Today I'm talking to Jasmin Darznik, the New York Times bestselling author of The Bohemians, a novel that imagines the friendship between photographer Dorothea Lange and her Chinese American assistant in 1920s, San Francisco. Her debut novel, Song of a Captive Bird was a New York Times Book Review editor's choice book, and a Los Angeles Times best seller. She's also the author of The Good Daughter: A Memoir of My Mother's Hidden Life. Her writing has appeared in New York times, Washington Post and Los Angeles Times. I had the best time talking with Jasmin about writing historical fiction, the creative life, and why Tipping the Velvet by Sarah Waters is the Best Book Ever. Support the Best Book Ever Podcast on Patreon Follow the Best Book Ever Podcast on Instagram or on the Best Book Ever Website Host: Julie Strauss Website/Instagram Guest: Jasmin Darznik Instagram/Facebook/Website Note: Most of the book links this week lead to Jasmin's favorite bookstore, the Book Passage in Corte Madeira. Please shop indies whenever you buy books!! Discussed in this episode: The Bohemians by Jasmin Darznik Song of a Captive Bird by Jasmin Darznik The Good Daughter: A Memoir of My Mother's Hidden Life by Jasmin Darznik Migrant Mother by Dorothea Lange Dorothea Lange: A Life Beyond Limits by Linda Gordon Montgomery Block, San Francisco Mary Karr Tipping the Velvet by Sarah Waters Book Passage in Corte Madeira The Paying Guests by Sarah Waters Fingersmith by Sarah Waters The Oakland Museum – The Dorothea Lange Archive The Plot by Jean Hanff Korleitz The Talented Mr. Ripley by Patricia Highsmith Great Circle by Maggie Shipstead Discussed in our Patreon Exclusive clip Fierce Attachments: A Memoir by Vivan Gornick Men We Reaped: A Memoir by Jesmyn Ward The Woman Warrior: Memoirs of a Girlhood Among Ghosts by Maxine Hong Kingston Do you have a book you want to tell me about? Go HERE to apply to be a guest on the Best Book Ever Podcast. (Note: Some of the above links are affiliate links, meaning I get a few bucks off your purchase at no extra expense to you. Anytime you shop for books, you can use my affiliate link on Bookshop, which also supports Indie Bookstores around the country. If you're shopping for everything else – clothes, office supplies, gluten-free pasta, couches – you can use my affiliate link for Amazon. Thank you for helping to keep the Best Book Ever Podcast in business!)
From the basketball court, this episode includes interviews with Lady Viking sophomore guard Erin Ryan and Viking junior post player Luke Johnson. From the wrestling mat, we spoke with senior Brett Haskins about his career milestone. Ripley grad Jarret Lough tells us about his new role of demonstrating Mountaineer spirit. --- Support this podcast: https://anchor.fm/brian-johnson9/support
Happy New Year and welcome back to the Red Fern Book Review! Amy reviews two of the biggest books of 2021: Who is Maud Dixon? by Alexandra Andrews and Apples Never Fall by Liane Moriarty. Both are bestselling mysteries that are executed very differently. Who is Maud Dixon? is a clever thrill ride that combines an edgy whodunit reminiscent of Patricia Highsmith with the fun and accessibility of Sophie Kinsella. Apples Never Fall is the much anticipated novel by the author of Big Little Lies and Nine Perfect Strangers. The novel focuses on missing matriarch Joy Delaney, her four adult children, husband, and a mysterious houseguest.Books and media discussed:River Cafe Table 4, podcastTig and Cheryl: True Story, podcastWho is Maud Dixon? by Alexandra AndrewsApples Never Fall by Liane MoriartyStrangers on the Train by Patricia HighsmithStrangers on the Train, movie, directed by Alfred HitchcockThe Talented Mr. Ripley by Patricia HighsmithCasablanca, movie, directed by Michael CuritzRemember Me? Sophie KinsellaThe Plot by Jean Hanff Korelitz Amy reviewed The Plot by Jean Hanff Korelitz in Season 2, Episode 3. To Listen to that episode click here: The Plot and When The Stars Go DarkFollow Red Fern Book Review:Instagram: @redfernbookreviewFacebook: https://www.facebook.com/redfernbookreview/Newsletter: https://redfernwriting.com/newsletter
Im Einwanderungsgesetz (Naturalization Law) von 1790 wurde festgeschrieben, dass freie weiße Menschen in die Vereinigten Staaten einreisen dürfen und auch die Staatsbürgerschaft bekommen konnten. Doch das war nicht so inklusiv, wie es erscheinen mag auf den ersten Blick. Wer gilt wann als weiß und wer nicht? darüber sprechen wir in der Folge anhand der Migration in die USA. In der zweiten Hälfte des 19. Jahrhunderts kommen aufgrund von unterschiedlichen Geschehnisse auf dem europäischen Kontinent viele irische und Deutsche Migrant:innen. Konflikte aus der Metropole werden mit in die "neue Welt genommen". Und so wird versucht die Iren als nicht ganz so weiß und eine eigene "race" zu beschreiben: sie waren Kelten im Vergleich zu den Briten, die zu den Anglo-Sachsen gehörten. Als dann die aber Anfang des 20. Jahrhunderts viele Migrant:innen aus beispielsweise Osteuropa und Italien kamen hat sich die Stellung der Iren verändert. Hier wird dann versucht wissenschaftlich zu beweisen, dass diese neuen Migrant:innen einer anderen "race" angehören, was bestimmte Charakteristika implizierte. Die Stellung der irischen Immigrierten ändert sich. Diese wissenschaftlichen Abhandlungen werden dann immer mehr und daraus ergibt sich dann der wissenschaftliche Zwei der Eugenik. In den 1920er/1930er Jahren wird dann ein neuer Begriff für weiß eingeführt: Kaukasisch. Dieser soll wissenschaftlich fundierte Erkenntnisse suggerieren. Was dies genau beutetet erfahrt ihr in der Folge. Wer Gast sein möchte, Fragen oder Feedback hat, kann dieses gerne an firstname.lastname@example.org oder auf Twitter an @houseofModHist richten. Literatur: Bayor, Ronald H. (ed): Race and Ethnicity in America. A Concise History. New York: Columbia University Press, 2003. Bell, Duncan: Dreamworlds of Race: Empire and the Utopian Destiny of Anglo-America. Princeton: Princeton University Press, 2020. Boas, Franz: Race, Language, and Culture. 1910. Bolden, Tonya: Searching for Sarah Rector: The Richest Black Girl in America. Abrams, 2014. de Gobineau, Joseph Arthur: Versuch über die Ungleichheit der Menschenrassen. 1853-1855. Etzemüller, Thomas: Henning von Rittersdorf: Das Deutsche Schicksal. Erinnerung eines Rasseanthropologens. Bielefeld: transcript Verlag, 2021. Gardner, Martha Mabie: Working on White Womanhood: White Working Women in the San Francisco Anti-Chinese Movement, 1877-1890. Journal of Social History Vol 33 No 1, 1999, pp. 73-95. Gover, Angela R; Harper, Shannon B. & Langton, Lynn: Anti-Asian Hate Crime During the COVID-19 Pandemic: Exploring the Reproduction of Inequality. American Journal of Criminal Justice Vol 45, 2020, pp. 647-667. Jacobson, Matthew Frye: Lecture: Whiteness and the Normative American Citizen, 2014: https://youtu.be/r_WbWd4fw4g Jacobson, Matthew Frye: Whiteness of a different color: European immigrants and the alchemy of race Cambridge, Mass.: Harvard University Press, 1998. Jew, Victor: “Chinese Demons”: The Violent Articulation of Chinese Otherness and Interracial Sexuality in the U.S. Midwest, 1885-1889. Journal of Social History Vol 73, No 2, 2003, pp. 389-410. Lepore, Jill: These Truths. A History of the United States. New York & London: W. W. Norton & Company, 2019. Painter, Nell Irvin: The History of White People. New York, 2010. Ripley, Z. William: The Races of Europe. New York: D. Appleton and Co., 1899. Whitman, James Q.: Hitlers amerikanisches Vorbild: Wie die USA die Rassengesetze der Nationalsozialisten inspirierten. C. H. Beck, 2018.
Today, we return to the Minute Mysteries book by H. A. Ripley! We read three more puzzles - all about murder, kidnappings, and theft! I almost manage to figure out two of them, and then I finish triumphantly with the third!Check out my Etsy shop here: Etsy.com/shop/ellieannthings :)Remember, send book recommendations (or anything else) to Classicmysteriespod@gmail.comIf you ever feel like donating, you can do it either directly or by becoming a patron!Thank you so much for listening (and reading this description)Intro music:On Hold For You by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/6928-on-hold-for-youLicense: http://creativecommons.org/licenses/by/4.0/Outro music:Bossa Antigua by Kevin MacLeodLink: https://filmmusic.io/song/3454-bossa-antiguaLicense: http://creativecommons.org/licenses/by/4.0/Support the show (https://www.patreon.com/Classicmysteries)
Chris Chipman joins this episode we voyage into the dark years of Disney and come out the other side to discuss the 1979 science fiction/disaster film The Black Hole. Listen as we comment on how the movie merges the technology of contemporary science fiction flicks with the somber style and pace of older features, explore the strange religious and philosophical elements of the film's story, and imagine what would happen if Ripley were trapped aboard the Cygnus. Warning: Contains explicit language, spoilers, and Ernest Borgnine action figures. Our theme song is "Nostalgia TV" by Edward Jonathan Blakeley through Lynne Publishing.
We discussed: - Horrible teachers - No art is wrong - Art vocabulary - Selling art - Advertising your art - Career goals - Craft versus Art People + Places mentioned: - Pilchuck Glass School - https://www.pilchuck.org - Ripley's Believe It or Not! - https://www.ripleys.com - Corning Museum of Glass - https://home.cmog.org - Sam Maloof - https://www.sammaloofwoodworker.com https://www.carolmilne.com Audio engineering by Mickey at CushAudio Services Music by Peat Biby Supported in part by: EEA Grants from Iceland, Liechtenstein + Norway – https://eeagrants.org And we appreciate the assistance of our partners in this project: Hunt Kastner – https://huntkastner.com + Kunstsentrene i Norge – https://www.kunstsentrene.no
This week, we're up to something a bit different. We read from a book called Minute Mysteries by H. A. Ripley, filled with short logic and deduction puzzles! I fail miserably.Enjoy listening to challenging murder mystery puzzles, nitpicking the mistakes in an alibi, and needling out the truth from behind a false story! It's a ton of fun. You can find my Etsy shop here! I sell fun little 3D cross stitched earrings - a fun way to support the show.Remember, send book recommendations to Classicmysteriespod@gmail.comIf you ever feel like donating, you can do it either directly or by becoming a patron!Thank you so much for listening (and reading this description)Intro music:On Hold For You by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/6928-on-hold-for-youLicense: http://creativecommons.org/licenses/by/4.0/Outro music:Bossa Antigua by Kevin MacLeodLink: https://filmmusic.io/song/3454-bossa-antiguaLicense: http://creativecommons.org/licenses/by/4.0/Support the show (https://www.patreon.com/Classicmysteries)
Instead of looking back on the entire year of 2021 (because that might not be too fun), today we look back on the year through the books we read. Find out which we loved best, which surprised us, and which were not as good as we had hoped. PS Listen to this mini-episode to hear what Aurelio read this year. Katy's Books Great Circle by Maggie Shipstead The Lover by Marguerite Duras Cloud Cuckoo Land by Anthony Doerr The Cold Millions by Jess Walter Stoner by John Williams Tiffany's Books The Talented Mr. Ripley by Patricia Highsmith Strangers on a Train by Patricia Highsmith Mrs. Palfrey at the Claremont by Elizabeth Taylor D: A Tale of Two Worlds by Michel Faber The Awakening by Kate Chopin ------------------------------------- ADVERTISE WITH US: Reach expats, future expats, and travelers all over the world. Send us an email to get the conversation started. BECOME A PATRON: Pledge your monthly support of The Bittersweet Life and receive awesome prizes in return for your generosity! Visit our Patreon site to find out more. TIP YOUR PODCASTER: Say thanks with a one-time donation to the podcast hosts you know and love. Click here to send financial support via PayPal. (You can also find a Donate button on the desktop version of our website.) The show needs your support to continue. SUBSCRIBE: Subscribe to the podcast to make sure you never miss an episode. Click here to find us on a variety of podcast apps. WRITE A REVIEW: Leave us a rating and a written review on iTunes so more listeners can find us. JOIN THE CONVERSATION: If you have a question or a topic you want us to address, send us an email here. You can also connect to us through Twitter, Facebook, and Instagram. Tag #thebittersweetlife with your expat story for a chance to be featured! NEW TO THE SHOW? Don't be afraid to start with Episode 1: OUTSET BOOK: Want to read Tiffany's book, Midnight in the Piazza? Learn more here or order on Amazon. TOUR ROME: If you're traveling to Rome, don't miss the chance to tour the city with Tiffany as your guide!
