Updating a condo or a home before selling it can baffle some homeowners. Once you start one room, the rest of the rooms don't look as good. So what is a homeowner to do? Let me share these 2 stories one of a condo owner and the other a homeowner looking to sell in 2 years. Mentioned in this podcast: Top 10 home staging tips bit.ly/top10homestagingtips
Harrison Forman and Brandon Berman present a dating experience with all the intrigue of Love is Blind, but without the editing or gold chalices - UpDating. They recount the journey that inspired the live blindfolded reality dating show as it exists today, and the wildest on-stage connections and rejections to-date. We wrap with insights into our own dating lives, including their experience with clout chasers, their hypothesis on my type, Brandon's future UpDating proposal, and Harrison's recent date with a former Interstates & Heartbreak guest. For DM slides (platonic or otherwise) : @htforman For platonic DM slides ONLY : @bermmy16 For casting DM slides : @updatingshow (or apply at updatingshow.com) To make things Instagram official : @interstatesandheartbreak For dating commentary from my inner Carrie : interstatesandheartbreak.com For any questions, business inquiries, or love letters : firstname.lastname@example.org For a glimpse into my life when I'm not talking about dating : @lesliegnope
Podcast hosts: Sister Shannon, OSF, and Sister Maxine, IHM. Topics: Do Protestants have saints, does the Mass need updating if people leave early, how do I know God wants me to enter religious life, 54-day novenas Read the full transcript of this podcast: https://siste.rs/3yufwfr (2:33) Listener question: Do Protestants have saints? (4:19) The Catholic road to sainthood (7:07) The communion of saints (14:34) Listener question: A friend of mine says that when a lot of people leave Mass right after Communion, it's a sign that some updating about the Mass is needed for parishioners. Is that true? And if it is, why? (15:58) The Sunday Mass obligation (19:16) The Vatican II perspective (26:37) Listener question: I know I want to become a sister. I don't want to start the discernment process yet, but would like to visit a community to see if that can help me get my calling. What are your thoughts about this? (27:07) Signs from God (30:01) What do you mean by “discernment?” (32:25) Joining the community (37:26) A 54-day novena Subscribe to our newsletter https://siste.rs/3isP2CZ Check out lots more podcasts https://siste.rs/2SfnoyS Don't forget to call us and leave a message. Tell us what you like, ask a question, or just say hi. Call 913-214-6087. Let us know what your thoughts about the podcast! Please take this short survey--your input helps us shape the future In Good Faith podcasts. Click HERE to take the survey. Thank you!
Tristan discusses how you can update your LinkedIn profile without your boss knowing and what to say if they find out. Remember, it's your profile; you are entitled to update it whenever you damn well please. Companies will always do what's best for them, which means you should always be doing what's best for you. Want to know more about our LinkedIn Learning courses? Check them out! https://bit.ly/3k4havy This tip was adapted from a video by Adunola Adeshola. Check it out here. https://bit.ly/3Pi7T1y Have a topic suggestion? You can find our submission form here. http://bit.ly/tapintristan Check out Tristan's website to learn more about him or to book a free consultation. http://bit.ly/31HFzND Connect with Tristan on LinkedIn, IG, FB, and Twitter. http://bit.ly/2G7d6HK http://bit.ly/2XDcp3z http://bit.ly/2JEbg1R http://bit.ly/2JCmKTz
Which positions have the best battles shaping up for Penn State football in the Fall? Where are the weak points on the roster? To set the stage for the summer months, the BWI Daily Edition is looking at the Penn State depth chart coming out of spring practice. Greg Pickel watched all the film from the Blue-White Game and built a depth chart based on what he saw during the scrimmage. He joins host Thomas Frank Carr to discuss which positions need reinforcements over the summer. Pickel and T-Frank go through the roster position by position, starting with quarterback. Then, they cycle through the offense before heading to the other side of the line of scrimmage to see if anyone made a move on the Penn State defense. Key spots of interest include running back, receiver, linebacker, and safety. T-Frank also draws attention to the secondary, where good players might have a limited role thanks to depth and numbers. JOIN Blue White Illustrated: https://www.on3.com/teams/penn-state-nittany-lions/join/?plan=annual SUBSCRIBE to Blue White Illustrated on YouTube and enable alerts - new highlights and videos uploaded regularly: https://www.youtube.com/c/bluewhiteillustratedvideo?sub_confirmation Bookmark our homepage: https://www.on3.com/teams/penn-state-nittany-lions/ Subscribe to BWI Magazine and Newsletters: http://bluewhiteonline.com Download our podcasts: https://cms.megaphone.fm/channel/LRL3155877513?selected=DSVV2664982394 Like us on Facebook https://www.facebook.com/BlueWhiteIllustrated/ Follow us on Twitter https://twitter.com/PennStateOn3 Sound effects obtained from https://www.zapsplat.com Learn more about your ad choices. Visit megaphone.fm/adchoices
Roy is a wedding photographer who stays in the moment with his couples. He's also and business coach. He writes blogs for photographers, and he's based in beautiful Orlando, Florida. Today we talk about how you can attract more leads by networking and how important relationships are for your business. Sponsor: Táve Receive an extended 60 day free trial of Táve at https://www.lightdarkco.com/tave (Lightdarkco.com/tave) When moving to a new market and a new state, Roy traveled to Florida often to meet with venues, take pictures and take notes on what he liked about them and what he thought his couples would appreciate about them too. Then turned them into blogs. A great way to rank up in Google is to update your older blogs too. Updating lists, swapping out photos, writing more copy about the topic, those are all great ways to update your blogs and make them more relevant to Google. When looking for networking opportunities, don't just look for events for people in your industry. But you can look for events that you think your ideal clients would attend. And you may not even meet your future clients at these networking events, but you might meet someone who knows your future client and can tell them about you, this cool person they connected with at this event. Look through local events at https://www.eventbrite.com/ (Eventbrite) and Facebook Events. When you've met people at these events, take them and place them in a spreadsheet. This spreadsheet will have rankings for how well do you know them and how likely are they to introduce you to someone. In networking scenarios, it can be uncomfortable to make those connections, and you should just embrace the uncomfortable. Extravertedness can be a learned behavior. Push yourself to be uncomfortable and make those connections. Having someone else sing your praises is worth so much more than you telling someone that you are the best photographer out there. People trust people they know. When someone has already talked you up to a potential client, all you have to do is show up and not prove them wrong. Mentioned in the show: https://www.fuelyourphotos.com/podcast-archive/ (Fuel your Photos Podcast) https://www.eventbrite.com/ (Eventbrite) for searching for Networking events Roy's Previous Episode on Growing by Removing Services (https://www.lightdarkco.com/podcast/79 (EP #79)) Find Roy at https://www.roythephotographer.com/ (roythephotographer.com) https://www.instagram.com/roythephotographer (instagram.com/roythephotographer) Roy's Facebook Group - https://www.facebook.com/groups/465445598142936 (The Talent Pool) What Are We Loving? What Roy is loving: https://www.universalorlando.com/ (Universal Studios) and all the theme parks in Orlando What John is loving: Movie - https://duck-cymbals-5b5l.squarespace.com/podcast/The%20Adam%20Project (The Adam Project) (Netflix) We record each episode LIVE in our Facebook group and we would love to connect with you there. You can join at https://www.facebook.com/groups/lightdarkpodcast (Light + Dark Photography Podcast Group) on Facebook. Follow us at https://www.instagram.com/lightdarkco (www.instagram.com/lightdarkco) https://www.instagram.com/allheartphoto (www.instagram.com/allheartphoto)
In this Special Report, Richard and Steve reflect on their Predictions for 2022 and cast their updated Web3 Outlook for the rest of the year. Who got the most calls correct? What's next for crypto? Join in to find out. *Disclaimer. Richard Carthon is the Founder of Crypto Current. All opinions expressed by members of the Crypto Current Team, Richard or his guest on this podcast are solely their opinions and do not reflect the opinions of Crypto Current. You should not treat any opinion expressed by Richard as a specific inducement to make a particular investment or follow a particular strategy but only as an expression of his opinion. This podcast is for informational purposes only. ~ Put your Bitcoin and Ethereum to work. Earn up to 12% interest back with Tantra Labs ~ New to crypto? Check out our Crypto for Beginners Step-by-Step Guide to Crypto Investing ~ Follow us on Youtube, Twitter, Instagram, Facebook, LinkedIn, & Tik Tok ~ Want to make ~$25+ a month for FREE? Sign up to get a FREE emrit.io Coolspot today! ~ Want to learn more about cryptocurrency? Check out our educational videos today! ~ Swan is the easiest and most affordable way to accumulate Bitcoin with automatic recurring purchases. Start your plan today and get $10 of free Bitcoin dropped into your account. ~ Want access to cool crypto/blockchain projects that you can use immediately? Check out our partnerships page! ~ Looking to attend a cryptocurrency or blockchain event? Check out our events page! ~ Tune in on Crypto Current TV throughout the week for a 24/7 crypto stream on the latest action on crypto markets, news, and interviews with the industry's top experts! ~ Enjoying our podcast? Please leave us a 5 star review here! ~ Stay up to date with the latest news in cryptocurrency by opting-in to our newsletter! You will receive daily emails (M-S) that are personalized and curated content specific to you and your interests, powered by artificial intelligence. ~ We were featured as one of the Top 25 Cryptocurrency Podcasts and one of the 16 Best Cryptocurrency Podcasts in 2020. ~ Are you an accredited investor looking to invest in cryptocurrency? Check out Crescent City Capital. ~ Earn Interest. Receive Loans. Trade Crypto. Start Today! Learn more about how you can sign up for Blockfi ~ Want to be on our show or know someone who should? Contact us today! ~ We hope you are enjoying our cryptocurrency and blockchain educational content! We greatly appreciate donations, which all go directly towards creating even better educational content. Thank you for your generosity! Buy us a coffee here :)
#033 - On this episode, Mayra talks about how identifying and/or changing our personal standards can shift our actions. Connect with Mayra at https://DebtFreeLatina.com Follow Mayra on Instagram at @debtfree.latina and/or @mayra.alejandra.garcia
We all have things we want to accomplish in life, but having goals or knowing we should be doing something is often not nearly enough to get us to actually sustain our efforts in getting where we want to go.Today on Being Well, Dr. Rick and Forrest Hanson explore how to optimize our motivation. They discuss the brain's dopamine system, and distinguish motivation from discipline and liking from wanting. They then explore how we can align the brain's underlying biological circuitry with our desires, so we can stay relaxed and engaged while achieving our goals.Watch the Episode: Prefer watching video? You can watch this episode on YouTube.Key Topics:0:00: Introduction2:05: Motivation vs. Discipline5:30: Why don't we just want the things we know are good for us?11:00: Creating unity between our biology and cognitive processing15:50: Dopamine: An Overview21:30: Distinguishing liking from wanting25:35: Natural variations in dopamine metabolism28:55: How people with lower levels of dopamine can stay motivated33:35: Updating the reward value of your experiences37:20: Being, doing, and having43:05: What has helped Rick stay diligent and let go of resistance46:40: Practical how-tos for interacting with the dopaminergic system 50:35: Letting fish be fish52:30: RecapSupport the Podcast: We're now on Patreon! If you'd like to support the podcast, follow this link.Sponsors:Join over a million people using BetterHelp, the world's largest online counseling platform. Visit betterhelp.com/beingwell for 10% off your first month!Want to sleep better? Try the Calm app! Visit calm.com/beingwell for 40% off a premium subscription.Try Splendid Spoon today and take meal-planning off your plate. Just go to SplendidSpoon.com/BEINGWELL for $50 off your first boxConnect with the show:Subscribe on iTunesFollow Forrest on YouTubeFollow us on InstagramFollow Forrest on InstagramFollow Rick on FacebookFollow Forrest on FacebookVisit Forrest's website
In this episode of Cyber Safety, Scott Schober, CEO of Berkeley Varitronics, joins host Zack Hack to discuss whether computer and smart phone updates can prevent cybercrime, as well as potential risks linked to printers and scanners. To learn more about ransomware and more about cybersecurity, visit us at https://cybersecurityventures.com
It's HOUR TWO of Jimmy Ott's Gametime live from Fin Bomb! Jimmy starts off the second hour of the show joined by Randy McCay, giving out some picks for the MLB and the NFL Draft. Updating the scoreboard, Jimmy gives out scoresf rom around various leagues. Roscoe joins the show to react to our rewind. […] The post Jimmy Ott's Gametime HOUR TWO 04-27-22 appeared first on 1045 ESPN.
