Monday, February 28, 2022

What Is ‘Slugging’ (and Is It Really Good for Your Skin)?

Photo: Anna Gawlik (Shutterstock)

On social media, what was once conventional beauty wisdom can easily start to trend after a quick rebranding to make it seem like a brand-new, cutting-edge tip. Just as easily, it can be replaced with another hot new trend, which could contradict the first one. Remember how beauty gurus used to insist you should put a huge, downward-facing triangle of concealer under each eye, then suddenly reversed course and said you should only use a tiny amount at the outer corners and, actually, it should point upward and outward? Now, every time you do your contouring routine, you have to stop and question which way is the supposed “right” way to apply concealer—at least according to a handful of well-compensated and conventionally attractive young women on YouTube and TikTok.

It’s better, of course, to keep aware of the trends, test them out, and only adopt those processes or techniques that make sense for your face, your lifestyle, your budget, or your schedule. “Slugging” is a great example of a beauty trend that is everywhere right now, but might not be a great idea for your skin, just as giant triangles of concealer didn’t do your under-eyes any good in 2017.

Here’s what you need to know about slugging before you test it out.

What is slugging?

“Slugging” is the trendy word for applying a substance like Vaseline or Aquaphor to your skin in a decently thick layer, then sleeping in it. The idea is that because occlusive products create a barrier, they’ll make it easier for your skin to retain water. Your face, then, will be well-hydrated, less dry, and plumper, in theory.

Slugging isn’t new in any sense. The word itself has been around for years, but has boomed recently on TikTok, where views of the hashtag total more than 189.5 million. Many of the creators who are beaming into their cameras while instructing their followers to glob Vaseline on their faces also claim their mothers or grandmothers shared this secret to perfect skin with them and have done it for decades.

Does slugging work?

Like any other skincare practice, this might work for you or it might not. Your skin is impacted by all kinds of things, from where you’re at in your hormone cycle to what the weather is like outside. If coating yourself in Aquaphor could magically give you perfect skin, dermatologists would be out of business.

It can be useful, sure, by helping you retain moisture, as long as it doesn’t clog your pores. While all the beauty gurus hyping this slimy routine insist it won’t do that, you won’t know for sure until you try. It is key, however, that you cleanse and exfoliate well before glooping anything occlusive on your face. If the goal is to create a barrier that water can’t escape, think of how bad it would be to create a barrier over dirt.

Some fact-checks have rolled in since this started trending, too, so you don’t solely need to rely on your own field testing. Dr. Mamina Turegano pointed out in her own TikTok video that slugging can exacerbate acne on the skin of those who are prone to it, but added it’s “otherwise great for other skin types.” If you get breakouts or blackheads easily, this might not be for you at all.

Another drawback: Consider that your pillowcase is going to be disgusting and require extra washing.

So, how do you slug?

If you still want to slug, start by putting your hair back with a headband. Your face is going to be full of goo, very sticky, and uncomfortable as it is. Next, cleanse your face. If it’s your exfoliating night, do that (but remember not to exfoliate every single evening). Do your skincare routine as you normally would, including your toner, your serums, your retinol, and even your standard moisturizer.

Using a clean scoop or a clean finger (if you don’t share the tub of Vaseline with someone else), grab some of your petroleum product. Better yet, use an ointment that comes in a squeezable tube. Smooth the product over your face. You don’t need a massive layer—just enough to cover all of your face and lock in the benefits of the serums and moisturizer you used.

This is just one step in a long process that is going to be unique for everyone. Slugging alone isn’t that spectacular; it needs to be done over the products you want to retain. Those products are important, too, as is consistency, using the right amounts, and putting them on in the right order. If you want hydrated skin, for instance, you should use a hyaluronic acid serum for maximum plumping. Slugging on top of that would enhance your result. If you use an alcohol-based toner at any point in your routine, you will accidentally make your skin drier, so try to choose a different type. See how all of your skincare choices work together? Slugging might be the go-to thing now—and, allegedly, has been a big deal for decades—but if you don’t want to slip and slide all over your pillow every night in the name of being on-trend or slightly more moisturized, there are still tons of solid skincare options for you out there.


from Lifehacker https://ift.tt/ONYyEbr

Instagram scammers as busy as ever: passwords and 2FA codes at risk

Instagram scams don't seem to be dying out - we're seeing more variety and trickiness than ever...
from Naked Security https://ift.tt/6Ydrm8o

It's Time to Stop Pre-Rinsing Your Dishes

Photo: MikroKon (Shutterstock)

I always pre-rinse my dishes. While I’m no nutcase—I don’t actually wash them before placing them in the dishwasher racks—leaving the remains of a runny egg, clingy sauce, or (gasp) oatmeal on my crockery and expecting my Whirlpool to do the heavy lifting simply feels wrong.

But it turns out there’s good reason to avoid the temptation to rinse away lingering food particles before using your dishwasher. Most appliance and dishwasher soap manufacturers recommend against rinsing every remnant of food off your dishes, saying doing so can actually inhibit proper cleaning. Here’s why.

Why your dishes need to be dirty to get clean

Perhaps the reason so many of us pre-rinse is because that’s how our mothers did it. But dishwashers have come a long way from the ones our parents used. According to Consumer Reports, “pre-rinsing isn’t necessary with modern dishwashers because they have sensors that adjust the wash cycle based on how dirty the dishes are.” They don’t need our help, and by pre-rinsing “you could be making matters worse by causing the built-in soil sensor to misread the amount of dirt in the water.”

Additionally, as reported by the Wall Street Journal, many Whirlpool dishwashers have a “TargetClean” setting equipped with sensors to determine whether food remains on dishes; as many as 40 focused spray jets are set to attack baked-on food. Skip that step and your dishes won’t wind up as clean.

And that’s just how water functions in your appliance. When it comes to detergent, the WSJ reports, “Cascade, made by Procter & Gamble Co., warns against pre-washing, except for removing large pieces of food. Enzymes in Cascade detergent are designed to attach themselves to food particles. Without food, the enzymes have nothing to latch on to.”

Pre-rinsing wastes a lot of water (and energy)

Consumer Reports estimates we use 2 to 6 gallons of water per minute we rinse our dishes. Cascade estimates pre-rinsing wastes up to 15 gallons of water per load. With the average household running 215 loads of dishes per year, that’s 3,225 gallons of water per year that could be saved.

According to CNET, dishwashers built before 1994 use 10 gallons or more of water per cycle, while newer models are far more efficient. “In 2013, new standards were put in place that required dishwashers to use...5 gallons per load.” And an Energy Star certified model can use as little as 3 gallons.

Not to mention the energy it takes to heat all those gallons. As CNET reports, “most newer dishwashers have heaters inside that warm up water more efficiently than your water heater. Overall, if it is Energy Star certified, it can use less than half the energy of washing dishes by hand.”

In the words of the National Resource Defense Council, “if you have a dishwasher, put down the sponge.” Experts advise we should scrape large food scraps off our dishes rather than rinsing each one before loading.

Don’t overload the machine (but make sure it’s full)

Of course, getting the best functionality out of your dishwasher is predicated on proper use. All those high-tech sensors and spray jets need adequate space to do their job. After checking your owner’s manual for loading instructions specific to your washer, place cups, glasses, small bowls, and plastic items in the top rack, and plates, serving pieces, and larger bowls in the bottom rack. Make sure cutlery is mixed among the baskets to avoid “nesting.”

Leave space for water and soap to flow properly, but be sure your washer is full enough to merit being run. According to the EPA, “Running the dishwasher only when it’s full can eliminate one load of dishes per week and save the average family nearly 320 gallons of water annually.”

Of course, there are some more delicate items that should never go in the dishwasher. For these, we have little choice but to hand-wash. For everything else, you can safely stop pre-rinsing and let your dishwasher do the work from here on out.

  


from Lifehacker https://ift.tt/5Gnr0xR

7 Financial Scams, Bubbles, and Boondoggles That Are Definitely Nothing Like Cryptocurrency and NFTs

Photo: r.classen (Shutterstock)

Back in 17th century Europe, investors were crazy for tulips. The flowers were exotic and hard to grow, with any number of different varieties possible—and they were expensive. Soon after the tulip bulbs were imported from Turkey, rich people started buying them to show off their expensive flowers. Then they became investment vehicles, and that’s where the trouble started.

