Podcasts about look what

  • 23PODCASTS
  • 31EPISODES
  • 55mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Feb 25, 2021LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about look what

Latest podcast episodes about look what

Biblioteca Del Metal
Cinderella - (Descubiertos Por Gene Simmons)

Biblioteca Del Metal

Play Episode Listen Later Feb 25, 2021 63:33


La Tienda De Biblioteca Del Metal: Encontraras, Ropa, Accesorios,Decoracion, Ect... Todo Relacionado Al Podcats Biblioteca Del Metal Y Al Mundo Del Heavy Metal. Descubrela!!!!!! Ideal Para Llevarte O Regalar Productos Del Podcats De Ivoox. (Por Tiempo Limitado) https://teespring.com/es/stores/biblioteca-del-metal-1 Cinderella fue una banda estadounidense de hard rock. Su formación original estaba compuesta por Tom Keifer (voz y guitarra), Eric Brittingham (bajo), Michael Smerick (guitarra) y Tony Destra (batería). El sonido de la banda tiene claras influencias del rock & roll de AC/DC, la fusión del blues y el rock de bandas como Led Zeppelin y Rolling Stones, además de toques de rock sureño. La banda surgió a mediados de la década de 1980 con una serie de álbumes multiplatino y exitosos sencillos cuyos vídeos musicales recibieron una fuerte rotación en el canal MTV. A mediados de la década de 1990, la popularidad de la banda disminuyó severamente debido a reveses personales, rupturas y cambios en la industria de la música. Después de un breve paréntesis, Cinderella se reunió en 1996 y continuó tocando en vivo en los siguientes 20 años, pero nunca lanzó ningún material de estudio después de su álbum de 1994 Still Climbing. La agrupación vendió 15 millones de discos en todo el mundo según el sitio web oficial de Tom Keifer. Según Tom Keifer, Cinderella fue descubierta por Gene Simmons, líder de Kiss, quien les recomendó por primera vez a la discográfica PolyGram, pero en aquella ocasión fueron rechazados. ​ Ya en 1985, Jon Bon Jovi conoció a Cinderella cuando los escuchó tocar en el Empire Rock Club de Filadelfia, este quedó tan impresionado por la actuación que le pidió a su agente discográfico, Derek Shulman, que escuchase a la banda. PolyGram seguía manteniendo cierto excepticísmo hacia Cinderella, pero ante la insistencia de Jon Bon Jovi, accedieron a verles tocar en una actuación privada dedicada a productores. Tras la actuación, y aún sin demasiado entusiasmo, decidieron darles una oportunidad y les firmaron un contrato de prueba de seis meses, no sin antes obligarles a sustituir al guitarrista y al batería, pues según los productores no daban la talla. Tras ese tiempo Cinderella logró convencer a PolyGram y estos les firmaron su primer gran contrato. Debutaron en 1986 con Night Songs, de estilo glam metal, que vendió tres millones de copias y alcanzó el tercer puesto en las listas estadounidenses. Entre sus temas destacados están "Shake Me" y la balada "Nobody's Fool". En 1988, repitieron el gran éxito del primer disco con Long Cold Winter, de un sonido más bluesero y de influencias setenteras. La balada "Don't Know What You Got (Till It's Gone)", el medio tiempo "Coming Home" y las roqueras "The Last Mile" y "Gypsy Road" fueron la clave del impulso comercial del álbum. Con Heartbreak Station (1990), continuaron en la misma senda musical, que tuvo como arreglista a John Paul Jones, bajista y tecladista de Led Zeppelin. Este disco no alcanzó el éxito esperado. Sus sencillos más destacados fueron la balada "Heartbreak Station" y "Shelter Me", Tiempo después, Fred Coury se marchó de la banda, y en 1994 publicaron Still Climbing, que pasó desapercibido en un momento en que el grunge y el rock alternativo estaban en alza. Luego de estos inconvenientes decidieron separarse. Sin embargo, años más tarde se dio la tan esperada reunión, haciendo giras para recordar viejos tiempos y satisfacer al público que gusta de su música. En el verano de 2006 completaron un tour junto a la banda de glam metal Poison. Ambas bandas celebraban el vigésimo aniversario de sus discos debut, Night Songs y Look What the Cat Dragged In. La gira fue un éxito, convirtiéndose en una de las más exitosas de ese año. Cinderella confirmó en su sitio web que la banda saldría de gira en 2010 con dos fechas previas confirmadas.3​ Se anunció el 22 de febrero que Cinderella formaría parte de los festivales Rocklahoma y Sweden Rock Festival en 2010. En julio de 2010 la banda subió al escenario para abrir para Bret Michaels durante el Common Ground Music Festival, con la alineación original compuesta por Tom Keifer, Eric Brittingham, Jeff LaBar y Fred Coury. Luego abrieron algunos conciertos para la banda alemana Scorpions en su gira Get Your Sting and Blackout, En 2011, Cinderella emprendió una gira mundial por su 25º aniversario. Veinte shows fueron confirmados desde abril hasta julio. Durante la gira, encabezaron la primera edición del Festival "Shout It Out Loud" en Alemania. En el verano de 2012 la banda hizo una gira por los Estados Unidos con el excantante de Skid Row, Sebastian Bach. En marzo de 2013 hizo parte del Monsters of Rock Cruise 2013 junto a Tesla, Kix y Queensrÿche. En noviembre de 2017, Keifer declaró que Cinderella no tiene planes de reunirse, afirmando que "los problemas entre los miembros de la banda son irreparables"

Biblioteca Del Metal
Poison - (Acusados De Ser, Un Mal Veneno)