Does having a bigger budget make a movie better? More importantly, does having a bigger budget make a movie gayer? In this episode, Deah and Merryana make a list of LGBT films with multi-million dollar budgets and investigate the hypothesis once posed by the great Freckle from 'The Gay and Wondrous Life of Caleb Gallo' - that sometimes things that are expensive are worse. Pre-order 'This All Come Back Now', the anthology Merryana is published in, here: https://www.uqp.com.au/books/this-all-come-back-now Please consider supporting GayV Club on Patreon: https://www.patreon.com/gayvclub Follow us on Twitter and Instagram for updates: https://twitter.com/gayv_club https://www.instagram.com/gayv_club/ Episodes with closed captions can be found on our YouTube: https://www.youtube.com/gayvclub Texts mentioned: Moonlight, Dallas Buyers Club, Portrait of the Lady on Fire, Bound, Colette, Capote, The Handmaiden, Pain and Glory, Carol, Frida, The Imitation Game, Brokeback Mountain (and The Wedding Banquet), The Favourite, The Danish Girl, Mulholland Drive, Love Simon, Milk, Green Book, Behind the Candelabra, The Hours, Battle of the Sexes, Atomic Blonde, The Birdcage, Power of the Dog, Rocketman, The Talented Mr. Ripley, Bruno, Bohemian Rhapsody, V For Vendetta, Deadpool, Interview With the Vampire, The Old Guard, Birds of Prey, The Girl With the Dragon Tattoo (2011), Deadpool 2, Cloud Atlas, Alexander, Troy, Eternals.
Ripley and Kenn invite comedian/drummer Mike Engle on the show to go full galaxy brain discussing blink-182's bridgiest (concept?) album yet! As a holiday boner, we listen to many boner tracks. Follow Mikey everywhere @engletr0n!
Friend, comrade, fellow podcaster, and University of Pennsylvania Ph.D. candidate Devin Daniels joins us to discuss Patricia Highsmith's The Talented Mr. Ripley (1955)! Devin is the co-host of You're Tall but I'm Standing in Front of You, and he's with us for a fun romp about an ordinary guy who likes maps and trips to Italy and is in no way weird or sinister. He is not a confidence man in any way and definitely doesn't kill people with ashtrays. We discuss gender construction, surveillance mechanisms, self-making, and queerness. We also consider the ethics of telling people about your European vacations and if you should ever do that. We read the Vintage edition. We mention it on the episode and recommend Erin Carlston's book Double Agents, which is about queer fiction and spying in 20th century literature. And we really really insist that you go check out the cluster of essays that Devin and Kimberly Andrews edited for Post45's Contemporaries series on Nic f*cking Cage. Find Devin on Twitter @stalecooper and You're Tall but I'm Standing in Front of You @youretallpod. Find us on Twitter, Instagram, and Facebook @betterreadpod, and email us nice things at email@example.com. Find Tristan on Twitter @tjschweiger, Katie @katiekrywo, and Megan @tuslersaurus.
It's the final DVGcember episode of the season and in the spirit of giving Casey and Dave have given Ben from The Toy Power Podcast the chance to be on a low quality podcast.Join the trio as they look back on the 1984 Comedy horror Gremlins.Ben talks about Gremlins being a lot of kids first horror film, Dave celebrates the strongest female character since Ripley and Sarah Connor and Casey wants to know why Judge Reinhold is here.Much less Fast times at Ridgemont High Phoebe Cates talk than you'd expect but Casey does reach into her Coles bag of tricks to gift us all a DVGcember gift!Listen to us on itunes, Spotify or wherever you get your podcasts.or direct download the mp3 from the link below:https://www.buzzsprout.com/186739/9746532-gremlins-aka-slippery-digits.mp3?download=trueCatch Ben's work here:https://omny.fm/shows/toy-power/playlists/podcasthttps://www.instagram.com/shredder1982/#davesvideograveyard #toypowerpodcast #bensachse #DVGCEMBER #gremlins #joedante #erotica
Booze as muse or a sure road to ruin? In this month's episode, William Palmer – author of In Love with Hell: Drink in the Lives and Work of Eleven Writers – and Henry Jeffreys – author of Empire of Booze and The Cocktail Dictionary – join the Slightly Foxed team to mull over why alcohol is such an enduring feature in literature. From the omnipresence of cocktails in John Cheever's short stories and ritual aperitifs in Patricia Highsmith's Ripley novels to Mr Picksniff falling into Mrs Todger's fireplace in Martin Chuzzlewit and P. G. Wodehouse's hangover remedies for booze-soaked Bertie Wooster, drinks are social signifiers in fiction. Charles Dickens was fond of sherry cobblers and Jean Rhys knocked back Pernod in Paris, while Malcolm Lowry was a dipsomaniac and Flann O'Brien dreamed up alcoholic ink for the Irish Times, rendering readers drunk from fumes. We ask why gin denotes despair and port is always jovial, and question whether hitting the bottle helps or hinders the creative process in writers. Following a convivial sherry, we're whisked away on a wet-your-whistle-stop tour of drinking dens with our friends at London Literary Tours, barrelling from bars propped up by Oscar Wilde to the follies of Dylan Thomas at Soho's French House via Ian Fleming's Vesper cocktail at Dukes. And we finish with a final round of reading recommendations, visiting a whisky distillery in Pakistan in Lawrence Osbourne's The Wet and the Dry, enjoying Happy Hour with Marlowe Granados and stopping for a nightcap at Kingsley Amis's ghostly local The Green Man. (Episode duration: 41 minutes; 16 seconds) Books Mentioned We may be able to get hold of second-hand copies of the out-of-print titles listed below. Please get in touch with Jess in the Slightly Foxed office for more information. Anne Fadiman, The Wine Lover's Daughter, Slightly Foxed Edition No. 57 (1:39) William Palmer, In Love with Hell: Drink in the Lives and Work of Eleven Writers (2:24) Henry Jeffreys, Empire of Booze (2:33) Henry Jeffreys, The Cocktail Dictionary Dylan Thomas, Portrait of the Artist as a Young Dog (3:41) Kingsley Amis, Everyday Drinking (4:45) Flann O'Brien, At Swim-Two-Birds and The Third Policeman (6:40) Jean Rhys, Wide Sargasso Sea (11:16) Jean Rhys, Good Morning, Midnight (11:49) Patricia Highsmith, The Talented Mr Ripley (12:17) Patricia Highsmith, Diaries and Notebooks Raymond Carver, What We Talk About When We Talk About Love (14:54) Edward St Aubyn, The Patrick Melrose Novels (17:03) Douglas Stuart, Shuggie Bain (19:01) Charles Dickens, Martin Chuzzlewit (20:42) John Cheever, Collected Stories (23:26) Jeremy Lewis, Kindred Spirits (26:05) Ladybird Books: What to Look For in . . . Spring, Summer, Autumn and Winter (33:05) Kingsley Amis, The Green Man (35:13) Lawrence Osbourne, The Wet and the Dry (36:45) Marlowe Granados, Happy Hour (38:27) Related Slightly Foxed Articles The Smoking Bishop, William Palmer on drinking and drunkenness in Dickens, Issue 16 (8:52) On the Randy Again, William Palmer on Dylan Thomas, Portrait of the Artist as a Young Dog, Issue 30 (3:41) Cheers!, Henry Jeffreys on Bernard DeVoto, The Hour & Kingsley Amis, Everyday Drinking, Issue 68 (4:45) A Quare One, Patrick Welland on the novels of Flann O'Brien, Issue 41 (6:40) Voyage in the Dark, Patricia Cleveland-Peck on the novels of Jean Rhys, Issue 4 (10:22) With a Notebook and a Ukelele, Gordon Bowker on the stories of Malcolm Lowry, Issue 37 (19:46) A Visit from God, William Palmer on Kingsley Amis, The Green Man, Issue 20 (35:09) Other Links London Literary Tours (28.00) Opening music: Preludio from Violin Partita No.3 in E Major by Bach The Slightly Foxed Podcast is hosted by Philippa Lamb and produced by Podcastable
Listen and subscribe at www.JustProWrestlingNews.com I'm Matt Carlins and this is JUST Pro Wrestling News for Tuesday, December 14, 2021. People across the world of pro wrestling are mourning the death of Jimmy Rave. He was a steady presence on the U.S. independent scene for nearly two decades…and had memorable runs in Ring Of Honor and TNA. Rave struggled with drug addiction. His health took a dramatic downturn just over a year ago when an infection led to the amputation of his left arm…and in October, BOTH of his legs. He leaves behind two children. Jimmy Rave was 39. (STINGER: WWE) The WWE Championship match at the Day 1 pay-per-view is now a 4-Way: Big E defending against Seth Rollins, Kevin Owens…and Bobby Lashley. Lashley earned his way into the match by beating all three of his Day 1 opponents in separate matches on last night's Raw. There were plenty of shady circumstances involving all three wins, but hey…he got them. Another match added to Day 1. Liv Morgan will get another shot at Becky Lynch and the Raw Women's Championship. Lynch attacked Morgan last night, crushing her arm between the ring steps and ring post. Also last night…Otis pinned one-half of the Raw Tag Champs Riddle. One-half of the women's tag champs Queen Zelina pinned Rhea Ripley with a rollup in less than a minute after Ripley got distracted by Nikki ASH getting superkicked by Carmella. Bianca Belair pinned Doudrop with a 450 splash. But Doudrop laid out Belair after the match. Dolph Ziggler & Robert Roode beat United States Champion Damian Priest & Finn Balor. Ziggler pinned Balor with the ZigZag after Balor got distracted by Austin Theory taking a selfie on the ring apron. The RK-Bro-nament final did NOT happen last night. That was to pit the Street Profits against Rey & Dominik Mysterio. But WWE announced there are injuries on BOTH teams…and the match is now pushed back until December 27th. During a Twitch stream Monday night, Matt Hardy said WWE may have “jumped the gun” when it released Jeff Hardy after he walked out on a house show match in Texas earlier this month. Matt Hardy confirmed Jeff was released after he refused to go to rehab. Matt openly speculated that the results of Jeff's drug test following the incident will come back clean. (STINGER: AEW) Ring Of Honor Pure Champion Josh Woods is on tonight's AEW Dark. He'll face Shawn Spears. We'll finally see Mei Suruga in action inside an AEW ring. She and Emi Sakura take on Riho & Ryo Mizunami. Marina Shafir makes her AEW debut against Kris Statlander. Plus, Chuck Taylor vs. Ryan Nemeth…and Daniel Garcia and 2point vs. Dark Order's Evil Uno, Colt Cabana & Alex Reynolds. On last night's Dark: Elevation…Tony Nese beat Alex Reynolds. Tonight's NWA Powerrr has…The Hex defending the NWA Women's Tag Titles against Mickie James & Kiera Hogan. Plus, Dirty Dango & JTG vs. Aron Stevens & Kratos.. (STINGER: ROH) Ring Of Honor's Final Battle got the bulk of the attention - but there was also an episode of ROH TV over the weekend. Sledge beat PCO in a Falls Count Anywhere Match…EC3 beat Eli Isom…and Miranda Alize beat Chelsea Green after a distraction by The Allure. (STINGER: New Japan) New Japan holds its finals in the World Tag League and Best Of The Super Juniors tournaments on Wednesday. But it's all overshadowed by Katsuyori Shibata's promise to make a major announcement on the show. The Best Of The Super Juniors final has Hiromu Takahashi vs. YOH. Hirooki Goto & YOSHI-HASHI face EVIL & Yujiro Takahashi in the World Tag League final. IWGP World Heavyweight Champ Shingo Takagi…and Kazuchika Okada will be back in action Wednesday…on opposite sides of an undercard tag match. That's JUST Pro Wrestling News for Tuesday, December 14. Our next update comes your way tomorrow morning, so be sure to subscribe to this feed. We also thank you in advance for leaving a glowing rating or review.. I'm Matt Carlins. Thank YOU for listening. ~~~Full run down at www.justprowrestlingnews.com ~~~ • • • • • wwe #wrestling #prowrestling #smackdown #wwenetwork #wweraw #romanreigns #ajstyles #NXT #raw #njpw #wwenxt #SethRollins #TNA #johncena #RandyOrton #wrestlemania #ROH #WWF #summerslam #tripleh #aewdynamite #professionalwrestling #aew #allelitewrestling #aewontnt #DeanAmbrose #nxt #KevinOwens #wwesmackdown
o good to be back this week, with our last Top 5 episode of 2021! As we celebrate the upcoming release of Guillermo Del Toro's upcoming adaptation of Nightmare Alley, we couldn't help but reflect on our favorite movie con artists. Fair warning, we had some pent up energy from missing each other the last few weeks, so please excuse the chaos (or at least we'll use that as an excuse). Audience Top 5 1. The Lady Eve 2. Paper Moon 3. The Talented Mr. Ripley 4. The Producers | The Sting 5. Catch Me If You Can | Parasite This week's winner - Rioghnach! ***************************************************************** Love the Podcast? Leave us a review! Other places to follow Alternate Ending. Facebook | Instagram | YouTube | Twitter Tim Letterboxd – Rob Letterboxd – Carrie Letterboxd Want to support Alternate Ending, you can via our Patreon page!