Tulip bulbs can be uprooted and moved around from June until September, so physical bulbs were bought and sold then, but during the rest of the year, investors would buy and sell future bulbs, effectively creating a kind of flower-based future commodity market. Soon the contracts for bulbs were bought and sold at a rate of up to 10 transactions per contract per day. Prices went to the moon—the most coveted bulbs sold for upwards of $750,000 in today’s money. People made fortunes and heavily leveraged themselves to get bulbs, which seemed like they would go up in value forever. But the Keynesian “animal spirits” that animated the market disappeared (partly because of the bubonic plague) and tulip millionaires suddenly found themselves heavily in debt, with their only possessions a few tulip bulbs. On the bright side, unlike NFTs, at least tulip bulbs can grow into flowers.


from Lifehacker https://ift.tt/tSYpV8D

How to Automatically Delete One-Time Passwords From Google Messages (and Why You Should)

Photo: ThomasDeco (Shutterstock)

One time passwords, otherwise known as OTPs, are great for keeping your accounts safe. They force anyone looking to sign into an app or site to not only know the username and password, but also provide a one-time code from a trusted device. Bu if you’ve ever received your OTPs via text, you know they can start to add up and get cluttered. Fortunately, Google is finally offering a solution to the problem.

What’s the problem with OTPs?

OTPs are fantastic, but they serve no purpose once they’re used (hence the name). If you’re constantly signing into accounts with 2FA, for example, you’ll receive these one-time passcodes frequently, use them, then...leave the text alone forever. After all, the only thing more annoying than a sea of useless codes is deleting these codes by hand, one after another, every time you sign in to your accounts.

How to delete temporary passwords on Google Messages

Google is beginning to roll out a new update for its main messaging app, Google Messages. The big change with this update is conversation categories, which uses AI to automatically sort your various text threads into groups. Right now, those groups consist of “All,” showing you all of your threads; “Personal,” which shows your texts from friends and family; and “Business,” which collects texts from work and other more formal contacts.

However, there’s a new setting buried in the update that isn’t getting much attention. If you head to “Message organization,” you’ll see a new option for “Auto-delete OTPs after 24 hours.” All you need to do is enable the feature, and your 2FA codes will remove themselves from your phone 24 hours after they arrive.

24 hours is still pretty generous; with 2FA especially, codes are only useful for a very short period of time—typically minutes instead of hours. If you don’t enter the code in time, it expires, and you need to generate a new one in order to proceed. Still, at least by this time tomorrow, that code you generated will be removed from your phone, ready to make room for the next code, and the one after that.

How to download the latest Google Messages update

This feature, as well as the entire conversation categories feature, isn’t fully rolled out yet. As such, you’ll need to wait for it to hit your device. To check, download the latest version of Google Messages from the Play Store, or sideload the app from APK Mirror.

[Android Police]


from Lifehacker https://ift.tt/zLa1TkQ

How to Prepare Your Dog for an Extended Separation

Photo: eva_blanco (Shutterstock)

A weekend away or even an extended work trip can be a fun break from your day-to-day life, but the unfortunate fact is that while you’re gone, your responsibilities are still waiting for you at home. If one of those responsibilities includes a dog, you have to plan ways in advance to keep your pet happy, healthy, occupied, and fed while you’re away.

Here’s how to prepare your dog for an extended separation from you.

Figure out where your dog will be

Unless you have a doggy door, a perfectly trained pooch, and a very short trip planned, someone is going to need to make sure your dog is fed and can go outside to use the bathroom. You have options here. You can put your fur baby in a boarding kennel, for instance—but try not to do that unless you’re really going to be gone for a long time. If you do have to do that, pack favorite toys and their special blanket so they have some reminders of home. (If you don’t have a special blanket just for your dog, get one now so they get used to it.)

If your trip is a short one, consider an in-home sitter. For your peace of mind and your dog’s comfort, try someone you both know first. A friend or family member is usually not too put out by the idea of stopping by your place and playing with your pup every day. Even though it’s a friend or family member helping you out, you should still offer to pay. Cute dog or no cute dog, it’s a hassle to schlep to someone’s place every day, and you should compensate them for their time and labor.

Even with money on the table, it may not be possible to convince someone you know to dog-sit. Luckily, there are plenty of apps and companies that offer this exact service. Wag, Rover, and PetBacker, for instance, can help you find companions for your pooch.

Grab a few cheap security cameras or pet monitors, too, just to keep an eye on things when no one is around—or in the event you need to hire a stranger to enter your home for this. (Of course, tell any potential dog-sitter about the cameras. It’s creepy and unfair not to let them know.)

Buy supplies ahead of time

No matter who will be with your dog, you need to be sure that person has access to enough food, treats, toys, medication, and whatever else your special friend needs. Check in with your vet about anything your dog might need to have during the length of your trip, including anxiety medication. Stock up on their favorite food.

Consider, too, investing in a gravity feeder or an automatic one. Gravity feeders are old-school and can be relatively cheap. If you want to spend a little more, electronic feeders can cost over $100, but some of them even pair with an app on your phone so you can decide when they dispense food, and how much.

Even if someone has sworn to you they’re going to stick with your pooch the whole time you’re gone, prepare for anything and everything. If, for whatever reason, that person can’t make it one day, your dog still needs to eat. Whether you go cheap or expensive, get a heavy-duty feeder. (And don’t forget a large-capacity water dispenser, either.)

Make a must-know document

Create an extensive document about your pet, their needs, their likes, their dislikes, and their daily routine. Do not leave anything out. Here is what you should include:

  • What brand of food your dog eats
  • How often they eat
  • How much they eat at each meal
  • Where their food is located
  • Where their dish is located
  • What times of day they generally need to be let out to use the bathroom
  • Where cleaning supplies are in the event of an accident
  • Where their leash, pick-up bags, and other walking essentials are
  • Any issues that tend to arise on walks
  • Any personality notes
  • The name and location of their veterinarian
  • Any medications your dog is on or medical issues they have
  • The name and location of an emergency contact
  • Your contact information

Much of this can and should be mentioned in person before you leave, but if that’s not possible for any reason, make sure all pertinent information is laid out in an easily accessible document. While you’re gone, you’ll be busy and might not be able to answer texts or calls quickly. Include all the information about your animal that you can, then rest easy knowing there is a small chance it will be relevant at all.

Spend quality time with your dog before you go

You probably don’t need to be convinced to cuddle up with your pup any time, but do take special care to give them extra love and attention before you head out. Your dog will miss you. They might even be confused about why you’re not around and why some stranger is instead. Make sure you reinforce how much you love them before you go, and once you’re back, give them lots of attention and belly rubs again.

A few extra treats might be in order when you get home, too.

   


from Lifehacker https://ift.tt/QZkrITP

What’s Something You Learned Embarrassingly Late in Life?

Photo: Dmytro Zinkevych (Shutterstock)

No matter our age, we should never stop learning, growing, and expanding our understanding of the world around us. While this fact can lead to beautiful epiphanies, it can also lead to utter humiliation. As I write this, someone somewhere just had their pronunciation of “Tupperware” corrected—much to the joy of the corrector, and much to the embarrassment of the offender.

It’s not always our fault that we can live long, happy lives with certain delusions or blindspots. A lot of it has to do with how we were raised. You’ll never forget your first roommate who needed to learn that when they wipe crumbs off the counter, those crumbs have to end up somewhere. I know I still cringe when I think about my first partner gently telling me that I was destroying their good knife by routinely sticking it in the dishwasher. More benignly, I have a friend who was well into adulthood when they discovered that ponies are not, in fact, baby horses; but in their defense, how often does that fact come up, really?

But it’s not all ponies versus baby horses (sadly). That’s why I’m asking you, dear Lifehacker reader, to comment below a fact you (or someone you know) learned embarrassingly late in life. I understand I’m asking you to be vulnerable here: How old were you when you first understood how to unclog a toilet? Do you have a partner who thought taxes were optional? Did you never learn how to roll a joint, and figured it’s too late to ask now? (I’m here to tell you that it is never, ever too late to ask.)

