe

maybe the GTR when we start brushing it will appreciate it as well I can also

now feel the tingling this is interesting

it smells mighty mighty Car Wash-ie

we're gonna test this out see if it can clear brake dust from heavy usage on a

track day this GTR takes a beating probably turned about I don't know

500 laps or so over the past weekend and this will be a really good opportunity

to see whether or not it can handle all the built-up brake dust from performance

brake pads on a high-performance supercar like the GTR see how it stacks up

Juan just hit both the passenger side wheels with the Brake Dust Pro and what

we found out so far is whether or not you're scrubbing it or just letting it

sit for a while it was powerful enough to lift a bunch of that brake dust right

off of the wheels nice to know that we could have something handy at the track

maybe spray it down really quick and just go ahead and spray it off it'll

look pristine for a customer getting ready to jump in for the next few laps

so all's we did is spray and leave it and it came out looking pretty good

already something that we would probably say hey this is good to go if we were at

the track and the car just needed a quick wash so after looking at a little

bit further it got most of the dust and debris but to make sure that this stuff

is show quality which we like to maintain it as such we went ahead and

hit it with a brush but virtually it looks like all the dirt has pretty much

been taken off pretty good rating for something that you just spray on and

leave for a few minutes and wash off so not a bad job by the great dust bro so

far

Juan just hit the entire front of the car with the bug remover

we're gonna see how this does will pick up a lot of like rubber tar different

things from the track sometimes paint sometimes other things obviously a lot

of bugs so as it settles on the car it should start releasing some of

those materials that are a little bit harder to get or something that you

would miss with an actual brush or anything that you would use to clean the

front of your car all right so the bug remover has been applied to the front of

the car we went ahead and brushed that down and at the same time while the car

was still wet Juan is now using the honest wash the hyper mint wash to be exact

with a microfiber wash mitt. Microfiber only for any car if you don't want scratches

so anyways Juan's gonna go ahead and use to wash to go ahead and clear

anything else that hasn't been blown off by any water obviously then you need to

scrub the car down so he used a combination of two different things he

used a wash mint microfiber wash mitt then you also used a brush that had like

really soft material on it kind of like a wash mitt with an actual post to go

ahead and get some leverage onto the car to go ahead and wash it down what we're

noticing about this hyper mint wash is it's it's a pretty soft mix it's not

that ultra foamy soap that you might be used to seeing from other people we'll

see how that plays out on the actual car hopefully the finish looks really nice

and yeah we'll see how it does once everything gets cleared off

we've tested out the bug delete so far looks pretty good as I said before we'll pick

up a ton of debris from the track this could be rubber from tires ahead of us

or it could just simply be bugs typically products like this it'll

remove both they kind of explain how to use it here we applied it the exact way

and looks like the results are pretty good so little to no bugs at all

sometimes yeah sometimes stuff gets stuck we do have a clear bra on here so

that will retain some sediment sometimes but with a wipe over with a microfiber

towel it's all gone so pretty good job two thumbs up

Juan approved.

Do you have Juan-thumb or two thumbs? Juan-thu...

Dos!

thanks for watching guys make sure you like comment and subscribe below we'll

see you on the next lap

For more infomation >> Honest Car Wash Review - Xtreme Xperience - Duration: 5:10.

-------------------------------------------

Spill BAKING SODA IN YOUR BED and AFTER 30 MINUTES, you will Be SURPRISED OF RESULTS!! - Duration: 2:55.

For more infomation >> Spill BAKING SODA IN YOUR BED and AFTER 30 MINUTES, you will Be SURPRISED OF RESULTS!! - Duration: 2:55.

-------------------------------------------

How to Make Your Own Ice Packs - Duration: 7:03.

How to Make Your Own Ice Packs

Compresses, ice packs and gel pouches that you can keep in the freezer are a necessary item around the house.

When you have children, or even as an adult, you've got to have ice packs in your freezer.

They're comfortable, practical, and ideal for any bumps, bruises, therapy for any injuries, and even when you have a fever.

These gel packs can be obtained at any drug store.

Sometimes, however, they can wind up costing you a lot of money.

At Step to Health, we want to help you save the most money possible.

To do that, today we want to share two excellent ideas for making your own flexible ice packs.

How to make flexible ice packs.

There are plenty of ways to make these handy items, but the "flexible" part is the real challenge.

You can achieve this using rubbing alcohol, which prevents the water inside the plastic from freezing solid.

The combination of water and alcohol reaches temperatures that are as cold as ice but without crystallizing.

This will provide you with an ice pack you can reuse as much as you want, unlike ice cubes – which simply melt.

If the bag "melts" or warms up, all you have to do is put it back in the freezer to restore it.

We'll show you two different ways to make your own ice packs.

1. Using rubbing alcohol

What do you need?.

1 cup of rubbing alcohol (250 ml) – remember that the higher the alcohol percent, the softer the bag will be, 2 cups of water (500 ml), 2 ziplock bags, Coloring (optional).

What should you do?.

Pour the water and rubbing alcohol into one of the bags and mix well.

If you want to add a little coloring, now is the time.

You can make it any color you like, but if you want it to look like the commercial products, you'll only need two drops of blue food coloring.

Close the bag while removing as much air as possible and insert it into the second bag.

Freeze for at least 12 hours before the first use.

As you can see, this is very easy and affordable.

If you don't have rubbing alcohol at home, however, there's another easy option for you.

2. Using dishwashing detergent

What do you need?.

Dishwashing detergent, 2 ziplock bags.

What should you do?.

Pour a healthy amount of detergent (equivalent to one small bottle) into one of the bags.

Close it tightly, removing as much air as possible.

Place this bag inside the other to avoid any leaks.

Store it in the freezer for six hours before using it.

Why is a cold gel compress even necessary?.

Cold compresses are used to treat a wide variety of injuries because they reduce pain from cuts and bruises.

These types of compresses can be very helpful when you have muscle spasms or injuries that have involved bleeding, because they can speed up the recovery process from any injury.

They prevent the formation of bruises in the area by relaxing the blood vessels and keeping blood from collecting under the surface.

The cold from ice can burn the skin, and its also sometimes annoying thanks to the water that forms when it melts.

You solve these problems when you use cold gel compresses.

Theyre reusable, so you can freeze and thaw them whenever you want.

They're always ready, since theyre stored in the freezer.

They're very comfortable, as they can fit any part of the body.

If you have an injury to your knee, neck, or a wrist, they will mold to it.

We recommend that you use these compresses with care.

While it may sound strange, you should use a light cloth to protect your skin from direct contact to avoid burns from the cold.

For more infomation >> How to Make Your Own Ice Packs - Duration: 7:03.

-------------------------------------------

MeRIT Webinar: Digital Self Defense - Tips, Tools, and Best Practices to Stay Safe Online - Duration: 53:03.

>> CINDY SOBIERAJ: Today's webinar is titled: Digital Self Defense: Tips, Tools, and Best

Practices to Stay Safe Online. Our presenter is Ben Woelk, president and manager of the

security management at RIT, where he developed a leading security awareness program.

Ben is a member and former co-chair of the EDUCAUSE security awareness and training working

group of the higher education information security council. He's also former director

and community affairs I'm sorry. Former director and community affairs committee chair for

the society for technical communication and a current scholarship committee chair.

