The Secret (for parents)

By stefan, DIYFather.comAugust 08, 2012 at 02:37AM

If you are a fan of “The Secret” you will love this … we are revealing one of the best kept secrets for parents here on DIYFather.com. The secret is about helping your kids acquire a particular skill. As parents we are often inclined to help our kids by pointing out what they shouldn’t do. This rarely works and there is a good reason for it. When we point out to our kids what they shouldn’t do, they have to visualise what they shouldn’t do in order to understand what we mean. E.g. “don’t lean back when you are kicking the ball”. Unfortunately “the body” often responds to the visualisation by following it – i.e. our children end up doing exactly what they shouldn’t do.

So here’s the secret – if you are trying to help your kids acquire a skill avoid pointing out what they shouldn’t do. Instead only point out things they should be doing – e.g. “lean forward when you are kicking the ball”. Try it out – it really works!

Enjoy

DIYFather.com

Internet Archive Enables Over 1,000,000 Torrents Of Books, Music And Movies

By Mike Masnick, Techdirt.August 07, 2012 at 11:06PM

We sometimes hear people say that BitTorrent as a technology is only good for infringement. We know that’s not true, but then people will point to examples of how frequently it’s used for infringement. Of course, that’s meaningless when you look at both the larger picture and the nature of trends. When new distribution technologies are introduced, it’s not surprising that they’re used that way because there’s so little legitimate activity on the system. But that changes over time. Remember, when the VCR first came about, nearly all activity on it was described as “infringing” by some, because there was no legitimate content being offered. However, obviously, over time that changed and more and more legitimate content was offered.

Over the years, we’ve certainly seen an increase in content being offered via BitTorrent, but today there’s a big addition: the Internet Archive has enabled over one million torrents of books, music and movies from its collection.


The Internet Archive is now offering over 1,000,000 torrents including our live music concerts, the Prelinger movie collection, the librivox audio book collection, feature films, old time radio, lots and lots of books, and all new uploads from our patrons into Community collections (with more to follow).

And while some ignorant organizations may declare that the Internet Archive is a “rogue site,” I think most people recognize that it’s a wonderful repository of all sorts of legal content, much of which is now available using the rather efficient distribution technology BitTorrent.

Permalink | Comments | Email This Story



Production Methods: Thermal Drilling

By (author unknown), Core77August 07, 2012 at 05:00PM

0thermdril01.jpg

In addition to friction welding, there’s another production method that exploits heat from friction to perform operations in metal: Thermal drilling.

With thermal drilling, a conical bit is rotated at high speed and driven into sheet metal or the walls of metal tubing. The heat generated deforms the material at the point of contact, allowing the bit to push through. But what’s especially neat here is that material is not excavated, as with drilling a hole with a conventional twist bit; instead the heated material is actually formed into a bushing within the workpiece itself, providing a convenient mounting point for a fastener. And yes, it can be tapped.

0thermdril02.jpg

Check out this video demonstraiton, put together by thermal drilling company Formdrill USA:

(more…)

Strong Passwords Aren’t Enough: How to to Ensure the Apple and Amazon Exploit Never Happens to You [Video]

By Whitson Gordon and Melanie Pinola, LifehackerAugust 07, 2012 at 01:30PM

Strong Passwords Aren't Enough: How to to Ensure the Apple and Amazon Exploit Never Happens to YouThis weekend, former Gizmodo writer Mat Honan lived every tech geeks worst nightmare: he got hacked, with all his accounts compromised and his computers wiped with no backup. The scary part: No “real” hacking was involved—all it took was a few support calls to Apple and Amazon and nearly all his most important accounts were compromised. Here’s everything you need to do now to keep this from happening to you.

What Happened

The person who hacked Mat’s accounts didn’t need to crack any passwords to get in. Instead, he used social engineering, manipulating both Apple tech support and Amazon into believing they were Mat (something that’s easier than you might imagine). Apple and Amazon only require limited, easily accessible information, including billing address, email, and the last four digits of a credit card (which sounds more difficult to access than it was) before allowing anyone to change or reset user accounts. Once the hacker had access to Mat’s iCloud account, he was able to get into Mat’s Gmail and other accounts, not to mention wipe his iPhone, iPad, and Mac, setting a PIN that kept Mat from recovering any of that data.

What happened to Mat was awful, but we should all take this as a cautionary tale to not only set up good security and backups, but to take heed of security flaws in services like iCloud. Here’s what you should do right now to protect yourself from a similar incident.

Audit Your Insecure Services (Like iCloud)

Strong Passwords Aren't Enough: How to to Ensure the Apple and Amazon Exploit Never Happens to YouThe biggest problem in Mat’s breach was that there were some serious security flaws in Apple and Amazon that let the intruder right into his accounts. In his Wired piece on the hack, Mat details some of the things you can do to avoid a similar issue with iCloud. Namely, you should create a separate Apple ID for your iCloud account, turn off remote wipe for your computers, and don’t attach your home address to anything public, like your personal domain name.

Takeaway lesson: Some services, like iCloud, don’t have the security features they should have. As such, make sure you don’t give them too much power, and don’t connect them with your secure accounts like Gmail—one weak link in the chain can bring everything crashing down.