After you share your responses, I’ll round them up into a separate post, so that fellow late bloomers can learn from your mistakes. If nothing else, your embarrassingly late-in-life discoveries might give a stranger on the internet a good chuckle. And for that, I thank you in advance.

   


from Lifehacker https://ift.tt/WwvH1qY

Sunday, February 27, 2022

Authorization is bridging the gap between security and IAM

PlainID published a report, based on research conducted among IT and security professionals in North America and the UK. Among its headline findings, the report reveals that authorization is the rising priority in identity and access management (IAM), while organizations are also looking to consolidate and standardize access control and authorization.

authorization priority IAM

In contrast to last year, when the top IAM-related cybersecurity priority was strong authentication, the report findings show that IAM priorities are shifting in 2022, with authorization-related initiatives such as run-time access (62%), API access control (51%) and policy-based access control gaining traction (43%). This shift is driven from the top, with C-suite ranking authorization initiatives at the highest levels.

In addition, with the shift to identity-first security and with security perimeters now spread across data, APIs, applications and more, managing access has become highly complex, manual, and distributed across multiple systems. This is driving the need for standardization and scale, which were reported as the top two drivers for authorization solutions, at 25% and 17%, respectively.

Majority of organizations already working on an authorization strategy

Asked about their authorization strategy, 96% of organizations have already implemented their approach or are in the process of developing it. Respondents were almost equally split in terms of where they are on their roadmap, with 35% of companies already having an authorization strategy in place.

A further 31% have defined their strategy ready to implement in 2022, while 30% are in the process of deciding on their strategy, with plans to implement over the next five years.

“Modern businesses are shifting to zero trust security architecture, while also adopting a more identity-centric approach to security. Authorization is the missing piece of the puzzle that can support organizations in achieving digitization and modernization, and to bridge the gap between security and IAM,” said Oren Ohayon Harel, CEO, PlainID.

“As the enterprise perimeter shifts and data and APIs become a target, as well as the continuing growth of multi-cloud usage and work from home initiatives, security technologies and strategy need to change if organizations are to meet their objectives.”


from Help Net Security https://ift.tt/DtHV1np

Container security market to reach $3.6 billion by 2026

The global container security market size is expected to grow from an estimated value of $1.3 billion in 2021 to $3.6 billion by 2026, at a Compound Annual Growth Rate (CAGR) of 22.0% from 2021 to 2026, according to ResearchAndMarkets.

container security market 2026

Container security market services segment to grow at a higher CAGR

Services aim at training and developing expertise, providing timely upgradations to the platform, and helping customers integrate their platforms with other IT solutions. Vendors offer a broad array of services with the help of cutting-edge technologies, tools, and strategies to meet the needs of organizations.

Training and consulting services are designed to enhance employees’ skills so that they can meet the requirements of the patrons and boost the organization’s productivity.

Deployment and integration services ensure the proper integration of the container security platforms and services with various other components of the IT system. Support and maintenance services aim at providing technical support to customers and delivering enhancements and upgradations to the platform.

By services, the container security market is segmented into professional and managed services. Professional services include consulting services, training and education services, and support and maintenance services.

On premise segment to account for a higher market share

Organizations, especially large enterprises, are still using on-premises deployment type on a large scale. The on-premises deployment type enables the deployment of container security within a company’s premises. The on-premises deployment of container security solutions helps customers maintain compliance needs and ensure the security of applications that are being deployed.

The on-premises deployment type is one of the oldest and traditional approaches to deploying software and solutions and is preferred by enterprises due to factors, such as the ability to store data within the company’s premises, the availability of security measures, and the elimination of third-party involvement.

Asia Pacific to grow at the highest CAGR

Asia Pacific has witnessed advanced and dynamic adoption of new technologies and is expected to record the highest CAGR during the forecast period. Asia Pacific includes developed and developing economies, such as China, Japan, India, Singapore, the Philippines, Vietnam, South Korea, and Indonesia. Asia Pacific is taking aggressive initiatives to leverage the IT infrastructure, enabling commercial users to adopt cutting-edge technologies.

The increasing adoption of containers and microservice architecture, among SMEs, is acting as the major driving factor for the container security market in the region. The affordability and ease of deployment of container services among enterprises are another driving factor for the adoption of container security in the region. Hence, the region is growing at the highest CAGR of 23.4% during the forecast period.


from Help Net Security https://ift.tt/KdiVhxz

Perimeter 81 Secure Web Gateway blocks access to specific URLs or categories of websites

Perimeter 81 has added a Secure Web Gateway component to its Security Services Edge (SSE) solution.

Perimeter 81 Secure Web Gateway

The Secure Web Gateway (SWG) is extending the company’s signature ease of use to Web filtering and ensures that company employees are safe from malicious websites and unsafe content, no matter where they are working.

Perimeter 81’s Secure Web Gateway will block access to specific URLs or categories of websites based on the user or the user’s role and other conditions such as the day of the week. These categories are dynamically updated daily so that no site flies under the radar.

Employee access to “blocked” or “warned” websites is tracked and logged for monitoring and compliance with auditing requirements and company policies. Bypass rules can be created for those programs that do not require SSL inspection and to ensure employee privacy, for example, when visiting financial or healthcare sites.

“The new Secure Web Gateway functionality is a big step forward for our Cybersecurity Experience (CSX) Platform, and delivering an enterprise-grade secured corporate network over the public internet” says Amit Bareket, CEO at Perimeter 81. “With this release, we are extending the reach of our radically simple cybersecurity beyond the corporate hybrid cloud, to the infinite number of touchpoints an employee may encounter on the web. The Secure Web Gateway will be transparent to users and very easy to administer, like all the other components of our Security Services Edge solution.”

Sagi Gidali, Chief Growth Officer at Perimeter 81, adds: “Our recent State of the Cybersecurity Report revealed that 71% VPs and CIOs find it more difficult to prevent cyberattacks due to the complexity of the cybersecurity solutions they use. By providing an exceptional cybersecurity experience for both users and the IT team that implements and manages cybersecurity, we can assist companies to protect both their hybrid networks and their hybrid employees more effectively. With this release, we have expanded that protection with our Secure Web Gateway, managed from the same easy-to-use dashboard.”


from Help Net Security https://ift.tt/2xQGtqM

How to Decode Building Codes (and Why You Should Care)

Photo: Tadija Savic (Shutterstock)

Unless your job involves working with building codes, they’re probably not something you encounter or think about on a regular basis. Though we may refer to a questionable electrical setup in an apartment, or a building where several doors are blocked or inaccessible as looking like they’re “not up to code,” most of us aren’t able to provide any further details about what code we’re talking about, and what it entails.

But even if we don’t deal with building codes very often, it still helps to have at least some background on what they are, and why they’re important. Here’s what to know.

What are building codes?

Building codes outline the minimum standards for constructing buildings that protect public health, as well as the general safety and welfare of the people inside and around them at any given time (including during the construction process).

Though they’ve been around in some form since ancient times, the first of what are considered the predecessors of modern building codes were enacted in the 17th century, following devastating fires that would take out entire towns or parts of cities with primarily wooden structures, and mostly focused on using building materials less likely to burn.

Enacting building codes was also an aim of reformers and Progressive Era campaigners of the 19th and 20th centuries, looking to improve living conditions in cities’ crowded tenements.

Are building codes legally binding?

While the specifics of building codes differ based on the state, city, and/or county, they’re are typically based on broader model codes like the International Building Code (IBC), so there tends to be at least some overlap. That’s also the case with the accessibility design standards found in the Americans with Disabilities Act (ADA).

And though the IBC and other model building codes themselves aren’t legally binding, they serve as the basis upon which regional and local authorities create and enact laws.

Why are building codes important?

Building codes still aim to serve their original function of keeping people in and around a building safe by setting minimum requirements for aspects of construction including safe wiring, fire prevention, and structural integrity. They’re also a way to work towards population-wide improvements in living conditions (though getting existing housing up to code is often an uphill battle).