Our favorite episode of the year, full of our favorite books of the year. Happy Holidays from your friends at Well-Read! Books and other media mentioned in this episode: Ann's picks: The Chicken Sisters by KJ Dell'Antonia (buy from Bookshop) The Girl with Stars in Her Eyes by Xio Axelrod (buy from Bookshop) This Thing Between Us by Gus Moreno (buy from Bookshop) Cloud Cuckoo Land by Anthony Doerr (buy from Bookshop) A Thousand Ships by Natalie Haynes (buy from Bookshop) Horseman by Christina Henry (buy from Bookshop) - The Legend of Sleepy Hollow by Washington Irving (buy from Bookshop) The House of Mirth by Edith Wharton (buy from Bookshop) Moonflower Murders by Anthony Horowitz (buy from Bookshop) - Magpie Murders by Anthony Horowitz (buy from Bookshop) Mrs. March by Virginia Feito (buy from Bookshop) - Patricia Highsmith books Firekeeper's Daughter by Angeline Boulley (buy from Bookshop) - Reese's Book Club Halle's picks: The Space Between Worlds by Micaiah Johnson (buy from Bookshop) Early Morning Riser by Katherine Heiny (buy from Bookshop) Arsenic & Adobo by Mia P. Manansala (buy from Bookshop) - Tana French books - Louise Penny books Rosaline Palmer Takes the Cake by Alexis Hall (buy from Bookshop) - The Great British Baking Show (TV) - The Charm Offensive by Alison Cochrun (buy from Bookshop) - Battle Royal by Lucy Parker (buy from Bookshop) - One to Watch by Kate Stayman-London (buy from Bookshop) The Push by Ashley Audrain (buy from Bookshop) - Gone Girl by Gillian Flynn (buy from Bookshop) - Take It Back by Kia Abdullah (buy from Bookshop) The Rose Code by Kate Quinn (buy from Bookshop) - Code Name Hélène by Ariel Lawhon (buy from Bookshop) The Guncle by Steven Rowley (buy from Bookshop) - The House in the Cerulean Sea by TJ Klune (buy from Bookshop) The Sweetness of Water by Nathan Harris (buy from Bookshop) Sorrow and Bliss by Meg Mason (buy from Bookshop) - Fleabag (TV) - Eleanor Oliphant Is Completely Fine by Gail Honeyman (buy from Bookshop) The Paper Palace by Miranda Cowley Heller (buy from Bookshop) What We're Reading This Week: Ann: Who Is Maud Dixon? by Alexandra Andrews (buy from Bookshop) - Elena Ferrante books - The Talented Mr. Ripley by Patricia Highsmith (buy from Bookshop) Halle: The Last House on Needless Street by Catriona Ward (buy from Bookshop)
We're talking basketball. Vince Riffe is coaching freshman hoops at Ripley along with his sons, and former Viking players, Elijah and Isaiah. Jamison Hunt's collegiate career came to an abrupt ending as Ohio Valley University closed at semester's end. He'll be joining the Viking basketball coaching staff. Junior guard McKennan Hall and her Lady Viking teammates are off to an impressive start. After a long tenure at WVU, Stephanie Swisher White has accepted a new role with the athletic department at East Carolina University. --- Support this podcast: https://anchor.fm/brian-johnson9/support
Bionic Animals Twenty-years ago, if an animal lost a limb, they might be considered for euthanasia. Not anymore. With the advent of 3D printing, doctors are able to create appendages, from legs to tails. Nancy Furstinger went deep undercover to see who is making these prosthetics, what animals are wearing them, and who is buying them. She says these animals seldom notice the handicap and are mostly Unstoppable. Listen Now Starting A Rescue More people are quitting their job to open animal rescues. This may seem pretty straightforward from the outside, but there is a maze of laws and hoops to jump through to avoid being shut down by Johnny Law. Sandra Pfau England has created the long-awaited step-by-step guide to starting a pet rescue and she'll share some of her finest tips on this week's show. Listen Now Pet Care Innovation Awards The five finalists for this year's Pet Care Innovation Awards have been announced. They include the Fetch My Pet Life Management app; Animal Biome, a micro biome-based pet health diagnostics and supplement company; Bare it All, a pet food company that uses the invasive Asian carp as a primary protein source; Barkly a personalized dog walking app; and Pup Joy, makers of the customizable subscription box for dogs. More than 85 companies from 9 countries applied for this year's honor. Animal Radio News Director Lori Brooks reports. Listen Now Believe It Or Not Edward Meyer of Ripley's is back with his yearly round-up of strange and unusual animals. Topping the list is a dog with two noses, conjoined fish, and a bird that wears flip-flops. We'll have giveaways of this year's incredible coffee table book, Shatter Your Senses. Listen Now Holiday Hazards Animal Radio's Pet World Insider Robert Semrow counts down the top 5 Holiday Traditions That Can Land You and Your Pets on the Naughty List. Don't be one of the thousands that find themselves in the Veterinary office over the holidays. Listen Now Read more about this week's show.
This past week, Michael was invited to guest on Episode 7 of the Disputed Podcast where he fought on behalf of Sarah Connor against Ryan Placchetti of the Don't Wreck Yourself Podcast, who (wrongly) believes that Ellen Ripley (of Alien fame) would be the better protector. As Michael and Ryan debate to the death (with Tanner faithfully in the live comments section), fans get to vote for who they believe to be the better protector. Check out the Disputed Podcast's episode “Sarah Connor vs Ellen Ripley” below and VOTE HERE for the best Terminator killer you know!
Kyle and Jheisson begin their Wiki journey at the Centennial Light Bulb which has been glowing for over 100 years! Can you believe it? From there they learn about the long history of Ripley's Believe It or Not, fanboy out about Tea Leoni, and study the Hollywood elite before throwing themselves across Wikipedia to the game of dodgeball!Follow Wiki U on Instagram @wikiuniversity
There were many shows during the Golden Age of Radio that featured animal "stars" because they did not have to be in the studio. The sound effects man would create the voice of the dog, cat, or horse and do it on cue. The listening audience would never know the difference. Rin Tin Tin on the radio was played by a sound effects tech, but in the movies he was actually a dog found on a WW I battlefield who went on to star in several Warner Bros. movies. After the original German Shepard passed on, the name was given to a number of replacements. The series began in 1930.... but this recording is from the Mutual Broadcasting System Jan 2, 1955 to Dec. 25, 1955 run of 30 min programs at 5 pm on Sunday afternoons. Lee Aaker plays Rusty, Mames Brown as Lt. Ripley "Rip" Masters and Joe Sawyer played Sgt. Biff O'Hara... part of the 101st Cavalry. By the way the original 1930 series was entitled "The Wonder Dog" and Don Ameche starred in that series that ran until 1934... on CBS. This track will be living in the Playlist "Westerns"
In this episode, Elaine welcomes actress, Tracy Pendergast to the show and introduces her to the magic of Zak Bagans and Ghost Adventures. Elaine powers through Zak sharting all over the Shanghai tunnels while Tracy watches Bagans violate the Ripley's Believe or Not Museum.
The boys discuss Paul's inability to make it into their elementary school's gifted program, their scheme to sponsor papa Perez's soccer team, and the prospect of Bill Burr hosting the new Ripley's believe or not reboot. The gang then tackles questions about bitcoin and crypto MLMs before Paul quizzes Adrian on the selling prices of NFTs. Dear Rabbi: https://jewishstandard.timesofisrael.com/your-talmudic-advice-column-12/ Market Watch: https://www.google.com/amp/s/www.marketwatch.com/amp/story/my-father-coerced-me-into-giving-him-100k-for-a-lucrative-cryptocurrency-multi-level-marketing-scheme-i-trusted-him-to-act-in-my-best-interests-11633704020 NFT QUIZ: https://forms.gle/GSFymvbCDvpP6C4P7
Welcome to another episode of Spooky Gay Bullsh!t, our new weekly hangout where we break down all of the hot topics from the world of the weird, the scary, and issues that affect the LGBTQIA2+ community! This week, we cover: a ghost marriage leads to theft at a funeral home, potty-mouthed parrots, Ripley's wants your hair to beat a world record with, Google pays tribute to the queer community by committing bi erasure, and a grave statue gets reacquainted with its head after two long decades. See you next Friday for more Spooky Gay Bullsh!t! Join the Secret Society That Doesn't Suck for exclusive weekly mini episodes, livestreams, and a whole lot more! patreon.com/thatsspooky Get into our new apparel store and the rest of our merch! thatsspooky.com/store Check out our website for show notes, photos, and more at thatsspooky.com Follow us on Instagram for photos from today's episode and all the memes @thatsspookypod We're on Twitter! Follow us at @thatsspookypod Don't forget to send your spooky gay B.S. to firstname.lastname@example.org
“The Talented Mr. Ripley” and “Strangers on a Train” are just two of the classic works of fiction by Fort Worth-born author Patricia Highsmith – a writer of mysteries who was a mystery herself. Anna von Planta was Highsmith's primary editor for the later part of her life, and she joins guest host John McCaa to discuss Highsmith's literary legacy, as well as her private life, which was often marked by controversy. Von Planta is the author of “Patricia Highsmith: Her Diaries and Notebooks: 1941-1995.”
Lya Badgley has led a fascinating life, and talking to her about the role books have played in her life was a fantastic conversation. She introduced me to the atmospheric thrillers of Lawrence Osborne, who we'll be hearing a lot more from in the near future – all of his books have been optioned for movies. Lya and I also discussed writers who communicate an immersive sense of place, her life as a rock star, and how she hung on to her humanity while documenting some of the worst atrocities humans have ever committed. Support the Best Book Ever Podcast on Patreon Follow the Best Book Ever Podcast on Instagram or on the Best Book Ever Website Host: Julie Strauss Website/Instagram Guest: Lya Badgely Website/Instagram/Facebook Do you have a book you want to tell me about? Go HERE to apply to be a guest on the Best Book Ever Podcast. Discussed in this episode: Hunters in the Dark by Lawrence Osborne The Foreigner's Confession by Lya Badgely (releases Feb 1, 2022; available for pre-order now) From the Mixed-Up Files of Mrs. Basil E. Frankweiler by E.L. Konigsburg (Has anyone else noticed how often my guests refer to this book? It's one of my all-time favorites, too!) The Talented Mr. Ripley by Patricia Highsmith The Wet and the Dry: A Drinker's Journey by Lawrence Osborne In the Shadow of the Banyan: A Novel by Vaddey Ratner The Other Black Girl by Zakiya Dalila Harris Discussed in the Patreon Exclusive Clip Cambodian Amok The Cambodian Community in Long Beach, California (Note: Some of the above links are affiliate links, meaning I get a few bucks off your purchase at no extra expense to you. Anytime you shop for books, you can use my affiliate link on Bookshop, which also supports Indie Bookstores around the country. If you're shopping for everything else – clothes, office supplies, gluten-free pasta, couches – you can use my affiliate link for Amazon. Thank you for helping to keep the Best Book Ever Podcast in business!)
