Tuesday, March 27, 2018

Youtube daily report Mar 27 2018

[music] Hi guys, happy almost Easter.

I don't really do anything to celebrate Easter, except that my mom still usually sends

me a box filled with Easter candy.

So, you know, I'm into it for that reason.

Anyway, if you're watching all the way to the end of the video, your code word for the

comments is Hogwarts.

Pretty simple this time, just use Hogwarts somewhere in your comment and I'll know

that you're a magical wizard who watches videos all the way through.

So if you want more Harry Potter DIYs, you are in exactly the right place.

I have done costumes, I've done pumpkins, I've done ornaments, so many videos, I'm

gonna have all them linked for you in a playlist right down below.

And of course, as always, I'll have links to all of the supplies right down below as

well.

Thank you guys for watching and I hope you all have a magical day.

For more infomation >> DIY Harry Potter Easter Eggs! ~ Hogwarts Houses ~ Golden Snitch Ring Box Craft - Duration: 6:44.

-------------------------------------------

SUB INDO IDOL PRODUCER CC 《偶像练习生》20180330第11期预告 导师联合整蛊练习生 导师合作舞台燃爆现场 - Duration: 1:19.

For more infomation >> SUB INDO IDOL PRODUCER CC 《偶像练习生》20180330第11期预告 导师联合整蛊练习生 导师合作舞台燃爆现场 - Duration: 1:19.

-------------------------------------------

California In Total Chaos: Residents Revolt Over Plans For Homeless 'Tent City' - Duration: 3:07.

For more infomation >> California In Total Chaos: Residents Revolt Over Plans For Homeless 'Tent City' - Duration: 3:07.

-------------------------------------------

California In Total Chaos: Residents Revolt Over Plans For Homeless 'Tent City' - Duration: 3:07.

For more infomation >> California In Total Chaos: Residents Revolt Over Plans For Homeless 'Tent City' - Duration: 3:07.

-------------------------------------------

DIY Slide Wire Canopy Kit

For more infomation >> DIY Slide Wire Canopy Kit

-------------------------------------------

Cuisinart 12pc CeramicCoated Stainless Steel Knife and S... - Duration: 14:05.

For more infomation >> Cuisinart 12pc CeramicCoated Stainless Steel Knife and S... - Duration: 14:05.

-------------------------------------------

Madres a*s*e*s*i*n*a*s y buenos padres que m*a*t*a*n - Duration: 12:21.

For more infomation >> Madres a*s*e*s*i*n*a*s y buenos padres que m*a*t*a*n - Duration: 12:21.

-------------------------------------------

Infiniti Q60 Black S Road May Debut In Paris - Duration: 2:53.

Infiniti will allegedly give the Q60 a Formula-One-inspired boost by equipping the sports coupe with a

racing-derived hybrid powertrain for a concept at the Paris Motor Show at the beginning of

October.

This updated version of last year's Project Black S Q60 concept (pictured above) from

the Geneva Motor Show reportedly be production-ready this time so that assembly will be able to

begin relatively quickly after receiving a green light to move forward from company execs,

according to Car Advice.

Like the earlier concept, the new Q60 Black S would likely have around 500 horsepower

(373 kilowatts).

The Red Sport 400's 3.0-liter biturbo V6 generally makes the eponymous 400 horsepower (298 kilowatts),

but the new version would receive F1-inspired motor-generator units.

One of them would harvest power under braking, and the other would feed off the heat of the

exhaust gases.

Electricity would then help turn the crankshaft and turbos for allegedly lag-free acceleration.

A titanium exhaust should save some pounds and make the V6 sound even better.

The production model would also follow the concept by getting a more aggressive suspension

layout.

Carbon fiber components would help cut weight to balance the extra pounds from the extra

hybrid components.

Car Advice also alleges the road-going version would drop the Q60's Direct Adaptive Steer

steer-by-wire technology in favor of a more traditional setup.

Tommaso Volpe, Infiniti Director Global Motorsport and Performance Projects, told Car Advice

that the company has already found suppliers for the electric system components.

However, the top execs at the Renault-Nissan-Mitsubishi Alliance still need to sign off on the project.

This means the model wouldn't arrive on the road until 2020 at the earliest.

With around 500-hp on tap, the Q60 Black S would give Infiniti a competitor against the

likes of the 444-hp (331-kW) Audi RS5, 467-hp (348-kW) Lexus RC F, and 503-hp (375-kW) Mercedes-AMG

C63 S. The rest of these models lack the Infiniti's high-tech hybrid system, though, which could

set the vehicle apart in the performance coupe ranks.

For more infomation >> Infiniti Q60 Black S Road May Debut In Paris - Duration: 2:53.

-------------------------------------------

Porsche Boxster 3.2 S Tiptronic Navi,Leer,Xenon,PDC - Duration: 0:57.

For more infomation >> Porsche Boxster 3.2 S Tiptronic Navi,Leer,Xenon,PDC - Duration: 0:57.

-------------------------------------------

Mercedes-Benz S-Klasse 320 CDI Prestige Automaat,Leer,Schuifdak - Duration: 0:58.

For more infomation >> Mercedes-Benz S-Klasse 320 CDI Prestige Automaat,Leer,Schuifdak - Duration: 0:58.

-------------------------------------------

Mercedes-Benz S-Klasse 320 CDI Prestige Plus Automaat*Full Options* - Duration: 1:00.

For more infomation >> Mercedes-Benz S-Klasse 320 CDI Prestige Plus Automaat*Full Options* - Duration: 1:00.

-------------------------------------------

Audi A1 1.0 TFSi 95 pk Adrenalin / S Line exterieurpakket / navi / 17" - Duration: 1:00.

For more infomation >> Audi A1 1.0 TFSi 95 pk Adrenalin / S Line exterieurpakket / navi / 17" - Duration: 1:00.

-------------------------------------------

Audi A4 1.4 TFSi 150 pk Sport / S Line / LED / 18" - Duration: 0:57.

For more infomation >> Audi A4 1.4 TFSi 150 pk Sport / S Line / LED / 18" - Duration: 0:57.

-------------------------------------------

Audi A5 Coupe 2.0 TFSi 252 pk Quattro S tronic Sport Pro Line S / S Line / B&O / 19" - Duration: 0:57.

For more infomation >> Audi A5 Coupe 2.0 TFSi 252 pk Quattro S tronic Sport Pro Line S / S Line / B&O / 19" - Duration: 0:57.

-------------------------------------------

The Making Of Lil Pump's "Designer" With Zaytoven | Deconstructed - Duration: 7:06.

The generation I come from is a little bit more musical than the generation that's here now

And I think it's due to technology, the way things are being produced.

A lot of their music don't have a heart and soul in it no more, 'cause it's not really

being made by human hands, it's being made by computers.

I think this was my chance to kind of bridge the gap.

The reason why I even got into music is my mom is a choir director, my Dad's a preacher,

so that means we at church four days out of the week.

As a child, you need something to do.

You need some involvement to keep you excited about where you're going.

If I'm gonna be here at church, I want to do something.

I started off playing the drums, and it seemed like every boy in the church wanted to play the drums.

I seen there wasn't nobody really trying to play the keyboard or the organ, so I started

migrating over to the organ and the piano and started learning that, and I just got addicted to it.

The sound that I developed through just working over the years.

A lot of people take it as the Zaytoven signature sound is the piano.

It used to be the organs.

I used to rail rip the organs in my beats and everybody was like, "Oh, that's the Zaytoven sound."

I think when I did a project with Future is when I really used a lot of pianos,

and it was just me trying to separate myself from all the other producers.

I didn't really know about Lil Pump.

I didn't know that much about his music or who he was, but my son knew.

If it wasn't for him I wouldn't be keeping up with what's going on.

So when he called me, I automatically knew who he was.

"Oh, you Lil Pump.

You're the one my son been talking about.

I need to work with you.

I can't wait to work with you."

So I go back and listen to him and see what he's on, then I create beats that I felt like that'll fit him.

I was right on the money.

My first step in creating this 'Designer' beat, I started off with the pad,

you know, just to kind of get the groove going.

It was a pad that came out of the plugin Omnisphere.

I feel like it brings a certain racing feel. It kind of feel like it's just building up to something.

It's subtle, but then it's kind of mysterious.

It's like, "Okay, what's finna happen?"

You know, it gives you that type of feeling.

Now after I use this pad, now I think about sounds that I can just add to kind of sprinkle

on top of it to kind of bring some different elements to the beat.

So, what I added in next was, a bell sound.

I love to use bells 'cause bells are not harsh.

They just tickle your ears a little bit.

They just add some different flavor.

Just something about bells that make it be like, "Ok, this is a trap beat."

Since I'm so old school, I really don't add a lot of effects.

I don't add a lot of stuff to change the real texture of the sound.

