Podcasts about kenning

  • 62PODCASTS
  • 72EPISODES
  • 39mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Oct 28, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about kenning

Latest podcast episodes about kenning

Deutscher Verband Tiernahrung - Podcasts
Fakten-Futter – zu Gast: Prof. Dr. Peter Kenning

Deutscher Verband Tiernahrung - Podcasts

Play Episode Listen Later Oct 28, 2024


In Folge 27 des DVT-Podcast „Fakten-Futter“ ist Prof. Dr. Peter Kenning zu Gast. Kenning hat den Lehrstuhl für Betriebswirtschaftslehre an der Heinrich-Heine-Universität in Düsseldorf inne und befasst sich innerhalb seines Schwerpunkts Marketing mit der Lebensmittelbranche und dem Konsumverhalten der Verbraucher. Dr. Hermann-Josef Baaken spricht mit dem gebürtigen Münsterländer über seine Berührungspunkte zur Landwirtschaft, warum Moral am Regal aktiv beworben muss und erklärt die Bedeutung des sozialen und emotionalen Werts von Produkten und Waren. Außerdem erklärt Kenning die Vielfalt und Dynamik in der Lebensmittelbranche und gibt Einblicke in seine Arbeit auf politischer Ebene im Sachverständigenrat für Verbraucherschutz. Über "Fakten-Futter": Als Teil der Wertschöpfungskette für Lebensmittel spielt die Fütterung von Nutztieren und die Nutzung der Agrarrohstoffe eine entscheidende Rolle. Dr. Hermann-Josef Baaken lädt regelmäßig Gesprächspartner*innen ein und berichtet zugleich über Neuigkeiten rund um dieses Arbeitsgebiet.

Perfectly Imperfect - Weniger Perfekt, Mehr Spaß! Podcast von Katharina Siebauer
Folge 153: Blog-Challenge - Interview mit Nina Obermüller und Johanna Adolphs-Kenning

Perfectly Imperfect - Weniger Perfekt, Mehr Spaß! Podcast von Katharina Siebauer

Play Episode Listen Later Sep 19, 2024 44:41


“Gemeinsam schafft man mehr.” Das können meine Interviewgäste Nina und Johanna aus eigener Erfahrung zu 100% bestätigen. Die beiden nehmen uns heute mit auf die Reise ihres Kennenlernens und wie sie durch einen gemeinsame Challenge, nämlich kontinuierlich am Bloggen bleiben, ein Programm erschaffen haben, das heute vielen Online Unternehmerinnen hilft, kontinuierlich beim Bloggen zu bleiben oder endlich einen Blog zu starten. **Erfahre in dieser Folge:** Wie man sich gegenseitig unterstützt, ohne in die Jammer-Falle zu treten und motiviert am Ball bleibt Wie ein richtig gutes Online-Angebot ganz ohne Zwang & Perfektionismus-Drang entstehen kann Wieso Bloggen nicht gleich SEO ist und wie du am besten startest Was deinem Blog-Flow im Weg steht und wie du diese Hürden überkommen kannst *** **Mehr zu Nina, Johann und der Blog-Challenge erfährst du hier:** [LinkedIn Profil Johanna](https://www.linkedin.com/in/johanna-adolphs-kenning-23108ab9/) [LinkedIn Profil Nina](https://www.linkedin.com/in/nina-oberm%C3%BCller-webdesign/) [Website Blogchallenge](https://blogchallenge.de/mein-unperfekter-blogstart/) *** **Hier gibt's wertvolles Material für ganze 0€:** [LinkedIn Vorlagen zun Nachmachen](https://katharinasiebauer.de/linkedinvorlagen/) **Du hast Fragen zu deinem Online-Business?** Dann buch dir hier einen unverbindlichen Termin zum Austauschen. [Kennenlern-Termin buchen: Hier klicken](https://calendly.com/katharina-siebauer/byebye)

Spegillinn
217 þingmál, kenning um Skaftárelda hrakin

Spegillinn

Play Episode Listen Later Sep 12, 2024 20:00


Spegillinn rýndi í þingmálaskránna nýju og skoðaði hvað ráðherrar ríkisstjórnarinnar ætla að setja á dagskrá í vetur. Á skránni eru 217 mál. Þetta eru frumvörp, tillögur og skýrslur. Sum eru endurflutt, önnur eru ný af nálinni. Fjármálaráðherra er með flest, forsætisráðherra fæst. Og það er ekki þannig að þetta séu málin sem ríkisstjórnarflokkarnir eru sammála um. Við segjum frá nýrri rannsókn sem hrekur þær staðhæfingar að Íslendingar og íbúar á meginlandi Evrópu hafi látist af völdum gosmóðu eftir Skaftárelda.

LIVINYOU
Botschaft #105 Auf den Zahn gefühlt mit Nina Kenning

LIVINYOU

Play Episode Listen Later Jul 22, 2024 28:24


Dass man seine Zähne immer pflegen sollte ist soweit klar, aber wer hilft uns, wenn wir mal Probleme oder Schmerzen haben? Wie sieht ein Zahnarztbesuch der Zukunft aus uns warum ist es so wichtig sich in Sachen Zahnarztpraxis und Selbständigkeit beraten zu lassen? Das und vieles mehr besprechen wir mit Nina Kennig. www.sandra-agerer.com www.sandra-agerer.com/characters

Movies N Sh*t
Minisode 8: Oscars 2024

Movies N Sh*t

Play Episode Listen Later Mar 11, 2024 32:02


It's that time of year again! We're Kenning with all the coverage your ears can handle from the 2024 Oscars. You can't see John Cena's naked body, but you CAN listen to us talk about it here.

Beauty Pro Elite with Jean-Anne
Guest: Mike Kenning Let's Talk Gender Roles In Business

Beauty Pro Elite with Jean-Anne

Play Episode Listen Later Jan 30, 2024 41:20


This conversation was very insightful for me. Meet my husband Mike, an entrpreneur for almost 30 years with a vast knowledge of running business. But what does he think of women holding back in business and life because of pressure at home, kids, house etc.  Jump in and listen to this almost too honest conversation.  And I should say warning he has strong opinions but they are valid when you really listen.    ENJOY!    Follow us on IG: beautydefinedcoach   Get our freebie on boosting your business here; https://jean-anne-middleton.mykajabi.com/2024-business-boost

Matt Brown Show
MBS772: Investing for Change: Jenn Kenning's Visionary Strategies (Secrets of Influence)

Matt Brown Show

Play Episode Listen Later Jan 9, 2024 35:08


Welcome to the "Secrets of Influence," in the digital age, "influence" often seems distilled to mere numbers – followers, likes, and shares. But for the visionary business leader, genuine digital influence is multifaceted, stretching beyond platforms and algorithms. "Secrets of Influence: A new pod storm series offers a profound exploration into the depth and breadth of digital leadership and influence in today's interconnected world.Join Matt as he dives into the world of influence.Series: Secret of InfluenceJenn Kenning is a trailblazer, collaborator and change-maker who has quickly risen to become one of the most recognized voices in impact investing. In 2014 Jenn co-founded Align, an independent fiduciary and impact specialist that works alongside financial advisors, institutions, foundations and directly with individual clients and family offices, helping integrate impact strategies and investments into the broader wealth management strategy.Support the show

Above the Fold
What's going on with downtown Cincinnati real estate?

Above the Fold

Play Episode Listen Later Dec 11, 2023 43:49


Hosts Andy and Tom have a look at the uncertain future of the office market downtown, starting with a story on the potential foreclosure of an office tower, followed by GE pulling all of its employees out of its onetime Global Operations Center at the Banks, and then a potential new buyer for an iconic Camp Washington building and new rules banning surface parking lots downtown. We finish, as all good things do, with a burger.Interview starts at (22:02). When you think of the yellow school bus, you probably don't think of innovation. First Student CEO John Kenning wants to change that, and he has the background for it. Tesla is the name that comes first to mind when thinking of electric vehicles, but Kenning wants his buses in that conversation. He talks about how he brings technology to the school bus industry, and why his company moved its headquarters to the GE building at the Banks and consolidated from five floors to one.Above the Fold is a podcast by the Cincinnati Business Courier.

The Allusionist
Apple Fest!

The Allusionist

Play Episode Listen Later Oct 22, 2023 41:22


All aboard, we're off to the 2023 Apple Festival at the University of British Columbia, to taste some apples and, most importantly, enjoy some apple names. And before that, we return to the classic Sporklusionist applesode to refresh our memory about how apple names are chosen - eponyms, portmanteaus, geography, or corporate R&D, just like how our ancestors named apples. Dan Pashman hosts The Sporkful podcast - head to the Sporkful podfeed or sporkful.com to listen to the companion episode where we learn about how new varietals of apples are made. Kate Evans, Kathryn Grandy and Joanna Crosby explain the history of apple names and the current process for coining new ones. My companions at the apple festival are Hannah McGregor of Material Girls podcast, and Martin Austwick of Neutrino Watch and Song By Song podcasts. Martin also provides the Allusionist music. Find out more about this episode and the topics therein, read the transcript, and see pictures of the apple festival at theallusionist.org/applefest. Become a member of the Allusioverse at theallusionist.org/donate and as well as keeping this independent podcast going, you get regular livestreams and watchalong parties - AND to hang out with your fellow Allusionauts in our delightful Discord community. You can also sign up for free to receive occasional email reminders about Allusionist stuff. The Allusionist's online home is theallusionist.org. Stay in touch via facebook.com/allusionistshow, instagram.com/allusionistshow, youtube.com/allusionistshow and twitter.com/allusionistshow. Our ad partner is Multitude. If you want me to talk lovingly and winningly about your product or thing, sponsor an episode: contact Multitude at multitude.productions/ads. This episode is sponsored by: • Ravensburger, the official supplier of jigsaw puzzles to the World Jigsaw Puzzle Championships!• Wildgrain, the subscription box for sourdough breads, fresh pastas, and artisanal pastries that you can cook from frozen in 25 minutes. Get $30 off your first box, PLUS free croissants in every box, when you start your subscription at Wildgrain.com/allusionist or use promo code ALLUSIONIST at checkout.• Bombas, whose mission is to make the comfiest clothes ever, and match every item sold with an equal item donated. Go to bombas.com/allusionist to get 20% off your first purchase. • Squarespace, your one-stop shop for building and running your online empire. Go to squarespace.com/allusionist for a free 2-week trial, and get 10 percent off your first purchase of a website or domain with the code allusionist.   Support the show: http://patreon.com/allusionistSee omnystudio.com/listener for privacy information.

KNDY News: Morning Edition Podcast
2905: Public Affairs: Dennis Kenning Discusses Steel City's 150th Celebration - 9/16/2023

KNDY News: Morning Edition Podcast

Play Episode Listen Later Sep 16, 2023 4:54


Public Affairs: Dennis Kenning Discusses Steel City's 150th Celebration - 9/16/2023

Biblioteca Del Metal
Def Leppard - (Las Edades Del Rock / New Wave Of British Heavy Metal) - Especial Fans - Episodio exclusivo para mecenas

Biblioteca Del Metal

Play Episode Listen Later Sep 8, 2023 76:45


Agradece a este podcast tantas horas de entretenimiento y disfruta de episodios exclusivos como éste. ¡Apóyale en iVoox! Colabora Con Biblioteca Del Metal: En Twitter - https://twitter.com/Anarkometal72 Y Donanos Unas Propinas En BAT. Para Seguir Con El Proyecto De la Biblioteca Mas Grande Del Metal. Muchisimas Gracias. La Tienda De Biblioteca Del Metal: Encontraras, Ropa, Accesorios,Decoracion, Ect... Todo Relacionado Al Podcats Biblioteca Del Metal Y Al Mundo Del Heavy Metal. Descubrela!!!!!! Ideal Para Llevarte O Regalar Productos Del Podcats De Ivoox. (Por Tiempo Limitado) https://teespring.com/es/stores/biblioteca-del-metal-1 Def Leppard es una banda británica de rock originaria de Sheffield, Reino Unido, que dio inicio a su carrera a finales de los años setenta, alcanzando gran éxito mundial en la década de los ochenta, acercando al heavy metal a las emisoras de radio y al gran público en general, gracias a una mezcla rara de hard rock melódico con un gran trabajo vocal. Junto a otras bandas como Bon Jovi, Van Halen, Mötley Crüe, Scorpions, Metallica, Guns N' Roses, Iron Maiden, etcétera, es reconocida como una de las bandas de heavy metal superventas de los años 1980.​Junto a grupos como Iron Maiden o Saxon fueron una de las bandas de cabecera de la New Wave of British Heavy Metal. Def Leppard ha vendido más de 100 millones de álbumes en todo el mundo, y dos de sus producciones han alcanzado la certificación de Diamante de la RIAA (Pyromania e Hysteria). De esta forma, se convirtieron junto a The Beatles, Pink Floyd, Van Halen y Led Zeppelin en uno de los cinco grupos de rock con dos álbumes de estudio originales con ventas por más de 10 millones de copias solo en los Estados Unidos y más de 20 en todo el mundo. La banda ocupa el número 31 del ranking de VH1 Los 100 mejores artistas de Hard Rock y el puesto número 70 en Los 100 artistas más grandes de todos los tiempos.​​ Su mayor éxito es la canción "Pour Some Sugar on Me", considerada por la cadena Vh1 la segunda mejor canción de los años 1980.​Sus conocidos e influyentes álbumes de estudio Pyromania e Hysteria han sido incluidos por la revista Rolling Stone en su lista de los 500 mejores álbumes de todos los tiempos según Rolling Stone. La propia revista Rolling Stone ha situado a Hysteria en la primera posición en su lista de los 50 mejores discos de glam metal de la historia.​ Han sido incluidos en el prestigioso Salón de la Fama del Rock and Roll en 2019. En el año 1977, el bajista Rick Savage, el guitarrista Pete Willis y el baterista Tony Kenning, todos ellos estudiantes de la escuela Tapton, de Sheffield, (Reino Unido), se unieron para formar una banda de rock a la que denominarían Atomic Mass. Inmediatamente, se uniría a ellos quien sería su vocalista, Joe Elliott, quien originalmente audicionó para ser el guitarrista de la agrupación.​ Durante su juventud, Savage fue considerado como un joven talento en el fútbol. Inclusive, fue seducido para unirse al Sheffield United, a pesar de ser fanático del equipo rival, el Sheffield Wednesday. Sin embargo, jugó unos años en el United, pero luego, elegiría tomar el camino de la música.Conformada la banda, adoptarían el nombre de Deaf Leopard (Leopardo Sordo) inspirados en una antigua idea de Elliott, pero luego, tomarían la sugerencia de Tony Kenning de modificarlo ligeramente a Def Leppard, con el fin de evitar que los conectaran con bandas de punk rock.​ Mientras perfeccionaban su sonido, ensayando en una fábrica de cucharas, la banda decidiría contratar a otro guitarrista, Steve Clark, en enero de 1978. Acto seguido, Kenning se retiraría, a finales del mismo año, justo antes de que entraran al estudio para grabar su primer Extended Play, sería reemplazado por Frank Noon, quien solamente estaría junto a la banda para la grabación de lo que se convertiría en el famoso Def Leppard EP.​ Las ventas de dicho EP se elevarían, gracias a la difusión del tema Getcha Rocks Off que daría el Dj de la BBC Radio John Peel, considerado en ese momento, como una autoridad en el punk rock y de la música new wave. Finalmente, en noviembre de 1978, se uniría a la banda, el baterista Rick Allen, que en ese entonces sólo contaba con 15 años de edad. En el transcurso del año 1979 la banda iría ganando una fiel fanaticada entre el público metalero del Reino Unido, y serían considerados como los líderes iniciales del movimiento denominado como New Wave Of British Heavy Metal, cediendo, con el paso del tiempo, ese puesto en favor de Iron Maiden. Esta popularidad emergente resultaría en un contrato discográfico con el sello Phonogram/Vertigo.​ Su álbum debut, On Through the Night, saldría al mercado el 14 de marzo de 1980. A pesar del éxito de su EP anterior y el éxito comercial de On Through The Night, los fanáticos de la banda rechazarían la clara intención del grupo de ingresar en el mercado estadounidense. Esto quedaría en evidencia en temas como Hello America. Tal sería el rechazo de los fanáticos británicos, que en el Festival de Reading el público daría la bienvenida a la banda arrojándole desechos al escenario.​​​ La banda capta la atención del productor Robert John “Mutt" Lange quien trabajaba con AC/DC. Este accedería a producir el segundo trabajo discográfico denominado como High 'N' Dry, el cual fue editado en 1981. Lange logró potenciar de muy buena manera las características de cada uno de los miembros de la agrupación. Este trabajo consiguió ventas más pobres que su predecesor, pero el vídeo de la canción Bringin’ On The Heartbreak fue uno de los primeros videos de heavy metal de 1982 emitidos en la cadena de televisión MTV. Esto le otorgó a la banda mucho reconocimiento en los Estados Unidos.​ Phil Collen, guitarrista de la banda glam rock llamada Girl, reemplaza a Pete Willis, quien fue despedido el 11 de julio de 1982 por problemas de alcoholismo. Esto ocurrió durante la grabación de su trabajo Pyromania, el cual saldría al mercado el 20 de enero de 1983. Este disco también fue producido por "Mutt" Lange. El primer sencillo Photograph convirtió a Def Leppard en una banda reconocida mundialmente. Además dominaron los charts estadounidenses durante seis semanas. Pyromania vendió más de 20 millones de discos en todo el mundo, incluidos más de 10 solo en los EE. UU. siendo certificado como Álbum de Diamante en ese país, y llevándolo al estatus de clásico de heavy metal.​ Por desgracia, el baterista Rick Allen pierde un brazo en un accidente automovilístico en el día de año nuevo de 1985, quedando la banda fuera de la escena musical hasta 1987.​ A finales de agosto de 1987 lanzan al mercado el álbum Hysteria, en el cual Rick Allen toca con un solo brazo una batería-caja de ritmos adaptada especialmente para su discapacidad. De este álbum, seis de sus siete singles alcanzan el top 20 estadounidense. Dicho álbum, junto con Thriller y Bad de Michael Jackson, y Born in the U.S.A. de Bruce Springsteen son los únicos álbumes que han logrado tener siete temas dentro del US Hot 100 Singles de los EE. UU. Hysteria ha vendido más de 20 millones de copias en todo el mundo.​ El 22 de agosto se lanza en el Reino Unido el primer sencillo denominado Animal, el cual llega al lugar 6 dentro del Top 10. El día 29 del mismo mes se lanza el álbum y debuta en el Reino Unido en el número 1, dando el éxito final al grupo en su tierra natal. Sorprendentemente en EE. UU., donde ya gozaban de una grandísima popularidad, no alcanza inmediatamente esta posición, alcanzando al principio el número 4. En relación con el lento ascenso en tierras estadounidenses, el 5 de septiembre el primer sencillo en EE. UU., Women, llega hasta el número 80. El 1 de octubre la banda comienza el tour en Glens Fall, Nueva York, donde se introduce el famoso escenario In The Round.​ El 3 de octubre se lanza en el Reino Unido el tema Pour Some Sugar On Me el cual llega hasta el puesto 18. El 5 de diciembre en Reino Unido aparece el tercer sencillo, Hysteria, que alcanza el puesto 26. El 26 de diciembre se lanza el sencillo Animal en los EE. UU. Se trata del primero de los seis singles del álbum que alcanzarán el Top 20. En este caso este tema alcanza el puesto 19 en la lista estadounidense.​ El 26 de marzo se lanza en EE. UU. el primer Top ten, Hysteria, alcanzando el número 10. El 16 de abril el tema Armageddon It llega al número 20 en el Reino Unido. El 5 de julio se lanza el video Historia que contiene todos los clips hasta la fecha desde los '80. Tiene también como un video conmemorativo de los 18 años del grupo. El 23 de julio se lanza Pour Some Sugar On Me, en EE. UU. y alcanza el puesto No. 2 tras Hold On To The Night de Richard Marx, siendo certificado con oro al alcanzar más de un millón de ventas en ese país. Al mismo tiempo, Hysteria lidera el US Album Chart (lista de álbumes en los Estados Unidos) después de 49 semanas. Es la primera vez que una banda de rock vende más de 5 millones de copias de dos álbumes consecutivos en los EE. UU. El 30 de julio la balada Love Bites llega al 11 en el Reino Unido. El 8 de diciembre se lanza el quinto sencillo en los EE. UU., Love Bites, que llega al 1 en la lista US Hot 100 Singles Chart e Hysteria alcanza el rango supremo de los US Album Charts. A finales de octubre finaliza el tour de 225 días, y la banda ingresa al estudio para grabar un nuevo disco con la promesa de que en 18 meses estará listo. De esta forma, pretenden evitar demorarse nuevamente otros cuatro años en editar un nuevo disco. El 8 de enero de 1991, su guitarrista líder Steve Clark, muere debido a la fatal combinación de medicamentos con alcohol.​ Posteriormente a esta época, y tras superar la muerte de Clark, sale a la venta en 1992 el álbum Adrenalize, nuevamente de gran éxito, (llegó al número 1 en EE. UU.) aunque de menor impacto comparado con su antecesor y esta vez con Vivian Campbell (ex Dio y Whitesnake) como guitarrista, en reemplazo del fallecido Clark. El disco ha vendido alrededor de 8 millones de copias a nivel mundial. A partir de ese momento, con la aparición del grunge, Def Leppard pierde la aceptación masiva que gozaba en los años 80's. En 1992 actúan en el Concierto en Tributo a Freddie Mercury, en el cual se rinde homenaje al fallecido vocalista de la agrupación inglesa Queen, de la que se han declarado fanáticos en muchas ocasiones los músicos de Def Leppard.​ La banda vuelve a la cima saliendo de gira y logrando un gran reconocimiento en su ciudad natal, Sheffield, Reino Unido, donde tocaron con entradas agotadas en el estado de Don Valley en junio de 1993. También para ese año el grupo lanza un nuevo trabajo, Retro Active, que contiene caras B remezcladas, y 2 nuevos temas Two Steps Behind (originalmente incluida como parte de la banda sonora de la película Last Action Hero de Arnold Schwarzenegger) y Miss You In A Heartbeat que logran ser hits en los Estados Unidos y Canadá. En este álbum evitan salir de gira y después de unas pequeñas vacaciones, la banda va a España a grabar su próximo trabajo. Con el séptimo álbum casi listo, lanzan un CD de Grandes éxitos llamado Vault, que contiene un nuevo tema llamado When Love & Hate Collide. El 5 de octubre de 1995, la ciudad natal de Def Leppard, Sheffield, les brinda un homenaje presentando una placa en su honor y abriendo el National Centre For Popular Music con material de la banda. Días después la banda logra un récord mundial tocando 3 shows en 3 continentes diferentes en sólo un día: Tánger, Marruecos, en (África); Londres, Reino Unido, en (Europa) y Vancouver, Canadá, (Norteamérica).​ En 1996, editan Slang, un álbum que marca una nueva dirección musical, con un sonido muy diferente a todo lo anterior, con gran influencia grunge, un sonido noventero más fresco y menos sobreproducido respecto a los discos anteriores. Comienzan un tour en Asia y se embarcan en una gira mundial llegando a Sudamérica por primera vez. Aunque Slang tuvo excelentes críticas de la prensa, no fue un éxito comercial. Las bajas ventas del disco fueron un aviso para la banda de que los fanáticos querían de vuelta el sonido característico de Def Leppard.​ A sabiendas de las solicitudes de su público para su noveno trabajo, Def Leppard retorna al sonido más roquero que supo tener en Pyromania e Hysteria. En 1999, lanzan el disco Euphoria, volviendo al sonido que los hizo conocidos y además contando con la colaboración nuevamente de Mutt Lange, que participa como co-compositor en tres de las 13 canciones del álbum. Para el verano de 1999 la banda sale nuevamente de gira en los Estados Unidos. Finalmente, en septiembre de 2000, Def Leppard es presentado por el guitarrista de Queen, Brian May, en una ceremonia homenajeando su inclusión en Rock Walk de Hollywood, California, EE. UU. Todos los miembros dejaron sus manos estampadas en cemento, junto con Lauren la hija de Rick Allen, y un espacio especial destinado a Steve Clark. El décimo disco de su carrera, se tituló X y salió al mercado en agosto de 2002. Se trata de un álbum bastante comercial en el que han trabajado con varios de los mejores productores del mundo y que mezcla el estilo de Slang con el de Adrenalize y Euphoria. Al igual que el anterior Euphoria, ha existido el grave problema de que la discográfica no ha prestado prácticamente apoyo a la banda, resultando una promoción pésima que ha influido gravemente en las ventas. A pesar de esto la agrupación realizó una exitosa gira promocional. En octubre de 2004, su discográfica ha lanzado al mercado Best Of Def Leppard, un álbum sencillo con 17 temas a modo de actualización del recopilatorio Vault que salió en 1995 y un CD Doble con 34 canciones, edición que salió para el resto del mundo (en Estados Unidos y Norteamérica, salió en 2005 Rock of Ages The Definitive Collection). En 2005 solo para Norteamérica, salió al mercado Rock of Ages The Definitive Collection, acompañado este disco de una gira compartida con Bryan Adams solo por Estados Unidos, también tuvieron presentaciones en Canadá y después de 8 años regresaron a México. A mediados del año 2006 Def Leppard saca al mercado un álbum de versiones de artistas de los años 60 y 70 que influyeron a la banda, y que se ha llamado Yeah!, con temas de David Bowie, Roxy Music, The Kinks, entre otros, que tenían grabado desde hace más de dos años y que por diversos motivos no pudieron lanzar anteriormente. En el verano de 2006 salen de gira compartiendo escenario con Journey, haciendo presentaciones en EE. UU., algunos conciertos en Europa y cerrando su gira en Puerto Rico. En julio de 2007, lanzan una edición especial de Hysteria remasterizada en dos CD, para conmemorar los 20 años de su salida al mercado. Lleva por título "Hysteria the Luxe Edición" que incluye, además, las caras B, versiones extendidas y canciones en vivo. Para el verano de 2007, salen de gira nuevamente, acompañados por Styx, Reo Speedwagon y Cheap Trick, al mismo tiempo fueron preparando su nuevo disco, Songs from the Sparkle Lounge. Para 2008 sale el Álbum "Songs from the Sparkle Lounge" y la banda realiza un tour junto con la banda Whitesnake, donde recorren parte de Europa y el Reino Unido en junio.​ Su nuevo álbum Songs From The Sparkle Lounge, retorna a un sonido más roquero. El primer sencillo del disco es "Nine Lives", incluye la participación del cantautor country Tim McGraw. El segundo sencillo " C'mon C'mon" fue la canción con la que se promocionó la Temporada 2008 de la NHL. La banda con este último disco ha tenido bastante mejor apoyo mediático que sus antecesores de esta década, esto es ayudado, entre otras cosas, con la aparición con tres temas para el popular videojuego Guitar Hero III. Tuvieron también a finales de 2008 una participación especial con Taylor Swift, en el programa CMT Crossroads que junta estrellas de música country con estrellas de rock o pop, interpretaron a dueto Photograph, When Love and Hate Collide, Hysteria y Pour Some Sugar on Me, así como algunas canciones de Taylor Swift.​ Para 2009, Bret Michaels, vocalista de Poison, anunció un tour en conjunto con Def Leppard y Cheap Trick, el cual empezó en junio y contempló 40 conciertos sólo para Estados Unidos. El 12 de junio de 2010 comenzaron su gira dando un concierto en el O2 de Dublín junto a Whitesnake y Journey.​ El 30 de octubre de 2015, la banda presenta su nuevo álbum de estudio titulado Def Leppard, que supone un cambio de discográfica y una búsqueda de su sonido característico. Tras un éxito notable de sus dos sencillos ("Let's Go" y "Dangerous"), el álbum alcanzó el puesto No. 10 en las listas generales y el primero en las de rock.​ En una entrevista, Joe Elliott afirmó que el disco se titularía Def Leppard porque es precisamente a lo que suena, a Def Leppard. El guitarrista Phil Collen afirmó que es el mejor trabajo desde Hysteria. El grupo se mostró orgulloso de las similitudes presentes en el álbum con Queen y Led Zeppelin.​ Por primera vez la banda experimenta con el sonido funk en la canción "Man Enough" (con un estilo similar a la canción "Another One Bites the Dust" de Queen). En la balada "We Belong" los cinco integrantes de la agrupación cantan en una misma canción por primera vez en su carrera. El disco generó una muy buena recepción en los fanáticos de la banda de Sheffield, siendo un poco más discreta por parte de la crítica, aunque mejorando las valoraciones de sus predecesores.​ Pagina Oficial: https://www.defleppard.com/Escucha este episodio completo y accede a todo el contenido exclusivo de Biblioteca Del Metal - (Recopilation). Descubre antes que nadie los nuevos episodios, y participa en la comunidad exclusiva de oyentes en https://go.ivoox.com/sq/308558