Building codes can also have financial impacts. According to a study conducted by the Federal Emergency Management Agency (FEMA) and published in November 2020 called Building Codes Save, over a 20-year period, cities and counties with modern building codes avoided at least $132 billion in losses from natural disasters when compared to jurisdictions without modern building codes.


from Lifehacker https://ift.tt/a3bencZ

You Should Be Safer at the Grocery Store

Photo: gyn9037 (Shutterstock)

When we think of food poisoning, it’s usually in the context of the frequent food recalls on everything from salads, to onions, to dried spices.

But it’s also possible to get food poisoning if someone infected with a virus or bacteria (who may or may not be symptomatic) doesn’t wash their hands thoroughly after using the toilet, then touches something that will come in contact with food you will eventually eat (or the food itself). In fact, Salmonella, E. coli, and norovirus—the leading causes of foodborne illness—are often spread this way, according to the Food and Drug Administration.

Not only that, but the way you shop, as well as the way you package and store food for its trip from the store to your home, can lead to food safety issues. Here’s how to avoid those on your next trip to the grocery store.

How to be safer at the grocery store

In a recent article by Consumer Reports, the magazine’s chief scientific officer, James Dickerson, PhD offers these tips for making your next trip to the grocery store safer:

Wash your reusable canvas bags

If you rely on canvas bags to get your groceries from the store to your home, it’s important that you wash them on a regular basis. In addition to the visible dirt and stains, these bags can also become contaminated with bacteria and mold that builds up over time from the food that has been carried in the bags, Dickerson explains.

Wipe down the cart or basket

This is something Dickerson says we should be doing all the time—with or without a pandemic. No one is expecting you to do a full wipe-down, but if nothing else, make sure you get the handle (it’s what everyone touches) and seat (that’s where the diapered-butts of children go), as well as any other parts you expect to touch a lot.

Shop in an order based on when food spoils

Begin your trip through the grocery store by getting what you need in the center aisles, which typically contain foods that don’t require refrigeration, and have a longer shelf-life.

Then, Dickerson recommends hitting up the frozen food section, then fresh food, produce, and dairy, and finally, getting the raw on your list—including anything from the deli counter—because they are the most temperature-sensitive. He also suggests shopping with at least one insulated bag to help keep everything cool from the store to the fridge.

Pay attention to fresh produce

Gently shake any wet produce you plan to buy before putting it into a plastic bag. When bagged wet produce is in the fridge, it will rot faster than produce that is dry.

Take care of leaking meat juice

Grab any raw and fresh meat (including fish) with an inside-out produce bag, then turn it rightside-out around it. This prevents you from touching any of the meat juices that may leak out, and inadvertently spreading that bacteria to your groceries, and anything you touch in the rest of the store, Dickerson says. Keeping the meat packages in a plastic bag ensures that any leaking juices don’t spread to other items in the cart.


from Lifehacker https://ift.tt/tnWumed

All the Clever Ways You Can Use Glycerin Around Your House

Photo: EVANATTOZA (Shutterstock)

When it comes to putting together your arsenal of standard household products, you probably already have things like white vinegar, hydrogen peroxide, baking soda, and nail polish remover in a closet somewhere, or under the sink. But what about glycerin?

That’s right: It’s more than an ingredient in skincare products and the name of a 1994 Bush hit (though that’s spelled “glycerine”—the British way). In fact, glycerin has multiple handy household uses. Here are a few.

What is glycerin?

Glycerin—also known as glycerol—is a clear, viscous, water-soluble liquid with a slightly sweet taste that is part of the alcohol family of organic compounds. It’s used as solvent for flavors and food colors, as well as a sweetener, plasticizer, emollient, and filler in low-fat foods.

But glycerin is probably best known for being an ingredient in personal care products, like soap, toothpaste, mouthwashes, skin care products, hair care products, lubricants and cosmetics. That’s because it acts as a humectant—meaning that it can attract and bind to moisture.

Household uses for glycerin

Vegetable-based glycerin is available for purchase in most pharmacies and big-box stores. A six-ounce bottle of store brand glycerin will set you back around $4. Here are a few ways to use it around your house:

In the fridge and freezer

Does the bottom of your refrigerator and freezer have a few impossible-to-remove dried- and stuck-on foods you assumed were just part of the appliance now? After trying to clean off as much of the stuck-on food as you can, dab on some glycerin, let it sit for a few minutes, and then wipe the whole mess off.

In the laundry

Glycerin helps with different types of stain removal—especially on greasy stains, like tar or oil. Pre-treat the stain with glycerin, then wash the item clothing or piece of fabric as you normally would. You can also whip up this DIY spot remover, made of glycerin, liquid castile soap, water, and an optional essential oil.

In the garage

Because glycerin is a common ingredient in commercial antifreeze, as well as a lubricant, it can serve multiple purposes around the garage. For example, it can be applied to hydraulic jacks for lubrication and to prevent freezing.


from Lifehacker https://ift.tt/AWukYUt

Week in review: Cyber attacks on Ukraine, Help Net Security: Healthcare Cybersecurity Report is out

OPIS

Here’s an overview of some of last week’s most interesting news, articles and interviews:

Help Net Security: Healthcare Cybersecurity Report has been released
Our newest report takes a closer look at one of the most targeted industries today – healthcare.

Cyber attacks on Ukraine: DDoS, new data wiper, cloned websites, and Cyclops Blink
Russia started its invasion on Ukraine and, as predicted, the attacks in the physical world have been preceded and accompanied by cyber attacks.

To shift to data-driven security decision making: Start with the right data
We live in the age of data-driven everything. From sales to operations, and everything in-between, today’s organizations are constantly looking for ways to leverage the data they accrue – reacting more agilely, operating more efficiently, and safeguarding profitability.

A comparison of NDR solutions: Deep packet inspection (DPI) vs. metadata analysis
In today’s complex IT environments, Network Detection and Response (NDR) solutions are crucial to identify, assess, and respond to cyberthreats.

Implementing effective ways to exchange sensitive information using encryption
In this interview with Help Net Security, Chris Peel, VP Customer Engineering at Echoworx, who works with customers to define, develop and deliver secure messaging solutions, explains why email encryption is the way to go for organizations, what are the benefits and challenges of such strategy, and how to implement it without overburdening the user.

83% of employees continue accessing old employer’s accounts
In a recent study, Beyond Identity gathered responses from former employees across the United States, the United Kingdom, and Ireland and found 83% of employees admitted to maintaining continued access to accounts from a previous employer.

How much can you trust your printer?
In this interview with Help Net Security, Scott Best, Director of anti-tamper security technology at Rambus, talks about what organizations should be aware of when it comes to printer security and what they should do to remain secure.

Employees are often using devices in seriously risky ways
Since the start of the pandemic, the modern workforce has become increasingly distributed, while employers have not been able to keep up with the changes in the way employees work.

Are separate SIEMs for threat hunting a good idea?
In this interview with Help Net Security, Brian Dye, CEO at Corelight, talks about the trend of creating separate SIEMs for threat hunting and why this is not achieveable for all organizations.

Social media attacks surged in 2021, financial institutions targeted the most
Social media as a threat channel saw a two-fold increase in attacks throughout 2021, according to a report from PhishLabs.

How wealth managers leverage behavioral intelligence tech to thwart client abuse
In this interview with Help Net Security, Lee Garf, GM of Financial Markets Compliance at NICE Actimize, explains how behavioral intelligence technology can help the finance sector tackle client abuse and lower regulatory risk.

ENISA and CERT-EU publish set of cybersecurity best practices for public and private organizations
The European Union Agency for Cybersecurity (ENISA) and CERT-EU published a joint set of cybersecurity best practices for public and private organizations in the EU.

Carpet bombing DDoS attacks spiralled in 2021
Neustar Security Services has released a report which details the ongoing rise in cyberattacks in 2021, with an unprecedented number of carpet bombing distributed denial of service (DDoS) attacks.

What is pushing financial services institutions to deploy cloud technologies?
Financial services leaders cite increased future revenues (62%) and improved future profitability (52%) as leading reasons to deploy cloud technologies, according to a financial services study by Capco.

What do consumers really think about privacy?
Merkle has released a report which has historically reported on the marketing leader’s point of view, but this time turns its focus to consumers, revealing their sentiments around online privacy and data collection and exploring their attitudes about regulations and updates from the big tech platforms.