New episodes coming out from Voice of the Streets Podcast on YouTube --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app
In today's second hour, Dom welcomes back in Sam Oropeza, candidate for State Senate in Pennsylvania's 5th district, to discuss an alleged sabotage taking place in his election. Sam tells that he has filed a police report after catching, on camera, a person removing signs as his campaign placed them roadside, explaining why he believes this is theft. Then, Giordano asks for an update on Oropeza's opponent, the brother of his former opponent who had to drop out of the race due to a clerical error. Then, Giordano tells about Dinesh D'Souza's upcoming documentary 2000 Mules, revealing that over half of the mules were located in Philadelphia. Giordano uses this as a launching point to discuss the multiple questions arising about the 2020 election, and tells what he'd hope to see moving forward to help strengthen the integrity of our elections. Then, Giordano discusses the upcoming debates between Pennsylvania's Republican and Democratic candidates for United States Senate, explaining why he believes stronger requirements for entrance into the debate creates a more informed voter, and a higher chance of winning in a general election. (Photo by Getty Images)
People do not talk about divorce they either keep it quiet or close hold as they go through this emotional ordeal. It is important to understand the divorce rate for Americans over the age of 50 has doubled since 1990, an increasing number of divorced people nearing retirement age may find themselves scrambling to solidify their finances as they approach their golden years.Three out of four older divorced people need a better understanding of how to manage their personal finances. While men and women are equally as likely to break good spending habits after divorce, women are more likely than men to take steps to regain their financial health.That's not all, financial planners report their female clients are twice as likely to seek out financial advice after a divorce, find a job, and increase their savings toward retirement. A lack of financial understanding that becomes evident during a divorce illustrates the importance of good financial practices when couples are married. Financial planners participating in the survey said the following steps would have helped their clients who are near retirement age be better prepared for divorce:Understanding how to manage personal finances (76%).Understanding the long-term financial planning consequences of a divorce settlement (73%).Understanding the tax implications of a divorce settlement (57%).Updating wills or trusts (51%).Increasing saving for retirement (51%).Just over one-third (36%) of planners said establishing a prenuptial agreement would have better prepared their clients financially for divorce. There are three components to a divorce—legal, financial, and emotional. The legal aspects of a divorce are complicated, and the emotional upheaval is huge. The financial aspect is challenging because at least one partner may not have a good understanding of the family finances, including retirement savings.Learn about Paul Lawrence Vann's digital Financial Fitness course, it is being offered at a 50% discount throughout the month of April, National Financial Literacy Month, here is the link: https://bit.ly/3dbperG
Foundations of Amateur Radio The lure of digital modes and the opportunities they bring are enough to tempt some amateurs to begin a journey into integrating their radio and computer to make a new world come to life. This isn't without pain or challenge, but the outcomes are so enticing that many embark on this adventure every day. As a person who has made this trip it's heart warming to see the joy writ large on the face of an amateur who makes their first FT8 contact on a home brew wire dipole rigged together on a Sunday afternoon to take advantage of the latest opening on the 10m band. On the flip side, it's heart breaking to see an amateur falter at the first hurdle, attempting to make their computer talk to their radio and giving up because it just won't work. At first this attitude bewildered me in a community of experimenters, but over time I've come to understand that sometimes an analogue approach isn't suited to the digital world. There isn't really a place where you can attach your multimeter and see why the serial connection isn't working, nor is there any universal document that can walk you through how to set things up. So, for you, if you're in a place where you've all but given up, let me see if I can find words to encourage you to keep trying. I'll skip the propaganda about going digital and move straight to making it work. This might come as a surprise, but in the digital world, things are built in complex layers of interdependence. Said in another way, using an analogy, to turn on a light you need flick a switch, which depends on power to the switch, which depends on power from the fuse box, which depends on power from the street, which depends on power from the substation and so-on. If you flick the switch and the light stays off, you need to figure out which part of the chain failed. Did it fail at the bulb or at the substation? If the street is dark, do you need to check the fuse box or the bulb? That's not to say that either, or even both, can also be faulty, but there's no point in checking until the street has power. From a fault finding perspective, the number of variables that you have control over, in the case of a light bulb not switching on, is strictly limited. You can control the bulb and the fuse and in most cases that's about it, the rest of the chain is outside your direct control. In attempting to make a computer talk to a radio you can be forgiven in thinking that the level of complexity associated with such a trivial task is just as direct and straightforward. Unfortunately, you'd be wrong. It's not your fault. A popular slogan "Plug and Play" made people think that computers were easy to use and control. The truth is a far darker reality. One of the hidden sources of frustration in the digital world is the extreme level of complexity. In our quest to standardise and simplify we have built a fragile Jenga tower of software that can collapse at any point. Most of the time this is completely invisible but that doesn't cause it to be any less real. Computers are simple, but only if you control the environment. And when I say control, I mean take ownership of each change. Updating the operating system? Installing a new application? Adding a new peripheral? Changing location? All these things, innocuous as they might seem, can fundamentally alter the behaviour of your environment. As an example, consider the location of your device. Let's say that you changed the location of your computer, either physically or via a preference. All of a sudden your Wi-Fi network stops working. The one that you used for years. Turns out that changing location changed the Wi-Fi driver to stop using a particular channel, not permitted in your new location. If you're curious, this happened to me last week. The point being that troubleshooting is about controlling change in that fragile environment. So, when you're trying to figure out how to make your serial connection work, you need to stop fiddling with everything all at once and change one thing at a time. Discovering the layers of dependency makes this difficult at times, but not impossible. For example, a working serial connection requires that both ends are physically connected, speaking the same language at the same speed. That depends on the radio being correctly configured, but it also depends on the computer having the right drivers installed. It also depends on the software you're using being configured correctly to talk to the right serial device and the operating system giving your software permission to do so. It depends on the software using the right radio mode and it depends on the radio being switched on. Now, imagine the serial connection "not working". Do you check the radio mode before you check if the radio is turned on? What about the physical connection? When you're troubleshooting, you cannot just look at the error message on the screen and follow that path. You need to ensure that all the underlying things are working first. You don't check the bulb until there's light in the street. Same thing. No need to worry about the error until you've discovered that the radio is on, the cable connected correctly, the driver installed correctly, the speeds set right and the mode configured properly. If and only if that's all correct, then look at the error. This becomes harder if it worked yesterday. What changed between then and now? Did your operating system do an update? Did your radio forget its settings? Did the cat jump on your desk and dislodge a cable overnight? Is there an earth fault that caused the serial connection to cease working? Sometimes, despite your best efforts, you cannot find the problem. At that point you need to take a step back and think about how to prove that something is working in the way that you think it is. Multimeter to a light bulb to check continuity - style. In the case of a serial connection, what can you use to test the link if your favourite tool doesn't work or stopped working suddenly? I've said this before, but it bears repeating, since it's not obvious. Troubleshooting is all about discovering and controlling change. Pick one thing to test, prove that it's correct, then pick the next. Eventually you'll come across a "Duh" moment. Don't sweat it, we've all been there. Now do it again! What's your best troubleshooting moment? I'm Onno VK6FLAB
Did You Hear About the Latest Rip-Off? Non-Fungible Tokens (NFTs) Are Already Losing Steam! [10:54] How Law Enforcement Tracks Bitcoin! It is Absolutely NOT Anonymous [20:05] The FBI Is Actively Removing Malware From Private Machines -- Without The Owner's Permission [29:10] Why and When You Shouldn't Trust QR Codes [41:08] Cybercrime in Russia Tracked to a Single Office Building in Moscow! [52:29] The Newest Phishing Scams [01:01:32] Using Wordpress? How Supply Chain Attacks are Hurting Your Business Website [01:10:43] Cybersecurity Tools You Should Be Using! Jam packed today. We're going to start with non fungible tokens. If you don't know what those are, this is a very big deal because so many people are investing in them right now. Are they really investments? I've got a bit of a blow back here. Most people think that Bitcoin is anonymous. We're going to talk about how it absolutely is not. [00:00:20] We're going to talk about anonymous. In fact, the Russians, Microsoft, what they're doing against the Russians and this little comedic thing about cars. [00:00:28] NFTs are very big deal. [00:00:31] I'm going to pull up here on my screen right now. This is a picture of Mr. Jack Dorsey. We'll go full screen, an article from a website called CoinDesk. CoinDesk is one of these sites that really tries to track what's happening out there in the Bitcoin community. Of course, nowadays it's much more than Bitcoin. [00:00:53] Isn't it? We're talking about all kinds of. Different currencies that have a blockchain backend. They're called cryptocurrencies basically. But the big one was of course, Bitcoin. And there is a whole concept. Now, when we're talking about things like cryptocurrencies and these non fungible tokens. People have been investing them in them. [00:01:19] Like crazy people are making millions of dollars every week. Now, remember, I am not an investment advisor and particularly I'm not your investment advisor. So take all the. To your investment advisor. I'm not telling you to buy them. I am telling you to be cautious here though, because these non fungible tokens are designed to give you the ability to be able to just, own something in the digital world. [00:01:48] What might you own in the digital world? We've had a lot of different stuff. We've seen some just crazy monkey things. Have you seen those? These little pictures of monkeys are. Graphic designed and it's all animated. If you will. It's like cartoons and people pay money for them. One of the things that people paid money for was the rights to the first tweet ever on Twitter. [00:02:16] So that's what you're getting. When we're talking about an NFT on a non fungible transaction, it is now yours. So this particular NFT we're talking about was of our friend here, Jack Dorsey. We'll pull it up again, this article, and he had a tweet that was sold last year for $48 million. That is a lot of money. [00:02:43] So people look at this as an investment, but it's not the same as hanging art on the wall. You've got a Picasso that has some intrinsic value. It's a painting. It has all the oil paint on that, it was designed by and painted by a crazy man years ago. And you can take that Picasso and you can. [00:03:07] Turn