With the new millennium, John Malkovich only became more prolific and hence better known. His first role in the 2000s was as a psychotic version of the German Expressionist director F. W. Murnau opposite Willem Dafoe's Max Shreck in Shadow of the Vampire. Another iconic albeit fictional character followed with his take on Patricia Highsmith's Tom Ripley in Ripley's Game. In 2008, he was part of an ensemble of idiots in the Coen Brothers' Burn After Reading. In the same year, he collaborated with Clint Eastwood for a second time in Changeling. In the 2010s, Malkovich took a wide variety of supporting turns in films such as Warm Bodies, Deepwater Horizon, Mile 22 and Velvet Buzzsaw. He shows no signs of slowing down with roughly 10 projects due for release. Sign up to HeadStuff+ at headstuffpodcasts.com for the small price of €5 a month to unlock exclusive bonus episodes of I Know That Face. Andrew Twitter: @Andrew_Carroll0 Stephen Twitter: @StephenPorzio Editor and Community Manager: Charline Fernandez Instagram: @charline_frnndz I Know That Face Twitter: @IKnowThatFaceP1 / Instagram: @iknowthatface / Facebook: @iknowthatfacepod Intro and Outro Music: No Boundaries (motorik groove) by Keshco. Licence Featured Image Credit
The MHSAA football playoffs continued for Classes 2A/3A/4A last week and got started for 1A/5A/6A. In a 4A game, Itawamba AHS pulled away in the second half for a 30-9 win over Ripley (1:10). In 1A, Drew and Dylan Rowsey rallied Biggersville past South Delta (3:40). East Webster won another close one over East Union...
This week's podcast, sponsored by NewLeaf Symbiotics, features Liz Ripley, Cover Crop Specialist with Iowa State University. Ripley will discuss how cover crops reduce nitrate losses from corn and soybean fields, cover crops and the 4Rs of nitrogen management, how growers determine the correct type of fertilizer to use, and more.
Is Your Firewall Actually Protecting You? What Should You Be Doing? New stats are out this week. So what's the number one vector of attack against us? Our Firewalls. And they're failing. So, what's going on. And what can you do about it? [Automated transcript follows] [00:00:16] And of course, I'm always talking about cyber security, because if you ask me that is one of the biggest problems we have in business. [00:00:27] Today. Well, yeah, you got to find employees. In fact, uh, it's almost impossible to find them in the cyber security space as well. And it's been hard for years. So I try to keep you up-to-date here. We've got boot camps that are coming up and you are really going to like them. We've been working on some supplemental materials for it. [00:00:47] And of course these boot camps are always free, so you can join it. You can have your friends come and learn the. Basics. It's not one of these high sell things. Right. I, I got a little letter in the mail this week saying, Hey, you can come and get a free steak dinner. And of course it's kind of like a timeshare, right? [00:01:09] Jay, you have to listen to the pitch. Yes. Stay over. On us. And you are going to be sitting there for four hours listening to this crazy pitch that's going on. That's not what my bootcamps are. Anybody that's been to. One of them will tell you we work on it. I explain it. You know what you have to do, how you have to do it, the wise, the winds, the wherefores. [00:01:35] So if you would like to learn more for yourself, Make sure you sign up Craig peterson.com sign up for my newsletter. And when a bootcamp is coming up, I will be sure to tell you about it in the newsletter so that you can attend. And it's important to, to understand that this is yeah. Aimed at business, the, these boot camps, but almost everything businesses have to do or shouldn't be doing the same thing applies to you in your. [00:02:08] So, if you are a small business person, if you're someone who has some it experience, and you've been assigned to worry about cyber security, this is for you. If you are a very small business and you're kind of the Jack of all trades, and you've got to worry about cybersecurity, this is for you. And I just got. [00:02:31] This week from someone on my email list who is retired and she was talking about her husband and her, they don't have any kids, no errors. They're trying to protect their financial investments. And of course I responded saying, Hey, I'm not a financial investment advisor, but I can certainly give you some cyber security input, which I did. [00:02:53] And you can ask your questions as well. I'm more than glad to hear them. And you probably, if you've sent them in, you know, I always answer them now. My big man, a few days might take me a week, but I will get around to it. And I try and respond to the emails. Sometimes I answered here on the radio show or on my podcast, but usually it's via email me. [00:03:17] At Craig peterson.com. And of course, that's also on my website, Craig peterson.com. And that's also my name Craig Peters on.com. So let's get into the firewall thing. When you have a network, you are connecting that network to your computers, maybe. To your security cameras, to your printers that you have, maybe there's a lock system. [00:03:44] Maybe there's more, all of this stuff is interconnected and it's all rather well and good. You can have a whole lot of fun with it, but it is not as particularly good if you can't get out to the internet. So what do we do? We hook our network, whether it's home or if it's business to the internet. Now, you know, all of this stuff so far, right? [00:04:06] You're following me. The internet is actually inter connected networks. In case you didn't know, there are now millions of networks that are connected on the internet. There are core networks out there. We were my company like number 10,000. I think it was, uh, a S an R a S number autonomous system. So we were fairly early on. [00:04:32] And of course, as you know, I've been on the internet in various forums since the early 1980s and helping to develop the protocols, but it is important to remember it is an interconnected network of networks. You might ask why? Well, the bottom line is you aren't connecting your network with other networks that have malicious software on them. [00:04:58] Maybe they're just poorly configured. Maybe they're causing a denial of service attack effectively because there's so badly configured. But whatever the case may be, you are still exposed. If you look at the traffic that's coming to your router. So your router is sitting at the edge of your network connected to your internet service provider. [00:05:19] So it might be Comcast or Verizon or a whole slew of others. But your network is connected via a router. Then the router knows how do I get my data from the input to the output or from the output to the input, if you will upstream and downstream data, that's what the router is for. And if you look at the data on your router and most of us can't, but if you were able to, what you will see is hundreds of thousands of internet packets coming to, and from your. [00:05:55] Router your endpoint every day. Usually these are bad guys doing what are called scans. They do port scans. They're primarily looking for services. So what do you, do you have a firewall now in many cases, you'll get a device from your Janette service provider that has a router built in and has a firewall built in, and it has wifi. [00:06:19] All of this stuff, all built in together makes life all nice and warm and fuzzy and Catalina, doesn't it. But in reality, it's not necessarily a good thing to have it all in one, because you're definitely not going to get the best of breed and router or firewall or wifi, but that's a different story. What is that firewall for that router? [00:06:41] Of course, it's getting all this internet traffic and anything that's on the internet that is. I'm trying to get to you is going to go through the. And anything that you are trying to send up to the internet, like for instance, to try and get a web page or something is also going to go up through that router. [00:07:02] So how do you protect yourself time? Was that there wasn't really much of a way to protect yourself. And frankly, there weren't a lot of reasons. To try and protect yourself. And the internet was just this wonderful open thing, lots of fun and played around a lot. Back in the early nineties, it was, it was just a joy in the late eighties to, to be connected up to the internet and then bad guys started doing bad things. [00:07:30] We took the concept of what you have in an automobile and applied it to the. If you're driving your car, your in the passenger compartment and that passenger compartment is hopefully warm in the winter and cool in the summertime. And you are protected from that big mean nasty engine that's in front of you, or if you're driving an electric car from those mean nasty batteries that are probably below you in that car and what's between you and the. [00:08:04] Of course a firewall. And the idea is to keep the nastiness of that engine, all of the heat, the oil, the grime, the wind, everything else is associated with that engine. Keep that away from you so that you can now drive that car just comfortably in that controlled climate of the passenger compartment, that concept was then applied to the inter. [00:08:30] And in fact, I designed and implemented one of the first firewalls ever made way back when and the firewall in the internet Partland is very similar to the car in the car. You have some protrusions through that fire. Don't you, you you've got a steering wheel. How does that get up to the front of the car? [00:08:53] Well, it goes through the firewall and around that steering wheel, of course there's some EBDM, some rubber type stuff that helps stop anything from coming through right next to that steering column. Same, thing's true with the brake pedal and the gas pedal. At least it used to be. Nowadays, it's so much of this as drive by wire, that the only thing going through the firewall is a wire and there's no mechanical linkage. [00:09:24] Unlike my car, which is a 1980 Mercedes-Benz diesel. Where yes, indeed. Direct linkages to everything. So the firewall in the cars protecting you from the nastiness in the engine compartment and the firewall, when it comes to your internet is doing something very similar. Think about your house for a minute, you have a house with doors and windows. [00:09:53] I would hope. And a chimney and maybe a couple of other protrusions that are going outside of the house. Well, you have some similar problems and when it comes to the internet and when it comes to the firewall, With your house, sir. Sure. You could post a guard out front, a whole series of them. You've got a dozen guards out front and they are all guarding that front door. [00:10:19] But if no, one's watching the back door, if no one's paying attention to the windows, there's still ways for the bad guys to get in. And that's what we're going to talk about. How does the internet firewall tie into this analogy of cars and the analogy of your home? Because it's a very important point when you get right down to it. [00:10:44] We need to understand this because the number one tactic reported this week by MITRE and Cisco is exploitation of public facing application. So I'm going to explain what that is. What's your firewall can do for you and what you should do for your firewall. A stick around. We've got a lot more coming up. [00:11:09] I want to invite you to go. Of course, right now, online to Craig peterson.com. Once you're there, just sign up for mind's newsletter. Simple Craig peterson.com. [00:11:25] This week, we found out what the top five tactics are that are most frequently being used by bad guys to attack us. This is done by MITRE and Cisco systems. Number one, public facing applications. What does that mean? [00:11:42] We've been talking about this report, but really what we've been delving into is how data flows on your network, whether it's a home network or maybe it's a business network, how does this whole mess work? [00:11:58] And when miters talks about the biggest problem here, 91% of the time being what's called an exploit of a public facing application, what does that mean? We went through the basics of a firewall and a router. So all of the data coming from the internet, coming into the router, then handed to the firewall. [00:12:24] Any data going out, goes into the firewall. And then the. So that's the pretty simplistic version. And of course the firewall on your network does a similar thing to the firewall in your car. It stops the bad stuff, at least it's supposed to, but your home and your car both have different ways of getting. [00:12:48] Past the firewall in the house. It's your doors and your windows in the car. Of course, it's where the steering column goes through where the brake pedal and the gas pedal go through the clutch, all of that stuff that perch, um, permeates, it goes through. That firewall. And of course, you've probably, if you're been around for awhile, you've had leaks coming through your firewall and, uh, you know, how poorest they can be sometimes. [00:13:18] Well, we have the same type of thing on our internet firewalls. Every home has doors and what we call the doors in on the internet is similar to what they call them. On the, in the Navy, on the water, the reports. So think about a porthole in a boat, or think about a, a door, a port, which is the French word for door. [00:13:45] What happens on the internet? For instance, if you're trying to connect to Craig peterson.com, you are going to connect to a specific port on my server. So the address typically, uh, is going to be resolved by DNS. And then once it gets to the server, you can connect to port 4 43. You might try and connect to port 80, but I'll do a redirect, but that's neither here nor there. [00:14:12] So you're going to connect to that port four 40. So my firewall has to say, Hey, if somebody is coming in and wants to get to port 4 43, which is called a well-known port, that's the port that all web server. Listen on. So if someone's trying to get to my port, my web server on port 4 43, let them in. But if someone's trying to get to another port, don't let them in. [00:14:48] Now there's multiple ways to respond or not respond. I can talk about that right now. That'd be for deep dive workshop, but the idea is. Each application that you are connecting to, or that your providing has. Part of the problem that we've been seen. And this is a very big problem is that people are not changing the administrative passwords on their machines. [00:15:20] So administrative passwords mean things like admin for the username and admin for the password on your firewall. So. Your firewall, if you have what's called when admin enabled, what that means is someone on the wide area network. In other words, The internet, someone on the internet or on the, when can connect to your firewall and control it. [00:15:51] This is, as you can imagine, a very big thing, and it is something that we cover in one of our workshops, explained it all and all of the details and what to do, but most businesses and most people have not properly configured their firewalls. When we're talking about number one, problem, 91% of the time being an