Biblioteca Del Metal

Play Episode Listen Later Feb 14, 2021 79:15


La Tienda De Biblioteca Del Metal: Encontraras, Ropa, Accesorios,Decoracion, Ect... Todo Relacionado Al Podcats Biblioteca Del Metal Y Al Mundo Del Heavy Metal. Descubrela!!!!!! Ideal Para Llevarte O Regalar Productos Del Podcats De Ivoox. (Por Tiempo Limitado) https://teespring.com/es/stores/biblioteca-del-metal-1 Poison es una banda estadounidense de Hard rock formada en Mechanicsburg, Pensilvania. Está formada por Bret Michaels (Voz, Guitarra rítmica y Armónica), C.C. DeVille (Segunda voz, Guitarra solista, Coros), Bobby Dall (Bajo, Teclados, Coros), y Rikki Rockett (Batería, Percusión, Coros). Fue popular desde mediados de 1980 hasta mediados de 1990, con más de 15 millones de álbumes vendidos en su país y más de 45 millones en todo el mundo. Poison es una de las bandas de Glam metal con más ventas de la década de 1980, siendo una de las agrupaciones más representativas de ese género. El estilo estrafalario en el vestir y del peinado de sus integrantes en los inicios de la banda atrajo a un gran número de seguidores, así como los vídeos musicales coloridos y con situaciones cómicas, siguiendo con la tendencia de otros grupos de gran éxito como Bon Jovi, Mötley Crüe, Europe, Ratt y Def Leppard. En total, desde que debutaron en 1986, la banda ha publicado siete álbumes de estudio, cuatro álbumes en vivo, ocho álbumes recopilatorios, y veintiocho sencillos. En 2015 VH1 los clasificó en el tercer puesto de su lista The Hair Metal 100: Ranking the ’80s Greatest Glam Bands. Poison inició su carrera musical en 1983 en la ciudad de Mechanicsburg, Pensilvania, Estados Unidos. De manera intencional Poison utilizó una imagen que recordaba a grupos como New York Dolls o Hanoi Rocks. París (el nombre inicial del grupo fue The Kidz, pero no duró mucho) se formó por iniciativa del vocalista Bret Michaels y el baterista Rikki Rockett, quienes se conocieron gracias a que Rikki era el estilista de la hermana de Bret. Ambos formaron parte de un grupo denominado The Spectres. Posteriormente reclutaron al bajista Kuykendall, mejor conocido como Bobby Dall y al exguitarrista de Dirty Angel, Matt "Ko Ko" Smith. Tomaron el nombre de Poison (veneno en español) de las acusaciones de las sectas religiosas, que los acusaban de ser un "mal veneno". Con esta alineación y ya con el nombre de Poison grabaron un demo, el cual incluía las canciones: "Rock Like a Rocker", "Razor's Edge" y "Steal Away". El legendario Kim Fowley (conocido por grabar los discos de The Runaways, entre otros más) convenció al grupo de mudarse a Tinseltown en marzo de 1984. Poison entonces se preparó para grabar lo que debía ser su álbum debut, sin embargo, las relaciones entre el grupo y Fowley no funcionaron y el proyecto quedó enlatado. Pese a todo, Poison empezó a presentarse en el circuito de clubs de Los Ángeles con todo su espectáculo. Poison (entonces manejados por Vicky Hamilton) no tardaría mucho de hacerse de un buen número de seguidores gracias al carismático Bret Michaels y de llamar la atención de la gente de Atlantic Records, para quienes la banda grabaría otro demo bajo el mando de Jim Faraci. Las canciones que formaron parte de este demo fueron: "#1 Bad Boy", "Want Some, Need Some" y "Blame It on You". Al final Atlantic decide no firmar a la banda. La frustración del grupo al no conseguir el contrato con Atlantic se incrementaría por la salida de Matt Smith. El guitarrista decidió dejar al grupo y regresar a Mechanicsburg para estar con su novia, quien estaba esperando el primer hijo de ambos. Más adelante Smith formaría parte de otra banda. De inmediato Poison realizó audiciones para encontrar a su nuevo guitarrista. Entre los postulantes se encontraba el guitarrista Slash, quien había audicionado por una recomendación de su amigo Matt, Bret votó por el debido a su estilo tipo Aerosmith pero Rikki y Bobby prefirieron a C.C. por el estilo más Van Halen, también debido a que Rikki le sugirió que debía de maquillarse y ponerse ropa más extravagante a lo cual el no aceptó, posteriormente Slash alcanzaría fama como guitarrista de Guns N' Roses. ​El elegido para el puesto fue el ex-St. James y Screaming Mini, C.C. DeVille. Finalmente con esta alineación, Poison estaba listo para sacar su álbum debut para la pequeña compañía Enigma Records, subsidiaria de Capitol Records. En 1986 lanzaron su álbum debut Look What the Cat Dragged In producido por Ric Browde. El material fue grabado en 12 días con un presupuesto de 23 mil dólares estadounidenses. Este álbum ha vendido más de 4 millones de copias en todo el mundo, siendo uno de los mejores álbumes debut en ventas de todos los tiempos. ​Lanzan en agosto su primer sencillo denominado «Cry Tough», sin embargo, este no tuvo tanto éxito que sus predecesores, con los hits: «Talk Dirty to Me», «I Want Action» y «I Won't Forget You», alcanzaron la notoriedad que deseaban. La fuerte rotación del vídeo de "Talk Dirty to Me" en MTV conseguirían colocar al disco en las listas del Billboard. Para promocionar el álbum, Poison salió de gira siendo telonero de grupos como Quiet Riot, Loudness y Cheap Trick. Por los Estados Unidos. Finalmente en 1986 realizan su primera gira mundial llamada Look What the Cat Dragged In Tour, contando con el apoyo de las bandas Ratt, Cinderella y Loudness. Por los Estados Unidos, Canadá y Japón, teniendo gran éxito en las presentaciones. Fueron nominados a Mejor Banda Nueva para los MTV Awards de 1987, también participan en el MTV New Year's el 31 de diciembre de 1987 interpretando "Rock and Roll All Nite" y I Want Action. En 1987 Poison grabó una versión de la canción "Rock and Roll All Nite" para la banda sonora de la película Less Than Zero. Una vez que la banda estuvo lista para entrar al estudio de grabación, surgió el rumor de que Paul Stanley (Kiss) sería el productor del segundo álbum del grupo (el cual en ese entonces tenía planeado titularse Swallow This). Estos rumores empezaron a circular desde que el vocalista de Kiss tocara junto a Poison durante el Texxas Jam '87, aunque no se concretó la participación de Stanley. En 1988, la banda lanza su segundo álbum titulado Open Up and Say... Ahh!, producido por Tom Werman (Cheap Trick, Mötley Crüe). El arte de la portada del álbum fue controversial, ya que representa una figura femenina demoníaca con una larga lengua obscena. La versión de la portada fue censurada, centrándose únicamente en los ojos de la figura. El álbum vendió más de 12 millones de copias en todo el mundo, siendo este el álbum más exitoso de la banda en lo que lleva de carrera. El disco incluyó los éxitos: «Every Rose Has Its Thorn», «Nothin' but a Good Time», «Fallen Angel» y «Your Mama Don't Dance», de Loggins and Messina. También se grabaron videoclips para las canciones "Every Rose Has Its Thorn", "Nothin' but a Good Time", "Your Mama Don't Dance" y "Fallen Angel". En la gira Open Up and Say Ahh! Tour contaron con el soporte de grupos y solistas como David Lee Roth, Tesla, Lita Ford y Britny Fox. En el MTV New Year's de 1988, Poison interpretó éxitos como "Fallen Angel" y "Every Rose Has Its Thorn". Recibieron el premio a la Mejor Banda del Año. A partir de 1989, Poison se había convertido en la séptima banda de Hard rock con más ventas en los EE. UU., tan solo detrás de Mötley Crüe, Def Leppard, Bon Jovi, Guns N' Roses, Aerosmith y Van Halen. En este mismo periodo la banda se vio envuelta en un escándalo cuando Bryn Bridenthal, directora de publicidad de Geffen Records, impuso una demanda de 1,1 millones de dólares a la banda por haberla empapado con bebidas alcohólicas dentro de una fiesta. Por otro lado, Sanctuary Music, la antigua compañía de administración del grupo, presentó una demanda de 45,5 millones de dólares por incumplimiento de contrato en contra de la banda. Poison respondió a la demanda con cargos de malversación de fondos. Los conflictos judiciales a Michaels le trajeron nuevas demandas en Atlanta, Los Ángeles y Tallahassee. A principios de 1990 salió a la venta el primer videohome del grupo titulado Sight for Sore Ears. Este vídeo incluía los ocho vídeos de Poison extraídos de sus dos primeros discos, además de comentarios del propio Bret Michaels. En ese mismo año, Poison daría sus primeros conciertos en Reino Unido. La banda se presentó en el Marquee Club de Londres y el Rock City en Nottingham. Posteriormente se presentarían ante más de 72.000 fanáticos como parte del festival Monsters of Rock junto a Whitesnake, Aerosmith, The Quireboys y Thunder. Este evento fue transmitido por la BBC Radio 1. El tercer álbum de la banda llegó en 1990 y se llamó Flesh & Blood; el cual fue producido por el mega-productor Bruce Fairbairn, conocido por sus trabajos con Bon Jovi y Aerosmith). Ya para este entonces, Poison había dejado a un lado la imagen 'Glam' con la cual se dieron a conocer. El álbum también cuenta con una portada alternativa, ya que el original tenía lo que parecía recorrer tinta o posiblemente sangre del tatuaje. (Versiones posteriores de esta portada retiraron la tinta "extra"). Este disco también fue multi-platino, vendiendo más de 8 millones de copias en todo el mundo, siendo el segundo disco más vendido de Poison. De este disco sobresalieron los sencillos: «Unskinny Bop», «Ride the Wind», «Life Goes On», «Something to Believe In», (esta fue escrita por Bret Michaels tras la muerte por sobredosis de Kimo Maano, uno de los guardias de seguridad de Poison), también como quinto y último sencillo del álbum lanzaron «(Flesh & Blood) Sacrifice» a finales de 1991.El vídeo de "Flesh & Blood (Sacrifice)" fue prohibido en MTV debido a su alto contenido explícito, pero más tarde salió a la luz a principios de 1991 en su segunda compilación de vídeo, Flesh, Blood, & Videotape. En 1990 se dio inicio a la gira Flesh & Blood World Tour, teniendo como invitados inicialmente a Warrant, hasta que las fricciones entre ambas bandas, forzaron a esta última a tener que retirarse en pleno tour, en medio de una guerra de declaraciones. Entre los otros grupos y solistas que participaron durante esta gira estuvieron Don Dokken, Alice In Chains, BulletBoys, Trixter y Slaughter. Dando conciertos en diferentes partes del mundo, el concierto de Reno Club en Reino Unido resultó ser uno en particular especial cuando se les unieron en el escenario Jimmy Page (Led Zeppelin) y David Coverdale (Whitesnake). También en 1990, Poison apareció en el programa MTV Unplugged haciendo versiones acústicas de temas como "Talk Dirty to Me", "Your Mama Don't Dance", "Unskinny Bop" y "Every Rose Has Its Thorn". ​Poison recibió una carta del Secretario de Defensa de los Estados Unidos, Dick Cheney, agradeciendo a la banda por contribuir con 20.000 copias del álbum Flesh & Blood para levantar la moral de las tropas de EE. UU., durante la Guerra del Golfo y su continuo apoyo a las Fuerzas Armadas. Para mediados de 1991 las tensiones en el interior del grupo empezaron a incrementarse forzando al grupo a tener que admitir que tanto Bobby Dall como C.C. DeVille se encontraban en clínicas de rehabilitación por su adicción a las drogas. El grupo canceló varias presentaciones, dando origen a los rumores sobre la posible disolución de la banda, en especial tras la cancelación de un festival en Islandia. En esta ocasión DeVille se molestó porque según él, no fue informado de la cancelación de este evento y tomó un avión para asistir a la presentación. Finalmente la ruptura de C.C. con el grupo se daría durante una presentación especial para la cadena MTV, en la que la banda debía interpretar la canción «Unskinny Bop». Pero C.C. DeVille, con el cabello teñido de rojo y bajo los efectos de la droga, se rehusó a tocarla. En los ensayos para la entrega de los premios interpretaba mal la canción. Cuando llegó el momento de tocarla en la entrega (con difusión televisiva a nivel mundial), C.C. DeVille empezó a tocar el acorde de otra canción. El resto de la banda se vio obligada entonces a tocar la canción «Talk Dirty to Me», cambiando lo inicialmente planeado. Durante el show, DeVille no tocó bien, pisó su cable y lo desconectó mientras su presentación en vivo seguía. Las cosas empeoraron cuando C.C. DeVille llegó a los golpes con Bret Michaels en los camerinos, dando como resultado su expulsión de la banda. En noviembre salió a la venta el disco doble Swallow This Live. Para promocionar este nuevo álbum se tenía pensado un video para la canción «So Tell Me Why», en el cual se incluía a todo el grupo. Sin embargo, tras la salida de C.C., en el vídeo solo aparece Bret Michaels. Luego de su salida, DeVille inició un grupo de Jazz fusión denominado The C.C. DeVille Experience. A los pocos meses después, el guitarrista se encontraba trabajando en un nuevo proyecto con el baterista Carmine Appice (Vanilla Fudge, Cactus, King Kobra) y el bajista Jimmy Bain (Rainbow, Dio). Este proyecto no duraría mucho y terminó para el año de 1992. Por su parte Bobby Dall ponía al resto del grupo en un descanso obligatorio al lastimarse sus dedos en un accidente. El bajista aprovechó su tiempo para dedicarse a su primer hijo, Zachary Brandon Dall, quien acababa de nacer. Además en ese lapso llegó a producir al grupo originario de Los Angeles, Rozy Coyote. Bret Michaels por su parte aprovechó su tiempo libre tocando junto al grupo Hollywood Gutter Cats, además de componer y producir el álbum de debut de su novia Susie Hatton, Body and Soul. Michaels también colaboró durante ese tiempo con algunas canciones para Stevie Nicks y Tuff, además de participar como actor invitado en la serie de televisión "Burke's Law". Poison se encontraba bajo la presión de su disquera para conseguir un nuevo guitarrista y para el lanzamiento de un nuevo álbum por lo cual optaron por elegir entre Warren DeMartini de Ratt, Nuno Bettencourt de Extreme, Steve Stevens de Billy Idol y George Lynch de Dokken. A esta lista de guitarristas experimentados se sumaron también los jóvenes Blues Saraceno y Richie Kotzen. El elegido fue Blues Saracenel cual rechazó la propuesta, se propuso también a Steve Stevens y finalmente, optaron por el guitarrista Richie Kotzen. Poison entró al estudio con su nuevo guitarrista para grabar su nuevo álbum, originalmente titulado Resurrection, bajo la producción de Richie Zito. En 1993 sacaron su cuarto disco de estudio, llamado Native Tongue. Este trabajo del grupo fue una sorpresa para los fans debido a que el nuevo sonido del álbum estuvo orientado completamente al género Blues rock. Esto marcó un cambio para la banda, ya que abandonaron sus melodías tipo himno de fiesta para centrarse en temas más serios y trascendentes. El álbum recibió comentarios positivos por parte de críticos especializados. Native Tongue logró vender más de 1 millón de copias a nivel mundial. Se promocionando tres sencillos: «Stand», (el cual contaba con la participación del coro de la Iglesia A.M.E., mismos que aparecen en el videoclip), «Until You Suffer Some (Fire and Ice)» y «Body Talk». El vídeo de "Stand" estuvo dentro de los primeros 10 en el programa MTV's Most Wanted. El segundo sencillo, "Until Suffer Some (Fire and Ice)" se colocó dentro del Top 20 del Billboard Hot 100. Pese a tener todo en contra, Poison se embarcó de nueva cuenta en su gira llamada Native Tongue World Tour, teniendo como teloneros a bandas como Damn Yankees, Firehouse y Wild Boyz. Dieron conciertos por los Estados Unidos e Inglaterra, y la banda apareció en programas como el de David Letterman y Arsenio Hall. La presentación de Poison en el Hammersmith Apollo en el Reino Unido fue filmada para ser editada en un nuevo videohome, el cual fue titulado Seven Days Live. Durante el concierto de Hammersmith Apollo surgieron ciertos conflictos entre Rikki Rockett y Richie Kotzen, ya que Rockett se enteró que Kotzen empezó a salir secretamente con su prometida, además de que a Richie no le gustaba mucho la idea de "pertenecer" a un grupo, todo esto dio como resultado que Kotzen fuera despedido de la banda. Rápidamente entró al relevo Blues Saraceno para terminar los últimos dos meses de conciertos. Para promocionar el disco salen otra vez de gira mundial encontrándose con Aerosmith, Warrant y Cinderella en algunas fechas. El guitarrista Kotzen regresó a su carrera como solista y al momento de salir de Poison se estuvo comentando la posibilidad de entrar al grupo The Black Crowes. Esto nunca sucedió, pero para 1999 entró a Mr. Big en lugar de Paul Gilbert. El guitarrista Blues Saraceno entró para reemplazar a Richie Kotzen ya hacia finales de 1993, Saraceno fue la primera elección para sustituir a C.C. DeVille. Junto con el nuevo guitarrista, salieron de gira por primera vez a Latinoamérica, dando una serie de conciertos en México, Brasil, Chile y Argentina con gran éxito. Después de esta gira de tres semanas, Saraceno fue anunciado de manera oficial como parte de Poison. Pronto se iniciaron los planes para un nuevo álbum. Por su parte, DeVille firmó un acuerdo con Hollywood Records, la compañía propiedad de Disney. El guitarrista formó una banda con el exbaterista de Kingdom Come, James Kottak y el bajista original de Warlock, Tommy Henriksen. DeVille tenía pensado como vocalista a Mats Levén (Treat, ex-Swedish Erotica) para completar el grupo pero el proyecto finalmente se disolvió. DeVille también formó otro grupo llamado Needle Park, con los ex-Sweet Savage, el vocalista Joey C. Jones y el bajista Adam Hamilton, pero este grupo también tuvo una duración bastante corta. Adam Hamilton regresó al grupo Joe 90 y posteriormente formaría parte de L.A. Guns. Poco después, DeVille volvió a su tratamiento para librarse de la adicción a las drogas, el cual seguiría por varios años. Bret empezó a trabajar en una película que el mismo había escrito, A Letter from Death Row, la cual sería acompañada por su respectivo álbum. No hacía mucho que Bret había hecho su debut como actor haciendo el papel de una estrella de rock llamado Roger Cooper para la serie dramática Burke's Law. A Letter from Death Row fue producida junto con su socio, el actor Charlie Sheen, quien hace una aparición especial dentro de la película al igual que su padre Martin Sheen. Michaels también estuvo en la mira de los tabloides al empezar a salir con la estrella de Baywatch, Pamela Anderson. La pareja incluso inició un negocio juntos al abrir un restaurante en asociación con el actor de Picket Fences, Costas Mandylor. El escándalo no fue ajeno a la pareja cuando se empezó a difundir un vídeo de ambos teniendo relaciones sexuales. El hecho inició una serie de batallas legales para demandar el responsable de la comercialización de este vídeo. Michaels no duraría mucho con Pamela y al poco tiempo la actriz iniciaría una nueva relación con el baterista de Mötley Crüe, Tommy Lee. Poison entró a los estudios para grabar su quinto álbum, Crack a Smile, bajo la producción de John Purdell y Duane Baron, reconocidos por su trabajo con Ozzy Osbourne y Alice Cooper. Este nuevo disco fue realmente satisfactorio para los integrantes de Poison, logrando llevar más allá el sonido obtenido en Native Tongue pero sin perder el toque distintivo de Poison. Crack a Smile tenía sencillos potenciales, como la canción acústica "Best Thing You Ever Had", "Doin' as I Seen on My TV", "That's the Way (I Like It)", "Sexual Thing", "Mr. Smiley" y la versión de Dr. Hook & the Medicine Show, "Cover of the Rolling Stone". Para mala fortuna y pese a la gran calidad de este nuevo álbum, Capitol Records optó por enlatarlo y en su lugar editó la recopilación Poison's Greatest Hits: 1986–1996, la cual incluía todos los grandes éxitos de Poison además de los temas "Sexual Thing" y "Lay Your Body Down" de las sesiones de Crack a Smile como Bonus tracks. La decisión de Capitol fue muy decepcionante, tanto para el grupo como para los fanes. Algunos seguidores lograron hacerse de copias de este álbum, convirtiéndose en una pieza muy preciada por los coleccionistas y usuarios del Internet. Durante un buen tiempo este álbum fue conocido como "The Lost Album" (el álbum perdido). Con el disco de éxitos en el mercado en lugar del que habían grabado, Poison decidió tomarse un descanso. Blues Saraceno optó por salir de la banda para dedicarse a otros proyectos. Uno de ellos fue el grupo Gorgeous George, el cual formó poco después de su salida del grupo. Saraceno también estuvo durante un corto tiempo en la banda de heavy metal UFO antes de que estos regresaran con su guitarrista original, Michael Schenker. Por su parte Rikki Rockett se mantuvo ocupado dentro del mundo de los Comic. Entre los años 1995 y 1996, Rikki puso a la venta la serie "Sisters of Mercy", en donde los personajes principales estaban inspirados por su novia Malina y su hermana Mariah. Se planeó también una línea de figuras de acción inspiradas por la serie. Próximo a editar la película A Letter from Death Row y su respectiva banda sonora, Michaels siguió con su interés en el mundo del cine, haciendo apariciones especiales en películas como In God's Hands, filmada en locaciones en Bali. Michaels también tenía programado aparecer en Celebrity Pizza, Last Child (junto a Martin Sheen, Charlie Sheen y Tía Carrere), además de un episodio de la serie erótica de televisión "Red Shoe Diaries" junto con su novia, la actriz y modelo Kristi Gibson. El 16 de agosto de 1997, Michaels dio su primer concierto como solista en el club Billboard Live en el Sunset Strip de Hollywood y estrenó material de su álbum como solista. La banda que lo acompañó en ese momento estaba formada por los guitarristas Cliff Calabro y Gabriel Moses, el tecladista Lorenzo Pryor y el baterista Brett Chassen. Finalmente para el verano de 1998, Michaels editó el álbum A Letter from Death Row bajo su propia compañía, Poor Boy. En el disco participaron sus compañeros en Poison, C.C. DeVille y Rikki Rockett. Para 1998 C.C. DeVille ya estaba de vuelta en Poison por lo que surgieron los rumores sobre una posible gira junto a Whitesnake, Def Leppard y Mötley Crüe, aunque fue hasta 1999 cuando finalmente se organizó la gira Greatest Hits World Tour, teniendo como bandas teloneras a Ratt, Great White y L.A. Guns. La reunión coincidió con el reconocimiento otorgado por la BMI a la canción "Every Rose Has Its Thorn" por ser tocada más de un millón de veces por la radio americana. También para ese entonces el álbum Poison's Greatest Hits: 1986–1996 llegaba al millón de copias vendidas, superando por mucho a discos similares de sus contemporáneos. Con esto, Poison sobrepasaba los 10 millones de discos vendidos tan solo en los Estados Unidos. En ese mismo año, se estrenó por la cadena VH1 el especial "Behind the Music" de Poison, en el cual sus integrantes contaban su propia historia desde sus inicios y con todos sus problemas. El especial contaba con escenas en vivo grabadas durante un concierto en Detroit de su actual gira. El programa fue visto por 5,1 millones de televidentes el día de su estreno. Durante esta gira se grabaron un par de conciertos con la intención de editar un nuevo álbum en directo, en el cual se incluirían 5 temas nuevos de estudio. El título inicial de este álbum fue Live Plus 5. Para los temas de estudio se estuvieron manejando los nombres de diversos productores, entre ellos el de Bob Ezrin (Pink Floyd, Alice Cooper, Kiss) pero finalmente la producción correría a cargo del productor Richie Zito quien trabajó con ellos previamente en el álbum Native Tongue. Para cuando la gira terminó, C.C. ya había formado un nuevo grupo llamado The Stepmothers, firmando contrato con Portrait Records la cual era dirigida por el gurú del AOR, John Kalodner para Sony Music. Poco después DeVille le cambió el nombre a Samantha 7. La insistencia de DeVille para que su nuevo grupo formara parte de la siguiente gira de Poison, creó nuevas fricciones dentro de la banda, dando por resultado la salida por segunda vez del guitarrista. De inmediato se rumoreó la inclusión de Tracii Guns (L.A. Guns) en la banda, pero un par de semanas después C.C. DeVille estaría de regreso. A la par, Rockett empezó con los preparativos de un álbum de covers con temas de conocidas bandas de Glam rock de los setentas. Bajo el título de Glitter for Your Soul, Rikki invitó a diferentes músicos para que lo asistieran en esta nueva aventura, entre ellos Bret Michaels, Blues Saraceno, Chuck Garric (bajista de Dio), John Corabi (Union, ex-Mötley Crüe) y Jizzy Pearl (Love/Hate, L.A. Guns, Ratt). El 2000 vería por fin la salida del denominado "álbum perdido". Crack a Smile... and More! salió a la venta gracias al interés que había despertado Poison en los últimos años y a la insistencia de los fanes para que este álbum fuera editado de manera oficial. Además de los 12 temas que originalmente formaban el disco, se incluyeron los temas "One More for the Bone" y "Set You Free", además de un demo sin finalizar de estas mismas sesiones. También apareció en este álbum la canción "Face the Hangman" la cual era originalmente un lado B del álbum Open Up and Say... Ahh! editado solo en Europa y también 4 de los 6 temas interpretados en el MTV Unplugged de 1990. Poison también dio a conocer el álbum en vivo Power to the People bajo el propio sello de la banda, Cyanide Music. Fue su primer disco con DeVille en nueve años. El álbum contenía cinco nuevas canciones de estudio: "Power to the People", "Can't Bring Me Down", "The Last Song", "Strange" y "I Hate Every Bone in Your Body but Mine", este último marcaba el debut en la voz principal de C.C. DeVille en un álbum de Poison. El resto del álbum contó con las actuaciones en directo de la gira Greatest Hits World Tour en 1999. Seguido de una nueva gira de Power to the People Tour, ahora con los grupos Cinderella, Dokken y Slaughter como teloneros. La alta asistencia de público llamó la atención de propios y extraños, demostrándole a muchos detractores que Poison podía llenar grandes arenas, mientras que muchos artistas de moda no lo podían hacer. Durante uno de los conciertos Poison filmó su primer vídeo en más de 6 años para la canción "Power to the People". Dicho vídeo pudo ser visto únicamente vía Internet. En ese mismo año salió a la venta el álbum tributo Show Me Your Hits: A Salute to Poison, producido por el propio Bret Michaels y que contaba con la participación de artistas como Bruce Kulick (Union, ex-Kiss), Slaves on Dope, el actor Pauly Shore (con una cómica versión de "Unskinny Bop"), Total Chaos, Mark Kendall (Great White), entre otros más. Para el final de la gira, DeVille y su banda Samantha 7, ya tenían su álbum a la venta y una gira por diversos clubs de la unión americana e incluso algunos lugares en el Reino Unido y Europa. Lamentablemente el álbum no tuvo la respuesta esperada y a la banda le fue terminado su contrato junto a otros artistas firmados por Portrait Records como Cinderella y Pat Benatar. El 2001 Poison también tendría una gira para el verano, la gira Glam, Slam, Metal Jam Tour, con la participación de Warrant, Quiet Riot, Enuff Z'Nuff, además de Vince Neil, Great White y BulletBoys en algunas fechas selectas. La inclusión de Warrant en la gira de Poison fue emocionante para muchos fanes, pero quedó claro que las diferencias entre ambas bandas aún estaban presentes. El baterista Rikki Rockett tuvo algunos altercados con el baterista de Warrant, Mike Fasano. Este tour daba inicio durante el mes de mayo en Texas, la gira incluía una parada en el festival Little River Rockfest junto a grupos del prestigio de Styx y Survivor. Durante este año Poison sólo editó una canción para promocionar la gira, "Rockstar", la cual estuvo disponible de manera gratuita a través de su website. Por su parte, Capitol Records puso a la venta un DVD titulado Poison Greatest Video Hits, con todos los vídeos hechos por Poison incluyendo el de la canción "Power to the People". Para mala fortuna del grupo, al transcurrir la gira, el bajista Bobby Dall tuvo que ser intervenido quirúrgicamente de emergencia debido a una lesión en la parte alta de la espalda en el Centro Médico de la Universidad de Nebraska. Un total de 22 conciertos tuvieron que ser cancelados debido a esta razón. A Bobby Dall le fue ordenado reposo total durante un lapso de casi 5 meses. Para finales de este año, Poison ya se encontraba en el estudio de grabación preparando su primer álbum de estudio completo junto a C.C. DeVille en más de una década. Casi a la par, Bret Michaels estuvo trabajando en su nuevo álbum como solista, que saldría después del de Poison. Producido por Thom Panunzio, Hollyweird salió a la venta en la primera mitad del 2002. El primer sencillo de este álbum fue un cover de The Who, "Squeeze Box". Esta canción la solía tocar Poison en sus inicios, cuando aún eran conocidos como París. El álbum fue recibido con reacciones diversas por parte de los críticos y de los fanes. "Squeeze Box" se colocó de manera regular en las estaciones de radio del género. Para la gira correspondiente nombrada Hollyweird World Tour, Poison volvió a tener a Cinderella y haciendo su aparición por primera vez estuvieron Winger y Faster Pussycat. La gira inició el 16 de mayo en Tupelo. Por cuarta ocasión, la gira fue un éxito. En Clarkston, Míchigan tuvieron una asistencia de 15 mil personas y en Milwaukee, Wisconsin de 13 mil. La influencia de Poison en las bandas nuevas quedó de manifiesto cuando en el PNC Bank Arts Center en Holmdel, Nueva Jersey, los cuatro integrantes de la banda de Nu metal, Drowning Pool, subieron junto a Poison al escenario para una versión del clásico de Kiss, "Rock and Roll All Nite". Durante un show en Atlanta el 25 de agosto del año 2006, Bret Michaels y Bobby Dall tuvieron que ser separados por los miembros del equipo seguridad, después de que ambos llegaran a los golpes, justo antes de los coros. La pelea se originó cuando Michaels le lanzó su micrófono, y Dall respondió, dándole un golpe con el bajo en la pierna derecha ocasionándole una lesión en la rodilla. Minutos después Michaels declaró lo siguiente: "Es posible que hayan visto el último concierto de Poison en su formación actual". El altercado ocurrió antes de que la banda terminara de tocar "Talk Dirty to Me". Después de algunos momentos de tensión Michaels se disculpó con la multitud concluyendo su explicación de que "como hermanos, a veces hay que airear las cosas", la banda terminó el concierto. Dall dejó el escenario de inmediato. Ha habido muchos conflictos físicos dentro de la banda, pero esta fue la primera en el escenario ya que la pelea entre Michaels y DeVille en los MTV Video Music Awards de 1991 fue en los camerinos. La banda se tomó un descanso mientras Michaels continuó con su gira en solitario. Para 2007, y gracias a una sugerencia de Capitol Records, Poison entró al estudio a grabar un disco de covers que se titula Poison'd!, bajo la producción de Don Was. Este disco contiene versiones de Alice Cooper, The Romantics, Sweet, David Bowie, The Rolling Stones, The Cars, Kiss, The Who y Tom Petty, entre otros. El 2 de agosto de 2007 la banda grabó una presentación en el Verizon Wireless Ampitheatre en St. Louis, Missouri, Estados Unidos. Esta presentación fue exhibida en la cadena HDNet y también lanzada en formato DVD el 15 de julio de 2008 bajo el título Live, Raw & Uncut. El 15 de enero del año 2008, Poison es confirmado para formar parte del Rock2Wgtn Festival en Willington, Nueva Zelanda, los días 22 y 23 de marzo. Poison actuó el 23 de marzo, iniciando la fecha final del festival junto a Ozzy Osbourne, The Symphony of Screams, Whitesnake y Sonic Altar. En 2009 hicieron una gira llamada Summer Tour con Def Leppard y Cheap Trick, en Estados Unidos y Canadá. También lanzaron Poison – Box Set (Collector's Edition). Para junio de 2011 la banda participó de una gira llamada Glam-A-Geddon 25 Tour, celebrando sus 25 años de trayectoria artística en compañía de Mötley Crüe y New York Dolls. También para conmemorar dicho aniversario, se lanzó Double Dose: Ultimate Hits, un nuevo compilado que consta de dos discos compactos y una colección digital que se publicó el 3 de mayo de 2011 por Capitol/EMI