And, I move fast.

So, that means I don't have a lot of time to manipulate the sound, or change it,

or make it sound different.

After I got me two good, full sounds in the beat,

that I feel like can set the mode, then I start adding drums.

Sometimes, I might add the clap first.

Sometimes, I might add the kick first, but 90% of the time it's the hi-hat.

Now I'm in my zone of, "Okay, let's add all the drums in it now."

So, after I add the hi-hat, I come on back, and I add the clap.

Now once you add the hi-hat and the clap, every rapper, every artist… what's gon'

what's gon' really get them excited, or make them feel like, "Ok, I'm ready to go in the booth

right now. Stop making the beat," is when you add the drop.

When you add the 808s, it's time to rap.

I want to say most important sound in the beat.

I didn't understand that until I got to Atlanta, and that became a major part of me making beats.

If you listen to the beat now, it pretty much sound ... It sounds full, it sound like it's ready to go.

I work with artists like a Gucci Mane, or a Future, or even Migos, that ...

You know, they're impatient.

When you're in the studio once they start hearing something they like, "Okay, I'm ready to go in.

I'm ready to go on the mic, boy, I'm ready to rap.

I don't want you to sit here for another 30 minutes making the beat 'cause then

I'm going to lose my energy, I'm going to lose what I had in my mind, what I wanted to say."

So, now, it's like, "Hurry up.

Finish the beat so we can go ahead and do the song."

I'm like, "Well, hold on, give me one more minute.

Give me just one quick minute to add all of these different little extra spices in it."

So, the next thing I added was a snare.

The snares don't do nothing but enhance the movement.

It's moving almost like how the hi-hats moving.

It just helps build that adrenaline.

I always look at a song as in there's a verse, and there's a chorus.

In the music something has to change when the chorus come on so it defines,

"Okay, that's the chorus and that's the verse."

So I went on I said, "You know what, let me add this last sound.

Then this beat will be done."

Even though this was the last sound that I put in the beat,

I felt like it just made everything just gel together.

It just made it complete.

So now, after breaking down each instrument and everything I put in the beat,

and the reason why I put it in the beat, let me give you what the grand finale sounds like.

I feel like Lil Pump definitely follows the rock star image.

It's almost like no cares in the world.

That's the type of music that makes other people feel good.

Other people that's probably have problems or got a nine to five and they stressed out.

These are the artists that can kind of free them up and make them feel alive so when they

go out or when they listen to the music they just feel pumped up and excited.

That's definitely the new generation.

Guys like that have respect for producers like me.

Just the different generations coming together, and I think that's what makes it powerful.

For more infomation >> The Making Of Lil Pump's "Designer" With Zaytoven | Deconstructed - Duration: 7:06.

-------------------------------------------

Audi A3 Sportback 1.4 TFSi 122 pk S tronic Ambiente Pro Line Plus / S Line / 17" - Duration: 0:58.

For more infomation >> Audi A3 Sportback 1.4 TFSi 122 pk S tronic Ambiente Pro Line Plus / S Line / 17" - Duration: 0:58.

-------------------------------------------

Audi A6 2.0 TDi Ultra 150 pk S tronic Sport Edition / S Line / 18" - Duration: 0:56.

For more infomation >> Audi A6 2.0 TDi Ultra 150 pk S tronic Sport Edition / S Line / 18" - Duration: 0:56.

-------------------------------------------

Audi A3 Limousine 1.4 TFSi S tronic Sport / S Line exterieur / 17" - Duration: 0:58.

For more infomation >> Audi A3 Limousine 1.4 TFSi S tronic Sport / S Line exterieur / 17" - Duration: 0:58.

-------------------------------------------

Audi A6 2.0 TDi Ultra 150 pk S tronic Sport Edition / S Line / 18" - Duration: 0:52.

For more infomation >> Audi A6 2.0 TDi Ultra 150 pk S tronic Sport Edition / S Line / 18" - Duration: 0:52.

-------------------------------------------

CHez Ryan: A tour of Ryan Poehling's house (Habs Cribs) - Duration: 4:11.

Hey guys, this is Ryan from St. Cloud State hockey, welcome to the Chum Bucket.

It's... kind of the same layout that the upstairs and the downstairs has, but...

I'd say if it's just our house hanging out, it's... up there, but if we have people over, like after a game

Saturday night, we'll... we'll be down here, I mean...

We've got Xbox, we play it.

We used to play a lot of FIFA, not so much anymore.

I mean, we kind of transitioned over to the Rory game.

If you've ever played that, golf, it's a lot of fun.

This is usually where I make... I make eggs in the morning a lot.

And then I'll... I'll make chicken out by the grill outside.

Now we're going to take a look inside my fridge. I mean...

Upstairs is kind of where we... where we usually do it, but I mean, it's nothing special right now.

We actually have to go grocery shopping, too.

They were supposed to today, but...

I mean, I'm a big Gatorade guy.

It's nice when my parents come and they can... They can bring us food and stuff.

I mean, they only live 90 minutes away, so... They do that a lot.

This is a bathroom with a washer and dryer that me and my buddy...

I mean Nick, there's three guys who live down here.

One room back there, and then two right there.

So... Nick's room actually has his own...

His own bathroom, but this is the one me and Jake share.

I mean, it's just simple, washer and dryer, you've got the bathroom, and then...

This is just like a little pullout thing that you can use, so...

It's pretty nice.

If we go this way, this is the appliance room.

Sometimes we'll put a... like a little bed down there, and the people that are staying there, sleeping there, they...

They get a good night's sleep, so... it's... it's really dark.

But yeah, and then, I mean, all that's left really is my room.

Obviously I cleaned it, but, this is usually what it looks like.

I mean, my TV is pretty big, and...

I'm a big Netflix guy, so, I actually have like a bunch of posters that I bought.

I bought a Dexter one.

"Power saw to the people," I thought that was pretty funny.

And then, I'm actually watching Breaking Bad right now, so...

Walter White, Jesse Pinkman, I mean...

I mean, I think it's a pretty good show.

I wanted to find a Prison Break one, but they didn't have one. That's...

That's my favorite show, and then...

I mean, my TV, my closet...

Here's actually my... Jack's... his... his uncle was at the draft and he took this picture of...

me when I was getting drafted and he framed it and sent it to me, so...

I thought it was pretty cool. Something special.

I actually have a couple more too, of... of the draft, in my... in my closet, so...

I mean, my closet, I like to keep it neat. I'm...

pretty ornery about that, so...

I mean, I have the ties, and then there's my draft picture on draft day.

I've got a lot of hats there as well, that I... I keep a hat collection.

I enjoy that. I go to LIDS.

So here's my oldest brother Nick, and then my other... other one Jack.

They're both twins. Jack... Nick's actually eight minutes older, so...

[We used to say he was our triplet.] Yeah.

[We'd have to deny it, because we don't want him with us.]

I mean, we all live down here, or...

Nick lives right next to me, and then Jack lives on the upstairs floor, but we all live in this house together, so...

It's... it's a lot of fun, we enjoy it.

[Can you tell us about the name of the house?]

Yeah. One day we were watching SpongeBob, and...

the Chum Bucket, sort of Plankton was just there or whatever,

and we were like let's call our house the Chum Bucket, so... and it's stuck.

It's... it's becoming a thing now, so...

Yeah, everyone loves it, so...

Now we're going to check out the main fridge. I...

I still don't think there's much in there, but... it should be better than what the other one's got.

I mean there's...

We keep giving Wally crap for having this bag of peas.

It's soup. It's actually pretty good, it doesn't look the best.

And there's some leftovers from the rink that we have, and...

I mean, that's basically it. And we got Jack over here making mac...

Is that mac and cheese?

[Yeah. Let's hope.]

We haven't done that in awhile, but... that's good.

So yeah, this is where we... this is kind of where we hang out.

These are my roommates.

I mean, this is what we do. We basically just do our online homework and watch... watch TV.

It's nothing special.

Thanks for stopping by the Chum Bucket, HabsTV.

But I've got a big test now for B Law that I've got to go study for.

Have a good one.

For more infomation >> CHez Ryan: A tour of Ryan Poehling's house (Habs Cribs) - Duration: 4:11.

-------------------------------------------

Telefon Prank Liebes Unfall - Duration: 11:16.

For more infomation >> Telefon Prank Liebes Unfall - Duration: 11:16.

-------------------------------------------

SLEEP 101: TIPS FOR CREATIVES | The Dressing Room Ep 32 - Duration: 6:18.

Creatives! Today we are talking about sleep and how to get the best sleep possible.

Ah sleep!

That magical thing that you love and yet probably aren't getting enough of.

Today we are not going to go into why sleep is so important for the general health reasons.

We're going to focus more on why you, as a creative, need to be getting more sleep and

how exactly to go about doing that.