Ben is a certified information systems security professional. A certified professional technical

communicator accredited trainer and an iTIL, Version 3 certified.

He holds degrees from the University of Florida, Trinity International University and the University

of Rochester and an enhanced certificate in technical information design from RIT.

Ben is also adjunct faculty at RIT, teaching classroom and online courses computing security

fundamentals and technical communication. Prior to joining RIT, Ben provided technical

communication and change management consulting to number of area Fortune 500 companies. His

current interests include working with other security awareness practitioners to develop

effective security awareness programs and providing mentoring and coaching to new and

aspiring introverted leaders and speaking of presenting workshops on introverted leadership

creating security awareness programs and technical communication.

Thank you for joining us today, Ben. This is your second time back with us, and we're

thrilled to have. Let's get going. >> BEN: Okay, thanks, Cindy, and thanks everybody

for joining us today. It's a rather daunting introduction but we'll move past that.

Today we're going to talk about digital self defense and digital self defense is what we

branded our security awareness program here at RIT, and this is a slight variation to

in person class we provide to staff five or 6 times a year. We'll save the questions at

this time end but we'll have a couple of times of interactivity through the presentation.

So we're going to start with a cartoon, I'll read it for you but it has data security as

the announcement of what the event is. And in this corner, we have firewalls encryption,

antivirus software, et cetera, and in the corner, we have Dave.

I apologize to the Daves that may be on the call.

In general, what this cartoon is telling us that it doesn't really seem to what technical

concerns we have in PlayStation or what we do to protect other people or even ourselves

'cause we always manage to make a mistake at some point or another, and we're also faced

typical human adversaries and they are very creative and they will find new ways to attack

us as well. So I'm going to postulate that you are all

are targets, every single one of us. When you take a minute to enter your ideas into

the chat about why you think you personally might be a target and we'll share some of

those ideas. >> BEN: So we're getting a good variety of

responses. A lot of it, honestly, just comes down to the fact that we're online and we're

vulnerable and that we do a lot of shopping and other types of things where we where it

may put our identity on the risk. This is a word cloud. It's not one I put together.

So when people ask me about specific things in there, like "bogies," I don't really

have what they meant by that but the idea here is to give you an idea of all the possibilities

why you might be attacked and why, again again, why you're a target again.

So basically it doesn't matter if you have a million dollars in your bank account it

doesn't if you have $1,000 or less in your bank account you're still going to be targeted

by online scams of some kind or other because they have good return on their investment.

So another thing to enter in the chat here this is prefacing a little bit of research

I'll have that going to share in one slide and it's not a bunch of research but Google

did some research a couple of years ago they published, I think, in the summer of 2015

they interviewed security experts who had ideas of what people should do to stay on

safe online, but they also interviewed normal people and for the we'll is normal and the

question I have for you all, what would you tell someone to do to Stay Safe Online? What

are the biggest things they need to do. And, again, you can enter your recommendations

into the chat on that as well. >> BEN: And there are really no wrong answers

with this but again I haven't seen what y'all have been putting in the chat yet.

>> BEN: So it looks like most of what we've got up here so far has to do with passwords

and what they call authentication. However, the lasting one keeping your operating system

and B I/OS up to date and this is the second time I've presented in the last 3 years since

that research essence come out where anybody has actually come up with that answer so congratulations

on that from the security expert's view that's the thing you need to do. To install your

software updates. My computer security says never give that

as one of the things you should Stay Safe Online so given the if you plan to be experts

on this and normal people don't normally answer this question this way tells us there's a

real gap in communicating what people really need to do to Stay Safe Online.

Now, the reason that it's so important to install software updates is because what will

typically happen is that someone will discover a vulnerability or a way to exploit or break

into a program I mean, they're all building millions of lines of code and all it takes

is a little error or something that when the excuse me, when the program was developed

wasn't a problem that could be now. So what happens with the software updates is the vendors,

whether it's Adobe or Microsoft or something else, they release these patches or software

updates and this addresses those holes or vulnerabilities or weaknesses, and they said

that's really the most important thing to do.

Now, looking at the rest of the list you can see on the nonexperts top online safety practices

which we're assuming here. You think intestine software virus is on the list and other things

primarily about a couple of them are about passwords. There's about one only visiting

websites they know that makes for a very small internet and maybe safe but I think it kind

of ruins the experience, and to not share personal information which makes perfect sense.

(Coughing.) >> BEN: On the right side, the security experts

top online security practices most of those are around passwords or around passwords of

some type and we'll talk about these things and the other is install software updates

but what's interesting is that the using antivirus software is not on that list of the top 5

things that the experts think you should do, and we still have a requirement for doing

that at RIT and you should still have it, but I think part of the issue here is that

people may assume that having antivirus software protects them completely, while on a typical

day it might recognize maybe 65% or 85% of the different threats out there so it doesn't

really provide the level of protection that we might expect.

There was a really interesting survey and the results came in kind of surprisingly.

So in terms of protecting your computer and information the links on this slide are are

two resources here at RIT and what the information security office has provided. And we're going

to cover a couple of these things during this presentation today but a good part we're not

going to do but this is more information about things that you need to think about. Policy

and standards are things that you will probably run into in your workplace where you have

requirements about what you need to do in terms of using whatever the computing structure

that you have there. I have another cartoon, and some of you have

probably seen this but we're going to take a minute on this one and give you all time

to read through it. It's pretty dense. I think you can probably read it unless you're viewing

off a mobile device. But let's take a minute and then we're going to talk about what this

cartoon means. >> BEN: Like I said, a very long cartoon.

It gets a little confusing because they talk of bits of entropy, and that gets into complexity

and I'll talk about that in a minute but it's not something that you really need to be aware

of that part of that. What they're showing it here is the way security

experts have told people they need to construct passwords in the last 15 or 20 years is wrong.

They told us they need to be very complex now, troubadour and 3 is not completely because

the idea is they made us put together passwords so they're hard for humans to remember. And

because of that, we end up using the same password over and over again and make a slight

variation maybe it would be Troub4dor & 3 & 4, and people will save it on their desktops

and an Excel file and what happens you got a very limited amount of the passwords our

using something to remember those passwords by which isn't secure.

What's interesting correct horse battery staple which are four common English words -- if

you make it together, it makes a really strong password. I wouldn't use correct horse battery

staple because it's been out for a while and I'll tell you why it's really good news that

this cartoon is talking about. There's a password staple but what this kind

of does kind of measure how strong is to break based on its complexity. Now, it's a little

confusing because you could put in the word password and it would say it would take how

many things to break it something very simple so it's really only looking at things in terms

of complex not use of common passwords so if you look at the screen you can see it's

got this brute force search space analysis and you'll see that change as we go through

the example, but down at the bottom you're going to see time required to exhaustively

search this password space and that means how long to break the password and they've

got a couple of scenarios whether it's one computer online attacking you or it's somebody

has actually gotten access to your computer directly and then they've got this massive

crack erase and massive computers and they have a botnet all trying to break that password.

So let's see this haSAK.com shows us here. So 6 letter passwords, very basic password.