dvd los angeles power europe law pr rolling stone music ice detroit comic rockstar pauly shore thunder stand live durante hollywood cars ranking adem stevie nicks david bowie texas bret michaels jazz billboard rock europa disney vh1 nottingham strange monsters internet crack dance soul blues david letterman letter guns wind roses nebraska bone hook sisters rock city bon jovi tallahassee florida tour screams wisconsin extreme missouri baywatch mine def leppard sunset strip michaels hands body argentina tesla bonus kiss burke sight mtv milwaukee tom petty slash nothin dope flesh blood atlantic records atlantic richie glam estados unidos arm londres rolling stones inglaterra algunos esto jap reino unido guerra glitter resurrection sin bad boy chile cactus survivor slaves treat dokken brasil finalmente sony music uno bbc radio bali death row van halen fue bret symphony lita ford poison whitesnake steve stevens aerosmith romantics capitol less than zero ufo ride dando despu aor slam coros arsenio hall david lee roth luego universidad bajo hdnet slaughter smiley pamela anderson deville tambi warlock damn yankees loudness cuando warrant decoracion estos smile michael schenker styx dio ozzy osbourne razor junto kim fowley hair metal firehouse ee alice cooper look what rocker dick cheney bulletboys steal away runaways ambos fallen angel most wanted pronto defensa tupelo winger billboard hot hollyweird kidz good time black crowes ratt bmi pese poco billy idol minutos dicho ahh uu martin sheen greatest hits blame it squeezebox canad spectres videotape dall guitarra latinoam hangman matt smith pat benatar great white charlie sheen kingdom come tinseltown last child your soul cheap trick tuff picket fences one more mtv unplugged fueron loggins don was messina last song faster pussycat kuykendall lamentablemente guns n islandia posteriormente pero c accesorios tommy lee capitol records vince neil paul gilbert alice in chains nuno bettencourt ropa rikki rockett quiet riot versiones summer tour new york dolls doin richie kotzen kotzen mtv video music awards native tongue your body gorgeous george percusi fowley i won medicine show hanoi rocks saraceno life goes on mechanicsburg pensilvania secretario golfo forget you set you free in god trixter chuck garric bobby dall king kobra george lynch james kottak adam hamilton don dokken bring me down nueva zelanda body talk producido fuerzas armadas carrere hollywood records talk dirty centro m open up lanzan stepmothers total chaos joey c ect mtv awards drowning pool hammersmith apollo rockett flesh blood needle park my tv tomaron every rose has its thorn poor boy vicky hamilton pnc bank arts center geffen records marquee club seguido say ahh nueva jersey costas mandylor teclados wild boyz red shoe diaries bruce fairbairn raw uncut dieron way i like it enigma records britny fox capitol emi descubrela
Mars’ Echo
What Bewilders Me

Mars’ Echo

Play Episode Listen Later Jan 7, 2021 1:17


Look What’s on Television.

Krishna Temple Talks
Look What the Lord Has Done

Krishna Temple Talks

Play Episode Listen Later Aug 5, 2020 35:04


Download audio file (Look_What_the_Lord_Has_Done_.mp3) To Download: right click Here and select “Save Target As”, “Save Link As”, or similar menu item. The post Look What the Lord Has Done appeared first on Radha Krishna Temple in Utah.

Real Science Radio
RSR Asks an Evolutionist to Retract His Rodhocetus Claim

Real Science Radio

Play Episode Listen Later Jul 24, 2020


Asking Travis Barlock to Retract Rodhocetus Claim: Real Science Radio host Bob Enyart asked University of Denver biology graduate Travis Barlock to retract a specific claim he made about evidence for evolution during Barlock's debate with Bill Jack. On today's program, courtesy of filmmaker Dr. Carl Werner, hear the Rodhocetus discoverer Phil Gingerich admit that the fossil never showed evidence of whale flippers nor of a fluked tail. And now that they have recovered its front legs, Gingerich admits that Rodhocetus did not have flippers, and that therefore, the whale's tale that he imagined was not valid. In a discussion with Enyart after the debate, which you can see in the brief YouTube video below), Barlock said that if he could confirm this information, he would stop using this claim. Bob Enyart Live is now calling on Travis to make good on that commitment. And hear the audio from that post-debate discussion on today's program for questions raised about Barlock's other evolution claims. * Inviting DU Evolutionists to Enjoy:RSR's List of Scholars Doubting Darwin List of Genomes that Just Don't Fit * See More of Travis' Favorite Transitional Whale Fossils Debunked: On the show page for the Real Science Radio interview of filmmaker Dr. Carl Werner, rsr.org/whale-fossils-faked, see more video clips of the other now falsified alleged whale transitional fossils. In addition to Rodhocetus, consider also Werner's interview with the discoverer of Ambulocetus, which reveals to the general public what only few insiders knew. Dr. Hans Thewissen is Philip Gingerich's student who, astonishingly, has been celebrated for also (allegedly) discovering a whale transitional form. Following his mentor into fame, and then into shame, Thewissen has now admitted on film that he fabricated the blowhole that he claimed was on the creature's snout. Yet public television nature programs and natural history museums worldwide, demonstrating their notoriously low standard for evidence, have long accepted that imaginary blowhole so that millions of people, like Travis Barlock, believe that fantasized claim to be among the best evidence for evolution. * Inviting DU Evolutionists to Enjoy RSR's: List of Carbon 14 Everywhere it Shouldn't Be List of Dinosaur Soft Tissue Journal Papers List of Not So Old Things * DU Students Say Whale Transitions are Travis' Favorite Examples: University of Denver students in the audience told Bob Enyart that the (alleged) transitional whale fossils were among Travis Barlock's favorite evidence for evolution. This is reminiscent of the millions of evolutionists who justify their belief in evolution by citing the content in Richard Dawkins' books, even as the author himself knew and has now admitted that his books contained no evidence and only assumed evolution to be true (see video below). This Bill vs. Barlock debate also reminds RSR of when Bob Enyart asked the famed evolutionist Dr. Eugenie Scott for her best evidence, and she answered "junk DNA", which very term today has been identified as a science stopper and severely hindered the growth of genomic research as a generation of geneticists were heavily deterred by strong-armed neo-Darwinists from even looking at the non-coding regions of our DNA, vast swaths of which have now been confirmed to have function. As the scientific evidence for our Creator God continues to grow, the big Darwinists claims are shrinking. * Expecting Barlock to Keep His Word: So as this DU evolutionist agreed that if evidence is shown to be invalid, that he would no longer use it, we are hoping and expecting that Travis Barlock will retract his often repeated claim that Rodhoectus is a good example of the evolutionary transition from land animal to whale. * Today’s Resource: Get the greatest cell biology video ever made on DVD: - helps you to share it with others - helps keep Real Science Radio on the air, and - gets you Dr. Don Johnson's book as a bonus! Information is encoded in every cell in our DNA and in all living things. Learn how the common world view of life's origin, chemical evolution, conflicts with our knowledge of Information Science. Finally, information Science is changing the way millions of people think about all living systems! Also, have you browsed through our Science Department in the KGOV Store? You just might LOVE IT!! * Travis, Look What the Lord Has Done! The latest stunning animation from the anti-Darwinist ID folks... * An Example of their Low Standard of Evidence for Evolutionists Worldwide: Taking the Ambulocetus example above, where evolutionists almost universally accept the nonexisting "blowhole" evidence for its alleged role as a transition to a whale, the world's most popular evolution author, Richard Dawkins, confirms one of Real Science Radio's early assessments, that Dawkins' books only assumed evolution to be true, and that they contained no actual evolution for evolution. See this and hear Dawkins affirm our contrary-to-popular-belief observation... * RSR's Google-based Multi-Creation Site Search: Be efficient! As of July 24, 2020, our custom search tool has saved minutes and even hours for our listeners 2,090 times! Just click to check it out. Save time like crazy using this Google creation tool, RSR's Multiple Creation Site Search to simultaneously search CMI, AiG, ICR, CSC, and RSR! 