it around and sell it. It has some real value. If you own the rights to something, let's say it's one of these monkey pictures. It reminds me of a postage stamp and you paid real money for it. Some of these things are going, as I said, for over a million dollars and this Jack Dorsey first tweet went for $48 million. [00:03:27] So let's say that's what you did, right? You bought this thing for $48 million. Really? What do you have? Because anybody can go online and look at that tweet. Anybody can print it up and stick it on a wall. Anybody can go out and get that picture of the monkeys right there. The guy drew, and you can look at it. [00:03:51] In fact, I can pull it up right now, if you want to do. But people paid real money for that. So they've got what really? What do they have? You can't take it off the wall, like you're Picasso and salad, right? Or Banksy, if you're into the more modern art, it's just not. What is doable? How do you make this work? [00:04:12] Only the NFT only gives you bragging rights in reality. That's what it does. You have bragging rights because you could take that digital picture and make a hundred quadrillion copies. Yeah, you'd still own the NFT you would still have in the blockchain for whatever NFT company you're using the rights to it. [00:04:37] They would say this, you owned it. So let's talk about the blockchain behind it. There are a lot of companies that are trying to give you that. Okay. All right. I get it. Yeah, I get to to own it. But who's running the blockchain behind it. Who's validating that you own it with Bitcoin and many of these other blockchain currencies that are out there. [00:05:04] There are various. Companies and individuals who are registered, who have all of the paperwork, if you will saying who owns, how much of what, and who paid, who and everything. And that by the way, is why it takes so long for some of these Bitcoin and other transactions to occur. But how about the NFT? There are tons of companies out there that say they will certify the NFT. [00:05:34] So it gets to be real problem. And when we get into this Jack Dorsey tweet and this article about it, which are will, let me pull it up again here for you guys. This guy, Sina S bought the very first tweet ever from Twitter founder, Jack Dorsey for $2.9 million last year. And he decided that he wanted to sell it. [00:06:03] So he listed it for sale again at $48 million last week. Real. He put it up for open bid and this article and CoinDesk is talking about that. And you can see that if you're watching me on rumble or YouTube, I'm showing you my screen here right now. But this Iranian born crypto entrepreneur named of again. [00:06:28] As TAVI purchased it for $2.9 million in March, 2021. Last Thursday, he announced on Twitter where out, that he wanted to sell this and Ft. And he said, Hey, listen, I'm going to put 50% of the proceeds to charity. The auction closed, this was an open auction. People could go and bid on it and head auction closed. [00:06:55] With an offer of basically $288, $277 at current prices when this article was written $277 and the lowest bid was $6. And as I recall, this is not in this article, but there were only. I handful of bids. Like when I say handful, I mean a half a dozen beds. Crazy. This is a real problem because the deadline is over. [00:07:27] He paid how much for it, right? How much did he pay? Pull that up again. $2.9 million last year. And his highest bid was in the neighborhood of $280. Isn't that crazy. So did he get money on this? Did he win money on this? I don't know. I'm looking at those saying is it worth it to buy something like that? [00:07:54] That you might think, oh, the very first apple computer, an apple. While that's going to be worth some serious money. Yeah, it is. It's something, you can grab onto, you can hold onto it, it's something and you can sell it. You can trade it. You can take a picture of it. You can't make digital copies of it. [00:08:15] You, you, it's a physical thing. That's worth something. Same thing with that Picasso on the wall, it's really worth something that has some basic intrinsic value. Jack's true tweet. The very first tweet. How much is that thing worth? It basically nothing. So the tweet is showing he'll pull it up on the screen again that he's selling ad Jack 2000 6 0 3 21 at eight 50 14:00 PM. [00:08:46] Just setting up my Twitter. So there you go. There's Jack is very first to. And it's absolutely amazing. Is it worth it? Let me pull up some other stuff here for you guys. I'm going to pull this up here is Coinbase launching an NFT marketplace in hopes of appealing to crypto on mainstream users. So here's some examples from a man and FTEs. [00:09:11] I'm going to zoom in on this for those of you guys watching on rumble or on Twitter. All right. Mean. Yeah actually you can see it on Twitter too, but YouTube, here you go. Here's some NFTs it's artwork and it's a creature. So you can buy creature number 7, 8 0 6 right now for six Eve. So let me see. [00:09:34] Value of six. Ethereum is what ether, M two us dollars. So for 3000. And $84. As of right now, you can get a crappy picture that even I could have draw okay. Of this guy and look at all of the work this artist has put in. There's how many of these up here? 1, 2, 3, 4, or five, 10 of them. And it's the same head. [00:10:03] Each time it looks like this almost the same eyes. He changes colors and he's got different background. It's absolutely not. So that's what they're trying to do right now, trying to sell these NFT. So who's going to buy that. Who's going to pay $3,000 for artwork that hunter Biden could have done with a straw. [00:10:25] Anchored around. Here's another one. This is from ledger insights. NBA's launching dynamic NFTs for fans, baseball cards for the NBA that are basically just worthless. They're NF. Non fungible tokens. It has taken the crypto world by storm and people are losing millions as you look, but it really is changing the e-commerce world. [00:10:54] Bitcoin blockchain. All of the rage, a lot of people are talking about it, but I got to say most people who are talking. I don't know much about it. And when it comes to anonymity, Bitcoin is probably the worst thing you could possibly do. It's amazing. [00:11:12] There are a lot of misconceptions out there when it comes to technology, you have almost any kind of technology and blockchain and Bitcoin are examples of a very misunderstood technology. [00:11:25] Now I'm not talking about how does it work? How are these ledgers maintained? How does this whole mining thing work? Why has Chan. Bandit. Why are a lot of countries going away from it, one country. Now the dictator said, yeah, we're going to use Bitcoin as our we're official currency. In addition to the U S dollar what's going on. [00:11:48] It is complicated behind the scenes. It's complicated to use. Although there are some entrepreneurs that have made some great strides there. I saw a documentary on what has been happening in that one country. I mentioned. They are able to pay in us dollars using Bitcoin. So they'll go up to a vendor on the street. [00:12:13] Quite literally they'll have their smartphone with them. The vendor has their smartphone. They type in 15 cents for the taco and a hit send. It goes to the other person and they have 15 cents worth of Bitcoin. By the way, these types of micro-transactions with the way Bitcoin is structured behind the scenes, make things even less manageable in the Bitcoin world than they have been in the past. [00:12:40] And that's why in case you didn't know, Bitcoin is making some major changes here fairly soon. They've got to change the way all of this ledger stuff works because it takes too long. To record and authorized transactions. And these ledgers just get way too long when it comes to all of these kinds of microtransaction. [00:13:04] So there's stuff going on, Bitcoin, there, there are many of these types of currencies out there. Theories comes one. You've heard about doge coin because of course that's Elon Musk has been talking about and many others and they're all different somewhat, but the main concepts are the. One of the big concepts, I'm going to pull an article up here on the screen for those watching on YouTube or also on rumble. [00:13:30] But this is an article from our friends at wired magazine. And now you have subscribed to wired for many years. This particular one is about what wired is calling the crypto. Trap now that's a very big deal. It is a trap and it's a trap and a lot of different ways. And that's what we're going to talk about right now. [00:13:56] Crypto is not what its name implies. A lot of people look at it and say, oh, crypto that's cryptography. That's like the German enigma machine in world war two and all of this new, great crypto that we have nowadays. And there are some pretty amazing new cryptographic technologies that we've been using, but no, that's not. [00:14:17] What's really going on. You see the basic premise behind all of these technologies is the concept of having a. And this wallet has a unique identifier. It has a number assigned to it. So if I'm sending money to you, I'm going to have your wallet, ID, your wallet number, and I'm going to now send you some amount of fraction, most likely of a cryptocurrency and it's certainly if it's Bitcoin, it's almost certainly a fraction. [00:14:49] And so I'm going to send you $100 worth of, let's say. What ends up happening now is these ledgers, which are public, are all going to record the Craig's sent you a hundred dollars worth of Bitcoin. Of course, it's going to be in a fraction of a Bitcoin. So sometimes there's rounding errors is not going to be really exactly a hundred dollars. [00:15:12] Plus there's the amazing amount of. Tivoli volatility in the cyber currencies. So even though I meant just hitting a hundred dollars, mine ended up being 110 of it goes up. It might be 90. If it goes down you get that. You don't understand how that works. So the problem now is I have sent you a hundred dollars. [00:15:33] And public ledgers that anyone can gain access to now say wallet number 1, 2, 3, 4 cent, a hundred dollars, two wallet, number 5, 6, 7, 8. Obviously the wallet, our bruises, a lot longer than that. So then it's fine. And there's a degree of anonymity there it's really called pseudo anonymity because in reality, it's not completely anonymous because people know the transaction occurred and they know the wallet numbers. [00:16:03] Correct. It's like a bank account, and if I'm putting money into your bank account, that bank account number knows that the money came from a check that I wrote. Can you imagine that someone writing a check and that check I had a number on it, a bank account number, right? So it can all be tracked while much. [00:16:19] The same thing is true when it comes to cryptocurrencies, these cryptocurrencies are in public ledgers and those public ledgers can be used with a little bit of work to figure out. Who you are. So this article here from our friends at wired gets really hairy. And it might be of interest to you to read, but this is talking about a take-down that happened, and this is a massive take down. [00:16:51] This take down was of a whole group of people who were involved in some really nasty stuff. In this particular case, what it was kitty. Just a terrible thing and the abuse surrounding it. So this logical goes into not a lot of detail. I'm not going to read it because here on the air, because I don't want to upset too many people. [00:17:15] Cause it's some of the details of this evening to think about them are incredible. But. This the police broke into this middle-class suburb home in the outskirts of Atlanta. And he there was Homeland security. It was a guy from the IRS and they came in, they took all of their electronic devices. [00:17:38] They separated the family, putting the father who is an assistant principal at the local high school assistant printers. And he was the target of this investigation. So they had him in one room, they had his wife and another room and they put the two kids into a third room and they started questioning him. [00:18:00] Now, this is part of a takedown of a, as I said, a whole ring of these people, including this assistant. Principal at a school. Can you believe that? So this IRS guy had flown in from Washington DC to have a look over what was going on, but this agent from the IRS and his partner whose name is let's see, his name was Jenn S Scouts. [00:18:26] I probably got that wrong. And Tigran GAM bar Yan, Cambodian, and they had a small group of investigators and they were at a whole bunch of different federal agencies, not just the IRS. What once seemed to be. Untraceable was no longer untraceable. Now I've talked on this show before about a lecture I went to by the secret service about how they had tracked down and shut down the world's largest