Relatos de Misterio y Suspense
#253 El maleficio de las runas de M. R. James

Relatos de Misterio y Suspense

Play Episode Listen Later Aug 22, 2023 63:24


El maleficio de las runas (Casting the Runes) es un relatos de terror del escritor inglés M.R. James, publicado en la antología de 1911: Más historias de fantasmas (More Ghost Stories). El maleficio de las runas, uno de los mejores cuentos de M.R. James, relata la historia de Edward Dunning, un investigador del Museo Británico que realiza una reseña desfavorable del último libro prohibido de un conocido ocultista, llamado Karswell. Poco después, Dunning comienza a ver el nombre de John Harrington en todas partes. Esto lo lleva a profundizar sobre esas supuestas casualidades. Finalmente, el erudito descubre que Harrington también realizó un estudio del libro maldito de Kenning, falleciendo en un extraño accidente poco después [ver: El horror táctil: análisis de «El Maleficio de las Runas» de M.R. James.] Al parecer, hay una extraña maldición o maleficio que gira en torno a ese libro prohibido, o, mejor dicho, sobre quienes se atreven a cuestionar sus misterios. A propósito, el escritor inglés H.R. Wakefield realizó un homenaje de esta historia de M.R. James en ¡Él viene y pasa! (He Cometh and He Passeth By!). Análisis de: El Espejo Gótico http://elespejogotico.blogspot.com/2009/03/el-maleficio-de-las-runas-mr-james.html Texto del relato extraído de: http://elespejogotico.blogspot.com/2009/03/el-maleficio-de-las-runas-mr-james.html Musicas: - 01. Mind Tricks - Experia (Epidemic) -02. Elephant Bazaar - Elvin Vanguard (Epidemic) Nota: Este audio no se realiza con fines comerciales ni lucrativos. Es de difusión enteramente gratuita e intenta dar a conocer tanto a los escritores de los relatos y cuentos como a los autores de las músicas. Escucha el episodio completo en la app de iVoox, o descubre todo el catálogo de iVoox Originals

Anchor Baptist-Dayton Ohio
Multiple Voices - Matthew 16.13 - Joe Kenning

Anchor Baptist-Dayton Ohio

Play Episode Listen Later Jul 24, 2023 22:09


https://anchorbaptist1611.com/camp-2023/

Invested In Climate
Climate investing past, present & future with Jenn Kenning, Ep #61

Invested In Climate

Play Episode Listen Later Jul 18, 2023 35:04


Most of our episodes go deep into specific opportunities to address climate change through new technologies, investment opportunities, advocacy, and policy. This episode takes a step back to look at climate and impact investing, how they've evolved in recent years, and where they're heading. Not only have climate and impact investing exploded in recent years, but they've also become more mature spaces with more opportunities, tools, nuances, and complexity. So I was thrilled to zoom out for this conversation and speak with a true pioneer and leader in this field, Jenn Kenning. Jenn is the Founder and CEO of Align Impact, an independent specialized impact and financial advisor to high-net-worth families, individuals, and foundations. Align is an Inc. 5000 company and Jenn is one of the most recognized voices in impact investing and wealth management. She was selected for Private Asset Management's “50 Most Influential Women in Private Wealth,” and her firm recently earned global recognition as one of the top 200 impact companies of 2023 by Real Leaders. So sit back and enjoy a true expert's take on climate investing past, present, and future. Here we go. In today's episode, we cover:[2:46] Jenn's background & work at Aligned Impact[4:00] How has mission-line investing changed over the years?[6:06] Examples of how intersectionality is creating opportunities for investors[9:16] How clients' investments compare today vs. in the past[11:48] Opportunities Jenn is most excited about in the climate tech space[14:33] Strategies that investors should & shouldn't consider[17:12] How is ESG playing out[21:48] The role of finance in accelerating our response to climate change: what's working & what needs to change[23:56] Systemic change & what it looks like when it's working [25:57] Gaps in finance AI[27:55] Why it's hard for individual advisors to weave climates or social priorities into portfolios[29:19] How retail investors can support changes & what else needs to happen[31:13] The future of climate investingResources MentionedAlign ImpactConnect with Jenn KenningConnect with Jenn on LinkedInConnect with Jason RissmanOn LinkedInOn TwitterKeep up with Invested In ClimateSign up for our NewsletterLinkedInInstagramTwitterHave feedback or ideas for future episodes, events, or partnerships?Get in touch!

Tell Me Something Podcast
VILL HOUSE PODCAST #127 - Derrick Kenning

Tell Me Something Podcast

Play Episode Listen Later Jun 5, 2023 89:56


Derrick Kenning is an Air Force veteran who recently retired after 21 years of service and is currently focused on his entrepreneurial endeavors. During his time in the Air Force, he served as a Munitions Systems Specialist and Military Training Instructor. He owns Jekyll & Hyde Performance and is a real estate investor. The man is constantly on the move looking for ways to improve his businesses and keeping an eye out for the next opportunity.

Minnesota Now
St. Cloud twins carry on family legacy at state wrestling tournament

Minnesota Now

Play Episode Listen Later Mar 15, 2023 8:38


Another year of Minnesota state high school wrestling champions have been crowned. Camryn Kenning took first in the girls 235-pound weight class, pinning each of her matches. But in a wrestling family like the Kennings, that win wasn't totally unexpected. Her twin brother, Jaxon, made his fifth trip to state this year. The two may have been the first set of boy-girl twins to appear in the Minnesota state wrestling tournament. The Kenning twins are juniors at St. Cloud Tech high school. They joined MPR News senior producer Melissa Townsend to talk about the tournament. Use the audio player above to listen to the full conversation.  Subscribe to the Minnesota Now podcast on Apple Podcasts, Google Podcasts, Spotify or wherever you get your podcasts.    We attempt to make transcripts for Minnesota Now available the next business day after a broadcast. When ready they will appear here.

The Fintech Scaling Show
Episode 142: Navigating Volatile Markets with Chris Kenning, Group CEO at Stubben Edge Group

The Fintech Scaling Show

Play Episode Listen Later Oct 3, 2022 31:58


It's been a tough couple of years for us all Just as we thought we were through the worst of the pandemic; we were hit with soaring energy costs and rising inflation. And we're now heading towards a full-on cost of living crisis. If we're not there already. Fintechs have been hit particularly hard But, how did we get there? How are fintech leaders dealing with the situation and what can be done to ease the pressure? In this episode, Richard and Chris Kenning, Group CEO of Stubborn Edge, take a look into the current economic challenges and provide insights & perspectives on how to navigate volatile markets. Episode Highlights: 1) How to navigate the systematic shift in macro trends  2) Why having a view and not a fixation on macro economic trends will help you forward plan 3) Why more M&A activity in the market is likely   Episode Resources Hidden Profit Zones: Download for free at https://www.scaleupconsulting.co.uk/sign-up/ Scaleup Diagnostic: https://scaleupconsulting.co.uk/#single/0 Guest Profile: https://www.linkedin.com/in/chris-kenning-2b38811a/ Guest Website: https://www.stubbenedge.com/    

Motherhood Through the Mysteries
The First Sorrowful Mystery: "We Shall Find Our Little Ones Again Up Above" by Jennifer Kenning

Motherhood Through the Mysteries

Play Episode Listen Later Jul 15, 2022 10:23


For more from Jenny visit simplicityeverafter.com In the following episodes we will walk with one another in sisterhood, through the blessings and lessons God offers us through the gift that is motherhood and discover the hope and faith that keeps us going and growing toward heaven. To share a story you love, find writer bios or to read the full collection, visit our website at motherhoodthroughthemysteries.com

Anchor Baptist-Dayton Ohio
Removing The Roots - 2 Corinthians 4.6-7 - Joe Kenning

Anchor Baptist-Dayton Ohio

Play Episode Listen Later Jul 13, 2022 20:25


Removing The Roots - 2 Corinthians 4.6-7 - Joe Kenning

Better Money Better World
#41 | Align Impact: Finding Impact for Clients from Master Limited Partnerships to Art Funds

Better Money Better World

Play Episode Listen Later Jun 1, 2022 40:12


Jennifer Kenning tells her inspiring story of founding Align Impact after struggling with severe depression which led her to volunteer with the homeless. These experiences led her to found Align Impact – a $2.3 Billion under advisement impact investing firm. Named 40 under 40 by Investment News and amongst the 50 most influential women in private wealth by Private Asset Management, Kenning believes that capitalism can be a force for good bringing people centered solutions to global issues ranging from climate change to education.

Craig Peterson's Tech Talk
Which Anti-Hacker Techniques Can You Use Against the Russian Hackers?