Now, as creatives, we are constantly learning.

We're constantly problem solving, trying to figure out how can we add our creativity, our magical

spice to this situation, to this problem and make it even better.

There is huge validity to the phrase "sleep on it."

When you learn something and then you go to sleep,

you wake up the next day learning and knowing that thing even better

simply as a result of having slept.

What this means is better problem solving. What this means is better creative work.

Because you are now able to have a stronger foundation from which to do your work.

And studies also show that more REM sleep equals an increase in creativity

so we want to think about getting more sleep.

Now how do you go about doing that?

Today we are going to talk focus on the ABCDs of sleep, so that you can get better sleep.

A - A is for Airplane Mode or Off.

We're talking about this guy. The phone. We love having this in our hand and near us but

this can actually disrupt our sleep. And we're not just talking about text message dings

or phone ringing because obviously that's going to wake you up because of the sound.

It's going to disrupt your sleep.

We're talking about the WiFi on your phone.

If your WiFi on, then the EMF, the electromagnetic waves, are going to be moving through the

air and actually disrupt your sleep. It's going to affect your sleep cycles and then

you are not going to get proper REM sleep. You are not going to get proper sleep.

That means less creativity and less learning when you wake up the next day. So turn this off

or put it on airplane mode. And if you can't because it that's just too hard then gently

escort this out of the room, as Arianna Huffington likes to say, and just see your sleep improve.

B is for Bedtime Ritual. Now children get this all the time. You read them a book, you

have them take a hot bath, you put them in their pajamas, you put them in bed. You are

slowly winding their bodies down so that they can more easily fall asleep which is going

to set their internal clock right, so that they can wake up the next day and be ready

to go. Now, as adults, you need the same thing. You want a routine so that you can make it

more easy for you to fall asleep and more easy for you to wake up at the proper time

to get your work going the next day.

You don't want to just jump in bed because your adrenaline

from the day's work is still going to be firing, so you want to slowly wind yourself down to

go to sleep. Preferably, you are doing this at the same time everyday, if you can because

sometimes that's not possible, because of, you know, life.

Consider a cup of tea, reading a book, or taking a hot bath before you go to sleep.

But with the hot bath you won't want to do that RIGHT before going to sleep because of...

C - Cold. When you go to sleep

When you go to sleep you want your body to be cold. Over the 24-hour period of the day, your body naturally goes

Over the 24-hour period of the day, your body naturally goes

goes up in temperature, goes down in temperature. It's highest about early afternoon and then

coldest (lowest) about 5 in the morning. So when you have the temperature in your room

cold what you are doing to your body is you're helping the body temperature come down, which

it naturally is going to do when you sleep. Therefore, you are making it easier for you

to fall asleep, have better quality sleep earlier on in the night, so that then you

can wake up the next day ready to go about your work. Just prime yourself by having cold

temperature in the room. Shoot for a temperature between 60 degrees and 67 degrees and see

how things get better for you.

D - Dark. Keep it dark for better sleep. Absence of light

is a critical signal to your body that it should be winding down, that it's night time,

it boosts your melatonin, if we're going to get science-y, and helps you go to sleep.

Light exposure really alters your internal clock. It says "Hey! The sun's out. I should

be awake! Wake me up!" But that's not what you want at night. You really want the room

as dark as possible. Studies have shown too that even a dot from a laser pointer on your

body - that light - can alter your sleep and disrupt your sleep cycles. So if even that

is affecting you, then YES the light that is coming in through the windows is affecting

your body whether you really think that it is or not. So, my favorite solutions for this

are to buy blackout curtains. Hang them up and get as little light coming into your room

as possible. And also to wear a sleep mask. My favorite is the Sleep Master mask because

it fits comfortably over the nose and then wraps around blocking some sound into your

ear, which leads us to...

S - Sound. At the beginning of this video, I said that we were

going to go over the ABCDs of sleep. And the "z" sound at the end is an "S" which is Sound.

You want some sound or no sound at all. What do I mean by this? At night your brain still

processes sounds. When you're dreaming your brain is still processing sound and you don't

want that sound to disrupt you and wake you up or jolt your body around. For this, I recommend

one of two things...or both if you want to get adventurous. Number one are earplugs,

so that you have no sound. Drown out everything around you.

Or number 2, you want some sound,

and for this I recommend a white noise machine. If you can't control your environment that's

around you - if you are like me and you live near a hospital and you hear the ambulance

every single night - I really recommend getting a white noise machine so that it can drown

out that sound and won't disrupt your sleep.

There you have it guys! That's WHY you should

be getting sleep as a creative and HOW exactly to go about getting your best sleep.

The ABCDs of sleep. Make sure to throw in some of these tips into your routine, or all of them if

you are feeling adventurous, or if you really want to overhaul the way that you are going

about your sleep. Sleep is a very important tool to help you do your best creative work

and that's what this is all about! Throw this in to your routine. Make sure to like this

video, comment down below, share this with a friend or somebody else you know that really

needs to overhaul their sleep. And we'll catch you next time!

For more infomation >> SLEEP 101: TIPS FOR CREATIVES | The Dressing Room Ep 32 - Duration: 6:18.

-------------------------------------------

« C'est un homme qui avait des diffé­rends avec tous ceux qui l'aimaient », Johnny Hally­day - Duration: 3:58.

For more infomation >> « C'est un homme qui avait des diffé­rends avec tous ceux qui l'aimaient », Johnny Hally­day - Duration: 3:58.

-------------------------------------------

Après le scandale, Melania tient-elle de nouveau la main de Trump - DN? - Duration: 3:10.

For more infomation >> Après le scandale, Melania tient-elle de nouveau la main de Trump - DN? - Duration: 3:10.

-------------------------------------------

Richard Berry amou­reux, qui est sa femme Pascale Louange - Duration: 2:22.

For more infomation >> Richard Berry amou­reux, qui est sa femme Pascale Louange - Duration: 2:22.

-------------------------------------------

ArtU's Photography Graduate...

For more infomation >> ArtU's Photography Graduate...

-------------------------------------------

La lettre douloureuse d'une veuve envoyée aux médecins|LSF TV - Duration: 5:35.

For more infomation >> La lettre douloureuse d'une veuve envoyée aux médecins|LSF TV - Duration: 5:35.

-------------------------------------------

BMW X5 3.0d Executive Automaat, Schuif/kanteldak, Leder! Youngtimer - Duration: 0:58.

For more infomation >> BMW X5 3.0d Executive Automaat, Schuif/kanteldak, Leder! Youngtimer - Duration: 0:58.

-------------------------------------------

Mercedes-Benz V-Klasse V 250 d CO Avantgarde Edition L - Duration: 0:59.

For more infomation >> Mercedes-Benz V-Klasse V 250 d CO Avantgarde Edition L - Duration: 0:59.

-------------------------------------------

Des parents ont remarqué quelque chose d'étrange sur le cou de leur bébé|LSF TV - Duration: 5:34.

For more infomation >> Des parents ont remarqué quelque chose d'étrange sur le cou de leur bébé|LSF TV - Duration: 5:34.

-------------------------------------------

BMW X5 3.0 D High Executive Aut,Navi,Panodak - Duration: 1:00.

For more infomation >> BMW X5 3.0 D High Executive Aut,Navi,Panodak - Duration: 1:00.

-------------------------------------------

Une façon naturelle de réduire l'acide urique et les douleurs articulaires ! Vous devez essayer.. - Duration: 9:28.

For more infomation >> Une façon naturelle de réduire l'acide urique et les douleurs articulaires ! Vous devez essayer.. - Duration: 9:28.

-------------------------------------------

The Voice : Zazie sous le charme d'Yvette, le talent de Pascal Obispo - Duration: 5:55.

For more infomation >> The Voice : Zazie sous le charme d'Yvette, le talent de Pascal Obispo - Duration: 5:55.

-------------------------------------------

Une façon naturelle de réduire l'acide urique et les douleurs articulaires ! - France 365 - Duration: 4:29.

For more infomation >> Une façon naturelle de réduire l'acide urique et les douleurs articulaires ! - France 365 - Duration: 4:29.

-------------------------------------------

Uns Amigos 3 [Pedro Ratão, Choice, Bk' e Black Alien] (Prod. Girão) VIDEOCLIPE OFICIAL - Duration: 5:35.

For more infomation >> Uns Amigos 3 [Pedro Ratão, Choice, Bk' e Black Alien] (Prod. Girão) VIDEOCLIPE OFICIAL - Duration: 5:35.

-------------------------------------------

Pop Goes The Weasel | Learn Colors - Duration: 32:37.

Baby Joy Joy!

What's inside the Jack in the Box?

What will it be?

Turn the crank, and turn it again.

"Pop!",

goes the egg.

It's a white weasel with a white wig.

What's inside the Jack in the Box?