website that was being used to sell illegal materials online. [00:19:01] And it's fascinating what they did. But frankly, they're calling this particular boss to proof of concept and that's why they are IRS was in on this as well, but it was huge. Here's a quote from the IRS agent in this wired magazine article. He's saying he remembers how the gravity of this whole thing. [00:19:21] Let me pull this up on the screen too. So you can read along here, but this was a high school administrator, a husband, and a father of two, whether he was guilty or innocent. The accusations, this team of law enforcement agents were leveling against. There are mere presence in the home would almost certainly ruin his life. [00:19:44] And he, as well as these other people were counting on anonymity from Bitcoin. Now, obviously I'm glad they got taken down, but listen, folks, if you think that it's safe, that it's anonymous, it ain't Bitcoin just ain't there. Craig peterson.com stick around. [00:20:05] I've been blamed for really complaining about people not updating their software. And that includes things like firewalls. The FBI has stepped in and they are going ahead and doing updates for you. [00:20:21] What should we be doing as a country? [00:20:26] People are. Updating their software. They're not updating their hardware. And particularly our hardware take a look at what's been happening with the firewalls and the firewall concerns. Everybody has some sort of firewall will almost everybody, but enough people that we can say, everybody has a firewall, you get your internet from you, name it. [00:20:50] And because of the fact they're using something called Nat network address translation, they've got some sort of firewall in front of you. So for instance, You've got your phone, right? You're using your phone and it's got internet on it. You're going through whoever your carrier is. And that carrier is giving you internet access, right? [00:21:14] They don't have enough IP addresses, particularly IPV four, in order for you to get your very own unique little address out on the. No they do. When it comes to V6 things a little bit different, but your device is not completely exposed on the internet. Windows comes to the fire. And by default, the windows firewall is turned on. [00:21:35] Now this gets more than a little concerning because that firewall that's turned on. Isn't really doing anything because I've got a firewall turned on and yet every service is accessible from outside, which is defeating the purpose of the firewall. Again, it's a complaint I've had about Microsoft now for. [00:21:55] Decades, which is they have features that are just check boxes. Yes. Yes. It's got a firewall. Yeah, it's turned on, but the features don't work. So having a firewall and having everything open defeats the purpose of a firewall max do not have a firewall turned on by default, but they do have their services to say. [00:22:18] Which is just as effective if not more effective. So one of the things we advise people to do is go into your windows system, into the firewalls and your security settings, and turn off any services that you're not using. If you're not sharing file systems, then turn that off. In other words, You're mounting the G drive or whatever you might call it from another computer, then you don't need it. [00:22:44] If you're not as server for what's called SMB, then you don't need to share it. So turn off everything that you don't need. That's going to happen is one of your programs isn't going to work, right? And the, what you did last year, you're going to turn it back on and you can do a lot of research online to find out what they are. [00:23:04] We have over 200 settings that we change in windows. When we get a customer. Now on the Mac side, you can turn it on. I liked turning it on. I liked turning off the ability to see my machine. So in other words, the ability to be able to. So I turned it on and I enable specific services. And again, you can do some research on that. [00:23:30] I've got an improving windows security course that people have taken, and we should probably do that again, if not just have some free webinars on how to do this. So you guys can learn how to do it, but not that hard to do. Anyhow, bottom line is. People aren't updating their computers, even the Macs and windows. [00:23:51] We have a client that would just started a new client and we're tightening things up and we've been finding Mac computers that are major multiple major revisions behind. And that to me is shocking. Apple Macs are just so easy to update. It is extremely rare that an apple update will make your computer break unlike in the windows world, where it's pretty common. [00:24:17] So windows guys, I can understand, but your even more exposed, your bigger target, you need to keep up to date. So how about all of the other equipment that we. I've had warnings again and again, with you guys about what's happening with our smart devices that are out there, right? Our security cameras we have up in the corner, right? [00:24:41] We have these smart thermostats, people are using the list goes on and on of all of this equipment that we're using that is exposing us because when was the last time you have. How about the firmware in your router or your wifi, right? Some of the devices that I recommend to people, and if you have any questions, just email me and email@example.com. [00:25:05] I can give you recommendations, even if you're a home user. Although my business obviously is working with businesses on what kind of wifi to buy, what you should get, what you should do. I don't charge for any of that stuff. Okay. You get it. But you have to ask. Me@craigpeterson.com. So you get this information and you go ahead and you buy whatever it is, but you don't keep it up to date, which is why I tend to only recommend stuff that automatically updates. [00:25:33] But that also means every few years you're going to have to replace it because unless you're using the good Cisco equipment where you can get a seven year life out of it you're not going to find that in consumer grid. So what's happened here. I'm going to pull this up on my screen for people watching this on YouTube or on rumble. [00:25:52] But here is a thing that came straight out of our friends here from the FBI. This is from CSO. This is a a magazine that I do follow. But they're talking about what they call psych clock. Blink. So the article says for the second time in a year, the FBI has used search and seizure warrant to clean malware from devices owned by private businesses and users without their explicit approval. [00:26:25] The FBI used this approach to disrupt a botnet, believed to be the creation of right. Government hackers. So the calling this SYEP clock cycle clubs, blink malware discovered earlier this year. So here's the problem. What do you do if you're the federal government, how do you try and keep your country safe? [00:26:51] Now we know. We've got these military contractors. They make missiles that take out missiles, right? The provide defensive systems. You've heard of iron dome from years ago, all the way through all of the current stuff. That's what they do, but what do they do? What can they do when there's a botnet? A botnet is where there are multiple computers in this case, probably tens of thousands of computers located in the United States that are acting like sleeper. [00:27:21] They sit there and they wait for commands as to what they should do. Should they try and attack a machine? Should they try and spread more? Malware, what should they be doing? And the, these things are vicious. They are absolutely nasty. And in this case, we're looking at Russian malware. So Russia effectively like the Americans. [00:27:44] You might remember that TV show. It was great show, but that. Computers that are owned by you and me and our businesses and government agencies that are under the control of the Russians. Now you don't even know it. You're using your computer. You're playing games. You're going to Facebook, whatever it is you do on your computer. [00:28:06] Your computer is under command and control of the Russians. So the FBI goes to a court and says, Hey, we've got to go ahead and shut this down. We need a warrant. They get the warrant and the search and seizure warrant lets them now. Get on to these machines that are part of the bot net or the controlling machines for the bot net, and either remove the malware or go ahead and take control of the botnet themselves. [00:28:34] So it can't be used. And by the way, our friends at Microsoft they've gotten involved in this too, which is really frankly, cool in shutting down some of these botnets, Hey, I want to encourage everyone. Take a couple of minutes, go to Craig peterson.com/subscribe. That's Craig Peterson. CREI G P T R S O N. [00:28:57] And subscribe, and I'll be sending you a special report on passwords. Plus two more. I send out the most popular special reports that anybody has ever asked for. [00:29:10] Hey, I've got a little bit more to discuss on what's happening with Russia and Microsoft and more, but I'm also going to talk about QR codes. There is a great explanation. That's in your newsletter from Monday about why you shouldn't trust 'em. [00:29:26] Let's finish up this Russian thing. And then we're going to get into why you cannot trust QR codes and a brand new way. [00:29:36] The bad guys are using QR codes to really mess with us. Now, if you're watching over on either YouTube or on rumble, you'll see this. Let me pull up my screen for you. But here we go. Okay. This is very interesting. Then the last segment, we talked a little bit about what our friends over at the FBI had been doing, which is they have been removing malware from people's computers because people haven't been keeping their computers up-to-date right. [00:30:11] Part of the botnets. So we explained. At the FBI, isn't the only one out there trying to stop these Russians and the hackers anonymous has been very big at it. In fact, let me pull up this other article. This is from security affairs. And here we go. And it's talking about this whole army of these anonymous hackers. [00:30:35] Now none of us have been a nightmare for many businesses that they didn't like. I had an anonymous we'll go ahead and they'll do usually pretty basic stuff. They'll do denial of service attacks and some other things, so they don't like you because of. The don't say gay bill in Florida, and, without bothering to do any research, they'll just start attacking organizations that support it, or organizations that don't support it depending on how they want to do it. So this is an interesting article here, because it's talking about these various. Websites that they've hacked. Now, some of them are government site and some of them are private industries. Now, one of the cool things, bad things about hacking private industry and releasing the emails is now the competitors to these businesses know what they're doing. [00:31:31] And in some cases there's proprietary technology that's being released. Now, when it comes to Russian proprietary technology. The Western world doesn't care a whole lot about some of it, but here's some examples of what these hacktivists of GoDaddy. This is a company called forest 37,000 emails stolen from the company, Russian logging and wood manufacturing firm. [00:31:55] Again, it would give a little bit of an idea into the whole Russian, what are they doing? In the forest industry. This one, I think is a little more concerning for the Russians Aero gap. This is an engineering company that focuses in the oil and gas industry. Their clients include a whole bunch of Russian companies. [00:32:15] They've leaked approximately 100,000 emails from Aero gas. That is a huge deal because so much of the country's revenue, the number one industry in Russia is oil and gas. Petro Fort one of the largest office space and business centers in St. Petersburg, the hackers have leaked approximately 300,000 emails from Petro fork. [00:32:41] Again, you can use that to find out what's happening in your economy. What. Doing how are businesses doing? Are they going to go under so you can see some tweets here. I've got them up on my screen on YouTube and rumble anonymous. What they're saying that they've done and you can follow anonymous directly on Twitter. [00:32:59] Particularly fond of them. They've done a lot of things that I disagree with. This is really telling us about a whole new approach to warfare, right back in the day, you and I couldn't get involved, we could potentially take up arms and go and fight right there and think about the Spanish American war. [00:33:18] Think about what's happening now in Ukraine, where Americans have just gone over there. Taken up firearms in order to help them defend Ukraine. People who are maybe of Ukrainian descent, maybe not right. We have never seen