It's all lower case. Now, if you look at it, you'll see in that search space analysis it

says it has 6 characters and the search space is 26 because there's 26 different characters

in our alphabet. But the more important thing is when you go and look how long it takes

to break the thing if you look especially at the second tubing I think they're probably

more relevant your offline fast attacks scenario is.00321 seconds. So much faster than I was

even able to talk about it. So that's with 6 letters. So what we're going to do now we're

going to increase the complexity a little bit. And we're going to do that by adding

a number on substituting a number for the 0 because I want to keep it the same lengths

right now. So what you see the search space depth you've got 26 letters and 10 different

numerical characters to be removed and there's a lot of things for cracking tool to search

through and we've updated it to .0224 seconds so we're like 7 times more secure than we

were the first one but, obviously, not very helpful. At all. So what else could we do

to make this password stronger? You can see that we've got the lower case is checked,

the digit is checked and we'll add a symbol and make one of the letters upper case and

let's see what it does. Changing one letter to upper case all of a sudden, we're at .577

seconds. Still not good but much, much stronger than we were before. And if I make one of

these letters a symbol, all of a sudden, we're at 7.43 seconds. So it's far more far stronger

than the password was that we talked about initially. It's still not going to do it.

Obviously, you know, a 6 character password if they've got access to your computer it's

going to take 7 seconds, roughly, to break it. And hardly any time at all they've got

multiple computers that are trying to break into it.

So we're going to talk about what we can do to make it stronger. I've done all the complexity

things. We've got the upper case and the lower case and the digits and the symbols but what

I want to start doing now I want to make it a little bit longer. So right now it's at

6 so we're going to go to 8. And let's move that to 18.62 hours for the offline fast attack

or 1 minute with a massive cracking erase scenario which sounds really exciting in theory.

We're going to go to 10 characters. Now, it's gone to 19.24 years for the offline fast attack

and a week on the massive crack erase scenario. Let's go to 12 characters and see what has?

So by the time you get to 12 characters even in this massive cracking erase scenario they're

at 1.74 centuries to break that password so not something we have to worry about and 1.74,000

centuries in terms of the offline fast attack scenario where somebody has got access to

your computer. So what this really tells us in I'll talk about it in a little bit more

is that complexity was really important but where we saw the biggest games and a strong

password was by making it longer. Now, if I tell people oh, you're going to be perfectly

safe which I'll never say but if you'll be safer using a 201character password you got

to be out of your mind I'm not doing every 20 character password I know I'm supposed

to have a different one for each one but that's just way too much trouble so let's talk about

some of the options here. Let's talk about something called a pass phrase. Now, the text

I have it was a dark and stormy night which should be familiar to many of. That comes

from a couple of places. One if you're a peanuts fan there's a cartoon Snoopy's on top of the

dog house, typing out: It was a dark and stormy night. It's actually Bluwer Lytton fiction.

It's by a late Eighteenth Century Englishman named Bluwer Lytton, and he put together a

one sentence introduction to a novel, which I'm not reproducing here but it went on and

on and on, and it's really regarded as the worse introduction to a novel in British history.

So, of course, what they did they made a contest and every year they have a contest where someone

submits the worse possible opening to a novel and they kind of rate it and score it and

whoever wins the trophy has got the worse introduction fun fact but, obviously, not

critical to what we're doing. So I'm going to use it with a dark and stormy

night for my pass phrase and I'm going to turn it into something that's actually useable

and would work for us in the computer age here. I need to increase the complexity. We've

got one upper case and all lower case letters so I'm going to change it to it was a dark215&StormyNight

and it gives us special characters and it gives us all of those different elements that

we need. Now, what's interesting is that as you've

seen looking at the previous example with the haystack thing that length is really far

more important than complexity when you're constructing passwords.

So looking at this pass phrase in that calculator, even with a magnification cracking scenario

it's at 89.14 trillion, trillion centuries to break that password. So I think we aren't

going to worry about that one too much. So that's great. Now all you have to do is have

a 25-character pass phrase for every account how hard is that going to be. That's not going

to a very good thing. So we're going to talk about something called

a password manager, and I'm going to jump because I've got a poll question here basically

ask do you use a password manager? And I would like you to complete the poll while I'm talking

about it here, but what a password manager does it manages your passwords so the examples

we have up there KeePass, Password Gorilla, LastPass are all examples of different password

management tools, and the way they work and I used LastPass about 10 years now. The way

they work is you construct this really good pass phrase kind of as your key to your Vault

where you're saving all these other passwords and it will save all the passwords for you

for all the websites that you go to. It will create complex passwords which are going to

be long passwords which have all the complexity that we know that we're supposed to have and

we'll basically provide a way for you to have a password manager on your desktop or with

your browser and be able to have a different password for pretty much every single account

you have online which is the ideal thing because you don't want to use your banking password

for your social media account because if somebody breaks it or tricks you into giving it up,

they're going to have access to your bank account.

So how did we do on the poll here? Do we have any responses yet?

>> CINDY: I'm opening it now. >> BEN: It looks like we've got a very small

percentage of users that are currently using the password managers and nobody said not

sure which is probably a good answer. (Laugh.)

>> BEN: But it's something that I haven't seen a lot of people do somebody told me about

it. They said it's really going to revolutionize the way you use the internet because now you

can have all of these different passwords. And, of course, the big question that comes

up how do I know my passwords are safe doing something like this? Because, obviously, if

you use something like LastPass -- it's a vault that's online and

it's storing millions and millions of different passwords so it's going to be a big target

so what happens with this is that the passwords are stored in an encrypted format. It's a

strong encryption and, yes, there's always a risk with information security. I will never

tell somebody you're going to be 100% secure. We just can't ever say that, but what the

tradeoff has been that I've seen is this helps you use more passwords, which we know is strong

which we know is a good practice. It's stronger to do and you've got some risk in terms of

passwords being exposed but it hasn't happened so far. I mean, lots of people are trying

to get into it and it's the kind of thing if it does happen, you're going to get a notification

and you'll have to change some passwords but again in terms of your working life it's a

lot easier to do this. So I have no stake in these password manager companies but I

do recommend one that you take one of them at least.

And the next thing I want to talk about is something called Multi Factor Authentication.

Now, I think the Google search might have called this two factor authentication. I don't

know, but Multi Factor Authentication. And some of you may recognize some of the pictures

on the slide. But Multi Factor Authentication is normally when you go online you have to

indicate who you are and something that indicates your secret passwords so that you can get

in. So that's they only call it one factor and only using one thing to prove who you

are. With Multi Factor you have something else so you have this password you know and

you have something else which is used to log in.

Now, with things like the Google Authenticator, which is the G in Duo, these are online these

are actually apps for your smart phone and mobile device and they work in conjunction

with the site that you're trying to log into so make sure when you log in to a specific

website and for RIT we've protected our Oracle information or my info site for those of you

who have been at RIT and to log into that now you have to have your user name and your

password and you have to interact with Duo and it's very simple because you basically

on the screen you're logging in and it says Duo, send me a push or Duo call my L.A.N.

line and you've got a smart phone and it buzzes and you say, yes, and you get to log right

in. Some of the other examples in here there's a YubiKey, which is a way of storing passwords

credentials that you use to log into a cower there's an RSASecurID and I had one 20 years

ago when I was doing consulting and that number would change every minute and you would have

to enter that number every time you logged in.