What will it be?

Turn the crank, and turn it again.

"Pop!",

goes the pig.

It's a pink pig in a pink airplane.

Wow!

...goes the rooster.

It's a red rooster in a red race car.

What's inside the Jack in the Box?

What will it be?

Turn the crank, and turn it again.

"Pop!",

(Wow!)

goes the bunny!

It's a blue bunny in a blue boat.

Blue.

Pink.

Red!

Blue!

White!

"Pop!",

go the monkeys.

It's brown monkeys on a brown bed.

"Pop!",

goes the horse.

It's a black horse playing a black banjo.

What's inside the Jack in the Box?

What will it be?

Turn the crank, and turn it again.

"Pop!",

go the ducks.

It's five yellow ducks

in a yellow submarine.

Pop!

Wow!

Colorful fireworks.

We found a white weasel

with a white wig,

(White)

a pink pig in a pink plane,

(Pink)

a red rooster in a red racing car,

(Red)

a blue bunny in a blue boat,

(Blue)

brown monkeys on a brown bed,

(Brown)

a black horse playing a black banjo,

(Black)

five yellow ducks in a yellow submarine,

(Yellow)

and colorful fireworks!

Baby Joy Joy

Baby Joy Joy!

For more infomation >> Pop Goes The Weasel | Learn Colors - Duration: 32:37.

-------------------------------------------

PPPíter - OKULIARE (SK Titulky) - Duration: 5:45.

For more infomation >> PPPíter - OKULIARE (SK Titulky) - Duration: 5:45.

-------------------------------------------

DIY Harry Potter Easter Eggs! ~ Hogwarts Houses ~ Golden Snitch Ring Box Craft - Duration: 6:44.

[music] Hi guys, happy almost Easter.

I don't really do anything to celebrate Easter, except that my mom still usually sends

me a box filled with Easter candy.

So, you know, I'm into it for that reason.

Anyway, if you're watching all the way to the end of the video, your code word for the

comments is Hogwarts.

Pretty simple this time, just use Hogwarts somewhere in your comment and I'll know

that you're a magical wizard who watches videos all the way through.

So if you want more Harry Potter DIYs, you are in exactly the right place.

I have done costumes, I've done pumpkins, I've done ornaments, so many videos, I'm

gonna have all them linked for you in a playlist right down below.

And of course, as always, I'll have links to all of the supplies right down below as

well.

Thank you guys for watching and I hope you all have a magical day.

For more infomation >> DIY Harry Potter Easter Eggs! ~ Hogwarts Houses ~ Golden Snitch Ring Box Craft - Duration: 6:44.

-------------------------------------------

Kasbo - Stay With Me (Lyrics / Lyric Video) - Duration: 2:48.

stay with me

Now ooh

stay with me

Now ooh

DonÕt you see the one remaining by your side

So when you say IÕm complicated all the time

Have the summer and the winter and the fall

I got it all

DonÕt tell me we are done cause

So come and look at me again

but I love you till I die

I know I make you tired

I guess I am the same

ItÕs all the spectrum, everything

A flowerÕs having shades

The weather always change

stay with me

Now ooh

stay with me

Now ooh

DonÕt you see the one remaining by your side

So when you say IÕm complicated all the time

Have the summer and the winter and the fall

I got it all

DonÕt tell me we are done cause

So come and look at me again

Cause babe itÕs you and I

I wanna make it right

when things are down

But donÕt you know the way it works for me

ItÕs hopeless every time

We scream into the night

For more infomation >> Kasbo - Stay With Me (Lyrics / Lyric Video) - Duration: 2:48.

-------------------------------------------

Laeti­cia Hally­day: pourquoi elle ne porte plus le cruci­fix de Johnny - Duration: 6:04.

For more infomation >> Laeti­cia Hally­day: pourquoi elle ne porte plus le cruci­fix de Johnny - Duration: 6:04.

-------------------------------------------

Record Number Of Republicans Leaving Office In Fear Of Voter Backlash - Duration: 3:27.

So far 23 Republicans from the US House of Representatives have announced in the last

year that they're going to be retiring, and not seeking reelection in the 2018 midterms.

Now some of the reasons that they've publicly given are things like, "Well, I've accomplished

everything that I need to accomplish here in the House of Representatives, so I'm going

to be on my way."

Others say that they just want to move on and do other things.

But at the heart of it, the real reason these conservatives are not seeking reelection,

is because one, they're afraid of voter backlash after going along with Trump for all this

time.

Two, they don't want to have to go back to their constituents and answer to the horrible

things that Donald Trump has done.

These Republicans who are resigning, most of them I guess would be considered moderate

Republicans.

They're unhappy with the way that the Republican Party is going, and so having them leave and

not seek reelection is actually going to do more damage to the Republican Party in the

long run.

Not even just saying that they might lose those seats.

What it's going to do, is take a lot of moderate voices out of the US House of Representatives,

leaving only the most extreme and ugly Republicans in there, which means that the American public

is going to see the Republican Party go full Trump crazy, go full racist, and go full Tea

Party with spend, spend, spend, and then cut the social safety net programs for people

all across this country.

That is what some of these more, I guess you'd call them further right Republicans, who refuse

to resign, are pushing for.

So in the end, it's going to do a ton of damage to the remaining members of Congress, and

to the Republican Party as a whole.

But again, we're talking about 23 people resigning, or officially not seeking reelection, which

is the same as resigning at this point, because they're afraid of what is going to happen

in the 2018 midterms.

Some of them, like one of the representatives resigning from the state of Pennsylvania,

doesn't want to seek reelection because now that the courts have ruled that they can't

gerrymander their districts, he knows he's going to lose, so he's just not even going

to seek reelection.

That's how bad the gerrymandering was in the state of Pennsylvania.

But again, they're terrified.

They see a sea change coming.

They understand that voters are angry with both the Republican Party and their policies,

as well as Donald Trump.

They're too terrified to go answer to them about why they attempted to do these horrible

things, like repeal the Affordable Care Act, like cut taxes for the wealthy, while leaving

nothing for the American workers, why they're going along with every decision Donald Trump

has made, even though sometimes they publicly speak out against it.

They don't want to answer those tough questions, so they would rather lose their job, than

have to answer for their disgusting behavior that they've been carrying out in Washington,

DC for years.

For more infomation >> Record Number Of Republicans Leaving Office In Fear Of Voter Backlash - Duration: 3:27.

-------------------------------------------

Multipliez par 3 la vitesse de connexion à internet avec une astuce simple ! - Duration: 5:23.

For more infomation >> Multipliez par 3 la vitesse de connexion à internet avec une astuce simple ! - Duration: 5:23.

-------------------------------------------

Les 10 meilleurs plans pour commencer l'improvisation Rock #2 - Duration: 3:05.

For more infomation >> Les 10 meilleurs plans pour commencer l'improvisation Rock #2 - Duration: 3:05.

-------------------------------------------

Signes de cancer de la peau à ne pas négliger - Duration: 9:34.

For more infomation >> Signes de cancer de la peau à ne pas négliger - Duration: 9:34.

-------------------------------------------

Rap de Grand Theft Auto 3 (2018) - Duration: 1:51.

Welcome to the place titled the land oportunity

Robbin, Killin, Stealin, in this city they call liberty

Before the adventure of one great serbian

There was this silent guy that is filled with aggression

Betrayed, and was left for dead

Escaped an ambush, with a price of death on his head

Crooked cops, mods bosses, pimps

All in need of favor, making him round blocks, battle for money and power

From snatchin hoes, drug exchange, and killin foes

Police chase, assassina-tion, and many mo

My man 8ball, one realible partner

Plan the package, one click kaboom, buh bye sucker

If in rage, steal a rhino, cause a rampage

Im the mass destruction that brought this armageddon

One-man army, from san fierro, doherty

Remember the name claude, known as silent-but, deadly

This is it, the moment i´ve been waiting for

REVENGE

It can´t wait anymore

Riding in my infernus, sendin´ you to satan´s furnace

Whit this rocket launcher on ya copter, sure to make ya famous

Finally safe to say i Did it, it was me whe killed the wieked

Maria and i walked slowly ending a Liberty Story

For more infomation >> Rap de Grand Theft Auto 3 (2018) - Duration: 1:51.

-------------------------------------------

Thug Life - Animals Being Jerks #43 - Duration: 3:04.

she's biting you

was it Rocko?

For more infomation >> Thug Life - Animals Being Jerks #43 - Duration: 3:04.

-------------------------------------------

SEO Site Checkup - Make Se...

For more infomation >> SEO Site Checkup - Make Se...

-------------------------------------------

Obama Appeal Denied Judge Orders Him To Pay Back $400 Million - Duration: 10:23.