Craig Peterson's Tech Talk

Play Episode Listen Later Mar 26, 2022 84:29


Weekly Show #1158 We know the Russians have been attacking us. I've talked a lot about it on the radio and TV over the last couple of weeks. So I am doing something special; we are going through the things you can do to stay safe from the latest Russian attacks. Last week, we started doing something I promised we would continue -- how can you protect yourself when it comes to the Russians? The Russians are the bad guys when it comes to bad guys. So there are a few things you can do. And there are a few things; frankly, you shouldn't be doing. And that's precisely what we're going to talk about right now. Today, I explain: - How to protect your back-end - Preventative measures - The new rules of backing up your computer As usual, we'll cover the What, Why, and How's. [Automated transcript follows] [00:00:39] So last week he went over some steps, some things that you can look at that you should look at that are going to help protect you. And we are going to go into this a whole lot more today. And so I want you to stick around and if you miss anything, you can go online. You can go to Craig peterson.com, make sure you sign up there for my email. [00:01:01] And what I'm going to do for you is. Send you a few different documents now where we can chat back and forth about it, but I can send you this. Now I'm recording this on video as well as on audio. So you can follow along if you're watching either on YouTube or. Over on rumble and you can find it also on my website. [00:01:26] I've been trying to post it up there too, but right now let's talk about what we call passive backend protections. So you've got the front end and the front end of course, is. Stuff coming at you, maybe to the firewall I've mentioned last week about customers of mine. I was just looking at a few customers this week, just so I could have an idea of their firewalls. [00:01:52] And they were getting about 10 attacks per minute. Yeah. And these were customers who have requirements from the department of defense because they are defense sub subcontractors. So again, Potential bad guys. So I looked up their IP addresses and where the attacks were coming from. Now, remember that doesn't mean where they originated because the bad guys can hop through multiple machines and then get onto your machine. [00:02:22] What it means is that all, ultimately they ended up. Coming from one machine, right? So there's an IP address of that machine. That's attacking my clients or are attacking my machines. That just happens all the time. A lot of scans, but some definite attacks where they're trying to log in using SSH. [00:02:42] And what I found is these were coming from Slovakia, Russia, and Iran. Kind of what you were expecting, right? The Iranians, they just haven't given up yet. They keep trying to attack, particularly our military in our industry. One of the things we found out this week from, again, this was an FBI notice is that the Russians have been going after our industrial base. [00:03:09] And that includes, in fact, it's more specifically our automobile manufacturers we've already got problems, right? Try buying a new car, try buying parts. I was with my friend, just this. I helped them because he had his car right. Need to get picked up. So I took him over to pick up his car and we chatted a little bit with this small independent automotive repair shop. [00:03:34] And they were telling us that they're getting sometimes six, eight week delays on getting parts and some parts. They just can't. So they're going to everything from junkyards on out, and the worst parts are the parts, the official parts from the car manufacturers. So what's been happening is Russia apparently has been hacking into these various automobile manufacturers and automobile parts manufacturers. [00:04:03] And once they're inside, they've been putting in. A remote control button net. And those botnets now have the ability to wake up when they want them to wake up. And then once they've woken up, what do they do? Who knows? They've been busy erasing machines causing nothing, but having they've been doing all kinds of stuff in the past today, they're sitting there. [00:04:24] Which makes you think they're waiting, it's accumulate as much as you possibly can. And then once you've got it all accumulated go ahead and attack. So they could control thousands of machines, but they're not just in the U S it's automobile manufacturers in Japan. That we found out about. [00:04:44] So that's what they're doing right now. So you've got the kind of that front end and back end protections. So we're going to talk a little bit about the back end. What does that mean? When a cybersecurity guy talks about the backend and the protections. I got it up on my green right now, but here's the things you can do. [00:05:03] Okay. Remember, small businesses are just getting nailed from these guys, because again, they're fairly easy targets. One change your passwords, right? How many times do we have to say that? And yet about 70% of businesses out there are not using a good password methodology. If you want more information on passwords, two factor authentication, you name it. [00:05:30] Just email me M e@craigpeterson.com. I want to get the information out now. You got to make sure that all of the passwords on your systems are encrypted are stored in some sort of a good password vault as you really should be looking at 256 bit encryption or better. I have a vendor of. That I use. So if you get my emails every week, when them, there's the little training. [00:05:59] And so I'll give you a five minute training. It's written usually it's in bullet point for, I'm just trying to help you understand things. That provider of mine has a big database and there's another provider that I use that is for. So the training guys use the database of my provider. [00:06:20] In using that database, they're storing the passwords and the training providers putting passwords in the clinics. Into the database, which is absolutely crazy. So again, if you're a business, if you're storing any sort of personal information, particularly passwords, make sure that you're using good encryption and your S what's called salting the hash, which means. [00:06:46] You're not really storing the password, just joining assaulted hash. I can send you more on this. If you are a business and you're developing software that's, this is long tail stuff here. Configure all of the security password settings so that if someone's trying to log in and is failing that, and you block it, many of us that let's say you're a small business. [00:07:08] I see this all of the time. Okay. You're not to blame. You, but you have a firewall that came from the cable company. Maybe you bought it at a big box retailer. Maybe you bought it online over at Amazon, as hurricane really great for you. Has it got settings on there that lets you say. There's 20 attempts to log in. [00:07:31] Maybe we should stop them. Now, what we do personally for our customers is typically we'll block them at somewhere around three or four failed attempts and then their passwords block. Now you can configure that sort of thing. If you're using. Email. And that's an important thing to do. Let me tell you, because we've had some huge breaches due to email, like Microsoft email and passwords and people logging in and stealing stuff. [00:07:59] It was just a total nightmare for the entire industry last year, but limit the number of login retries as well as you're in there. These excessive login attempts or whatever you want to define it as needs to lock the account. And what that means is even if they have the right password, they can't get in and you have to use an administrative password in order to get in. [00:08:25] You also want to, what's called throttle, the rate of repeated logins. Now you might've gotten caught on this, right? You went to your bank, you went to E-bay, you went to any of these places and all of a sudden. And denied you write it blocked you. That can happen when your account is on these hackers lists. [00:08:45] You remember last week we talked about password spraying while that's a very big deal and hackers are doing the sprain trick all of the time, and that is causing you to get locked out of your own account. So if you do get locked out, remember it might be because someone's trying to break. Obviously you have to enforce the policies. [00:09:09] The capture is a very good thing. Again, this is more for software developer. We always recommend that you use multifactor or two factor authentication. Okay. Do not use your SMS, your text messages for that, where they'll send you a text message to verify who you are. If you can avoid that, you're much better off. [00:09:30] Cause there's some easy ways to get around that for hackers that are determined. Okay. A multi-factor again, installed an intrusion. system. We put right at the network edge and between workstations and servers, even inside the network, we put detection systems that look for intrusion attempts and block intrusion attempts. [00:09:56] A very important use denied lists to block known attackers. We build them automatically. We use some of the higher end Cisco gates. Cisco is a big network provider. They have some of the best hardware and software out there, and you have to subscribe to a lot of people complain. I ain't going to just go buy a firewall for 200 bucks on Amazon. [00:10:18] Why would I pay that much a month just to to have a Cisco firewall? And it's like praying pain for the brand. I've got by logo chert on here. Oh, I wouldn't pay for that. No, it's because they are automatically providing block lists that are updated by the minute sometimes. And then make sure you've got an incident response plan in place. [00:10:44] What are you going to do when they come for you? What are you going to do? Bad boys. Bad. Stick around. We've got a lot more to talk about here as we go. I am explaining the hacks that are going on right now and what you can do as a business and an individual doubt. Protect yourself. Don't go anywhere. [00:11:07] Now we're going to talk about prevention. What can you do an order to stop some of these attacks that are coming from Russia and from other countries, it is huge. People. Believe me, this is a very big problem. And I'm here to help. [00:11:23] hi, I'm Craig Peter Sohn, your chief information security officer. We've reviewed a number of things that are important when it comes to your cyber security and your protection. [00:11:37] We talked about the front end. We talked about the backend. Now we're going to talk about pure prevention and if you're watching. Online. You'll be able to see my slides as they come up, as we talk about some of this stuff and you'll find me on YouTube and you'll also find me on rumble, a fairly new platform out there platform that doesn't censor you for the things you say. [00:12:01] Okay. So here we go. First of all, enabling your active directory password protection is going to. Four's password protection all the way through your business. Now I've had some discussions with people over the months, over the years about this whole thing and what should be done, what can be done, what cannot be done. [00:12:26] Hey, it's a very big deal when it comes to password protection and actor directory, believe it or not, even though it's a Microsoft product is pretty darn good at a few things. One of them is. Controlling all the machines and the devices. One of the things we do is we use an MDM or what used to be a mobile device manager called mass 360. [00:12:51] It's available from IBM. We have a special version of that allows us as a managed security services provider to be able to control everything on people's machines. Active directory is something you should seriously consider. If you are a Mac based shop. Like I am. In fact, I'm sitting right now in front of two max that I'm using right now, you'll find that active directory is a little bit iffy. [00:13:21] Sometimes for max, there are some work around and it's gotten better mastery. 60 is absolutely the way to go, but make sure you've got really good. Passwords and the types of passwords that are most prone to sprain the attacks are the ones you should be banning specifically. Remember the website? Have I been poned? [00:13:45] Yeah. It's something that you should go to pretty frequently. And again, if you miss anything today, just email me M e@craigpeterson.com. Believe me, I am not going to harass you at all. Okay. Now, the next thing that you should be doing is what's called red team blue team. Now the red team is a group of people, usually outside of your organization. [00:14:11] If you're a big company they're probably inside, but the red team is the team that attacks you. They're white hat hackers, who are attacking you, looking for vulnerabilities, looking for things that you should or shouldn't be doing. And then the blue team is the side that's trying to defend. So think of, like war games. [00:14:29] Remember that movie with Matthew Broderick all of those decades ago and how the, he was trying to defend that computer was trying to defend that it moved into an attack mode, right? Red team's attack, blue team is defend. So you want. To conduct simulated attacks. Now w conducting these attacks include saying, oh my let's now put in place and execute our plan here for what are we going to do once we have a. [00:15:01] And you darn well better have a breach plan in place. So that's one of the things that we help as a fractional chief information security officer for companies, right? You've got to get that in place and you have to conduct these simulated attacks and you have to do penetration testing, including password spraying attacks. [00:15:21] There's so many things you can do. The one of the things that we like to do and that you might want to do, whether you're a home user, retiree or a business is go and look online, you can just use Google. I use far more advanced tools, but you can use Google and look for your email address right there. [00:15:40] Look for the names of people inside your organization. And then say wait a minute, does that data actually need to be there? Or am I really exposing the company exposing people's information that shouldn't be out there because you remember the hackers. One of the things they do is they fish you fish as in pH. [00:16:04] So they'll send you an email that looks like. Hey let me see. I know that Mary is the CFO, and I know that Joe's going to be out of town for two weeks in The Bahamas, not a touch. So while he's got. I'm going to send an email to Mary, to get her to do something, to transfer the company's funds to me. [00:16:23] Okay. So that's what that's all about. You've got to make sure, where is our information? And if you go to my company's page, mainstream.net, you'll see on there that I don't list any of the officers or any of the people that are in the company, because that again is a security problem. [00:16:41] We're letting them know. I go to some of these sites, like professional sites lawyers, doctors, countenance, and I find right there all, are there people right there top people or sometimes all of them. And then we'll say, yeah, I went to McGill university, went to Harvard, whatever my B. It's all there. So now they've got great information to fish you, to fish that company, because all they have to do is send an email to say, Hey, you remember me? [00:17:13] We're in Harvard when this class together. And did you have as a professor to see how that works? Okay. You also want to make. That you implement, what's called a passwordless user agent, and this is just so solely effective. If they cannot get into your count, what's going to, what could possibly go wrong, but one of the ways to not allow them into the count is to use. [00:17:41] Biometrics. We use something called duo and we have that tied into the single sign-on and the duo single sign-on works great because what it does now is I put in, I go to a site, I put it into my username and. Pulls up a special splash page that is running on one of our servers. That again asks me for my duo username. [00:18:04] So I've got my username for the site then to my dual username and my duo password single sign on. And then it sends me. To an app on my smart device, a request saying, Hey, are you trying to log into Microsoft? And w whatever it might be at Microsoft, and you can say yes or no, and it uses biometric. [00:18:27] So those biometrics now are great because it says, oh, okay, I need a face ID or I need a thumb print, whatever it might be that allows a generalized, a password, less access. Okay. Password less. Meaning no pass. So those are some of the top things you can do when it comes to prevention. And if you use those, they're never going to be able to get at your data because it's something you have along with something, it works great. [00:19:02] And we like to do this. Some customers. I don't like to go through those hoops of the single sign-on and using duo and making that all work right where we're fine with it. We've got to keep ourselves, at least as secure as the DOD regulations require unlike almost anybody else in industry, I'm not going to brag about it. [00:19:26] But some of our clients don't like to meet the tightest of controls. And so sometimes they don't. I hate to say that, but they just don't and it's a fine line between. Getting your work done and being secure, but I think there's some compromises it can be readily made. We're going to talk next about saving your data from ransomware and the newest ransomware. [00:19:53] We're going to talk about the third generation. That's out there right now. Ransomware, it's getting crazy. Let me tell ya and what it's doing to us and what you can do. What is a good backup that has changed over the last 12 months? It's changed a lot. I used to preach 3, 2, 1. There's a new sheriff in town. [00:20:15] Stick around Craig peterson.com. [00:20:19] 3, 2, 1 that used to be the standard, the gold standard for backing up. It is no longer the case with now the third generation of ransomware. You should be doing something even better. And we'll talk about it now. [00:20:36] We're doing this as a simulcast here. It's on YouTube. It is also on rumble. [00:20:43] It's on my website@craigpeterson.com because we're going through the things that you can do, particularly if you're a business. To stop the Russian invasion because as we've been warned again and again, the Russians are after us and our data. So if you missed part of what we're talking about today, or. [00:21:07] Last week show, make sure you send me an email. me@craigpeterson.com. This is the information you need. If you are responsible in any way for computers, that means in your home, right? Certainly in businesses, because what I'm trying to do is help and save those small businesses that just can't afford to have full-time. [00:21:31] True cyber security personnel on site. So that's what the whole fractional chief information security officer thing is about. Because you just, you can't possibly afford it. And believe me, that guy that comes in to fix your computers is no cyber security expert. These people that are attacking our full time cybersecurity experts in the coming from every country in the world, including the coming from the us. [00:22:01] We just had more arrests last week. So let's talk about ransomware correctly. Ransomware, very big problem. Been around a long time. The first version of ransomware was software got onto your computer through some mechanism, and then you had that red screen. We've all seen that red screen and it says, Hey, pay up buddy. [00:22:23] It says here you need to send so many Bitcoin or a fraction of a Bitcoin or so many dollars worth of Bitcoin. To this Bitcoin wallet. And if you need any help, you can send email here or do a live chat. They're very sophisticated. We should talk about it some more. At some point that was one generation. [00:22:45] One generation two was not everybody was paying the ransoms. So what did they do at that point? They said let me see if they, we can ransom the data by encrypting it and having them pay us to get it back. 50% of the time issue got all your data back. Okay. Not very often. Not often enough that's for sure. [00:23:05] Or what we could do is let's steal some of their intellectual property. Let's steal some of their data, their social security number, their bank, account numbers, et cetera. They're in a, in an Excel spreadsheet on their company. And then we'll, if they don't pay that first ransom, we'll tell them if they don't pay up, we'll release their information. [00:23:26] Sometimes you'll pay that first ransom and then they will hold you ransom a second time, pretending to be a different group of cyber terrorists. Okay. Number three, round three is what we're seeing right now. And this is what's coming from Russia, nears, everything we can tell. And that is. They are erasing our machines. [00:23:48] Totally erasing them are pretty sophisticated ways of erasing it as well, so that it sinks in really, it's impossible to recover. It's sophisticated in that it, it doesn't delete some key registry entries until right at the very end and then reboots and computer. And of course, there's. Computer left to reboot, right? [00:24:11] It's lost everything off of that hard drive or SSD, whatever your boot devices. So let's talk about the best ways here to do some of this backup and saving your data from ransomware. Now you need to use offsite disconnected. Backups, no question about it. So let's talk about what's been happening. [00:24:34] Hospitals, businesses, police departments, schools, they've all been hit, right? And these ransomware attacks are usually started by a person. I'll link in an email. Now this is a poison link. Most of the time, it used to be a little bit more where it was a word document, an Excel document that had something nasty inside Microsoft, as I've said, many times has truly pulled up their socks. [00:25:02] Okay. So it doesn't happen as much as it used to. Plus with malware defender turned on in your windows operating system. You're going to be a little bit safer next step. A program tries to run. Okay. And it effectively denies access to all of that data. Because it's encrypted it. And then usually what it does so that your computer still works. [00:25:26] Is it encrypts all of you, like your word docs, your Excel docs, your databases, right? Oh, the stuff that matters. And once they've got all of that encrypted, you can't really access it. Yeah. The files there, but it looks like trash now. There's new disturbing trends. It has really developed over the last few months. [00:25:48] So in addition to encrypting your PC, it can now encrypt an entire network and all mounted drives, even drives that are marrying cloud services. Remember this, everybody, this is really a big deal because what will happen here is if you have let's say you've got an old driver G drive or some drive mounted off of your network. [00:26:14] You have access to it from your computer, right? Yeah. You click on that drive. And now you're in there and in the windows side Unix and max are a little different, but the same general idea you have access to you have right. Access to it. So what they'll do is any mounted drive, like those network drives is going to get encrypted, but the same thing is true. [00:26:36] If you are attaching a U S B drive to your company, So that USB drive, now that has your backup on it gets encrypted. So if your network is being used to back up, and if you have a thumb drive a USB drive, it's not really a thumb drive, right? There's external drive, but countered by USP hooked up. [00:27:02] And that's where your backup lives. Your. Because you have lost it. And there have been some pieces of software that have done that for awhile. Yeah. When they can encrypt your network drive, it is really going after all whole bunch of people, because everyone that's using that network drive is now effective, and it is absolutely. [00:27:27] Devastating. So the best way to do this is you. Obviously you do a bit of a local backup. We will usually put a server at the client's site that is used as a backup destiny. Okay. So that servers, the destination, all of the stuff gets backed up there. It's encrypted. It's not on the network per se. It's using a special encrypted protocol between each machine and the backup server. And then that backup servers data gets pushed off site. Some of our clients, we even go so far as to push it. To a tape drive, which is really important too, because now you have something physical that is by the way, encrypted that cannot be accessed by the attacker. [00:28:20] It's offsite. So we have our own data center. The, we run the, we manage the no one else has access to it is ours. And we push all of those backups offsite to our data center, which gives us another advantage. If a machine crashes badly, right? The hard disk fails heaven forbid they get ransomware. We've never had that happen to one of our clients. [00:28:46] Just we've had it happen prior to them becoming clients, is that we can now restore. That machine either virtually in the cloud, or we can restore it right onto a piece of hardware and have them up and running in four hours. It can really be that fast, but it's obviously more expensive than in some. [00:29:08] Are looking to pay. All right, stick around. We've got more to talk about when we come back and what are the Russians doing? How can you protect your small business? If you're a one, man, one woman operation, believe it. You've got to do this as well. Or you could lose everything. In fact, I think our small guys have even more to lose Craig peterson.com. [00:29:32] Backups are important. And we're going to talk about the different types of backups right now, what you should be doing, whether you're a one person, little business, or you are a, multi-national obviously a scale matters. [00:29:47] Protecting your data is one of the most important things you can possibly do. [00:29:53] I have clients who had their entire operating account emptied out, completely emptied. It's just amazing. I've had people pay. A lot of money to hackers to try and get data back. And I go back to this one lady over in Eastern Europe who built a company out of $45 million. By herself. And of course you probably heard about the shark tank people, right? [00:30:23] Barbara Cochran, how she almost lost $400,000 to a hacker. In fact, the money was on its way when she noticed what was going on and was able to stop it. So thank goodness she was able to stop it. But she was aware of these problems was looking for the potential and was able to catch it. How many of us are paying that much attention? [00:30:50] And now one of the things you can do that will usually kind of protect you from some of the worst outcomes. And when it comes to ransomware is to backup. And I know everybody says, yeah, I'm backing up. It's really rare. When we go in and we find a company has been backing up properly, it even happens to us sometimes. [00:31:15] We put them back up regimen in place and things seem to be going well, but then when you need the backup, oh my gosh, we just had this happen a couple of weeks ago. Actually this last week, this is what happened. We have. Something called an FMC, which is a controller from Cisco that actually controls firewalls in our customer's locations. [00:31:42] This is a big machine. It monitors stuff. It's tied into this ice server, which is. Looking for nastiness and we're bad guys trying to break in, right? It's intrusion detection and prevention and tying it into this massive network of a billion data points a day that Cisco manages. Okay. It's absolutely huge. [00:32:05] And we're running it in a virtual machine network. So we. Two big blade. Chassies full of blades and blades are each blade is a computer. So it has multiple CPU's and has a whole bunch of memory. It also has in there storage and we're using something that VMware calls visa. So it's a little virtual storage area network. [00:32:32] That's located inside this chassis and there are multiple copies of everything. So if a storage unit fails, you're still, okay. Everything stays up, it keeps running. And we have it set up so that there's redundancy on pond redundancy. One of the redundancies was to back it up to a file server that we have that's running ZFS, which is phenomenal. [00:32:56] Let me tell you, it is the best file system out there I've never ever had a problem with it. It's just crazy. I can send you more information. If you ever interested, just email me@craigpeterson.com. Anytime. Be glad to send you the open source information, whatever you need. But what had happened is. [00:33:13] Somehow the boot disk of that FMC, that, that firewall controller had been corrupted. So we thought, oh, okay, no problem. Let's look at our backups. Yeah, hadn't backed up since October, 2019. Yeah, and we didn't know it had been silently failing. Obviously we're putting stuff in place to stop that from ever happening again. [00:33:43] So we are monitoring the backups, the, that network. Of desks that was making up that storage area network that had the redundancy failed because the machine itself, somehow corrupted its file system, ext four file system right then are supposed to be corruptible, but the journal was messed up and it was man, what a headache. [00:34:07] And so they thought, okay, you're going to have to re-install. And we were sitting there saying, oh, you're kidding me. Reinstalling this FMC controller means we've got to configure our clients, firewalls that are being controlled from this FMC, all of their networks, all of their devices. We had to put it out. [00:34:23] This is going to take a couple of weeks. So because I've been doing this for so long. I was able to boot up an optics desk and Mount the file system and go in manually underneath the whole FMC, this whole firewall controller and make repairs to it. Got it repaired, and then got it back online. So thank goodness for that. [00:34:49] It happens to the best of us, but I have to say I have never had a new client where they had good backups. Ever. Okay. That, and now that should tell you something. So if you are a business, a small business, whatever it might be, check your backups, double check them. Now, when we're running backups, we do a couple of things. [00:35:14] We go ahead and make sure the backup is good. So remember I mentioned that we have. Backup server that sits onsite. Usually it depends on the size of the client. But sits onsite at the client's site. So it will perform the backup and then tries to actual restore of that backup to make sure it's good. [00:35:35] And we can even. Client, depending on what they want. So a higher level, if a machine goes down, let's say it catches fire, or disk explodes in it, or completely fails. We can actually bring that machine online inside our backup server or the customer. Yeah, how's that for fancy and bring it back online in just a matter of minutes instead of days or weeks. [00:36:04] So that's true too. If that machine had been a ransom had this data, you raised whatever might've happened to it. We can restore it now. We've never had to knock on wood, except when there was a physical problem with the machine and as. Starting from scratching it, that machine, the new machine online in four hours or less. [00:36:28] And it's really cool the way it works. If you like this stuff, man, it is great. Okay. Protecting your data. I'm rambling a little bit here. You need an archival service there's companies out there like iron mountain, you can at your local bank, depending on the bank. It ain't like it used to be, get a box, right? [00:36:50] A special box in the vault that you. The tapes and other things in nowadays there's cloud options, virtual tape backup options, which is a lot of what we use and we do. Okay. We also use straight cloud at the very bottom end again. It's not located on the network. It's up in the cloud. It's double encrypted. [00:37:13] It's absolutely the way to do now if you're going to have a backup and if that backup, you want to be secure, it must not be accessible. To the attacker, you've got to put some literal air space between your backups and the cyber criminals. It's called an air gap. So there's no way for them to get to it. [00:37:37] Okay. Now I want you to consider seriously using tape these a LTO. These linear tape drives. They've been around for a long time, but their cartridges you can pull in and out. And they're huge. They they're physically small, but they can hold terabytes worth of data. They're absolutely amazing. There's some great disk based backup systems as what we do. [00:38:02] Some of them are been around a long time and they can be quite reasonably. Price. All right. So it's something for you to consider, but you've got to have at least that air gap in order to make sure that you're going to be protected. What should you be looking for in a backup system? This is called 3, 2, 2 1, which means maintain at least three copies of your data store the backups on two different meters. [00:38:31] Store at least one of the copies at an offsite location store, at least one of the copies offline, and be sure to have verified backups without air. Okay. Does that sound a little complicated? 3, 2, 1, 1 0 is what it's called. Just to be 3, 2, 1. Now it's 3, 2, 1, 1 0. I can send you Karen put together a special report on this based on our research. [00:38:57] And I can share that with you. Absolutely free. Hey guys, if you want it, you got it. But you got to ask me, just email me M e@craigpeterson.com. This is absolutely essential. If you're a small business, a tiny business to do it this way. Let me tell you, okay, this is just huge. Physical backups should be stored off site. [00:39:19] I mentioned the bank fault. A lot of people just go ahead and take them home with. That might be a desk. It might be a tape. It can be a little bit complicated to do. And I've picked up customers that thought they were backing up. They were using a USB drive. They were putting it in due to flee every Monday. [00:39:41] And then every Wednesday, what happened? Every Wednesday they bring in Wednesdays desk and then they bring that disc home and then Thursday, they bring in the Thursday disc. And none of them had been working. Okay. So be very careful. All of your backups should be encrypted. We encrypted at the customer site and then we reencrypt it when we bring it over to us. [00:40:06] Okay. Keys are essential. Particularly if you're using a cloud-based backup, don't use the same keys across multiple backups. Very important there. You should have some good procedures that are well-documented test, test your restores because very frequently. We find they don't work. In fact, that's the number one problem, right? [00:40:30] If they had just tried to restore, even once from their backup, they would've known they had problems. And get those backups scheduled on a regular schedule. Okay. So there's a lot more offline backups and more that we can talk about another time, but this is important. If you want any help, send me an email, just put backups in the subject line. [00:40:55] I'll send you some stuff. Email me, M e@craigpeterson.com. Now I am more than glad to help. Pretty much anybody out there. I'm not going to help. What about blah, blah, Amir Putin. But anybody else I'll help, but you got to reach out. Okay. You listen here. And I know some of this stuff is over some of our heads, some of your heads, you're the best and brightest. [00:41:20] That's why you're listening and I'll help you out. I'll send you some information. That's going to get you on the right track. Me M e@craigpeterson.com. That's Craig Peterson, S O N have a great day. [00:41:35] We just got an email this week from a customer and they're saying, oh no, my email has been hacked. What does that mean was a really hacked, we're going to talk right now about email spoofing, which is a very big deal. [00:41:51] Emails spoofing is being a problem for a long time, really? Since the 1970s. I remember when I got my first spoofed email back in the eighties and they was really a little bit confusing. [00:42:05] I went into it more detail, of course, being a very technical kind of guy and looked behind the curtains, figured out what was going on. Just shook my head. I marveled at some people. Why would you do this sort of thing? The whole idea behind email spoofing is for you to receive an email, looks like it's from someone that it's not now, you've all seen examples of this. [00:42:30] Everybody has. And those emails that are supposedly from the bank, or maybe from Amazon or some other type of business or family friend, this is part of what we call social engineering, where the bad guys are using a little bit about what they know about you, or maybe another person in order to. Frankly, fool you. [00:42:54] That's what spoofing really is. There were a lot of email accounts that were hacked over the last what, 30, 40 years. And you might remember this people sending out an email saying, oh, my account got hacked because you just got emails. Back in the day, what people were trying to do is break into people's email accounts and then the bad guys after having broken in now knew everybody that was in the contact list from the account that was just broken into. [00:43:29] Now they know, Hey, listen, this person sends an email. Maybe I can just pretend I'm them. Days it, the same thing still happens. But now typically what you're seeing is a more directed attack. So a person might even look in that email account that they've broken into and poke around a little bit and find out, oh, okay. [00:43:52] So this person's account I just broken to is a purchasing manager at a big. So then they take the next step or maybe this tab after that and try and figure out. Okay, so now what do I do? Oh, okay. So really what I can do now is send fake purchase orders or send fake requests for money. I've seen in the past with clients that we've picked up because the email was acting strangely where a bad guy went ahead, found. [00:44:25] Invoices that have been sent out by the purchasing person and the send the invoices out and changed the pay to information on the invoice. So they took the PDFs that they found on the file server of the invoices went in and changed them, change the account that they wanted, the funds ACH into. And once they had that happen, they just sent the invoice out again saying overdue. [00:44:54] Off goes in the email and the company receives it and says, oh okay, I need to pay this invoice. Now. Sometimes it marked them overdue. Sometimes they didn't mark them overdue. I've seen both cases and now the money gets sent off and that invoice gets paid and then gets paid to the wrong person. [00:45:13] Or maybe they go ahead and they don't send the invoice out, but they just send a little notification saying, Hey, our account has changed. Make sure you. Direct all future payments to this account. Instead. Now you might be thinking wait a second here. Now they send this email out. It's going to go into a bank account. [00:45:33] I can recover the money while no, you can't. Because what they're doing is they are using mules. Now you've heard of meals before. He might've even seen that recent Clint Eastwood movie. I think it was called. But typically when we think of mules, as people we're thinking about people who are running drugs well, in this case, the bad guys use mules in order to move money around. [00:45:59] And now sometimes the people know what they're doing. The FBI has had some really great arrests of some people who were doing this, particularly out in California, some of them cleaned. Yeah. I didn't know what was happening. It was just somebody, asked me to send money. It's like the Nigerian scam where the Nigeria in the Nigerian scam, they say, Hey I'm, I'm Nigerian prince, you've heard of these things before. And I need to get my money out of the country. I need to place to put them. And so if you have a us account, I'm going to transfer money into it. You can keep a thousand dollars of that 5,000 and I'm going to wire in just as a fee. Thanks for doing this. I, this is so important and it's such a hurry and I'm going to send you the. [00:46:46] What they'll often do is send you a money order. It couldn't be a bank check, could be a lot of things, and then you go ahead and you cash it and oh, okay. Or cash just fine. And then you wire the $4,000 off to the bad guy. The bad guy gets the money and is off. Running in the meantime, your bank is trying to clear that bank check or that money order. [00:47:14] And they find out that there is no money there because frankly what might've happened? I, this is one I've seen, I'm telling you about a story w we helped to solve this problem, but I had taken out a real money order from a bank, and then they made copies of it. Basically, they just forged it. And so they forged a hundred copies of it. [00:47:36] So people thought they were getting a legitimate money order. And in some cases, the banks where the money order was, you mean deposited, did conf confirm it? They called up the source bank. Oh yeah. Yeah. That's a legit money order and then they all hit within a week or two. And now the, you are left holding the bag. [00:47:58] So that's one thing that happens. But typically with these mules, the money comes to them in that account. They are supposed to then take that money and put it in their PayPal account and send it off to the next. And it might try jump to through two or three different people, and then it ends up overseas and the bad guys have gotten so good at this and have the cooperation of some small countries, sometimes bigger countries that they actually own. [00:48:30] The bank overseas of the money ultimately gets transferred into. And of course there's no way to get the money back. It's a real. So with spoofing, they're trying to trick you into believing the emails from someone that you know, or someone that you can trust. Or as I said, maybe a business partner of some sort in most cases, it's some sort of a colleague, a vendor or a trusted brand. [00:48:58] And so they exploit the trust that you have, and they ask you to do something or divulge information. They'll try and get you to do something. So there's more complexity tax. Like the ones that I just explained here that are going after financial employees, there might be some, an accountant, a bookkeeper, or bill payer and receivables payables. [00:49:24] I've seen CFO attacks, but the really the spoofed email message looks legitimate on the surface. They'll use the legitimate logo of the company that they're trying to pretend that they're from. For instance, PayPal. Phishing attack. They have a spoofed email sender and typical email clients like you might be using for instance, on Microsoft outlook. [00:49:48] The sender address is shown on the message, but most of the time nowadays the mail clients hide the actual email address, or if you just glance at it, it looks legit. You've seen those before these forged email headers. Yeah, it gets to be a problem. Now we use some software from Cisco that we buy. [00:50:13] You have to buy. I think it's a thousand licenses at a time, but there were some others out there, Cisco again, by far the best and this, the software. Receives the email. So before it even ends up in the exchange server or somewhere else online, that email then goes through that Cisco server. They are comparing it to billions of other emails that they've seen, including in real time emails that are. [00:50:41] Right now. And they'll look at the header of the email message. You can do that as well. With any email client, you can look at the header, Microsoft and outlook calls, it view source. But if you look at the email header, you'll see received. Headers that are in there. So say, receive colon from, and they'll give a name of a domain and then you'll see another received header and give another name of a machine. [00:51:08] And it'll include the IP address might be IVF IPV four of your six, and you can then follow it all the way through. So what'll happen is partway through. You'll see, it took a hop that is. Not legitimate. That's where it comes in. Nowadays, if you have an email address for your business, man, a domain, you need to be publishing what are called SPF records. [00:51:37] And those SPF records are looked at there compared to make sure that the email is properly signed and is from. The correct sender. There's a SPF records. There's a mother's too, that you should have in place, but you'll see that in the headers, if you're looking in the header. So it gets pretty complicated. [00:51:59] The SPF, which is the sender policy framework is a security protocol standard. It's been around now for almost a decade. It's working in conjunction with what are called domain based message, authentication, reporting, and conformance. Heather's D mark headers to stop malware and phishing attacks. And they are very good if you use them properly, but unfortunately when I look, I would say it's still 95% of emails that are being sent by businesses are not using this email spoofing and protection. [00:52:35] So have a look at that and I can send you a couple articles on it. If you're in trusted Craig Peter sohn.com. [00:52:46] So we've established that email spoofing happens. What are the stats to this? And how can you further protect yourself from email spoofing? Particularly if you're not the technical type controlling DNS records, that's what's up right. [00:53:02] Everybody Craig Peter sawn here, your cybersecurity strategist. And you're listening to news radio, w G a N a M five 60 and 98.5 FM. Join me on the morning. Drive Wednesday mornings at 7 34. Of course in the am. There's so much going on in the cybersecurity world. It affects all of us. Now, I think back to the good old days 40 years ago where we weren't worried about a lot of this stuff, spoofing, et cetera. [00:53:36] But what we're talking about right now is 3.1 billion domain spoof. Emails sent every day. That's a huge thing. More than 90% of cyber attacks. Start with an email message. Email spoofing and phishing have had a worldwide impact costing probably $26 billion over the last five years. A couple of years ago, the FBI, this is 2019. [00:54:07] Reported that about a house. A million cyber attacks were successful. 24% of them were email-based and the average scam tricked users out of $75,000. Yeah. So it's no wonder so many people are concerned about their email and whether or not those pieces of email are really a problem for them. And then anybody else. [00:54:34] So a common attack that uses spoofing is CEO fraud, also known as business, email compromise. So this is where the attacker is spoofing or modifying, pretending to be a certain person that they're not they're impersonating an executive or owner, maybe of a business. And it targets. People in the financial accounting or accounts payable departments or even the engineering department. [00:55:01] And that's what happened with one of our clients this week. They got a very interesting spoofed email. So even when you're smart and you're paying attention, you can be tricked the Canadian city treasurer. Tricked into transferring a hundred grand from taxpayer funds, Mattel tricked into sending 3 million to an accountant, China, a bank in Belgium, tricked into sending the attackers 70 million Euro. [00:55:31] It happens and I have seen it personally with many businesses out there. So how do you protect yourself from email? Spoofing now, even with email security in place, there's some malicious email messages that are still going to get through to the inboxes. Now we're able to stop better than 96% of them just based on our stats. [00:55:54] In fact, it's very rare that one gets through, but here are some things you can do and watch out for whether you're an employee responsible for financial decisions, or maybe you're someone who is. Personal email at work. Here's some tricks here. So get your pencil ready. Number one, never click links to access a web. [00:56:19] Where you're asked to log in, always type in the official URL into your browser and authenticate on the browser. In other words, if you get an email from your bank or someone else, and there's a link in there to click that says, Hey oh man, here's some real problems. You got to respond right away. [00:56:42] Don't do that go to paypal.com or your bank or your vendor's site, just type it into your browser, even though you can hover over the email link and see what it is. Sometimes it can be perfectly legitimate and yet it looks weird. For instance, when I send out my emails that people subscribe to that right there on Craig peterson.com, the links are going to come from the people that handle my email lists for me, because I send out thousands of emails at a time to people that have asked to get those emails. [00:57:22] So I use a service and the services taking those links, modifying them somewhat in fact dramatically. And using that to make sure the delivery happened, people are opening it and that I'm not bothering you. So you can unsubscribe next step. You can, if you want to dig in more, look at the email headers. [00:57:45] Now they're different for every email client. If you're using outlook, you have to select the email, basically in the left-hand side. Okay. You're going to control, click on that email and we'll come up and you'll see something that says view source. So in the outlook world, they hide it from you. [00:58:06] If you're using a Mac and Mac mail, all you have to do is go to up in the menu bar email and view, header and cut off. There it is. I have many times in the past just left that turned on. So I'm always seeing the headers that reminds me to keep a look at those headers. So if you look in the header, And if the email sender is let me put it this way. [00:58:31] If the person who is supposed to have sent it to you is doing headers proper, properly. You're going to see. A received SPF section of the headers and right in there, you can look for a pass or fail and response, and that'll tell you if it's legit. So in other words, let's use PayPal as an example, PayPal has these records that it publishes that say all of our emails are going to come from this server or that server of. [00:59:04] And I do the same thing for my domains and we do the same thing for our clients domains. So it's something that you can really count on if you're doing it right, that this section of the headers. And that's why I was talking about earlier. If you have an email that your sending out from your domain and you don't have those proper headers in it, there's no way. [00:59:31] To truly authenticate it. Now I go a step further and I use GPG in order to sign most of my emails. Now I don't do this for the trainings and other things, but direct personal emails from me will usually be cryptographically signed. So you can verify that it was me that sent it. Another thing you can do is copy and paste the text, the body of that email into a search engine. [01:00:03] Of course I recommend duck go in most cases. And the chances are that frankly they've sent it to multiple people. That's why I was saying our Cisco based email filter. That's what it does, it looks for common portions of the body for emails that are known to be bad, be suspicious of email from official sources like the IRS, they're not going to be sending you email out of the blue most places. Aren't obviously don't open attachments from people that you don't. Special suspicious ones, particularly people we'll send PDFs that are infected. It's been a real problem. They'll send of course word docs, Excel docs, et cetera, as well. [01:00:54] And the more. I have a sense of urgency or danger. That's a part of the email should really get your suspicions up, frankly, because suggesting something bad is going to happen. If you don't act quickly, that kind of gets around part of your brain and it's the fight or flight, right? Hey, I gotta take care of this. [01:01:17] I gotta take care of this right away. Ah, and maybe you. So those are the main things that you can pay attention to. In the emails, if you are a tech person, and you're trying to figure this out, how can I make the emails safer for our company? You can always drop me an email as well. Me, M e@craigpeterson.com. [01:01:43] I can send you to a couple of good sources. I'll have to put together a training as well on how to do this, but as individually. At least from my standpoint, a lot of this is common sense and unfortunately the bad guys have made it. So email is something we can no longer completely trust. Spoofing is a problem. [01:02:05] As I said, we just saw it again this week. Thank goodness. It was all caught and stopped. The account was not. It was just a spoofed email from an account outside the organization that was act Craig peterson.com. Stick around. [01:02:24] The value of crypto coins has been going down lately quite a bit across the board, not just Bitcoin, but the amount of crypto mining and crypto jacking going on. That hasn't gone down much at all. [01:02:48] hi, I'm Craig Peter Sohn, your cyber security strategist. And you're listening to news radio, w G a N a M five 60 and FM nine. Point five, you can join me on the morning drive every Wednesday morning at 7 34, Matt and I go over some of the latest in news. You know about crypto coins, at least a little bit, right? [01:03:15] These are the things like Bitcoin and others that are obstensively private, but in reality, aren't that private. If you receive coins and you spend coins, you are probably trackable. And if you can't spend that, the crypto currencies, why even bother getting it in the first place. One of the big drivers behind the price of these crypto currencies has been criminal activity. [01:03:48] We've talked about that before. Here's the problem we're seeing more and more nowadays, even though the price of Bitcoin might go down 30%, which it has, and it's gone down in bigger chunks before. It does not mean that the bad guys don't want more of it. And what better way to mine, cryptocurrency then to not have to pay for. [01:04:15] So the bad guys have been doing something called crypto jacking. This is where criminals are using really ransomware like tactics and poisoned website to get your computer, even your smartphone to mine, cryptocurrencies for. No mining, a Bitcoin can cost as much in electric bills that are in fact more in electric bills. [01:04:43] Then you get from the value of the Bitcoin itself. So it's expensive for them to run it. Some countries like China have said, no, you're not doing it anymore because they're using so much electricity here in the U S we've even got crypto mining companies that are buying. Old power plant coal-fired or otherwise, and are generating their own electricity there locally in order to be able to mine cryptocurrencies efficiently, effectively so that they can make some profit from it. [01:05:18] It's really quite the world out there. Some people have complained about their smartphone getting really hot. Their battery only lasts maybe an hour and it's supposed to last all day. Sometimes what's happened is your smartphone has been hijacked. It's been crypto jacked. So your smartphone, they're not designed to sit there and do heavy computing all day long. [01:05:45] Like a workstation is even your regular desktop computer. Probably isn't. To be able to handle day long mining that has to happen. In fact, the most efficient way to do crypto mining of course is using specialized hardware, but that costs them money. So why not just crypto Jack? All right. There are two primary ways. [01:06:09] Hackers have been getting victims, computers to secretly mine. Cryptocurrencies one is to trick them into loading. Crypto mining code onto their computers. So that's done through various types of fishing, light tactics. They get a legitimate looking email that tricks people into clicking on a link and the link runs code. [01:06:30] Now what's interesting is you don't, even for cryptocurrency crypto jacket, you don't even have to download a program in. To have your computer start mining cryptocurrencies for the bad guys. They can use your browser to run a crypto mining script. And it runs in the background. As you work right, using up electricity, using up the CPU on your computer. [01:06:58] They also will put it into ads. They'll put it on a website and your browser goes ahead and runs the code beautifully. So they're really trying to maximize their returns. That's the basics of crypto jacking what's been particularly bad lately has been the hackers breaking into cloud account. And then using those accounts to mine cryptocurrency, one of the trainings that I had on my Wednesday wisdoms has to do with password stuffing and my Wednesday wisdoms, you can get by just subscribing to my email over there@craigpeterson.com. [01:07:44] But what happens here is they find your email address. They find. Password on one of these hacks that is occurred on the dark web. You weren't on the dark web, but your username or email address and password are there on the dark web. And then they just try it. So a big site like Amazon, or maybe it was your IBM also has cloud services can be sitting there running along very well, having fun. [01:08:16] Life's good. And. Then they go ahead and try your email address and password to try and break in. Now, you know how I keep telling everybody use a good password manager and this week I actually changed my opinion on password managers. So you know, that I really like the password manager that you can get from one password.com. [01:08:44] It really is fantastic. Particularly for businesses, various types of enterprises, one password.com. However, where I have changed is that some of these browsers nowadays, particularly thinking about Firefox Google Chrome safari, if you're particularly, if you're on a Mac, all have built in password managers that are actually. [01:09:09] Good. Now they check. Have I been poned, which is a site I've talked to you guys about for years. To make sure that your accounts are reasonably safe than not being found on the dark web, the new password that it came up with or that you want to use. They check that as well. Make sure it's not in use. So here's an example here. [01:09:32] This is a guy by the name of Chris. He lives out in Seattle, Washington, and he makes mobile apps for local publishers. Just this year, new year's day, he got an alert from Amazon web services. Now Amazon web services, of course, cloud service. They've got some really nice stuff, starting with light ship and going up from there, I've used various services from them for well, since they started offering the services over very many years and. [01:10:04] They allow you to have a computer and you can get whatever size computer you want to, or fraction of a computer. You want to, he got this alert because it said that he owed more than $53,000 for a month's worth of hosts. Now his typical Amazon bill is between a hundred and 150 bucks a month. My typical Amazon bell is now 50 to maybe $80 a month. [01:10:34] I cannot imagine getting a $53,000 bill from our friends at Amazon. So the poor guy was just totally freaking out, which is a very big deal. So I'm looking at an article from insider that you can find a business insider.com. They were able to confirm that, yes, indeed. He got this $53,000 bill from Amazon and yes, indeed. [01:11:00] It looks like his account had been hacked by cryptocurrency miners. So these guys can run up just incredibly large charges for the raw computing power. They need to produce some of these digital cryptocurrencies, like Bitcoin there's many others out there. But this isn't new. This is happening all of the time. [01:11:23] Google reported late last year, that 86% of account breaches on its Google cloud platform were used to perform cryptocurrency mining. So make sure you are using a good password manager that generates good passwords. And I have a special report on passwords. You can download it immediately when you sign up for. [01:11:48] My email, my weekly email newsletter@craigpeterson.com and it tells you what to do, how to do it. What is a good password? What the thinking is because it's changed on passwords, but do that and use two factor authentication. Multi-factor authentication as well. And I talk about that in that special report too. [01:12:11] And visit me online. Sign up right now. Craig Peter sohn.com. [01:12:17] We're moving closer and closer to completely automated cars, but we want to talk right now about car hacks, because there was an interesting one this week that has to do with Tesla. And we'll talk about some of the other hacks on car. [01:12:33] Connected cars are coming our way in a very big way. [01:12:38] We just talked about the shutdown of two G and 3g in our cars. We, it wasn't really our cars, right? Two G 3g. That was for our cell phones. That was. Years ago course now for four GLTE 5g, even 10 G is being used in the labs. Right now. It's hard to think about some of those older technologies, but they were being used and they were being used by cars, primarily for the navigation features. [01:13:13] Some cars use these data links, if you will, that are really on the cell phone network in order to do remote things like remote start. For instance, I have a friend who's Subaru. Of course was using that. And now she's got to do an upgrade on her car because that 3g technology is going away depending on the carrier, by the way, some of it's going away sooner. [01:13:40] Some of it's going away later, but it'll all be gone at the end of 2020. What are we looking at? As we look into the future, I'm really concerned. I don't want to buy one of these new cars at the same time as I do, because they are cool, but I don't want to buy one of those because of the real problem that we could have of what well of having that car. [01:14:07] I need an upgrade and not been able to do it. I watched a video of a guy who took a Tesla that hadn't been damaged badly in a flood, and it was able to buy it for cheap. Why? Because Tesla will not sell you new motors and a new batteries for a car like that. So he got the car for cheap. He found a Chevy Camaro that had been wrecked, but its engine and transmission were just fine. [01:14:37] He ripped everything out of the Tesla and went ahead after that, cause you got to clean that out, and water damage. You spray wash all to the inside. He got right down to the aluminum, everything that wasn't part of the core aluminum chassis was gone. And then he built it back up again. He managed to keep all of those Tesla systems working, that, that screen that you have upfront that does the temperature control, cruise maps, everything out. [01:15:09] He kept that it was able to work. The, automated stuff, cruise control type stuff. And now he had a very hot car that looked like a Tesla. He took it out to SEMA, which is pretty cool. I'd love to see that, but it was a Tesla with a big V8 gasoline engine in it. He's done a, quite a good job on it. [01:15:33] It was quite amazing to see it took them months. It was him and some of his buddies. These new cars are even more connected than my friend Subaru is they get downloads from the. Some of them are using Wi-Fi and 5g. Really one of the big promises of 5g is, Hey, our cars can talk to each other because now you can get a millisecond delay in going from one car to another versus what you have today, which can be a half a second or more, which can be the difference between having a rear end collision and being able to stop in time when it comes to these automated system. [01:16:15] So they are more connected. They connect to the wifi in your homes. They connect to obviously the 5g network, which is where things are going right now. But what's happening with the hackers because really what we're talking about, isn't a computer on wheels. Oh no. Dozens of computers inside that car and your car has a network inside of it and has had for many years, this can bus network and even fancier ones nowadays that connect all of your systems together. [01:16:50] So your entertainment system, for instance, is connected to this network. And that was used. You might remember a couple of years ago on a Chrysler product where the bad guy installed. Or using the thumb drive onto that entertainment system and had a reporter drive that car down the road. This is all known. [01:17:13] It was all controlled. And was able to the bad guy right there, the demonstration in this case, I guess you'd call them a white hat hacker. He drove that car right off the road while the reporter was trying to steer otherwise because cars nowadays don't have a direct linkage between anything in any. [01:17:36] That's why I love my 1980 Mercedes TESOL. You turn the steering wheel. It isn't act