exploit against public facing applications. [00:16:18] What that means is they could very well just be trying to connect to the administrative interface on your firewall. Unfortunately, they will often offer. Change the software on your firewall. So they won't just reconfigure. They'll just change it entirely. And they'll do all kinds of evil things. Again, we're not going to get into all of that and what to look for and what can happen. [00:16:44] But number one thing everybody's got to do, and I saw some stats this week as well, that made me want to bring the. Most people and most businesses about two thirds have not changed the default passwords on the hardware that they have. Now it can understand sometimes the kids confusing. No question about. [00:17:07] But if you don't change the password on something that's public facing, in other words, something that can be reached from the internet or again, the wide area network. I know there's a lot of terms for this, but something that someone else can get at from outside your network. And it's the default password like admin admin, you could be in a whole lot of. [00:17:35] So check that right now, please double check that triple check that because even if you have a router from a big internet service provider, again, like the Comcast Verizon's, et cetera of the world, they will almost always have it set up. So you can change that administrative password and Jewish. Now I, again, for clients, I have some different advice than I have for, for just regular users, but make sure you change that. [00:18:09] And here's the second part of the problem. What happens if you have a business and let's say you're not hosting your own website, like I've been doing for a couple of decades and how three 30 years, I guess now. Um, and so you've got your website hosted at some. Web height site, hosting place, you know, Gator or one eye and one eye and one or GoDaddy or whatever. [00:18:35] Okay. So, okay. That's fine. So let's not inside our network. Uh, w we don't worry about the security because that's the vendor's problem. Now we're talking about, okay, what happens. My users who need to work from home. This gets to be a very big problem for so many people, because work from home is important. [00:19:00] So what are you going to do? Well, basically in most cases, unfortunately, businesses are just exposing an application to the internet. So they might, they might. Terribly configured networks, where there is a direct connection that goes right to the files. So you connect to a port on their firewall and it immediately redirects it internally. [00:19:30] Remaps it to the file server. And some people are really, really clever. Alright. Or so they think, because what they'll do is they'll say, okay, well, you know, that, that normal port number. Okay. So I'm going to move. Port number. So you're going to connect to port 17, 17 on my firewall, and it's going to connect you to the file share on my file server so that people from home can just connect to port 17, 17, and ta-da, there are all the files and yeah, we're, we're using passwords, so it'll be okay. [00:20:06] It'll be fine. Um, but, uh, guess what it isn't for a few. Different reasons are we're going to be talking about those here in just a minute. Yeah, I want to encourage you right now. Take a minute. Go online. Craig peterson.com. You'll find lots of information there. I've got 3,500 articles, all searchable, Craig peterson.com. [00:20:32] But more importantly, make sure you sign up for my newsletter. Craig peterson.com/subscribe. So that you can keep up to date on everything that is important in all of our lives. [00:20:51] We're talking about firewalls at home at the office, what it means to have public facing services, really applications, people working from home. How can you make it easy for them and hard for the bad guy? [00:21:15] Many businesses had to quickly change the way their computers were set up because of course the lockdown and people working from home. [00:21:26] And, um, unfortunately. Many mistakes were made. And some of this, in fact, I'm going to talk a lot of this problem up to these managed services providers break, fix shops. My, my fellow information technology contractors, if you will, because they didn't know any. Most of these people have been computer people, their whole lives, right. [00:21:55] They played with PCs when they were young and they might've taken a course or two and wow. MCSC certified. Believe me, this is not something that a straight up MCSC or. And frankly, most of the it certifications can really understand or really handle the cybersecurity can be done, but there's so many things they overlook just like what I was just talking about, exposing a file server directly to the internet. [00:22:29] I mentioned, okay. While they thought it was going to be safe because there's a username and password, but there's a couple of huge problems here. Problem. Number one. When you're exposing a service to the internet, like for instance, the files server, you are exposing software that may have exploitable, but. [00:22:54] And again, going back to those stats from earlier this week, more than half of all of the systems that are out there are not patched to date. It's so bad that president Biden just ordered the federal government agencies to apply patches some as old as three years. So what happens now? Well, the bad guy scan, and guess what they found. [00:23:23] Port that you thought was just so clever because it wasn't the standard port number for that service. Maybe it's SMB or CIFS or something else. And, uh, they found it because they scan, they look, they see what the response is that tells them what type of a server sitting there. And then they try, well, let me see. [00:23:45] There's the zero day exploits, but why bother with those? Let's just start with the good old standard ones. And unfortunately, because so many machines are not patched up at all, let alone properly patched up. You, they end up getting into the machine. It's really that simple, just because it's not patched up. [00:24:08] How does that sound? Huh? Yeah, it's just plain, not patched up. It's not available for anyone to be able to use anybody to be able to access. Right. It there it's not restricted. So the passwords don't matter if you haven't patched your systems. And then the second problem is that. Are brute force attacks against so many servers out there. [00:24:36] And most of the time, what we're talking about is Microsoft, but, you know, there's the share of bugs kind of goes around, but Microsoft and really, they get nailed a lot more than most beet, mainly because they're probably the number one out there that's in use today, not in the server community, certainly, but certainly also in the. [00:24:59] It's been, you know, small businesses, that's all they know. So they just run a Microsoft server and more and more, you kind of have to run it because I, I get it. You know, there's so many apps that depend on the various functions that are provided by the active directory server at Microsoft and stuff. So we, we do that for our customers as well. [00:25:19] So are you starting to see why the brute force against a server will often get them in and the smarter guys figure out what the business is? And then they go to the dark web and they look up those business emails. Addresses that they have that have been stolen along with the passwords that were used. [00:25:43] That's why we keep saying, use a different password on every site because that stolen password now. Is going to be tried against your service, your, your file server. That might be there. You might be trying to have a VPN service that the people are VPN in from home. You might have remote desktop, which has been. [00:26:08] Abject failure when it comes to cybersecurity, it's just been absolutely terrible. So you might have any of those types of things. And if they've got your email address and they've got the passwords you've used on other sites, which they've stolen and they try them, are they going to work? Odds are yes, because most people, I got another set of stats this week. [00:26:36] Most people use the same password for every site out there or every type of site. So they might get a second, most common is they use one password for all of their social media sites. They use another one for all of their banking sites. So we cover this in some depth in our bootcamp so that you understand how to do the whole password thing. [00:27:03] And what I recommend is a piece of software called one password. I don't recommend that you just use one password for everything. I was misunderstood by someone the other day. You mean just w w I use one password for everything. Yeah, you do. And then I talked to them a little bit more because I thought that was an odd question. [00:27:24] And it turned out, he was thinking, you just have the one password, like, like, you know, P at sign SSW, zero RD. Right? You use that everywhere. No, there's a piece of software go to one password.com. That's what I recommend as a password manager. And I show you how to use that and how to use it effectively in my bootcamp. [00:27:48] Absolutely free. Just like the radio is free. I'm trying to get the information out to as many people as possible, but you gotta be on my list. Craig peterson.com. Make sure you go there. So I've explained the basics here of what happens. We have a door open or windows, open ports on our servers, on our firewalls at home. [00:28:15] And at work. So the thing to do, particularly if you're a business, but even if your home user is check that firewall configuration. And let me tell you something that probably won't come as a surprise. Most of these internet server. The providers are in the business to make as much money as possible. And cybersecurity is very much secondary. [00:28:40] They know they talk about it and they talk about software defined networks and things that sound really cool. But in reality, what they give you is. Configured very well and is going to expose you. So make sure you go in, they will set it up. For instance, if they're providing you with television services, they'll set it up so that they can just bypass your firewall and get into the cable box that they installed in your house. [00:29:09] Yeah. Obviously that's not something they should be doing because now they are opening you up to attack. What happens when there's a cybersecurity problem with the cable box? We've seen this problem too, with television vendors where they poke a hole out through your firewall so that they can then gather statistics and do firmer updates and everything else. [00:29:34] It's insane. It really is. These vendors are not thinking about you. They're not thinking about the consequences. It is a very, very sad situation, but now you know what to do and how to do it. Okay. I explained today, firewalls. I explained router. I explained ports, which should be open, which should not be open. [00:29:58] And the reasons why I even mentioned passwords, I get into that in a lot of detail in my bootcamp, Craig peterson.com to get on that waiting list. Craig peterson.com, just subscribe and you'll be kept up to date. [00:30:14] There has been a whole lot of discussion lately about Metta. You might've heard. In fact, you probably did that. Facebook changed its name to Metta and they're aiming for something called the metaverse. So what is it exactly and what's it going to do for or to you? [00:30:32] The metaverse oh my gosh. I had a great discussion this week about the metaverse this came out in, um, and originally anyways, in this novel called the what was it now? [00:30:47] A snow crash. That's what it was 1992, Neil. Stevenson or Steffenson. I'm not sure how he pronounces it, but in this book, which was a cyberpunk model and I've, I've always thought cyber punk was cool. Uh, is the metal versus an imaginary place that's made available to the public over the world wide fiber optics network. [00:31:13] And it's projected onto virtual reality goggles sound familiar yet. And in the. You can build a buildings park signs as well as things that do not exist. In reality, such as vast hovering overhead light show, special neighborhoods were three where the rules of three-dimensional spacetime are ignored and free combat zones where people can go hunt and kill each other. [00:31:42] Great article about this in ARS Technica this week. And, uh, that was a little quote from the book and from the article. Phenomenal idea. Well, if you have read or seen the movie ready player one, and I have seen the movie, but a friend of mine this week said the book is so much better. So I'm going to have to read that book, ready player one. [00:32:06] But in it, you have these people living in. Dystopian future where everything is badly worn down, the mega cities, people building on top of each other and they get their entertainment and relaxation and even make money in. Prison time by being inside this virtual world, they can go anywhere, do anything and play games, or just have fun. [00:32:39] One of the vendors that we work with at my company mainstream has this kind of a virtual reality thing for. I kind of a summit, so people can go and watch this presentation and I think it's stupid, but they, you walk in. And it's, uh, this is just on a screen. They're not using like those Oculus 3d graph glasses, but you walk into an auditorium. [00:33:13] So you've got to make your little avatar walked on. Dun dun, dun dun, dun, dun, dun, dun, dun, and then go to an empty seat. And then you have to make your avatar sit down. Right? I, I have never played a game like this. I never played second life. Never any of that sort of thing. It was kind of crazy to me. And then I was doing a presentation, so I had to go Dundon then, then, then the, up onto the rostrum there and stand behind the podium and, and then put my slides up on this virtual screen. [00:33:49] It was ridiculous. I have a full television production studio here in my, in my lab. Right. And that's, this is where I do the radio show. This is where I do my television appearances. This is where I do pretty much everything. Right. And so what I can do is I can split screen with my face, with the desktop. [00:34:12] You can see my desktop, I can draw on it, circle things, highlight things or whatever I want to do. Right. But no, no, no, no. I was in their virtual reality. And so all I could do is. I have the slides come up. In fact, I had prepared beforehand, pre-taped it? A, the whole presentation, but I couldn't play that video. [00:34:37] No, no, no. I had to show a slide deck, you know, death by PowerPoint. I'm sure you've been there before. It's very, very frustrating in case you can tell for me, well, we've seen this type of thing. I mentioned some of the things like that. I'm in second life. I'm sure you've heard of that before. Sims is another one you've probably heard of before. [00:35:01] These types of semi metaverses have been around a very long time. And, and in fact, all the way on back to the nineties is Habbo hotel. G I don't know if you ever heard of that thing, but it was non-line gaming and social space. I helped to develop one for a client of mine back in the early nineties. [00:35:23] Didn't