The other thing on the slide, Turn It On, that gives instructions for about 100 different

websites in terms of turning on two factor authentication, and it's probably the best

way to protect yourself. Again, security usually makes things a little

harder to do but it's always that tradeoff between your protection and things being a

bit harder. So my next question take a minute here into

the chat, what do you think the most common way is of getting a password. What are your

ideas on that? I'm going to answer Christina's question right now because we're in the space

right now. In terms of passwords, personally I use last

price and that has troubled in price over the last year. It's $24 a year for using it

on your computer and unlimited mobile devices so you're talking $2 a month for the protection.

There's an open source one called KeePass, which I know people who have used it for years.

I'm not really fond of it because it's open source and open source to me means that the

documentation is terrible because it's put together by a group of programmers and they

understand it. But KeePass LastPass, Password Gorilla. There's another one out there that

I'm not remembering right now, but I typically, what I would do I would search Ghoul for password

recommendations and get past the paid ads and look for the ones that may actually do

some review on it, but the important thing is you use one.

So what did we have in terms of common ways of getting passwords? What did people enter

in the chat? You're just asking for it, spoofing spoofing in the sense of pretending that you're

somebody else. Asking for it, address, pet's name or kids' name. Absolutely, people love

to use your pet's name as passwords and they also you have to post pictures of their pet

so it's not real hard to figure out but in general the and the other question that came

up here and I'm trying to read the chat one and talking which is a mistake but the dash

link the one I can't remember the name of it was, and I personally have not looked into

that very much, but the key things you're talking that I'm seeing in here so far they're

trying to fool people into giving up their passwords and that's the far most effective

way to do it there's very little risk to the attacker they want have to be clever or buy

tools to figure it out or break a password like we showed earlier. The easiest thing

is just asking for that password. Now, the nice thing about the Multi Factor

Authentication is that even if you give up that password, because it's requiring that

other piece of information, they don't have actions to it. So your account is still protected.

So that's the really that's why we think it's such an important thing in terms of protecting

account credentials. And the other trick, of course, is people

said spoofing and I'm going to use phisching in terms of people fooling you into giving

up your password. The tricky part is finding out if it's a issue if fishing account, and

if you don't have a PayPal account and you get an email from PayPal, it's obvious it's

not yours. For years it was easy to tell because the grammar would absolutely be terrible and

as long as you're not in too much of a hurry you could tell something was wrong with the

request that had come in. But essentially those kind of problems have been taken care

of because attackers can now buy kits online to do phisching attacks and it takes care

of these nice templates making it easier for you to fool with. So the rule of thumb we

have and I've got the slide out of order. Don't give up your password. No one legitimate

is going to ask you a password send you an email to ask for it. They don't need it to

reset it so just don't do it, so that he gets this slide I have up here the one on fraud

scams and malware gets into the other types of social engineering types of attacks where

they try to trick you into doing things there's been a lot of talk, you know we've all seen

lots of things about the elections lately about Russia attempting to do social engineering

and that has been their practice for many, many years. It's like we've finally woken

up this time. But the big deal is to trick people into doing things or get people to

do things they wouldn't normally do. So the kind of things we see in fraud, scams

and malware malware is malicious software which usually would be an attachment or something.

But we see requests like they came from the president's office asking for a copy of everybody's

W2 Forms. Or can you transfer the $500,000 amount and do a wire transfer quickly. We're

behind we need to get this thing paid and it looks like it's come from the chief financial

officer requesting somebody do that, and it's all where they try to trick people and it's

all different types of attacks. Say I'm a small nonprofit locally we've seen a steady

stream of fake invoices trying to trick our treasurer looking like it comes from the president

and tricking the treasurer into paying something. This is not just directed against long groups,

it's pretty much directed at all of us. The rule of thumb you don't want to take the bait

and don't give up your password and this section we're going to talk now of protecting your

identity and your online safety when you're doing social media and things like that.

So the newer threat we've seen that started probably about 2 years ago and we're seeing

more and more of is something called Ransomware and you can see this is a screen shot and

I think it says you have to pay $300 or 250 or something like that to get your files back.

But the way Ransomware works is that they trick you into installing a piece of software,

malicious software and that software goes and encrypts all the data on your computer,

and the better ones, air quotes around that, if you're connected to a network share or

a portable hard drive, it will also go in and encrypt that information as well. So the

problem is that once it's done it's too late to do anything about it and if you're lucky

maybe you're antivirus detected it before it started maybe you've unplugged your computer

really quickly and it didn't get very far into it. And you still have to figure out

what happened after you plug it back in but the key once you've been attacked it's too

late and you want to see things about the last year or two about the police departments

had their data encrypted and having to pay a large amount of the money. A large health

care system was attacked in the United Kingdom years and I believe to pay a lot of pounds

to get their data unlocked again. So the real issue is how do you protect against something

like this? You have to protect against it ahead of time. You have to back up your data

and we're all Leah about this sort of thing and it's like oh, we know we'll be okay and

we know our hardware might crash sometime but, of course, we're going to get some kind

of warning that it's going to happen which, of course, doesn't happen, and even online

accounts like Dropbox and things like that some of this Ransomware is sophisticated to

reach up into those accounts and encrypt it also. Best rule of thumb with protecting yourself

against Ransomware making sure you have a copy of your data and that means regular backups

and it means not just having a portable hard drive connected to your computer where you

copy files over. You actually need use some kind of a program for it. But so Ransomware

is probably or one of the scariest things come down the line last year.

Now, this point in time I usually pop up this slide and some of my audience I'm sure is

old enough to remember this, but these are the old duck and cover drills where everybody

hid under our seats to protect themselves from atomic bombs which, obviously, wasn't

going to do any good but it made us feel like we were doing something and I got a lot of

people in the audience who look like deer in the headlights and I want to talk about

some of the things you can protect yourself rather than telling you all the bad things

that can happen. Again, the Number 1 thing don't get hooked.

Never respond to email requests or phone calls or text messages or anything health that are

asking for your password. That's an easy one. If we just did that we'd be in great shape.

The other question I've got as we launch into this is I'm assuming most of you have mobile

devices, smart phones or tablets of some kind or other. The question I have for you we have

a question, yes. Is do you have a mobile security app on your phone? If you do, please it's

a poll so please answer the poll. I'm interested to see what the responses are here. 'Cause

I know how it goes when I'm doing this as a live in person.

