Wednesday, May 31, 2023

Seven Rules for Taking Your Kid to a Concert

The summer concert season is in full swing, and your local arena will soon be hosting performers of all stripes, from Shania Twain, to Taylor Swift, to Janet Jackson, TLC, and Snoop Dogg. And with school out for the next few months, it’s probably crossed your mind that the time has finally come for your kids to experience their first Foo Fighters show.

While there’s no evidence that instilling in them a love of live music will make your kids smarter, it can boost their creativity and help regulate their emotions. But as someone who’s been to his share of concerts and festivals solo, it is already hard enough to navigate long waits in the parking lot and at the concession stand and deal with fans in various states of inebriation dancing in the aisles. To guide my two kids through the melee seems overwhelming.

But cool moms and dads somehow pull this off every summer. There are the obvious ways to safeguard children during a show, including protecting their hearing with earplugs and having a plan should the two of you get separated. Here are other tips to help you, your kids, and even those around you get the most from the live music experience.

Skip the Opener

I’ve discovered many a favorite band by coming to a concert to catch the opener. However, if your child is a Taylor Swift fan, then Phoebe Bridgers is just another obstacle in the way of their chance to sing along to “Cruel Summer” with the artist herself. And with her shows going past the three-hour range, your kid will be asleep before Swift performs “Shake It Off.” Arriving before the headliner takes the stage gives you more time to squeeze in a nap, eat dinner, and take a bathroom break so they can enjoy the whole show.

Let them know what to expect from the crowd

Music (and drugs and alcohol) can make people do funny things, including dancing, twisting, and shouting. For a young person who’s likely never been in a large mixed crowd before, it might be a little frightening. On your way to the venue, let your kids know all the silly and crazy things they might see and hear from the audience during the set to prepare them for the sensory overload they’re about to experience.

Pick the right seat

No matter how many trips to the toilet you take before the first chord is struck, it’s inevitable your child will need to take a potty break during the show (and let’s face it, it’ll be during your favorite song). The easiest way to make a beeline to the bathroom is by snagging a seat next to the aisle. You’ll save yourself the frustration of weaving through the crowd and give yourself a fighting chance to catch the last verse of the artist’s big hit.

Consider those behind you

Weaving through a row of fans is one thing, but blocking the view of the people behind you is another. Unless you’re sitting in front of Manute Bol, it’s probably not a good idea to put your young ones on your shoulders to give them a better view. They’ll be able to see just fine from the aisle seat you (hopefully) purchased.

Don’t worry (too much) about them getting a contact high

Smell that smell? It’s likely what you think it is, and you have a right to be a little concerned about how inhaling it could affect your child. In a 2015 Johns Hopkins study, 12 people were put in an unventilated room where six puffed their way through 10 joints, while the others didn’t smoke. The non-smokers felt tired, pleasant, and less alert when the study was over. Their blood and urine tests showed they tested positive for THC. When they repeated the experiment in a ventilated room, the tests were negative for THC.

What’s the takeaway from this study? If you’re taking your kids to that Dave Matthews Band show at an amphitheater, the chances of them getting a contact buzz are low. But if you’re going to catch the band in an arena, you might want to get a sitter.

Leave a snack in the car

Even if your kids didn’t get a contact high, they’re probably going to be tired and hungry after the show. Leave a healthy snack in the car for them to munch on for the trip home, or it’ll be an even longer journey out of the parking lot.

Maybe don’t take them

Ask yourself this question, and answer honestly: Why am I taking my young children to a concert? Unless you’re going to see The Wiggles, enjoying live music is perhaps best considered an adult pursuit.

If you still want your kids to gain an appreciation for the art form, critic Steven Hyden at Uproxx offers some alternatives:

“The best you can do is make music available to your child. Play it around the house. Make fun mixes for the car. Make music something that your kid can choose to participate in. Because you can’t control what your kid likes. Besides, what your kid likes right now won’t be what your kid likes six months from now.”


from Lifehacker https://ift.tt/DMHyCGV

Burn Your White Chocolate on Purpose

White chocolate is a finicky beast. Scorching happens, but so does browning. And, unlike dark chocolate and milk chocolate, there is a space between melted and scorched where white chocolate becomes crunchy, and develops a creamy caramel flavor. Don’t toss that burnt white chocolate, use it as an elegant textural garnish.

Spoiler alert: white chocolate has no cocoa solids and is mostly composed of cocoa butter, sugar, other fats, and (maybe) added flavorings. Depending on who you ask, it may or may not be “real” chocolate. Regardless of what side of the chocolate fence you’re on, the fact is white chocolate is different from milk and dark chocolate, so it acts differently when heated (and overheated).

White chocolate doesn’t melt and pool the way brown chocolates will. It’ll hold its shape, but the color will change from white to yellow, then brown, and finally black. The brown to black stage is when the texture changes from slippery and wet, to an open-pocketed, dry, crumbly consistency. At this point in browning, you can’t use white chocolate for most of the traditional purposes like tempering, dipping strawberries, making peppermint bark, or stirring into cheesecake batter. Most folks will call this “burnt” because they think it’s unusable. Nay, it is toasted.

Deeply browned white chocolate tastes like creamy caramel. It maintains a note of its original white chocolate flavor, but with a powerful toasty element in the foreground and a completely new texture. The broken, crispy, crumbly texture makes for an incredible garnish. Pile it onto your oatmeal or smoothie bowl, sprinkle it onto your ice cream or pudding, or add it to cereal, granola, or yogurt. Get fancy and use it as a bed under your panna cotta, or quenelle of raspberry gelato.

Toasting white chocolate in the microwave as a “happy accident” might happen to you at any time, but if you want to make some on purpose you can do so easily in the oven. Grab some white chocolate morsels, or break a white chocolate bar into chunks and sprinkle them over a parchment-lined baking sheet. Bake at 350°F for five to eight minutes, or until the bottoms are toasted and the surface looks bubbly and dry. To make a crumble, drop the pieces into a food processor and pulse until you reach an even consistency. Happy toasting.


from Lifehacker https://ift.tt/nBASs0h

Bitdefender GravityZone Security for Mobile provides protection against mobile attack vectors

Bitdefender unveiled GravityZone Security for Mobile, designed to provide organizations with advanced Mobile Threat Detection (MTD) and security for Android, iOS and Chromebook devices, including Chrome extensions.

Bitdefender GravityZone Security for Mobile

The new offering helps enterprises, managed service providers (MSPs) and their customers gain deep visibility into their mobile footprint to prevent, protect, detect and respond to cyberattacks targeting mobile devices, applications, and operating systems.

With more than 6.8 billion smartphones in use around the world, attackers have ample opportunities to exploit vulnerabilities and target unsuspecting users. Enterprise organizations across all industries are under increasing pressure to adopt mobile security capabilities as mobile threats, particularly phishing, ransomware, and zero-day attacks, grow.

According to the 2023 “Market Guide for Mobile Threat Defense” report by Gartner, “By 2025, more than half of organizations in regulated industries will have a security solution for both iOS and Android devices.” The report states, “Most importantly, we do have evidence that some of the largest recent attacks included at least one step that involved mobile devices.”

Enterprises continue to rely on a remote and dispersed workforce who use personal devices to connect to company networks and resources which has opened up an often-vulnerable attack surface,” said Andrei Florescu, deputy GM and SVP of products, Bitdefender Business Solutions Group.

“Cybercriminals increasingly target mobile devices as an entry point for attacks. It is critical for organizations to have an advanced mobile threat detection solution as part of their broader endpoint security strategy. GravityZone Security for Mobile is another example of how we are delivering trusted threat prevention, protection, detection, and response across all platforms to help organizations secure data and strengthen their cyber resilience,” added Florescu.

