Watch 13 dogs and 1 cat eat a holiday feast with their human hands.
You may have to watch the video more than once to catch all the subtle nuances (eg: the dog who steals silverware).
There are many apps on Google's Play Store that can be dangerous to use, which is why you should scrutinize the permissions that each app requires before installing it.
Some apps cross the line by installing malware on your smartphone that can compromise all of your personal data (including username and passwords you enter on your phone). A good example of this type of infiltration is through a simple flashlight app used by hundreds of millions of unsuspecting people.
Brightest Flashlight Free and Super-Bright LED Flashlight are just two of the many flashlight apps available on Google's Play Store that require too many permissions and installs malware.
If you'd like more proof, read the "FTC Approves Final Order Settling Charges Against Flashlight App Creator".
Requiring Unnecessary Permissions
What Flashlight App Do I Use?
It needs access to your camera because it uses it's flash bulb, nothing more.
There are other flashlight apps that you can use but be mindful of the permissions that they require.
I've been telling our customers for years, "Have you heard the saying, curiosity killed the cat"? Well, it's true. Don't click on links just because you're curious, it's better to be safe than sorry.
Ultimately, we are responsible for infecting our computers because we're the person clicking on a potential threat. And, don't be fooled to think that antivirus software will protect you, even if you've spent $100.00 or more on it. The simple truth is, it won't. As far as the antivirus software is concerned, you said it was okay to click on a link or download a file.
The best way to protect yourself, is to know where the threats come from when using Facebook.
There's a terrific article on MakeUseOf by Kihara Kimachia.
He'll show you 5 places on Facebook where potential danger can lurk and how to avoid them.
- Clickjacking Threats
- Phishing Exploits
- The "Facebook Team"
- Rogue Facebook Applications
- Malware Attacks
Do you remember how life was without Facebook? Probably not. The site has pervaded our lives and it is no surprise that Facebook is now prime hunting ground for anyone with nefarious intentions. -Kihara Kimachia
I created a Facebook account in February 2006 but I haven't logged-in since March 10, 2010 (they haven't deleted in spite of my long absence). And, surprisingly, I'm still able to breathe and function in my day-to-day life. I found things to do long before Facebook was known, heck... before the internet was available.
I found a good article by Audra Rundle in The Huffington Post regarding her journey away from Facebook.
Two months ago, I was sitting in front of my computer one evening when I finally lifted my eyes away from the screen. I had logged onto Facebook to space out and relax 'for a few minutes', yet somehow nearly 20 had already passed. I looked over at my husband cooking and listening to music in the kitchen, and all I could think was, "I could have been talking with him these past 20 minutes." Instead, I'd spent that time 'catching up' with real-life strangers and fulfilling self-imposed social obligations. -Audra Rundle
How many of them pertain to me? I can honestly answer, none. I haven't logged-in to my Facebook account since March 10, 2010.
If you want to learn how to stop them from selling your browsing information to advertisers, read Angela's article.
- City by city breakdown of where your job title is located.
- Hover over a city name to find out how many jobs are available.
- Level of opportunities per county.
- Add your partner's job title to discover where your combined skills are needed.
- Suggests other jobs that you're qualified to consider.
- Percentage indicating number of people who've transitioned into a newly discovered position.
your mouse over the enlarged picture to view the arrow to advance).
The 88 second video below covers all the key points of using their Job Explorer website.
Download Glassdoor's Android or Apple App
I make it a point never to use public computers; I travel with a used laptop with a VPN installed.
I came across a good article entitled, "You Should Treat Public Computers Like Public Bathrooms". It shows you what to be mindful of if you have no choice but to use a public computer.
"When I was in college, the main campus library had several computers set up on the first floor for public use, and invariably, whenever I used one, a previous user had not logged out of her Gmail account. So when I tried to load my account, I would instead find myself staring at the entire contents of someone else’s inbox. Of course, I would then log that person out and sign myself in—but those brief moments when I had complete access to another person’s email were terrifying nonetheless. How could people be so careless with something as valuable as their email account?" -Josephine Wolff
I thought of a few other words that he didn't mention in his video:
- There, their and they're (they are).
- Your and you're (you are).
There are times that I use abbreviations of words when typing on Twitter or sending texts since there are character limitations (140 and 160 respectively). However, I still use contractions correctly and the proper form of a word (eg: red or read).
- any1 = anyone | every1 = everyone
- b = be
- b4 = before
- c = see
- pls or plz = please
- r = are
- u = you | ur = your | u're = you're
- 2 = to | 2day = today | 2morro = tomorrow | 2B = to be
- 4 = for | 4ward = forward
When I write contracts for our business or content for our websites and blogs, I'm vigilant about making sure that the words are spelled correctly. In addition, I make sure that the proper use of grammar is followed to ensure that what I write 'reads' as I intend it to be.
Enjoy the video.
Crucial Changes to Implement:
- The router administrator password and username should be changed from their default settings.
- The name of your wireless network (SSID) should be altered from: Actiontec, Linksys, etc.
- Change the wireless security mode to WPA2 and utilize a long password.
"Your router is the first line of defense against hackers trying to access all the internet-connected devices in your home. Sadly, many of the top Wi-Fi routers are easy to hack. You should be concerned—and also make sure your router is set up properly." -Melanie Pinola
Our twitter friend, Deia wrote an article on WiseBread, listing "10 Helpful Ways to Keep Your Laptop Safe While Traveling".
"Leaving your laptop at home is supposedly going to help you relax, but what if you're more anxious without your laptop? You may not be working during the trip, but there could be possible emergencies to handle. And let's not forget that a laptop can function as a travel agent, a guidebook, and an entertainment center, too." -Deia
Number 3 mentions using a laptop security cable. I've purchased and have used this brand from Amazon for several years. It's inexpensive, easy to use and built to last.
I'm a strong advocate of Deia's #6 idea to use a VPN. I've used a VPN since 2009 for daily home/office use and especially while traveling (more VPN articles).
You can find quite a few help videos on Keurig's website showing you how to clean your coffee maker.
However, Katie B. has a slight twist when cleaning your brewing system that might bring it back from the dead.
I wonder how many people have thrown away their coffee makers because they didn’t know how to clean a Keurig, particularly one that doesn’t pump water any more? -Katie B.
I had a foldout keyboard for my Motorola i85 cell phone back in 2000 (remember Y2K?). There wasn't any public place that I could use it that didn't attract attention to myself. It was a good conversation starter because it was the newest technology at that time.
As the video below shows, the laser keyboard will definitely make the people around you look twice.
Order From Amazon
A VPN, or a Virtual Private Network, is a great tool to protect your privacy and security while you use the internet. Whether you're at home or using public Wi-Fi while traveling, the best combine great pricing with security features and privacy guarantees that make them worth your trust. -Alan Henry
No Traffic Logs
Always looking for new experiences, cultures and ideas to share with my friends and family. I'm a gruBBy huBBy, Dad, Grandpa x5, business owner and fuRRy cOmpaniOn
Google Play Store
HTC EVO 3D
HTC EVO 4G
Keurigreg Coffee Brewersc05f6cd828
Samsung Galaxy S6
Samsung Galaxy S6 Edge