Horror. Cult. Trash. Other.
HCTO #39 - Who Cares What's Happened to Rosemary's Baby

Horror. Cult. Trash. Other.

Play Episode Listen Later Apr 20, 2020 64:17


Welcome back to the Horror. Cult. Trash. Other. Podcast! This week we talk about the TV movie sequel, Look What’s Happened to Rosemary’s Baby. During this episode we discuss the movie’s nonsensical plot, the unspoken love story between Peter and Adrian, and Adrian’s odd satanic birthday party. Email us at horror.cult.trash.other@gmail.com and check us out on Social Media at the following links www.facebook.com/horrorculttrashother Twitter - @horrorculttrash Instagram - @horror.cult.trash.other Theme song is Stick Around by Gary’s band, One Week Stand. Check them out on Spotify, iTunes and many other digital distributors!

Taber Evangelical Free Church
Following our King

Taber Evangelical Free Church

Play Episode Listen Later Apr 5, 2020 25:12


Following our King - Matthew 21:1-11   21 Now when they drew near to Jerusalem and came to Bethphage, to the Mount of Olives, then Jesus sent two disciples, 2 saying to them, “Go into the village in front of you, and immediately you will find a donkey tied, and a colt with her. Untie them and bring them to me. 3 If anyone says anything to you, you shall say, ‘The Lord needs them,’ and he will send them at once.” 4 This took place to fulfill what was spoken by the prophet, saying,  5  “Say to the daughter of Zion,  ‘Behold, your king is coming to you,  humble, and mounted on a donkey,  on a colt, the foal of a beast of burden.’ ”  6 The disciples went and did as Jesus had directed them. 7 They brought the donkey and the colt and put on them their cloaks, and he sat on them. 8 Most of the crowd spread their cloaks on the road, and others cut branches from the trees and spread them on the road. 9 And the crowds that went before him and that followed him were shouting, “Hosanna to the Son of David! Blessed is he who comes in the name of the Lord! Hosanna in the highest!” 10 And when he entered Jerusalem, the whole city was stirred up, saying, “Who is this?” 11 And the crowds said, “This is the prophet Jesus, from Nazareth of Galilee.”   The Holy Bible: English Standard Version (Wheaton, IL: Crossway Bibles, 2016), Mt 21:1–11.   Sermon Study Guide: READ - Matthew 21:1-11 LOOK - What do I see? What details stand out to you in this story? What do you notice? What are people saying?  What are they doing? Are there other parts of the Bible quoted?   THINK - What does it mean? Why does Jesus enter Jerusalem this way? What is he saying about himself? What does this procession communicate to the people who witness this?   APPLY - What difference does it make? If Jesus is your King, then this will involve: Recognizing Jesus - How can you properly recognize Jesus as your King? Trusting Jesus - How can you show trust in Jesus? Submitting to Jesus - How can you submit your life further to Jesus? Obeying Jesus - Are there further ways to that you can obey Jesus    What do you think others will think as you make Jesus your King?    PRAY - How can you pray?

Free Form Rock Podcast
Episode 197-The Next Morning-The Next Morning

Free Form Rock Podcast

Play Episode Listen Later Dec 23, 2019 58:36


On this Christmas edition of the Free Form Rock Podcast, we spread a little holiday cheer playing some Christmas music before and after our review of the self-titled album by the band, “The Next Morning.” We play you out of the episode with our tracks of the week featuring,  “Look What the Cat Dragged In” by Poison and “Breathe” by Sugar Ray. As an extra Christmas gift to our listeners, we bring you our Lee Gerstmann track, “She Climbed Steps Again.”  Like what you hear? Do us a favor and leave a review and subscribe to us on iTunes and follow us on Podbean. Until next week, have a very Merry Christmas and enjoy this time spent with loved ones!  

Craig Peterson's Tech Talk
Welcome! Are KeyLoggers still a problem?, Is Someone Tracking Your Browsing?, Why China Is Banning Encryption, and more on Tech Talk With Craig Peterson today on Maine's WGAN Saturday Show11-02-19]