Bitdefender GravityZone Security for Mobile provides advanced MTD and protection against mobile attack vectors. Leveraging Bitdefender’s antimalware and advanced threat intelligence solutions, GravityZone Security for Mobile enables organizations to vet applications, monitor device status, protect against malicious apps, phishing attacks and more to strengthen their overall cybersecurity posture.

Key features

Powerful security for mobile devices – GravityZone Security for Mobile leverages powerful antimalware technologies, driven by real-time threat intelligence and machine learning technologies on and off the device, to detect malicious applications, known and unknown threats. Organizations can vet mobile applications and monitor mobile endpoints to ensure they meet compliance with designated security policies. On-device anti-phishing technologies protect against phishing attacks without causing slowdowns, and web access controls prevent employees from visiting compromised or malicious websites.

Network protection – Detect network-based threats and map to the tactics and techniques used in MITRE ATT&CK security evaluations. GravityZone Security for Mobile enables organizations to prevent, detect and respond to network-borne threats to the mobile channel such as reconnaissance attempts (where an attacker covertly gathers information about an organization’s information systems), weak security connections, and man-in-the-middle attacks, where attackers attempt to intercept multi-factor authentication codes sent to mobile devices.

Device assessment and protection – Stay ahead of mobile device vulnerabilities. GravityZone Security for Mobile provides device monitoring for vulnerabilities, missing encryption, jailbreaking, root access, and outdated devices that are no longer receiving the latest security updates.

Integration with existing mobile and enterprise security solutions – GravityZone Security for Mobile integrates with the unified Bitdefender GravityZone console, enabling customers to extend security beyond traditional endpoints while enjoying centralized management from a single platform. GravityZone Security for Mobile is complementary to an organizations’ existing Mobile Device Management (MDM), Enterprise Mobility Management (EMM), Unified Endpoint Management, and Security Information and Event Management (SIEM) solutions, providing strong protection and easy deployment across all mobile endpoints.

100% cloud-based – GravityZone Security for Mobile provides cloud-based, easy-to-manage security for any type of mobile workforce. Zero-touch enrollment enables mass deployments of mobile devices without end-user intervention, making employees’ mobile devices more secure by default.

Deep visibility for regulatory compliance – Organizations in regulated industries must understand the privacy and security posture of employees’ mobile devices and the applications running on them. GravityZone Security for Mobile provides real-time visibility for application vetting, identifying abnormal behavior in apps, application version control, user warnings for denied applications, and risky actions such as isolating applications, disabling WiFi/Bluetooth, or disabling or uninstalling extensions.

GravityZone Security for Mobile is available now for Bitdefender GravityZone cloud solutions, including GravityZone Cloud MSP Security, or Bitdefender Managed Detection and Response (MDR) service.


from Help Net Security https://ift.tt/ytOQFHr

Use Your iPhone's Automation to Switch Every Full-Screen Video to Landscape

Vertical videos are great in apps like TikTok or Instagram, but full screen content is meant to be watched in landscape. The problem is, your iPhone isn’t always set up to switch to landscape. Typically, you don’t want your screen shifting when you tilt your phone, so you likely keep portrait orientation lock on—a feature that conveniently keeps many apps from showing full screen videos in landscape. But you can use automation to automatically turn portrait orientation lock on and off when switching between normal iPhone use and watching full-screen videos. 

Set portrait orientation lock automatically

To start, open Shortcuts on your iPhone, then go to the Automation tab and tap Create Personal Automation.

On the next page, choose App. This will show you the triggers page. Check both Is Opened and Is Closed, and tap the Choose button next to App. You can now go through the list and select all the apps you use to watch videos, and tap Done.

Press the Next button in the top-right corner and tap Add Action. Search for Set Orientation Lock and tap it. If you’ve done this correctly, you’ll see Toggle orientation lock on screen. Tap Next, and on the next page, disable Ask Before Running, hit Don’t Ask on on the pop-up, then tap Done.

That’s it! Your automation is now ready to go. The moment you open any of the apps you’ve selected, iOS will disable portrait orientation lock, and you can simply turn your phone to watch videos in full screen. When you leave these apps, your iPhone will toggle portrait orientation lock back on.

For this to work smoothly, you should keep portrait orientation lock on. The automation is set up to disable the lock if it is enabled, and vice-versa. If that limitation annoys you, then you can set up two automations instead of a single one. In one of them, the trigger should be Is Opened, and in the second one, it should be Is Closed. After selecting the apps for the automation, you can tap the Toggle button in the Toggle orientation lock step and change it to Off in the first one and On in the second one. That way, portrait orientation lock will be disabled the moment any of the selected apps is opened, and enabled again when you close those apps.


from Lifehacker https://ift.tt/sOm2XQw

Tuesday, May 30, 2023

This 10TB Lifetime Cloud Backup Is Over 90% Off Right Now

Keeping your files stored locally is convenient, but it comes with obvious risk and the frustration of low-storage warnings. Degoo was founded in 2012 and has since grown as a reliable option for cloud backup services, and you have until May 31 at 11:59 p.m. PT to get Degoo’s Premium lifetime 10TB Backup Plan for only $89.97 (reg. $1,080).

Get 10TB of cloud backup with no subscription costs

Degoo is a reliable cloud backup service with no recurring costs. Install the iOS or Android app, or just use your web browser to upload files from unlimited devices. Files are replicated when you upload, and the Android app has automatic file change detection. Select a file for Degoo to monitor, and it will automatically copy it whenever something changes.

Degoo’s only restriction is a 1GB file size limit. If you’re uploading large folders, you may have to split them before backing up. If you need to upload larger files, there are in-app upgrades available that bring the file size limit up to 50GB.

While most gadgets’ included storage options can be reliable, no device is disaster-proof. One verified buyer found that out shortly after installing their backup: “About three days after I bought this and installed it, my phone stopped working. The OS was corrupt, and I had to restore everything to the device. My pictures and videos were backed up, [though], so I knew I was safe to wipe the phone.”

If you want to skip the stress of low-storage warnings and avoid the frustration of losing your files if your device breaks, try this 10TB of cloud storage with Degoo’s Lifetime Backup Plan for just $89.97 (reg. $1,080) until May 31 at 11:59 p.m. PT, though prices may change at any time.


from Lifehacker https://ift.tt/tUOyfV1

You Can Finally Share Your Screen in WhatsApp on Android

Photo: Rahul Ramachandram (Shutterstock)

Screen sharing isn’t just for work calls anymore. Maybe you want to play a game with a friend over a video call, or you need to walk your parents through a tech problem. Either way, screen sharing is a convenience we’ve come to expect, and while it’s standard in apps like FaceTime, is hadn’t been available on WhatsApp until now.

As reported by WhatsApp news site WABetaInfo, Meta is adding screen sharing to WhatsApp, starting with version 2.23.11.19 on Android. The feature works as you’d expect: During a video call, you’ll see a new screen share button, which looks like a smartphone with an arrow. Tap that, and you’ll see a pop-up asking if you’d like to start recording or casting with WhatsApp, along with a warning that WhatsApp will be able to see everything on your screen. To proceed, tap “Start now,” and WhatsApp will beam the contents of your display over to the other callers. You can hit “Stop sharing” at any time to cancel the stream.

WABetaInfo notes this feature might not be available on older versions of Android, but it isn’t clear what the cutoff version is. It also might not work with large group calls, and the other parties might not even see your screen share if they’re running older versions of WhatsApp.

How to share your screen on WhatsApp

To share your screen during WhatsApp video calls, you need to be running at least WhatsApp version 2.23.11.19 on Android. That version isn’t officially out yet, so you’ll need to install the beta from the Google Play Store. You can become a beta tester by going to this Play Store link, signing into your Google Account, and enrolling as a tester. After you do, you’ll be able to update WhatsApp on your phone to the latest beta version.

WhatsApp has been busy adding useful new features as of late, some of which other apps have had for some time. The app recently introduced message editing for all, as well as the ability to lock your messages behind authentication. And last month, WhatsApp finally made it possible to use the app on more than one phone at a time, removing a limitation WhatsApp users have dealt with since the app’s inception.