How configuration assessments help improve cyber defenses
There’s an old adage in business; if you’re not measuring something, you can’t manage it. These days, information technology (IT) and information security professionals know this all too well, especially when it comes to configuration assessments.

Download: 2022 Data Exposure Report
Findings from the Annual Data Exposure Report found that cybersecurity teams are facing unprecedented challenges when it comes to protecting sensitive corporate data.

New infosec products of the week: February 25, 2022
Here’s a look at the most interesting products from the past week, featuring releases from Arista Networks, Darktrace, Forcepoint, MyCena, NetSPI, Ondato, Sumo Logic, and SynSaber.


from Help Net Security https://ift.tt/kHwxoAW

Saturday, February 26, 2022

KIOXIA announces UFS embedded flash memory devices for a variety of mobile applications

KIOXIA America announced sampling of the Universal Flash Storage (UFS) embedded flash memory devices supporting MIPI M-PHY v5.04.

KIOXIA America UFS devices

The new lineup utilizes the company’s BiCS FLASH 3D flash memory and is available in three capacities: 128GB, 256GB and 512GB. The new devices deliver high speed read and write performance and are targeted to a variety of mobile applications, including leading-edge smartphones.

The new KIOXIA devices are next-generation UFS (MIPI M-PHY 5.0), which has a theoretical interface speed of up to 23.2Gbps per lane (x2 lanes = 46.4Gpbs) in HS-GEAR5 mode. Sequential read and write performance of the 256GB device is improved by approximately 90 percent and 70 percent, respectively, over previous generation devices6.

Also, random read and write performance of the 256GB device is improved by approximately 35 percent and 60 percent, respectively, over previous generation devices. This next generation of UFS provides significant increases in performance, enabling next-generation smartphones and other products to enhance their capabilities and end user experiences in the 5G era and beyond.

“We are pleased to announce another first in UFS memory,” noted Scott Beekman, vice president, Memory Business Unit, for KIOXIA America, Inc. “This next generation of UFS provides significant increases in performance, enabling next generation smartphones and other products to enhance their capabilities and end user experiences. Moving forward, we will continue to drive these advances, maintaining our UFS memory leadership role.”


from Help Net Security https://ift.tt/K0Yy2jo

Keysight Technologies partners with Telefonica to deploy open networking solutions

Keysight Technologies has in collaboration with Telefonica, accomplished the first validation of an open radio access network (RAN) xHaul transport link, advancing development of transport networks based on the O-RAN specifications.

Keysight Technologies Telefonica

xHaul is a unified fronthaul and backhaul networking infrastructure. It creates a common packet-based transport network for flexible and software-defined reconfiguration of networking elements in a service-oriented unified management framework. Mobile operators, such as Telefonica, are implementing O-RAN compliant xHaul transport architectures to reconfigure and share the network quickly and cost-effectively, to streamline delivery of 5G services.

“Keysight’s 5G test tools enable Telefonica Open Testing and Integration Centre (OTIC) to characterize xHaul transport links in accordance with O-RAN WG9 test specifications and advance its O-RAN xHaul interoperability test plans,” said Scott Bryden, vice president and general manager at Keysight. “Keysight’s solutions for emulating real-life Ethernet traffic conditions enable verification of the functionality and reliability of O-RAN xHaul transport architecture.”

The two companies have worked together at global Plugfests organized by the O-RAN ALLIANCE to verify integration of multi-vendor network functions and compliance to O-RAN specifications. At the 3rd Global O-RAN Plugfest in 2021, more than 40 vendors used Keysight Open RAN Architect (KORA) solutions to conduct rigorous testing under real-world conditions, critical to successful end-to-end integration of O-RAN equipment prior to live network deployment.

“By working together with Keysight, Telefonica is showcasing the company’s commitment to deploying open networking solutions,” said Jesus Folgueira, Transport and IP senior manager at Telefonica. “Validation of the O-RAN xHaul transport link is critical to successful open RAN deployments.”

The O-RAN xHaul transport link demonstration used the following Keysight 5G test tools:

  • Novus – a high-speed, high-density Ethernet test solution with sufficient capacity to carry all port bandwidths, concurrently, at full capacity for complete performance assessment of wireline platforms.
  • IxNetwork – generates Ethernet based traffic flows driven by realistic user applications and scenarios to test transport links and network functions within network functional virtualization (NFV) and software-defined networking (SDN) architectures.
  • Network emulator II – a precision test instrument for accurately emulating network conditions such as added variable delay, latency, jitter and loss in a live production local area network (LAN) or a wide area network (WAN).

from Help Net Security https://ift.tt/ZTbtcem

CoventBridge names Glenn Prager as Chief Strategy and Business Development Officer

CoventBridge announced that Glenn Prager, the company’s Executive Vice President of Government Solutions has been appointed Chief Strategy and Business Development Officer for the company.

CoventBridge Glenn Prager

Since joining CoventBridge in 2019, Glenn has led the company’s strategic expansion into government contracting, leveraging his wealth of experience in combating fraud, waste, and abuse in both the public and private sectors, bringing innovation and program integrity to the fight against fraud. He has established new company relationships across a variety of federal and state agencies, as well as partnerships with an array of Prime and Subcontractor partners.

Glenn has a strong track record of producing successful results throughout his career, including tenures with the Department of Justice (DOJ), Office of the Inspector General (OIG) and the Center for Medicare and Medicaid Services (CMS) ultimately leading to his appointment as Arizona’s Inspector General.

Glenn Prager shared, “The complexity and scale of today’s fraud schemes, particularly in healthcare programs, is ever-increasing. At CoventBridge, we focus on combining cutting edge technology, a highly trained and experienced national cadre of fraud investigators, clinicians, and some of the strongest strategic alliances and partnerships in the industry to offer our payor-clients end-to-end fraud solutions. We stand on the front line in the fight against fraud, waste, and abuse and will continue to seek opportunities where we can assist both public and private payors to protect the integrity of their benefits programs.”

Said Doug Merriman, CoventBridge Chief Executive Officer, “We’re pleased to expand Glenn’s role in the company, pursuing our strategic goals, while maintaining the performance and operational continuity valued by our clients, partners and stakeholders.”


from Help Net Security https://ift.tt/yK4F68p

How to Make Your Accent Wall Look Intentional, Not Like an Accident

Photo: virtua73 (Shutterstock)

Let’s get real: Sometimes accent walls can look more like accident walls—where someone ran out of paint, and never finished the job. Maybe it was their choice of color, or the wall they selected, but whatever it was, it’s not working. And yet, Instagram is plastered with posts from design accounts showing perfectly executed accent walls that look like they were meant to be there.

If you’re considering painting an accent wall yourself, you may be concerned about falling into that first category. But don’t worry: We’ve got some tips and strategies to ensure your accent wall looks intentional (and good). Here’s what to know.

What is an accent wall?

An accent wall’s color or design is different than the rest in the room. They can be used in any room in a home, and are a way to add some color to an otherwise-neutral room without the commitment (and time and cost) of painting or wallpapering all four walls.

When done right, accent walls can also make rooms look more put-together. “A strategically painted accent wall is a powerful and effective way to add dimension and focus in a room,” says Cameron Johnson, an interior designer and founder of the Nickson design firm.

How to create an accent wall that works

Here are some tips and strategies that will ensure your accent wall looks like no accident:

Pick the right color

This sounds obvious, but it’s where so many people go wrong. “Color choice is also extremely important,” Johnson says. “The color should work in tangent with the surrounding furnishings and design, pulling a color from the rug for example.”

But you should also consider the room’s role in your daily life—and how you want to feel when you’re in it—when choosing a color.

“Blue is known to calm and promote a meditative zen—such that a lovely blue in the bedroom can create the perfect tranquil oasis,” Johnson explains. “Green is invigorating and balancing, and often a nice choice in an entryway or living space. Even yellow, in small doses, can be welcoming and energizing.”

Pick the right wall

It’s best not to choose a wall at random, or simply because it’s the easiest one to paint. According to Johnson, the best wall for an accent color is typically the one with the room’s focal point—like the fireplace wall, a wall behind a headboard in the bedroom, or a wall with a large-scale piece of art.