Craig Peterson's Tech Talk

Play Episode Listen Later Nov 1, 2019 89:23


Welcome!   Today there is a ton of stuff going on in the world of Technology and we are going to hit a number of topics from Keyloggers, to Privacy and Encryption, and Tracking -- so stay tuned. For more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles: Who is tracking your web movements? Use Firefox if you want to know. Little Inexpensive Devices Can Remove Sensitive Data Security 101 - Passwords and Password Management  Common Password Vulnerabilities and How to Avoid Them Cyber Cold War Right on Our Door Step International News Hits the Dark Web When Businesses Are Required to Capitulate to Chinese Society Cloud Players Vie for Pentagon Contract Privacy and China -- Not So Much --- Automated Machine-Generated Transcript: Hello everybody, Craig Peterson here. Welcome to my Saturday show her right here on WGAN. And online at Craig Peterson calm. You'll also find me up on YouTube, where I am posting videos of this show. And I try and do that every Saturday. I've been doing this now, last few weeks. This Saturday's no exception. Next Saturday maybe because I am going to be out in the West in the conference. So we'll see how that all goes. I may end up doing next week's show from my laptop, which would be a little bit different. I haven't done that before. So we'll see how that all goes. Today we are going to be talking about Firefox. A lot of you guys asked questions about browsers. So I've got an article from naked security up on my website at Craig Peterson. Calm talking about this. But Firefox browsers and this came up in one of my masterclasses here over the last couple of weeks, you know, those free classes that I've been holding, these are not pitchfests, in the least, we spent two hours in the last one. And this particular one, we're talking about privacy, and I had mentioned the offer browser and have some questions on that. So we will be talking about that today. Keylogging is an ongoing issue. It seems that every business that we go into, to help them clean up or do a security assessment and action plan for them. They all seem to have key loggers, at least one machine, man This week, we just found one of our clients had a data x filtration going on. Thank goodness, we had the right kind of equipment in place because it automatically noticed it and shut it down. But keylogging is a great way to start. That whole BX filtration, we're going to be talking about passwords today as well, which is always a big topic. And we'll talk about one password and some common password problems. We've got a warning out from checkpoint, and those are some guys that make some security software. That is saying that there is going to be a new cyber Cold War next year like that's a surprise. So we'll be talking about what that means to you as a home user as a business. The BBC did something I don't know that anybody would think about, but when I thought about it a little more. It made sense. But the BBC is now on the dark web and will tell you a little bit about that. And that also goes into my whole commentary about some of the browsers out there. And by the way, if you want to sign up for these masterclasses, I don't think I'm going to be having one this coming week. But if you sign up for the master class, you can attend Live asked questions. I always answer all of the questions, which is why sometimes it goes much just three hours because I try and make sure everybody understands what we discussed. I've been doing them live as well on zoom so that you can kind of jump in and type in your question in the chatbox, and I'll make sure I get to it right away. And I will be having more so see the two I've done, I think, Okay, the last couple of weeks. I know I did one on VPN and one on mobile security just yesterday. So make sure you sign up Craig Peterson comm slash master class. And these are, as I said, they're free, and these are not pitchfests. But it's me looking at material trying out material answering questions that I can use in upcoming courses that I do so. Tick tock, by the way, if you haven't heard about it, I've mentioned it on one of the morning appearance appearances that I do on the radio, but Tick Tock is here. Getting back now about this is from China about claims that China is doing the nasty with it. Microsoft man who thought that they would win this Amazon was the shoe and winner for this contract with the feds. We'll talk about that. And a little bit about what does it mean for you if you are using cloud services and what's the government trying to do here, and China, they passed a cryptography law. You know, of course, about Facebook, as I mentioned this before, and Facebook's cryptocurrency while China's getting in the game as well. And hopefully, they don't beat us to the punch here when it comes to the cryptocurrencies. You can watch all of this, as I mentioned, and I just noticed myself right because I got a little monitor sitting here so I can see what we're streaming. And I noticed that this big green logo God is behind me. It is for my ball. I sit on one of these kinds of big bouncy ball things so I can keep my back moving. In fact, this whole table that I'm sending that that you can see in the video on YouTube, this whole table, and my website. Of course, this whole table goes up and down. So I've got my production equipment here. I've gotten more production equipment there. I've got a huge 4k TV up there that shows me all of the different feeds and things it's just a nice little setup, but that's what this is in case you're wondering watching on TV certainly caught my eyes I might have caught yours as well. So let's get into Firefox right now. Mozilla, these are the guys that make Firefox has been trying to focus on security and privacy. And there is a difference between security and privacy. Security is where we have information that is kept private, but it is also kept secure, so it doesn't get out. It doesn't leak out. There's no way for anybody to get it. So that's how we're defining. Well, no way, right? There's always some way. But that's how we're defining security when it comes to browsers. Privacy is different privacy is where you don't necessarily want websites to know where you are, where you've been, what you're doing when you're online. And we should have privacy. I'm more concerned about privacy, my privacy, right. When it comes to government monitoring, then I am worried about privacy rights when it comes to business monitoring. Because businesses all they're going to do is try and sell me another pair of shoes. Or a car, maybe when I don't need a car. Government, much, much different government is going to be very intrusive government is the sole authorized entity and that it states to use force against you for what they want. In other words, the government can pull out a gun, put you in jail, take away your rights, your freedom, and kill you in some cases. So I get concerned when it comes to government. If you don't have the government, then you are really at risk. Now, how good is the government? I don't know. We were seeing these impeachment hearings going on with President Trump. The accusations are that under Obama's direction, the CIA started an investigation into Trump for political purposes. Then the CIA fooled the FBI into launching an investigation, and then there were some people high up in both these organizations, right. It's not the normal, lower level of people that were running this sort of stuff. And there's we can tell, right? But I get concerned, because even if this was true, and also if it was only the top-level people within the CIA, the NSA, the FBI, that were involved in, could move downhill. And we keep hearing talk about the deep state and what they're doing. Well, do you want the federal government to have all this information about you about where you're going online, what you're doing, and it goes back to the socialists. The quote that I've had in the front of my mind for the last couple of months is, show me the man I will show you the crime. Because every last one of us has committed a crime, some of them felonies. You before you leave your house in the morning, you've probably broken some rules. Regulation or law? Because there's so many of them just on firearms, there are more than 20,000 laws, how can you be expected to comply with them all? So, if you've got a committee in Congress, for instance, that wants to impeach the president, or someone else and they're allowed to go after the guy everything look at everything they've ever done everything! YES, Everything Everything. They will find a crime because everything is a crime. Oh, finally, we found an offense. Do you think that you with what you do online might have committed a crime at some point in time? That's the real question. If you're online and you are doing something that they want to paint as a crime, right, all they have to have is rumors to destroy your life. Look What happened with Mike Flynn? Did he remember every word that was said when he was vacationing in the Caribbean? Man? I know a lot of people that are a vacation in the Caribbean and are tipping back. Few too many drinks. Do you remember everything you said last time you inebriated? Right? And then now you're led into a perjury trap. All of this can happen when it comes to your online browsing history, what you're saying online when you don't have privacy. Again, we're talking about the government here. What the government's monitoring with the recording -- Who are you calling? What are you doing? And me, I'm a member of the media. And as a member of the media, I talked to all kinds of people I'm sure people that I have interviewed over the years have ended up being arrested and Probably some of them convicted of who knows what crime. So now they go back, and they selectively look at things that I might have said I might have talked to that person, and now I am a criminal. So when we're talking about privacy, there are two levels. I'm not worried so much about businesses tracking me. I am apprehensive about government monitoring me. And when we get back, we're going to talk more about this because the government monitoring side of things, and the business side, end up merging. It's kind of like a Moebius spurt strip here, frankly. You're listening to Craig Peterson. I'm on WGAN and online at Craig Peterson, calm, stick around because we'll be right back. Hey, everybody, welcome back, Craig Peterson, here on WGAN. And online at Craig peterson.com. Of course, as Peterson SO and we were talking about privacy protection before the break, I want to add one more thing about privacy protection when it comes right down to it. And that is, you are the person responsible for it. So let's do a little bit of education here. Let me help you understand what we're specifically encryption. Your web browsers can use encryption when talking to websites out there so that any data from your browser to the site is encrypted. Not that they always do it, but they can do it, and there are some plugins to make sure that it is using eat in corruption when possible. So one of those plugins is called. What is SSL everywhere, I think, is what the name of it is. But there's a number out there. But there are many browsers that do aim at trying to keep your data safe online. And I talked about those in the masterclasses here that we recently had we got more coming up, and we'll be answering even more questions. Of course, correct. Peterson comm slash master class for those three classes. But you can use a different browser. So, for instance, you know that if you have windows, you probably had Microsoft Internet Explorer on it. And then, they switch to this Edge browser. And now they have switched to using Google Chrome as the base. So basically, it's there. It's called chromium, which is the base that Google Chrome is based on and is in the OpenStack Source space. And Microsoft, of course, put their stuff on top of it so that they make sure they break a lot of websites. Well, that's, that's not why they did it. They did it because they're Microsoft and they know better anyhow. Your current Edge browser is not a Microsoft product. It's a Google product for the most part. So some of us will also use Google Chrome, which is the most popular browser out there by far right now. If you are using a Mac, you probably have Safari. So I've run through the leading browsers that people are using out there. Currently, some browsers are privacy aimed. One of them is the Firefox browser. And the other one is Opera. Those are the two most common, and Opera is probably the better of the two. But as was brought up in one of my master class, by one of the attendees, there are rumors that China has started to take control of opera, which could be a problem. And then there is the most privacy oriented browser in the world called tour. But we're not going to go into that today. You can find all kinds of information on the tour. I have done some Facebook Lives on it. And you'll find those online at Craig Peterson comm slash Facebook. And you can find out how to use the most private and secure browser that there is out there and it's free, by the way. So Firefox is trying to be the browser when it comes to privacy. And they have a few different browsers that are available on iOS and your Android devices, each offering different levels of privacy protection. Still, they have offered another privacy treat tweak to Firefox version 70. And this is the ability to see how often websites are tracking you. So if you are running Firefox, you can go and access it by clicking on the address bar shield icon. That's where you would normally see the information about any SSL certificates in use right now. It has a drop-down at itemizes different types of trackers detected on the various websites that you might be using. Now, there are some other things that you could potentially use and what I use as well. And probably one of these days we'll have to get more into this and what am I using and how are we blocking things, but there there are a few other plugins that you could use one from our friends over at EFS Electronic Frontier foundation that I use and that I like. I recommend, but we're right now we're talking about Facebook and Facebook, Firefox. Okay. So naked security, as I mentioned, has an article you'll see up on my website as well. And it's talking about the enhanced Tracking Protection that they did test. They said users might not notice the detection of many trackers if you already have this set to a strict setting, but it works pretty well. I like what the EFF has done a little bit better. But to back up its claim that privacy protections with having of Mozilla released figures showing that Firefox had blocked 450 billion cross-site tracking requests since the second of July. And now that's risen to 10 billion blocks per day. So a cross-site tracking is a site that might put a cookie on your browser. So that it knows what you're looking at what you're interested in where you came from, right. And that's one level of being monitored by the marketers. The next level of being monitored by the marketers is this cross-site stuff, including scripting. And that is where they're pulling data from another website. I have a client that this just happened yesterday. And this client has been using Internet Explorer. Now, we have been after them for a long time to get rid of Internet Explorer. It's not even supported by Microsoft anymore. So there are all kinds of security vulnerabilities. And they use this one particular small bank to do all of their banking. And they went online to the bank, and they couldn't log in, they couldn't get it to work. And it hasn't been working for months. Well, as it turned out, the advanced security that we had installed in their Network found that the bank had used an embedded a cross-site script, going to a tracked customer relationship management system. That was a fairly new site. It's only been online for about three weeks period. So we consider that high risk because that's a typical mo modus operandi for a hacker group. So we blocked that access. And that access, then made it so that she couldn't get a login. Now, this is all good, because it's a high-risk site. And we don't want them going there. We don't like the cross-site scripting, because many times that's how hackers get your data. And we're not going to get into a whole bunch of detail on how that works. But the Mozilla will block that now, which is nice, frankly. And you have to turn that on. If Wanted again, it's called enhanced privacy protection. And by the way, there is also a built-in password tool on Firefox called block-wise. And they now can generate a secure password when signing up for a new account. Now coming up here a little bit later, I'm going to be talking about passwords, some specific stuff about password managers, and not what the best practices are. But you can use it to replace the weak ones, and Firefox has been doing a pretty darn good job. By the way, Mozilla says that lock wise can be protected using Apple's FaceID Android Touch ID face recognition systems. And they're using AS 256, which is pretty good. encryption, it's tamper-resistant, it's GCM, it's their block cipher technology. They're using one PW protocol to obtain keys a, and they're doing a pretty good all shocked to 56 for the encryption key. So have a look at that if you are concerned about privacy leading into security, have a look again. And a side note here from our friends and naked security reason test by the German Federal Office for information security Firefox as importantly only one of five browsers to be given a passing grade. And I will leave you to guess who some of the ones that had failed. Were and I talked about them all the time. All right, stick around. You're listening to Craig Peterson on WGAN. Online at Craig Peterson dot com. We're going to talk about vampires on your computer when we get back, so stick around. Hello, everybody, Craig Peterson here. Welcome back. Of course, we're alive. Every Saturday from one till three. You can see me on Facebook Lives I've been conducting master classes. We got a great class coming up on hardening windows. It is a course we'll let you know about that as well. Hopefully, you got this morning's email. I send it out every Saturday morning with my notes for the week, including all of the articles we're talking about today. So make sure you follow along. If you haven't already, go to Craig Peterson dot com slash subscribe, you'll get my special notes when they come out. You'll find out about some of the nastiness that might be happening out there, and you can be on top of and in Friend have any of these big problems that are out there? That's Craig Peterson comm slash subscribe. Well, let's get into the vampire side of things right the spooky time of year Halloween. Everybody's thinking about these vampires, and things about there's a kind of a cool new Walking Dead-ish show that it's a comedy on Netflix that we started watching. It is very, very cool. I think it's a fun one. But did you know that there may be vampires lurking in your computers? I mentioned a little bit earlier. But I have seen these vampires in pretty much every business that we've done an NSAAP in. So here's what an NSAAP is. An NSAAP is a network security assessment and action plan. We call them in NSAAP, right, so we'll go with In we charge 500 bucks. We analyze all of the machines that are on their network and what their security problems are. And then they have something they can run with, to try and fix the issues themselves or because it's so complicated, we'll fix them for them, right? That's what we do, we not only fix those problems, but we keep going. We keep the patches going, which is one of the most important things for you to do. We make sure that we have multiple layers of security on the machines and then on the network, and then at the network edge, etc., etc. So when we're looking at, these will look at two things that will look at vulnerabilities. And if they want us to, and there's an additional charge for this, we'll go ahead and look at indications of compromise, which means, Hey guys, not only do you have these vulnerabilities, but it seems like there's been a compromise. Now, you don't want to be compromised. I think that goes without saying the bottom line. But when we do this indication of compromise test, I think 100% of the times, and we have found one of these vampires on at least one computer. And what I'm talking about right now are key loggers. There is a guy that just went to prison sentenced just a couple of weeks ago for this type of thing. But there are two types of key loggers. But the bottom line is they're trying to find what you're typing because they know that you're going to have to type in password usernames, right? And they don't even need to know what's on your screen at the time because they can, you know, they can pretty reasonably recognize what you're typing. you're typing a letter versus you're logging into a system. And that, by the way, is why you need to factor authentication. That's why we use UB keys YUBI You can find them online Yubikey so that you have your account, you have your password, and then you have to physically insert this special encryption key to keep your data safe, right, that's the bottom line here. So the two types of these key loggers are there are hardware loggers, and the hardware key loggers are something that plugs into the back of the computer and then plugs into your keyboard. You don't see as much as you used to because many of us use Bluetooth keyboards. Now Apple is the best there is when it comes to it. And if you're watching me now, you see I've got an iMac over on my left, which is an Apple iMac. I've got Keyboard an apple keyboard, which is Bluetooth and an apple trackpad, which is Bluetooth hooked up to these, but it's using a special version of the Bluetooth protocol. To get the keyboard to sync up and the trackpad to sync up, I have to plug it into my iMac so that they can exchange security keys. So it's not just the basic Bluetooth security, it's much more advanced than that, which is great. So what they're trying to do now is get it so that with this apple keyboard and trackpad, there can be a key logger that pretends to be my Mac and then the keyboards talking to I'm Mac's talking to it, they get you can't do it right. Now, with the older stuff with a regular Bluetooth keyboard. What they'll do is they'll put a little Bluetooth receiver in the area, and it'll pretend it's the computer and the keyboard. Now regular Bluetooth keyboards do have security. And it does negotiate with the machine. So there's some security there. But most of them, the older ones, particularly all of them, are entirely hackable. So, what they were trying to do, again, is a key log. They sit in the middle between your keyboard and your computer and is easier to do with a hardwired or with a USB keyboard. You might want to switch to the latest version of Bluetooth available for your computer. Now the second way that keyloggers work and how we often find them when we're scanning the software. We're looking through the system registry, and looking in detail at everything. Those key loggers are pieces of software, and they've been inserting themselves into your operating system. So, that whether you're using a Bluetooth keyboard or hard wired keyboard, they see everything that you type. That's a problem because, again, they can figure out what your username is what your password is. Well, a New Jersey man has confessed to getting into businesses during hours and after hours and planting key loggers. And we've seen this happen in some congressional Democrats offices as well where they found installed key loggers. The Department of Justice has named the companies that were victimized one to New York, the others in Texas, and they both have offices in New Jersey. And what they said was that this guy, anchor wall 45 a month Ville news jersey pleaded guilty New York Federal Court on Tuesday this week to two counts of obtaining information from computers and one count of aggravated identity theft. So these can be bad, and they can be used to break into your bank accounts and all kinds of things. That's where identity theft comes in. And according to the court documents, it started in June 2016. When he trespassed into these companies, New Jersey, Brandt's branches, he got his hands on an access badge. And it let him keep, keep coming in when he wanted to write. And he installed the hardware key logger, those are the ones that sit on the USB port, or that you can program a Bluetooth keyboard into right so if you have physical access, all you have to do is just configure the Bluetooth keyboard to talk to your keylogger and then the keylogger talk to the computer. Then and then of This is hard, right? And apparently, he got employee usernames and passwords. He also snuck his computer and hard drive under the company's computer network. So we could install malware that does the same thing, which is the software key logger just talking about, then this gives the crooks a way to track everything, breach everything and get internet works completely. Okay. It's, it's a real problem. It's a real real problem. So, key loggers can be notoriously hard to find. But there is software that can find them in your normal antivirus. Sometimes it can. Hey, stick around. When we get back, we're going to get into passwords. You're listening to Craig Peterson here on WGAN. And I got a surprise for you when we get back. Of course, online Craig Peterson dot com slash subscribe. Hello, everybody, Greg Peterson here. WGAN online, Craig peterson.com. What we're going to talk about passwords right now, and there are some surprising numbers that have just come out. I'm going to be talking more about these next week. Zogby, these are the pollsters just came out with some statistics on businesses and getting hacked, which is amazing. Amazing. Because it turns out that a quarter of businesses hacked in 2019 went out of business, 10% immediately went out of business. It's just crazy, but we'll be getting into this in more detail coming up next week. But let's talk about passwords because this is one of the most important things you need for your security. Now there are movements underfoot, and Microsoft is involved in Google and others in getting rid of passwords entirely. That's good. And it's bad. Now, they're not saying they're getting rid of the password. So anybody can just say, Hey, I'm Greg Peterson, let me into the Twitter account, what they're going to be doing and what they're already doing actually, is those accounts that they are that they're trying to protect, or it's using an exchange between your browser, the website, As well as something that you have like the Yubikey. You know, TLTP it's a one-time password type thing. That's where it's going. It's not there right now. And right now, the best thing you can do is protect your past. passwords by using one of these pieces of software that automatically generates a unique password for you for every website, and also store them securely will fill out the form for you with your password in there, so you don't have to remember it. And we go the next step and my company because we are a master managed services provider, that in fact for a master managed security services provider, but that's a mouthful. Be meaning that we provide the security services that other companies sell. So we're the people behind the scenes for a lot of local break-fix shops, bars, etc. So the change is now that one password we can tie in and we do tie into something called do ODUO-and it's something else that Cisco Bought, it's interesting. I don't know if they're following us around, but three or four of these products that we've been using for years, Cisco recently bought that we've been using them because we found them to be the best that was out there. So one password has a Business Edition, as well as a condition that you can be using, and you should be using for your family and using it to share passwords. So with the business version here, you can create different groups of users with varying vaults of passwords. And it makes it very, very easy, therefore effective. And frankly, according to CIO magazine, and I agree with this, you can get a measurable, beneficial impact on security just a few days after you've rolled it out. Now they have one password advanced protection, which also has extensive monitoring tools that we use to So that you can take control of your security in your business. So look at one password. It's not expensive, and it's not cheap. Okay? It's right in the middle. But one of the things it does is it lets you know hey, we have reports at this website that you have an account on has been compromised, so you've got to go ahead and fix it. So you've got to keep control of your sensitive information I've talked to before I had quite a stir when I said .hey don't tell the truth your bank you should be lying to your bank when it comes to your password recovery questions. And some people push back one of my daughters is pretty high up in a bank, and she was taken back by the headline, which is Lie to your bank, right? And then she read the article, and she's going to share it with other people within the bank because it just makes a lot of sense. So one password business lets you securely share passwords across your teams, or do your parliament, and only the people that need access to an account can get the access to the account, which is very, very important. It's the whole concept of limited access and, and who should be able to have access, right? very minimal access. Now there are other password managers out there. As I've said many, many times, I like one password, I think it's absolutely the best out there. That's what we use. We use it in conjunction with do Oh, and use that in conjunction with Yubikey. So that we have multiple layers, multiple layers of security when it comes to logging in. So let's say that you can't use one password, maybe your home user, your Soho, small office, Home Office. Let's talk about the other options available. One of them's called LastPass, which is pretty good. I've mentioned when we've talked about Firefox that it has a password manager built-in. That's pretty good as well. But let's get into the common password vulnerability. Ladies and how to avoid them. The old thinking was that you should change your password every 30 days, maybe more frequently. And that you need to have a mixture of numbers, letters, special characters, upper and lower case. That is no longer true. Not at all. The best password is a long password, that phrase, and you throw a couple of uppercase letters and some special characters in there. That's the best password. And not having your people change passwords every 30 days is also beneficial because it encourages them to come up with better passwords. Okay, because weak passwords are just the worst. So length versus complexity. You know, a complex password. Some of them they're saying like eight characters or lowercase characters, numbers, special characters, and in reality, that's a weak way to come up with passwords. Because if you're talking about eight characters, that's easy to break, relatively speaking, you can download my table from the internet, it's about two terabytes and size is pretty long. But it allows you to break pretty much every password that was ever created by Microsoft, or that you've ever used on a Microsoft System older than Windows 10. And even Windows 10 systems where there's been a migration So in other words, pretty much every password used in Microsoft, and. And that's called a brute force attack. When you're going up to the character one's a long one, you can use these fancy crackers, okay, that are out there. Well, if you enter a 16 character password even let's get simple, a 16 character password that only has lowercase letters. Computers right now using brute force, it would take 224 million years to crack that password 224 million years, versus it could break your password in nine hours, an eight-character random password randomly generated. Okay, so the length is the key here. So whether you're using one password or you're using just one account by yourself length is what matters. Now, some applications older programs you're using, they used to be restricted eight characters, many of them. Hopefully, they're not anymore, but give it the longest password that they allow that you can reasonably remember because you don't want to grab one of these. I'm holding up a sticky notes post-it notes here in the camera. You don't want to use one of these to write down your password and stick it on the screen. or stick it in the drawer, okay? Because now that guy or gal that is breaking into your office at night can find your password good, you wrote it down. So you don't have to be so complex it has to be written down. And you don't want it to be a character because that only takes nine hours to be cracked. Okay? So keep those things in mind length. Is it enough? Well, yeah, pretty much okay. But if you're using a password that is like your catchphrase, put down that cocktail that people might know that maybe you have on your Facebook page or something on your website at the office, your LinkedIn page. The bad guys are going to do a little doc scene and find it, and they're going to use it, and they're going to get in okay. So don't use these. You know, the quick Silver Fox jumped over the lazy brown dog or other things are going to be easier us Long password, if you ever have taken one of those memory courses to help you with your memory, and then it's a random list of words and it's like, airplane armed, low brown dog, etc. And then you associate them right. So the airplane flew over into the envelope, and the brown dog ate the envelope. Well, do that. Memorize that. And you can also use foreign languages. For many of these, you can come up with crazy words, anything that you know, well, that's a long-phrase going to be the best password that you can generate. And never, ever, reuse the password. Don't use them on multiple websites because if you use it on your kid's site for their x box, and you use it on the banking side, and the Xbox gets hacked, they now have your banking site password, okay? So be careful of all of this stuff. There's this out there called Have I been Pawned - spelled P-W-N-E-D? Go there, check your password, they'll tell you how good it is, based on whether or not that same password is located online. In one of these hacked websites, it's out there and use password managers use multi-factor authentication. These are things like DUO and YUBIKeys. Just do it the right way hardware tokens. They're getting more involved. Now I mentioned OTP. One time password, which is a new protocol, is going to get rid of passwords online. Google has their own called Titan. And there was just recalled on a bunch of those Google Titan keys. certain models of them. You know, stick with Yubikey. They are quite good. smart cards open PGP Fido is the new standard that I've been alluding to, and use them all the time. All of your passwords matter. All right. So that's it for passwords. And when we come back, we're going to talk about the new Cold War. That's coming up in 2020. will be talking about the BBC now on the dark web tech talk and their response over China's influence. And Amazon was expected to win this big contract of the federal government. We didn't talk about that and what my concerns are with us, and what your concerns should be when it comes to cloud computing. So those are coming up. So stick around. You're listening to Craig Peterson right here on WGAN and online. Craig peterson.com. Subscribe to my email list. Get my weekly emails to find out about the free masterclasses etc. Craig Peterson dot com Hello everybody, Craig Peterson here. Welcome, welcome. Welcome back. Of course, you're listening to me either on WGAN-AM online at Craig Peterson dot com, you might be watching over on YouTube Craig Peterson dot com slash YouTube or maybe Facebook, maybe LinkedIn, I'm starting to do a few things with LinkedIn. So we'll see where that all leads us. We're going to talk right now about some predictions, and this is from information security. buzz.com. An article by Checkpoint is a company that makes various types of security software. They were one of the very first firewalls many many years ago. I used them 20 years or maybe more ago, but Checkpoint has been around for quite a while, is not a product I use anymore. But they do have some useful information. And that's what we're going to talk about right now. And they're talking about 2020. And this is all about their predictions. And they're saying that we really could be looking at a significant cyberwar coming next year. What does a cyberwar look like? What are we talking about here? Because cyber Cold War's mean what what what is it cold war. You're not using kinetic weapons writing. In other words, you're not firing missiles. You're not shooting guns. You are playing games with each other, Right? We had as part of the cold war against the socialists and in the USSR in Russia, Soviet Empire. We had a trade war going on where we wouldn't trade directly with them. We wouldn't trade certain things with countries that did do trade with them at the time, and the CCC p ended up going out of existence entirely. That's an example of a Cold War. So today, what is a Cold War look like? We know the United States has started doing some cold war-ish things with trade. Right? We've got our president out there right now, President Trump, who is saying, Hey, listen, China, you need to smarten up. You are doing things that are hurting us. None of the Presidents before me, have had the guts to come out and say this, or do anything about it, but I am going to put tariffs on these various goods because we want you to stop stealing our intellectual property. We want you to be fair and open in your trade with us. China has been pushing back, and put some of their tariffs in place, and they go up, they go down. Is that a Cold War? Well, I don't think sustainable. But at some point, that's a Cold War. Right at some point to say, yeah, that China in the US is just going to butt heads together. I think it becomes a Cold War when we start trying to enforce sanctions against countries that do business with China, which will be bad for us. Now, the European leaders also sat on their hands for about 20 years. It's been since the late 90s. They sat on their hands and didn't do anything about China. So is this a Cold War right now? No, not really. Is it a trade war? Well, kind of. Yeah. We do have a cold war going on with North Korea. They're, they're not shooting missiles at the US, per se. We're certainly not shooting missiles at them neither South Korea. So yeah, there's a cold war there. Where else might we have Cold War's Well, you know, kind of a little bit of a one with the socialists in Cuba? You know, killing 20 million people in Cuba turns out to be a bit of a problem. We have a Cold War right now with Venezuela. And in Venezuela, of course, again, people starving to death in the streets with their socialist government. There seems to be a trend here right with socialist governments and people dying. So yeah, we have cold wars going on right now. So what checkpoint is saying that these nation-states that are out there that don't like us, but have very little power over us are going to get into a cyber Cold War with us? Because, again, if things were to escalate, you know, China versus the United States, if we wanted to hot, or where we were shooting at each other, the United States would probably win, you know, we we'd have to see, of course, it'd be a lot of lives lost, which would be horrific. Obviously, these smaller countries, we just go in, and we could topple them pretty easily look at what happened in Iraq, look at what happened in Libya, in Syria, where the Obama administration decided they would destabilize the Syrian government. They sure as heck did that didn't they looked at where Syria is right now. So we could do this with most small countries. So what can they do to retaliate back against the United States they're certainly not going to get into a hot war with us. Well, what I what checkpoint is saying is there is going to be a new Cold War, conducted in the online world. the world as western and eastern powers increasingly separate their technologies and intelligence. We've already seen Russia have a kill switch for the internet. China has a kill switch for the internet. And in both cases, particularly in China's case, they are controlling everything that people see on the internet. And that's where the whole Tor browser on your network comes in, right to help get that information out. Behind these curtains. We've got the bamboo curtain. We've got the Great Firewall of China, all of these things. So they're saying the ongoing trade war between the US and China and the decoupling of the two huge economy economies is a clear indicator of a potential Cold War, cyberwar. And it actually might be if we don't come to terms with China, we can see things getting worse. Talking about something that happened this week with one of my clients. It is a client that took some of my advice, but not all of my advice, right? Unfortunately, that happens. And so we had some equipment in place. We found with this client that they had given remote access to employees, for the employees to get into the systems at the office. And they didn't do it right. And we gave them a proposal to go ahead and make this, you know, make this happen clean things up. And they didn't. So they still had this, how do I even put this, it's like a big box retailer, firewall VPN controller, and you've heard of the company's name before, I'm sure and just a total joke. And they wanted to continue to use it, and they continue to use it. So then Week, what we found was that someone hopped in via that one of those computers that were used remotely that remote connection, right so so they hopped in, they got on that remote connection, probably because the employee's computer on the remote side was compromised. So they connected to this VPN server on this platform that I, I'm not going to mention their name because I don't want to confuse anybody. And think that it's a good platform because it's not it's cheap, though. It's cheap. And they were able to get in now on to the computer with remote desktop. And then from that computer that was on their internal network that we had no visibility into, they were able to go to another computer for the Operations Manager. And from there, they started uploading x Phil trading data, again, customer information potential They're intellectual property, etc., etc. So they were trying to accelerate it through a device that we control that is designed to look at all of the data, make sure that none of that data that's going out is data that contains confidential information, etc. Right? And it noticed something weird, which was waiting a minute is 6 am. Why all of a sudden is are there gigabytes worth of data on the way out of the network. And so our systems alerted our tax and immediately shut it down. I think about eight gigabytes made it out before we shut it down. So this is an example of what happens in a cold or cyber Cold War in this day and age we saw this week. It's a very, very big deal and this is a small company and trying to save a few bucks. I mean, a few bucks. They may have lost everything. We stopped it partway through. But because we don't have visibility throughout the whole network, who knows what's been going on in there, we can only see stuff that's going out x filter via our network connection on the outside. Okay. So it's they're expecting our friends over at checkpoint are expecting this to escalate next year. Where did this come from? Well, we did some tracebacks. However, what happens is someone can be sitting in China, using computers that have been compromised in Russia, to connect to computers that are compromised in Brazil to connect to computers are compromised in Mexico to connect to computers right here in the northeast United States. So you see what I mean. It's unpredictable but it is exactly what happened. But we did see a little bit about the source in the routing, what happened here. Now, cyberattacks are being used as proxy conflicts between smaller companies that are countries. I should say smaller countries aligned with these bigger countries that want to go after each other. It's going to be fascinating. So we got a couple more points here. We'll get to, and I will get to them as soon as we get back. So stick around. You're listening to Craig Peterson right here on WGAN. And online at Craig Peterson dot com. Peterson, with an O, stick around. We'll be right back. Hey, welcome back. Craig Peterson here on WGN online. Craig Peterson dot com. Thanks for joining us today. I know you got a lot of stuff going on. I appreciate you guys sticking around. Last time I saw the stats for my show. I had the stickiest show on Saturday of all shows, which means more people sit and listen to my entire show on the radio than any other weekend show. I thought that was cool and appreciate you guys for doing that. Also, our numbers keep going up. We've had some incredible days. When it comes to our podcast, we're changing it up a little bit on the podcast side, which you can get on iTunes. You can get it on tune in, SoundCloud, you name it, go to Craig Peterson dot com slash iTunes, if you wouldn't mind and give me a five-star rating. Hopefully, I've earned that from you. Craig Peterson dot com slash iTunes. Let's get into these last points here when we're talking about a new cyber Cold War in 2020. The 2016 elections were the first major fake news elections. Now, of course, Hillary Clinton coined the term fake news during her candidacy for President. Donald Trump kind of grabbed on to it. But we're talking about fake news 2.0 you think the Russians messed around with our last election Wowsers our next election 2020 is going to be a doozy and it's just going to get worse from there. Because now we can create deep fakes that are going to make a significant impact on the elections. President Obama was the first social media president, and he claims his election was due to social media, that social media was what led him to get his message out. And it was his message getting out. That got him elected. Right? Well, now we've got the ability for politicians to really master social media and then almost automated fashion, political adversaries going back and forth Republicans and Democrats. And now you can have the greenies the libertarians, the who was it pop their head up again. Another kind of crazy guy anyways, who's out there to spread false stories to build their narrative based on fake news 2.0 Okay, very, very big deal. And they are already in the process of implementing their plans to influence these 2020 elections. It's a huge deal. Part of what we're going to see with the cyber Cold War is more cyber attacks on utilities are critical infrastructure. They're all going to continue to grow. We've seen attacks on the US and South African utility companies this year, as well. In many cases, critical power and water distribution infrastructure and sewage plants have been using older technology and haven't been updated. Now I can tell you a little bit of inside baseball here that's not confidential that I talked with some experts about when I was running, the FBI Infragard program webinars. So the InfraGard is something the FBI put together to help critical infrastructure And other companies out there to help keep them up to date on what's going on. Okay. So I know there's been a lot of progress made, but they're not all to the point where they are highly resistant to these hackers that are out there and particularly nation-state. So we have to continue to increase our cyber defenses substantially. And another thing while we're on this topic, because of the solar flare activity, one of the most crucial things you need to be doing right now is hardening our electrical grid or electrical infrastructure. So that if we do get one of these massive solar flares, we don't end up with another Carrington event that could knock us back to the 1850s all technology gone. Something for another show, I suppose. So the checkpoints technical cybersecurity predictions for 2020 are targeted ransomware attacks are going to increase 20 1970 Somewhere being increasingly targeted against specific businesses, local government and healthcare organizations that we had a lot of that this year, you guys probably are aware of that I certainly have talked about it, okay. Attackers are spending time and intelligence gathering on the victims to make sure they can inflict maximum disruption. Remember, the disorder is what they're going to do. They want to disrupt our economy. They want to empty your bank account, they want to confuse, conduct phishing attacks going beyond the email, email is still the number one attack vector. And that's what we guard carefully for our clients. So most of our clients now are using some version of Microsoft Office 365. And remember, there's 10,000 plus skews that Microsoft has these different products and they've got a one through I can't remember where it goes now he five or seven for their email product. And then they've got data offerings, and I got all these different things. Don't go with the cheapest. Okay? But what we do with the email because Microsoft isn't very good at providing anti-phishing and anti-malware services for the email, we brought all the mail through us, we run it through some highly active filters, and then we send it on over to our customers, okay. So be very careful about that. Now, and frankly, next year and on there is now vision which is voicemail phishing, there are SMS texting attacks against mobile devices, gaming platforms, social media platforms, it's crazy. Mobile malware attacks are moving up in the first half of 2019 saw a 50% increase in attacks by mobile banking malware, over 2018. So we're talking about stealing payment data credentials and funds from the victim's bank accounts. And there are new versions that are already available for the bad guys. And this stuff isn't expensive, and you know that a nation-state might pay a million dollars to get their hands on some of the newest zero-day attacks. But there are some beautiful attacks that you can get for 20 bucks online on the dark web that you can use to destroy a company. Twenty dollars is all it takes. Okay? And unfortunately, that company is going to have to spend a couple hundred thousand in order to protect themselves from that $20 attack, right? Is it worth it or isn't it? They're getting more sophisticated phishing attacks here and more effective as well. They're getting mobile users to click on malicious web links, etc., etc. Okay. Nice little quote here from Checkpoint that we won't read right now, but we've got to protect ourselves. These are called generation-five attack vectors, and they are getting very shrewd. They are able to really inflict maximum damage, it is just crazy. So that's why we have multiple layers, right? It goes back to Shrek, that Ogres are like onions. That's how you have to think of your security. You have to have a stack of security, and you have to have all these different layers. If they get through one layer, there's another layer underneath to protect it further. And then another layer and then another layer. That is how we stopped them this week at one of our clients from stealing all of their company's information. And, you know, again, it isn't cheap, but how much is the company worth? How much is your job worth, right? And I feel sorry for everybody that is this De facto security person and organization who does not have the budget that you need. And man, I empathize. That's why we're doing these mini-courses and the master courses as well. And that's why we got these free masterclasses and the Facebook Live so you can ask questions and get them answered because I really, really, want to help you guys. Okay, of course, I want to keep my lights turned on. So that's why I have paid for courses that you can purchase. But all of these classes are simple and free. So make sure you know about them. Sign up today. Go to Craig Peterson dot com slash master class, sign up, and you'll find out about these free classes that I'm holding more or less two times a month to three times a month, depending on what my schedule allows. All right, everybody, stick around because we'll be right back. You're listening to Craig Peterson on WGAN Hello, everybody, welcome back. Craig Peterson here, man, the show is winding. Winding down, I guess, is what you'd say. We get about the last half hour here together, and we're going to be talking about some of the technology in our lives, some of the things we need to do to protect ourselves. Of course, that's what I do for a living. So that's what I know best. Right? So we've talked about a lot of technology, but we kind of stick most closely with some of the security stuff. We're going to talk about the BBC now and why they're using the dark web. If you've watched any of the war movies, you know, that we used the BBC the Allies did in world war two to get messages to the underground and other people who were in occupied territories. They did it through code words and things, you know, they'd have a little phrase that they would put up on the radio as they were broadcasting it. And sometimes, the phrase would mean something, and sometimes the phrase wouldn't mean anything. The whole idea was to confuse the enemy during the war. That way, the socialists in Germany didn't know what we were talking about. The Socialist Party, the Nazis, and that that's true to the Japanese and what was happening there with their socialist Empire. We wanted to get messages through, but how do you do that in a time of war when people are listening? Well, that's one of the proper ways to do it. Today, in this day and age, things a little bit different. It turns out that China, Iran, and Vietnam are three of the country's This is according to the BBC, that has tried to block access to the BBC. Now the BBC is biased, but you know, they overall have some pretty darn good news. And I get my news from several different places because I want to hear all sides. So I listened to the BBC. I listened to the CBC, I listen to PBS. I listen to Fox, I listen to NBC, I listen to all of these different ones in podcast format. Well, that's easy enough to do right now in the United States but in many places around the world, there is serious censorship. I've mentioned the Great Firewall of China before. And that is total censorship where they can pretty much ban anything at least that's their idea behind this. So what the BBC has done is they have launched our new website that looks identical to their existing normal website out on the dark web. You know, if you attend a masterclass where we were talking about VPN, and we're talking about mobile security. I talked about what the onion network is. And it is essentially a hidden network that sits on top of the normal internet. And it was established by the United States. It's still maintained by the United States. And it's for dissidents, to be able to communicate with our State Department. That's kind of what it was set up, for now, would use for almost everything. It's the dark web. We just talked about it in my show, where we're saying the dark web was also being used by the bad guys to sell these hacking tools. They use it to sell our identities to do trades with each other. Right? The dark web, though, isn't all bad. It was, as I said, designed to be good and to be very helpful. In fact, it still is. So the BBC set up a new version of their website on the dark web. And you can look it up on the BBC website to find out more if you'd like. And you can also find it on my website at Craig Peterson calm. What's the only way to get at it is for most people is to use the Tor browser to our browser. And the lot of detail I went into for like half an hour about the Tor Browser in the master class. But users of the Tor browser can visit a special URL. It's BBC News v to VJTPSUI dot onion. Now you're not going to remember that I'm sure which is why I told you to go to the BBC calm or go to Craig Peterson and you'll find it there. But it is a different type of URL than you're used to his net. And if you click on that address, it won't work. If you're using a regular browser, but if you're using a browser that's on the onion network that knows how to use it, like the Tor Browser, which is the ultimate and privacy, it can get to the BBC website. So the countries that are blocking it that I named a little bit earlier, including China, Iran, Vietnam, we know North Korea is and some others to people in those countries that have internet access, can use this browser even if they have some blocks, firewalls, etc, in place to stop people from getting out. So I think that's pretty darn cool and smarter. The BBC, they're saying is going to include foreign language services such as BBC Arabic, BBC, Persian, and BBC Russian. But UK only content like usual only be available within the UK due to broadcast right. So check out the TOR if you haven't already. T-O-R There is TOR clients for all major operating systems, including your desktop computers and mobile devices. And it attempts to hide a person's location and where they're going. It's not 100% effective, but it's pretty darn close. And that uses these exit nodes that are really all over the world. So it looks like you're coming from the United States or India, etc, etc. So check it out online and kudos to the BBC, for doing just that. I'm going to talk right now about Tick Tock with you guys. Because social media is really important to our kids, our grandkids, it's become important to society. It's one of the most effective ways to do advertising nowadays. Social media, it's where it's at. And there are these people on social media that have huge followings. haven't done anything, right? Like the Kardashians, right? They're famous for being famous. And they use the money from the OJ Simpson trial to really get that thing going because the or the old man had was a popular attorney and he charged a lot and she, his wife was able to manipulate it and do some amazing things with it just absolutely amazing. Well, one of the apps that our kids are using this become very, very popular is called Tick tock, ti KT, okay. If you have kids or grandkids or maybe you're using it, you need to need to have a talk with them and help them understand. Because Tick Tock is owned by a company called ByteDance. That is based in Beijing. And what many people forget is that China is a socialist country and it is socialist it is gone down the communist road. And any company that's based in China, you know, the Chinese government doesn't necessarily run the company, but they heavily regulate the country, which is why you compare the United States to, for instance, the Nordic countries, United States is very socialist. The Nordic countries are actually much more capitalist. But they have the money to put in these safety nets that we don't because of the socialist control anyways, blah, blah, right. So Tick Tock is owned by a company based in Beijing, China, which means there are surveillance systems in place. And the concern that's been expressed in the reason why people need not states are calling for Tick Tock to be banned in the US and they're calling immediately for people to delete it from their phone. is we just don't know how much of our data is being shared with the communist government over there. So let's look at the response and that one to think back. Right. President Nixon, I want to make one thing perfectly clear. Right. Let me make this perfectly clear. I did not have with Miss Lewinsky. When we get back, we're going to finish this. I'm going to read what the statement is that came out of China. You're listening to Craig Peterson are right here on WGAN. Online, Craig Peterson. com, of course, online kind of everywhere on all of the podcast platforms on YouTube on Facebook. And you can just go to my homepage, Craig Peterson, calm or keep listening to me here. We'll be right back. Hey, welcome back, everybody, Craig Peterson here. WGAN online, Craig Peterson calm. And I am videotaping everything today. So you can watch me online that Craig peterson.com slash for YouTube. And we're changing the podcast formats up a little bit as well, trying to put the concepts together and just single podcasts as opposed to how I do things here on the radio show where I might go from one segment to the next segment, and make this just a little more friendly for the general online consumption. Now, before the break, I mentioned that I want you to keep something in mind. Remember President Nixon Nixon, and this is quoted all of the time I want to make one thing perfectly clear. And remember President Trump, let me make this clear. I did not Have with that woman misc Alinsky. Let's read the statement that came out from the company that makes this. Let me be very very clear. Sound familiar? Tik Tok does not remove content based on sensitivities related to China. We have never been asked by the Chinese government to remove any content, and we would not do so if asked. We are not influenced by any foreign government, including the Chinese government Tick Tock does not operate in China, nor do we have any intention of doing so in the future. So it makes me wonder when I hear let me make one thing clear. Are they lying? Right? It's like I always tell my kids because I know they're not trying to be deceitful, right, but if someone starts to sent insane Well, to be honest, You have to wonder where they been dishonest with you before, and now they're honest. Have you had that happen? I know I caught myself saying that I got into the habit of saying Well, to be honest, even though I had been correct the whole time, and I realized, wait a minute now, I'm painting a picture of me having been dishonest before this. So when were you telling the truth after you said let me make this clear or before? So the pushback from Tick Tock comes after US senators Tom Cotton and Chuck Schumer requested intelligence officials assess the national security risks posed by Tick Tock as well as other Chinese content platforms. Hundred 10 million downloads in the US alone. It's a potential counterintelligence tool that we can't ignore. That was in the statement that came out. Facebook boss Mark Zuckerberg, Whose firm competes with Tik Tok, particularly in the youth market, has also recently attacked the platform. Oversensitive. Concerned, remember that Coburg makes a competing product. Another US Senator Marco Rubio previously asked us national security panel to review their acquisitions of musically as well that happened this year. Concerns about censoring concerns also, about whether or not these guys are honest with everybody. So there you go. There's Tik Tok. I've got two more articles. Let's see if we can get through them here in the last segment. One is about the Pentagon. Many people have been looking at stuff saying Oh, man, I'm just moving to the cloud because then I don't have to worry about security anymore or configuration or updating computers. Remember, the cloud is just another word for someone else's computer. Your legal responsibility These to protect your data do not disappear when you move that data to the cloud. And you are frequently much more exposed once you're in the cloud than if you kept it on your machines. So what's happened here now is the Department of Defense is looking at their budgets saying, Hey, listen, if we move everything to the cloud, it's going to be cheaper for us. Now the Pentagon realizes it's not necessarily going to be more secure. And, in this day and age, most cloud services are far less reliable because of Miss configurations that humans have made on them, so I don't think the Pentagon is looking at as this as a way to make things more secure. Like so many small businesses do unknowingly and end up out of business because of it. But the Pentagon is looking to save money, and The winner that everyone was expecting from this was Amazon. And then President Trump came into power and said, Hey, wait a minute now. My administration has been looking at this bidding process for this project and says it doesn't look like this was fair. It's called the Jedi contract. By the way, JEDI. It doesn't look like this was appropriate. So let's have another examination at it. And Amazon came out with a statement awarding it to Microsoft. Amazon said that a detailed assessment purely on the competitive offerings wo