>> BEN: It's not looking too good for the yes but someone it has. 2 people. So here's

part of the issue we have and all of you know this. Especially if you're an iPhone users

and I don't want to bash Apple on this but Apple has never made but they made things

easier for users and they've given a nice interface. They don't talk about security

very much and iPhones can be attacked and androids can be attacked and pretty much any

of the operating systems that are out there on smart phones and tablets and the things

like that. The list here is kind of a short list like the things like find my iPhone but

some things are actually apps that you can add from your marketplace or your Google Play

Store depending what you're using and they provide additional security. They'll scam

the applications that you're trying to install. They'll make sure they're okay and they'll

tell you if you've got weird permissions you're asking for if they're able to do things more

often than not. Again, I encourage you to research various, you know just do your Google

search of mobile security apps for whatever kind of device you have and see what the recommendations

are. You'll find that will secure things and the reason why this is so important I think

most of us are aware that over the last several years there have been far more smart phones

and iPad things and tablets stolen than regular computers and what it means for the cybercriminal

who's out there trying to trick us and get our money they're going to go after those

mobile devices. That's where people are and that's where they're going to invest their

money. And they're not as easy to protect. One of the questions I typically ask in the

class is how do you tell where a link goes to on a mobile device? And we're not going

to ask it as a question now but what happens is you can't hover your cursor over it like

you would over a computer. You can't really hover your finger over it either, and if you

just touch the link it takes you there. If you find out where it goes you actually have

to push down on the link with your finger and hold it down until it shows you where

it goes. And that is not a good design. Obviously, if you let up on your finger too soon it's

taking you to that link. So this is one of the reasons, I think, that mobile devices

are attacked so much 'cause they're just harder for us to think about defending.

Now, what's interesting is that Google question that came up really easy where the most important

thing to do was to install software updates we do that on our phones. We know we need

to do that on our phones. We get them daily for all these different apps so it's the same

thing with your computers you want to make sure things are kept up to date.

So I'm going to talk about a few other things here about protecting your information. Great

drawing created by a student who worked in our office at one point in time and it's very

it's a good illustration what's out there because something may appear to be a sheep

but it's really a wolf in the background and you cannot tell by what you see online. You

cannot tell. Friend requests hey, great. But who knows what they're really like. It's not

saying criminals can't look great either for that matter.

So my Number 1 rule of thumb we can never assume on privacy whatever we share online

we have to assume at some point it's got to be revealed. We had no control over what happened

with Equifax with them revealing all of those passwords or Yahoo! I think they revealed

2 billion passwords. They had 2 billion passwords. They revealed every account password they've

had and we have very little control but we do have control over the types of information

we share and that really comes into social media. A lot of times you'll sign up for Facebook

or some other social media account and it may ask for your birthday or hometown or ask

you where you went to school. You can provide that information but you need to think about

the types of information it's asking for and makes sure you're comfortable with providing.

But again, even if it says it's secure and private you've got to assume at some point

it will be revealed. The next screen which is probably not readable

is privacy settings that's actually from my Facebook account and what was interesting

about this is when I went down and I looked at who can look me up and the second thing

on there said who can look you up using the phone number you provided and it said everyone.

I never remembered giving Facebook permission to do that. So that must have been a default

setting, and what I recommend is that every few months go into your privacy settings in

these different social media accounts, make sure that nothing has changed and make sure

that they're all settings that you're comfortable with and change them now if they're if you're

not comfortable with them. Do what you can to protect your information.

Now, something they also provide that are good are log in alerts which you can sign

up on the various social media accounts. I was speaking in a conference in New England

in the fall and while I was there I got 6 or 7 messages from Facebook that somebody

was trying to log into my account. And they knew actually, I think they were coming from

Australia of all places, but it alerted me that was happening which was a little discomforting

but also told me I didn't need to change the password but the good news is when you log

into Facebook and let's say you log from out of town you'll get these alerts because you're

not the internet the IP address that you are connecting from and it will let you know.

A couple other tips here use something called Google alert that you can set up. You can

monitor used of your name and put in your email address and anytime that appears online

in this place Google indexes it will give you a report on that. And you can aggregate

it so you can get it maybe once a day and you can use this alert to follow various subjects,

sports teams, all sorts of things like that as well. So it's got some things it's got

some play value also. Google also has my account dashboard -- if

you're a Gmail user, which is probably 90% of the world, at least at this point, one

thing you can do is go to is go to my account dashboard and it will allow you to do a security

checkup and privacy checkup and I encourage you to do that again just so you know what

you're sharing. You can see below privacy checkpoint it will show you the activity which

has been associated with your account and if there's things on there that you haven't

done then that account has been hacked at some point.

Another nice trick which somebody told me about is doing something a Google reverse

search. I don't know how many of you have used LinkedIn and I will connect with anybody

and it looks pretty bizarre. There's fake accounts on LinkedIn and like fake accounts

on Facebook and others, and it will allow you to select the imagine depends on if you've

got Chrome and it will show you all the places that image is used. I've got a connection

request from probably one of these people right here on the right here but that same

picture was used with at least 4 different LinkedIn accounts so it's so it's a generic

picture so maybe it's one of those people but it's a good way to check to see it's the

image that's commonly used on the internet and they're using it for a fake account and

they want you a fake account because they want to get you over to your connections.

So another issue and again, it's not typically an issue with faulty or staff or audience.

You want to protect your your only image is what they see about you online. This example

here is from a poster from the University of Wisconsin and would you hire this guy and

somebody's told me at one point they think it would be milk. I'm not buying it. But the

idea again is that understanding whatever you do online people are going to make decisions

about you and make judgments about. So that is the presentation and I'm going

to pop up my next which is my website, while we're talking here, but what questions do

you all have? And thank you for the opportunity. >> CINDY: Thanks, Ben.

There are a couple coming in. So if you have additional questions, folks, please send them

in through the chat box. A couple of things that have come up what if you do not put your

portable hardware drive online. Will the Ransomware still attack it?

>> BEN: As long as the portable hardware drive is connected to your computer, yes. Depending

on the strain of Ransomware, it will go into everything you're connected to. So the idea

if I was using a portable drive for backups, I would back up and then I would unplug it

and I would plug it back in when I'm going to use it, you know, back up to it again.

Typically, my experience we use those as additional space and not backup space. We really need

to think of it as an opportunity to back it up and again, back it up and just disconnect

it and it's not going to jump into it if it's not connected.

>> CINDY: Okay, a question from Pete. What's an example of a mobile security app?

>> BEN: Well, depending on your phone and depending on how old it is, you will kind

of dictate what you really need. So one example of a mobile security app is something called

LastPass and not LastPass I've got that wrong. Lookout. It's called Lookout. Lookout what

it does you stall it from your app store and it scans all the applications that you install

to make sure there's nothing malicious in them or whether they're asking for weird permissions

like why do they need access to your computer and that sort of thing. Lookout also has the

built in thing that iPhone users have enjoyed where you can find your phone through Lookout

and what you can do is you can bring up a map and it will show you where your phone

is within 75 feet, I think, it is. And you can also get it have your phone emit a high

pitch squeal noise, and that will help in terms of trying to find it.

The main thing it does is it looks at your applications and make sure none of those are

malicious and they do sneak out occasionally where they are bad. I used a program by Sophos

for my smart phone, and it was very aggressive in terms of what it would warn me about and

it would start talking about low reputation application and it told me Google Play was

a low reputation application and a bunch of other things and it was probably a little

bit too hypersensitive so I had to kind of turn those notifications down some. But the

idea it's a third party application that you would add to your smart phone or other mobile

device. A very long answer to a short question. >> CINDY: That's okay. Thank you.