Consider an accent ceiling

A ceiling can be an accent wall, too. Painting the ceiling turns your attention upwards when entering the room, making it the focal point. Typically, accent ceilings are done in rooms with crown molding, which acts as a clear border between the ceiling and the other walls in a room. But it’s certainly possible to do an accent ceiling in a room without crown molding for a more modern look.


from Lifehacker https://ift.tt/AUVSGs6

Why You Need Boredom Time Every Week

Photo: fizkes (Shutterstock)

Do you remember what it feels like to genuinely be bored? Not like being bored at work and trying to get the hours to pass faster. But the kind of boredom you experienced as a child in the waiting room of the dentist’s office—where there were no toys, you had already read the only issue of Highlights magazine cover-to-cover, and there was nothing else to do.

Your mind wandered. Maybe you invented a new game, or got an idea for a story. While it probably wasn’t fun in the moment, think about how nice it would be to be able to give your brain that kind of space right now. Or even just have some time to do whatever you actually feel like doing, rather than what you have to do. That’s the idea behind scheduling some boredom time each week. Here’s what to know.

Why schedule boredom time?

There have been multiple studies demonstrating that contrary to popular belief, boredom can actually make you more productive and more creative. Others have focused on daydreaming—often the byproduct of boredom—and found that allowing your mind to wander can help make you more goal-oriented.

Boredom can also make us more self-aware, according to Andreas Elpidorou, philosophy professor and researcher at the University of Louisville, who writes that “boredom is both a warning sign that we are not doing what we want to be doing and a ‘push’ that motivates us to switch goals and projects.”

How to schedule boredom time

Boredom time can take different forms, but according to Sandi Mann, a senior psychology lecturer at the University of Central Lancashire and author of The Upside of Downtime: Why Boredom Is Good, it should involve an activity that requires little or no concentration. These can include things like walking on a familiar route, or sitting down with your eyes closed, without listening to music or a podcast—just letting your mind wander.

“A complete boredom day is unstructured playtime, like you would give yourself when you were a child,” Hana Jung, former marketing director and current mindset coach told the Well+Good Podcast. “I make no plans with anybody. I wake up when I want. I feel into what I’m craving that day—just like you would [during] vacation.”

Though Jung blocks off entire days for boredom, that’s not realistic for many people. But don’t let that dissuade you—just start smaller, scheduling an hour, or even a half hour of boredom time, once a week. It won’t suddenly solve all your problems, but even knowing you have that time on your calendar to take a step back from everything gives you something to look forward to.


from Lifehacker https://ift.tt/wPliHhS

Friday, February 25, 2022

Khai Jiao Is the Best Way to Use Leftover Mung Bean Sprouts

Photo: Allie Chanthorn Reinmann

For reasons unknown to the universe, a bag of mung bean sprouts is always just a bit too much for whatever dish you’re making. Even if you doubled the recipe, somehow there’s always one or two handfuls leftover the next day—and if this has ever happened to you, you’re well aware that the next day is probably your last chance to use them before they get discolored and slimy. One of my favorite ways to use up the last cup of bean sprouts is to make Khai Jiao. A staple dinner from my childhood, my mom sometimes called it “Thai omelet,” but that’s a stretch—the only thing they have in common is the mixed egg.

Khai Jiao is, at its simplest, whisked whole eggs, fried up in a generous amount of piping hot oil and eaten over a steaming mound of jasmine rice. It’s savory, bursting with flavor and entirely satisfying. Like with most Thai dishes, the condiments add requisite briny, tangy, and spicy flavors. They can include a squeeze of lime, soy sauce (Golden Mountain sauce if you can find it, Maggi if you can’t), and a few small spoonfuls of spicy-salty prik nam pla. Growing up, I would demolish a plate of khai jiao, but it would be boosted up with different combinations of ingredients, transforming it into an extremely hearty dish. Sometimes there would be onions and tomatoes, other times zucchini, and some nights pieces of chicken or turkey would pop up; but one thing was consistent—there were always plenty of bean sprouts tangled throughout. Cooked through but not soggy, bean sprouts give this meal a crunchy, juicy bite and help catch little puddles of soy sauce to season the rice in every spoonful. Likely, it was my mother’s clever way to clean out the fridge of leftover vegetables and the ingredients are cheap for such a filling meal. Regardless of everything, it became a dinner I would eagerly request whenever my opinion counted.

One important note: You can’t be shy with the frying oil, or you won’t get the desired puffy texture when the egg fries. Frequently, I’ll have leftover oil that remains in the pan—use this same oil if you’re making multiple portions or save it for another use after straining out any bits of vegetable. Be sure to have the rice steamed and waiting because this dish is very quick to come together. In less than 10 minutes, you’ll be eating a Thai classic, and probably adding bean sprouts to your grocery list again.

Photo: Allie Chanthorn Reinmann

Khai Jiao (ไข่เจียว) With Veggies

Ingredients:

  • 1 heaping cup mung bean sprouts
  • ½ small zucchini (about ¾ cup, sliced and cut in half)
  • 1 Roma tomato (about ½ cup, cut into wedges)
  • 3 eggs (whisked)
  • ¼ - ½ cup canola oil or other neutral oil
  • ⅛ teaspoon salt
  • Optional garnishes: Lime wedges, Golden Mountain sauce or soy sauce, prik nam pla
  • Frying oil, such as canola or vegetable oil

Add oil to a medium frying pan. There should be about ¼ inch of oil coating the bottom of the pan. The egg mixture should have a bit of a puddle to fry in. It will only use what it needs, so it’s better to have a little extra than not enough. Heat the oil on medium.

Have your whisked eggs in a medium sized bowl. Add the bean sprouts, chopped zucchini, tomato wedges, and salt. Stir to coat the vegetables in the egg.

Photo: Allie Chanthorn Reinmann

To test if the oil is hot enough, pick a bean sprout out of the egg mixture and use it to add a drip of egg to the oil. It should bubble and fry up immediately, with vigor. Pour the entire egg and vegetable mixture into the hot oil. The canola should pool up a bit around the sides. Fry for about five minutes or when the bottom starts to take on a golden brown color. Flip the egg over. No need to worry about perfection, the egg will fry up with irregular ripples, crags and rolls. Fry the second side for about 1 minute. Lift out of the pan and serve over rice with condiments of choice.

   


from Lifehacker https://ift.tt/ut6cYPe

The Best (and Worse) Ways to Freeze Eggs From the Grocery Store

Photo: Brian Yarvin (Shutterstock)

While freezing can be a great way to preserve many foods before they spoil, some foods simply don’t freeze well. When it comes to freezing eggs, however, the advice is decidedly mixed, even here at Lifehacker. In the past, we once advised that freezing eggs is a giant pain and not worth the effort; we later said that freezing eggs in ice cube trays is effective. But depending on how you freeze the eggs, both statements can be true.

The common complaint about freezing eggs in ice cube trays is that they can get stuck, making it hard to get them back out. But there are a couple of strategies you can use to prevent that: Freeze them in silicone trays or coat the ice cube tray with cooking spray.

To get a sense of how well these suggestions work, I froze four batches of eggs—one dozen in a regular plastic ice cube tray without cooking spray; one dozen in a regular plastic ice cube tray coated with cooking spray; another in a silicone ice cube tray without cooking spray; and the final dozen in a silicone ice cube tray coated with cooking spray. Here’s how each method worked.

Freezing eggs in a plastic tray without cooking spray 

This was no good. First of all, the ice cube compartments were a bit too to small contain each egg. But the bigger issue was that, no matter how hard I tried, I just couldn’t get the frozen egg to pop out of the compartment—I broke the tray trying. Granted, the plastic was flimsy, but I obviously don’t recommend trying this at home.

Freezing eggs in a plastic tray with cooking spray 

The ice cube compartment was still a little too small for the egg, creating more spillover, but it popped out easily enough. I’d use this strategy to freeze eggs in the future, especially if I only had plastic trays at my disposal.

Freezing eggs in a silicone tray without cooking spray 

Each individual compartment was a little bit bigger, which meant that it was large enough to hold an entire egg. Taking the frozen eggs out of the tray took some effort, but they did come out, and the result was a nicely frozen block of egg.

Freezing eggs in a silicone tray with cooking spray 

This was the best option by far, as each egg froze in a neat block and easily slid out of the compartment.