[Mashable]


from Lifehacker https://ift.tt/nelWaRI

You Can Get Your First Year of Sam’s Club Membership for $30 Right Now

Sam’s Club members often find excellent deals on groceries, household items, electronics, and more. Usually, a one-year Club-level membership costs $50, but new members can now sign up for just $29.99 with auto-renewal.

Sam’s Club has around 600 warehouse locations nationwide where you can buy groceries in bulk, as well as shop for things like kitchen supplies, electronics, clothes, and furniture. Buying in bulk obviously can mean saving money, but it can also mean taking fewer trips to the store and being better prepared for emergencies. At select locations, you can even get discounted prescriptions and prepared food items, so you can grocery shop, refill prescriptions, and pick up a rotisserie chicken in one fell swoop.

Sam’s Club members can also get deals on rental cars, live events, attractions, and movies. You can also save up to 60% on hotel accommodations worldwide. The deal gets you a one-year Club-level membership. If you don’t cancel your membership before its renewal date, it will automatically renew at its full price—currently $50. So if you’ve been looking to sign up, you should get this 1-year membership at Sam’s Club for $29.99 (reg. $50) before prices change.


from Lifehacker https://ift.tt/fhvQGuP

Five Things You Should Do Now to Prepare for a Heatwave

Extreme heat can be dangerous if you’re not prepared. If you don’t live in an area that is ordinarily hot, you might not have air conditioning, so getting your home ready for a heat wave is important to avoid heat related illness. Here are 5 things you should do to get ready if your area has a blast of hot air on the way.

Insulate your windows and doors

You might be used to wrapping your windows in plastic to keep in heat during the winter, but insulation matters in summer too. To make sure that you’re taking in as little heat from outdoors as possible, you should cover your windows with light colored drapes, reflective film or insulation, reflective window treatments, or DIY window reflectors.

To make reflectors yourself, you can purchase (or reuse) the shiny type of cold bags that come with a food or grocery delivery. Cut them to fit your window, and hold in place with painter’s tape. If you’re in a pinch, this type of insulation, especially in the sunniest windows, can help keep the temperature down in your home.

Also, check the weatherstripping on windows and doors and replace any that has gotten damaged weather stripping. If you have older windows, you can also try using a wintertime window insulation kit to seal your windows temporarily (though keep in mind this will bar you from opening them to create a cross breeze overnight or in the mornings, when the air is cooler).

Keep the air cool

If you don’t have central air conditioning and don’t want a massive electricity bill, place a window AC unit in one room that you can seal off from the rest of your home. According to ready.gov, using fans as your sole cooling device won’t help you much during extreme heat events, as while a breeze might make you feel more comfortable, it won’t reduce your body temperature much, leaving you vulnerable to heat stroke. If the temperature outside is more than 95 degrees, a fan alone can actually increase your chances of heat stroke by making you feel cooler than you actually are. To make a smaller space more comfortable, you can also use a swamp cooler to keep temperatures down.

Insulate your attic

If you have an uninsulated attic, insulating it in advance of a heat wave can help you stay cool. Although this is a bigger undertaking, you can likely get the job done for around $1,500, which is well worth the price considering what it will save you on energy bills over the longterm. Improved attic insulation can save you about 15% on your utility bill in winter and summer alike, even as it makes your home more comfortable.

Find your local cooling station

If you don’t have AC or a backup plan, make sure you know where the nearest cooling station is located. While you might not need to use it, having a plan ahead of an emergency will make getting to safety that much quicker. Most municipalities or counties will post their emergency plan on their website. Many towns open places like public libraries, schools, and convention centers to serve as cooling centers in an emergency.

Check your air conditioner before it gets too hot

If you do have central air conditioning, you should check your system before an extreme heat event. Look over the AC coils (located outside, on your AC unit) to make sure they’re clean and well clear of any weeds and vegetation. You should also check your HVAC filters, located inside, often in a basement or utility room. Filters tend to wear out if the AC unit is running full force for a long period of time, so changing out the filter now is a good idea. If you’re not sure which filter is right for your system, you can bring the old filter with you to the store or search the numbers on the side of the filter if you’re buying online.


from Lifehacker https://ift.tt/dEQNbqm

Serious Security: Verification is vital – examining an OAUTH login bug

Researchers at web coding security company SALT just published a fascinating description of how they found an authentication bug dubbed CVE-2023-28131 in a popular online app-buildin toolkit known as Expo.

The good news is that Expo responded really quickly to SALT’s bug report, coming up with a fix within just a few hours of SALT’s responsible disclosure.

Fortunately, the fix didn’t rely on customers downloading anything, because the patch was implemented inside Expo’s cloud service, and didn’t require patches to any pre-installed apps or client-side code.

Expo’s advisory not only explained what happened and how the company fixed it, but also offered programming advice to its customers on how to avoid this sort of possible vulnerability with other online services.

SALT then waited three months before publishing its report, rather than rushing it out for publicity purposes as soon as it could, thus giving Expo users a chance to digest and act upon Expo’s response.

Keeping it simple

The buggy authentication process is explained in detail in SALT’s report, but we’ll present a greatly simplified description here of what went wrong in Expo’s OAUTH service.

OAUTH, short for Open Authorization Framework, is a process that allows you to access private data in an online service (such as editing your online profile, adding a new blog article, or approving a web service to make social media posts for you), without ever setting up a password with, or logging directly into, that service itself.

When you see web services that offer you a Login with Google or Facebook option, for example, they’re almost always using OAUTH in the background, so that you don’t need to create a new username and a new password with yet enother website, or give your phone number out to yet another online service.

Strictly speaking, you authenticate indirectly, only ever putting your Google or Facebook credentials into one of those sites.

Some users don’t like this, because they don’t want to authenticate to Google or Facebook just to “prove” themselves to other, unrelated sites. Others like it because they assume that sites such as Facebook and Google have more experience in handling the login process, storing password hashes securely, and doing 2FA, than a boutique website that has tried to kn it its own cryptographic security processes.

Outsourced authentication

Greatly simplified, an OAUTH-style login, via your Facebook account to a site called example.com, goes something like this:

  • The site example.com says to your app or browser, “Hello, X, go and get a magic access token for this site from Facebook.”
  • You visit a special Facebook URL, logging in if you haven’t already, and say, “Give me a magic access token for example.com.”
  • If Facebook is satisfied that you are who you claim, it replies, “Hello, X, here is your magic access token.”
  • You hand the access token to example.com, which can then contact Facebook itself to validate the token.

Note that only Facebook sees your Facebook password and 2FA code, if needed, so the Facebook service acts as an authentication broker between you and example.com.

Behind the scenes, there’s a final validation, like this:

  • The site example.com says to Facebook, “Did you issue this token, and does it validate user X?”
  • If Facebook agrees, it tells example.com, “Yes, we consider this user to be authenticated.”

Subvertible sequence

The bug that the SALT researchers found in the Expo code can be triggered by maliciously subverting Expo’s handling of what you might call the “authentication brokerage” process.

The key points are as follows:

  • Expo itself adds a wrapper around the verification process, so that it handles the authentication and the validation for you, ultimately passing a magic access token for the desired website (example.com in the exchange above) back to the app or website you’re connecting from.
  • The parameters used in handling the verification are packed into a big URL that’s submitted to the Expo service.
  • One of these parameters is stored temporarily in a web cookie that specifies the URL where the app or browser on your device will send the final magic security token to enable access.
  • Before the security token is delivered, a popup asks you to verify the URL that’s about to be authorised, so you can catch out anyone trying to substitute a bogus URL into the authorisation process.
  • If you approve the popup, Expo redirects you to the Facebook verification process.
  • If Facebook approves the verification, it returns a magic access token to the Expo service, and Expo passes it on to the URL you just approved in the popup, dubbed the returnURL.
  • The app or website listening at the specificed returnURL receives Expo’s callback, acquires the access token, and is therefore authenticated as you.