Craig Peterson's Tech Talk
Do You Know How Hackers are Spoofing You? All About Email spoofing!

Craig Peterson's Tech Talk

Play Episode Listen Later Jan 29, 2022 84:50


Do You Know How Hackers are Spoofing You? All About Email spoofing! We just got an email this week from a customer and they're saying, "Oh no, my email has been hacked." What does that mean? Was it really hacked? We're going to talk right now about email spoofing, which is a very big deal. [Following is an automated transcript] [00:00:15] Email spoofing is being a problem for a long time, really? Since the 1970s. I remember when I got my first spoofed email back in the eighties and there was really a little bit of confusion. [00:00:30] I went into it more detail, of course, being a very technical kind of guy, and looked behind the curtains, figured out what was going on. Just shook my head. I marveled at some people. Why would you do this sort of thing? The whole idea behind email spoofing is for you to receive an email, looks like it's from someone that it's not now, you've all seen examples of this. [00:00:55] Everybody has. And those emails that are supposedly from the bank, or maybe from Amazon or some other type of business or family friend, this is part of what we call social engineering, where the bad guys are using a little bit about what they know about you, or maybe another person in order to. Frankly, fool you. [00:01:19] That's what spoofing really is. There were a lot of email accounts that were hacked over the last what, 30, 40 years. And you might remember these people sending out an email saying, oh, my account got hacked because you just got emails. Back in the day, what people were trying to do is break into people's email accounts and then the bad guys after having broken in now knew everybody that was in the contact list from the account that was just broken into. [00:01:54] Now they know, Hey, listen, this person sends an email. Maybe I can just pretend I'm them. Days it, the same thing still happens. But now typically what you're seeing is a more directed attack. So a person might even look in that email account that they've broken into and poke around a little bit and find out, oh, okay. [00:02:16] So this person's account is a purchasing manager at a big company. So then they take the next step or maybe this tab after that and try and figure out. Okay, so now what do I do? Oh, okay. So really what I can do now is send fake purchase orders or send fake requests for money. I've seen in the past with clients that we've picked up because the email was acting strangely where a bad guy went ahead, found. [00:02:49] Invoices that have been sent out by the purchasing person and the send the invoices out and changed the pay to information on the invoice. So they took the PDFs that they found on the file server of the invoices went in and changed them, change the account that they wanted, the funds ACH into. And once they had that happen, they just sent the invoice out again saying overdue. [00:03:18] Off goes in the email and the company receives it and says, oh okay, I need to pay this invoice. Now. Sometimes it marked them overdue. Sometimes they didn't mark them overdue. I've seen both cases and now the money gets sent off and that invoice gets paid and then gets paid to the wrong person. [00:03:38] Or maybe they go ahead and they don't send the invoice out, but they just send a little notification saying, Hey, our account has changed. Make sure you. Direct all future payments to this account. Instead. Now you might be thinking wait a second here. Now they send this email out. It's going to go into a bank account. [00:03:57] I can recover the money while no, you can't. Because what they're doing is they are using mules. Now you've heard of meals before. He might've even seen that recent Clint Eastwood movie. I think it was called. But typically when we think of mules, as people we're thinking about people who are running drugs well, in this case, the bad guys use mules in order to move money around. [00:04:24] And now sometimes the people know what they're doing. The FBI has had some really great arrests of some people who were doing this, particularly out in California, some of them cleaned. Yeah. I didn't know what was happening. It was just somebody, asked me to send money. It's like the Nigerian scam where the Nigeria in the Nigerian scam, they say, Hey I'm, I'm Nigerian prince, you've heard of these things before. And I need to get my money out of the country. I need to place to put them. And so if you have a us account, I'm going to transfer money into it. You can keep a thousand dollars of that 5,000 and I'm going to wire in just as a fee. Thanks for doing this. I, this is so important and it's such a hurry and I'm going to send you the. [00:05:11] What they'll often do is send you a money order. It couldn't be a bank check, could be a lot of things, and then you go ahead and you cash it and oh, okay. Or cash just fine. And then you wire the $4,000 off to the bad guy. The bad guy gets the money and is off. Running in the meantime, your bank is trying to clear that bank check or that money order. [00:05:38] And they find out that there is no money there because frankly what might've happened? I, this is one I've seen, I'm telling you about a story w we helped to solve this problem, but I had taken out a real money order from a bank, and then they made copies of it. Basically, they just forged it. And so they forged a hundred copies of it. [00:06:01] So people thought they were getting a legitimate money order. And in some cases, the banks where the money order was, you mean deposited, did conf confirm it? They called up the source bank. Oh yeah. Yeah. That's a legit money order and then they all hit within a week or two. And now the, you are left holding the bag. [00:06:22] So that's one thing that happens. But typically with these mules, the money comes to them in that account. They are supposed to then take that money and put it in their PayPal account and send it off to the next. And it might try jump to through two or three different people, and then it ends up overseas and the bad guys have gotten so good at this and have the cooperation of some small countries, sometimes bigger countries that they actually own. [00:06:54] The bank overseas of the money ultimately gets transferred into. And of course there's no way to get the money back. It's a real. So with spoofing, they're trying to trick you into believing the emails from someone that you know, or someone that you can trust. Or as I said, maybe a business partner of some sort in most cases, it's some sort of a colleague, a vendor or a trusted brand. [00:07:22] And so they exploit the trust that you have, and they ask you to do something or divulge information. They'll try and get you to do something. So there's more complexity tax. Like the ones that I just explained here that are going after financial employees, there might be some, an accountant, a bookkeeper, or bill payer and receivables payables. [00:07:48] I've seen CFO attacks, but the really the spoofed email message looks legitimate on the surface. They'll use the legitimate logo of the company that they're trying to pretend that they're from. For instance, PayPal. Phishing attack. They have a spoofed email sender and typical email clients like you might be using for instance, on Microsoft outlook. [00:08:13] The sender address is shown on the message, but most of the time nowadays the mail clients hide the actual email address, or if you just glance at it, it looks legit. You've seen those before these forged email headers. Yeah, it gets to be a problem. Now we use some software from Cisco that we buy. [00:08:38] You have to buy. I think it's a thousand licenses at a time, but there were some others out there, Cisco again, by far the best and this, the software. Receives the email. So before it even ends up in the exchange server or somewhere else online, that email then goes through that Cisco server. They are comparing it to billions of other emails that they've seen, including in real time emails that are. [00:09:06] Right now. And they'll look at the header of the email message. You can do that as well. With any email client, you can look at the header, Microsoft and outlook calls, it view source. But if you look at the email header, you'll see received. Headers that are in there. So say, receive colon from, and they'll give a name of a domain and then you'll see another received header and give another name of a machine. [00:09:33] And it'll include the IP address might be IVF IPV four of your six, and you can then follow it all the way through. So what'll happen is partway through. You'll see, it took a hop that is. Not legitimate. That's where it comes in. Nowadays, if you have an email address for your business, man, a domain, you need to be publishing what are called SPF records. [00:10:01] And those SPF records are looked at there compared to make sure that the email is properly signed and is from. The correct sender. There's a SPF records. There's a mother's too, that you should have in place, but you'll see that in the headers, if you're looking in the header. So it gets pretty complicated. [00:10:24] The SPF, which is the sender policy framework is a security protocol standard. It's been around now for almost a decade. It's working in conjunction with what are called domain based message, authentication, reporting, and conformance. Heather's D mark headers to stop malware and phishing attacks. And they are very good if you use them properly, but unfortunately when I look, I would say it's still 95% of emails that are being sent by businesses are not using this email spoofing and protection. [00:11:00] So have a look at that and I can send you a couple articles on it. If you're in trusted Craig Peterson.com. [00:11:07] So we've established that email spoofing happens. What are the stats to this? And how can you further protect yourself from email spoofing? Particularly if you're not the technical type controlling DNS records, that's what's up right now. [00:11:24] There's so much going on in the cybersecurity world. It affects all of us. Now, I think back to the good old days 40 years ago where we weren't worried about a lot of this stuff, spoofing, et cetera. [00:11:38] But what we're talking about right now is 3.1 billion domain spoof. Emails sent every day. That's a huge thing. More than 90% of cyber attacks. Start with an email message. Email spoofing and phishing have had a worldwide impact costing probably $26 billion over the last five years. A couple of years ago, the FBI, this is 2019. [00:12:09] Reported that about a house. A million cyber attacks were successful. 24% of them were email-based and the average scam tricked users out of $75,000. Yeah. So it's no wonder so many people are concerned about their email and whether or not those pieces of email are really a problem for them. And then anybody else. [00:12:36] So a common attack that uses spoofing is CEO fraud, also known as business, email compromise. So this is where the attacker is spoofing or modifying, pretending to be a certain person that they're not they're impersonating an executive or owner, maybe of a business. And it targets. People in the financial accounting or accounts payable departments or even the engineering department. [00:13:03] And that's what happened with one of our clients this week. They got a very interesting spoofed email. So even when you're smart and you're paying attention, you can be tricked the Canadian city treasurer. Tricked into transferring a hundred grand from taxpayer funds, Mattel tricked into sending 3 million to an accountant, China, a bank in Belgium, tricked into sending the attackers 70 million Euro. [00:13:33] It happens and I have seen it personally with many businesses out there. So how do you protect yourself from email? Spoofing now, even with email security in place, there's some malicious email messages that are still going to get through to the inboxes. Now we're able to stop better than 96% of them just based on our stats. [00:13:56] In fact, it's very rare that one gets through, but here are some things you can do and watch out for whether you're an employee responsible for financial decisions, or maybe you're someone who is. Personal email at work. Here's some tricks here. So get your pencil ready. Number one, never click links to access a web. [00:14:20] Where you're asked to log in, always type in the official URL into your browser and authenticate on the browser. In other words, if you get an email from your bank or someone else, and there's a link in there to click that says, Hey oh man, here's some real problems. You got to respond right away. [00:14:44] Don't do that go to paypal.com or your bank or your vendor's site, just type it into your browser, even though you can hover over the email link and see what it is. Sometimes it can be perfectly legitimate and yet it looks weird. For instance, when I send out my emails that people subscribe to that right there on Craig peterson.com, the links are going to come from the people that handle my email lists for me, because I send out thousands of emails at a time to people that have asked to get those emails. [00:15:24] So I use a service and the services taking those links, modifying them somewhat in fact dramatically. And using that to make sure the delivery happened, people are opening it and that I'm not bothering you. So you can unsubscribe next step. You can, if you want to dig in more, look at the email headers. [00:15:47] Now they're different for every email client. If you're using outlook, you have to select the email, basically in the left-hand side. Okay. You're going to control, click on that email and we'll come up and you'll see something that says view source. So in the outlook world, they hide it from you. [00:16:07] If you're using a Mac and Mac mail, all you have to do is go to up in the menu bar email and view, header and cut off. There it is. I have many times in the past just left that turned on. So I'm always seeing the headers that reminds me to keep a look at those headers. So if you look in the header, And if the email sender is let me put it this way. [00:16:33] If the person who is supposed to have sent it to you is doing headers proper, properly. You're going to see. A received SPF section of the headers and right in there, you can look for a pass or fail and response, and that'll tell you if it's legit. So in other words, let's use PayPal as an example, PayPal has these records that it publishes that say all of our emails are going to come from this server or that server of. [00:17:06] And I do the same thing for my domains and we do the same thing for our clients domains. So it's something that you can really count on if you're doing it right, that this section of the headers. And that's why I was talking about earlier. If you have an email that your sending out from your domain and you don't have those proper headers in it, there's no way. [00:17:33] To truly authenticate it. Now I go a step further and I use GPG in order to sign most of my emails. Now I don't do this for the trainings and other things, but direct personal emails from me will usually be cryptographically signed. So you can verify that it was me that sent it. Another thing you can do is copy and paste the text, the body of that email into a search engine. [00:18:05] Of course I recommend duck go in most cases. And the chances are that frankly they've sent it to multiple people. That's why I was saying our Cisco based email filter. That's what it does, it looks for common portions of the body for emails that are known to be bad, be suspicious of email from official sources like the IRS, they're not going to be sending you email out of the blue most places. Aren't obviously don't open attachments from people that you don't. Special suspicious ones, particularly people we'll send PDFs that are infected. It's been a real problem. They'll send of course word docs, Excel docs, et cetera, as well. [00:18:56] And the more. I have a sense of urgency or danger. That's a part of the email should really get your suspicions up, frankly, because suggesting something bad is going to happen. If you don't act quickly, that kind of gets around part of your brain and it's the fight or flight, right? Hey, I gotta take care of this. [00:19:19] I gotta take care of this right away. Ah, and maybe you. So those are the main things that you can pay attention to. In the emails, if you are a tech person, and you're trying to figure this out, how can I make the emails safer for our company? You can always drop me an email as well. Me, M e@craigpeterson.com. [00:19:45] I can send you to a couple of good sources. I'll have to put together a training as well on how to do this, but as individually. At least from my standpoint, a lot of this is common sense and unfortunately the bad guys have made it. So email is something we can no longer completely trust. Spoofing is a problem. [00:20:07] As I said, we just saw it again this week. Thank goodness. It was all caught and stopped. The account was not. It was just a spoofed email from an account outside the organization that was act Craig peterson.com. Stick around. [00:20:26]  [00:20:26] The value of crypto coins has been going down lately quite a bit across the board, not just Bitcoin, but the amount of crypto mining and crypto jacking going on. That hasn't gone down much at all. [00:20:50] hi, I'm Craig Peter Sohn, your cyber security strategist. And you're listening to news radio, w G a N a M five 60 and FM nine. Point five, you can join me on the morning drive every Wednesday morning at 7 34, Matt and I go over some of the latest in news. You know about crypto coins, at least a little bit, right? [00:21:18] These are the things like Bitcoin and others that are obstensively private, but in reality, aren't that private. If you receive coins and you spend coins, you are probably trackable. And if you can't spend that, the crypto currencies, why even bother getting it in the first place. One of the big drivers behind the price of these crypto currencies has been criminal activity. [00:21:50] We've talked about that before. Here's the problem we're seeing more and more nowadays, even though the price of Bitcoin might go down 30%, which it has, and it's gone down in bigger chunks before. It does not mean that the bad guys don't want more of it. And what better way to mine, cryptocurrency then to not have to pay for. [00:22:18] So the bad guys have been doing something called crypto jacking. This is where criminals are using really ransomware like tactics and poisoned website to get your computer, even your smartphone to mine, cryptocurrencies for. No mining, a Bitcoin can cost as much in electric bills that are in fact more in electric bills. [00:22:45] Then you get from the value of the Bitcoin itself. So it's expensive for them to run it. Some countries like China have said, no, you're not doing it anymore because they're using so much electricity here in the U S we've even got crypto mining companies that are buying. Old power plant coal-fired or otherwise, and are generating their own electricity there locally in order to be able to mine cryptocurrencies efficiently, effectively so that they can make some profit from it. [00:23:20] It's really quite the world out there. Some people have complained about their smartphone getting really hot. Their battery only lasts maybe an hour and it's supposed to last all day. Sometimes what's happened is your smartphone has been hijacked. It's been crypto jacked. So your smartphone, they're not designed to sit there and do heavy computing all day long. [00:23:47] Like a workstation is even your regular desktop computer. Probably isn't. To be able to handle day long mining that has to happen. In fact, the most efficient way to do crypto mining of course is using specialized hardware, but that costs them money. So why not just crypto Jack? All right. There are two primary ways. [00:24:11] Hackers have been getting victims, computers to secretly mine. Cryptocurrencies one is to trick them into loading. Crypto mining code onto their computers. So that's done through various types of fishing, light tactics. They get a legitimate looking email that tricks people into clicking on a link and the link runs code. [00:24:32] Now what's interesting is you don't, even for cryptocurrency crypto jacket, you don't even have to download a program in. To have your computer start mining cryptocurrencies for the bad guys. They can use your browser to run a crypto mining script. And it runs in the background. As you work right, using up electricity, using up the CPU on your computer. [00:25:00] They also will put it into ads. They'll put it on a website and your browser goes ahead and runs the code beautifully. So they're really trying to maximize their returns. That's the basics of crypto jacking what's been particularly bad lately has been the hackers breaking into cloud account. And then using those accounts to mine cryptocurrency, one of the trainings that I had on my Wednesday wisdoms has to do with password stuffing and my Wednesday wisdoms, you can get by just subscribing to my email over there@craigpeterson.com. [00:25:46] But what happens here is they find your email address. They find. Password on one of these hacks that is occurred on the dark web. You weren't on the dark web, but your username or email address and password are there on the dark web. And then they just try it. So a big site like Amazon, or maybe it was your IBM also has cloud services can be sitting there running along very well, having fun. [00:26:19] Life's good. And. Then they go ahead and try your email address and password to try and break in. Now, you know how I keep telling everybody use a good password manager and this week I actually changed my opinion on password managers. So you know, that I really like the password manager that you can get from one password.com. [00:26:46] It really is fantastic. Particularly for businesses, various types of enterprises, one password.com. However, where I have changed is that some of these browsers nowadays, particularly thinking about Firefox Google Chrome safari, if you're particularly, if you're on a Mac, all have built in password managers that are actually. [00:27:12] Good. Now they check. Have I been poned, which is a site I've talked to you guys about for years. To make sure that your accounts are reasonably safe than not being found on the dark web, the new password that it came up with or that you want to use. They check that as well. Make sure it's not in use. So here's an example here. [00:27:34] This is a guy by the name of Chris. He lives out in Seattle, Washington, and he makes mobile apps for local publishers. Just this year, new year's day, he got an alert from Amazon web services. Now Amazon web services, of course, cloud service. They've got some really nice stuff, starting with light ship and going up from there, I've used various services from them for well, since they started offering the services over very many years and. [00:28:06] They allow you to have a computer and you can get whatever size computer you want to, or fraction of a computer. You want to, he got this alert because it said that he owed more than $53,000 for a month's worth of hosts. Now his typical Amazon bill is between a hundred and 150 bucks a month. My typical Amazon bell is now 50 to maybe $80 a month. [00:28:36] I cannot imagine getting a $53,000 bill from our friends at Amazon. So the poor guy was just totally freaking out, which is a very big deal. So I'm looking at an article from insider that you can find a business insider.com. They were able to confirm that, yes, indeed. He got this $53,000 bill from Amazon and yes, indeed. [00:29:02] It looks like his account had been hacked by cryptocurrency miners. So these guys can run up just incredibly large charges for the raw computing power. They need to produce some of these digital cryptocurrencies, like Bitcoin there's many others out there. But this isn't new. This is happening all of the time. [00:29:26] Google reported late last year, that 86% of account breaches on its Google cloud platform were used to perform cryptocurrency mining. So make sure you are using a good password manager that generates good passwords. And I have a special report on passwords. You can download it immediately when you sign up for. [00:29:50] My email, my weekly email newsletter@craigpeterson.com and it tells you what to do, how to do it. What is a good password? What the thinking is because it's changed on passwords, but do that and use two factor authentication. Multi-factor authentication as well. And I talk about that in that special report too. [00:30:13] And visit me online. Sign up right now. Craig Peterson.com. [00:30:18] We're moving closer and closer to completely automated cars, but we want to talk right now about car hacks, because there was an interesting one this week that has to do with Tesla. And we'll talk about some of the other hacks on cars. [00:30:34] Connected cars are coming our way in a very big way. [00:30:40] We just talked about the shutdown of two G and 3g in our cars. We, it wasn't really our cars, right? Two G 3g. That was for our cell phones. That was. Years ago course now for four GLTE 5g, even 10 G is being used in the labs. Right now. It's hard to think about some of those older technologies, but they were being used and they were being used by cars, primarily for the navigation features. [00:31:15] Some cars use these data links, if you will, that are really on the cell phone network in order to do remote things like remote start. For instance, I have a friend who's Subaru. Of course was using that. And now she's got to do an upgrade on her car because that 3g technology is going away depending on the carrier, by the way, some of it's going away sooner. [00:31:43] Some of it's going away later, but it'll all be gone at the end of 2020. What are we looking at? As we look into the future, I'm really concerned. I don't want to buy one of these new cars at the same time as I do, because they are cool, but I don't want to buy one of those because of the real problem that we could have of what well of having that car. [00:32:09] I need an upgrade and not been able to do it. I watched a video of a guy who took a Tesla that hadn't been damaged badly in a flood, and it was able to buy it for cheap. Why? Because Tesla will not sell you new motors and a new batteries for a car like that. So he got the car for cheap. He found a Chevy Camaro that had been wrecked, but its engine and transmission were just fine. [00:32:39] He ripped everything out of the Tesla and went ahead after that, cause you got to clean that out, and water damage. You spray wash all to the inside. He got right down to the aluminum, everything that wasn't part of the core aluminum chassis was gone. And then he built it back up again. He managed to keep all of those Tesla systems working, that, that screen that you have upfront that does the temperature control, cruise maps, everything out. [00:33:11] He kept that it was able to work. The, automated stuff, cruise control type stuff. And now he had a very hot car that looked like a Tesla. He took it out to SEMA, which is pretty cool. I'd love to see that, but it was a Tesla with a big V8 gasoline engine in it. He's done a, quite a good job on it. [00:33:35] It was quite amazing to see it took them months. It was him and some of his buddies. These new cars are even more connected than my friend Subaru is they get downloads from the. Some of them are using Wi-Fi and 5g. Really one of the big promises of 5g is, Hey, our cars can talk to each other because now you can get a millisecond delay in going from one car to another versus what you have today, which can be a half a second or more, which can be the difference between having a rear end collision and being able to stop in time when it comes to these automated system. [00:34:17] So they are more connected. They connect to the wifi in your homes. They connect to obviously the 5g network, which is where things are going right now. But what's happening with the hackers because really what we're talking about, isn't a computer on wheels. Oh no. Dozens of computers inside that car and your car has a network inside of it and has had for many years, this can bus network and even fancier ones nowadays that connect all of your systems together. [00:34:52] So your entertainment system, for instance, is connected to this network. And that was used. You might remember a couple of years ago on a Chrysler product where the bad guy installed. Or using the thumb drive onto that entertainment system and had a reporter drive that car down the road. This is all known. [00:35:16] It was all controlled. And was able to the bad guy right there, the demonstration in this case, I guess you'd call them a white hat hacker. He drove that car right off the road while the reporter was trying to steer otherwise because cars nowadays don't have a direct linkage between anything in any. [00:35:38] That's why I love my 1980 Mercedes TESOL. You turn the steering wheel. It isn't actually connected to the wheels to that front end of the car. All it's doing is telling the computer you want to turn and how much you want to turn that brake pedal. Doesn't actually. Compress hydraulics and cause the brakes to engage that fuel pedal doesn't actually move the throttle on the car. [00:36:03] The throttle is really being controlled and moved by the computers. So the car is completely electronic. It feels like a regular car, right? We're not talking about the Tesla's of today or tomorrow. We're talking about Volvos that have been sold for more than a decade. We're talking about a lot of different cars. [00:36:24] So now you have a platform on wheels that can be dangerous because it can be, in some cases, remotely controlled, it can have software that may be crashes. We know that part of the infrastructure quote, unquote bill, which contains almost no infrastructure. It's amazing how they named these things. Isn't it. [00:36:45] And what is it like 6% it actual infrastructure and the infrastructure bill? One of the things in there that is not infrastru. Is a demand, a law that says the car manufacturers have to include a remote. Button, if you will, so that a police officer could go ahead and say, okay, I'm pursuing this car and they're not stomping. [00:37:11] I don't want to risk people's lives. As this bad guy tries to elude me here in backstreets. Kids can get hit, et cetera. So they push the button and the car stops that all sounds great. The problem is that you could potentially be opening some security problems by having this remote stop button that can be used by anybody really right. [00:37:40] Since when is it going to be limited to just law enforcement? Isn't that a problem? According to Caren driver, I'm looking at their magazine right now. They're saying that there were at least 150 automotive cybersecurity incidents in twenty nineteen, a hundred and fifty incidents, part of a 94% year over year increase since 2016. [00:38:05] In other words, every year. The number of automotive, cybersecurity and incidences has doubled. And that's according to report from a company called upstream security. So we're lost. So looking at what w maybe ransomware for a car. So that your car gets hacked. You can't hack my 1980 Mercedes diesel. [00:38:28] It is impossible to hack into an unconnected car, but if you are driving a vehicle it's likely at risk from some sort of digital true. We've even seen from some of the bugs. We've seen cars from Japan that have decided to drive into the Jersey barrier because it misunderstands exactly what it is. We've seen cars from Tesla. [00:38:57] Drive right into the back of a parked fire truck mentioned doing that at speed, right? And cause a fire truck full of water, et cetera. I've actually seen that one happened personally. So the more sophisticated the system is, the more connected your vehicle is. The more exposed you are in Detroit free press has a great little article on that right now. [00:39:23] And in there he's saying we have taken. Whatever model car you think of. And we hack them through various places. I can control your steering. I can shut down and start your engine. Control your brakes, your doors, your wipers, open and close your. There's a lot of people who are trying to break into these cars. [00:39:46] And there's a lot of people who are trying to