Adam has a question. What is the best way to implement a safe home network where my

spouse and I can count on safe robust backups that can be automated by software and then

what software might that be? >> BEN: Yeah, I think this is probably a question

is a little bit beyond the scope of what I was prepared to talk about. But in general

you want to use a router and some of the I'm trying to remember whether our router does

this or not I've got what they call a Cloud drive which essentially allows me to back

up to it in the house. I've got the system set up to back up to it and then it will back

up that data to the Cloud and I don't do not remember what the cost is per gigabyte or

whatever or storage but storage prices are going down and down. But ideally what you

do to protect your data is you make you get a copy of it and you have that copy somewhere

besides where the computer is located because there should be a break in or fire or anything

else, you don't want to have lost every bit of digital information you have. We've become

too dependent on it. >> CINDY: All right, um, question on that

came in from I don't know who did that come from? Jim? Is there value to use the traditional

antivirus software that works on a mobile device?

>> BEN: Yeah, so when I'm talking about a mobile security app, they will have antivirus

built in. Cybercriminals are still crafting malicious software to attack phones. A banking

Trojan a couple of years ago, which was still out there and I'm drawing a blank on the name

of it, but what the Trojan means it's like the Trojan house it looked like something

else and there was a banking Trojan and what it did it captured all your banking activity

online. It didn't worry about anything else you were doing but anytime you went to a bank

it would capture that information and send it out to somebody. The antivirus I think

what you'll find I'm not sure you can get strictly an antivirus for your phone at this

point. They'll all be more robust security suites of software.

And the good news is most of them are free. Or at least have free versions, and the reason

for that is it is it helps all of us to get this security software out in the marketplace

because it reduces the amount of the attacks that go on.

>> CINDY: Thank you. Another question came in from Adam. Do you

know if Mint.com is a good third party app for a bank security?

>> BEN: It's not anything I have used but my rule of them point of view I want to get

a good idea how many people are using it. I'm not aware of any breaches which is what

they would call the releases with Mint.com, but they be associated with Intuit which has

Turbo Tax and there have been occasional problems, but I'm a Turbo Tax user myself and I haven't

worried about that. The biggest issue is people asking for passwords and people giving them

up. In terms of Verizon security and privacy app,

I'm not familiar with it. I tend not to use I have Verizon but I tend not to use their

built in stuff. I don't like it. It takes up room that I would rather use for something

else. But in general I'm going to give you the same response. Do a Google search and

look for reviews and see what they have to say about it, and, unfortunately, it's going

to be pretty much my responses to any specific security app or software questions today because

it changes. It changes monthly depending on which one is more effective.

>> CINDY: So if I've got malware on my device, what do I do?

>> BEN: Take it to somebody to look at. If you're associated and I can't tell you exactly

who to take it to look at. If you're around here around RIT in the community I think you'd

probably go to the digital den and ask them for their recommendations on it. Worse case

you just reset the device and wipe and return it to factory specs and that should take care

of any malware that's on the device. >> CINDY: Okay. Here's a question that came

in about looking for advice for parents to communicate to young adults and students about

not sharing their personal online ID, if they're uncomfortable doing it. Any thoughts for frustrated

parents out there? >> BEN: Yeah, a couple of things. Parents

don't tend to use the same applications they're kids do and I think that's deliberate on the

part of the kids. But they'll use things like Snapchat which is supposed to be this very

brief period of time a picture is available or something like that. But people can take

a screen shot of it. They can take a picture of the device that the picture came in on.

There's also been cases where it's like oops, somebody broke into the Snapchat servers and

they found all this information that was really supposed to be ephemeral.

The best place I would tell you to look is go to a website called Stay Safe Online, and

it's a Government website that's set up and it has a whole section on parents and teens

and preteens and what kind of information to share with them. I think that will be your

best option to Stay Safe Online. >> CINDY: Okay, thank you.

Are there any additional questions? If not, we're putting that website for Stay Safe Online

into the chat box. So I guess if there are no additional questions

we will wrap up. So thanks to Ben for coming back and being

a presenter for this second time. If you do have a digital question, you can email at

to lumbar RIT.EDU_alumni with the hash tag meRIT with the webinars, and we'll try to

get you some information for the panelists today.

As a reminder all of you will receive an email from us in the next few days with a link to

today's webinar recording. Ben I can't think you enough for being our

presenter today and thanks to all of you out there for participating in today's webinar.

Our next webinar is Thursday, March 8th, called Build a Better Brand from the Office of Career

Services with Kris Stehler. Look for your special invitation and your email coming shortly.

Again, thanks to everyone for joining. You can exit this webinar by simply closing the

WebEx window and has do let us know what you thought of the webinar with by taking the

brief survey which pops up when you exit the webinar. Thanks. And have a great day.

For more infomation >> MeRIT Webinar: Digital Self Defense - Tips, Tools, and Best Practices to Stay Safe Online - Duration: 53:03.

-------------------------------------------

Lane LifeTRANS Headquarters Tour (Mineral Ridge, Ohio) - Duration: 6:36.

- Well hello everyone,

I'm standing here in Mineral Ridge, Ohio.

At the Lane LifeTrans Headquarters building.

And what's really neat about this building,

is this was my grandmother's house.

This is where my father was born.

And it's where I spent an awful lot of time growing up

because it was about 30 feet

from the side of the funeral home.

The old funeral home was actually out on 46,

just about, oh maybe a hundred yards from here,

and this building was, if we're looking

towards the red truck there, if you can see that.

It was to the left of that about 30 feet.

That's where this house was located.

And what my dad decided to do around 1983, 84

was to move his childhood home, my grandmother's house

back here so we would have you know, some use of it

and not just tear it down when

we rebuilt the funeral home here.

So, it has been a rental,

it has been a couple of different things,

but for quite a while now

it's been the headquarters for Lane LifeTrans.

What I wanted to was just, again,

share a little bit more of our world and what goes on

behind the scenes with the Lane company.

We're gonna go inside

and we'll give you a little bit of a tour.

Alright, we're here in, I guess,

what this used to be the main living room

of my grandmother's house, this is where we had Christmas.

But now, you know, now, it's where we have Holly Lyons.

- Hello.

- And she is Chief Randall Pugh's assistant.

And she basically helps keep this building coordinated.

Can I say that Randy? Is that fair?

- Yes she does, she absolutely does.

- So, she catches everything that comes in the door,

and tries to send everybody to the right place,

or back out the front door, whichever it takes right?

- Which ever it takes, that's right.

- But, yeah, it's just, every time I come in here,

it's really cool, again, because I remember being here

with family at the holidays and it was really,

it was special, so every time I come here it just gives me

a little bit of something to smile about.

Well we're gonna go take a peak in the back a little bit,

and then we're gonna go upstairs,

and it's really more of Randy's world,

and he'll tell ya a little bit about what happens upstairs.

This was the dining room in the old house,

boy when I was four this seemed a lot bigger than it is now.

But, this was the dining room and of course

a little kitchen in the back.

And my grandmother, who lived to be a little over 90,

she got to the point when she was cooking back here,

I was a young guy, I had to set her stove

with little red x's for bake and broil.

That's the only she could cook.

And she would make all her meals based on

whether she was in, you know, one color or the other.

And yeah, like I said, every time I come here,

fond memories for sure.

But we're gonna go upstairs now,

we're gonna go upward to the chief's office.

(flute music)

Was this my dad's bedroom, no, this was my aunt.

This was my two aunts, Charlotte and Marguerite.

This was their bedroom, yeah.

Dad's was over in the corner. Mama Hallie's was over there.