Obama Appeal Denied: Judge Orders Him To Pay Back $400 Million

BARACK OBAMA'S APPEAL TO THE SUPREME COURT HAS BEEN DENIED, MEANING THE LOWER COURT RULING

THAT HE PAYS RESTITUTION WILL STAND.

THAT ORDER, FROM JUDGE SANFORD BATT OF THE WEST TEXAS FEDERAL PROBATE COURT, STATES THAT

OBAMA AND HIS FAMILY WILL FORFEIT THEIR ASSETS AND FUTURE EARNINGS AS WELL AS GIFTS AND PRESIDENTIAL

PENSIONS UNTIL THE $400 MILLION HE HANDED TO IRANIAN HARDLINERS IS PAID BACK:

"That money was given to terrorists without the taxpayers' approval and without Congressional

approval.

The court hereby declares it a personal debt and orders the defendant and/or his family

and estate to pay the debt owed to America."

What that means is that Obama will give up $160 million he and his wife scammed in book

deals as well as the $104 million they've made speaking to refugee camps overseas.

The rest of the debt will come from their pension unless someone like George Soros steps

in and pays his debt for him.

Obama and his lawyers argued that a decision made in the interests of national security

can't be directed at the man but rather the office:

"This is f*cking ridiculous.

"That was really all he needed to say.

The American people are getting their money back.

Maybe

Trump will

use

it to fund

the wall.

For more infomation >> Obama Appeal Denied Judge Orders Him To Pay Back $400 Million - Duration: 10:23.

-------------------------------------------

MeRIT Webinar: Digital Self Defense - Tips, Tools, and Best Practices to Stay Safe Online - Duration: 53:03.

>> CINDY SOBIERAJ: Today's webinar is titled: Digital Self Defense: Tips, Tools, and Best

Practices to Stay Safe Online. Our presenter is Ben Woelk, president and manager of the

security management at RIT, where he developed a leading security awareness program.

Ben is a member and former co-chair of the EDUCAUSE security awareness and training working

group of the higher education information security council. He's also former director

and community affairs I'm sorry. Former director and community affairs committee chair for

the society for technical communication and a current scholarship committee chair.

Ben is a certified information systems security professional. A certified professional technical

communicator accredited trainer and an iTIL, Version 3 certified.

He holds degrees from the University of Florida, Trinity International University and the University

of Rochester and an enhanced certificate in technical information design from RIT.

Ben is also adjunct faculty at RIT, teaching classroom and online courses computing security

fundamentals and technical communication. Prior to joining RIT, Ben provided technical

communication and change management consulting to number of area Fortune 500 companies. His

current interests include working with other security awareness practitioners to develop

effective security awareness programs and providing mentoring and coaching to new and

aspiring introverted leaders and speaking of presenting workshops on introverted leadership

creating security awareness programs and technical communication.

Thank you for joining us today, Ben. This is your second time back with us, and we're

thrilled to have. Let's get going. >> BEN: Okay, thanks, Cindy, and thanks everybody

for joining us today. It's a rather daunting introduction but we'll move past that.

Today we're going to talk about digital self defense and digital self defense is what we

branded our security awareness program here at RIT, and this is a slight variation to

in person class we provide to staff five or 6 times a year. We'll save the questions at

this time end but we'll have a couple of times of interactivity through the presentation.

So we're going to start with a cartoon, I'll read it for you but it has data security as

the announcement of what the event is. And in this corner, we have firewalls encryption,

antivirus software, et cetera, and in the corner, we have Dave.

I apologize to the Daves that may be on the call.

In general, what this cartoon is telling us that it doesn't really seem to what technical

concerns we have in PlayStation or what we do to protect other people or even ourselves

'cause we always manage to make a mistake at some point or another, and we're also faced

typical human adversaries and they are very creative and they will find new ways to attack

us as well. So I'm going to postulate that you are all

are targets, every single one of us. When you take a minute to enter your ideas into

the chat about why you think you personally might be a target and we'll share some of

those ideas. >> BEN: So we're getting a good variety of

responses. A lot of it, honestly, just comes down to the fact that we're online and we're

vulnerable and that we do a lot of shopping and other types of things where we where it

may put our identity on the risk. This is a word cloud. It's not one I put together.

So when people ask me about specific things in there, like "bogies," I don't really

have what they meant by that but the idea here is to give you an idea of all the possibilities

why you might be attacked and why, again again, why you're a target again.

So basically it doesn't matter if you have a million dollars in your bank account it

doesn't if you have $1,000 or less in your bank account you're still going to be targeted

by online scams of some kind or other because they have good return on their investment.

So another thing to enter in the chat here this is prefacing a little bit of research

I'll have that going to share in one slide and it's not a bunch of research but Google

did some research a couple of years ago they published, I think, in the summer of 2015

they interviewed security experts who had ideas of what people should do to stay on

safe online, but they also interviewed normal people and for the we'll is normal and the

question I have for you all, what would you tell someone to do to Stay Safe Online? What

are the biggest things they need to do. And, again, you can enter your recommendations

into the chat on that as well. >> BEN: And there are really no wrong answers

with this but again I haven't seen what y'all have been putting in the chat yet.

>> BEN: So it looks like most of what we've got up here so far has to do with passwords

and what they call authentication. However, the lasting one keeping your operating system

and B I/OS up to date and this is the second time I've presented in the last 3 years since

that research essence come out where anybody has actually come up with that answer so congratulations

on that from the security expert's view that's the thing you need to do. To install your

software updates. My computer security says never give that

as one of the things you should Stay Safe Online so given the if you plan to be experts

on this and normal people don't normally answer this question this way tells us there's a

real gap in communicating what people really need to do to Stay Safe Online.

Now, the reason that it's so important to install software updates is because what will

typically happen is that someone will discover a vulnerability or a way to exploit or break

into a program I mean, they're all building millions of lines of code and all it takes

is a little error or something that when the excuse me, when the program was developed

wasn't a problem that could be now. So what happens with the software updates is the vendors,

whether it's Adobe or Microsoft or something else, they release these patches or software

updates and this addresses those holes or vulnerabilities or weaknesses, and they said

that's really the most important thing to do.

Now, looking at the rest of the list you can see on the nonexperts top online safety practices

which we're assuming here. You think intestine software virus is on the list and other things

primarily about a couple of them are about passwords. There's about one only visiting

websites they know that makes for a very small internet and maybe safe but I think it kind

of ruins the experience, and to not share personal information which makes perfect sense.

(Coughing.) >> BEN: On the right side, the security experts

top online security practices most of those are around passwords or around passwords of

some type and we'll talk about these things and the other is install software updates

but what's interesting is that the using antivirus software is not on that list of the top 5

things that the experts think you should do, and we still have a requirement for doing

that at RIT and you should still have it, but I think part of the issue here is that

people may assume that having antivirus software protects them completely, while on a typical

day it might recognize maybe 65% or 85% of the different threats out there so it doesn't

really provide the level of protection that we might expect.

There was a really interesting survey and the results came in kind of surprisingly.

So in terms of protecting your computer and information the links on this slide are are

two resources here at RIT and what the information security office has provided. And we're going

to cover a couple of these things during this presentation today but a good part we're not

going to do but this is more information about things that you need to think about. Policy

and standards are things that you will probably run into in your workplace where you have

requirements about what you need to do in terms of using whatever the computing structure

that you have there. I have another cartoon, and some of you have

probably seen this but we're going to take a minute on this one and give you all time

to read through it. It's pretty dense. I think you can probably read it unless you're viewing

off a mobile device. But let's take a minute and then we're going to talk about what this

cartoon means. >> BEN: Like I said, a very long cartoon.

It gets a little confusing because they talk of bits of entropy, and that gets into complexity

and I'll talk about that in a minute but it's not something that you really need to be aware

of that part of that. What they're showing it here is the way security

experts have told people they need to construct passwords in the last 15 or 20 years is wrong.

They told us they need to be very complex now, troubadour and 3 is not completely because

the idea is they made us put together passwords so they're hard for humans to remember. And

because of that, we end up using the same password over and over again and make a slight

variation maybe it would be Troub4dor & 3 & 4, and people will save it on their desktops

and an Excel file and what happens you got a very limited amount of the passwords our

using something to remember those passwords by which isn't secure.

What's interesting correct horse battery staple which are four common English words -- if

you make it together, it makes a really strong password. I wouldn't use correct horse battery

staple because it's been out for a while and I'll tell you why it's really good news that

this cartoon is talking about. There's a password staple but what this kind

of does kind of measure how strong is to break based on its complexity. Now, it's a little

confusing because you could put in the word password and it would say it would take how

many things to break it something very simple so it's really only looking at things in terms

of complex not use of common passwords so if you look at the screen you can see it's

got this brute force search space analysis and you'll see that change as we go through

the example, but down at the bottom you're going to see time required to exhaustively

search this password space and that means how long to break the password and they've

got a couple of scenarios whether it's one computer online attacking you or it's somebody

has actually gotten access to your computer directly and then they've got this massive

crack erase and massive computers and they have a botnet all trying to break that password.