protect them. That hacker duo back in 2015, who took control of that Jeep Cherokee, just think about that sort of. There's an Israeli based automotive cybersecurity company who told the free press that he expects the current trend of hackers, holding digital data on computers for ransom to also move to cars. [00:40:12] So when this happens, the driver will not be able to start the vehicle until they pay off the rant. Or suffer the consequences, which could be wiping the cars systems operating systems could be Kenning the car to catch on fire. Think of what can happen with each generation with those batteries. [00:40:32] There's no way around it. You're going to have to get it towed and get all of the software reloaded in the company. And now this week, it comes out that in 19 year old kid said that he was able to hack into over 25 Teslas that he tried via a bug in a popular. It's an open source tool that people are using to link into their Teslas to do various types of remote control. [00:41:01] And he posted a tweet on this guy's name's David Colombo. You'll find them on Twitter, went viral and he reported the vulnerability to the people who are maintaining the software and they fixed it. In fact, the very same day and Tesla also pushed updates to their vehicle. That invalidated the signatures and the key exchanges that we're having. [00:41:28] So this is a 19 year old researcher. He's able to hack into cars in 13 countries, 38, 13 countries. Yeah. Worth of Teslas without the owner's knowledge. No, he says I, I can not. Doors, I can turn off the security system. I can open windows. I keyless start and things turn on the stereo, honk the horn view, the cars location, and if the driver was present, but he doesn't think he could actually move the vehicle remotely, but that's a 19 year old. [00:42:02] What's going to happen when we implement the law that was just passed that says our cars have to be remotely controllable by anybody basically. Yeah. It's scary. Hey, I want to invite you guys to take a minute, go to Craig peterson.com. Make sure you sign up for my newsletter there, and I'll keep you up to date on all of this stuff and you'll even get my show notes. [00:42:28] Craig peterson.com. [00:42:30] The hacker world got turned upside down this past week as Russian president Putin decided to crack down on the hackers. Now, this is a very big change for Russia. We're going to talk about my theories. Why did this happen? [00:42:56] hi, I'm Craig Peterson, your cyber security expert. And you're listening to news radio, w G a N a M five 60 and FM 98.5. Hey, you can join me. Wednesday morning, did 7 34 on the morning drive. As we keep you up to date, russian hackers have long been known to go after basically whoever they want. They have really gone after the United States and other Western company countries. [00:43:30] And as part of what they've been doing, they have been making a lot of money and keeping Vladimir Putin pretty darn happy. He's been a happy because they're bringing more. Into mother Russia, he's happy because they are causing confusion amongst Russia's competitors out there, particularly the United States. [00:43:55] But there's one thing that Putin has been absolutely steadfast. And that is not allowing any of the hackers to go and hack any of the countries that are part of their little pact over there. Think of the old Warsaw pack they got that band back together. So as long as they didn't harm any Russian or, a affiliated country, They could do basically whatever they wanted and they did. [00:44:29] And they have caused a lot of trouble all over the world. So Friday Russia. As security agency announced that it had arrested members of the cyber gang called reveal. Now we have talked about them for a long time. They have come and gone. The FBI and other countries have shut down their servers. [00:44:56] So reveal disappears for awhile. Then pops his head up again. And Russia said that they arrested members of revival who were responsible for massive ransomware crimes against us companies the last year. So why would they do that? I'm looking right now at the Russian website here, that's part of the FSB. [00:45:26] And it's saying that the Russian federal security service in cooperation, the investigation department of the ministry of internal affairs of Russia in the cities of Moscow St. Petersburg, Leningrad lips. As, I guess it is regions. They stop the illegal activities, a members of an organized criminal community and the basis for the search activities was the appeal of competent U S authorities who reported on the leader of the criminal community and his involvement in an encroachment on the information, sir, resources of foreign high tech companies by drusen militia software, encrypting information and extorting money for its decreased. [00:46:11] Now that all sounds like the stuff that Vlad has been just a happy about in years past. So why did this happen? What brought this about nowadays in this day and age? What is he doing? I've got a little bit of a theory on that one because there have been some interesting development. One of them is this hacker. [00:46:38] In Belarus. Now, Belarus is one of those countries that's closely affiliated with Russia friend of Russia, right? Part of the old Warsaw pact. And you might remember that Bella ruse is right there by you. And of course, we've got this whole issue with Ukraine and whether or not Russia is going to invade president and Biden said something incredibly stupid where he said, yeah a moral response is going to depend upon what Russia does, if it's just a minor invasion. [00:47:17] You're you remember? The president Biden's saying that just absolutely ridiculous. And then of course, the white house press secretary and various Democrat operatives tried to walk the whole thing back, but it's a problem because Russia has, what is it now like 120,000 troops on the border. [00:47:37] Now, if you know anything about history, you know that the military army. March on their stomachs, right? Isn't that the expression you've got to feed them. You have to have a lot of logistics in place. In fact, that's what really got a lot of the German military in world war two. Very nervous because they saw how good our logistics were, how good our supply chain was. [00:48:03] We were even sending them. They cakes to men in the field that they discovered these cakes in great shape. And some of the German armies, particularly later in the war, didn't even have adequate food to eat. What do you think is happening with the Russian troops that are sitting there? [00:48:20] They need food. They need supplies, including things like tanks, heavy artillery, ammunition. All of that sort of stuff. So how do they do that? They're moving it on rail, which they have done in Russia for a very long time. You might remember as well in world war II, the problems with the in compatibility between the German rail gauge and the Russian rail gauge as Germany tried to move their supplies on Russian rails and Soviet rails, ultimately, but on Russian rails and just wasn't able to do. [00:48:57] So hacktivists in Bella ruse right there next to Ukraine said that they had infected the network of Bella Russa's state run railroad system with ransomware and would provide the decryption key. Only if Bella Reuss president stopped. Russian troops ahead of a possible invasion of Ukraine. So this group, they call themselves cyber partisans wrote on telegram. [00:49:30] Now I got to warn everybody. Telegram is one of the worst places to post something. If you want some privacy, excuse me, some privacy, some security it's really bad. Okay. No two questions. So they have, apparently this is according to what they wrote on telegram. They have destroyed the backups as part of the pec low cyber campaign. [00:49:55] They've encrypted the bulk of the servers, databases and work station. Of the Belarus railroad, dozens of databases have been attacked, including, and they name a bunch of the databases. Automation and security systems were deliberately not affected by a cyber attack in order to avoid emergency situations. [00:50:20] They also said in a direct message that this campaign is targeting specific entities and government run companies with the goal of pressuring the Belarus government to release political prisoners. And stop Russian troops from entering Bellaruse to use its ground for the attacks on Ukraine. Now, this is frankly fascinating from a number of different angles. [00:50:46] One is, it is very easy nowadays to become a cyber hacker. And in fact, it's so easy. You don't even have to do anything other than send N E. And it's been done, frankly. It's been done people who are upset with a, an ax, for instance upset with a particular company, you can go onto the dark web and you can find companies. [00:51:13] And this revival company was one. That will provide you with the ransomware and they will do everything for you except get that ransomware onto a computer. So you could bring it in to an employer. You can send it by email to the ax. As I mentioned, you can do a lot of stuff. And then the. Ms. Cyber hacker guys, the bad guys will go ahead now and they will collect the ransom. [00:51:43] They'll even do tech support to help the people buy Bitcoin or whatever currency they want to have used. And then they take a percentage. So they might take 30% of it. There's a whole lot. We can talk about here too, including trust among thieves and everything else. It is easy to do this. So to see an organization like these cyber partisans, which I'm assuming is an organization, it could be as little as one person taking ransomware, going into specific computer systems breaking in. [00:52:18] Because again, even here in the U S how many of us have actually got their computer systems all patched up to date? The answer to that is pretty close to zero. And they can now go after a government, they can protect their friends. It's really something. When you start thinking about it, right? No longer do you have to be North Korea or China or Russia in order to hack someone to the point where they commit. [00:52:51] And in this case, they're not even after the money, they just want these political prisoners freed and they want Russia to stop shipping in troops supplies, into the area in Belarus next to or close to. Very fascinating. There, there is a whole lot of information about this online. If you're interested, you can read more about it. [00:53:15] It's in my newsletter, my show notes. I have links to some articles in there, but it really is a tool for the under. We've never really seen this before. It's quite an interesting turn in the whole ransomware narrative. It's just in crazy. That's a quote from a guy over at Sentinel one. Alright. [00:53:40] Lots to consider and lots to know and do, and you can find out about all of the. One way, subscribe right now@craigpeterson.com. I promise. I'm not going to her Hess. You stick around. [00:53:55] We've heard a lot about automated cars. And of course we talked about them a lot here too, but that original vision of what we would have, it's gone now. It's fascinating. We're going to talk about that journey of automated cars. [00:54:12] For years, automakers have been telling this story about how these automated cars are going to drive themselves around and do just wonderful things for us. [00:54:24] And as part of that, they've decided that. The way it's going to work. And I remember talking about this, cause I think it's a cool idea is that there will be fleet of these vehicles think about maybe an Uber or Lyft where you get on the phone and you order up a card and it says, Hey that driver will be here. [00:54:45] Here's the license plate, the driver's name and picture. It's really cool, but general motors and Lyft haven't gotten there. They signed in agreement. To have electric autonomous cars as part of Lyft's fleet of drivers. They did a back in 2016, a long time ago. Ford promised what it called robo taxis and that they would debut by 2021 Dimeler of course, the company that makes Mercedes-Benz said it would work with Uber to deploy fleets of their car. [00:55:27] And the logic was really financial and it made a lot of sense to me, which is why I was so excited. I have car outside. You know about my Mercedes, you. How often do I drive that 40 year old car? Most of the time it's sitting there parked, most of the time, because I don't go very many places very often. [00:55:50] What would it be like then to just be able to have an Uber or Lyft type app on my phone that says, okay, tomorrow I have a 10 o'clock meeting in Boston and I want a car to take me there. So the. Checks with the servers and figures out. Okay. At 10 o'clock meaning, that means you're going to have to leave at eight 30 in order to get around the traffic that's normally happening. [00:56:18] And so we'll have a car there for you. So all I have to do is walk out the apple, probably remind me, my butt out of bed and get outside. Cause the car is about to arrive. So the car pulls into my driveway or maybe just stops on the road and the app reminds me, Hey, the car's there I go out. I get in. [00:56:37] And on the way down, I can work on getting ready for the meeting, getting some things done, just really kicking back, maybe having a nap as we go. And I'm there on time for my 10 o'clock. Just phenomenal. And from a financial standpoint, nowadays, how much is a car costing you? Have you ever done the math on that? [00:56:59] How much does a typical car loan run you per month? And I also want to put in how about these leases? How many of us are leasing cars? My daughter leaves to Gargan believe she did that. Didn't leave to me. It didn't make financial sense, but maybe that's just because I've been around a while. But looking right now at some statistics from credit karma, they're saying us auto loans, new cars, your average monthly payment is $568. [00:57:32] For an average loan term of 71 months. Good grief used cars, about $400. A month payment and average loan term, 65 months. I can't believe that I've never had a car loan for more than three years. Wow. That's incredible. So we're talking about six year notes on a new car. Wow. I guess that's because people buy cars based on the monthly payment, right? [00:58:04] So figure that out. If you're paying $500 a month, how about just paying a subscription service? $500. You can get so many rides a month and you don't have to maintain the car. You don't have to buy insurance. You don't have to make any fixes. You don't have to do anything. And the car will just show up. [00:58:23] That's what I was excited about. And it had some just amazing implications. If you think about it, it city dwell over dwellers and people who were directly in the suburbs, it'd be just phenomenal. And you could also have the robo taxis for longer trips. You can abandon that personal car. Really alternate. [00:58:46] So now it's been about a decade into this self-driving car thing that was started. And, we were promised all of these cars, it reminds me of the fifties, we're all going to be driving, flying cars by. George Jetson one, when was he flying around the cities, but that's not happening. [00:59:07] Okay. The progress on these automated vehicles has really slowed automakers and tech companies have missed all kinds of self-imposed deadlines for the autonomy. Look at what Elon Musk has promised again and again, it's. Basically in 2020, late 2020, it was going to have fully autonomous cars even calls itself dry. [00:59:30] When it isn't really self-driving, it certainly isn't fully autonomous it more or less drives. It stays in the lane as it's driving down the highway. But the tech companies are looking for other ways to make money off of self-driving tech. Some of them have completely abandoned. There's self-driving cars, the sensors like the LIDAR, and I've had the LIDAR people on my show before they've all gotten cheaper. [00:59:55] It doesn't cost you $50,000. Now just for one LIDAR sensor, think about what that means to these cars. So some of these manufacturers of these future autonomous cars are shifting to a new business strategy. And that is selling automated features directly to customers. In other words, you're going to buy a car, but that car isn't going to do much. [01:00:24] Think about the golden key that the tech companies have used for years, right? IBM well-known for that, you buy a mainframe or from IBM or a mini computer from digital equipment corporation, and you have the same computer as someone that has this massive computer. But in fact the difference is that they turn off features and we're seeing that right now. [01:00:49] I'm, I've mentioned that Subaru before where they are charging people for upgrades, but some of the companies are charging you monthly to use a remote start feature for instance, and many others. So what's happening is a major change. We have the consumer electronic show, right? January 20, 20 and general motors CEO, Mary Barra said that they would quote, aim to deliver our first personal autonomous vehicles as soon as the middle of this decade. [01:01:22] So again, it slipped, right? I'm looking at it, a picture of what they're considering to be. The new Cadillac car that should be out next year. Maybe thereafter. It is gorgeous. Absolutely gorgeous. But this announcement, right? Yeah. We're going to have autonomous vehicles, middle of the 2020s. She had no specific details at all. [01:01:48] And apparently this personal robo car project is completely separate from this robo taxi fleet that's been developed by GM's cruise subsidiary. And cruise said it has plans to launch a commercial service in San Francisco this year. So they're going after multiple paths. The logic here is financial. [01:02:11] The reasoning has changed and they're offering autonomy as a feature for the consumer market. Tesla, Elon Musk, they've been charging $10,000 now for the autopilot driver assistance feature. They're planning on raising it to $12,000 here early 2022 Tesla technology. Can't drive a car by itself. [01:02:37] But he's going to charge you if you want it. And I expect that's going to be true of all of the major manufacturer that's out there. And by the way, they're also looking at customization, like color changing cars and things. They're going to charge them as features. Hey, stick around. Visit me online. [01:02:58] Craig peterson.com. [01:03:01] Ju [01:03:01] st  [01:03:01] how secure are our smartphones. We've got the iPhones, we've got Android out there. We've talked a little bit about this before, but new research is showing something I didn't really expect, frankly. [01:03:23] hi, I'm Craig Peter sawn, your cybersecurity strategist. And you're listening to news radio w G a. A M five 60 and FM 98.5, like to invite you to join me on the morning, drive Wednesday mornings at 7 34, Matt and I always discussing the latest in cybersecurity technology. And, Matt always keeps you up to date. [01:03:50] We've got some new research that wired had a great article about last week that is talking about the openings that iOS and Android security provide for anyone with the right tools. You're probably familiar at least vaguely with some cases where the FBI or other law enforcement agencies have gone to apple and tried to have. [01:04:17] Old break into iPhones. Apples, refuse to do that one in particular, down in Southern California, where they tried to get apple to open up this I phone and tell them who was this person talking to after a shooting of foul of fellow employees at a. It was really something, there was a lot of tense times and we've seen for decades now, the federal government trying to gain access to our devices. [01:04:51] They wanted a back door. And whenever you have a back door, there's a potential that someone's going to get in. So let's say you've got a. And your house has a front door. It has a backdoor, probably has some windows, but we'll ignore those for now. Okay. And you have guards posted at that front. All in someone needs to do is figure out to how to get into that back door. [01:05:18] If they want to get into your house, it might be easy. It might be difficult, but they know there's a back door and they're going to figure out a way to get in. And maybe what they're going to do is find a friend that works for that security company, that post of the guards out front. And see if that friend can get a copy of the. [01:05:39] That'll let them in the back door. And that's where we've had some real concerns over the year years here, a decades, frankly, our first, I remember this coming up during the Clinton administration, very big deal with the. That they were pushing. This was a cryptographic chip that they wanted every manufacturer to use if they wanted to have encryption and the white house and every gov federal government agency, and probably ultimately every local agency had the ability to break any encryption that was created by the clipper. [01:06:17] In fact, we were able to track Saddam Hussein and his sons and his inner circle. Because he was using some encrypted phones that were being made by a company in England. And that company in England did have a back door into those encrypted phones. And so we were able to track them and we could listen in, on all of their communications back and forth. [01:06:44] And it's really frankly, oppressed. When that sort of thing happens. So what do you do? What are you supposed to do? How can you make it so that your devices are safe? There are some ways to be relatively safe, but these cryptographers over Johns Hopkins university, Use some publicly available documentation that was available from apple and Google, as well as their own analysis. [01:07:14] And they looked into Android and iOS encryption and they founded lacking. So they studied more than a decades worth of reports. How about which mobile security features had been bypassed had been a hack. I had been used by law enforcement and criminals in order to get into these phones. They got some of these hacking tools off of the dark web and other places, and they tried to figure. [01:07:46] So we've got a quote here from Johns Hopkins, cryptographer, Matthew Green, who oversaw the research. It just really shocked me because I came into this project thinking that these phones are really protecting user data. Now I've come out of the project, thinking almost nothing is protected as much as it could be. [01:08:10] So why do we need a backdoor for law enforcement? When the protections that these phones actually offer are so bad. Now there's some real interesting details of if you like this stuff, I followed cryptography for many decades. Now I've always found it. Fascinating. There are some lightweight things I'm going to touch on here. [01:08:33] We won't get too deep in this, but here's another quote. Again, Johns Hopkins university on Android. You can not only attack the operating system level, but other different layers of software that can be vulnerable in different ways. Another quote here on iOS in particular, the infrastructure is in place for hierarchal encrypted. [01:08:57] Now higher are hierarchical. Encryption is various layers of encryption. If you have an iPhone or an iPad, or if you have most Android phones nowadays, if you use a passcode in order to unlock the phone or even a fingerprint or a face. Your method of authentication is used to encrypt everything on the phone, but in reality, everything on the phone is only fully encrypted when the phone is powered off. [01:09:36] Now that's a real, interesting thing to think about because obviously the phone can't work. If everything's encrypted. It needs access to the programs. It needs access to your data. So what they found bottom line was the only way to have a truly safe machine or a smartphone in this case is to turn it off because when you turn it on and it boots up on first boot, now it gets. [01:10:08] Either by bio medical information, like your fingerprint or your face sprint or your passcode, it then has a key that it can use to decrypt things. So apple has on the iPhone, something, they call complete protection and that's again, when the iPhone has been turned off on boots up because the user has to unlock the device before anything can happen on the phone. [01:10:33] And the is protections are very. Now you could be forced to unlock the phone by a bad guy, for instance, or in some cases, a warrant or an order from a judge, but forensic tools that, that they are using the police and the criminals really would have almost no luck at pulling information off of your phone. [01:10:59] That would be useful at all because it would all be encrypted, right? If they could. So once you've unlocked your phone after that first reboot molt, after that reboot, right? You unlocked it after power up. A lot of the data moves into a different mode that apple calls protected until first user authentication. [01:11:20] But it's what I call after first unlock. So when you think about it, your phone is almost always in the after first unlocks. Because how often do you reboot your phone? No, it's pretty rare that your phone might do on. And this is particularly true for I-phones might do updates and boot and reboot. And then of course you have to unlock that phone, but it doesn't go much further. [01:11:49] The net and that's, what's interesting. That's how law enforcement and the bad guys, these Israeli companies and others have been able to get into iPhones and get into Android devices because ultimately if that computer is turned on and you've logged in, there's a lot of data. That's no longer encrypted. [01:12:10] Oh. And by the way, that's also how some of these attacks occur on our laptops. Particularly if you traveled to. In the memory on that laptop that you close the lid on, you have to re log into is the key to UNHCR, unencrypt, everything, right? Because you logged in once. So all they have to do is freeze the memory, duplicate the memory and put it back in part of the reason, by the way that apple laptops have their memory soldered in you can't do that kind of attack. [01:12:44] Stick around. We'll be right back. [01:12:48] VPNs are good and they are bad. It depends on the type of VPN. Many of these commercial VPNs of people are using are actually very bad for you when it comes to your security. [01:13:04] VPNs are problematic. I did a couple of boot camps on VPNs. Probably I think it was about last year. [01:13:13] Yeah, it was last spring. And I went through and explained and showed exactly why commercial VPNs are one of the worst things you could possibly do if you want. To stay secure. Now I lemme just give you the high level here. I have given people copies of this, if you're interested in a link to that VPN webinar that I did, I'd be glad to send it to you. [01:13:45] Just email me Emmy at Craig Peterson, doc. And ask me for the VPN information and I'll send that all off to you. I also wrote something up that I've been sending out to people that have asked about VPNs. Cause it's one of the most common questions we have Franklin, but here's your problem with commercial VPNs? [01:14:05] Most all of them say, oh, your information safe at zero logging, et cetera. And yet we have found again and again that's not. In fact, it can't possibly be true in almost every case because most of these VPN services are running out of other people's data centers. So they might be in an Amazon data center or IBM or Microsoft. [01:14:32] And inside that data center, your data is coming in and then it's going to. So let's say you're using a VPN and you're connecting to a website. I don't care. Go to google.com via a VPN. So you're using one of these services. That's advertised all over creation. And what happens now is. Your web request to get to Google passes over that encrypted VPN and comes to an exit point because at some point it has to get onto the regular internet. [01:15:07] How else are you going to get to that website? On the other side? You can't, unless you get to the regular internet. So at the other side, now the server is that's receiving the end point of view. VPN is going to send the request to Google. Google is going to respond to that VPN server. It's going to be encrypted and sent back to you. [01:15:30] So what's the problem with that? There's multiple problems. One is the data center can see. That there is the request going up to Google. Now he might not be able to tell who it was. But if that VPN server has been hacked. And let me tell you, it is a big target for hackers, government hackers, as well as bad guys. [01:15:54] Then they do know who went out there and depending on how it was hacked and how the VPN was set up, they may even be able to see all of the data that you're sending back and forth. It's called a man in the middle of. And some of these VPN services do it by having you install some software on your computer. [01:16:15] And as part of that installation, they provide you with a master key that they then use to spoon. The keys for the websites. You're going to some, explain that what happens is if you were to go right now on your web browser, go to Craig peterson.com as an example. So Craig peterson.com. I'm typing it in right now in the browser. [01:16:43] That's directly in front of me. Now you'll see a little lock up in the URL. What does that mean? If you click on that lock, it says something about the connection being secure. Are you familiar with that? What's actually happening is it's using SSL TLS keys, but it's using encryption now to send the data from your computer. [01:17:11] To my server, that's hosting Craig peterson.com. And then my server is sending all of the webpage back to you. Encrypted. Any fact, a VPN has been established between your web browser and my web server. So why use a third-party VB? Because your data is encrypted already, right? Could it be more simple than that? [01:17:46] Now, remember again, that the server on the VPM service that you're using is a prime attack target for everybody else. As I said from government agencies through hackers. So your data is likely less safe because if they get a hold of it, they can do all kinds of things to your data and to. And then on top of it, all the VPN service may well be selling your data in order to make money, to support the VPN service because free VPNs, inexpensive VPN sees the ones that are charging you five or 10 bucks a month cannot possibly afford to provide you with that service. [01:18:38] And in the bootcamp, I go through all of the numbers here, the costs involved. With a VPN service it's not possible to do. They can't make any money off of it. So it is a very big problem for you to use one of these public VPN services. Now, I want to talk about an arc article that was on Z. [01:19:06] Apparently your old pole, which is of course the police over there in the European nations has seized servers. What servers, VPN servers in Europe. Now they seized the servers because they were used by who was it? Grandma looking at pictures of the grandkids. Was it people watching cat videos who was using the VPN server? [01:19:33] The paid VPN service. Wow. It was criminals. And when they seized these VPN servers that were also being used by criminals, they found more than a hundred businesses that had fallen victims to attacks. So who uses VPN services? People who want to hide something as well as people who just want to have their data secure. [01:20:01] Another reason not to use VPN services. So as a part of the joint action by Europol Germany's police Hanover police department, the FBI, UK national crime agency, and others seized 15 servers used by VPN lab dot. Okay. So VPN lab.net net, obviously no longer usable. And they started looking at all of the records that were being kept in these servers and use that to find the criminal. [01:20:36] Does that make sense to you? So VPN lab.net was according to these charges, facilitating illicit activities, such as malware distribution. Other cases showed the services use in setting up infrastructure and communications behind ransomware campaigns, as well as the actual deployment of ransomware. You like that. [01:20:59] Now they were using open VPN technology, which is actually very good. As part of that VPN information, I can send you if you're interested, just email me M e@craigpeterson.com. Let me know what you're interested in, and I'll whoop you off an email. Give me a few days I can get behind sometimes, but you can set up your own private VPN server if that's what you want to do. [01:21:25] And I've gotten instruc