I can remember, I can remember, I was this big.

Like I said downstairs, it was just a lot bigger back then.

But we've been here how long Randy? Do you have any idea?

- We've been in this building probably twelve years.

- Okay, we've moved around a little bit,

this was a nice use of this building,

and again, it's the family, sort of the family home.

So it's just nice to have it being used.

You know, that's better than just having it as a rental,

So, we sorta like having it, you know.

We may need more room someday but for now,

we can make it work, right Randy?

- [Randy] We can make anything work, yeah.

- And this is where Randall does all his interviews

on TV that a lot of people get to see.

They do, not chase him down but,

it's nice to know that Randy's the guy they go to,

I mean, seems to be that when

the media is looking for an answer

that has anything to do with EMS in the valley,

they tend to go to Chief Randall Pugh for comments.

Right Randy?

- Well, I, like the last one,

nobody else wanted to comment on it.

I believe it was a situation that need addressed

by somebody who could give some light to the situation,

and really answer the questions that were posed.

- And, you know, they know they're gonna get

a straight forward answer from the Chief.

You know, again, there's a lot of experience.

I mean, Randy's been here, how long now Randy?

- I'm in my 38th year, yeah.

- So, 38 years with the green and white.

Just a little bit of experience there, huh Randall?

So, again it makes sense that when they're looking

for answers they go to to Randy.

And I'm glad that they don't necessarily ask me,

because all I would do would be

get on the phone and call Randy.

You know, say, "what's going on?"

So, yeah, he stays on top of things,

and I don't worry about things here,

this world runs quite well and you know, it's just,

I just stop and visit most of the time,

because things I don't have to worry about you know.

Gets taken care of here.

Now one thing I will say that, if any of you saw the video

where the tables upstairs in my office in Canfield,

and we had to take it through a window.

We didn't have to do that with this one, so.

We were able to get this one upstairs and put the,

put the table in here.

And see I thought it was in over here.

See that just shows,

that shows when the last time I was up here.

- That's correct. Yeah, yeah.

So, our strategically mapping of our personnel.

Those are all our full-time people.

- That's a lot of people, a lot of lives,

a lot of personalities and we have a lot of seats to fill

on those green and white trucks so,

it is a, it is a constant challenge.

And I'm glad he's doing it and I don't have to.

- Specially known as the War Room.

- The War Room, I like that, yeah, here we go.

(jazz music)

Everybody tells us that this may be haunted,

so it's probably just my grandmother.

She's probably checking on us.

'Cuz every once in a while people say they feel somebody

push on their back when their on the steps or something so,

it may be my grandmother just checking on things

and making sure we're making good use of the house.

(jazz music)

For more infomation >> Lane LifeTRANS Headquarters Tour (Mineral Ridge, Ohio) - Duration: 6:36.

-------------------------------------------

How a Whole Home Chlorine Filter can benefit your water - Duration: 1:07.

Does your water have the unpleasant taste and smell of bleach? It could be

caused by high levels of chlorine in your water. These issues may mean it's

time to consider a Whole Home Chlorine filter to purify and reduce the chlorine

in the water throughout your entire house. By reducing the chlorine, the

filter could improve the taste and smell of your drinking and cooking water as

well as help to increase the longevity of your plumbing fixtures, potentially

saving you money on repair and replacement costs. The filter is

installed at your main water line providing you and your family with

reduced levels of chlorine from every water source in your home. The Reliance

chlorine filter meets NSF standards, is performance tested and

professionally installed by our licensed plumbers. To learn more about Whole Home

Chlorine Filters and other water purification solutions, book an in-home

consultation with one of our trusted water purification advisors. The advisor

will test your water and discuss your needs to determine the best solution for

you and your home. For all your water purification needs call on Reliance.

For more infomation >> How a Whole Home Chlorine Filter can benefit your water - Duration: 1:07.

-------------------------------------------

10 Things You Should Never Say To Your Wife - Duration: 3:58.

For more infomation >> 10 Things You Should Never Say To Your Wife - Duration: 3:58.

-------------------------------------------

KADAR ||COVER BY VICKY SINGH || MANKRIT AULAKH || SPEED RECORDS - Duration: 3:29.

For more infomation >> KADAR ||COVER BY VICKY SINGH || MANKRIT AULAKH || SPEED RECORDS - Duration: 3:29.

-------------------------------------------

Why playing outside in the rain just might be good for you - Duration: 2:21.

Hey what's up guys Dustin Williams here with Dustin Williams Performance and

Precision Fitness and today's topic why playing in the rain might be good for

you and for your workouts. So, I don't know if it is raining where you're at

right now but I can tell you that here it's coming down pretty good. We

got a pretty decent amount of rain coming in expected to continue to keep

raining for a few days. Now here's the thing I want to talk just for a minute

about your brain. I'm gonna tell you that I am NOT the world's best

person at drawing things, but I'm gonna draw a little brain here for you

so that you can kind of understand what's going on. So, it's

beautiful I know, that's your brain and your brain has what's called a

feeding pattern which essentially means the way the energy and the nutrients

is getting to your brain and it goes from bottom to top and from back to

front. So, what that means is that your energy

levels and your nutrients start here and then work their way to the front side of

the brain last. The part of movement lives closer to the front of

the brain all right that's where the movement part of your brain is right

before that part right in here is our sensory part of the brain. Sensory being

like the ability to tell the difference between hot and cold the ability to be

able to like feel when people touch you, to be able to feel when something pricks

you. That's the sensory part of the brain now,

if that part of your brain isn't working as well as it should be that means when

this energy is coming through, when this energy is coming through to

this area, this area is requiring more energy than it should. Leaving less

energy for the movement part. When you go outside and you play in the rain you're

getting a lot of sensory feedback it's a way to be able to train the sensory part

of your brain without really even realizing you're doing it. The rain is

typically cold so you get sensory from that. The rain touches all over your body

and you feel the pressure and the touch everywhere you're getting sensory

from that. So, literally just by getting out and playing in the rain you can

potentially make this sensory part of your brain work better requiring less

energy & potentially making the movement part of your brain work even better than

that. So, go outside play in the rain, enjoy it. If you're in this

area its gonna be here for a few days so get outside play in the rain that's your

job for today guys. Take care!

For more infomation >> Why playing outside in the rain just might be good for you - Duration: 2:21.

-------------------------------------------

let's walk around London + chat about university ⭐️ - Duration: 8:37.

For more infomation >> let's walk around London + chat about university ⭐️ - Duration: 8:37.

-------------------------------------------

You cannot be Disturbed by any Thought - Mooji - Duration: 17:42.