Unfortunately, the SALT researchers found that they could subvert the login process by using JavaScript code to trigger access to the initial Expo login URL, but then killing off the verification popup before you had time to read it or approve it yourself.

At this point, however, Expo’s service had already set a cookie named ru (short for returnURL) to tell it where to call back to with your magic access token at the end.

This meant that a cybercriminal could trick Expo’s code into “remembering” a returnURL such as https://roguesite.example, without you ever seeing the dialog to warn you that an attack was under way, let alone approving it by mistake.

Then the researchers used a second chunk of JavaScript code to simulate Expo’s redirect to Facebook’s verification process, which would automatically succeed if (like many people) you were already logged into Facebook itself.

Facebooks’s verification, in turn, would redirect the Expo login process back into Expo’s own JavaScript code…

…which would trustingly but erroneously grab the returnURL for its callback from that magic ru cookie that it had set “just in case” at the start, without your approval or knowledge.

Fail open or fail closed?

As you can see from the description above, the vulnerability was caused by Expo’s code failing inappropriately.

Authentication code should generally fail closed, in the jargon, meaning that the process should not succeed unless some sort of active approval has been signalled.

We’re guessing that Expo didn’t intend the system to fail open, given that SALT’s report shows that its popup approval dialog looked like this:

  The app at https://roguesite.example is 
  asking you to sign into your Facebook account.
  Do you fully trust https://roguesite.example 
  and agree to let it: [No] [Yes]

The default answer, as you would expect, was set to [No], but this would only cause the system to fail closed if you religiously used Expo’s own client-side code to control the verification process.

By supplying their own JavaScript to run the sequence of verification requests, the researchers were able to treat the approval dialog as if it had said:

  If you don't explicitly tell us to 
  block https://roguesite.example from 
  logging in via your Facebook account, 
  we'll let it do so: [Allow] [Block]

The solution, amonst other changes, was for Expo’s initial login code to set that magic ru cookie only after you’d explicitly approved the so-called returnURL, so that Expo’s later JavaScript login code would fail closed, instead of blindly trusting a URL that you had never seen or approved.

In many ways, this bug is similar to the Belkin Wemo Smart Plug bug that we wrote about two weeks ago, even though the root cause in Belkin’s case was a buffer overflow, not a rogue web callback.

Belkin’s code allocated a 68-byte memory buffer in its server-side code, but relied on checking in its client-side code that you didn’t try to send more than 68 bytes, thus leaving the server at the mercy of attackers who decided to talk to the server using their own client-side code that bypassed the verification process.

What to do?

  • When reporting and writing up bugs, consider following SALT’s example. Disclose responsibly, giving the vendor a reasonable time to fix the vulnerability, plus a reasonable time to advise their own users, before publishing details that would allow anyone else to create an exploit of their own.
  • When receiving bug reports, consider following Expo’s example. Reply quickly, keep in contact with the reporter of the bug, patch the vulnerability as soon as you can, provide a helpful investigative report for your users, and keep it objective. (Resist your marketing team’s suggestions to praise yourself or to dismiss the issue as unimportant. That’s for your users to decide, based on the promptness and the pertinence of your response.)
  • Ensure that your authentication code fails closed. Make sure you don’t have verification or approval steps that can be neutralised simply by ignoring them.
  • Never asssume that your own client-side code will be in control of the verification process. Presume that attackers will reverse-engineer your protocol and create client code of their own to circumvents as many checks as they can.
  • Logout of web accounts when you aren’t actively using them. Many people login to accounts such as Google, Amazon, Facebook, Apple and others, and then stay logged in indefinitely, because it’s convenient. Logging out prevents many actions (including authentications, posts, likes, shares and much more) from happening when you don’t expect them – you’ll see a login prompt instead.

Don’t forget that by logging out of web services whenever you can, and by clearing all your browser cookies and stored web data frequently, you also greatly reduce the amount of tracking information that sites can collect about you as you browse.

After all, if you aren’t logged in, and you don’t have any tracking cookies left over from before, sites no longer know exactly who you are, or what you did last time you visited.



from Naked Security https://ift.tt/Rdy8xrL

These Home Improvements Are the Most Resistant to Inflation

With inflation still high the chances of that changing significantly any time soon rather low, you might be wondering if now is a good time to tackle any home renovation projects at all. Even under relatively calm economic conditions, it can be a challenge to choose the right renovation project and make sure you get the most for your money, and the decision is even more fraught right now.

But there are some projects that will hit you with lower upfront costs and hold their value for longer. Here are inflation-safe projects you can tackle even in a volatile economy.

Settle for smaller scale improvements

When you’re thinking about home upgrades in a time of high inflation, it’s a good idea to scale back. Smaller, impactful renovations will provide a better bang for your buck in murky economic times. Since inflation is causing prices for materials and labor to rise, keeping the scope of your project narrow will help control costs. Moreover, updates that don’t take much time or that you can do yourself will always save you money.

So instead of doing an all-out kitchen renovation—new flooring, new cabinets, new appliances—try refacing cabinets, adding a kitchen island or pantry, or updating you sink and cabinet hardware instead.

A simple kitchen island costs around $200 from most hardware stores, and larger one with more features can run you in the neighborhood of around $3,000, with lots of price point options in-between. New cabinet doors and facings cost around $15 to $50 each, offering a more affordable option for a significant style update. You can change out your kitchen faucet for between $40 and $300 or more, depending on how fancy you want to go; similarly, new cabinet door handles and drawer pulls can cost as little as $5 each. Compare these simple facelift projects to the cost of a full kitchen remodel—around $30,000.

Concentrate on DIY improvements

Consider also straightforward updates you can handle yourself that will add impact without costing an arm and a leg. Repainting, adding wallpaper, adding crown molding, changing out a door, or upgrading your home security with new locks are all projects you can do yourself without going wildly over budget.

These simple improvements will help your home hold its value, and if you can DIY them, all the better—skipping out on hiring a contractor is the quickest way to save money, provided you know what you are doing (shoddy work comes with its own hidden costs). Even these small projects can boost your home value if you choose to sell, and if you don’t, you’ll appreciate the benefits right away.

Finishing an unfinished space is probably cheaper than moving to a new home right now

If you’re holding off on moving into a bigger home because of the current inflationary interest rates and uncertainty in the market, adding more useful space in your current home can help you stretch out for less than the cost of moving. Even though finishing a basement, attic, or garage can be an expensive renovation—between $3,000 and $30,000 depending on the variables involves—the return on investment when you choose to sell is pretty high, at about 70 to 75 percent.

This means that when you do eventually choose to sell, your place will have retained most of the value of the remodeled space, putting you in a better position to upgrade to a larger or nicer home.


from Lifehacker https://ift.tt/HLxBVFv

Monday, May 29, 2023

Organizations spend 100 hours battling post-delivery email threats

Nearly every victim of a spear-phishing attack in the last 12 months saw impacts on their organization, including malware infections, stolen data, and reputational damage, according to Barracuda Networks.

2023 spear-phishing trends

Barracuda Networks research finds 24% of organizations studied had at least one email account compromised through account takeover.

The research shows that cybercriminals continue to barrage organizations with targeted email attacks, and many companies are struggling to keep up.

While spear-phishing attacks are low-volume, they are widespread and highly successful compared to other types of email attacks.

Spear phishing victims

50% of organizations analyzed were victims of spear phishing in 2022, and a typical organizations received 5 highly personalized spear-phishing emails per day.

Spear-phishing attacks make up only 0.1% of all e-mail based attacks, according to Barracuda data, but they are responsible for 66% of all breaches.

55% of respondents that experienced a spear-phishing attack reported machines infected with malware or viruses; 49% reported having sensitive data stolen; 48% reported having stolen login credentials; and 39% reported direct monetary loss.