So let's see this haSAK.com shows us here. So 6 letter passwords, very basic password.

It's all lower case. Now, if you look at it, you'll see in that search space analysis it

says it has 6 characters and the search space is 26 because there's 26 different characters

in our alphabet. But the more important thing is when you go and look how long it takes

to break the thing if you look especially at the second tubing I think they're probably

more relevant your offline fast attacks scenario is.00321 seconds. So much faster than I was

even able to talk about it. So that's with 6 letters. So what we're going to do now we're

going to increase the complexity a little bit. And we're going to do that by adding

a number on substituting a number for the 0 because I want to keep it the same lengths

right now. So what you see the search space depth you've got 26 letters and 10 different

numerical characters to be removed and there's a lot of things for cracking tool to search

through and we've updated it to .0224 seconds so we're like 7 times more secure than we

were the first one but, obviously, not very helpful. At all. So what else could we do

to make this password stronger? You can see that we've got the lower case is checked,

the digit is checked and we'll add a symbol and make one of the letters upper case and

let's see what it does. Changing one letter to upper case all of a sudden, we're at .577

seconds. Still not good but much, much stronger than we were before. And if I make one of

these letters a symbol, all of a sudden, we're at 7.43 seconds. So it's far more far stronger

than the password was that we talked about initially. It's still not going to do it.

Obviously, you know, a 6 character password if they've got access to your computer it's

going to take 7 seconds, roughly, to break it. And hardly any time at all they've got

multiple computers that are trying to break into it.

So we're going to talk about what we can do to make it stronger. I've done all the complexity

things. We've got the upper case and the lower case and the digits and the symbols but what

I want to start doing now I want to make it a little bit longer. So right now it's at

6 so we're going to go to 8. And let's move that to 18.62 hours for the offline fast attack

or 1 minute with a massive cracking erase scenario which sounds really exciting in theory.

We're going to go to 10 characters. Now, it's gone to 19.24 years for the offline fast attack

and a week on the massive crack erase scenario. Let's go to 12 characters and see what has?

So by the time you get to 12 characters even in this massive cracking erase scenario they're

at 1.74 centuries to break that password so not something we have to worry about and 1.74,000

centuries in terms of the offline fast attack scenario where somebody has got access to

your computer. So what this really tells us in I'll talk about it in a little bit more

is that complexity was really important but where we saw the biggest games and a strong

password was by making it longer. Now, if I tell people oh, you're going to be perfectly

safe which I'll never say but if you'll be safer using a 201character password you got

to be out of your mind I'm not doing every 20 character password I know I'm supposed

to have a different one for each one but that's just way too much trouble so let's talk about

some of the options here. Let's talk about something called a pass phrase. Now, the text

I have it was a dark and stormy night which should be familiar to many of. That comes

from a couple of places. One if you're a peanuts fan there's a cartoon Snoopy's on top of the

dog house, typing out: It was a dark and stormy night. It's actually Bluwer Lytton fiction.

It's by a late Eighteenth Century Englishman named Bluwer Lytton, and he put together a

one sentence introduction to a novel, which I'm not reproducing here but it went on and

on and on, and it's really regarded as the worse introduction to a novel in British history.

So, of course, what they did they made a contest and every year they have a contest where someone

submits the worse possible opening to a novel and they kind of rate it and score it and

whoever wins the trophy has got the worse introduction fun fact but, obviously, not

critical to what we're doing. So I'm going to use it with a dark and stormy

night for my pass phrase and I'm going to turn it into something that's actually useable

and would work for us in the computer age here. I need to increase the complexity. We've

got one upper case and all lower case letters so I'm going to change it to it was a dark215&StormyNight

and it gives us special characters and it gives us all of those different elements that

we need. Now, what's interesting is that as you've

seen looking at the previous example with the haystack thing that length is really far

more important than complexity when you're constructing passwords.

So looking at this pass phrase in that calculator, even with a magnification cracking scenario

it's at 89.14 trillion, trillion centuries to break that password. So I think we aren't

going to worry about that one too much. So that's great. Now all you have to do is have

a 25-character pass phrase for every account how hard is that going to be. That's not going

to a very good thing. So we're going to talk about something called

a password manager, and I'm going to jump because I've got a poll question here basically

ask do you use a password manager? And I would like you to complete the poll while I'm talking

about it here, but what a password manager does it manages your passwords so the examples

we have up there KeePass, Password Gorilla, LastPass are all examples of different password

management tools, and the way they work and I used LastPass about 10 years now. The way

they work is you construct this really good pass phrase kind of as your key to your Vault

where you're saving all these other passwords and it will save all the passwords for you

for all the websites that you go to. It will create complex passwords which are going to

be long passwords which have all the complexity that we know that we're supposed to have and

we'll basically provide a way for you to have a password manager on your desktop or with

your browser and be able to have a different password for pretty much every single account

you have online which is the ideal thing because you don't want to use your banking password

for your social media account because if somebody breaks it or tricks you into giving it up,

they're going to have access to your bank account.

So how did we do on the poll here? Do we have any responses yet?

>> CINDY: I'm opening it now. >> BEN: It looks like we've got a very small

percentage of users that are currently using the password managers and nobody said not

sure which is probably a good answer. (Laugh.)

>> BEN: But it's something that I haven't seen a lot of people do somebody told me about

it. They said it's really going to revolutionize the way you use the internet because now you

can have all of these different passwords. And, of course, the big question that comes

up how do I know my passwords are safe doing something like this? Because, obviously, if

you use something like LastPass -- it's a vault that's online and

it's storing millions and millions of different passwords so it's going to be a big target

so what happens with this is that the passwords are stored in an encrypted format. It's a

strong encryption and, yes, there's always a risk with information security. I will never

tell somebody you're going to be 100% secure. We just can't ever say that, but what the

tradeoff has been that I've seen is this helps you use more passwords, which we know is strong

which we know is a good practice. It's stronger to do and you've got some risk in terms of

passwords being exposed but it hasn't happened so far. I mean, lots of people are trying

to get into it and it's the kind of thing if it does happen, you're going to get a notification

and you'll have to change some passwords but again in terms of your working life it's a

lot easier to do this. So I have no stake in these password manager companies but I

do recommend one that you take one of them at least.

And the next thing I want to talk about is something called Multi Factor Authentication.

Now, I think the Google search might have called this two factor authentication. I don't

know, but Multi Factor Authentication. And some of you may recognize some of the pictures

on the slide. But Multi Factor Authentication is normally when you go online you have to

indicate who you are and something that indicates your secret passwords so that you can get

in. So that's they only call it one factor and only using one thing to prove who you

are. With Multi Factor you have something else so you have this password you know and

you have something else which is used to log in.

Now, with things like the Google Authenticator, which is the G in Duo, these are online these

are actually apps for your smart phone and mobile device and they work in conjunction

with the site that you're trying to log into so make sure when you log in to a specific

website and for RIT we've protected our Oracle information or my info site for those of you

who have been at RIT and to log into that now you have to have your user name and your

password and you have to interact with Duo and it's very simple because you basically

on the screen you're logging in and it says Duo, send me a push or Duo call my L.A.N.

line and you've got a smart phone and it buzzes and you say, yes, and you get to log right

in. Some of the other examples in here there's a YubiKey, which is a way of storing passwords

credentials that you use to log into a cower there's an RSASecurID and I had one 20 years

ago when I was doing consulting and that number would change every minute and you would have

to enter that number every time you logged in.

The other thing on the slide, Turn It On, that gives instructions for about 100 different

websites in terms of turning on two factor authentication, and it's probably the best

way to protect yourself. Again, security usually makes things a little

harder to do but it's always that tradeoff between your protection and things being a

bit harder. So my next question take a minute here into

the chat, what do you think the most common way is of getting a password. What are your

ideas on that? I'm going to answer Christina's question right now because we're in the space

right now. In terms of passwords, personally I use last

price and that has troubled in price over the last year. It's $24 a year for using it

on your computer and unlimited mobile devices so you're talking $2 a month for the protection.

There's an open source one called KeePass, which I know people who have used it for years.

I'm not really fond of it because it's open source and open source to me means that the

documentation is terrible because it's put together by a group of programmers and they

understand it. But KeePass LastPass, Password Gorilla. There's another one out there that

I'm not remembering right now, but I typically, what I would do I would search Ghoul for password

recommendations and get past the paid ads and look for the ones that may actually do

some review on it, but the important thing is you use one.