this type of involvement by average citizens because anonymous is not like some big fancy company or government agency anonymous is a bunch of people who are trying to be anonymous and do something. [00:33:50] So they stole 145 gigabytes. Look at this. It's just crazy. So he. The anonymous Twitter thread itself, right? Talking about what. It's absolutely incredible. Incredible. So that's what anonymous is up to. They are hacking Russia and they're hacking Russia in a big way. Now, next stop. We have our friends at Microsoft. [00:34:15] Microsoft has been seizing Russian domains that they are accusing of having been linked to these Russian hackers that have been going after think tanks and government agencies in the U S and the. He knew, I shouldn't say which I'm sure includes the UK cause UK has gotten involved. So this article from the verge is talking about how Microsoft has seized seven domains, belonging to fancy bear apt 28 which is we've seen them active in a number of companies here, right in the Northeast United States. [00:34:57] These companies who are. Trying to provide materials, software, hardware for government contracts, right? So they're not even direct government contractors for the feds. They are just a sub contractors. And then we've seen fancy bear in there. We've seen the Chinese in these companies. It's incredible. [00:35:19] They have no. DIA that all of their intellectual property is being stolen, which is why the federal government has started cracking down on contractors and subcontractors and the, this whole paragraph 70 12 thing. We're getting geeky here, but companies that have to protect even unclassified information, confidential, classified, and they haven't been so Microsoft. [00:35:46] Obtained a court order. You can see this on my screen, over at YouTube and at rumble to take control of each domain on April six, that then started redirecting them to a sinkhole. So what they do is they take control of the DNS for the domain. So the root name servers, now, point to a Microsoft name server, and then send them to a sinkhole. [00:36:09] A sinkhole is basically nowhere you go there. There's nothing on the site, right? Or in this case also servers used by cybersecurity experts to capture and analyze malicious connections. And they'll do this. Oftentimes, when we're talking about these botnets, like we talked about a little earlier today, so apparently they're trying to establish long-term access to the system. [00:36:33] So the targets, what did we just talk about? Long-term acts. But net, right? That's what button that saw. So Microsoft has gotten involved. They've been doing this now for a little while. It's obviously not their normal business model, but it is something that they've been doing. They were also, by the way, the fancy bear link to these cyber attacks on the DNC in 2016. [00:36:57] And they also targeted the UFC election in 2020, which is why, part of the reason why anyways, don't use electronic equipment for our elections, have paper ballot, have people count those ballots yet it takes longer. You can't have the instant thing on TV, which is why all of these new services, they all don't do that. [00:37:18] That's ridiculous. But it's the only thing we can guarantee that these guys, like I got it up on the screen again. Fancy bear the Chinese et cetera. It's the only way they can get in. And if we were doing paper ballots and we had bipartisan people counting the ballots and independence, counting the ballots, observing this, we wouldn't have all of these problems that we had with the last election where people were saying it was stolen. [00:37:48] It was hacked. How do we know it was stolen? How do we know it? Wasn't stolen? How, go back to paper ballots, get rid of the scanning machines and particularly get rid of these electronic voting machines where you touch the screen to cast your vote. Those things are ridiculous. What if there's a software bug in it? [00:38:06] How can you go back and change the vote? People that complained about it again, and wait a minute. I voted for this guy and you had to record my vote for the other guy. It's ridiculous. Anyways. Back to QR codes. Okay. I'm going to pull this up on this screen because I think this is a cool article here. [00:38:25] This is from a, actually a site over in India. It's called scroll.in, and they're talking in here about how hazardous it can be. To use QR codes. Now they're not saying don't use QR codes, we've all had to use them. I've got up on my screen, this picture of being at a table. And you scan the QR code in order to get the menu. [00:38:48] In order to order, I did that. I was in Vermont and we were riding motorcycles or buddy, and I go into the little tiny. Restaurant, small restaurant and I had a half a dozen tables and they didn't have menus. You scanned it, the QR code that was there on the table and you placed your order. And off it goes a lot of places they've been doing that with menus. [00:39:11] You've seen that more and more saves them money as well and lets them change their prices more frequently. Yeah. Thanks for that inflation guys. Why shouldn't you use these QR codes? Why should you be extra careful? Here's the answer. QR codes are the URL of a webpage. That's the bottom line. Would you click a random URL that came in an email? [00:39:37] Would you click on a random URL in an ad or on a web page? We certainly know better than to cook URLs in our email. But that's exactly what the QR code is. And on top of it, the URL in a QR code tends to be what we call a shortened URL. So it might be Bitly, so might be bit.ally/and then some random characters. [00:40:04] How do you know where it's going to take? You don't all you know, is it's going to take you to Bitly, but that Bitly URL could be sending you to a malicious site. And now your phone could be hacked. It could be using your phone for Bitcoin mining for who knows what. So be very careful and the bad guys are using these in a different way that you might not have seen before, which is they are embedding QR code graphics. [00:40:34] Into emails. And they're thinking that people are going to hold up their phone to the email and what are they going to do? They're going to scan the QR code that was in their email. And now they're in trouble. Yeah, that's simple. Hey, visit me online. Craig peterson.com. Make sure you sign up for my newsletter. [00:40:53] Craig peterson.com/subscribe course, Craig Peterson, S O n.com. And I'm going to send you. Top three special reports, absolutely free. We got to take care of these bad guys. [00:41:08] This is a big deal, quite literally a big deal. Russian malware. We have been able to track it down now, track it down to a single site. Yeah. All of these bad guys are in one building in Moscow. [00:41:25] Hi everybody. Of course, you're listening to Craig Peterson. Thanks for taking a little bit out of your day today. As we continue to really talk about the stuff that's most important in the world, and there could be nothing more important, I think, than some of our cyber security, our lives, our fortunes, et cetera. [00:41:44] Last year we have to pay attention to well, This is a very big story and it's a bit of a scary one as well. We've had a lot of ransomware over the years and a lot of ransomware. Have you had it yourself? I bet you, if you haven't, someone who has had ransomware because frankly it is pervasive in every aspect of pretty much everybody's life out there. [00:42:12] So when you get hit with ransomware, Lately something a little different has happened. It's really gone through three phases. The first phase was the ransomware would get on to your system. Usually it came as an attachment, probably embedded in like a word file it's been embedded in PDFs, embedded in all kinds of stuff. [00:42:35] Even drive by downloads on websites, have brought malware. But in this case yeah, it was annoying. It was a problem. It would give you a red screen. You've probably seen it before warning about the ransomware and it told you, okay, here's what you can do to get your files back. And in order to get your files back, you usually. [00:42:57] To go to some exchange online, take dollars, buy of course, Bitcoin, or some other cryptocurrency. And then that cryptocurrency would be used in exchange now for you to get a key that would hopefully decrypt everything. And in reality, it often didn't encrypt hardly anything. So it's been a problem and a problem for a lot of people. [00:43:23] The FBI said that at the time. So this is a gen one of ransomware. You were lucky if 50% of the time you got all your data back, gen two of ransomware is when the bad guys started getting a little bit smarter. They didn't just take your files. Thumb and then say, Hey, pay up buddy. What they did at this point is that got onto your systems and they poked around. [00:43:46] They went we call in the industry, east west on the network. So they got onto you, maybe your kid's computer may, maybe you were hooked up via VPN to the office to do work. And it wasn't a great VPN. And the kid's computer had that virus and that virus weaseled his way all the way over the VPN, directly to the office, because remember. [00:44:09] VPNs are. A network private in that. Yeah. Okay. It's encrypted. And so someone who's got a wire tap isn't necessarily going to get anything, but it's a VPN, it's a tunnel. And that tunnel was used a many times for malware, like brand summer to creep over to the office network. That's an east west is going from. [00:44:30] One machine to another machine. And in businesses, man, you saw that one a lot as that ransomware moved around. So that was the second one. So the rents were going on the machine. It would then look for files that is. You might not want to have exposed. So it looked for files with bank account numbers in them, social security numbers, maybe intellectual property. [00:44:57] We saw a lot of that. Theft is continuing to go on primarily from the Chinese and then an intellectual property theft. And what happened next? While of course it ended up moving the data, the files, and then what they would do. It's encrypt your desk. So before they gripped your desk, they got copies of all of the stuff they thought might be important to you. [00:45:20] So now the threat was in version two of ransomware pay up, or if you don't pay up, you are going to have to pay us to not release your files. If you didn't want all of that client information online, if by law, you would get nailed for having that client information out online. And that's true in most states now, and the federal government's from putting some teeth on some of their laws as well, then what are you going to do? [00:45:49] Yeah, you paid the. So that was version two version three that we're seeing right now of ransomware is simply destructive. And if you go way back in history, you may remember I got hit with the Morris worm, which was one of the first pieces of nastiness out on the internet. And that was early nineties. [00:46:13] My business that I owned and was running, got hit with this thing. Even before that, There was ran. There was a nasty where viruses, if you will, that would get on the computer and destroy everything. It was just a malicious, as I remember, somebody at UC Berkeley, some researcher in it. And he didn't like what that of the researchers were saying about him. [00:46:35] So he put some floppy disk together and on them, he put. Erasing malware and shared all of the stats with anybody. And of course, you plugged that disc into your, that little floppy disc into your windows computer. And it says, okay, I'm going to go ahead and open it up. And, oh, look at this, a virus. [00:46:56] And so he then wiped out the computer of everybody else. That was a competitor of his out there in the industry. Yeah, a little bit of a problem if he asked me, so how did that end up getting around? What ended up happening while everybody got really upset with him, nobody really found out what was happening, who did it, et cetera. [00:47:19] That's what's happened. Now, so version three of malware is like some of the very first malware we ever saw version three of ransomware. So some, again, some of that very first ransomware was pretty nasty is not the sort of stuff you want to see running destroying files, but at least you could get back from a. [00:47:40] Nowadays, a lot of people are doing backups by attaching a disc directly to their machine, or they're backing up to another machine on the same network. Remember that whole east west thing, you didn't want the data going back and forth, it causes problems. Yeah. So what happens now? The Russians apparently are just trying to cause havoc with businesses, anybody who has decided that they're going to be anti-Russian in any way there they're attacking. [00:48:13] So they'll, reraise your desks. They'll erase all of your data. If you