On average, organizations take nearly 100 hours to identify, respond to, and remediate a post-deliver email threat — 43 hours to detect the attack and 56 hours to respond and remediate after the attack is detected.

Highly effective email attacks target remote workers

Users at companies with more than a 50% remote workforce report higher levels of suspicious emails — 12 per day on average, compared to 9 per day for those with less than a 50% remote workforce.

Companies with more than a 50% remote workforce also reported that it takes longer to both detect and response to email security incidents — 55 hours to detect and 63 hours to response and mitigate, compared to an average of 36 hours and 51 hours respectively for organizations with fewer remote workers.

“Even though spear phishing is low volume, with its targeted and social engineering tactics, the technique leads to a disproportionate number of successful breaches, and the impact of just one successful attack can be devastating,” said Fleming Shi, CTO, Barracuda.

“To help stay ahead of these highly effective email attacks, businesses must invest in account takeover protection solutions with artificial intelligence capabilities. Such tools will have far greater efficacy than rule-based detection mechanisms. Improved efficacy in detection will help stop spear-phishing with reduced response needed during an attack.


from Help Net Security https://ift.tt/L3khBO6

Why You Should Include a Personal Detail in Your Out-of-Office Email

At some point, out-of-office emails lost their meaning. All too often, when someone receives an automated response, they may read and understand the first part—that the person they’re trying to reach isn’t at work—but choose to ignore the second, and arguably more important part, about when they can expect to hear back from them.

Or, in some cases, the person receiving the OOO message assumes that it applies to everyone except for them. Either way, instead of accepting and respecting the fact that this person won’t respond to their email until they return to work, these impatient folks continue to reach out to them, expecting an immediate response—even regarding things that aren’t remotely urgent.

So how do you get people to stop pestering you while you’re away? According to one career coach, the key is adding a personal detail to your OOO email. Here’s what to know.

Why people ignore your out-of-office message

While some people work for companies that require all employees to use the same canned out-of-office email whenever they’re away, others—including freelancers and other self-employed individuals—are free to compose their own messages, tailored to their needs and situation.

If you fall into the second category, career coach and therapist Brandon Smith suggests staying away from generic messages like “I’ll be OOO until [insert date] and will respond to your email when I return,” which he says are too easy to ignore.

“When I see that, I assume they are at home and took a day to clean their apartment,” Smith recently told CNBC.

How to write a more effective out-of-office email

Instead of going with one of these formulaic automated responses, Smith recommends including a personal detail in your email, as a way to establish more of a boundary while you’re away.

That said, there’s no need to include a long explanation of your absence, or any private information; in fact, it’s best to avoid both. Short and simple is the way to go.

For example, if you’re going on a trip with your family, Smith suggests the following wording, per CNBC:

“I’m going to be on a family vacation on [insert dates]. If you need immediate assistance please contact [information of colleague]” 

When someone receives that email, they’ll have to determine whether their question or problem is more important than your time off with your family. “You’re a jerk if you trample on that,” Smith told CNBC.

Of course, some people genuinely don’t care what you’re doing or who you’re with, and will continue to contact you whenever it suits them. But ideally, having some insight into what you’re doing and why you’re not in the office will be enough to make others think twice about following up.


from Lifehacker https://ift.tt/sfRyF32

How Baking Soda, of All Things, Can Help Your Workout

Baking soda—more formally known as sodium bicarbonate—has a lot of uses beyond just baking, from cleaning various surfaces, soothing your heartburn, to even browning your meat better. In addition to these uses, baking soda another  unexpected and underrated use: It can be used to improve athletic performance.

Similar to creatine, baking soda can help with short, high-intensity bouts of exercise, which is thought to be due to its ability to buffer hydrogen ions produced from anaerobic metabolism. In a number of studies, it’s been shown that athletes taking baking soda experience less fatigue during high-intensity exercise, which allows them to push harder for longer periods of time, and also report a reduced recovery time, which can help them over the course of a training cycle.

“In the sports science world, we know that [baking soda] works, and it works well,” said Jose Antonio, a sports scientist at Nova Southeastern University. However, “in the real world, where you get to try it, nobody likes to do it.”

Research shows that baking soda is an effective performance enhancer 

Baking soda as an athletic aid has been studied for decades, with a significant body of research showing that it is most helpful for short bouts of high intensity exercise that range from 30 seconds to twelve minutes. In practical terms, this can aid in sports such as weightlifting, martial arts, running, swimming, and cycling. In terms of its effectiveness, baking soda can help eke out just a little bit more performance at high intensities by shaving a few seconds off a race time or landing just a few more punches during a boxing match. 

Research also suggests that combining baking soda with creatine can lead to a greater effect on athletic performance than either one alone, which is thought to be due to the different modes of action for the two supplements. “You’re getting different mechanistic effects,” Antonio said.

Creatine works by increasing your body’s stores of phosphocreatine, which is what your body uses for energy. Having a higher supply of phosphocreatine in your body can help you eke out just a little bit more work at high intensities, when your supplies are running low.

By contrast, baking soda works by buffering the hydrogen ions that are produced from anaerobic metabolism. It’s these hydrogen ions that are responsible for the fatigue and the “burn” you get from high-intensity exercise. Baking soda helps to neutralize some of these hydrogen ions, which in turn helps delay that onset of fatigue.

The drawbacks to using baking soda 

The main reason baking soda isn’t often used as an athletic supplement is because you need a lot of it—to the point that it can cause stomach upset and diarrhea. The recommended dosage amount is 0.3 grams per kilogram of body weight. For a 60-kilogram athlete, that works out to 18 grams a day. Given that one teaspoon of baking soda weighs about 4.8 grams, that’s about 3.75 teaspoons of baking soda. That’s a lot of baking soda, and by extension, a lot of sodium, which means that if you have high blood pressure or have been advised by your doctor to limit your salt, this isn’t an option.

However, as Antonio points out, “a low dose is better than no dose.” The minimum effective dose starts at 0.2 grams per kilogram of body weight, which is a more manageable amount; and it’s also possible to split the dosing up across the course of day. “The logical thing to do is to use small doses and work your way up,” Antonio said. This way, your body gets used to the baking soda, which can help minimize any potential GI issues.

How baking soda works in practice 

These past few weeks, I started mixing in a low dose of baking soda into my daily water bottles, using a low-sugar powdered drink mix to mask the taste. I added in the baking soda over the course of the day, adding about two teaspoons in total, portioning them out over two to three large bottles of water. I also added in a scoop of creatine to one of the bottles, to augment the baking soda. The result was a slightly fizzy, slightly bitter drink. The dose was low enough that I didn’t experience any noticeable GI symptoms. I also added it in daily, including on non-workout days.

For context, I’m a former athlete who developed an autonomic nervous system disorder called postural orthostatic tachycardia syndrome, or POTS for short, for which one of the first clues was an unexplained drop in athletic performance. Currently, exercise is an important part of managing my condition, but I struggle more with high-intensity exercise, as it takes me longer to recover.

Anecdotally, adding in the baking soda coincided with a stretch of workouts that felt a little better than usual for me, and after stopping the baking soda for a few days, my workouts felt just a little harder. The difference was subtle enough that it could easily be a placebo effect, but given the research on it, it’s an easy (and cheap) enough measure that I’m willing to continue with it.


from Lifehacker https://ift.tt/N3oOJyB

How to Use Your Greywater to Save Money (and Resources)

We use a breathtaking amount of water. On average, every American uses about 300 gallons of water every single day, most of it indoors. Those applications are pretty fundamental, of course—we’re talking about washing our bodies, dishes, clothes, and homes, not to mention cooking, drinking, and heating.

Most of that water is literally wasted down a drain. Water used in bathing, cooking, and other activities is called greywater (sometimes spelled graywater here in the U.S.), and that greywater is estimated to account for about 75% of the water we literally flush into the sewers. While a lot of that water gets treated and returned to the system, it’s still an incredibly wasteful way to manage a precious resource—and since you’re paying for the water that gets pumped into your house, it’s also a waste of your budget. But you can do something about that, because greywater is totally re-usable in different ways, and not that hard to reclaim.