So what did we have in terms of common ways of getting passwords? What did people enter

in the chat? You're just asking for it, spoofing spoofing in the sense of pretending that you're

somebody else. Asking for it, address, pet's name or kids' name. Absolutely, people love

to use your pet's name as passwords and they also you have to post pictures of their pet

so it's not real hard to figure out but in general the and the other question that came

up here and I'm trying to read the chat one and talking which is a mistake but the dash

link the one I can't remember the name of it was, and I personally have not looked into

that very much, but the key things you're talking that I'm seeing in here so far they're

trying to fool people into giving up their passwords and that's the far most effective

way to do it there's very little risk to the attacker they want have to be clever or buy

tools to figure it out or break a password like we showed earlier. The easiest thing

is just asking for that password. Now, the nice thing about the Multi Factor

Authentication is that even if you give up that password, because it's requiring that

other piece of information, they don't have actions to it. So your account is still protected.

So that's the really that's why we think it's such an important thing in terms of protecting

account credentials. And the other trick, of course, is people

said spoofing and I'm going to use phisching in terms of people fooling you into giving

up your password. The tricky part is finding out if it's a issue if fishing account, and

if you don't have a PayPal account and you get an email from PayPal, it's obvious it's

not yours. For years it was easy to tell because the grammar would absolutely be terrible and

as long as you're not in too much of a hurry you could tell something was wrong with the

request that had come in. But essentially those kind of problems have been taken care

of because attackers can now buy kits online to do phisching attacks and it takes care

of these nice templates making it easier for you to fool with. So the rule of thumb we

have and I've got the slide out of order. Don't give up your password. No one legitimate

is going to ask you a password send you an email to ask for it. They don't need it to

reset it so just don't do it, so that he gets this slide I have up here the one on fraud

scams and malware gets into the other types of social engineering types of attacks where

they try to trick you into doing things there's been a lot of talk, you know we've all seen

lots of things about the elections lately about Russia attempting to do social engineering

and that has been their practice for many, many years. It's like we've finally woken

up this time. But the big deal is to trick people into doing things or get people to

do things they wouldn't normally do. So the kind of things we see in fraud, scams

and malware malware is malicious software which usually would be an attachment or something.

But we see requests like they came from the president's office asking for a copy of everybody's

W2 Forms. Or can you transfer the $500,000 amount and do a wire transfer quickly. We're

behind we need to get this thing paid and it looks like it's come from the chief financial

officer requesting somebody do that, and it's all where they try to trick people and it's

all different types of attacks. Say I'm a small nonprofit locally we've seen a steady

stream of fake invoices trying to trick our treasurer looking like it comes from the president

and tricking the treasurer into paying something. This is not just directed against long groups,

it's pretty much directed at all of us. The rule of thumb you don't want to take the bait

and don't give up your password and this section we're going to talk now of protecting your

identity and your online safety when you're doing social media and things like that.

So the newer threat we've seen that started probably about 2 years ago and we're seeing

more and more of is something called Ransomware and you can see this is a screen shot and

I think it says you have to pay $300 or 250 or something like that to get your files back.

But the way Ransomware works is that they trick you into installing a piece of software,

malicious software and that software goes and encrypts all the data on your computer,

and the better ones, air quotes around that, if you're connected to a network share or

a portable hard drive, it will also go in and encrypt that information as well. So the

problem is that once it's done it's too late to do anything about it and if you're lucky

maybe you're antivirus detected it before it started maybe you've unplugged your computer

really quickly and it didn't get very far into it. And you still have to figure out

what happened after you plug it back in but the key once you've been attacked it's too

late and you want to see things about the last year or two about the police departments

had their data encrypted and having to pay a large amount of the money. A large health

care system was attacked in the United Kingdom years and I believe to pay a lot of pounds

to get their data unlocked again. So the real issue is how do you protect against something

like this? You have to protect against it ahead of time. You have to back up your data

and we're all Leah about this sort of thing and it's like oh, we know we'll be okay and

we know our hardware might crash sometime but, of course, we're going to get some kind

of warning that it's going to happen which, of course, doesn't happen, and even online

accounts like Dropbox and things like that some of this Ransomware is sophisticated to

reach up into those accounts and encrypt it also. Best rule of thumb with protecting yourself

against Ransomware making sure you have a copy of your data and that means regular backups

and it means not just having a portable hard drive connected to your computer where you

copy files over. You actually need use some kind of a program for it. But so Ransomware

is probably or one of the scariest things come down the line last year.

Now, this point in time I usually pop up this slide and some of my audience I'm sure is

old enough to remember this, but these are the old duck and cover drills where everybody

hid under our seats to protect themselves from atomic bombs which, obviously, wasn't

going to do any good but it made us feel like we were doing something and I got a lot of

people in the audience who look like deer in the headlights and I want to talk about

some of the things you can protect yourself rather than telling you all the bad things

that can happen. Again, the Number 1 thing don't get hooked.

Never respond to email requests or phone calls or text messages or anything health that are

asking for your password. That's an easy one. If we just did that we'd be in great shape.

The other question I've got as we launch into this is I'm assuming most of you have mobile

devices, smart phones or tablets of some kind or other. The question I have for you we have

a question, yes. Is do you have a mobile security app on your phone? If you do, please it's

a poll so please answer the poll. I'm interested to see what the responses are here. 'Cause

I know how it goes when I'm doing this as a live in person.

>> BEN: It's not looking too good for the yes but someone it has. 2 people. So here's

part of the issue we have and all of you know this. Especially if you're an iPhone users

and I don't want to bash Apple on this but Apple has never made but they made things

easier for users and they've given a nice interface. They don't talk about security

very much and iPhones can be attacked and androids can be attacked and pretty much any

of the operating systems that are out there on smart phones and tablets and the things

like that. The list here is kind of a short list like the things like find my iPhone but

some things are actually apps that you can add from your marketplace or your Google Play

Store depending what you're using and they provide additional security. They'll scam

the applications that you're trying to install. They'll make sure they're okay and they'll

tell you if you've got weird permissions you're asking for if they're able to do things more

often than not. Again, I encourage you to research various, you know just do your Google

search of mobile security apps for whatever kind of device you have and see what the recommendations

are. You'll find that will secure things and the reason why this is so important I think

most of us are aware that over the last several years there have been far more smart phones

and iPad things and tablets stolen than regular computers and what it means for the cybercriminal

who's out there trying to trick us and get our money they're going to go after those

mobile devices. That's where people are and that's where they're going to invest their

money. And they're not as easy to protect. One of the questions I typically ask in the

class is how do you tell where a link goes to on a mobile device? And we're not going

to ask it as a question now but what happens is you can't hover your cursor over it like

you would over a computer. You can't really hover your finger over it either, and if you

just touch the link it takes you there. If you find out where it goes you actually have

to push down on the link with your finger and hold it down until it shows you where

it goes. And that is not a good design. Obviously, if you let up on your finger too soon it's

taking you to that link. So this is one of the reasons, I think, that mobile devices

are attacked so much 'cause they're just harder for us to think about defending.

Now, what's interesting is that Google question that came up really easy where the most important

thing to do was to install software updates we do that on our phones. We know we need

to do that on our phones. We get them daily for all these different apps so it's the same

thing with your computers you want to make sure things are kept up to date.

So I'm going to talk about a few other things here about protecting your information. Great

drawing created by a student who worked in our office at one point in time and it's very

it's a good illustration what's out there because something may appear to be a sheep

but it's really a wolf in the background and you cannot tell by what you see online. You

cannot tell. Friend requests hey, great. But who knows what they're really like. It's not

saying criminals can't look great either for that matter.

So my Number 1 rule of thumb we can never assume on privacy whatever we share online

we have to assume at some point it's got to be revealed. We had no control over what happened

with Equifax with them revealing all of those passwords or Yahoo! I think they revealed

2 billion passwords. They had 2 billion passwords. They revealed every account password they've

had and we have very little control but we do have control over the types of information

we share and that really comes into social media. A lot of times you'll sign up for Facebook

or some other social media account and it may ask for your birthday or hometown or ask

you where you went to school. You can provide that information but you need to think about

the types of information it's asking for and makes sure you're comfortable with providing.

But again, even if it says it's secure and private you've got to assume at some point

it will be revealed. The next screen which is probably not readable

is privacy settings that's actually from my Facebook account and what was interesting

about this is when I went down and I looked at who can look me up and the second thing

on there said who can look you up using the phone number you provided and it said everyone.

I never remembered giving Facebook permission to do that. So that must have been a default

setting, and what I recommend is that every few months go into your privacy settings in

these different social media accounts, make sure that nothing has changed and make sure

that they're all settings that you're comfortable with and change them now if they're if you're

not comfortable with them. Do what you can to protect your information.