tv new york social google japanese long china chinese mexico oj simpson amazon brazil halloween god android democrats military republicans congress netflix talking live tor west opera sound european texas pbs president nbc iran persian germany network friend donald trump cold war ios syria hillary clinton iraq united states nazis russia north korea bbc syrian caribbean technology online digital government ladies security computers jedi cia walking dead twenty soundcloud mac fbi new jersey nordic mobile duo microsoft ville usb everything everything cuba defense barack obama russians cisco vietnam currency empire cryptocurrency keyboard soho shrek united kingdom windows venezuela bluetooth lie beijing computing ussr kt xbox pentagon concerned cloud contract carrington presidents safari tick calm privacy kardashians peterson nsa tracking south korea imac south african keylogger cbc operations manager wgn libya moebius brandt so i've pw ccc sms look what hundred allies home office concerns mark zuckerberg cio winding as i've passwords regulation internet explorer firefox tick tock okay so this saturday browser right so mozilla state department alinsky right well coburg every saturday tom cotton encryption vpn bx zogby eff google chrome ub microsoft office checkpoint tok otp ogres yubikey ssl silver fox lastpass memorize craig peterson tiktok tik apple imac business edition bytedance attackers right we've infragard right it okay it gcm tor browser greg peterson chuck schumer password management great firewall soviet empire socialist party next saturday microsoft internet explorer keylogging tracking protection keyloggers bbc arabic wgan
Rosemary's Baby 6:66 / The Shining 2:37
Episode 2: LOOK WHAT’S HAPPENED TO JOHN CASSAVETES’ SNEAKERS