The difference between greywater and blackwater

It’s important to note that the water you flush down your toilet isn’t greywater—it’s blackwater, and isn’t safe to use in any way. And the water that goes down your kitchen sink may be problematic as well, because of the potential for grease content. But everything else in your house? Fair game, as long as you take a few precautions.

Local and state laws on greywater use

Greywater use is regulated in some way in most states, so before you do anything, you should check what kind of laws are in effect in your area (you might also check if your Homeowners Association has greywater-specific rules). Most states actually encourage using greywater, but some have specific guidelines about the type of systems you can set up and the ways you can use the water, and you might need permits.

Greywater sources

If you’re about average and using 300 damn gallons of water every day, you should be able to reclaim a significant amount of it for other uses (after all, you paid for it). Even excluding your toilet and kitchen sink, there are plenty of sources of greywater in your house:

  • Washing machines. These are enormous sources of water, and come with one huge benefit: They have built-in pumps that are already moving greywater into your drain system. All you need to do is hook up a diverter valve that will redirect the water someplace more useful. This can be a complicated project or just pumping the water into an outdoor bucket—either way, you’re recycling a valuable resource. One note about greywater from washing machines, though: Its usability depends entirely on what you put in the machine. Washing dirty, poo-riddled diapers means the water in there is blackwater, not grey, and can’t be used. And you should be careful to use biodegradable soaps that are plant-friendly.
  • Showers and sinks. Hot showers are mankind’s peak achievement, but they’re also inherently inefficient. Reclaiming that greywater is as simple as bringing a 5-gallon bucket into the shower with you to capture that water instead of letting it run down the drain. Once collected, it can be used any way you see fit. Similarly, instead of letting water run down the sink drain when you’re washing up, use a smaller bucket to collect water there.
  • Miscellaneous water. Anything in your home that uses, collects, or builds up water can be a source of greywater: air conditioning units that need to be drained, old fish tank water, water leftover from cooking, and so on.

Ways to use greywater

As long as you’re careful to use biodegradable soaps and other products, the greywater you collect has a wide range of uses:

  • Irrigation. Whether watering your lawn or keeping your garden lush, there’s no reason you can’t use greywater to irrigate your landscaping. This can be as simple as carrying a bucket to the yard and filling your watering cans with it, or setting up a more ambitious laundry-to-garden irrigation system.
  • Toilet flush. Got a bucket of water after your shower? Dump it into your toilet for the next flush. There’s no reason you need to use clean, potable water to flush a toilet. In fact, for about $100 you can install a toilet tank sink that will let you refill your toilet tank every time you wash your hands or brush your teeth—no bucket required.

One final note of caution: Don’t try to store greywater. Because it’s been used to wash stuff, it’s not exactly clean, and if left standing it will become a source of bacteria and other dangerous stuff. Greywater is perfectly safe at the point of collection and should be used pretty much immediately.

If you think about it, flushing so much water down the drain without even the slightest effort to repurpose it is kind of wild. Fortunately, all you need to change the dynamic is a bucket.


from Lifehacker https://ift.tt/316AjmK

Why You Should Set Your Sights on Fulfillment Rather Than Happiness

It’s graduation season, which means that along with asking grads the dreaded question (“So, what’s next?”), it’s also the time of year when people dole out unsolicited and outdated—or at least largely unrealistic—career advice.

Consisting primarily of quotes from “Oh, the Places You’ll Go,” as well as the ever-popular “find a job that makes you happy,” these clichés lean heavily on the idea that happiness should be our ultimate goal in life.

Though well-meaning, this kind of advice reinforces the idea that finding “happiness” means we’re succeeding, while anything less than that amounts to some type of failure. That’s why, instead of an endless pursuit of happiness, some experts say we’re better off setting our sights on fulfillment. Here’s what to know.

Why pursuing happiness can backfire

Most people are programmed to think of “happiness” as achieving certain goals—like landing your “dream job”—or reaching specific milestones in life, like homeownership, or getting married.

“If you think you’re only going to be happy if you have a particular job, for example, then you’re in real trouble, because it can be taken away from you at any moment,” human behavior expert Patrick Wanis, PhD told Psycom in a recent interview. “Constantly pursuing this thing called ‘happiness’ automatically tells you it’s not here.”

Why seek fulfillment instead of happiness

Fulfillment, on the other hand, isn’t a specific, singular goal, but rather, “the process of living a valued life,” according to clinical psychologist Jennifer Barbera, PhD.

In practice, this means pursuing and engaging in things that you’re passionate about, and/or truly matter to you—like having the time and money for traveling or a particular hobby, helping to further a particular cause, or having the time and mental and emotional bandwidth to maintain and build friendships.

This focus makes fulfillment both more attainable and sustainable than constantly chasing happiness.

“Fulfillment may help a person better cope with other feelings such as disappointment, sadness, loss, and anger,” Barbera noted in the same interview with Psycom. “This means working towards embracing a range of emotions from joy and excitement, to boredom, disappointment, sadness, fear, anxiety, and even embarrassment or shame.”


from Lifehacker https://ift.tt/3ZCxdfJ

Set Up a DIY Automatic Irrigation System in Your Garden

Keeping your garden watered might not feel like a chore at first, but dragging hoses around, getting them stuck on trellises or railings, and spending the time on each bed to keep everything well-watered can add up being a hassle. Automatic watering is a solution to the early morning and late night escapades with the hoses and will keep your garden looking great all season. While it might seem intimidating, the parts for an automatic irrigation system are inexpensive, and the system is manageable with a few tools and some good planning.

Supplies for this project include:

You will also need some tools, including a hand saw or electric saw to cut the PVC pipe, a tape measure, and a drill set.

Measure, sketch, and make a parts list

Before you buy your parts, you’ll need to plan out the configuration of your system. Start at the water source and measure to the first bed you want to irrigate. Then, measure the distance to each additional bed. If you want to branch out, using a “t” connector or an “x” connector will be necessary at each junction, with the “t” being useful for a one-way branch and the “x” being useful for a two-way branch. It might help to sketch the layout of your garden beds and water source and then label your distances and junctions as you go to keep track of the numbers.

If you’re irrigating raised beds, you will also need right-angle fittings at each bed to carry the water up to your soaker hose. Each bed should also get a valve that can be turned off in case certain areas need less water than others. Once you have a count of how many of each part you’ll need, you can make your parts list. Add up the total of all the distances between beds and between the first bed and the water source to estimate how much PVC pipe you’ll need. Remember that you’ll also need enough pipe to carry the water to the top edge of your raised beds if that’s what you’re using, so measure the height of your raised beds and multiply that height by the number of beds you have to get the total length of PVC pipe you’ll need.

Lay out your pipe and make your connections

You can choose to bury your PVC pipe about ¾” under the soil surface or to run it along the edges of your raised beds—just make sure it’s protected from getting snagged or cracked by foot or vehicle traffic. If you choose to bury your PVC, make sure to call 811 before you dig to avoid utility lines. Once you have your path laid out, use your tape measure and saw to cut the PVC to the right lengths and attach the fittings using the PVC glue and activator. Make sure to do this part in a well-ventilated area. Remember to add a valve for each bed so you can control which beds get watered.

Attach your pipes to the water source

Next, attach the timer to the water source, and attach the PVC pipe to the timer. You might need a short extension hose to make this work. You can use male or female hose connectors at the joints to connect hoses to the PVC. Once all of your pipe is connected, set the timer on your watering control to check for any leaks or problems with your pipe system. Make sure your pipes are all well-supported to avoid wear and tear over time and prevent cracking as water pressure builds inside the pipes. If you need to, you can use a block of two by four and a pipe clip to give the pipe a sturdy support. Use your drill set to screw the pipe clip into the block, capturing the pipe, and then screw the block into the side of your raised bed for support.