The takeaway: Freezing eggs in a plastic ice cube tray is doable, as long as you coat it with a little cooking spray before adding in the egg. A silicone ice cube tray (with cooking spray) is ideal, but if all you have is a regular plastic tray, coat it with cooking spray and freeze away.


from Lifehacker https://ift.tt/5Qxmtbk

The Five Stages of a Market Bubble (and Where Crypto Stands)

Image: Marko Aliaksandr (Shutterstock)

Depending on whom you ask, blockchain technology is either a revolutionary and disruptive development or a meaningless marketing term representing an overhyped concept. Whatever you think of the underlying technology, you can’t deny that blockchain-based assets like cryptocurrencies—and more recently, non-fungible tokens (NFTs)—have exploded. At one point, a single Bitcoin was worth more than $68,000, and NFTs have sold for millions of dollars.

But crypto prices are the very definition of volatile; Bitcoin’s value cratered to under $35,000 in early 2022, and that was not the first time there’s been a crash like that in the crypto market. That volatility has inspired a healthy dose of skepticism because it makes it impossible to regard Bitcoin and other cryptocurrencies as useful for anything other than speculation. Part of Bitcoin’s appeal was the idea that it was hard-limited, unlike fiat money—there would only be so many Bitcoins in the world. But cryptocoins can be forked into new versions, and it’s incredibly easy to simply invent a new crypto coin out of thin air. There are currently more than 10,000 cryptocurrencies in existence.

All of this has many worried that crypto is in a classic bubble. Past bubbles—the housing bubble, the dot-com bubble—have shown us that the only sure thing about a bubble is that it will burst. But economic bubbles follow some pretty clear stages if you know where to look, which means we can at least make a fairly educated guess as to where we are with crypto—and where we’re going.

What’s a bubble?

An economic bubble is a simple concept: It happens when the price for something stops relating to its actual value. Back in the 1600s, the market for tulip bulbs in the Dutch Republic went absolutely bonkers, with single tulip bulbs selling for many times the average person’s annual income. The prices rose and rose, people desperately bought their way in so as not to miss out—and then the bubble burst, prices collapsed, and a lot of folks were financially ruined.

There are different sorts of bubbles for different things, like stocks or houses. A crypto bubble would be a form of asset market bubble. But regardless of what the bubble is centered on, an economic bubble goes through about five stages:

  • Displacement. This could also be thought of as “disruption.” This is when a new concept or product gets the attention of investors. The blockchain and cryptocurrencies are exciting new developments, and when Bitcoin was first dropped in 2009 it was a truly innovative concept that grabbed focus.
  • Boom. After a period of slow growth, the price starts to ramp up rapidly as awareness spreads. Instead of a small number of savvy investors, the product hits the mainstream and gets a lot of media hype. People rush to get in on this hot new investment, which drives the prices even higher.
  • Euphoria. Prices reach ludicrously high levels but no one seems to care, because there appears to be an infinite supply of “greater fools” willing to shell out in order to buy in.
  • Profit-taking. A portion of investors get squirrely about the valuation and start nervously eying the exits. Once they start to sell or reduce their positions in order to offset risk, others follow suit.
  • Panic. Everyone notices the whales cashing out, and a race to the bottom begins. Prices crater, and as they fall people become more and more desperate to cash out before they lose everything.

Crypto Bubble or shakeout?

The description of a financial bubble probably looks familiar to anyone paying attention to crypto. Defenders argue that cryptocurrencies go through frequent shakeouts that reduce value and then regain value—often exceeding previous valuations. Economist Tyler Cowen argues that the market is saturated with crypto assets, most of which will disappear once the hype dies down, but that core assets like Bitcoin aren’t going anywhere. History bears this out: The dot-com bubble didn’t destroy technology companies or the Internet, and the fact that a large number of social media platforms failed doesn’t mean social media is no longer a thing.

But just because crypto and blockchain-based assets are here to stay doesn’t mean they’re not in a bubble right now. It’s pretty clear that the value of many cryptocurrencies has been wildly—wildly—overblown considering how relatively useless they are as currencies or stores of value (heck, the Shiba Inu crypto coin—which was literally started as a joke—was valued at $30 billion late last year). Plus, the NFT market is clearly being propped up by “wash” trades where folks are purchasing their own NFTs in order to create the illusion of value.

The recent crash of crypto values—and lack of a speedy recovery—indicates we’re in the fourth stage, and the profit-taking has begun. But there’s one reason to think that the crypto bubble isn’t going to descend into full-scale panic: The cult-like atmosphere surrounding Bitcoin and other cryptocurrencies might save it. The hold-on-for-dear-life (HODL) and buy-the-dip crowd believe that these boom and bust cycles are natural and nothing to fear—and their insistence on hanging on and rallying behind crypto may avoid a full-on panic.

No one can say with certainty that the crypto bubble is about to burst. Whether you have the stomach to find out depends entirely on your personal level of risk tolerance and ability to deal with the toll crypto can take on your mental and emotional health.


from Lifehacker https://ift.tt/Vc9wKvG

How to Go to Sleep Like Royalty

Photo: morrowlight (Shutterstock)

When you sleep, you’re unconscious by definition, but that doesn’t mean your bed should be anything less than luxurious. You deserve to cuddle up surrounded by the finest things—and a few cheap swaps and additions are all you need to be dreaming like royalty in a fancy oasis of your own creation.

Learn to love silky sheets

Silky sheets are the best, but they come with a learning curve. Before getting into what can be difficult to get used to with these, imagine this: You just got out of the shower, did your skincare routine, make some tea, and grab a book to read before bed. You trade the robe for pajamas and slip into a silky cocoon of soft sheets that are cold to the touch but still warm. You are the most deluxe person in a five-block radius, no doubt, and you have won the bedtime war.

Isn’t that nice? It is, but bear in mind that the first few times you get into this silk bedding, there will be slippage. It almost requires core strength to keep your body on the mattress, but don’t worry about it. You adjust and soon enough, you won’t be sliding all over the place.

The other concern with silky sheets is that they are wrinkly, especially straight out of the package, and because of the way light reflects on them, the indents are pretty noticeable. You’ll want to steam them before putting them on your bed, which takes some time.

The good news is that while silky sheets feel extremely luxurious, your wallet doesn’t have to take that big of a hit. On Amazon, sets for queen-sized beds can be as low as $24 and come with a fitted sheet, flat sheet, and two pillow cases. There are higher-end options, of course, but start small just to see how you like it. Those pillow cases are clutch, too. They can help with acne and keep your hair smooth, and even help it retain moisture. To wake up with less frizzy hair is a win itself.

Spritz your bedding with a pillow spray

Once your pillowcases and sheets are silky as can be, there’s an extra step you can take to make your bedding even more luxe. Pillow sprays are all the rage right now, and for good reason.

The This Works Deep Sleep Pillow Spray contains lavender, camomile, and vetivert, promises to help you fall asleep faster (though it’s fair to be skeptical here), and has great reviews. (For a real-life review, just know I visited a friend the other day, she threw a bottle of the spray at me full speed, and she said, “Get this shit right now, for real.”) Other options include Slip’s Sleep Mist and Calm’s Sleep Mist.

In the same way you might use a citrus-scented face wash in the morning, scents like lavender can seriously relax you before bed—and creating a calming, regular bedtime routine is one of the keys to great sleep. Incorporate a nightly spritz of these sprays on your pillow in your routine.

Use lotion or body oil before going to sleep

Scents and nice textures are not reserved for your bedding here. Keep a lotion or body oil near your bed and use it at night as part of your routine. On a practical level, this is good for your skin; more broadly, the more self-care steps you take before dozing off (and the longer you stick with doing them every night), the more accustomed your body will become to recognizing when it’s time to go into sleep mode.

Rigorous field testing in this area (by me) shows that a light amount of body oil like Glossier’s Body Hero Dry-Touch Oil Mist, which has a pleasing neroli scent, won’t stain those silky sheets you labored so hard to de-wrinkle. Just don’t go beast mode on the application.