Rosemary's Baby 6:66 / The Shining 2:37

Play Episode Listen Later Oct 30, 2019


  Kill By Kill podcast’s Gena Radcliffe stops by, along with Megan Dooley, to discuss cannibals, awkward sex, and the infamous TV movie “Look What’s Happened to Rosemary’s Baby.”   Download the file here: Episode 2: LOOK WHAT’S HAPPENED TO JOHN CASSAVETES’ SNEAKERS   Gena Radcliffe’s essay on the TV movie can be found here.   […]

Riders of the Apocalypse
The Video Dead (1987)

Riders of the Apocalypse

Play Episode Listen Later Sep 30, 2019 55:21


Look What's Buried Inside Your Television...

Maeltopia - A New World of Horror Fiction

Look What the Dog Dragged In Veve continues to use her resources to investigate the Bower's Murder/suicide case.  However, in doing so, she invites more strangeness into her life.   Looking for a way to support us and receive perks like early access to podcast episodes and behind-the-scenes videos? Check out our Patreon! Love the Shepherd of Wolves series? Our novel adaptation, THE RED SON, is now available in audiobook! Get your FREE copy today with your 30-day Audible trial! Want to learn more about the world of Maeltopia? Check out our website! And be sure to like, comment, rate and review us on iTunes or your favorite podcast platform! We appreciate your feedback!

Headbang Theory
Am Stam Glam

Headbang Theory

Play Episode Listen Later Feb 18, 2019 144:56


Pourquoi vous n'aimez pas le glam metal ? Présenté par Jaxar & Bacteries. Montage par Romain. Liens : Louder Than Hell : https://amzn.to/2G97FKE Relika sur Kissman : https://youtu.be/tGrnlIAwjYo George Carlin - 7 Words You Can't Say On TV : https://m.youtube.com/watch?v=kyBH5oNQOS0 Dee Snider commission Parental Advisory : https://www.youtube.com/watch?v=S0Vyr1TylTE The Dirt : https://www.metalorgie.com/groupe/Camion-Blanc#2686 Poison - Pochette de Look What The Cat Dragged In : https://media.senscritique.com/media/000004989571/source_big/Look_What_the_Cat_Dragged_In.jpg Swedish Metal Aid - Give A Helpin' Hand : https://www.youtube.com/watch?v=k9ezf6rjtYE Erratum : Une livre américaine vaut 453g, c'était donc des petits steaks ... Playlist : Spotify : https://open.spotify.com/user/webzine_metalorgie/playlist/5Bz1tYuT39Se7a2o4SMkyK?si=EYzZFtwuQsqFFfrGqDlFSQ Deezer : https://www.deezer.com/fr/playlist/5500141082?app_id=105611

Sacred Stories
Sacred Stories ~ Look What Dragged the Cat In with Scott Stevens

Sacred Stories

Play Episode Listen Later Dec 4, 2018 29:59


Alcohol - the old gateway to the new drug crisis. Meet Scott Stevens, author of the award-winning book Look What Dragged the Cat In: The Rise of an Opioid Crisis, an insightful book on the current opioid crisis and the real culprit of our ongoing drug crisis. Scott contends the public misinterpretation stems from its own love affair with the cheapest, easiest to get, most lethal drug: alcohol. Drugmakers, dope dealers, and physicians hands aren’t clean, but they’re not as dirty as the public perceives. Look What the Cat Dragged In takes a deep dive into the opioid crisis, the suspects, the failed solutions, and the way out. Visit alcohologist.com for more information on this important book! Subscribe to our podcast at Sacred Stories on iTunes.

Full Gospel Center Sermons
Look What the Wind Blew in

Full Gospel Center Sermons

Play Episode Listen Later Aug 19, 2018 37:59


Full Gospel Center's Pastor Frank Mordecki preaching the message "Look What the Wind Blew in" on 08/19/2018.

Happy Life Studios Podcast
Soft Water vs Hard Water HL121

Happy Life Studios Podcast

Play Episode Listen Later May 14, 2018 16:59


Would you rather have a hard water relationship with God or a soft water one? Being God's friend is not difficult, some people just like to make it that way. I'd like to give a shout out to James Kocian for his amazing music created for Happy Life Studios. "Another Perfect Day", "Some Kinda Way" and "Still A Kid" are the 3 we used this week. Check out more of his cool music here https://soundcloud.com/james-kocian). We also used portions of "You Are So Beautiful" performed by Joe Cocker and "Look What the Lord Has Done" performed by the Rhema Singers. We don't own the rights to either of these. www.HappyLife.lol www.Facebook.com/HappyLifeStudios www.Instagram.com/HappyLife_Studios www.Twitter.com/HappyLifStudios www.PayPal.me/StevoHays Camp Daniels social media www.campdaniel.org www.facebook.com/camp.daniel.5 www.instagram.com/camp_daniel

ControlTalk Now  The Smart Buildings Podcast
Episode 253: ControlTalk NOW — Smart Buildings Videocast and PodCast for Week Ending Feb 4, 2018

ControlTalk Now The Smart Buildings Podcast

Play Episode Listen Later Feb 4, 2018 69:05


Episode 253: ControlTalk NOW — Smart Buildings Videocast and PodCast for week ending Feb 4, 2018 features our 2-minute teaser video of the 2017 ControlTrends Awards — and we have video coverage of KMC’s 2018 Genius Summit; Ken Sinclair’s February, Automated Buildings; Altura Associates wins the 2017 Project Haystack Award; Optergy’s Proton wins the 2017 Innovative Product of the Year; and Schneider Electric introduces new Pelco Video Solutions via iPortal. Optergy’s Proton, 2017 ControlTrends Awards Innovative Product of the Year Co-winner!Optergy Proton, winner of the 2017 ControlTrends Awards Innovative Product of the Year, thanks you for supporting Optergy nomination for the ControlTrends Awards. In 2017, Optergy was nominated in a number of categories. Optergy takes product innovation very seriously and we aim to help all buildings into Smart Monitoring & Control at a fraction of the price of the next best alternative. Look What’s New at Schneider Electric! The Vault: New Year, New Pelco Products in iPortal. New Year, New Pelco Products in iPortal. We are pleased to announce the availability of Pelco’s Video Solutions through iPortal. Pelco’s Video Solutions include: Fixed IP Cameras; PTZ IP Cameras; Panoramic IP Cameras; Specialty IP Cameras; Analog Cameras; Video Management Systems; Mounting Hardware & Accessories. Visit www.pelco.com for product guides, brochures, and specifications. Ken Sinclair’s Automated Buildings February, 2018 Theme: Building Brains — AI is the Brain, IoT the Body. Speaking with the Face and Voice of Digital Transformation. n the February edition of Automated Buildings, Ken Sinclair introduces us to his digital twin, Robo Ken, who foresees (in the very near future), buildings full of powerful, low-cost edge devices — armed with AI and Machine Learning capabilities, that will accelerate the digital transformation of our industry — at an alarming pace. Congratulations to Altura Associates Winner of the 2017 Project Haystack Award. Altura Associates is this year’s honoree for the work that they have done to apply Haystack across numerous projects that deliver improved performance for building owners and operators. Accepting the award on their behalf at the 2017 ControlTrends Awards is another leading member of the Haystack community, Alper Uzmezler of BASSG. Highlights and Interviews from the 2018 KMC Genius Summit. The KMC Commander is Calling! Congratulations to a Summit well done! Richard Newberry, Tim Vogel, and team KMC Controls delivered another three-part agenda of product and technical training, motivation and industry insight, and networking and entertainment in a compressed and energized two days of Genius Summit at Chicago’s luxurious Langham Hotel. The best news yet, is that KMC Controls is ready to share the majority of the breakout sessions that were filmed. They will be available in the coming weeks… stay tuned! The post Episode 253: ControlTalk NOW — Smart Buildings Videocast and PodCast for Week Ending Feb 4, 2018 appeared first on ControlTrends.