have backups on that thumb drive or that USB external. The good news erase that if you have backups on another machine, on the network, hopefully from their standpoint, there'll be able to get onto that machine and erase all of your backups, which is again, why we'd like 3, 2, 1 backups. [00:48:34] At the very least, there's some others that are even better. And if you're interested, send me an email firstname.lastname@example.org. I'll send you a webinar that I did on this. I'm not charging you for. But it was a free webinar to begin with what a webinar on backup and how to backup properly and why to do it this way. [00:48:54] Again, me, M E Craig peterson.com. Be glad to do that. What we're seeing now is a huge problem. Let me see if this is going to work for us. Yeah. Okay. It is. I am, by the way, live here we go on my computer. So people who are watching. I can see my desktop. So here we go. This is Russian companies who are linked to this Russian malware. [00:49:24] Ransomware are hiding in plain sight is what they're calling it. So what does it mean. To hide in plain sight. While in this case, what it means is money that's been paid by American businesses to these Russian ransomware gangs, some of who by the way, are actively going after anyone that criticizes Russia found these American researchers. [00:49:50] Yeah. Led to one of Moscow's most prestigious addresses. You can see it up here on my screen. This is a New York times article. It's just a random actor, journalism people, sometimes even the New York times gets it. And they're saying millions of dollars have gone through this. So they've been tracing. [00:50:10] Where did they go? The Biden administration has also apparently zeroed in on the building is called Federation tower east. It's the tallest skyscraper in the Russian Capitol. How would that be to have a business and just this beautiful tall skyscraper and have a view that would be really cool. So they have targeted some companies in the tower. [00:50:32] As what it's trying to do is stop the ransomware guy gang. Maiden cryptocurrencies. Russian law enforcement usually has an answer to why don't you just shut down these bad guys that are out there trying to steal all of our money. They say there is no case open in Russian jurisdiction. There are no victims. [00:50:51] How do you expect us to prosecute these honorable people? That apparently is a quote from this Massachusetts based secure cybersecurity. Called recorded future, but I'm looking at a picture it's up on my screen right now. You guys can see it, but this is the Moscow financial district called Moscow city. [00:51:10] 97 floor Federation tower east. This is really pretty, you wouldn't know this isn't like London or any other major European capital. There's some cranes in the background building up new buildings. The cyber crime is really fueling some growth there in Moscow, which is, if you ask me the exact reason why lad is happy as a clam to just go ahead and have these Russian cyber crime guys. [00:51:43] Just go and bring money in right. Money is bringing in great money for them. The treasury department, by the way, it's estimated the Americans have paid $1.6 billion in ransom since 2011. Huge one ransomware strain called RIAA committed an estimated $162 million. Last year. It is really something. [00:52:07] So when we come back, we've got a lot more to talk about. We're going to talk about the cloud. If it's more secure or why is it calm, broken, give masks work. Why aren't they working right. Anyways, we'll talk about that. When we get back and visit me online, Craig Peter sohn.com. [00:52:26] Stick around. [00:52:29] I hate to say it, but there's another big scam out there right now. And it is hitting many of us, particularly the elderly quite hard. We're going to talk about that right now, what you can do about it and how you can recognize when it's happening. [00:52:45] Interesting article that came out this week in wired. [00:52:49] It's actually in Wired's. Let's see, what is a March 2022 issue. It wasn't this week. Nevermind. And it's talking about a serious problem. I'm going to show you guys who are watching I have this on rumble, YouTube, Facebook as well. So you guys can see along and of course, right here, too. [00:53:11] Now let's not forget about that, but this is an article that says we were calling or excuse me, they were calling for help. Then they stole. Thousands of dollars. I'm going to read parts of this article. It's just amazing. It's by Becca, Andrew's a back channel. What is that? Okay, so that's just a cat. [00:53:33] On December more one December morning, my mother's phone rang. She tugged the iPhone from the holster. She kept clipped to the waist, her blue jeans and wondered who might be calling perhaps somebody from the church who was checking in on her recovery from Corona virus. Hello. She said the voice that greeted her was masculine. [00:53:53] This is just great writing. The color sounded concerned and he told her something was. With her Amazon account, somebody has access to your bank accounts through Amazon and they can take all your money. I'm calling to it. Her mind raced or Lord, she prayed silently. The voice was warm and reassuring them. [00:54:15] My mom tried to focus closely on his words. My dad was driving to work in his truck and she was home alone. She'd been cooped up in the house for weeks with COVID isolated from her community and she missed the bomb. Friendly voice. I D I just love her language here. It's just phenomenal. She tried to steady herself. [00:54:36] The man said he needed to make sure the money was safe. He transferred her to a different male voice. Soothing reassuring, calm. She promised not to hang up a brain injury decades earlier, made it hard for her to follow his instructions, but she stuck with it. The voice explained slowly, carefully, how to swipe and tap her phone until she had installed an app that allowed him to see what was happening on her screen. [00:55:07] Now. You followed her every move. After some hour, she mentioned she had to relieve herself hours. It's okay. I'll stay on the line. He said she parked the phone, outside the bathroom and picked it back up. When she was done as Nooner approached, she told him I have to eat. I'll wait. It's okay. Don't hang up. [00:55:28] We'll lose all our progress. She set the phone down on the counter to make a sandwich, then pulled some chips from the cabinet and padded over to the kitchen. The phone buzz with the text. It was my father checking in. She typed back that there was a problem, but she was fixing it. She had it all taken care of. [00:55:48] She tapped the tiny white arrow next to the message field to send her reply. And then she heard the voice, its volume elevated as sounded angry. She frowned and brought the phone back up to her ear. Why would you do that? You can't tell anyone what if he's in. She felt confused that didn't make any sense, but she also didn't fully trust herself. [00:56:10] She was worn. From her slow recovery and the steroid, she was taken as a treatment, gave her a hollow buzz of energy. Now I want you guys to go have a look at this over on wired site. Read the whole article. It is a phenomenal. Absolutely phenomenal. But what it's doing is telling the story of this woman who was trying to, do the right thing, trusting other people, which many of us do? [00:56:40] I have a default trust with a little trepidation. I will admit that, but with the whole. Down the thing that happened, many of us have just been longing for a little bit of companionship and to hear a stranger who's trying to help out. That's a huge plus it goes on in this article and talks about how reassuring these guys were and what they did. [00:57:06] She installed this cash app and opened up PayPal downloaded. Coinbase set up Zelle so she could send money directly from her bank account. She doesn't know about any of these things. It's just incredible. So the afternoon wore on and the guy said Hey, we're almost done. And her husband of course, was on his way back. [00:57:30] And the sun was down. Father got home. He noticed right away that something was off. And she said she took care of it. And you said you took care of what I'm not supposed to tell you. It said, so the scammer had siphoned away. All of her personal information, the scammers had your social security number, date of birth driver's license number, and about $11,000. [00:57:55] These new financial apps like Zelle and others that are legitimate PayPal apps, right? Zell, you can use to send money legitimately to someone else. But it links into your bank account. That's why I don't like them. I have a friend that's been pushing me. Oh, this happens. Great. It saves you so much money on gas. [00:58:15] Look at how much money I've saved any. He sent a screenshot of it and I re I went online and had a look. And guess what? I read, reviews it again, like this tied into her bank account directly. And. What can happen? Like here, everything was emptied. So in the next few months this author of the story and her father tried to undo the damage. [00:58:40] Very frustrating, getting scanned of course, is really dehumanizing and it just breaks your trust and other people. How could someone do something like that? It's just incredible. Got to go through the stages of grief and everything. She got a, she talked to people, she said she got chili half replies, or just as often silence. [00:59:05] And she was calling around trying to find someone for some empathy. Okay. It's just incredible. Great article. If you can still find it, the March issue of wired, I'm sure it's available online. This goes on. And talks about her mother's seizures getting worse. And of course now they don't have the cash that they had been saving. [00:59:27] And it just very depressing. Now I have this, you might remember about a year ago, I talked about it. I had something like this happen to a friend of mine and I'm still not quite sure what happened, but it looks like it was a password sprain or password stuffing. And they got into his, the app that his company uses to pay people and sure enough, they got in and they directed his next two paychecks to their own account, which went right out of the country like that. [01:00:05] These are bad people. And how do you deal with this? It's incredible because if you've got someone like her mother who has mental problems due to no fault of her own and is a very trusting woman, what do you do? She's walking around all day with her phone on her hip. That's how we started this out. [01:00:27] Do you take that phone away from him? Th that would be dangerous, frankly. So this is a very problem. They had a USAA account was her bank account. USAA is usually good about this sort of stuff. In fact, my other friend had USAA as well. But they did help deactivate Zelle, but they didn't do anything about the $999 that were transferred through it. [01:00:51] Very bad. So they figured out maybe we should change our passwords. She had them change them. And if you would like information about password managers, again, I'm not selling anything. I'd be glad to send them to you. If you sign up for my email list, you're going to get them automatically. Craig peterson.com. [01:01:11] I've got a bunch of data information I want in your hands. It talks about the free stuff, talks about the paid stuff. None of which I'm selling you. Craig Peter sohn.com. Sign up right there on the top of the page. Thanks. Stick around. [01:01:32] We've had some serious supply chain attacks over the last couple of years. And they have caused all kinds of problems for tens of thousands of businesses. If you use WordPress, there was one of those this week. [01:01:47] We have had supply chain problems. Like you wouldn't believe. So let's start out by explaining what is a supply chain problem? [01:01:58] In this case, we're narrowing it down to cybersecurity because we've had supply chain problems from everything from our toilet paper to the food we eat. But what I'm talking about right now is. Supply chains when it comes to cyber security. And one of the biggest problems we had was a company that's supposedly providing cyber security for businesses, right? [01:02:29] Some of the biggest businesses in the world. And I'm looking at an article right now from security Boulevard, say saying how to protect the supply chain from vulnerable third party code. It can be a script that's downloaded online. It can be an open source library. We've seen big problems with get hub lately and pulling in libraries. [01:02:51] We've seen big problems with what are called containers lately, which are little mini versions of computers with all of the software. They're all ready to go. Ready and raring to go. All kinds of supply chain issues for a very long time now. And these supply chain, cyber attacks have been hitting some of our cybersecurity