Use Strong, Separate Passwords for Every Account

Strong Passwords Aren't Enough: How to to Ensure the Apple and Amazon Exploit Never Happens to YouWhile it may not have helped Mat, everyone should still have a good password system set up. We’ve shown you how easy it is to hack a weak password, and if you use the same one everywhere—or even easy-to-crack variations—you’re screwed. Remembering 100 different passwords can seem tough, but it’s okay if you don’t know them off the top of your head—in fact, it’s more secure. Use a tool like LastPass (or one of these alternatives) to keep your passwords easily accessible from any of your machines, no matter how long or complex they are (but remember, multi-word phrases are actually the best password you can have).

Takeaway lesson: If you haven’t updated your passwords in awhile, take some time to audit and update your passwords now to get it all done in one fell swoop.

Enable Two-Factor Authentication to Ensure No One Gets In

Mat didn’t have his passwords “hacked” in the traditional sense of the word, so even with strong passwords, his accounts still would have been compromised. However, two-factor authentication could have stopped the whole thing from happening. Two-factor auth requires something you know (your password) and something you have (your phone), so when an intruder types in your password, she won’t be let in unless she also types in a code sent to or generated by your phone, which only you have.

Takeaway lesson: Set up two-factor authentication on every account you can, like Google, Facebook, and other high-profile services. It’s one of the best ways to protect yourself against any kind of breach.

Strengthen Your Password Recovery Options

Strong Passwords Aren't Enough: How to to Ensure the Apple and Amazon Exploit Never Happens to YouEven if your passwords are different across all services, you’re done for if a hacker gets into your email. With access to your email, they can reset your password on any other service you want, which is why you should consider using a non-primary email address for password resets and other recovery options. Setting up a Gmail or Outlook account is free, and you can have as many as you want, so set up a new email address and change all your recovery options to go to that mailbox instead—if someone ever gets into your email, you’ll be glad you did.

You should also make sure your security questions aren’t easy for someone to answer. Anyone can figure out your pet’s name or high school mascot, so those won’t keep you safe. Instead, strengthen your security questions by adding extra words, picking out key words in the question, or shifting your hand on the keyboard. That way, they’ll truly become questions only you know how to answer.

Takeaway lesson: One of your biggest security flaws is probably in your password recovery method. Make sure your security questions aren’t easily answerable, and that your password resets go to a separate account designed for resets only.

Back Up Your Data

Strong Passwords Aren't Enough: How to to Ensure the Apple and Amazon Exploit Never Happens to YouBy far the worst factor in Mat’s breach was that he didn’t have any of his data backed up. He lost a year and a half worth of photos, emails, and documents when his computer was wiped with no way to get it back. You’ve heard us say it a billion times, but if you haven’t started backing up your data, let this be a wake up call: data loss can happen at any time for any reason, and you don’t want to be kicking yourself down the road. Take 30 minutes and set up a program like Crashplan, our favorite backup app for Windows, Mac, and Linux. When you’re done, you can just set it and forget it, and you’ll have that backup in case anything ever goes wrong.

If you don’t back up to the cloud (or you want a local backup as well), check out these recommendations from our friends at the Wirecutter. They have picks for external drives, cheap network drives, and full NAS solutions for all your home backup needs.

Takeaway lesson: Seriously, guys, back up your data. It only takes a few minutes to set up, and it’ll make sure you never lose your most important files.

Title image remixed from creatOR76 and VLADGRIN (Shutterstock).

Move Over Farmville: Here’s a Real Farm on Your iPhone

By Dane Carlson, Business Opportunities WeblogAugust 07, 2012 at 12:36PM

Farmlogs

NY Times:

The world doesn’t necessarily need the gazillion-and-one games that seem available on smartphones. But it could use more apps and services that address the needs of business people with specialized needs. Like farmers.

FarmLogs, a start-up based in Ann Arbor, Mich., is a one of a few new companies that are making a pitch to farmers. It offers a cloud-based software service — no software is downloaded; only a Web browser is needed — that embodies the latest technology. But in reaching its intended customers, the company must often rely on an old-fashioned medium: in-person selling.


NASA’s Curiosity captures awe-inspiring shot of Mount Sharp, uploads video of descent upon Mars

By Darren Murph, EngadgetAugust 06, 2012 at 08:11PM

NASA's Curiosity captures aweinspiring shot of Mount Sharp, uploads video of descent upon Mars

NASA’s Curiosity rover hasn’t even been on Mars a full 24 hours, and already the science world is reaping the benefits. Nerds, too, actually. The shot above is the the first high(ish) resolution photo shown to the public from its cameras, depicting a shadow of its top, a peculiar Martian landscape and the three-mile Mount Sharp. Just beyond the break, you’ll find video footage of the intense descent onto Mars’ surface. It’s a low-res stop-motion affair displaying 297 frames as it found its way from space to a foreign land. Trust us — it’s worth the 1:03 time investment.

Continue reading NASA’s Curiosity captures awe-inspiring shot of Mount Sharp, uploads video of descent upon Mars

Filed under: ,

NASA’s Curiosity captures awe-inspiring shot of Mount Sharp, uploads video of descent upon Mars originally appeared on Engadget on Mon, 06 Aug 2012 20:11:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceTwitPic, JPLNews (YouTube)  | Email this | Comments