Bury your pipes and attach your hoses

Once your pipe has been leak-proofed and stress-tested, you can bury your pipe under ¾” of soil. Then, attach your soaker hoses to the PVC pipes using your female hose connectors. Now, all you need to do is set your valves for the correct plants to get watered and set your timer.


from Lifehacker https://ift.tt/fvgHPkc

You Can Turn Any Chili Into a Meaty Dip

It’s not weird to have leftover chili. Between the time commitment, ingredient list, and cook time, I usually make a double or triple batch and eat throughout the rest of the week. Unfortunately, every time I meal prep like this, I become tired of the repetition by midweek, which is why I often need to get creative. You can prevent your leftover chili from becoming played out by day three by turning it into a meaty dip. All you need is one extra ingredient: cream cheese.

When I think of a classic chili I think of beef, red sauce, and beans. (Disagree if you like, but I like beans in chili and so does Brian Baumgartner.) Realistically, chili comes in a variety of flavors, colors, and thicknesses, which is why cream cheese is a perfect addition. This sturdy but spreadable cheese is tangy with just a nudge of salt, but otherwise delightfully neutral. That’s why it makes such a great companion for your bagel toppings whether you choose strawberry jelly or salmon. Beef chili, chicken and white bean, verde, or vegetarian—the flavor of cream cheese is going to fit right in.

Beyond adding pleasant acidity and compatible cheesy flavors, the only thing keeping your chili from becoming a proper dip is thickness. Dip has a thicker constitution than chili. Despite how chunky it might be, the liquid will always be a bit loose and watery. Cream cheese has just the right amount of saturated fat in it to be loose and fluffy when warm, and sturdy yet pliable when cold. It thickens without being a “thickener” like cornstarch or flour. Once the cream cheese is mixed into your chili, you can enjoy a creamy consistency while it’s hot and a thicker, chunkier consistency when it’s room temperature or cold.

Turning your chili into dip is fast and simple. Put the cream cheese in a bowl and warm it up in the microwave until it’s melted, fluffy, and smooth, about 30 seconds. Add the chili and stir. If your chili is right out of the fridge, you may need to pop it back in the microwave to warm it up more. Stir until fully incorporated. Top with shredded cheese and serve with chips. Below is the recipe I used recently, but depending on the consistency of the chili you’re starting with, play around with the amount of cream cheese you add to achieve different results. A fairly loose homemade chili made with lots of tomatoes might need a full eight ounces of cream cheese, but a thicker, store-bought chilli might only need four.

Chili Dip

Ingredients:

  • 6 ounces cream cheese
  • 2 cups chili, room temperature or warm

Place the cream cheese in a bowl and soften it in the microwave for about 30-40 seconds, stirring after 20 seconds. Add the chili and stir until completely incorporated. Microwave again if needed. Serve with tortilla chips, veggies, or pita chips.


from Lifehacker https://ift.tt/W8oxeu5

The Best Ways to Combat Hard Water (and Why You Need To)

Chances are you don’t think too hard about the water in your life. It’s easy to take it for granted, and when it comes to water quality, most people will run out and get a water filter of some kind and call it a day. As a result, many people are surprised to learn that the water coming into our homes can vary significantly, especially in terms of its mineral content. Water that’s high in stuff like calcium, lime, or magnesium is called “hard water,” and there are several clues that your home has it.

If you see a chalky residue on your faucets, spots on your clean dishes, or a rust-colored build-up around plumbing, congratulations: You have hard water. While it’s perfectly safe to drink, you shouldn’t ignore hard water. Aside from those unsightly deposits (caused when water evaporates and leaves behind the minerals dissolved in it), hard water is slowly destroying your house.

What kind of damage does hard water do?

If you’re not sure whether you’re dealing with hard water, you can test for it pretty easily. You can either buy a DIY test kit, or conduct a “soap suds” test: Fill a plastic bottle about a third of the way with water, add some dish soap, and shake. If you get a lot of bubbles, your water is pretty soft. If you get very few bubbles, your water’s pretty hard. You can run a comparison with some bottled water if you’re uncertain.

If you confirm you have hard water, you’ll need to do something about it, because hard water can do a lot of damage. It takes a long time, so there’s no need to panic, but if left untreated hard water can:

  • Shorten the lifespan of water heaters, dishwashers, and boilers.
  • Permanently stain tubs, toilets, and sinks.
  • Choke your pipes with mineral deposits, reducing water pressure and eventually destroying the pipes.
  • Discolor your home’s exterior (if you have sprinklers or other water usage outside).
  • Stain tile and grout.

It can also make washing up more of a challenge because it’s harder to lather soap, and makes washing your clothes more challenging (and it is harder on your clothes, wearing them out faster).

Left untreated, hard water will wind up costing you a fair amount in avoidable repairs and appliance replacement, not to mention the aesthetic damage to the interior and exterior of the house.

How to treat hard water

The good news is that hard water is pretty easy to treat. You have a couple of options to consider, and the right one for your home will depend on how bad your hard water problem is, your budget, and environmental factors.

Cleaning. If your water is moderately hard or you’re not in a position to consider a pricey solution, you might settle for a robust cleaning regimen to remove mineral stains (white vinegar works wonders) and add a rinse aid treatment to your dishwasher. This won’t stop scaling inside your pipes or other damage, but if your hard water problem is minor, you won’t see significant problems for a long time, so dealing with the more superficial effects might be all you need to do.

Water treatments. If you have a more serious hard water problem, you might consider a whole-house water softener solution. These are systems that are installed at the point where water enters your house, removing the minerals that make your water hard. There are three options here:

  • Sodium exchange systems. These use salt to exchange the calcium and other minerals in your water with sodium. The result is softer water that will have a slight salt content, but will require that you recharge the system with salt on a periodic basis, so there’s an ongoing cost. There’s also a relatively minor but noticeable water waste in these systems, which is something to keep in mind as it will impact your water bill—and the environment. These systems can cost anywhere from $400 to $2,500, plus the cost of recharging with fresh salt.
  • Salt-free conditioners. These systems use various processes to either bind the minerals in your water into crystals that don’t stick to surfaces using a process called template-assisted crystallization (TAC) or nucleation-assisted crystallization (NAC), thus preventing them from damaging your pipes or appliances. Another option removes the minerals entirely by binding the minerals to citric acid. These systems don’t add sodium to your water or require salt recharging, although the TAC/NAC systems do leave the minerals in your water (which some people don’t mind, as it adds a flavor to the water), and the acid-based systems can be difficult to calibrate, as you need a precise level of acid to be effective without making your water, well, acidic. These can cost as much as $3,000 to install.
  • Magnet systems. Yes, magnets. These are pretty affordable systems that use magnetism to alter the structure of mineral ions so they don’t clump up and scale. Do they actually work? The science is inconclusive, actually, but you can throw one of these into your house for less than $500, so it might be worth taking a flyer on one.

Even if the stains and deposits that result from hard water don’t bother you, you need to deal with hard water because of the potential damage to your home. While water softening systems can be pricey, the money you’ll save in the long haul makes them a good—and necessary—investment.


from Lifehacker https://ift.tt/97hG8sl

All the Things In Your House You Can Just Clean Outside With a Hose

Photo: Thejackalope (Shutterstock)

If something needs to be scrubbed, then by all means, do it the thorough way. But some things are just fine being blasted with a hose, saving you time and energy. Here are some things you can simply haul outside to douse with water.

Pet containers

Cages, tanks, crates, and litter boxes all end up filthy with animal mess, and they can all withstand the blast of a hose. Just take containers outside, dump the solid mess into an outdoor trash can, and hose them down. Of course, take out any movable objects that could be harmed by the hose pressure (think hamster wheels, water bottles, and fabrics). If any part of your crate or cage is wood, be sure to let it fully dry afterwards.