Irish and Celtic Music Podcast
New York Girls #529

Irish and Celtic Music Podcast

Play Episode Listen Later Oct 21, 2021 62:29


New York girls are up all night long listening to over 600 hours of the Irish & Celtic Music Podcast. The Bow Tides, Matt & Shannon Heaton, Muireann Nic Amhlaoibh, Adam Young, Fergal McAloon, We Banjo 3, The Homespun Ceilidh Band, Loveridge, Jesse Ferguson, Plunk Murray, The Wild Irish Roses, COAST, Drumspyder, Bang On The Ear, Will Macmorran I hope you enjoyed this week's show. If you did, please share the show on social or with a friend. The Irish & Celtic Music Podcast is here to build our diverse Celtic community and help the incredible artists who so generously share their music with you. If you hear music you love, buy the albums, shirts, and songbooks, follow the artists on streaming, see their shows, and drop them an email to let them know you heard them on the Irish and Celtic Music Podcast. Every week, you can get Celtic music news in your inbox. The Celtic Music Magazine is a quick and easy way to plug yourself into more great Celtic culture. Subscribe and get 34 Celtic MP3s for Free. VOTE IN THE CELTIC TOP 20 This is our way of finding the best songs and artists each year. Just list the show number, and the name of as many bands in the episode as you like. Your vote helps me create next year's Best Celtic music of 2021 episode.  Vote Now! THIS WEEK IN CELTIC MUSIC 0:06 - The Bow Tides "Old John's Jig/Galician Jigs (Oscar Ibañez)/Trad" from single 4:19 - WELCOME 5:27 - Matt & Shannon Heaton "Redwoods in Winter & The Small Girl" from Blue Skies Above 8:52 - Muireann Nic Amhlaoibh "Port na bPúcaí" from Thar Toinn / Seaborne 12:56 - Adam Young "Twirly (trad version)" from Yearbook 17:21 - Fergal McAloon "The Wild Swans at Coole" from I Am of Ireland / Yeats in Song 20:33 - FEEDBACK 23:28 - We Banjo 3 "Marry Me Monday (Live)" from Roots to Rise (Live) 27:19 - The Homespun Ceilidh Band "Mrs. Murphy's Band" from Home With The Homespun Ceilidh Band 31:35 - Loveridge "Will You Go" from As the Crow Flies 36:26 - Jesse Ferguson "New York Girls" from Sea Shanties 39:46 - Plunk Murray "The Gallawa' Hills" from Another Drink 43:34 - THANKS 44:51 - The Wild Irish Roses "Garry Owen" from Full Bloom 47:29 - Coast "Flesh and Blood" from 10.2 50:45 - Drumspyder "Wind God" from Kenning 54:42 - Bang On The Ear "15EMSET" from F15TEEN 57:09 - CLOSING 58:42 - Will Macmorran "Mendocino" from Glen Echo The Irish & Celtic Music Podcast was edited by Mitchell Petersen with Graphics by Miranda Nelson Designs. The show was produced by Marc Gunn, The Celtfather. Subscribe through your favorite podcatcher or on our website where you can become a Patron of the Podcast for as little as $1 per episode. Promote Celtic culture through music at http://celticmusicpodcast.com/. WELCOME TO CELTIC MUSIC * Helping you celebrate Celtic culture through music. I am Marc Gunn. I'm a Celtic musician and podcaster. This show is dedicated to the independent Celtic musicians. Please support these artists. Share the show with your friends. And find more episodes at celticmusicpodcast.com. You can also support this podcast on Patreon. I'm looking for some good stories to share on our companion podcast. Pub Songs & Stories is a Virtual Public House for musicians to share the stories and inspiration behind their music. If you have a story that you'd like to share about a song, from a gig, or maybe even just a piece of Celtic history that you love. Drop me an email. Put “Pub Story” in the show subject. Tell me about your story. Maybe I'll ask you to record your story for the show. THANK YOU PATRONS OF THE PODCAST! Because of Your kind and generous support, this show comes out at least four times a month. Your generosity funds the creation, promotion and production of the show. It allows us to attract new listeners and to help our community grow. As a patron, you get to hear episodes before regular listeners. When we hit a milestone, you get an extra-long episode. You can pledge a dollar or more per episode and cap how much you want to spend each month over on Patreon. And if you pledge $5 or more per episode, you'll also get the all new music-only episodes. I introduce the show, play non-stop music for nearly an hour, and then close the show. Plus, you'll get access to hundreds of free MP3 downloads. A super special thanks to our newest patrons: Joe C, Margreta S, Eilene O You can become a generous Patron of the Podcast on Patreon at SongHenge.com. TRAVEL WITH CELTIC INVASION VACATIONS Every year, I take a small group of Celtic music fans on the relaxing adventure of a lifetime. We don't see everything. Instead, we stay in one area. We get to know the region through its culture, history, and legends. You can join us with an auditory and visual adventure through podcasts and videos. Learn more about the invasion at http://celticinvasion.com/ #celticmusic #irishmusic #celticmusicpodcast I WANT YOUR FEEDBACK What are you doing today while listening to the podcast? You can send a written comment along with a picture of what you're doing while listening. Email a voicemail message to celticpodcast@gmail.com Peter Bengtson emailed a photo: "I was on one of my neighborhood walks this morning, listening to episode #518 - An irish cottage.  I enjoyed the music and the weather was pretty cool to start.  This is the most impressive mail box I have ever seen.  Be sure and zoom to get a good view of the face." Margreta Silverstone emailed a photo: "Thanks Marc, I've enjoyed listening to your podcast for the past six months or so - not really sure how I found you but glad I did. Two things: -I would love if you'd include Jennifer Cutting's work (ocean orchestra/ocean quartet) in an upcoming podcast -here's a photo of something I am often doing while listening (I love to make celtic inspired purses, wallets and bags for my Etsy shop - MargretaMadeIt)" MARC GUNN - CELTIC HEARTSTRINGS             View this post on Instagram                         A post shared by Marc Gunn (@celtfather)               View this post on Instagram                         A post shared by Marc Gunn (@celtfather)  

Authentically Successful
The Beauty of Innovation with Align Impact's Jennifer Kenning

Authentically Successful

Play Episode Listen Later Sep 23, 2021 47:23


In this episode, your host Carol Schultz speaks with Align Impact's Jennifer Kenning about helping people derive strategies that positively impact society, being a disrupter, getting the best investors behind your vision, the idea that competition makes you better, the beautiful aspects of innovation, and more. Jenn walks the walk when it comes to supporting both her clients and employees. This female-founded and led company is over 50% women! Check out Align Impact at https://www.alignimpact.com/ (https://www.alignimpact.com/) You can find more information and all episodes at https://verticalelevation.com/podcast/ (verticalelevation.com/podcast) and you can find Carol on Twitter https://twitter.com/CarolBSchultz (@carolbschultz).

How did I get here?
Curating Career Life Stories: How Did I Get Here? Ep. 107 with Jennifer Kenning

How did I get here?

Play Episode Listen Later Sep 1, 2021 50:40


Join me for the career reflections of Jennifer Kenning, CEO & co-founder of Align Impact. Initially her dream is to be a sportscaster because of her love for competing in and watching sports, but then her interest in finance, investments and economics drives her career decisions. An internship solidifies her love for investment banking, but then her first job is not a fit – way too much analysis and not enough people interaction. A serendipitous meeting leads her to her next role, company, long-time mentor and ultimately where she is today. What's served Jennifer best is discipline and always being able to speak up for injustice – both she started at the very early age of 5. Her words of wisdom are from a Howard Thurman quote: “Don't ask what the world needs. Ask what makes you come alive, and go do it. Because what the world needs is people who have come alive.” --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app

Irish and Celtic Music Podcast
I Am of Ireland #521

Irish and Celtic Music Podcast

Play Episode Listen Later Aug 19, 2021 66:57


Be a part of Ireland with the Irish & Celtic Music Podcast. Gaelynn Lea, Adam Young, Ashley Davis, Yeats in Song, Matt & Shannon Heaton, Thom Dunn, Jesse Ferguson, Muireann Nic Amhlaoibh, Laughing Jack, The Darkeyed Musician & Grimwater, Bang On The Ear, The High Kings, Will Macmorran, Michael Darcy & The Atlantic Tramps, Drumspyder, The Elders, Skully I hope you enjoyed this week's show. If you did, please share the show on social or with a friend. The Irish & Celtic Music Podcast is here to build our diverse Celtic community and help the incredible artists who so generously share their music with you. If you hear music you love, buy the albums, shirts, and songbooks, follow the artists on streaming, see their shows, and drop them an email to let them know you heard them on the Irish and Celtic Music Podcast. Every week, you can get Celtic music news in your inbox. The Celtic Music Magazine is a quick and easy way to plug yourself into more great Celtic culture. Subscribe and get 34 Celtic MP3s for Free. VOTE IN THE CELTIC TOP 20 This is our way of finding the best songs and artists each year. Just list the show number, and the name of as many bands in the episode as you like. Your vote helps me create next year's Best Celtic music of 2021 episode.  Vote Now! THIS WEEK IN CELTIC MUSIC 0:05 - Gaelynn Lea "Boys of Bluehill" from The Songs We Sing Along the Way 3:46 - WELCOME 5:02 - Adam Young "Forever Young" from Yearbook 8:26 - Ashley Davis "The Pity of Love" from I Am of Ireland / Yeats in Song 10:49 - Matt & Shannon Heaton "The Shady Spot" from Blue Skies Above 14:37 - Thom Dunn "Follow Me Up To Carlow / Éamonn an Chnoic" from Forfocséic, Volume 1 Pronunciation: Éamonn an Chnoic"  - AY-mon un CUN-ic 18:42 - FEEDBACK 24:27 - Jesse Ferguson "The Old Polina" from Sea Shanties 27:37 - Muireann Nic Amhlaoibh "Sí Bheag, Sí Mhór" from Neadú Pronunciation: Murr-en Nick OWL-ee Pronunciation: Neadú - Nyad-EW 31:11 - Laughing Jack "Sylvest (Live)" from Live at the Indy Folk Series 35:24 - The Darkeyed Musician & Grimwater "The Dryads" from Illumina 39:02 - Bang On The Ear "Wellerman" from F15TEEN 41:38 - The High Kings "Farewell to Nova Scotia" from Home From Home 44:15 - THANKS 45:51 - Will Macmorran "New Ritual" from Glen Echo 48:47 - Michael Darcy & The Atlantic Tramps "Take Me Back to the Valley" from Single 52:04 - Drumspyder "The Dunmore Lasses" from Kenning 56:06 - The Elders "Naughty Bridget" from Story Road 1:00:31 - CLOSING 1:01:32 - Skully “Blackbird” from IRISH Makeover The Irish & Celtic Music Podcast was edited by Mitchell Petersen with Graphics by Miranda Nelson Designs. The show was produced by Marc Gunn, The Celtfather. Subscribe through your favorite podcatcher or on our website where you can become a Patron of the Podcast for as little as $1 per episode. Promote Celtic culture through music at http://celticmusicpodcast.com/. WELCOME TO CELTIC MUSIC * Helping you celebrate Celtic culture through music. I am Marc Gunn. I'm a Celtic musician and podcaster. This show is dedicated to the independent Celtic musicians. Please support these artists. Share the show with your friends. And find more episodes at celticmusicpodcast.com. You can also support this podcast on Patreon. I'm looking for some good stories to share on our companion podcast. Pub Songs & Stories is a Virtual Public House for musicians to share the stories and inspiration behind their music. If you have a story that you'd like to share about a song, from a gig, or maybe even just a piece of Celtic history that you love. Drop me an email. Put “Pub Story” in the show subject. Tell me about your story. Maybe I'll ask you to record your story for the show. THANK YOU PATRONS OF THE PODCAST! Because of Your kind and generous support, this show comes out at least four times a month. Your generosity funds the creation, promotion, and production of the show. It allows us to attract new listeners and to help our community grow. As a patron, you get to hear episodes before regular listeners. When we hit a milestone, you get an extra-long episode. You can pledge a dollar or more per episode and cap how much you want to spend each month over on Patreon. And if you pledge $5 or more per episode, you'll also get the all new music-only episodes. I introduce the show, play non-stop music for nearly an hour, and then close the show. Plus, you'll get access to hundreds of free MP3 downloads. A super special thanks to our newest patrons: Matt and Joan, Richard B who raised his pledge, Gaelynn Lea, Perry Thompson You can become a generous Patron of the Podcast on Patreon at SongHenge.com. TRAVEL WITH CELTIC INVASION VACATIONS Every year, I take a small group of Celtic music fans on the relaxing adventure of a lifetime. We don't see everything. Instead, we stay in one area. We get to know the region through its culture, history, and legends. You can join us with an auditory and visual adventure through podcasts and videos. Learn more about the invasion at http://celticinvasion.com/ #celticmusic #irishmusic #celticpodcast I WANT YOUR FEEDBACK What are you doing today while listening to the podcast? You can send a written comment along with a picture of what you're doing while listening. Email a voicemail message to celticpodcast@gmail.com I missed this congrats from Jarrod Reynolds: "Hey Marc, Congrats on the 500th episode. I highly enjoy the podcast. One of my ancestral lines is Irish so Irish music has a special place in my heart, and the fact I've been to scotland, makes it that much more special. I was wondering if you had any suggestions for instrumental irish harp artists that specialize in jigs and reels. Slainte" Domenico Rossi emailed a photo: "Hi Marc! It's Domenico here, from Italy! I'm just listening to your podcast (ep. 517) while I'm finishing up details of my final thesis. You know how it works: each time you write even a single letter, images go everywhere, and you have to put them again in the correct place. And, of course, there always are small changes to do... and your wonderful podcast is here to help me! Since I've become a patreon some months ago I can hear the episodes some days before usual, and it's a great way to start the week! (or also finish it, by listening to them again and again!) Thanks for your work God bless you Slainte" Joe Christensen emailed: "Hi Marc. I've been listening and subscribing to your podcast for a long while. You have been, for a while now, asking what we are doing while we listen. I don't have a photo for you, but I am usually grading physics homework. Although they are unaware of it, I am quite sure the students appreciate that my mood is jaunty while I grade their work. Speaking of students, which is my actual reason for writing, during the pandemic, I have been recording and posting my lectures so that students who are in quarantine, are caring for others who are sick, or are simply cautious about bringing the virus home to others can keep up with my class. Inspired by my gratitude to you for diligently maintaining the practice of including timestamps in all of your show notes (I can't tell you how helpful that has been), I started time-stamping my 50-minute lectures. Many students have expressed to me their gratitude for my effort in that regard and I wanted to share that gratitude with you. Your patience and attention to detail has benefits not just for those of us who listen and buy music we hear, but also has secondary benefits to those your listeners also interact with. You are positively impacting in many ways. Speaking of that, I am also grateful whenever you stand up for the women of Irish music, the LGBT community, and your broader support of a variety of people and cultures. Thank you! Happy holidays. I hope you and your family are safe and healthy.”

One Fold
Kylee Kenning: Therapy 101

One Fold

Play Episode Listen Later Aug 4, 2021 32:04


Kylee Kenning is a licensed associate marriage and family therapist at Balance Health and Healing. She is also an adjunct faculty instructor at Brigham Young University. Kylee became personally aware of mental health as a teen, when her father passed away. In this episode, she shares her experience with therapy from both sides of the couch, as she has been in therapy for her own difficulties, and now works as a therapist.

Myth and Magic
Myth & Magic Episode 89

Myth and Magic

Play Episode Listen Later Jul 7, 2021 26:07


A useful definition of storytelling. Also, Project Cassandra, can fiction writers predict the future? Who was Cassandra? What is Kenning? Who were the filí ?

Poetry of Impact
Jennifer Kenning with Reflections on Loss, Time & Inclusivity

Poetry of Impact

Play Episode Listen Later Jun 15, 2021 39:41


Jennifer Kenning, CEO & co-founder of Align Impact, openly shares her experiences with loss and how these painful experiences have transformed her day-to-day work. With a recognition of the finitude of time, she delves into what is truly worthy of her time and energy. Jennifer reflects on her past addiction to “time” that is now guided by a connection with the inner voice guiding her to slow down and enjoy the journey. Jennifer applies this deep self-knowledge to impact investing, encouraging the collective to embrace inclusivity and remember that human relationships are at the center of impact. In this episode, Jennifer talks about:  Diving deeper into her own spirituality and preparing for her bat mitzvah at a later stage in life [2:17] How she intentionally builds in self-care practices to her busy schedule [3:50] The loss of a dear friend and how this experience called her deeper into her spiritual practices [9:10] Her reflections as a result of knowing the finitude of time [15:12] Deciphering what is worthy of her time and welcoming wisdom from those who have come before [17:30]  How she balances her work in impact with other non-goal-oriented activities [20:40] The evolution of the impact space and encouraging a people-centered, inclusive ecosystem [33:06] Resource Links Align Impact a female-founded, owned, led and majority-staffed, asset management advisory, specializing in co-creating and implementing impact investing strategies with individuals, families, institutions, and advisors

Image Sells - So verkaufen Marken
About me – die richtige Strategie für Deine Webseite mit Johanna Adolphs-Kenning

Image Sells - So verkaufen Marken

Play Episode Listen Later Jun 10, 2021 45:51 Transcription Available


Mal ehrlich, wie nennst du den Menüpunkt auf Deiner Webseite, die Euer Unternehmen präsentiert? "Über mich" "Über uns"? Was lesen die Besucher auf dieser Unterseite als erstes? Über die must-haves und die absoluten no-goes auf Unternehmenswebseiten in Bezug auf die Selbstvorstellung sprechen wir mit der Expertin für das passende Wort Johanna Adolphs-Kenning von Thinktext. Wir nehmen gängige Muster auseinander und analysieren ihre Wirkung und Aussagegehalt. Du bekommst viele, sofort umsetzbare Tipps, wie Du Deine Webseite in dem Bereich attraktiver gestaltest und Deiner Webseite so eine bessere Conversion-Rate bescherst. Mehr zu Johanna findest Du hier: https://www.facebook.com/thinktexten (Thinktext | Facebook) https://www.instagram.com/johannaadolphskenning/ (Johanna | thinktext.de (@johannaadolphskenning) • Instagram-Fotos und -Videos) https://www.linkedin.com/in/johanna-adolphs-kenning-23108ab9/ (Johanna Adolphs-Kenning | LinkedIn) Links von Carmen https://www.facebook.com/groups/imagesellscommunity/ (Diskutier mit mir über dieses Thema in der geschlossenen Facebook Gruppe “Image-Sells-Community”.) https://podcasts.apple.com/de/podcast/image-sells-so-verkaufen-marken/id1241511377 (Ich würde mich sehr über Deine Bewertung im iTunes-Store freuen und denk daran, die Show zu abonnieren, wenn Du mich kostenfrei regelmäßig hören willst ;))   Vernetze Dich sehr gerne mit mir auf: https://www.clubhouse.com/club/business-podcasting (Clubhouse) https://www.instagram.com/carmenbrablec/ (Instagram) http://www.youtube.com/subscription_center?add_user=CarmenBrablec (Youtube Kanal) https://www.facebook.com/groups/imagesellscommunity/ (Facebook Gruppe) http://www.carmenbrablec.de/podcast (Hinterlasse hier gerne Deinen Kommentar zur heutigen Episode)  charmanten Gruß Deine Carmen “Gebeten werden, statt zu bitten” von Kunden, Investoren und pot. Mitarbeitern. Wenn das Dein Wunsch ist, dann bist Du im Image Sells Podcast von und mit Carmen Brablec richtig. Erfolgreiche Unternehmen, die es satt haben, Kunden hinterher zu laufen oder zu jagen, lernen von Marken-Expertin Carmen Brablec Strategien, wie die Expertise des Unternehmens so positioniert wird, dass Marken-Status erreicht wird. Also im Kopf der Zielgruppe ein unverwechselbares und positives Image aufgebaut wird. Marketing muss kein Vermögen kosten, wenn die Positionierung richtig geplant wird. Kunden Gewinnung ist in Zukunft nicht mehr vom Verkaufstalent Deines Vertriebs abhängig, sondern von Deiner Vermarktungs-Strategie. Vergiß Akquise, arbeite an Eurem Image!