companies, really the hardest I'm pulling this up on my screen right now, if you're watching this on rumble or on YouTube, and you can see links to those, by the way, in my emails, I send out every week. [01:03:28] Craig peterson.com. Craig peterson.com. But you can see here, supply chain hits cybersecurity hard supply chain security is not a problem. It's a predicament. That's uninteresting look because we have to use some of the supply chain stuff. Seesaw the FBI or a sheer wean cybersecurity advisories because of the Russian attack over on Ukraine. [01:03:55] And then the U S the weakest link in supply chain security fears of rising fuel SISA FBI NSA and gestural partners. Issue is advisories Toyota stops production after possible cyber attack at a supplier. Isn't that something this goes on and on. What's a guy to do, right? Many of us are using websites to, in order to run our businesses. [01:04:24] Heck we got websites for our soccer team, for the kids, we got websites for pretty much everything that's out there today and those websites need software in order to run. So the basic idea of the website is nowadays. Content management system, they called CMS CMSs and there have been a lot over the years. [01:04:46] I've used quite a few myself off and on. This is very interesting though, because this particular piece of. Is code that runs a website. I'm going to show you this article from ARS Technica here on the screen, but it's talking about millions of WordPress sites that got a forced update to patch critical plugin flaws. [01:05:13] So when we're talking about supply chain, in this case, we're talking about something. WordPress right. And this WordPress software as good as it is, can have bugs. So WordPress is the content management system. So you load stuff up into, in fact, I'll bring up my site right now. So I'm going to bring up the Craig peterson.com. [01:05:37] And on my site, I have all kinds of stuff, which is why it's so slow to load. I've got to fix that one of these days, but this is an example of a WordPress site. So you can see right at the top of the site, I've got watch this week, show jobs, or top, of course, that was last week. You can watch it on rumble or a new tube, and then it's got my latest show. [01:05:59] So if you click on one of these, here you go. And you can listen to it. Starts right out here. C ta-da. So there, you can listen to my podcast right there on the site, and I've got an automated transcript of it. It's for you, depending on what you want. It's got links over here to take you to iTunes or YouTube or Spotify or SoundCloud or iHeart or Google player audible. [01:06:26] All of these links take you to different places. And this site in survey, Program a site in HTML. What we're doing is we're working. Putting some data in, so we say, okay, I want a default page. Somebody else has already set it up. Somebody else has already got an old program. It just works. And it's all right there for me. [01:06:49] Here's some related posts on the side. Here's the most popular ones that we have right now. This is a content management system. And specifically this of course is WordPress. So what happened. If I had a, yeah. And here's what it looks like over an audible, you can listen for free on. This is what happened this last week, WordPress, which has this great software that I use and tens of thousands of others use out there very popular. [01:07:27] And in order to make it easy for me to have my website, probably your business, probably your kids' soccer club, you name it is using WordPress. It's just over the top hop healer. It is using code that was written by other people. The reason we can make programs so quickly nowadays is we're relying on other programs. [01:07:51] So we'll go ahead and we'll grab this program that does this part of what we need to have done, and ta-da we're up and we're running. I just have to write the glue right? To put it together. The API calls, whatever it might be, because the idea is let's make it easier for programmers. So you've got something called get hub here. [01:08:11] Let me pull it up so you can see that you can go online if you're following along. To get hub.com. And as it says right there on their front page where the world builds software as a beautiful world, isn't it? That blue, you can see the air around it. And that's what it's doing is where the world builds software. [01:08:33] So let's say we want something. What do we want? What's a, let's say we want something to make a chess program. We can talk about chess and let's say, oh, you have to. I Dan didn't want to do this, so I'm just going to skip that for now. But it would come up and tell me, okay here's all of the chess programs that are out there and I find one, that's close to what I want to do. [01:08:54] So what do I do? Point while I go ahead and have a look at the license, a lot of the programs up there have a very open license, so I can just take that code, modify it. And I have a chess program without having to write a chess. It's really that simple that's part of the supply chain. If you bought my chest program, you would actually not just be getting the code that I wrote, which is typically just glue code with maybe some API APIs or application programming interfaces. [01:09:25] In other words, you're using someone else's code would now make it who's program. It's like the Pharaoh's barge. It would make it other people's programs. Not my. So you got to figure out what's in my supply chain. I've got a new client. I do work as a virtual chief information security officer. [01:09:46] Actually, it's a fractional Cecil. And as a fractional Cecil, one of the things I have to do is look at the whole supply chain. Who are they buying even physical things from. And could there be. Did it into their software, into their systems, something that might be coming from yet another supplier. Man, does this get complicated? [01:10:09] Very fast, but this week, our friends at WordPress, they went ahead and forced all WordPress sites to update. Very good. Okay. Otherwise, people could have downloaded a full backup of the sites that are out there, something you really just don't want to happen. Anyways. Go right now, Craig Peter sohn.com while the bits are still hot and sign up right there. [01:10:36] Craig peterson.com for the newsletter and get those special reports that are going to get you started. [01:10:43] This is the moment you've been waiting for. We're going to talk about free cybersecurity services and tools that you can use. Now you have to be a little bit of a cybersecurity expert to use them, but not much. This is from the government. [01:10:59] This is I think an amazing thing. This only came out within the last few weeks. [01:11:07] I have it up on my screen. There we go right now, for those of you who are watching on rumble or YouTube, you can see it right there, free cybersecurity services and tools from. The cybersecurity and infrastructure security agency SISA reminds me of Marvel was shield, that really long name that came up with an acronym for as though they weren't aiming for that acronym in the first place, but there are some tools that you can use there's tools that I use as a cybersecurity professional. [01:11:42] And some of them are obviously going to be pretty darn. Complex. And if you're looking at my screen right now, or if you want to go online at csun.gov/free-cybersecurity-services, dash, and the as tools, or just look it up online, you'll find this on my website as well. I'm going to try and make sure I get that up. [01:12:07] But what they have done is they're showing you what they call their key or the known exploited vulnerabilities. Okay. And this is where they are showing the CVEs, which are. The frankly, these are the ones that I use. It is published by nest, which is the national institutes of standard and Sanders and technology. [01:12:31] And this gives all of the details. So this is CVE 20 21, 27. Okay, and this is detail, and of course I would be using detail. And it's telling you, here's the advisories, there's one from get hub Excel. Leon has one. Here's the weaknesses, the SA the known soccer configurations. So you can find where they all are at and everything. [01:12:56] So all of the details. So they're telling you about that. These are the ones, this was in the vendor product. Project, I should say. So we'll look at the data added to catalog. Here are a few in Cisco right now. So this is their small business series of routers, which we do not use for anyone because they don't provide the type of security you want, but Cisco is taking care of the problems, right? [01:13:23] Many of these update themselves, here's Microsoft windows. And installer contains an unexpected unspecified vulnerability, which allows for privilege escalation, a lot of stuff this week, this is crazy Apache Tomcat, which I am never been a fan of and problems. So all of these came out. On March 3rd and more rights. [01:13:47] This is just page one. So let's look at page two here. Oh wow. More Microsoft Excel exchange server, some more Cisco vulnerabilities. Why Cisco? Why Microsoft? Because they are frankly. The big boys on the block, that why do you Rob the bank? Because that's where the money is. So they list all of those right here, as he said, does the warning you do use multifactor authentication? [01:14:16] I don't want to sound like a broken record, so I'm not going to say use multifactor authentication today. Okay. I just refuse to say use multi-factor authentication. And this one talks about what it is, right? Many names. Now they're trying to make this. But really a Fido key fast at any online considered the gold standard or multi-factor authentication Walt for online. [01:14:40] It is websites, but not for authors. So how would you know that if you weren't an expert? So yeah, this is the government talking, right? So they have the service. So what does, what do I do right? Me, Mr. Idiot. I click on this and they are talking about the service that they've got them showing it up on the screen. [01:15:02] It's called SISA insight. And they're talking about website, defacement, destructive malware, or not Petya want to cry, right? All these things. What can you do
Niketra gives her perspective on the nature of work and business in the digital era. The workforce is changing or in need of change to meet the standards and requirements of today's modern tech advanced society. I attempt to answer questions like why we work jobs when we can sell products during a Livestream? Why work for someone else when we can make money from our phones with websites and investing in the metaverse? Here's some food for thought to embrace the ever evolving marketplace. Visit website - https://anchor.fm/belleofbeauty --- Send in a voice message: https://anchor.fm/lashpod/message Support this podcast: https://anchor.fm/lashpod/support
Anna chats with debut author Lillie Lainoff about bringing modern themes to retellings, changing up the pacing of novels to represent chronic illness, and the importance of research! Lillie Lainoff's Website ONE FOR ALL on Goodreads
Chris Crawford (@crawford_milb) answers your fantasy questions, and updates his top 10 prospects for the rest of the 2022 season in the latest Circling the Bases. (02:22) Kahlil Watson conversation(06:47) Under the radar pitcher(10:26) Devin Williams or Andres Munoz(24:45) Triston Casas conversation(32:20) Number 1 prospect
So you want to make a career change, but what's the first step? Updating your resume? Networking on LinkedIn? Scrolling Indeed? Actually, the first step in your career leap comes long before these, and it's the best way you can set yourself up for success in your new role. In this episode, I'm breaking down the most common mistake I see people make at the beginning of their career leap. I'm explaining the importance of defining your wants, needs, and strengths, and I'm giving you a step-by-step exercise for doing it yourself. Plus, I'm sharing how you can overcome your fear of landing in a position that's even worse than the one you're leaving. In this episode, you'll learn... The biggest mistake I see people make at the beginning of their career leap [1:28] Where you should really start if you're thinking about a career change [3:09] How neglecting to define you needs and wants can hurt you in the long run [3:42] How to define what you're good at and what you like doing, and then apply that to your job search [5:05] Why you should think strategically about your strengths [7:47] Why you should reject the narrative of “just being grateful for the job you have” and staying stuck [10:11] How I can help you make your career leap and find a career path you love [12:00] How to overcome your fear and minimize your risk of landing in a role that's even worse than the one you left [13:48] If you're considering your own courageous career change, be sure to tune into this episode. Get full show notes and the episode transcript: https://www.lisahoashi.com/leaplikeme/episode22 Links mentioned in this episode… Enroll in my career course: https://www.lisahoashi.com/career-course Apply for the Catalyst Coaching Program: https://www.lisahoashi.com/catalyst-coaching Download my FREE Change Planner: https://www.lisahoashi.com/change-planner