Oven racks

This won’t work if your oven racks and sticky with dried gunk and need to be scrubbed. But if they’re just messy with a fresh spill or wet debris, put them on a tarp outside and spray them down. It’s fast and easy, plus you can just leave the racks outside a while to dry before bringing them in and popping them back into the oven.

Garbage cans

Turn your hose into a pressure washer, complete with soap, and spray inside your garbage cans to clean them out. Flip them upside down to get rid of the excess water and leave them out to dry.

Other items you should spray with your hose

These are some simple yet easy-to-overlook household items that deserve an outdoor bath:

  • Window screens
  • Shoe racks/boot trays
  • Laundry baskets
  • Car mats and other sturdy rugs
  • Plastic furniture (and other such things that sit in storage and collect dust)

Again, if they need to be cleaned by hand, then by all means, clean them well. But sometimes it helps to have a hose-down day and spray everything down once in a while.


from Lifehacker https://ift.tt/zNHfwWS

Sunday, May 28, 2023

CISO-approved strategies for software supply chain security

Integrating proprietary and open-source code, APIs, user interfaces, application behavior, and deployment workflows creates an intricate composition in modern applications. Any vulnerabilities within this software supply chain can jeopardize your and your customers’ safety. In this Help Net Security video, Tim Mackey, Head of Software Supply Chain Risk Strategy at Synopsys, discusses supply chain security practices and approaches.

The post CISO-approved strategies for software supply chain security appeared first on Help Net Security.


from Help Net Security https://ift.tt/7tWzbm2

Digital nomads drive changes in identity verification

Over the past year, 4 in 5 financial companies had experienced an increase in the number of verification cases involving foreign documents, according to Regula.

digital

Unfortunately, not all organizations were equipped to handle this shift, which could be attributed to the significant growth of the digital nomad movement in recent years.

The new era of work

The global COVID-19 pandemic has accelerated the trend of working remotely, which also inspired people worldwide to search for new destinations to work and travel. Being citizens of a wide range of countries, worker travelers become customers of financial institutions at their current locations.

This means banks, FinTech businesses, crypto brokers, and insurance companies have to be able to meet the needs of the booming digital nomad community while also maintaining robust fraud prevention measures.

The survey conducted by Regula shed light on the readiness of Banking and FinTech businesses to address new challenges. It appears that Financial Services companies are grappling with a surge in foreign document verification cases, with 80% of them reporting an increase, particularly in countries like France (86%), Turkey (86%), and the USA (85%)—the country most visited by digital nomads as of March 2023.

Alarmingly, 44% of these organizations are facing a staggering 25% rise in volume over the last year. Furthermore, 62% of these businesses have been forced to verify foreign documents manually, which is a time-consuming process.

Overcoming document template challenges

With 38% and 31% of respondents from FinTech and Banking, respectively, citing accuracy as the most important consideration in choosing identity verification solutions, the increased number of manual checks should be a red flag for the industry.

Business representatives also note the problem of incomplete databases of document templates. As a reference, 48% of companies say they face challenges during the customer onboarding process because they don’t have all the needed document templates at hand.

“The expansion of the global migration and digital nomad community in particular has highlighted the need for businesses to work with extended databases with a wide range of document templates, including rare specimens. Failure to do so may increase the risk of fraud since the lack of templates may lead to less accurate and thorough document verification checks, says Henry Patishman, EVP of Identity Verification Solutions at Regula.

“That is why we consistently update our database, which has now reached over 12,000 document templates from 247 countries and territories, to boost the capabilities of Regula Document Reader SDK. Since Regula experts have extensive knowledge of what security elements should look like, based on present documents, all possible IDs can be easily verified, and even the most sophisticated fraud can be promptly detected with our products,” concluded Patishman.

Driving efficiency in the digital nomad era

With the current growth of digital nomads, implementing the right identity verification solution can have a significant impact on productivity and efficiency. To respond to new challenges, financial institutions should take into account the following criteria while choosing the most suitable tool(s):

The size and diversity of the document template database provided by the solution: A tool which features a database with detailed information on all present documents issued in different countries, their security parameters, and verification methods, can perform fast and comprehensive ID checks.

The availability of liveness checks in the document verification flow: The solution must encompass both document verification and biometric verification to provide strong protection against fraud, verifying both the document and the liveness of the individual. While document liveness confirms the presence of dynamic security elements (such as holograms) in the submitted document, and ensures that the passport or ID presented remotely is real, biometric liveness detects if a live person is applying, not a spoof or a fake.

Face comparison and matching of a selfie to the photo in an ID document: To mitigate identity fraud online, the solution should compare an image of the user’s identity document and the portrait from the identity document, e.g., from the chip or MRZ.


from Help Net Security https://ift.tt/8Df7FUz

Use This USPS Online Tool to Find Out If Mail Really Is Slower in Your Area

Photo: Jonathan Weiss (Shutterstock)

Along with the weather, commenting on how it seems like it’s taking longer for a piece of mail to arrive at its destination is another small talk standby. And while there’s not much you can do about these delays, you can now find out if delivery in your area is really is as slow as it seems.

This is because the United States Postal Service (USPS) recently rolled out a new online dashboard which allows users to look up the speed and reliability of mail service in their ZIP code. Here’s what to know.

How to use the new USPS online dashboard

According to a May 12 press release from the USPS, 98% of the country’s residents currently receive their mail and packages in fewer than three days. A week later, the Postal Service unveiled a new online dashboard on their website, where people can learn more about the delivery performance in their (or any) area.

Using the dashboard is pretty straightforward: Simply enter a ZIP code, then select a type of mail from the following options:

  • First-class mail: Letters, cards, bills, etc.
  • USPS marketing mail: Advertisements, flyers, catalogs, merchandise
  • Periodicals: Newspapers, magazines, other published material
  • Bound printed matter, media, and library mail: Books, sheet music, printed educational materials, etc.

From there, you can select a specific mail product (though it’s not necessary), then click “search.”

The resulting page will present a variety of data, including the percentage of on-time delivery in your area and how it compares to the previous year, as well as average number of days between when a piece of mail is collected and when it’s delivered in that area. According to the USPS, these data are updated weekly.

For more information and further instructions, click on the red paper icon at the bottom of the page labeled “Documentation.”


from Lifehacker https://ift.tt/wnZ17sy

Where to Find Extra Storage Space in Your Kitchen

Photo: brizmaker (Shutterstock)

While spacious kitchens have become a status symbol of sorts, that hasn’t always been the case. So if you live in an older home that hasn’t been updated, your kitchen may be smaller than you’d like, and lack the storage space you need. Or does it?

Your kitchen may not have a pantry, or walls lined with cupboards, but chances are, there are some storage spots that you’re overlooking. Here’s what to know.

Where to find extra storage in your kitchen

Whether you need to stash pots and pans, or store small appliances, here are a few spaces in your kitchen that you may not be fully utilizing:

Walls

When it comes to your kitchen, wall space is storage space. The easiest way to make use of even small sections of a wall is to install hooks of some variety. In addition to individual hooks, you can install a curtain rod, tension rod, or towel bar on the wall between your cabinets and counter, and hang cooking utensils, mugs, or small kitchen gadgets from S-hooks.

On top of cabinets or tall furniture

If your kitchen is short on storage, and there’s a gap between the top of your cabinets and the ceiling, you should be taking advantage of that space. Unless you’re really tall, it’s not somewhere you’re going to want to put items you use every day, but it’s perfect for small appliances like slow cookers, or a giant pot you only need a few times a year.

Inside cabinets

You probably have at least a few underutilized shelves in your cabinets. Let’s say you have a single layer of roughly 5-inch-tall mugs on a shelf that’s 12-inches-tall. Instead of wasting that vertical space, make or buy stacking shelves to add another level of storage.


from Lifehacker https://ift.tt/Js59Syg