I don't I don't feel I'm a body I can see beyond that and this presence but

still there is some feeling that it needs to be protected and in order of

okay stop respect myself in order if you are not the body what needs protecting

I know no no don't say you know we're not gonna sweep over anything today I

want you to look clearly so that we stop speaking things that we are not clear

about you see if you are not the body and are you clear some of you that you

are not merely the body that's not cursing the body not telling you to harm

the body I'm telling it's not important I'm saying that it is not fundamentally

what you are is not the body saying I am George what is saying I am George what

is saying it

you say that there's a feeling inside you know like you know you know you do

you know who you're talking to do you know who you're talking to you're

speaking with someone do you know who you're talking to huh how dare you talk

to be me like this so who are you exactly

who is speaking this is just some identification that is still there and I

try to identify what is identified with but what if I go through that it's too

much understanding yeah I'm not gonna really grasp what what is and ultimately

I go to this one which yeah you can still using the word I do you have a

license to use this I you're using it very freely I but you know I I try to

look at who is the one who's doing that but what I find is too difficult I I

again I have to try to catch every one of this i that you're speaking I try to

see who is actually doing these things but I just find it is too complicated

for me you being one who is speaking

listen first of all I'm not leading you towards any state of confusion

I am only showing you how confused you are anyway and then to bring you back to

a place of real sanity the only reason why you are not aware that you're mad is

because everybody else is mad because we don't know who we are but it's just like

it's just like a whole village that's bad he lacks a mayor and a nasai a

psychoanalysis out of one of the bad people I'm just saying like this I'm

making little bit of joke about it because we're getting too serious maybe

I don't know but a little bit we don't question this because it might feel I'm

getting more confused the fact is that we are confused but it's just that we

are happily confused for a long time because when everybody is confused we

can decide we can just keep making out that we are together you know we're

really together you know hmm so at least sometimes coming into a state of

confusion is part of growing out of confusion just to show that the ground

that we have been standing on is not quite a ground um we're gonna pass this

to show you your true ground and no one can make you uncounted when you see if

the true ground this ground seems appears as it's falling away one when

after a while I'm being out of the this context and this environment that is

constantly pointing to what am I really

because there is still something not grounded or is still interested even

though I cannot exactly identify with what's there but okay just before we go

too far because if you go too far you going far further into confusion here

now yeah but you are aware that something when you are not here

sufficiently in a physical way that there's something that comes back that

she's a bit ungrounded and a kind of fun grounded nice and so on and then that is

believed you see now this ungrounded Ness that you may feel there's an

awareness of this ungrounded Ness what happens that you are too much believing

in what you see wait you are believing too much in what

you see and you are interpreting with the whole mind with the old regime of

thinking so a feeling is there like oh I don't feel grounded and it's believed

but I don't feel grounded is only a thought being perceived that which is

perceiving the ungrounded Ness thought is that ungrounded does it need to be

grounded you must experience your your discovery and affirm it I'm going to

show you no thought can destabilize you no thought no concept can destabilize

you except if you believe in it because you are there before any concept came

concepts came subsequent to you you are not a concept you are the witness of

them so if you feel that this thought or distort just confuse me that is also a

thought believed in it is the believing in and the identifying with it that

gives it that potency now I want to know if we can finish this part of the lesson

or not otherwise I don't proceed yeah yeah come

hello yeah it it seems that the the sense of I am either in feeling or in

any other way seems very weak so there is still a sense to it but it seems a

weak sense Who I am or what weakness is the weakness of I am yes who or what is

witnessing the weakness or the strength of the sense I am that seems also weak

who whatever this is that that is also weak who is a witness what is witnessing

that even that is weak is it after the I am or before the I am

is it looking back at the I am to say you're me we kill them or is I am in

front of it and send the I am itself is weak this has to be clarified you see we

are not going to leave any blind spot because we do this is how the mind works

it just brushes over something and it's okay but I want you to stop because

these are fundamental paintings it's not many but they are crucial that you

understand them you say something that the I am itself feel weak what is what

do you mean by the I am and who are you who is looking at it

are you strung and the I am itself does it have any quality to be seen to be

weak or strong in order for something to be weak or strong you know it must be

measure against something else what will say though in what in what way

can the sense I am be weak you mean it is it is weak by the sense of perception

that you're not perceiving it clearly enough so it seems weak or that within

itself it has no muscle it's as a kind of I am or what but it means it is weak

the perception of it seems weak perception Israel seems weak and the

perceiver is what strength the perceiver of the perception that which is aware

that even the perceiving is weak come you have to do this or I close up the

evening and we go i watch some TV I want to know from you who who is what is

there to say that it is weak then what way is it weak what is I am you make

sure that the I am is the I am itself not something maybe being created or

imagined

so there's an idea that the IM should be strong okay there's an idea that the IM

should be strong whose idea is it for me it's more like the presence of IM should

be a strong strong presence okay okay this i understand what you mean the

sense I am should feel more strong in the body at present what fear is more

strong than I am in the body

hmm person a person yeah thank you the person feels stronger only because the

person is more loud the person feels more stronger because the press is more

loud the person actually is is the sense of attachment first of all to the body

and to the identity and the importance the identity has become to the

consciousness that perceives the identity the person for the person also

is consciousness but is a very contracted very conditioned very limited

expression of consciousness it's a field of self belief and desire and attachment

I want this this is important to me why did I why did I lose my house I why did

this thing happen to me I don't trust God anymore I don't

believe in any God anymore because I just very has a lot to say and it seems

and somehow to be stronger and then the i am-ness does the i am-ness need of an

effect the only thing that can happen is he either something feels strong because

it's full of history it's full of adventure it's full of intention full of

desire full of attachment so therefore it's loud okay that's one form of

strength or something is so totally empty of any intention in the identity

you see so that it is not a flavor that keeps changing flavours can change in

front of it but it is unchanging and it is strong because it is unchanging how

does something is strong because it keeps changing and keeps going there and

keep going oh whoa whoa like this or it's strong because it never changes it

is it is steady any witnesses the movement but itself is unmoving so who

is to determine what strength is you must define what you mean by strength is

transload ness or is not the loudness of the mind

creates a sense of confusion dissatisfaction pain also hmm rather

than credibility not because a thing is loud means it is more real you see then

the thing which cannot be which doesn't fluctuate it's always steady what is the

criteria for saying something is real or not real its unchanging this it's

unchanging this or very good is the person unchanging oh the person is

always changing if the person is always changing can it be said to be a thing

what is the shape of an amoeba it's more like a verb than a noun and it is being

witnessed by something it is witnessed by the unchanging because if everything

is changing who gauges what is changing most only the thing which is unchanging

perceives correctly the the amount of change that is being perceived so it is

from the state of the unchanging which is the I am sense which is not combined

with any thing that you can percieve the changefulness of the person and then

something says the person seems more real why is it more real because it's

more active it seems to catch all the attention ah because it catches more the

attention

yeah hold on hold on I'm hot at the moment please stay with me

look because of the amount of the attention that goes to it okay because

attention is one of your pal your great powers your that you your great powers

where attention goes it feels like that's my experience okay attention is

very powerful okay but something is able to observe

attention easy so attention goes to the person so the person is said to be more

real meaning it's more loud the attention going to the person is that

not also seen this is what I want you to do you are still in the process of your

inquiry the party attention is going to now even attention goes and so something

is not gone it observes attention going sometimes people say you know I could

not keep my attention fixed on this thing it kept going off somewhere else

so something witnesses the attention going off is this thing going off this

is all I want you to keep staying here keep staying in the place that's not

going somewhere you see and you see that everything else is going somewhere

including the attention attention is one of your secret great powers the next

great power is the is the power to believe and another power is the power

to identify with something you are you are that which is aware of this I can

see that something is believing in all of this you are still unmoved

you

Không có nhận xét nào:

Đăng nhận xét