really go very far. I think it was ahead of its time. It's it's interesting right now, enter. Mark Zuckerberg. Do you remember a few years ago, mark Zuckerberg had a presentation. He was going to make this huge announcement, right? They bought Oculus. What was it? It was like crazy amount of money. And then he came in the back of the hall. [00:35:50] And nobody noticed he walked all the way up to the front and nobody even saw him because they were all wearing these 3d glasses. And of course, today they are huge. They are awkward and they don't look that great, the pictures inside, but the idea is you can move your head around and the figures move as your head moves, almost like you're in the real world. [00:36:13] And that's kind of cool and people thought it was kind of cool and they didn't see Zuckerberg because they all had these things on. And the inside was playing a little presentation about what Facebook was going to do with Oculus. Well, they just killed off the Oculus name anyways here a couple of weeks ago, over at Facebook about the same time that got rid of the Facebook name and went to meta. [00:36:39] The Facebook product is so-called Facebook and it appears what they are going to be doing is taking the concept of a metaverse much, much further than anyone has ever taken it before. They're planning on there's speculation here. Okay. So, you know, don't obviously I don't get invested. I don't give investment advice, investment advice. [00:37:10] Um, but I do talk about technology and, uh, I've been usually five to 10 years. I had so take that as well. They as the grain of salt, but I think what they're planning on doing is Facebook wants to become the foundation for Mehta versus think about things like world of Warcraft, where you've got the. Gain that people are playing. [00:37:39] And it's a virtual reality, basically, right? It might be two D, but some of it's moving into the three-dimensional world. Other games like Minecraft and roadblocks, they have some pretty simple building blocks that people can use network effects and play your creativity to make your little world and the ability. [00:38:04] To exchange and or sell your virtual property. That's where I think Mr. Zuckerberg is getting really interested now because if they can build the platform that everybody else the wants to have a virtual world builds their virtual world on top of. Man, do they have a moneymaker? Now? People like me, we're going to look at this and just poo poo it. [00:38:35] I I'm sure I'm absolutely sure, because it will be another 20 years before you really think it's. You know, some of these scifi shows have talked about it. You know, you can feel someone touching you, et cetera, et cetera. Yeah. That's going to be very crude for a very long time. And now CGI is pretty good. [00:38:57] Yeah. You watch the movies. CGI is great, but that takes weeks worth of rendering time on huge farms, clusters of servers. So it's going to take quite a while. Looking at the normal advancement of technology before this really becomes real. Now there have also been us court cases over who owns what in bad happened with Eve online. [00:39:28] Second life where disagreements over player ownership of the virtual land created by the publisher, which was Linden labs. When. And I've also mentioned in the past how our friends over at the IRS have tried to tax some of the land that you own inside these virtual worlds. So ownership, do you really own it? [00:39:55] Does it really exist? What would non fungible tokens maybe it does. And these non fungible tokens are. Basically just a check, some verification, I'm really oversimplifying of some sort of a digital something rather lately. And initially it was mostly pictures. And so you had a picture of something and you owned that and you could prove it because of the blockchain behind it. [00:40:27] But I think this is where he's really interested because if he can build the base platform. Let the developers come up with the rules of what's it called it a game and come up with what the properties look like and how people can trade them and sell them and what kind of upgrades they can get. Right. [00:40:48] So let's nothing Zuckerberg has to worry about. Uh, Metta or Zuckerberg then worries about, okay. So how do we collect money for these? How do we check with the transactions? Uh, somebody wants to buy those sort of Damocles. How does that transaction work and how do we Facebook Metta? How do we get a slice of the act? [00:41:16] You got to believe that that's where things are going. And if they have the ability to make this base platform and be able to take characters from one part of a developer to another part of the developer, you could have worlds where Gandalf might be fighting bugs bunny. Right? Interesting. Interesting and Warner brothers, all these movie companies would probably be coming out with complete virtual reality. [00:41:49] So when you're watching James Bond, you're not just watching James Bond, you can look around, you can see what's happening. People sneaking up behind. And ultimately you could be James Bond, but that's decades away. I think a good 20 years. All right, everybody. Thanks for sticking around here. Make sure you go online. [00:42:11] Craig peterson.com/subscribe. Get my weekly newsletter. Find out about these free boot camps and other things that I have. So we can keep you up to date and keep you safe. [00:42:25] We already talked about Metta and their name, change the metaverse, but there's something else. Facebook did this last week that surprised a lot of users, something they started in 2010, but has been controversial ever since. [00:42:41] We had a pretty big announcement, frankly, this last week from our friends over at Facebook, not the one where they change their name and the. [00:42:51] Basically trying to create a metaverse platform. That's going to be the one platform that rules the world. Although those are my words by the way. But Facebook has announced plans now to shut down a decade old. Facial recognition system this month. We'll see what they do with this. If they follow through entirely, but they're planning on deleting over 1 billion faces that they have already gone through and analyzed. [00:43:26] You might remember. In 2010, Facebook had a brand new feature. It started announcing, Hey, did you know that so-and-so just posted your picture? Is this you? Is this your friend, is this sewn? So do you remember all of those questions? If you're a Facebook user back in the day? Well, they were automatically identifying people who appeared in digital photos and suggested that users or users tagged them with a click we're going to get to and admitted here. [00:43:57] Uh, and of course that then linked the Facebook account for. The picture that you tagged to the images and let that person know. And of course Facebook's ultimate goal is to get you to stay on long, as long online, as long as possible. Because if you're online, you are going to be looking at ads that are aimed primarily at. [00:44:18] Well, facial recognition has been a problem. We've seen it a worldwide. I just read through a restatement from the electronic frontier foundation, talking about facial recognition and the problems with it, how some people have been arrested based on facial recognition and held for over a day. We'll have cases where the police use to kind of a crummy photograph of them from a surveillance video sometimes also from a police car, in some areas, the police cars are continually taking video and uploading it to the internet, looking for things like license plates, to see if a car. [00:45:00] Parking ticket that hasn't been paid or it hasn't paid us registration all the way through looking at faces, who is this person? And some in law enforcement have kind of thought it would be great to have kind of like Robocop. You remember Robocop, not the ed 2 0 9. There was also in that movie. That's also very scary, but when they look at someone who's on a street at autonomous. [00:45:24] Pops up in their glasses, who it is, any criminal record, if there any sort of a threat to et cetera. And I can understand that from the policemen standpoint. And I interviewed out at the consumer electronic show, a manufacturer of. That technology, it was kind of big and bulky at the time. This was probably about six or eight years ago, but nowadays you're talking about something that's kind of Google glass size, although that's kind of gone by the wayside too. [00:45:54] There are others that are out there that you. Facial recognition. Technology has really advanced in its ability to identify people, but you still get false positives and false negatives. And that's where part of the problem becomes from they have been taking and they been private companies primarily, but also some government agencies they've been taking pictures from. [00:46:21] They can find them. We've talked about Clearview AI before this is a company that literally stole pitchers, that it could get off the internet. They scan through Facebook, Instagram, everywhere. They could find faces and they tied it all back in. They did facial recognition. On all of those photos that they had taken and then sold the data to law enforcement agencies. [00:46:49] There's an app you can get from Clearview AI. That runs on your smartphone and you can take a picture of someone in the street, clear view. AI will run that face through their database and we'll tell you who it is, what their, what their background is, where their LinkedIn page is their Facebook page, wherever it found them online. [00:47:13] Basically what they've been doing. Now Clearview had a problem here this last couple of weeks because the Australian government ordered them to delete all facial recognition, data belonging, to anyone that lives. In Australia. Now that's going to be a bit of a problem for clear view, because it's hard to identify exactly where people live just based on a photograph. [00:47:40] And the United Kingdom is also considering doing this exact same thing. Now, clear views have been sued. They violated the terms of service from Facebook and some of these other sites that I mentioned, but they did it anyway. And clear view was. To destroy all the facial images and facial templates they had retrieved about any Australian. [00:48:08] I think that's probably a pretty good idea. I don't like the idea of this data being out there. Well, if your password is stolen and we're going to be talking about that in our bootcamp, coming up here in a couple of weeks about how to determine if your username or your password is stolen. But, uh, and of course, if you want to get that. [00:48:29] Bootcamp and go to that. There's no charge for it, but you have to know about it. And the only way is to sign up. You have to make sure you're on my email email@example.com. But what happens when your email address is stolen or your password, or both are stolen from a web. Oh, typically they end up on the dark web. [00:48:50] They sell personal identification for very little money. In some cases it's only a few dollars per thousand people's identities. It is absolutely crazy. So the bad guys are looking for that information, but you can change your password. You can change your email address, but if your facial information is stolen, Can't change your face. [00:49:18] If your eye print is stolen, you can't change your eye. I have a friend who's pretty excited because he got to go right through the security at the airport ever so quickly. Cause all they had to do was scan his eyeball. Well, that data is valuable data because it cannot be changed. And it can, in some cases be replicated. [00:49:41] In fact, the department of Homeland security and the transportation safety administration had the database of face print stolen from them in 2019. To about 200,000 people's identities were stolen, the face sprints. It's just absolutely crazy. And this was some, a vendor of us customs and border protection. [00:50:05] And it, it, you can't write down to it. I read the detailed report on it just now. And the report that came out of the federal government said, well, it went to a contractor who. Took the data, all of the face prints off site over to their own site. And it wasn't encrypted when they took it over there. But it does mention that it was taken from an un-encrypted system at customs and border protection. [00:50:34] So wait a minute. Now you're blaming the contractor that you hired because it wasn't encrypted and yet you didn't encrypt it yourself either. I, you know, I guess that kind of goes around, but they want to. They want your biometric information just as much as they want anything else. Think about your phones. [00:50:53] Nowadays, apple has done a very good job with the biometrics and the fingerprints and making sure that that information is only ever stored on the phone. It never goes to apple, never leaves the phone it's in what apple calls, the secure long term. And if you mess with it at all, it destroys itself, which is part of the problem with replacing a cracked screen yourself on an iPhone, because you're going to disturb that secure enclave and the phone will no longer work. [00:51:24] That is not true when it comes to many other devices, including most of your Android phones that are out there. It is. So if the bad guys have. Your face print, they, and they can create 3d models that can and do in fact, go ahead and fool it into letting you in that that's information they want. So why are we allowing these companies to like clear view AI? [00:51:52] And others to buy our driver's license photos to the federal government, to also by the way, by our driver's license photos, by them from other sites and also our passport information. It's getting kind of scary, especially when you look into. China has a social credit system. And the Biden administration has made rumblings about the same here in the U S but in China, what they're doing is they have cameras all over the place and your faces. [00:52:27] And they can identify you. So if you jaywalk, they take so many points off of your social credit. If you don't do something that they want you to do or be somewhere, they want you to be, you lose credits again, and you can gain them as well by doing various things that the government wants you to do. And. [00:52:49] And ultimately, if you don't have enough social credit, you can't even get on a train to get to work. But the real bad part are the users. This is a minority in China and China's authorities are using. Us facial recognition, technology and artificial intelligence technology. Hey, thanks Google for moving your artificial intelligence lab to China in order to control and track the users. [00:53:19] Absolutely amazing in the United States law enforcement is using this type of software to aid policing, and we've already seen problems of overreach and mistaken IRS. So Facebook to you're leading a billion of these frameworks. If you will, of people's faces biometrics. Good for them. Hopefully this will continue a tread elsewhere. [00:53:46] Well, we've talked a little bit today about firewalls, what they do, how your network is set up. If you miss that, make sure you catch up online. My firstname.lastname@example.org, but