Now, something they also provide that are good are log in alerts which you can sign

up on the various social media accounts. I was speaking in a conference in New England

in the fall and while I was there I got 6 or 7 messages from Facebook that somebody

was trying to log into my account. And they knew actually, I think they were coming from

Australia of all places, but it alerted me that was happening which was a little discomforting

but also told me I didn't need to change the password but the good news is when you log

into Facebook and let's say you log from out of town you'll get these alerts because you're

not the internet the IP address that you are connecting from and it will let you know.

A couple other tips here use something called Google alert that you can set up. You can

monitor used of your name and put in your email address and anytime that appears online

in this place Google indexes it will give you a report on that. And you can aggregate

it so you can get it maybe once a day and you can use this alert to follow various subjects,

sports teams, all sorts of things like that as well. So it's got some things it's got

some play value also. Google also has my account dashboard -- if

you're a Gmail user, which is probably 90% of the world, at least at this point, one

thing you can do is go to is go to my account dashboard and it will allow you to do a security

checkup and privacy checkup and I encourage you to do that again just so you know what

you're sharing. You can see below privacy checkpoint it will show you the activity which

has been associated with your account and if there's things on there that you haven't

done then that account has been hacked at some point.

Another nice trick which somebody told me about is doing something a Google reverse

search. I don't know how many of you have used LinkedIn and I will connect with anybody

and it looks pretty bizarre. There's fake accounts on LinkedIn and like fake accounts

on Facebook and others, and it will allow you to select the imagine depends on if you've

got Chrome and it will show you all the places that image is used. I've got a connection

request from probably one of these people right here on the right here but that same

picture was used with at least 4 different LinkedIn accounts so it's so it's a generic

picture so maybe it's one of those people but it's a good way to check to see it's the

image that's commonly used on the internet and they're using it for a fake account and

they want you a fake account because they want to get you over to your connections.

So another issue and again, it's not typically an issue with faulty or staff or audience.

You want to protect your your only image is what they see about you online. This example

here is from a poster from the University of Wisconsin and would you hire this guy and

somebody's told me at one point they think it would be milk. I'm not buying it. But the

idea again is that understanding whatever you do online people are going to make decisions

about you and make judgments about. So that is the presentation and I'm going

to pop up my next which is my website, while we're talking here, but what questions do

you all have? And thank you for the opportunity. >> CINDY: Thanks, Ben.

There are a couple coming in. So if you have additional questions, folks, please send them

in through the chat box. A couple of things that have come up what if you do not put your

portable hardware drive online. Will the Ransomware still attack it?

>> BEN: As long as the portable hardware drive is connected to your computer, yes. Depending

on the strain of Ransomware, it will go into everything you're connected to. So the idea

if I was using a portable drive for backups, I would back up and then I would unplug it

and I would plug it back in when I'm going to use it, you know, back up to it again.

Typically, my experience we use those as additional space and not backup space. We really need

to think of it as an opportunity to back it up and again, back it up and just disconnect

it and it's not going to jump into it if it's not connected.

>> CINDY: Okay, a question from Pete. What's an example of a mobile security app?

>> BEN: Well, depending on your phone and depending on how old it is, you will kind

of dictate what you really need. So one example of a mobile security app is something called

LastPass and not LastPass I've got that wrong. Lookout. It's called Lookout. Lookout what

it does you stall it from your app store and it scans all the applications that you install

to make sure there's nothing malicious in them or whether they're asking for weird permissions

like why do they need access to your computer and that sort of thing. Lookout also has the

built in thing that iPhone users have enjoyed where you can find your phone through Lookout

and what you can do is you can bring up a map and it will show you where your phone

is within 75 feet, I think, it is. And you can also get it have your phone emit a high

pitch squeal noise, and that will help in terms of trying to find it.

The main thing it does is it looks at your applications and make sure none of those are

malicious and they do sneak out occasionally where they are bad. I used a program by Sophos

for my smart phone, and it was very aggressive in terms of what it would warn me about and

it would start talking about low reputation application and it told me Google Play was

a low reputation application and a bunch of other things and it was probably a little

bit too hypersensitive so I had to kind of turn those notifications down some. But the

idea it's a third party application that you would add to your smart phone or other mobile

device. A very long answer to a short question. >> CINDY: That's okay. Thank you.

Adam has a question. What is the best way to implement a safe home network where my

spouse and I can count on safe robust backups that can be automated by software and then

what software might that be? >> BEN: Yeah, I think this is probably a question

is a little bit beyond the scope of what I was prepared to talk about. But in general

you want to use a router and some of the I'm trying to remember whether our router does

this or not I've got what they call a Cloud drive which essentially allows me to back

up to it in the house. I've got the system set up to back up to it and then it will back

up that data to the Cloud and I don't do not remember what the cost is per gigabyte or

whatever or storage but storage prices are going down and down. But ideally what you

do to protect your data is you make you get a copy of it and you have that copy somewhere

besides where the computer is located because there should be a break in or fire or anything

else, you don't want to have lost every bit of digital information you have. We've become

too dependent on it. >> CINDY: All right, um, question on that

came in from I don't know who did that come from? Jim? Is there value to use the traditional

antivirus software that works on a mobile device?

>> BEN: Yeah, so when I'm talking about a mobile security app, they will have antivirus

built in. Cybercriminals are still crafting malicious software to attack phones. A banking

Trojan a couple of years ago, which was still out there and I'm drawing a blank on the name

of it, but what the Trojan means it's like the Trojan house it looked like something

else and there was a banking Trojan and what it did it captured all your banking activity

online. It didn't worry about anything else you were doing but anytime you went to a bank

it would capture that information and send it out to somebody. The antivirus I think

what you'll find I'm not sure you can get strictly an antivirus for your phone at this

point. They'll all be more robust security suites of software.

And the good news is most of them are free. Or at least have free versions, and the reason

for that is it is it helps all of us to get this security software out in the marketplace

because it reduces the amount of the attacks that go on.

>> CINDY: Thank you. Another question came in from Adam. Do you

know if Mint.com is a good third party app for a bank security?

>> BEN: It's not anything I have used but my rule of them point of view I want to get

a good idea how many people are using it. I'm not aware of any breaches which is what

they would call the releases with Mint.com, but they be associated with Intuit which has

Turbo Tax and there have been occasional problems, but I'm a Turbo Tax user myself and I haven't

worried about that. The biggest issue is people asking for passwords and people giving them

up. In terms of Verizon security and privacy app,

I'm not familiar with it. I tend not to use I have Verizon but I tend not to use their

built in stuff. I don't like it. It takes up room that I would rather use for something

else. But in general I'm going to give you the same response. Do a Google search and

look for reviews and see what they have to say about it, and, unfortunately, it's going

to be pretty much my responses to any specific security app or software questions today because

it changes. It changes monthly depending on which one is more effective.

>> CINDY: So if I've got malware on my device, what do I do?

>> BEN: Take it to somebody to look at. If you're associated and I can't tell you exactly

who to take it to look at. If you're around here around RIT in the community I think you'd

probably go to the digital den and ask them for their recommendations on it. Worse case

you just reset the device and wipe and return it to factory specs and that should take care

of any malware that's on the device. >> CINDY: Okay. Here's a question that came

in about looking for advice for parents to communicate to young adults and students about

not sharing their personal online ID, if they're uncomfortable doing it. Any thoughts for frustrated

parents out there? >> BEN: Yeah, a couple of things. Parents

don't tend to use the same applications they're kids do and I think that's deliberate on the

part of the kids. But they'll use things like Snapchat which is supposed to be this very

brief period of time a picture is available or something like that. But people can take

a screen shot of it. They can take a picture of the device that the picture came in on.

There's also been cases where it's like oops, somebody broke into the Snapchat servers and

they found all this information that was really supposed to be ephemeral.

The best place I would tell you to look is go to a website called Stay Safe Online, and

it's a Government website that's set up and it has a whole section on parents and teens

and preteens and what kind of information to share with them. I think that will be your

best option to Stay Safe Online. >> CINDY: Okay, thank you.

Are there any additional questions? If not, we're putting that website for Stay Safe Online

into the chat box. So I guess if there are no additional questions

we will wrap up. So thanks to Ben for coming back and being

a presenter for this second time. If you do have a digital question, you can email at

to lumbar RIT.EDU_alumni with the hash tag meRIT with the webinars, and we'll try to

get you some information for the panelists today.

As a reminder all of you will receive an email from us in the next few days with a link to

today's webinar recording. Ben I can't think you enough for being our

presenter today and thanks to all of you out there for participating in today's webinar.

Our next webinar is Thursday, March 8th, called Build a Better Brand from the Office of Career

Services with Kris Stehler. Look for your special invitation and your email coming shortly.

Again, thanks to everyone for joining. You can exit this webinar by simply closing the

WebEx window and has do let us know what you thought of the webinar with by taking the

brief survey which pops up when you exit the webinar. Thanks. And have a great day.

No comments:

Post a Comment