Radulich In Broadcasting Network
Metal Hammer of Doom: Poison - Look What the Cat Dragged In

Radulich In Broadcasting Network

Play Episode Listen Later Nov 22, 2017 125:00


Our annual Thanksgiving show where we review a turkey of an album!   Look What the Cat Dragged In is the debut studio album by American glam metal band Poison, released on August 2, 1986 through Enigma Records. Though not a success at first, it steadily built momentum and peaked at #3 on the US Billboard 200 on 23 May 1987. The album spawned four singles, three of them charting successfully: "Talk Dirty to Me", "I Want Action", "I Won't Forget You" and "Cry Tough".[4] It serves as a prime example of the glam metal genre both musically and image-wise. The album ultimately has sold four million copies worldwide, one of their best-selling albums. Look What the Cat Dragged In was certified gold in 1987 and 3x multi-platinum in 1990 by the RIAA. It has also been certified silver by the BPI and platinum in Canada. Described by Revolver Magazine as "oversexed, under-thought, and relentlessly fun", the album's style is often described as "glam metal" and was strongly influenced by East-Coast bands like Aerosmith and Kiss and It is a sound dominated by distorted power chords and catchy melodies. Reflecting a period before the band's music began to take on the influence of Californian, Van Halen styled stadium rock, the album is characterized by more traditional heavy metal sounds.

On The Bright Side Podcast
OTBS 11 08 17 Receive Your Blessing and Look What the Lord Has Done! and Hotel Suite I Deserved

On The Bright Side Podcast

Play Episode Listen Later Nov 8, 2017


OTBS 11 08 17 Receive Your Blessing and Look What the Lord Has Done! and Hotel Suite I Deserved

On The Bright Side Podcast
OTBS 08 01 17 Generous is Glorious and Look What the Lord Has Done! and Giving in Obedience

On The Bright Side Podcast

Play Episode Listen Later Aug 1, 2017


OTBS 08 01 17 Generous is Glorious and Look What the Lord Has Done! and Giving in Obedience

On The Bright Side Podcast
OTBS 05 02 17 What’s in the Center? and Look What the Lord Has Done and Don’t Hog Your Journey, Share Your Story

On The Bright Side Podcast

Play Episode Listen Later May 2, 2017


OTBS 05 02 17 What’s in the Center? and Look What the Lord Has Done and Don’t Hog Your Journey,  Share Your Story

On The Bright Side Podcast
01 19 17 Identity Theft and He Will Meet All Your Needs and Look What the Lord Has Done

On The Bright Side Podcast

Play Episode Listen Later Jan 19, 2017


01 19 17 Identity Theft and He Will Meet All Your Needs and Look What the Lord Has Done

Our Town
Our Town

Our Town

Play Episode Listen Later Dec 10, 2016 10:49


Megan & Jennifer are here to talk about Look What the Cat Brought In, which is part of www.indygive.com this year and raises money for shelter cats who have health issues and may not be adopted.

Aprende ingles con inglespodcast de La Mansión del Inglés-Learn English Free
Confusing verbs like say-tell, remember-remind, win-earn etc - AIRC80

Aprende ingles con inglespodcast de La Mansión del Inglés-Learn English Free

Play Episode Listen Later Dec 6, 2015 39:12


If you are a new listener to this podcast, welcome! I'm Craig. This is Reza. With over 40 years of teaching between us, we'll help you improve your English and take it to the next level. In this episode: Confusing verbs (say-tell, speak-talk, listen-hear) Más podcasts para mejorar tu ingles en: http://www.inglespodcast.com/  More podcasts to improve your English at: http://www.inglespodcast.com/  Listener Feedback: RAUL (from Valencia)when do you use "realize", "notice" " find out" I think all of them mean the same. Realize and notice es darse cuenta, find out puede ser averiguar o darse cuenta. It's a mess! "Realize" means to know and understand something in your mind. It's a cognitive event. "I realized she didn't love me anymore." "Notice" means to see, hear or feel something. It's more of a physical event. "Reza, I notice you're wearing a new shirt today." / "I notice you've had your hair cut." / I notic you've added more salt than normal to the soup." Find out = to obtain information. "I need to find out what time the train leaves for Madrid tomorrow." / "I was the last one to find out that my girlfriend was cheating on me." Joaquin Ruiz Rufo (email) Hi, I´m looking for information about the use of these sentences, Could you help me? Look like, like and Look - What's the difference? TO LIKE: "I like paella, I like the weather and the people in Valencia." TO LOOK: "That new T-shirt looks great." TO LOOK LIKE = to be similar to: "That shirt looks like a shirt I used to have." / "He looks like his brother." (He and his brother have a similar appearance.) "Reza doesn't like getting up early." (the ACTIVITY of getting up) "Craig likes to get up early because he can have a slow breakfast, get ready slowly, have a shower." (he likes the RESULT) TO BE LIKE: "I've never been to Toledo. What's it like?" / "I don't know John's brother. What's he like?" (¿Cómo es?) "How's John's brother?" (¿Cómo está? - Asking about health)- He was sick, but he's better now." Jorge Jimenez - Confusing verbs: I have a question, What is the difference between to say and to tell (decir)? You say something and you tell a person "He said hello." / "He said he wanted to help me." / "He said something in Spanish." "He told my brother to help him." / "He told the teacher that he had done his homework." TELL the truthTELL a lieTELL a jokeTELL a story "Tell me to shut up.""Tell John." - "Say to John." Prevent/avoid By avoiding something, you take an action to "go around" the problem. Preventing something means actively interfering to stop something happening. "I avoided going to the party by saying I was sick.""I prevented Reza from coming into the room by closing the door." Listen to/hear "To hear a noise" / "Hear people speaking." remember/remind Remind + direct object: "Remind ME to buy milk." You remind SOMEONE TO DO something - "Remind me to write the shownotes to this episode." I've got to leave at 5 p.m. don't forget to remind me. - Tengo que irme a las 5 de la tarde; no te olvides de recordármelo. (make me remember) Remember I remember the day you were born. - Me acuerdo del día en que naciste. / Recuerdo el día en que naciste. Remember is when you think of a memory (a past experience): I remember the first time I met you.Remind is when a person or thing makes you think about something. Our show notes remind us what we need to talk about. look/see/Watch When you look at something you make an effort - "Look at that man over there!"When you see something you do not make an effort - "I can't see you." / "Did you see John yesterday?"When you watch something (the TV, a film, a football match) you make an effort to engage in it. - "I'm watching the film" (Watch = to look with attention) argue/discuss Argue - discutir (to have a row with someone)Discuss - hablar (to have a discussion with someone) fit/suit Suit - to look good "That shirt really suits you."Fit - to be the correct size "This shirt doesn't fit me anymore. It's too small." meet/know (conocer) "Reza and Craig MET each other in 1998. They have KNOWN each other for many years." Meet (quedar)"Shall we meet tomorrow?"- "Yes, let's meet for a beer." do/make Reza and Craig spoke about 'do' and 'make' collocations in Episode 1 and Episode 2 http://www.inglespodcast.com/2014/01/30/aprender-ingles-con-reza-y-craig-1/ http://www.inglespodcast.com/2014/01/30/aprender-ingles-con-reza-y-craig-2/ Raise/Rise Rise does not take an object. It's an intransitive verb - "The sun rises."Raise does take an object so it's a transitive verb - "Raise your hand." / "Ask your boss to raise your salary." / "Ask your boss for a RAISE." (noun) 'Rise' can also be a noun - "The rise of the Roman empire." Manage/succeed Succeed IN + gerund - tener exito "John is a lucky guy. He succeeds in everything in life."Manage + infinitive - conseguir, lograr (You manage something WITH DIFFICULTY) "Although it was very difficult, I managed to pass my First Certificate exam." win/earn (ganar) WIN: a competition, a game, the lottery money at a casino, a prize, an awardEARN: a salary, money at work, earn respect bring/take Bring it HERE Take it THERE lend/borrow LEND TO: "The bank lends money to you."BORROW FROM: "You borrow money from the bank." "Can I borrow your pen?" - ¿Puedo pedirle prestada tu boli?"Can you lend me your pen?" - ¿Puedes prestarme tu boli? allow/let/permit "Let me help you.""Allow me to help you.""This contract does not permit you to charge a lot of money." wear/carry"What are you wearing?" / Reza's wearing smart clothes.""When you came in you were carring a briefcase." wear/dress - to get dressed/put on "I get up and put on my clothes. After I put on my clothes I'm wearing them.""I get dressed in the morning.""Put on your glasses." lose/miss "Reza often misses the bus.""Craig sometimes misses English pubs." "Reza's losing his mind.""Craig lost 10 euros." advise/warnAdvise - aconsejar - "We advise you to listen to this podcast."warn - avisar - "Reza warned Craig not to drink that eighth whisky." / "He warned me against drinking it." dismiss/resign "I resigned from my company." (I handed in my notice)"I was dismissed from my company." (I was sacked/I was fired) ...and now it's your turn to practise your English. We want you to send us a voice message and practise some of the confusing verbs in this episode. inglespodcast.com - speakpipe Send us an email, or record your voice and send us a sound file, with a comment or question to craig@inglespodcast.com or belfastreza@gmail.com. Más podcasts para mejorar tu ingles en: http://www.inglespodcast.com/  More podcasts to improve your English at: http://www.inglespodcast.com/ The music in this podcast is by Pitx. The track is called 'See You Later'

Dread Media
Dread Media - Episode 347

Dread Media

Play Episode Listen Later Apr 21, 2014 73:56


Ti West has long been a favorite new filmmaker here at Dread Media. His films The House of the Devil and The Innkeepers each earned unanimous perfect scores. But what about his early films? This week, Desmond and Darryll review his first feature film The Roost, as well as his early student film Prey. Then, Adam and Jeff join Desmond to discuss the film Ti West tried to remove his name from: Cabin Fever 2: Spring Fever. A ton of varied and great songs get a spin, too: "Look What the Bats Dragged In" by Wednesday 13, "Unknown Stuntman" by Lee Majors, "We are the Undead" by Cancer Bats, "Somebody Put Something in My Drink" by The Ramones, and "We Die Young" by Alice in Chains. Send feedback to: feedback@dreadmedia.net, or 206.203.1213. Follow @dreadmedia on Twitter! Join the Facebook group! Visit www.stayscary.wordpress.com.

Earth-2.net Presents...
Dread Media - Episode 347

Earth-2.net Presents...

Play Episode Listen Later Apr 21, 2014 73:56


Ti West has long been a favorite new filmmaker here at Dread Media. His films The House of the Devil and The Innkeepers each earned unanimous perfect scores. But what about his early films? This week, Desmond and Darryll review his first feature film The Roost, as well as his early student film Prey. Then, Adam and Jeff join Desmond to discuss the film Ti West tried to remove his name from: Cabin Fever 2: Spring Fever. A ton of varied and great songs get a spin, too: "Look What the Bats Dragged In" by Wednesday 13, "Unknown Stuntman" by Lee Majors, "We are the Undead" by Cancer Bats, "Somebody Put Something in My Drink" by The Ramones, and "We Die Young" by Alice in Chains. Send feedback to: feedback@dreadmedia.net, or 206.203.1213. Follow @dreadmedia on Twitter! Join the Facebook group! Visit www.stayscary.wordpress.com.

Earth-2.net Presents...
Dread Media - Episode 347

Earth-2.net Presents...

Play Episode Listen Later Apr 21, 2014 73:56


Ti West has long been a favorite new filmmaker here at Dread Media. His films The House of the Devil and The Innkeepers each earned unanimous perfect scores. But what about his early films? This week, Desmond and Darryll review his first feature film The Roost, as well as his early student film Prey. Then, Adam and Jeff join Desmond to discuss the film Ti West tried to remove his name from: Cabin Fever 2: Spring Fever. A ton of varied and great songs get a spin, too: "Look What the Bats Dragged In" by Wednesday 13, "Unknown Stuntman" by Lee Majors, "We are the Undead" by Cancer Bats, "Somebody Put Something in My Drink" by The Ramones, and "We Die Young" by Alice in Chains. Send feedback to: feedback@dreadmedia.net, or 206.203.1213. Follow @dreadmedia on Twitter! Join the Facebook group! Visit www.stayscary.wordpress.com.

Dread Media
Dread Media - Episode 347

Dread Media

Play Episode Listen Later Apr 21, 2014 73:56


Ti West has long been a favorite new filmmaker here at Dread Media. His films The House of the Devil and The Innkeepers each earned unanimous perfect scores. But what about his early films? This week, Desmond and Darryll review his first feature film The Roost, as well as his early student film Prey. Then, Adam and Jeff join Desmond to discuss the film Ti West tried to remove his name from: Cabin Fever 2: Spring Fever. A ton of varied and great songs get a spin, too: "Look What the Bats Dragged In" by Wednesday 13, "Unknown Stuntman" by Lee Majors, "We are the Undead" by Cancer Bats, "Somebody Put Something in My Drink" by The Ramones, and "We Die Young" by Alice in Chains. Send feedback to: feedback@dreadmedia.net, or 206.203.1213. Follow @dreadmedia on Twitter! Join the Facebook group! Visit www.stayscary.wordpress.com.

Christ Encounters
Look What the Lord has Done 3

Christ Encounters

Play Episode Listen Later Aug 15, 2013 47:43


Look What the Lord has Done 3

Christ Encounters
Look What the Lord has Done 2

Christ Encounters

Play Episode Listen Later Aug 5, 2013 43:18


Look What the Lord has Done 2

Christ Encounters
Look What the Lord has Done

Christ Encounters

Play Episode Listen Later Jul 29, 2013 41:57


Look What the Lord has Done