ART FICTIONS
Contemplative Cracks and Lo-Fi Tech (DEAN KENNING)

ART FICTIONS

Play Episode Listen Later May 24, 2021 76:16


Guest artist DEAN KENNING joins me to chat about his work via John Maxwell Coetzee's 2013 allegorical novel 'The Childhood of Jesus'. The story revolves around five year old David with his father-by-default Símon, on their quest to find a mother for the boy and a better life for the three of them.  Winner of this year's prestigious Mark Tanner Sculpture Award, Dean Kenning, and I go on to discuss his clunky sculptures, social body-mind maps and his philosophical mish mash 'Metallurgy of the Subject'. We delve into the cracks between the flatness to explore ideas around satire, proliferation, bad infinity, socialist utopia, universal modes of seeing the world, common language, allegorical imagery, the importance of the father, avoidance of composition, a dislike for kinetic work, redundant technology, history as a bloody struggle and poo in sausages.   (This episode is produced by Jillian Knipe with music by Griffin Knipe and image by Joanna Quinn of Beryl Productions)   DEAN KENNING deankenning.com instagram Dean Kenning notfairbear 'The Origin of Life' 2019 'Psychobotanical' 2019 Matt's Gallery 'Renaissance Man' 2017 'Metallurgy of the Subject' ongoing   ARTISTS Antony Gormley 'Angel of the North' 1998 David Bowie (musician) Emma Cousin 'Chats in Lockdown' podcast English Heretic (musicians) Hieronymus Bosch Kiki Smith 'Her Memory' Fundació Joan Miró Leonardo da Vinci 'Vitruvian Man' Paul McCarthy 'Painter' 1995   BOOKS & THEORISTS Benjamin Markovits (writer) C L R James 'The Black Jacobins' 1938 Colm Tóibín 'The Testament of Mary' 2012 Franz Schubert (composer) Immanuel Kant (philosopher) J M Coetzee 'Disgrace' 1999 J M Coetzee 'Waiting for the Barbarians' 1980 Johann Wolfgang von Goethe 'Erlkönig' 1782 Jacques Lacan (psychoanalyist) Jean Fisher (professor, art critic, writer) Jean-Luc Nancy 'The Inoperative Community' 1986 John Roberts (philosopher) 'Dean Kenning's Kinetics' 2019 Jorge Luis Borges 'Three Versions of Judas' 1944 Joyce Carol Oates 'My Life as a Rat' 2019 Karl Marx Kazuo Ishiguro 'The Buried Giant' 2015 Plato 'Republic' 375BC Russell Hoban 'Riddley Walker' 1980 Susan Buck-Morss (professor, philosopher, historian) William Burrows (writer) William Morris 'Useful Work versus Useless Toil' 1885 Walter Benjamin (philosopher) William Playfair (engineer)   TELEVISION 'Day of the Triffids' from 1981  'Dr Who' from 1963 Kenny Everett  

Permanently Moved
301 - 2114 - Kennings & Orbit Words

Permanently Moved

Play Episode Listen Later Apr 10, 2021 5:02


S04E14 Reject the social media literalism that flattens ideas with a label or a name. Let’s dance around the edges of ideas to know them better. Full show notes: https://www.thejaymo.net/2021/04/10/301-2114-kennings-orbit-words/ Support: https://thejaymo.net/support/ Webshow: http://comeinternetwith.me Website: https://www.thejaymo.net/ Permanently moved is a personal podcast 301 seconds in length, written and recorded by @thejaymo

Chats in lockdown: artists talking

Dean Kenning and I talk about diagramming, John Latham, gravity and pigeons and get into where his kinetic sculpture began in the first place. We talk about the aesthetics of kinetic art and Dean gets into lucozade bottles and pointless fingers. We discuss his recently won Mark Tanner award and the current ideas in progress for it. We talk about dumb vs clever, looking at the stars and trying to leave space to be irritated. Image: Untitled (Rubber Plant), kinetic sculpture, Matt’s Gallery, 2019. links: http://www.deankenning.com https://www.mattsgallery.org/artists/kenning/exhibition-1.php https://standpointlondon.co.uk/mtsa/mtsa-winner-2020.php https://beaconsfield.ltd.uk/projects/the-origin-of-life-by-dean-kenning/ http://flattimeho.org.uk/events/diagram-research-group/ --- Support this podcast: https://anchor.fm/emma-cousin/support

Threefold Real Estate Investing
Disrupting Real Estate with Marketing Strategies for Off-Market MF Properties with Drew Kenning

Threefold Real Estate Investing

Play Episode Listen Later Jan 27, 2021 42:16


My guest today, Drew Kenning, is focused on finding off-market multifamily deals. Drew's focus is not uncommon. Finding off-market deals is what most investors long for these days. What is different is Drew's approach. His team is highly sophisticated and is able to gather incredible data. He shares great techniques that you can implement to find off-market deals for you and your team. Join me today as we learn from Drew! Book Recommendation: Zero To One by Peter Thiel Prayer Request: pray for tenants in their buildings who are facing economic hardship. Connect with Drew: Website: MANOR STRAITS | Team Email: drew@manorstraits.com , LinkedIn: Drew Kenning | LinkedIn Connect with Lee: Website: THREEFOLD - Real Estate Investing (threefoldrei.com), Email: info@threefoldrei.com, Phone: 937-400-3044

Minority Money
Taking Your Investing to the Next Level through Impact Investing with Jennifer Kenning

Minority Money

Play Episode Listen Later Jan 4, 2021 35:20


Tremendous system change is needed if we want to solve the racial and financial inequality of our country. One of the greatest tools we have at our disposal to close the wealth gap is through investing, particularly impact investing! Join me in this episode as I interview Jenn Kenning on the benefits of impact investing, why you should consider it, and how it can help in our mission of changing the complexion of wealth. Jenn Kenning is the CEO and Co-Founder of Align Impact, a female founded, owned, led, and majority-staffed, SEC-registered independent advisor and certified B Corporation. Align Impact specializes in co-creating and implementing impact investing strategies with individuals, families, foundations, institutions, and advisors. Where you put your hard-earned money, plays an active role in re-shaping and building the future, both for our society and planet. Learn what impact investing is all about and how your investing can make a difference in our society and planet. Jenn also explains what makes impact investing different from other forms of investing and other socially responsible investing! Highlights: >> How finance can be a driver for system change >> How investing can level the playing field for everyone >> How Jen came to focus on impact investing >> What makes Impact Investing unique and different >> The big equalizers >> How to close the wealth and income gap here in the US >> Looking at our consumption decisions, our values, and what we support >> The power of social network >> Utilizing capitalism as a tool for rebuilding and system change >> How impact investing benefits our planet >> Myths about impact investing Connect with Jennifer Kenning: >> https://www.linkedin.com/in/jennkenning?challengeId=AQF1TD3lQuMZuwAAAXbMW_Pr2Owkd5EK8k33-NIX26pOmZ5nUM5eS87Pwgz2JPYZOb8BeDriaaMkLRIOYdl3cumx3Gu-MXzYAg&submissionId=087f5304-c6f7-5616-acd7-903ec41c0924 (LinkedIn) >> https://twitter.com/AlignImpact (Twitter @AlignImpact) >> https://www.alignimpact.com/ (Align Impact) If you loved this episode, you have to listen to these episodes as well: >> https://podcasts.apple.com/us/podcast/getting-out-poverty-creating-wealth-dr-david-rhoiney/id1473231134?i=1000476632848 (Getting out of Poverty & Creating Wealth) >> https://podcasts.apple.com/us/podcast/why-health-is-important-in-retirement-planning-phil/id1473231134?i=1000482841066 (Why health is important in retirement planning) >> https://podcasts.apple.com/us/podcast/leaving-a-legacy-of-financial-literacy-with-carlos-gomez/id1473231134?i=1000472269628 (Leaving a Legacy of Financial Literacy) --- I’m sure you’re getting tons of value from the podcast! Don’t forget to subscribe on https://podcasts.apple.com/us/podcast/minority-money/id1473231134 (Apple Podcasts), https://open.spotify.com/show/0and9szy0q9RxxQhZ2vnrf (Spotify), https://podcasts.google.com/?feed=aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vbWlub3JpdHktbW9uZXkv (Google Podcasts), or on your favorite podcast app and https://www.facebook.com/sharer/sharer.php?u=https://www.minoritymoneypodcast.com/podcast (SHARE THIS) with a friend. ********** Let's Continue the Conversation! Head on over to the Facebook Group and let’s discuss how we can change the complexion of wealth (https://www.facebook.com/groups/423846561552747/ (https://www.facebook.com/groups/423846561552747/))  Want to chat with a fee-only financial planner? Shoot me an email at emlen@minoritymoneypodcast.com Can't wait to meet you.

What the Riff?!?
1983 - January: Def Leppard “Pyromania”

What the Riff?!?

Play Episode Listen Later Dec 28, 2020 42:53


All right.  I got something to say...It's better to burn out than fade away!Def Leppard would go from a popular band to the stratosphere of rock music with their third album, Pyromania.  The band lineup for this album would be front man Joe Elliott, Rick Savage on bass, Rick Allen on drums, Steve Clark on Guitar, Pete Willis on rhythm guitar, and newcomer Phil Collen on guitar.   There's an explanation for why the lineup seems a bit guitar-heavy.  While the album was being recorded Pete Willis was fired for "excessive alcohol abuse."  Phil Collen was brought in as a replacement.  However, Willis' rhythm guitar work was used throughout the album.The band was originally called Atomic Mass when they started in 1977.  Elliott proposed the name Deaf Leopard, and then-drummer Tony Kenning suggested changing the spelling to Def Leppard.  Just before they started recording at the end of 1978, Kenning left the band.  He was replaced by Rick Allen.  The entire band was young - Elliott was only 18 when they formed - but Allen was only 15 when he joined!The band began becoming more popular with their second album, High 'n' Dry, which was produced by Robert John "Mutt" Lange.  Mutt Lange would also produce Pyromania and Hysteria, which were the killer albums for the group.Pyromania is a bit of a transition album, as the songs ranged from hard rocking numbers to more popular MTV-oriented rock.  The big hits were staples in the MTV rotation, with "Rock of Ages," and the bit hit "Photograph," which knocked Michael Jackson's "Beat it " off the number 1 "most requested video on MTV.  But every song on the album is a good one.  We're featuring some of the deeper cuts to give you a sense of how awesome this album is beyond the big hits we know so well.  Rock! Rock! (Till You Drop)This is the lead track on the album, and received air play on rock-oriented radio despite not being released as a single.  It's a pretty straightforward rock anthem.  It was originally titled "Medicine Man" according to Wikipedia, and had different lyrics.  "So grab a little heat and come along with me, 'cause your mama don't mind what your mama don't see."StagefrightThis is a deeper cut that was the opening song for their Hysteria tour.  It was also a song about picking up groupies at the concert.  Def Leppard was legendary for their "activity" with groupies during breaks and solos at the concert.Die Hard the HunterHere is a rare song with a deeper meaning.  This deep cut is about war and post-traumatic stress disorder.  It talks about a returning soldier who can't leave the war behind.  "You got no enemy, no front line.  The only battle's in the back of your mind.  You don't know how to change from bad to good.  You brought the war to your neighborhood."Foolin'This track is their third single from the album, and chronicles a love gone bad.  "On and on we rode the storm.  The flame has died and the fire has gone.  Oh, this empty bed is a night alone.  I realized that long ago." ENTERTAINMENT TRACK:Main Theme from the television series The A-TeamHere is Mr. T's big television role after Rocky III.  I love it when a plan comes together!  STAFF PICKS:Don't Tell Me You Love Me  by Night RangerWayne kicks off the staff picks with this hit from Night Ranger's debut album "Dawn Patrol."  This has a straightforward rock style with a good balance between dual guitars and keyboards to create a wall of sound. Their first five albums sold over 2 million  Even Now by Bob Seger & The Silver Bullet BandRob brings us the second hit from Seger's album "The Distance."  Many musicians were used on this album including the Mussel Shoals Rhythm Section, Glenn Frey, and Bonnie Raitt.  Seger worked with the Eagles on their song "Heartache Tonight."Sexual Healing  by Marvin GayeBrian's staff pick takes the pace down with this iconic ballad - one of the first songs to use the Roland TR808 drum machine.  The song was inspired by a visit from author David Ritz, and an observation that Gaye needed to break away from pornography - he needed sexual healing!  Ritz wrote the song. Atomic Dog by George ClintonBruce cranks up the funk with the last Parliament Funkadelic song to reach number ` on the US R&B Chart.  Clinton was still "feeling pretty good" from a night of heavy partying and composed most of the song spontaneously - with David Spradley and Garry Shider standing on either side of him to keep him steady at the microphone.  "nothin' but the dog in me!" INSTRUMENTAL TRACK:Epilogue (Resolution) by TriumphClassically trained Rik Emmett would have at least one instrumental on Triumph albums, and this one finishes their sixth album "Never Surrender."

Money Savage
Impact and ESG Investing with Jennifer Kenning

Money Savage

Play Episode Listen Later Dec 16, 2020 20:37


On this show, we talked about the evolution of impact and ESG investing, how these approaches can fit into your overall financial plan, and how to get started with Jennifer Kenning, CoFounder and CEO of Align Impact.  Listen to learn how you can address major issues like social justice and climate change by how you invest your money!  For the Difference Making Tip, scan ahead to 18:31! You can learn more about Jenn at AlignImpact.com, Twitter and LinkedIn. We’re honored to have been named one of the top podcasts from investing! We’re on YouTube, check us out! George is honored to be included on Investopedia's list of the Top 100 Financial Advisors for 2019! Have George speak to your organization. You can learn more about the show at GeorgeGrombacher.com, Twitter, LinkedIn, Instagram and Facebook or contact George at Contact@GeorgeGrombacher.com.

Real Leaders Podcast
Ep. 156 Impact Investing Helps CEO Find Fulfillment || Jennifer Kenning, CEO of Align Impact

Real Leaders Podcast

Play Episode Listen Later Dec 9, 2020 28:47


Jennifer Kenning is the Co-Founder and CEO of Align Impact who comes on the show to share how impact investing has made a significant difference in both her personal and financial health.

The Beyond Capital Podcast
Advising for Good: Jennifer Kenning of Align Impact

The Beyond Capital Podcast

Play Episode Listen Later Nov 10, 2020 34:55


According to a CNBC report, as of the end of the second quarter 2020, 534 index funds focused on sustainability, overseeing a combined $250 billion. In the U.S., assets in sustainable index funds have quadrupled in the last three years and now represent 20% of the total. In this episode, we speak with Jennifer Kenning, the co-founder and CEO of Align Impact, an independent fiduciary and impact specialist that works with clients to help them integrate impact strategies and investments into their broader wealth management strategy. Jenn was previously a Partner and Board Member at Aspiriant, a wealth management firm, before leaving to start Align.  "I believe measuring and reporting should inspire a change in behavior, an a-ha moment," says Jenn. "Knowing what you own and educating yourself on what's out there - that is power."

KRWC Radio 1360 AM
Cardinal Cut In's - Offensive Player of the Week, Kessler Kenning

KRWC Radio 1360 AM

Play Episode Listen Later Oct 29, 2020 2:59


Senior Tackle Kessler Kenning. Kenning returned to play after being injured in week 1. He, and the rest of Annandale's offensive line help the Cardinals rush for 221 yards on their way to a 34-3 win over Milaca. Listen in as our 'Voice of the Cardinals' Jeremy Wheeler chats with Kessler about the game in Milaca, and the upcoming week 4 game at Foley. Offensive Player of the Week interviews are sponsored by Jeff Lundquist with the Heart of the Lakes Team of Keller Williams Cardinal Cut In's are brought to you by Trueman Welters Powersports, Lake Central Bank, Homestyle County Cafe, and David Burd State Farm Insurance.

Learning Literature with Purba
Episode 10 : Litotes & Kenning

Learning Literature with Purba

Play Episode Listen Later Sep 24, 2020 3:52


Both Litotes and Kenning are used in our daily language as well as in English Literature. Check out the usage and meaning of these two literary devices.

Working In TV
Episode #3 James Kenning - Sound Recordist Interview

Working In TV

Play Episode Listen Later Sep 9, 2020 62:10


Welcome to Episode 3 of Working In TV.This week we have a brilliant guest James Kenning talking to us about his career as a Sound Recordist.Really enjoyed talking to James as he's done so many different kids of TV shows. We worked together a few years ago and through our mutual love of moaning and football we've kept in touch ever since. He is genuinely one of the nicest guys in TV and I found it very interesting to hear what he had to say about the industry and all the problems and issues people face in finding work and keeping going.We talked about the forgotten LTD campaign you can read some more about that cause here : https://www.bbc.co.uk/news/entertainment-arts-53028015here: https://forgottenltd.com/and here: https://www.broadcastnow.co.uk/freelancers/freelancers-plight-captured-in-video-campaign/5148850.articleHope you enjoy this one as much as we did recording it and remember to rate us and Subscribe so you never miss an episode.CheersLinks:My Website: jackcuthbert.comJames Kenning's Website: http://www.jameskenning.co.uk/tv.htmlJame's Pure Shave Website: https://pureshave.co.uk/

Decay - A Podcast about Urban Exploration and Abandoned Places
01. Welcome… to Forest Haven Mental Health Center

Decay - A Podcast about Urban Exploration and Abandoned Places

Play Episode Listen Later Aug 18, 2020 14:12


In this episode, we go inside the notorious Forest Haven Mental Health Center with host Thomas Kenning. Closed by court order in 1991 - after numerous documented cases of negligence - this shuttered facility in the woods of Maryland, just outside of Washington, DC is a popular spot for urbex enthusiasts. Kenning reflects on a close call while exploring with some friends - and the deeper human themes that often get left out of the more sensational YouTube videos filmed at this tragic location...

Kids Story Room
INTERVIEW WITH GEORGIE KENNING

Kids Story Room

Play Episode Listen Later Aug 13, 2020 19:50


National Science Week South Australia is continually growing and improving, and they want to know who is attending events!Please take two minutes to fill out this anonymous survey so that they can gain a better understanding of the people who attend National Science Week events. THANKS!! Click here to complete the survey. This additional podcast discussion is with South Australian marine scientist Georgie Kenning from the Marine Discovery Centre to further unpack ideas around marine life sustainability. Support Pack Blobfish Pod Play National Science Week is Australia’s annual opportunity to meet scientists, discuss the hot topics, do science and celebrate its cultural and economic impact on society—from art to astrophysics, chemistry to climate change, and forensics to future food. National Science Week 2020 will run from 15-23 August. Event details can be found at www.scienceweek.net.au, and there is also a specific program of the events and activities organised by the South Australian community.   This project has been supported by a National Science Week SA Community Grant.    KIDS STORY ROOM Our Website is www.kidsstoryroom.com Find us on Facebook www.facebook.com/kidsstoryroom Shop is http://teespring.com/stores/kids-story-room  If you would like to support us please go to www.patreon.com/kidsstoryroom and make a pledge. This will help us reach our goal of publishing our first eBook.  

CyberHub Engage Podcast
Ep. 79 - Kausar Kenning, VP, Cybersecurity, Fraud Analytics and AI at E*TRADE

CyberHub Engage Podcast

Play Episode Listen Later May 13, 2020 53:32 Transcription Available


Kausar Kenning, VP, Cybersecurity, Fraud Analytics and AI at E*TRADE joined James to discuss how Data analytics and fraud are evolving, changing or staying the same in the era of Covid19. Kausar goes into detail on how data analytics are playing an active role in reducing fraud and identifying patterns and so much more. Sign up for our newsletter to make sure you never miss any CISO Talk Content

My Digital Doorstep Podcast
Interview with Rachel Kenning

My Digital Doorstep Podcast

Play Episode Listen Later May 7, 2020 77:52


This week I sit down with Rachel Kenning the owner and founder of Top Bop, funky jazz dance classes. What I liked about talking to Rachel was that there was allot similarities between her journey and our journey with Bounceagogo. This is definitely an interesting insight into the hurdles faced when setting up and running a small business (not least dealing with COVID).  You can follow Rachel @bop_top on twitter and @top_bop on Instagram. You can also check out the Top Bop site at www.topbop.co.uk  You can get this and all other episodes at the show's website. You can follow the show @doorstep_my on twitter, @mydigitaldoorstep on Instagram and www.facebook.com/mydigitaldoorstep  You can also support the show on www.patreon.com/mydigitaldoorstep 

Mission Matters Money
The Benefits of Impact Investing with Jennifer Kenning

Mission Matters Money

Play Episode Listen Later Mar 19, 2020 10:35


Impact investing was once considered a novel way to invest by many. Some believed there was a tradeoff between the quality of investment and mission-based companies. In this episode, Adam Torres and Jennifer Kenning, CEO and Co-Founder at Align Impact, discuss how impact investing can be the core of any investors' portfolio.Follow Adam on Instagram at https://www.instagram.com/askadamtorres/ for up to date information on book releases and tour schedule.Apply to be interviewed by Adam on our podcast:https://www.moneymatterstoptips.com/podcastguest

Success Hackers |  Empowering Entrepreneurs to Play Bigger in Business and Life
139. Jenn Kenning shares the importance of impact investing

Success Hackers | Empowering Entrepreneurs to Play Bigger in Business and Life

Play Episode Listen Later Jan 27, 2020 29:52


Jennifer Kenning co-founded Align Impact in 2014 on the conviction that we need to align the wealth management process with our values to optimize our financial system, and to do this we needed to get all of the actors across the financial spectrum working together to improve outcomes. Align works alongside financial advisors, institutions, foundations and directly advises individual clients and their family offices, all in the service of integrating impact investments into the broader wealth management strategy. In 2017, Jennifer was selected as one of the 16 Innovators as part of InvestmentNews “Icons and Innovators” feature for 2017. Jennifer was named “40 under 40” for Investment News in 2014, a finalist for “Rising Star for Family Wealth” report, and selected for Private Asset Management’s “50 Most Influential Women in Private Wealth” in 2016

Work Alchemy: The Impact Interviews-Ursula Jorch chats with Seth Godin, Marianne Williamson, Martha Beck, Prince Ea & others

A recognized voice in impact investing, Jenn Kenning talks about mistakes mission-focused entrepreneurs make, and how we can increase our impact in business and beyond.

Marxist Poetry
thinking thoughts with Kenning Jean-Paul García

Marxist Poetry

Play Episode Listen Later Nov 11, 2019 81:30


@KJPGarcia joins the podcast to talk about xyr notvel OF: What Place Meant. Support Kenning on Patreon & check out xyr memes on Instagram! As always, the music is by @BigProsody. Follow us @MarxistPoetry.   

KRWC Radio 1360 AM
Cardinal Cut In's Defensive Player of the Week; Kessler Kenning

KRWC Radio 1360 AM

Play Episode Listen Later Oct 3, 2019 4:52


The Annandale Cardinals scored a huge homecoming win vs previously undefeated New London-Spicer 31-14. The Cardinals were led on defense by Junior defensive tackle Kessler Kenning - listen in as Kessler chats with KRWC's Jeremy Wheeler about the big win for homecoming and the upcoming game vs Watertown-Mayer.