After seeing the podcasting space gear up for more advertising (something I'm not thrilled with) more media hosts are developing dynamic content. So what is dynamic content, do you need it, and how do you use it? What is Dynamic Content? Dynamic content is content that your media host inserts into your mp3 file at spots you select. This is often used for ads. In some spaces, people confuse "Dynamic Ad Insertion" and "Dynamic Content" as being the same thing. They are not. While you can use Dynamic Content, it does NOT have to be ads. It can be anything that is time-sensitive. Who Offers This Technology? Libsyn.com (LibsynPro solution - full disclosure I work there). Use the coupon code sopfree to get a free month. Captivate has an impressive dynamic content tool that even updates your episode description when you swap out content. Podbean has pod ads https://podads.podbean.com/ Blubrry has a pro version Red Circle (500 weekly downloads) RSS.com (10,000 downloads a day) Pros of Dynamic Content No more outdated time-based content The ability to sell your back catalog* Cons of Dynamic Content You really need to pay attention to volume levels (I'm using WLM Plus plugin) To sell your back episodes you need to go through your whole back episodes and insert spots. Updating old files might be trickier You need to consider how to lead in and come out of dynamic content. Focusrite Interfaces Go to www.focusrite.com/podcasters Unlimited Time Shifted One-On-One Consulting I've added unlimited time-shifted consulting that can be between you and me. If you need someone to stand by you and guide you through the pitfalls of podcasting, you can join worry-free with a money-back guarantee at www.schoolofpodcasting.com/start I Heard It On a Podcast Disney got all sorts of deals when they built the location in Florida. On the No Agenda show they explain that the reason employees are known as "Castmembers" is to get around Florida Labor laws. It's at the 2 hours and25 minute mark. Apple Charts Criteria I've said for years that ratings and reviews do NOTHING but provide social proof. You want people to ask people to follow you and share your show with a friend. see post from Apple Where I Will Be Where I Will Be: Podcast Movement Evolutions March 23-26 Utah Podcast Coalition April 21st Podfest Multimedia Expo May 26-29 Orlando Question of the Month Want some free exposure for your podcast? Go to Go to www.schoolofpodcasting.com/question Check out the question and share your thoughts and insights. I assemble these for the last episode of the month. This show is part of the Power of Podcasting Network
“When are you going to get married?” “When are you having a baby?” “When are you having another baby?” “Why are you so emotional?” Do any of these questions sound familiar? Today on Empowering Her, I am joined by Gila Gabay to discuss how we can respond with kindness and awareness to conversations that need some serious updating. I hope that you find value in this episode. If you so, please feel free to share with someone who might benefit from this content! Thanks for your listenership! I appreciate you. If this podcast inspired you, please leave a review for Empowering Her so that we can continue to create this content for all of you! Also would love for you to share a screenshot of your review and tag us https://www.instagram.com/girlifeempowerment/ - we will be happy to repost your review. Let's stay in touch! Instagram: https://www.instagram.com/girlifeempowerment/ Facebook Group: https://www.facebook.com/groups/girlsempowermentbiz/ Contact: Melody@getgirlpower.com Website: www.getgirlpower.com
Support the stream: https://streamlabs.com/kc5hwb No, I haven't built my DX Commander. But I have built 30+ DMR codeplugs. Have you?I have a free codeplug that you can download here - https://hamradio2.com/codeplugI haven't updated this codeplug in a while, so let's do that today. Bring your DMR questions. This codeplug will primarily be for the Anytone radios, but with the N0GSG Contact Manager, you can use it on any radio that they support.My favorite Anytone radio: http://hr2.li/be084
Blind Abilities presents another episode in their iPhone101 Series. Today, Pete Lane walks us through the process used to arrange our iOS Settings to allow for the “manual" updates of apps in the App Store. Why manual updates you might ask? Every once in a while, we encounter an update that present some kind of a problem, either with the way VoiceOver behaves, or something else proves to be unreliable or unsteady. Updating your apps manually gives you control over if and when apps are updated on your phone. Here's how Pete's settings look in two primary areas: App Store settings for automatic downloads, and Background App refresh: Go to: Settings, AppStore: Apps is off for me. App updates is off for me Cellular Data Heading Automatic Downloads is off for me. App Downloads, I have mine set to “Always Ask” because it is Cellular on this setting. Video Autoplay is off for me. In-App Ratings & Reviews is on for me. Offload Unused Apps is on for me. Read more
TJ and Richie are back for this edition of Double Fries No Slaw! They're chatting about the Amarius Mims visit to Florida State. They also put a bow on Florida State's Spring Practice and go around the horn with FSU Athletics. Double Fries No Slaw is brought to you by Guthrie's in Tallahassee. Visit both of their locations at 1818 W Tennessee St and 2550 N Monroe! Also, brought to you by Garnet and Gold. Visit garnetandgold.com to get all of your FSU gear. Use code NOSLAW for 20% off!
According to the 2021 IAB Internet Advertising Revenue Report, online ad revenue grew at the fastest pace since 2006, 35% year over year. In real dollar terms that translated into a $50 billion revenue increase from last year. Mobile revenues comprised roughly 71% of the $189 billion total, while the desktop contributed 28%. Paid search was the largest digital ad revenue category (41%, $78.3 billion), followed by display (30%, $56.7 billion) and digital video (21%, $39.5 billion). Google has been updating business data for year, not due to AI but because of their massive access to data. This trend is increasing which is both annoying and reflective of their failure to engage SMBs to keep the data updated themselves. Over the past 5 years images have moved from virtually 0% oif the mobile search results to almost 40%. Google is using AI to understand the content of these images and changing them based on the user query. This points towards a new aspect of technical SEO, image optimization, to improve rank, visibility and conversions for local businesses.The Near Memo is a weekly conversation about Search, Social, and Commerce: What happened, why it matters, and the implications for local businesses and national brands.Near Memo Ep 60
Shawn and Teos chat about updating Dungeons & Dragons Fourth Edition adventures, comparing them to the classic adventures they’ve already looked at. This fascinating look into D&D’s most controversial edition […]
Flame 2023 introduces a revamped animation editor with loads of modernisation and updates. Over the next four videos we'll cover features and improvements for a better user experience when working with animation in Flame. Starting off, you'll go through the updated interface and cover some of the new default behaviours which have been carefully chosen to improve your navigation and workflow of the animation channels.
This video focuses on the curves, colour-coding and new channel filtering in Flame 2023. So you'll examine how the curves behave as well as the selection tools now available when manipulating keyframes and curves. You'll also cover the updated colour coding features, making it easier to visually identify an animation channel and curve when working in the editor. Finally, you'll learn all about the new filtering in the Animation Editor. This allows you to filter channels by various properties and even create custom filter presets that are connected to your user profile!
The tracks editor has been renamed as the Dope Sheet and it controls the timings of an animation. So you can adjust the timing of a keyframe or a selection of keyframes and you can also slip entire channels. You'll also cover the functionality of scaling the timings of an animation to make it either longer or shorter. This can be achieved with a couple of workflows.
With the updated to the Animation Editor, animating in Flame 2023 is easier then ever! This also includes updated workflows to give you lots more choice with the way to you like to create animation. For example, this video covers the Animation View Workflow whereby you can have the Animation Editor visible in a view. This enables you to see your animation curves and your composite at the same time! Now this might now be brand new to Flame 2023 however with the introduction of the context menus in the Animation Editor, you can now do so much with this workflow without having to switch menus in the interface to access standard controls. Huge Timesaver!!! Flame 2023 introduces a revamped animation editor with loads of modernisation and updates.
-0:00, Preds forward Matt Duchene -14:25, Updating the Preds playoff push after the 1-0 overtime win against the Sharks -24:30, Adam Vingan on Preds -36:00, Robby is sad about the Packers and Joe tells some Jim Leyland stories. Is Derek Jeter overrated?
A lot has happened this year already, and as a planner that is not a lot of fun. I have taken the time to re-group and figure out the direction I want BudDIY to go this year. Join me in this episode as I talk about finishing up the garden, and talk about the future projects here on BudDIY.
Chris Crawford (@crawford_milb) answers your prospect questions and updates his top 10 prospects for the remainder of the year in the latest episode of Circling the Bases.(1:41) Julio Rodríguez has a slow start(3:52) Nick Prado: Fantasy Helper?(9:19) Prospect situation with the Athletics(14:27) Hunter Greene's debut(17:42) Best Prospects for the remainder of the year (10-6)(26:15) Best Prospects for the remainder of the year (5-1)
http://www.mvprecruiters.com/ We're old school recruiters who are continuous learners. We are competitive, self-motivated and ever curious students of the recruiting industry. We strive to stay abreast of the latest trends, best practices and technology advancements. We play to win. We're proud to be a member of the Inner Circle, an elite group of top performing recruiters. Inner Circle is a global, UK based invite-only, collaborative group run by Mark Whitby, one of the world's leading coaches for the recruitment industry. Since 2001, he has trained over 10,000 recruiters in 34 countries. We have weekly calls with some of the top performing recruiters in the world. We learn from them and they learn from us. What are these million-dollar billers doing to succeed – what tools and techniques are delivering results? What works in the UK, Germany, Dubai, Singapore and Hong Kong might work for us in the United States. Over the last 26 years we've learned a great deal about people, what motivates them and how to engage with them. We've also learned how to automate and outsource recruiting activities so we can be as efficient and organized as possible.
George Kamel & Ken Coleman discuss: Feeling defeated in your career, How much to put in your HSA, Saving up for a house, Updating beneficiaries in your will. Support Our Sponsor: SimpliSafe: https://bit.ly/37NBd9g PureTalkUSA: https://bit.ly/2XfwRaA Want a plan for your money? Find out where to start: https://bit.ly/3nInETX Listen to all The Ramsey Network podcasts: https://bit.ly/3GxiXm6
John Carvalho, Founder of Synonym joins me to talk about Slashpay and SlashTags, an ambitious attempt to dramatically smooth the process of exchanging bitcoin addresses or lightning invoices. What kind of things does this enable? We discuss: Competing standards in Bitcoin How it would work Updating and revocation of SlashTags What other things are enabled by this public keypair approach Why not use a blockchain Putting tether USD on lightning Synonym Links: Slashpay Twitter thread: https://twitter.com/Synonym_to/status/1498021273255002115 Site: https://synonym.to/ John's Twitter: https://twitter.com/BitcoinErrorLog John's Podcast: http://thebiz.pro/ Sponsors: Swan Bitcoin Hodl Hodl Lend Compass Mining Braiins.com Unchained Capital (code LIVERA) CoinKite.com(code LIVERA) Stephan Livera links: Show notes and website Follow me on Twitter @stephanlivera Subscribe to the podcast Patreon @stephanlivera