Another secret to sleepy-time success is baby lotion. Lotions for infants are designed to be calming and gentle, and Johnson & Johnson’s Bedtime Baby Lotion is a great pick, as is that brand’s oil gel. You can picture it now: Your lotioned-up body parts sliding around in the silky sheets…

Set the right lighting for the evening (and the middle of the night)

We’re doing a play for almost all of the senses here: the feeling of your lotion and sheets, the smell of your body oil, and the taste of your tea. For lighting, consider swapping the bulb in your nightstand lamp for one with a yellow hue. Look into one of those orange salt lamps that were trendy on Instagram a few years back; they’re still great and even come in little nightlight versions, so if you wake up in the middle of the night to go to the bathroom, you don’t need to be startled into full alertness by a harsh light.

Look into smart bulbs or outlets, too, so you can control your lighting from bed and don’t need to leave the warmth of your fancy new sheets just to toggle everything off. The goal here is to be as relaxed as possible and with a couple of cheap upgrades like these, you’ll be out like a (yellow) light in no time.

 


from Lifehacker https://ift.tt/05bkxgt

Thursday, February 24, 2022

6 Common Baking Myths You Should Stop Believing

Photo: Natasha Breen (Shutterstock)

We’ve all been there, separating eggs into different bowls, cracking the shell, tipping out the egg white only to witness with horror the jagged edge of the shell brutally pierce the golden bubble of yolk—but that’s not the worst part. No, the worst part is when a minuscule streak of ruinous blond fat sneaks in to taint the seven other pristine egg whites you’ve already collected. Is it trash? All this time, you’ve been told that fat will destroy your hopes for stiff peaks (so you even go so far as to triple-wash all egg white whipping materials—bowl, whisk, and hands—before you get started). Wait: Don’t give up on those whites just yet.

Egg whites with a small percentage of fat will still whip up to soft, medium, and stiff peaks. The greater the batch of egg whites you’re whipping, the more wiggle room you have. In the tests that Serious Eats ran, a few drops of egg yolk might add additional minutes to your whipping time, but you’ll get the same results and stability as your batch sans yolk. They even go so far as to rub down the mixing bowl with a thin layer of oil to mimic a poorly washed bowl, and repeatedly achieve soufflé-worthy results.


from Lifehacker https://ift.tt/QNIscHR

S3 Ep71: VMware escapes, PHP holes, WP plugin woes, and scary scams [Podcast]

For Home Users

Sophos Home protects every Mac and PC in your home

Learn More

from Naked Security https://ift.tt/rDU8Vs2

What the Codes on Your Car’s Tires Are Telling You

Photo: Pixinoo (Shutterstock)

If you own a car, you also own at least four tires—five if you’ve got an actual full-size spare in the trunk instead of one of those humiliating donuts. At every level from single-car owner to tire yard proprietor, there are many tires to be owned. The point is, most of us do. Still, very few of us understand how to replace those tires on our own, even though it isn’t as complicated as you might think. In fact, all the information you need is literally printed on the tires you already own.

Naturally, that information isn’t printed in what might be called a “human readable” manner—it’s a code. But once you understand what the code means (and master a little simple math), you’ll be able to figure out what kind of tire any vehicle needs all on your own. This is especially crucial if you’re only replacing one tire, because even tiny differences in specs can have pretty disastrous results on your car’s health. Here’s how to read your car’s tires.

Tire literacy

You may have noticed that the tires on your car all have a lot of writing on their sidewall—inscrutable numbers and letters. Joke’s on you: all these letters and numbers are totally scrutable. You just need to know what they mean. There are two codes you’ll need to pay attention to. First, look at the he sidewall code and second, check out the DOT (Department of Transportation) code. Let’s take two made-up tire codes and walk through what they mean.

Sidewall code

First, look for a code that’s 11-13 characters long, with a forward slash in the middle. That’s the sidewall code that describes the fundamentals of the tire on your car. Note: Tire sizes are in metric, so you’re going to have to swallow your American love of the imperial system for the time being. We’re going to use the code P205/65R16 75H as an example.

Tire type. The first letter of the code describes what type of vehicle the tire is meant for.

  • P indicates a passenger vehicle. Think sedans, minivans, and most small SUVs and trucks.
  • LT stands for “light truck,” or trucks that can carry heavy loads.
  • ST stands for “special trailer” and, you guessed it, is intended for use on trailers, not passenger vehicles or trucks.
  • T stands for “temporary” and will be found on spares that aren’t full-size tires.
  • No letter: If your tire’s code doesn’t start with a letter, you’ve got what’s called a Euro-Metric tire. This is a category that straddles P and LT, but there are some differences in how the load index (discussed below) is calculated. Generally speaking, they’re considered equivalent to P-metric tires, especially if you’re replacing all four. If you’re not sure about something, you can still check with a professional.

Tire width. After the letter, you’ll find three numbers. In our sample above, this is “205” and it’s just the width of the tire in millimeters—205mm.

Tire aspect ratio. After the width you’ll see a forward slash, followed by two more numbers. This is your tire’s aspect ratio (what percentage the width is of the height), which is used to calculate your tire’s height using the following formula: aspect ratio/100 x width.

So using our example, the height of the tire would be 65/100 x 205, or 133.25. That means the tire is 133.25 millimeters high.

Construction Type. After the aspect ratio you’ll find a letter. This is a code describing the tire’s construction type.

  • R stands for radial
  • D stands for bias tires (for some reason).

Almost all the tires you’ll encounter will be radial tires. Bias tires are mainly used on motorcycles and trailers.

Rim size. The last two numbers of the sidewall code are the rim size or diameter of the wheel. In our sample, that would be 16. Be careful here. Suddenly and for no sane reason, we’re back in the imperial system and it’s in inches. Because why should there be consistency? Consistency is boring.

Load index. Ever wondered how much weight your vehicle’s tires can handle? Wonder no more! After the rim size, you’ll find a 2-3 digit code. This is the wheel’s load index, which is the maximum weight your tire can handle (you can look up the weight—in pounds—on a load index chart). Since you’ve usually got four tires, you can figure out the max load of all four by multiplying this by, of course, four. Since our sample has a load index of 75 which can handle 852 pounds, four of those suckers can handle about 3,400 pounds.

Speed rating. Tires are engineered to operate under specific conditions, and that includes speed. The letter that follows the load index is the tire’s speed rating. There are a lot of speed ratings ranging from a dawdling 3 mph to 186 mph or more. In our sample, the “H” indicates the tire is rated for speeds up to 130 mph.

DOT Code

There’s another code on your tire worth paying attention to: The DOT code. This code is mandated by the Department of Transportation and indicates the tire has met minimum safety requirements. It also shows who manufactured the tire and when, which is most useful for us. The format of the DOT code is DOT 2620.

The manufacturer info will vary in length and composition. All we care about is the last four digits, which indicate when your tire was made. In our sample’s case, it was the 26th week of 2020. Knowing how old your tires are is very useful information.

Other Info

There’s a ton of other info on your tire that is either easier to understand. The maximum tire pressure is pretty self-explanatory, for example. Other things are slightly less crucial.

  • Treadwear (sometimes abbreviated TW). This tells you how much “grip” your tires have and how fast your tires will wear out. This ranges from about 800, which will last forever but grip nothing, to 100, which will grip everything but wear out while you’re reading this sentence. If you’re wondering why grip matters, you’ve obviously never hydroplaned at high speeds and seen your life flash before your eyes.
  • Traction. This measures your tire’s traction on a wet surface, but is rendered as a letter code: AA is best, followed by A, B, and C. Most tires will be rated “A.”
  • Temperature. This refers to how well your tires dissipate heat. Heat is really bad for your tires, so a higher rating is better. This will be a letter grade of A, B, or C.
  • M+S. If you see this, your tire is an all-weather tire rated for mud and snow. If it’s followed by an “E,” you’ve got a snow tire.
  • Arrows. See some arrows on your tire? Congratulations, you’ve got an unidirectional tire. That just means the tire is engineered to be installed in one direction. Most tires are unidirectional, but if you don’t see arrows don’t freak out.

That’s all there is to know about tire codes. Now that you’re tire literate you can replace your own tires—or engage your mechanic in conversation about tires, which you know mechanics love.

   


from Lifehacker https://ift.tt/CAmz8Eg