Saving the Game
STG 153 - Publishing (with Kyle Rudge)

Saving the Game

Play Episode Listen Later May 28, 2019 80:45


Jenny and Peter welcome Kyle Rudge of Geekdom House and Mythos & Ink back onto the mics, this time to talk about publishing! We've a bit of news first—Grant's out for a bit due to some health issues, and that's also shaken up our gaming schedule, which means there might be an Innocents game in the works. Also, Feng Shui 2! Our Patreon question comes from Kenning, who asks "If you got superpowers (say, basic superstrength and flight), what would you do with them?" After our Scripture reading, we dive into the publishing business with Kyle. What's the writing process look like from the publisher's perspective? What do fair contracts look like, and what's predatory? What are some common pitfalls? What's self-publishing and crowd-funding done to the publishing industry? And what's it like trying to be a publisher appealing to geeky Christians? For more information about Mythos & Ink, visit their website and follow them on Twitter! Scripture: Genesis 1:1, Job 19:23-25, Proverbs 27:9, Nehemiah 8:1-3, James 3:17

Saving the Game
STG 150 - Why We Love Games

Saving the Game

Play Episode Listen Later Apr 16, 2019 52:36


It's our one hundred fiftieth episode, and we are excited! We've got a lot of people to thank, of course, and spend a couple minutes at the top of the show doing that. We've also got a touch of podcast business, and a mention of a recent episode of the Marengo Holy Happy Hour radio show that Peter appeared on to talk about gaming and Saving the Game. Finally, Grant has a specific shoutout to give to his friends Patrick and Tyler for helping with his Vampire game questions. (If you want a chance to play in their incredible games, by the way, check out The Gauntlet!) Oh, and there's an airhorn. Our incredibly timely Patreon question comes from Kenning, who asks "What is your favorite episode of this podcast so far?" After our Scripture readings, we start in on our topic proper: Why we love games! Our answers are mostly about stories and experiences, but also systems, community, self-exploration, and more. Naturally, we want to hear yours as well! Also mentioned in this episode: The Miskatonic University board game; Epidiah Ravachol, A Scoundrel in the Deep, and Worlds Without Master; One Shot's actual play of A Scoundrel in the Deep; LoadingReadyRun; and Adam Koebel. Scripture: Jeremiah 29:11, John 13:35, Acts 2:46-47, Hebrews 10:23-25

Get LIT With Leza
Kenning JP Garcia Gets Lit & Existential

Get LIT With Leza

Play Episode Listen Later Apr 16, 2019 92:41


Kenning JP García is an Afro-Absurdist diarist and the one and only NahNahist antipoet living in Albany, NY. Kenning is the author of This Sentimental Education, Slow Living, and Yawning on the Sands. Kenning is an editor at Five 2 One, Rigorous and runs the Ex-Spec Po section of the Operating System. We talked Proust, St. Rocco's Reading Series, Twisted Fairy Tales, serial killers & the appeal of tragedy, while he drank at a bar in Albany. Find Kenning being a sassy Cancerian on Twitter, IG & FB @KJPGarcia

Story In Mind
Kenning

Story In Mind

Play Episode Listen Later Mar 14, 2019 60:27


A Nordic literary device for Fantasy and beyond.

Saving the Game
STG 147 - Angels and Angelology

Saving the Game

Play Episode Listen Later Mar 4, 2019 55:25


It's time for our Patreon-selected topic for the quarter, and this one's so big it'll take up two episodes! Our topic this week is angels, and with so much material to work with we just had to break this topic up. This episode has relatively little pure gaming content, because we had to push all of that off until next week! First, though, we talk about recording another session with City on a Hill Gaming, and Peter's side quest episode, as well as a brief note about Grant's upcoming Vampire game. Our Patreon question this week comes from Kenning, who asks, "What is your favorite movie to talk about? Not necessarily a good movie, but an interesting one to talk about?" After quite a lot of Scripture to read—turns out there's plenty of verses about angels!—we tackle our main topic: Angels and angelology! What even are angels? What's their purpose? What do we know about them, and from what sources? How do they appear in popular culture? And why do we care about the opinions of Pseudo-Dionysius the Areopagite on the matter? Mentioned in this episode: Gustav Davidson’s A Dictionary of Angels: Including the Fallen Angels, Gill's Exposition of the Bible, STG 110, "Spiritual Warfare (with Rev. Derek White)", Min/Max Podcast #83, "Devastation: By Kobold" Scripture: Genesis 3:23-24, 2 Kings 6:17, Isaiah 6:1-4, Ezekiel 1:4-21, Daniel 10:5-14, Luke 2:8-14, Colossians 1:16

Ruhrpottcast
Ruhrpottcast #12 - "Kenning Karneval, alder!"

Ruhrpottcast

Play Episode Listen Later Feb 24, 2019 62:25


Latest episode of Ruhrpottcast

Sessions From Studio A
Sessions from Studio A - Kraig Kenning

Sessions From Studio A

Play Episode Listen Later Oct 12, 2018 52:00


Kraig Kenning performs "Left Chicago" Dockside Live at the Prairie St. Brewing Co.

KRWC Radio 1360 AM
Cardinal Cut-In's Player Interview; Kessler Kenning

KRWC Radio 1360 AM

Play Episode Listen Later Oct 4, 2018 5:06


Our own Jeremy Wheeler sits down with Annandale Cardinals Defensive Player of the game Kessler Kenning. The Sophomore defensive end made some bit hits and forced a couple fumbles Friday night against the Royals of Watertown-Mayer.

Renegade Talk Radio
E.G Goes In on SEARS, KMART R.I.P/ALSO MAN KILLS WOMAN AND SAYS GOD TOLD HIM TO DUE IT!!!!!

Renegade Talk Radio

Play Episode Listen Later Oct 3, 2018 23:55


As of Aug. 4, the company still had 506 Sears locations, including 482 full-line department stores and 360 Kmart stores, according to a public filing. Sears spokesman Howard Riefs declined to confirm the latest round of closures, referring instead to the company's Sept. 13 statement: “We continue to evaluate our network of stores, which is a critical component to our integrated retail transformation, and will make further adjustments as needed.” According to the criminal complaint, Kenning turned himself into the St. Cloud Police Department on September 29 and admitted to killing someone. When officers responded to his residence in St. Cloud, they found Moy’s deceased body. Kenning told police that he met the victim at a wedding and that they communicated over Facebook messenger. He said that he picked Moy up on September 28 and drove her back to his house. He said they went down to his basement on the early morning hours of September 29 where he tied her legs and handcuffed her arms to a table. He admitted to strangling her with one hand while she was tied up. He told the investigator that God told him he needed to kill someone and that he would be able to resurrect them. He said he was “supposed to” kill Moy the previous weekend but was unable to do so, the complaint said. daniel kenning Charges: St. Cloud Man Says He Strangled Woman Because God Told Him To Daniel Kenning (credit: Stearns County Jail) An autopsy found Moy died of probable asphyxiation due to probable strangulation. The manner of death was ruled a homicide.

Steve Dale's Other World from WGN Plus
A late night session with songwriter/guitarist Kraig Kenning

Steve Dale's Other World from WGN Plus

Play Episode Listen Later May 28, 2018


Steve Dale (in for Nick Digilio) welcomes local singer/songwriter and Dobro master Kraig Kenning, who plays a few examples of his slide-infused blues and folk sound, and talks about his influences like the Allman Brothers Band, life on the road, the unique sound you get from a Dobro resonator guitar, and more.

Money Savage
Impact Investing with Jennifer Kenning

Money Savage

Play Episode Listen Later Mar 28, 2018 20:56


On this show, we talked about what Impact Investing is and how anyone can take part in it with Jennifer Kenning, the Founder and CEO of Align Impact. Listen to find out why Jennifer thinks we’re going to begin seeing more and more opportunities for this and how you can incorporate it into your portfolio! For the Difference Making Tip, scan ahead to 18:56 You can learn more about Jennifer at AlignImpact.com, LinkedIn, and Twitter. Please subscribe to the show however you’re listening, leave a review and share it with someone who appreciates good ideas. You can learn more about the show at GeorgeGrombacher.com, or contact George by clicking here.

Light & Life - Talkback Matters Podcast

Kenning shares what he got up to when his parents worked nightly at their restaurant

One Sentence Or Less
#UnarmedForces Podcast | Jesse Yandell | American Dream U And Kenning Associates

One Sentence Or Less

Play Episode Listen Later Feb 15, 2017 13:02


The #UnarmedForces Podcast with Retired Army Ranger, Jesse Yandell.

LHDR CON PACO JIMENEZ
Especial def leppard nuevo lanzamiento 30 de octubre la hora del rock

LHDR CON PACO JIMENEZ

Play Episode Listen Later Oct 30, 2015 73:02


Hoy es el dia 30 de octubre lanzamiento a nivel mundial del nuevo disco titulado"Def Leppard-Def Leppard. Escuchalo desde este portal de la hora del rock,dejamos tus comentarios del disco!!! Def Leppard Def Leppard es una banda británica de Hard Rock originaria de Sheffield, Reino Unido, que iniciara su carrera a finales de los años setenta, y que alcanzaría su éxito con mayúsculas en la década de los ochenta, acercando al heavy metal a las emisoras de radio y al gran público en general, gracias a una mezcla rara de hard rock melódico con un gran trabajo vocal. Junto a otras bandas como Scorpions, Van Halen, Bon Jovi, Guns N' Roses, Iron Maiden Etc, es reconocida como una de las bandas de Heavy Metal superventas de los años 80. Def Leppard ha vendido más de 100 millones de álbumes alrededor del mundo, y dos de sus producciones han alcanzado la certificación de Diamante de la RIAA (Pyromania e Hysteria). De esta forma, se convirtieron en uno de los muchos grupos de rock con dos álbumes de estudio originales con ventas por más de 10 millones de copias en solo en los Estados Unidos y más de 20 en todo el mundo. La banda ocupa el número 31 el ranking de VH1 Los 100 mejores artistas de Hard Rock y el puesto número 70 en Los 100 artistas más grandes de todos los tiempos. En el año 1977, el bajista Rick Savage, el guitarrista Pete Willis y el baterista Tony Kenning, todos ellos estudiantes de la escuela Tapton, de Sheffield, (Reino Unido), se unieron para formar una banda de rock a la que denominarían Atomic Mass. Inmediatamente, se uniría a ellos quien sería su vocalista, Joe Elliott, quien originalmente audicionó para ser el guitarrista de la agrupación. Durante su juventud, Savage fue considerado como un joven talento en el fútbol. Inclusive, fue seducido para unirse al Sheffield United, a pesar de ser fanático del equipo rival, el Sheffield Wednesday". Sin embargo, jugó unos años en el United, pero luego, elegiría tomar el camino de la música. Conformada la banda, adoptarían el nombre de Deaf Leopard (Leopardo Sordo) inspirados en una antigua idea de Elliott, pero luego, tomarían la sugerencia de Tony Kenning de modificarlo ligeramente a Def Leppard, con el fin de evitar que los conectaran con bandas de punk rock. Mientras perfeccionaban su sonido, ensayando en una fábrica de cucharas, la banda decidiría contratar a otro guitarrista, Steve Clark, en enero de 1978. Acto seguido, Kenning se retiraría, a finales del mismo año, justo antes de que entraran al estudio para grabar su primer Extended Play, sería reemplazado por Frank Noon, quien solamente estaría junto a la banda para la grabación de lo que se convertiría en el famoso Def Leppard EP. Las ventas de dicho EP se elevarían, gracias a la difusión del tema Getcha Rocks Off que daría el Dj de la BBC Radio John Peel, considerado en ese momento, como una autoridad en el punk rock y de la música new wave. Finalmente, en noviembre de 1978, se uniría a la banda, el baterista Rick Allen, que en ese entonces sólo contaba con 15 años de edad. En el trancurso del año 1979 la banda iría ganando una fiel fanaticada entre el público metalero del Reino Unido, y serían considerados como los líderes iniciales del movimiento denominado como New Wave Of British Heavy Metal, cediendo, con el paso del tiempo, ese puesto en favor de Iron Maiden. Esta popularidad emergente resultaría en un contrato discográfico con el sello Phonogram/Vertigo. ] Su álbum debut, On Through the Night, saldría al mercado el 14 de marzo de 1980. A pesar del éxito de su EP anterior y el éxito comercial de On Through The Night, los fanáticos de la banda rechazarían la clara intención del grupo de ingresar en el mercado estadounidense. Esto quedaría en evidencia en temas como Hello America. Tal sería el rechazo de los fanáticos británicos, que en el Festival de Reading el público daría la bienvenida a la banda arrojándole desechos al escenario. La banda capta la atención del productor Robert John “Mutt" Lange quien trabajaba con AC/DC. Este accedería a producir el segundo trabajo discográfico denominado como High 'N' Dry, el cual fue editado en 1981. Lange logró potenciar de muy buena manera las características de cada uno de los miembros de la agrupación. Este trabajo consiguió ventas más pobres que su predecesor, pero el vídeo de la canción Bringin' On The Heartbreak fue uno de los primeros videos de heavy metal de 1982 emitidos en la cadena de televisión MTV. Esto le otorgó a la banda mucho reconocimiento en los Estados Unidos. Phil Collen, guitarrista de la banda glam rock llamada Girl, reemplaza a Pete Willis, quien fue despedido el 11 de julio de 1982 por problemas de alcoholismo. Esto ocurrió durante la grabación de su trabajo Pyromania, el cual saldría al mercado el 20 de enero de 1983. Este disco también fue producido por "Mutt" Lange. El primer sencillo Photograph convirtió a Def Leppard en una banda reconocida mundialmente. Además dominaron los charts estadounidenses durante seis semanas. Pyromania vendió más de 20 millones de discos en todo el mundo, incluidos más de 10 solo en los EE.UU. siendo certificado como Álbum de Diamante en ese país, y llevándolo al estatus de clásico de heavy metal. Por desgracia, el baterista Rick Allen pierde un brazo en un accidente automovilístico en el día de año nuevo de 1985, quedando la banda fuera de la escena musical hasta 1987. A finales de agosto de 1987 lanzan al mercado el álbum Hysteria, en el cual Rick Allen toca con un sólo brazo una batería-caja de ritmos adaptada especialmente para su discapacidad. De este álbum, seis de sus siete singles alcanzan el top 20 estadounidense. Dicho álbum, junto con Thriller y Bad de Michael Jackson, y Born in the U.S.A. de Bruce Springsteen son los únicos álbumes que han logrado tener siete temas dentro del US Hot 100 Singles de los EE.UU. Hysteria ha vendido más de 20 millones de copias en todo el mundo. El 22 de agosto se lanza en el Reino Unido el primer single denominado Animal, el cual llega al lugar 6 dentro del Top 10. El día 29 del mismo mes se lanza el álbum y debuta en el Reino Unido en el número 1, dando el éxito final al grupo en su tierra natal. Sorprendentemente en EE.UU., donde ya gozaban de una grandísima popularidad, no alcanza inmediatamente esta posición, alcanzando al principio el número 4. En relación con el lento ascenso en tierras estadounidenses, el 5 de septiembre el primer single en EE.UU., Women, llega hasta el número 80. El 1 de octubre la banda comienza el tour en Glens Fall, Nueva York, donde se introduce el famoso escenario In The Round. El 3 de octubre se lanza en el Reino Unido el tema Pour Some Sugar On Me el cual llega hasta el puesto 18. El 5 de diciembre en Reino Unido aparece el tercer single, Hysteria, que alcanza el puesto 26. El 26 de diciembre se lanza el sencillo Animal en los EE.UU. Se trata del primero de los seis singles del álbum que alcanzarán el Top 20. En este caso este tema alcanza el puesto 19 en la lista estadounidense. Steve Clark, guitarrista fallecido en 1991. El 26 de marzo se lanza en EE.UU. el primer Top ten, Hysteria, alcanzando el número 10. El 16 de abril el tema Armageddon It llega al número 20 en el Reino Unido. El 5 de julio se lanza el video Historia que contiene todos los clips hasta la fecha desde los '80. Tiene también como un video conmemorativo de los 18 años del grupo. El 23 de julio se lanza Pour Some Sugar On Me, en EE.UU. y alcanza el puesto No. 2 tras Hold On To The Night de Richard Marx, siendo certificado con oro al alcanzar más de un millón de ventas en ese país. Al mismo tiempo, Hysteria lidera el US Album Chart (lista de álbumes en los Estados Unidos) después de 49 semanas. Es la primera vez que una banda de rock vende más de 5 millones de copias de dos álbumes consecutivos en los EE.UU. El 30 de julio la balada Love Bites llega al 11 en el Reino Unido. El 8 de diciembre se lanza el quinto single en los EE.UU., Love Bites, que llega al 1 en la lista US Hot 100 Singles Chart e Hysteria alcanza el rango supremo de los US Album Charts. A finales de octubre finaliza el tour de 225 días, y la banda ingresa al estudio para grabar un nuevo disco con la promesa de que en 18 meses estará listo. De esta forma, pretenden evitar demorarse nuevamente otros cuatro años en editar un nuevo disco. El 8 de enero de 1991, su guitarrista líder Steve Clark, muere debido a la fatal combinación de medicamentos con alcohol. , sale a la venta en 1992 el álbum Adrenalize, nuevamente de gran éxito, (llegó al número 1 en EE.UU.) aunque de menor impacto comparado con su antecesor y esta vez con Vivian Campbell (ex Dio y Whitesnake) como guitarrista, en reemplazo del fallecido Clark. El disco ha vendido alrededor de 8 millones de copias a nivel mundial. A partir de ese momento, con la aparición del grunge, Def Leppard pierde la aceptación masiva que gozaba en los años 80's. En 1992 actúan en el Concierto en Tributo a Freddie Mercury, en el cual se rinde homenaje al fallecido vocalista de la agrupación inglesa Queen, de la que se han declarado fanáticos en muchas ocasiones los músicos de Def Leppard. La banda vuelve a la cima saliendo de gira y logrando un gran reconocimiento en su ciudad natal, Sheffield, Reino Unido, donde tocaron con entradas agotadas en el estado de Don Valley en junio de 1993. También para ese año el grupo lanza un nuevo trabajo, “Retro Active” que contiene caras B remezcladas, y 2 nuevos temas Two Steps Behind (originalmente incluida como parte de la banda sonora de la película Last Action Hero de Arnold Schwarzenegger) y Miss You In A Heartbeat que logran ser hits en los Estados Unidos y Canadá. En este álbum evitan salir de gira y después de unas pequeñas vacaciones, la banda va a España a grabar su próximo trabajo. Con el séptimo álbum casi listo, lanzan un CD de Grandes éxitos llamado Vault, que contiene un nuevo tema llamado When Love & Hate Collide. El 5 de octubre de 1995, la ciudad natal de Def Leppard, Sheffield, les brinda un homenaje presentando una placa en su honor y abriendo el National Centre For Popular Music con material de la banda. Días después la banda logra un récord mundial tocando 3 shows en 3 continentes diferentes en sólo un día: Tánger, Marruecos, en En 1996, editan Slang, un álbum que marca una nueva dirección musical, con un sonido muy diferente a todo lo anterior, con gran influencia grunge, un sonido noventero más fresco y menos sobreproducido respecto a los discos anteriores. Comienzan un tour en Asia y se embarcan en una gira mundial llegando a Sudamérica por primera vez. Aunque Slang tuvo excelentes criticas de la prensa, no fue un éxito comercial. Las bajas ventas del disco fueron un aviso para la banda de que los fanáticos querían de vuelta el sonido característico de Def Leppard. A sabiendas de las solicitudes de su público para su noveno trabajo, Def Leppard retorna al sonido más roquero que supo tener en Pyromania e Hysteria. En 1999, lanzan el disco Euphoria, volviendo al sonido que los hizo conocidos y además contando con la colaboración nuevamente de Mutt Lange, que participa como co-compositor en tres de las 13 canciones del álbum. Para el verano de 1999 la banda sale nuevamente de gira en los Estados Unidos. Finalmente, en septiembre de 2000, Def Leppard es presentado por el guitarrista de Queen, Brian May, en una ceremonia homenajeando su inclusión en Rock Walk de Hollywood, California, EE.UU. Todos los miembros dejaron sus manos estampadas en cemento, junto con Lauren la hija de Rick Allen, y un espacio especial destinado a Steve Clark. Vivian Campbell, guitarrista que reemplazó al fallecido Steve Clark. El décimo disco de su carrera, se titula X, y salió al mercado en agosto de 2002. Se trata de un álbum bastante comercial en el que han trabajado con varios de los mejores productores del mundo y que mezcla el estilo de Slang con el de Adrenalize y Euphoria. Al igual que el anterior Euphoria, ha existido el grave problema de que la discográfica no ha prestado prácticamente apoyo a la banda, resultando una promoción pésima que ha influido gravemente en las ventas. A pesar de esto la agrupación realizó una exitosa gira promocional. En octubre de 2004, su discográfica ha lanzado al mercado Best Of Def Leppard, un álbum sencillo con 17 temas a modo de actualización del recopilatorio Vault que salió en 1995 y un Cd Doble con 34 canciones, edición que salió para el resto del mundo (en Estados Unidos y Norteamérica, salió en 2005 Rock of Ages The Definitive Collection). En 2005 solo para Norteamérica, salió al mercado Rock of Ages The Definitive Collection, acompañado este disco de una gira compartida con Bryan Adams solo por Estados Unidos, también tuvieron presentaciones en Canadá y después de 8 años regresaron a México. A mediados del año 2006 Def Leppard saca al mercado un álbum de versiones de artistas de los años 60 y 70 que influyeron a la banda, y que se ha llamado Yeah!, con temas de David Bowie, Roxy Music, The Kinks, entre otros, que tenían grabado desde hace más de dos años y que por diversos motivos no pudieron lanzar anteriormente. En el verano de 2006 salen de gira compartiendo escenario con Journey, haciendo presentaciones en EE.UU., algunos conciertos en Europa y cerrando su gira en Puerto Rico. En julio de 2007, lanzan una edición especial de Hysteria remasterizada en dos CD, para conmemorar los 20 años de su salida al mercado. Lleva por título "Hysteria the Luxe Edición" que incluye, además, las caras B, versiones extendidas y canciones en vivo. Para el Verano de 2007, salen de gira nuevamente, acompañados por Styx, Reo Speedwagon y Cheap Trick, al mismo tiempo fueron preparando su nuevo disco, Songs from the Sparkle Lounge. Para 2008 sale el Álbum "Songs from the Sparkle Lounge" y la banda realiza un tour junto con la banda Whitesnake, donde recorren parte de Europa y el Reino Unido en junio. Su nuevo álbum Songs From The Sparkle Lounge, retorna a un sonido más roquero. El primer single del disco es "Nine Lives", incluye la participación del cantautor country Tim McGraw. El segundo sencillo " C'mon C'mon" fue la canción con la que se promocionó la Temporada 2008 de la NHL. La banda con este último disco ha tenido bastante mejor apoyo mediático que sus antecesores de esta década, esto es ayudado, entre otras cosas, con la aparición con tres temas para el popular videojuego Guitar Hero III. Tuvieron también a finales de 2008 una participación especial con Taylor Swift, en el programa CMT Crossroads que junta estrellas de música country con estrellas de rock o pop, interpretaron a dueto Photograph, When Love and Hate Collide, Hysteria y Pour Some Sugar on Me, así como algunas canciones de Taylor Swift. Para 2009, Bret Michaels, vocalista de Poison, anunció un tour en conjunto con Def Leppard y Cheap Trick, el cual empezó en junio y contempló 40 conciertos sólo para Estados Unidos. El 12 de junio de 2010 comenzaron su gira dando un concierto en el O2 de Dublín junto a Whitesnake y Journey. Miembros Joe Elliott - Voz, Guitarra, Teclado - (1977-presente) Phil Collen – Guitarra solista, Guitarra rítmica, Coros - (1982 -presente) Vivian Campbell - Guitarra rítmica, Guitarra solista, Coros - (1992- presente) Rick Savage - Bajo eléctrico, Teclado, Coros - (1977-presente) Rick Allen - Batería, Percusión - (1978- presente) Antiguos miembros Steve Clark - Guitarra rítmica, Guitarra principal, Coros (1978-1991) Pete Willis - Guitarra solista, Guitarra rítmica, Coros (1977-1982) Tony Kenning - Batería, Percusión (1977-1978) Frank Noon - Batería, Percusión (1978) Músicos de gira Jeff Rich - Batería, Percusión (agosto de 1986 – Suplente de Rick Allen) Álbumes de estudio On Through the Night (1980) High 'N' Dry (1981) Pyromania (1983) Hysteria (1987) Adrenalize (1992) Slang (1996) Euphoria (1999) X (2002) Songs from the Sparkle Lounge (2008) Def Leppard -Def Leppard (2015)

AgedCareInsite
Gail Kenning

AgedCareInsite

Play Episode Listen Later Jul 29, 2015 5:11


Gail Kenning by AgedCareInsite

Yara's Haunt
Chelyabinsk

Yara's Haunt

Play Episode Listen Later Apr 16, 2015


Chelyabinsk If you cannot see the audio controls, your browser does not support the audio element Tonight's story was entitled Chelyabinsk and was written by M.N. Malone.The story can be found on mnmalone.com and the author can be reached on Facebook.The music for tonight's episode was written by Westy Reflectory and Lee Rosevere, recompas, Podington Bear, and Costello di Trokai. Their music can be found: here.The part of Mr. Kenning was done by Cregg Riley. He can be reached at criley105@gmail.com.Narration and Production was done by Derrick Penrod.Would you like to contact Yara for any reason? Would you like your story, music, or artwork featured in another episode?Yara can be reached at yarashaunt@gmail.com. Like us on Facebook or follow us on Twitter @yarashaunt.Thank you for listening, and may your fear be sharpened.

Soul Music of the World
Welcome the the Party: Jazzanova Remix

Soul Music of the World

Play Episode Listen Later Feb 1, 2011 8:09


Welcome to the Party Artist: Har You Percussion Group Remixed by Jazzanova Album: Jazzanova the Remixes  1997-2000

Chicago Acoustic Underground Podcast
Episode 212 - Kraig Kenning

Chicago Acoustic Underground Podcast

Play Episode Listen Later Jul 15, 2009 33:48


Kraig KenningThis brilliant "Road Dog" singer/songwriter took time out of his busy schedule to join Jeff Brown and I for a very special evening of his beautiful music. I am sure that you will enjoy this marvolous show.Be sure to check out his myspace page for his long list of performance dates. You owe it to yourself to see this man live.