there's a whole new term out there that is changing security. [00:54:03] It's difficult to set up a secure network. [00:54:07] Let's just say mostly secure because if there's a power plug going into it, there's probably a security issue, but it's difficult to do that. And historically, what we've done is we've segmented the networks. So we have various devices that. Maybe be a little more harmful and on one network, other devices at a different level of security and many businesses that we've worked with, we have five different networks each with its own level of secure. [00:54:38] And in order to get from one part of the network, for instance, let's say you're an accounting and you want to get to the accounting file server. We make sure your machine is allowed access at the network level. And then obviously on top of that, you've got usernames and passwords. Maybe you've got multifactor authentication or something else. [00:54:59] I'll make sense, doesn't it? Well, the new move today is to kind of move away from that somewhat. And instead of having a machine or a network have firewall rules to get to a different network or different machine within an organization. There's something called zero trust. So again, think of it. You've, you've got a network that just has salespeople on it. [00:55:25] You have another network that might have just your accounting people. Another network has your administrative people and other network has your software developers, et cetera. So all of these networks are separate from each other and they're all firewalled from each other. So that only for instance, at county people can get to the accounting server. [00:55:44] Okay, et cetera. Right? The sales guys can enter the sales data and the programmers can get at their programs. And maybe the servers that are running their virtual machines are doing testing on what was zero trust. It is substantially different. What they're doing with zero trust is assuming that you always have to be authentic. [00:56:11] So instead of traditional security, where, where you're coming from helps to determine your level of access, you are assuming that basically no units of trust. So I don't care where you're coming from. If you are on a machine in the accounting department, We want to verify a lot of other information before we grant you access. [00:56:38] So that information probably does include what network you're on. Probably does include the machine you're on, but it's going to all. You as a user. So you're going to have a username. You're going to have an ID. You're going to have a multi-factor authentication. And then we're going to know specifically what your job is and what you need to have specific access. [00:57:04] Because this follows the overall principle of least privilege to get your job done. Now you might've thought in the past that, oh my gosh, these firewalls, they're just so annoying. It's just so difficult to be able to do anything right. Well, zero trust is really going to get your attention. If that's what you've been saying. [00:57:23] But here's an example of the traditional security approach. If you're in the office, you get access to the full network. Cause that's pretty common, right? That's not what we've been doing, but that's pretty common where we have been kind of working in the middle between zero trust and this traditional you're in the office. [00:57:41] So you can potentially get it. Everything that's on the off. And if you're at home while all you have to do is access a specific portal, or as I've explained before, well, you are just connecting to an IP address in a hidden port, which won't remain hidden for. So maybe in a traditional security approach, the bouncer checks your ID. [00:58:08] You can go anywhere inside this club and it's multi floor, right. But in a zero trust approach, getting into the club, having that bouncer look at your ID is only the first check, the bartender or the waiter. They also have to check your ID before you could be served. No matter where you are in the club and that's kind of how they do it right now, though, they'll make a mark on your hand or they'll stamp it. [00:58:35] And now they know, okay, this person cannot get a drink for instance. So think of it that way, where every resource that's available inside the business independently checks whether or not you should have access to. This is the next level of security. It's something that most businesses are starting to move towards. [00:58:57] I'm talking about the bigger guys, the guys that have had to deal with cybersecurity for awhile, not just the people who have a small business, most small businesses have that flat network that. Again about right. The traditional security approach of all you're in the office. So yeah, you can get at anything. [00:59:15] It doesn't matter. And then you, you have the sales guys walking out with your client list and who knows what else is going on? Think of Ferris, Bueller, where he was updating his grades and miss days at high school, from his home computer. And you've got an idea of why you might want to secure. You are network internally because of, again, those internal threats. [00:59:40] So keep an eye out for it. If you're looking to replace your network, obviously this is something that we've had a lot of experience with. Cisco is probably the best one out there for this, but there are a few other vendors that are pretty good. If you want to drop me an email, I'll put together a list of some of the top tier zero. [01:00:02] Providers so that you can look at those. I don't have one right now, but I'd be glad to just email me M email@example.com. We can point you in the right direction, but if you have an it person or department, or whether you outsource it to an MSP, a managed services provider, make sure you have the discussion with them about zero. [01:00:28] Now, when I'm looking at security, I'm concerned about a bunch of things. So let me tell you something that Karen and I have been working on the last, oh man, few weeks. I mentioned the boot camp earlier in the show today. And one of the things that we're going to do for those people that attend the bootcamp is I think incredible. [01:00:49] This has taken Karen so much time to dig up. Once she's done is she's worked with me to figure out what are the things that you need to keep tabs on. Now, again, this is aimed primarily at businesses, but let me tell you, this is going to be great for home users as well. And we've put together this list of what you should be doing. [01:01:15] About cybersecurity every week. And in fact, a couple of things that are daily, but every week, every month, every quarter, every six months and every year, it's a full checklist. So you can take this and sit down with it and, you know, okay. So I have to do these things this week and this isn't. Response to anything in particular, it does meet most requirements, but frankly, it's something that every business should be doing when it comes to the cybersecurity. [01:01:53] It includes things like passwords. Are they being done? Right? Did you do some training with your employees on fishing or a few other topics all the way on down to make sure you got some canned air and blew out the fan? In your workstations, you'd be amazed at how dirty they get. And he is the enemy of computers that makes them just fail much, much faster than, than 82, same thing with server. [01:02:22] So it is everything. It is a lot of pages and it is just check she'd made it nice and big. Right. So even I can read it. But it's little check marks that you can mark on doing while you're going through it. So we're doing some more work on that. She's got the first couple of iterations done. We're going to do a couple more, make sure it is completely what you would need in order to help keep your cyber security in. [01:02:50] But the only way you're going to get it is if you are in the BR the bootcamp absolutely free. So it was this list, or of course you won't find out unless you are on my email list. Craig Peterson.com/subscribe. [01:03:06] One of the questions I get asked pretty frequently has to do with artificial intelligence and robots. Where are we going? What are we going to see first? What is the technology that's first going to get into our businesses and our homes. [01:03:22] Artificial intelligence is something that isn't even very well-defined there's machine learning and there's artificial intelligence. [01:03:33] Some people put machine learning as a subset of artificial intelligence. Other people kind of mess around with it and do it the other way. I tend to think that artificial intelligence is kind of the top of the heap, if you will. And that machine learning is a little bit further down because machines can be programmed to learn. [01:03:54] For instance, look at your robot, your eye robot cleans the floor, cleans the carpet. It moves around. It has sensors and it learned, Hey, I have to turn here. Now. I robot is actually pretty much randomly drew. But there are some other little vacuum robots that, that do learn the makeup of your house. The reason for the randomization is while chairs move people, move things, move. [01:04:22] So trying to count on the house, being exactly the same every time isn't isn't exactly right. Uh, by the way, a lot of those little vacuums that are running around are also sending data about your house, up to the manufacturer in the. So they often will know how big the house is. They know where it's located because you're using the app for their robot. [01:04:47] And that, of course it has access to GPS, et cetera, et cetera. Right. But where are we going? Obviously, the little by robot, the little vacuum does not need much intelligence to do what it's doing, but one of the pursuits that we've had for. Really since the late nineties for 20, 25 years are what are called follower robots. [01:05:13] And that's when I think we're going to start seeing much more frequently, it's going to be kind of the first, um, I called it machine learning. They call it artificial intelligence who you really could argue either one of them, but there's a little device called a Piaggio fast forward. And it is really kind of cool. [01:05:34] Think of it almost like R2D2 or BB eight from star wars following you around. It's frankly, a little hard to do. And I want to point out right now, a robot that came out, I think it was last year from Amazon is called the Astro robot. And you might remember Astro from the Jetsons and. This little robot was available in limited quantities. [01:06:01] I'm looking at a picture of it right now. It, frankly, Astro is quite cute. It's got two front wheels, one little toggle wheel in the back. It's got cameras. It has a display that kind of makes it look like kids are face, has got two eyeballs on them. And the main idea behind this robot is that it will. [01:06:23] Provide some protection for your home. So it has a telescoping camera and sensor that goes up out of its head up fairly high, probably about three or four feet up looking at this picture. And it walks around your one rolls around your home, scanning for things that are out of the normal listening for things like windows breaking there, there's all kinds of security. [01:06:50] That's rolled into some of these. But it is a robot and it is kind of cool, but it's not great. It's not absolutely fantastic. Amazon's dubbing the technology it's using for Astro intelligent motion. So it's using location and mapping data to make sure that Astro. Gets around without crashing into things. [01:07:18] Unlike that little vacuum cleaner that you have, because if someone loves something on the floor that wasn't there before, they don't want to run over it, they don't want to cause harm. They don't want to run into your cats and dogs. And oh my maybe lions and bears too. But, uh, they're also using this computer vision technology called visual ID and that is used. [01:07:41] With facial recognition, drum roll, please, to recognize specific members of the family. So it's kind of like the dog right in the house. It's sitting there barking until it recognizes who you are, but Astro, in this case, Recognizes you and then provide you with messages and reminders can even bring you the remote or something else and you just drop it in the bin and off it goes. [01:08:08] But what I am looking at now with this Piaggio fast forward, you might want to look it up online, cause it's really. Cool is it does the following, like we've talked about here following you around and doing things, but it is really designed to change how people and goods are moving around. So there's a couple of cool technologies along this line as well. [01:08:35] That it's not, aren't just these little small things. You might've seen. Robots delivery robots. The Domino's for instance, has been working on there's another real cool one out there called a bird. And this is an autonomous driving power. Basically. It's a kind of a four wheel ATV and it's designed to move between the rows of fruit orchards in California or other places. [01:09:01] So what you do to train this borough robot is you press a follow button on it. You start walking around the field or wherever you want it to go. It's using, uh, some basic technology to follow you, cameras and computer vision, and it's recording it with GPS and it memorizes the route at that point. Now it can ferry all of your goods. [01:09:29] Around that path and communicate the path by the way to other burrow robots. So if you're out doing harvesting or whether it's apples out in the east coast, or maybe as I said out in California, you've got it. Helping you with some of the fruit orchards. It's amazing. So this is going to be something that is going to save a lot of time and money, these things, by the way, way up to 500 pounds and it can carry as much as a half a ton. [01:09:58] You might've seen some of the devices also from a company down in Boston, and I have thought that they were kind of creepy when, when you look at it, but the company's called Boston dynamics and. They were just bought, I think it was Hondai the bought them trying to remember. And, uh, anyway, These are kind of, they have robots that kind of look like a dog and they have other robots that kind of look like a human and they can do a lot of different chores. [01:10:33] The military has used them as have others to haul stuff. This one, this is like the little dog, it has four legs. So unlike a lot of these other robots that are on wheels, this thing can go over very, very. Terrain it can self write, et cetera. And they're also using them for things like loading trucks and moving things around, um, kind of think of Ripley again, another science fiction tie, uh, where she's loading the cargo in the bay of that spaceship. [01:11:05] And she is inside a machine. That's actually doing all of that heavy lifting now. Today, the technology, we have a can do all of that for us. So it is cool. Uh, I get kind of concerned when I see some of these things. Military robots are my favorite, especially when we're talking about artificial intelligence, but expect the first thing for these to be doing is to be almost like a companion, helping us carry things around, go fetch things for us and in the business space. [01:11:40] Go ahead and load up those trucks and haul that heavy stuff. So people aren't hurting their backs. Pretty darn cool. Hey, I want to remind you if you would like to get some of the free training or you want some help with something the best place to start is Craig peterson.com. And if you want professional help, well, not the shrink type, but with cyber security. [01:12:06] email me M E at Craig peterson.com. [01:12:10] Just in time for the holidays, we have another scam out there and this one is really rather clever and is fooling a lot of people and is costing them, frankly, a whole lot of money. [01:12:26] This is a very big cyber problem because it has been very effective. And although there have been efforts in place to try and stop it, they've still been able to kind of get ahead of it. There's a great article on vice that's in this week's newsletter. In my show notes up on the website and it is talking about a call that came in to one of the writers, Lorenzo, B cherry, um, probably completely messy and that name up, but the call came in from. [01:13:03] Supposedly right. Paid pals, uh, fraud prevention system. Someone apparently had tried to use his PayPal account to spend $58 and 82 cents. According to the automated voice on the line, PayPal needed to verify my identity to block the transfer. And here's a quote from the call, uh, in order to secure your account, please enter the code we have sent to your mobile device. [01:13:32] Now the voice said PayPal, sometimes texts, users, a code in order to protect their account. You know, I've said many times don't use SMS, right? Text messages for multi-factor authentication. There are much better ways to do it. Uh, after entering a string of six digits, the voice said, thank you. Your account has been secured and this request has been blocked. [01:13:57] Quote, again, don't worry. If any payment has been charged your account, we will refund it within 24 to 48 hours. Your reference ID is 1 5 4 9 9 2 6. You may now hang up, but this call was actually. Hacker they're using a type of bot is what they're called. These are these automated robotic response systems that just dramatically streamlined the process for the hackers to gain access into your account. [01:14:31] Particularly when you have multi-factor authentication codes where you're using. An SMS messages, but it also works for other types of one-time passwords. For instance, I suggest to everybody and we use these with our clients that they should use something called one password.com. That's really you'll find them online. [01:14:54] And one password.com allows you to use and create one time password, same thing with Google authenticator, same thing with Microsoft authenticator, they all have one-time password. So if a bad guy has found your email address and has found your password online in one of these hacks, how can they possibly get into your PayPal account or Amazon or Coinbase or apple pay or. [01:15:26] Because you've got a one time password set up or SMS, right? Multifactor authentication of some sort. Well they're full and people and absolute victims. Here's what's happening. Th this bot by the way, is great for bad guys that don't have social engineering skills, social engineering skills, or when someone calls up and says, hi, I'm from it. [01:15:51] And there's a problem. And we're going to be doing an upgrade on your Microsoft word account this weekend because of a bug or a security vulnerability. So what, what I need from you is I need to know what username you're normally using so that I can upgrade the right. So we don't, it doesn't cost us a whole bunch by upgrading accounts that aren't being used. [01:16:15] So once the account name that you use on the computer and what's the password, so we can get in and test it afterwards, that's a social engineering type attack. That's where someone calls on the phone, those tend to be pretty effective. But how about if you don't speak English very well? At all frankly, or if you're not good at tricking people by talking to them, well, this one is really great. [01:16:44] Cause these bots only cost a few hundred bucks and anybody can get started using these bots to get around multi-factor authentication. See, here's how it works. In order to break into someone's account, they need your username, email address and password. Right? Well, I already said. Much many of those have been stolen. [01:17:07] And in our boot camp coming up in a few weeks, we're going to go through how you can find out if your username has been stolen and has been posted on the dark web and same thing for your password. Right? So that's going to be part of the. Coming up that I'll announce in the newsletter. Once we finished getting everything already for you guys, they also go ahead and buy what are called bank logs, which are login details from spammers who have already tricked you into giving away some of this information. [01:17:41] But what if you have multi-factor authentication enabled something I'm always talking about, always telling you to do. Well, these bots work with platforms like Twilio, for instance, uh, and they are using other things as well, like slack, et cetera. And all the bad guy has to do with that point is going. [01:18:07] And, uh, say, they're trying to break into your account right now. So they're going to, let's get really, really specific TD bank. That's where my daughter works. So let's say you have a TD bank account. And the hacker has a good idea that you have a TD bank account knows it because they entered in your username and password and TD bank was letting them in. [01:18:32] But TD bank sent you a text message with that six character code, right? It's usually digits. It's usually a number. So what happens then? So the bad guys says, okay, so it's asking me for this six digit SMS
You can now listen to our episodes for the low, low price of $24.99—just don't ask where the money is going and if you'll ever get it back! We're conning you into listening to the story of and behind Paper Moon, the '70s drama starring Ryan and Tatum O'Neal. What Oscar record does this movie still hold? What sad behind-the-scenes stories change how we saw it? And what the heck does it have to do with Lorelai and Rory's shopping habits? Plus, with a quick look at the history of con people in real life and the movies, you too can learn how to pull fast ones on other people!Other pop culture we ref: Daisy Miller, Peyton Place, Jodie Foster, Orson Welles, Hailee Steinfeld, Shirley Temple, Paul Newman, The Exorcist, The Eyes of Tammy Faye, McMillion$, Inventing Anna, The Dropout, Ocean's 11, Ocean's 8, The Talented Mr. Ripley, American Graffiti, The Office, Now You See MeWe Wholeheartedly Recommend: SOUR by Olivia Rodrigo, Mystic PizzaCheck us out on Instagram!Subscribe to our new email list!So it's a show? TwitterSo it's a show? Tumblr
Does Grabstack have a driver's license? How does Bobby Wonder floop (fly)? What is Grabstack's favorite sport? Tune in to find out the answer to these questions, and maybe a couple more, with Bobby Wonder's tremendously talented sidekick Grabstack! Thanks to listeners Isaac, Micah, and Ripley for the great questions!If you have questions you would like answered send Grabstack an email at firstname.lastname@example.org
There are few sci-movies from the 80's which being be held in higher esteem than James Cameron's 1986 sequel, Aliens. Set after the original Alien, 1979, this takes the initial encounter with the Xenomorph and turns everything up to eleven!! Starring Sigourney Weaver, Michael Biehn and Bill Paxton, this sci-fi action-adventure is one to strap in for! If you enjoy the show we have a Patreon, become a supporter. www.patreon.com/thevhsstrikesback Plot Summary: 57 years after Ellen Ripley had a close encounter with the reptilian alien creature from the first movie, she is called back, this time, to help a group of highly trained colonial marines fight off against the sinister extraterrestrials. But this time, the aliens have taken over a space colony on the moon LV-426. When the colonial marines are called upon to search the deserted space colony, they later find out that they are up against more than what they bargained for. Using specially modified machine guns and enough firepower, it's either fight or die as the space marines battle against the aliens. As the Marines do their best to defend themselves, Ripley must attempt to protect a young girl who is the sole survivor of the nearly wiped out space colony. email@example.com --- Support this podcast: https://anchor.fm/thevhsstrikesback/support
This is, by far, our Frenchest episode yet! Writer, director, and animator Brian Vincent Rhodes joins the pod to discuss Jean-Pierre Jeunet's gooey mid-90's classic, Alien: Resurrection!If you haven't seen the movie, you are missing out on a whole bunch of French weirdness. The KY jelly budget on this thing must have been through the roof!Here's the official synopsis of this classic film:"Ripley died in the last movie but thanks to poorly explained science, she's BACK! And so is the alien queen that was living inside her. It's now the way, way future and Ripley is also half-alien now? Robot Winona Ryder shows up with a gang of space pirates hell-bent on...collecting guns..or something? They all team up and go for a swim among other fanciful events before finally facing off with THE NEWBORN, a half alien/human hybrid bred from Ripley writhing around in a bed of aliens and goo. Did we MENTION HOW FRENCH THIS MOVIE IS??!"Follow Brian Vincent Rhodes on Instagram: @brianvincentrhodesAnd be sure to join our Patreon: www.patreon.com/L2W
This episode takes us to the Mississippi River bottoms lands of West Tennessee to one of the most unique American restaurants I know. Its the Chisolm Lake Store Restaurant! The drive to this uniquely original steak house is all part of its attraction as you wind your way down the bluff just outside the town of Ripley and over the bridge past Cucklebur Slew. While there I sit down with Bubba Humphreys who is the Owner/Operator as he talks about how the restaurant survives and continues to operate when the mighty Mississippi River floods the bottom lands. He also tells us about the food, history of the restaurant and the people that make the Chisolm Lake Store Restaurant a true slice of Americana pie!
This episode could be called 'The Coaches Corner.' Hear what Ripley cross country coach Jimmy Groves, Viking basketball coach Derek Mullins, Lady Viking basketball coach John Kennedy and wrestling coach Matt Smith have on their minds as we head into the winter sports seasons. --- Support this podcast: https://anchor.fm/brian-johnson9/support
Check out our sponsors! www.sleepterrorclothing.com Use promo code 'untrained' for 15% off your first order! www.ohfishl.com Use promo code 'untrained' to get 25% off your first order! - This week, did you get canceled for your Halloween costume, Ripley's believe it or not, let's get META, STAY SAFE BEN WE LOVE YOU, some 2010's trivia, what does TMZ stand for anyway, and mooooooore! - Our recommendations this week: Dragging The Table Simmons And Moore Podcast - Small business we support: @brickbodykids you can DM on Instagram to buy direct or find them on Ebay dot com the website https://www.ebay.com/usr/brickbodykids - DJ also does a solo podcast called Dragging The Table - We are a proud part of the ⭕Inner Circle Podcast Network⭕ Visit www.innercirclepn.com to subscribe, follow, and listen to all the shows! - Follow the link to these shows to check out our appearances on them! The All Bro's #NoOffense Married AF Drinks With Larry The Inner Circle Presents: The Winners Circle NE Podcast - Wanna send us something? Now you can! Our mailing address is: The Untrained Eye P.O. Box 6225 Sun City Center, FL 33571 - If you love our intro and outro music, please visit Cullah.com Don't forget to follow us on Instagram and Twitter We have stickers and buttons! DM our socials or send an email to firstname.lastname@example.org and we'll send you some
Alexandra Andrews is the author of Who is Maude Dixon, a delightfully twisty new mystery that has been described as heir to Patricia Highsmighth's legacy (think Strangers on a Train or The Talented Mr. Ripley). It's the story of a young woman who works in publishing, is disillusioned with her prospects, and suddenly finds herself as the assistant for an Elene Ferrante-like novelists. Suddenly, the two of them are caught up in an international mystery complete with mistaken identities, cliffside car crashes, and foreign investigators that may or may not be bribable. It's a great time between two covers. So join David as he chats with Alexandra about the books she loves the most, the titles that inspired her to become a writer. See acast.com/privacy for privacy and opt-out information.
In this week's episode, Kendra talks with Jen Campbell about her book, The Sister Who Ate Her Brothers, which is out from Thames & Hudson. Check out our Patreon page to learn more about our book club and other Patreon-exclusive goodies. Follow along over on Instagram, join the discussion in our Goodreads group, and be sure to subscribe to our newsletter for more new books and extra book reviews! Books Mentioned The Sister Who Ate Her Brothers: And Other Gruesome Tales by Jen Campbell The Girl Aquarium by Jen Campbell Franklin's Flying Bookshop by Jen Campbell Jen Recommends Sitting Pretty by Rebekah Taussig Disability Invisibility edited by Alice Wong Growing Up Disabled in Australia edited by Carly Findlay Disfigured by Amanda Leduc Mrs. March by Virginia Feito The Talented Mrs. Ripley by Patricia Highsmith About the AuthorJen Campbell is a bestselling author and award-winning poet. She's written ten books for both adults and children, spanning nonfiction, poetry, short stories and children's books. Her podcast BOOKS WITH JEN is an iTunes top 100 podcast. She reviews books on BBC Radio, runs a book club for TOAST, and has a Youtube channel where she talks about books, the history of fairy tales, and the representation of disfigurement and disability. www.jen-campbell.co.uk Website | Youtube | Workshops | Twitter | Instagram CONTACT Questions? Comments? Email us email@example.com. SOCIAL MEDIA Twitter | Facebook | Instagram | Website Music by Miki Saito with Isaac Greene Learn more about your ad choices. Visit megaphone.fm/adchoices
Thanks to Express VPN and Simplisafe for sponsoring today's episode of Going In Raw! Go to http://www.expressvpn.com/gir to get three extra months for free! Go to http://www.simplisafe.com/raw to get 20% off your entire new system and your first month of monitoring service FREE! Time Stamps: 00:00 Show Starts 00:30 24 Hour Stream This Saturday! 04:52 Karrion Kross' New Gimmick! 11:22 Braun Strowman To Impact SOON 17:48 Ripley's Title Missing? 18:56 Buddy Murphy To NJPW 21:30 New AAA Show Announced 24:00 AEW Dynamite Recap 47:58 WWE Raw Preview 50:52 Friendo Mailbag
James Cameron's bombastic follow up to “Alien,” equal parts action and horror movie, may make us yearn for the Nostromo a bit, but more importantly it features our favorite cat owning, flamethrower wielding space mom, Ellen Ripley. The Extended Special Edition of “Aliens” gives us even more time in Act One with Ripley and Jones […]