Saturday, July 1, 2017

Youtube daily report w Jul 1 2017

- What's up Gustavão? - You weren't supposed ot be here!

Yeah, you're right!

I busted! I almost got there, dude!

- You busted? - Yeah, Garridão!

- Damn! - The bracelet on my wrist hasn't happened this time!

But it's coming! It's a matter of time!

I couldn't do anything, dude

The table was 7-handed

Hyper, mega, blaster turbo

My move didn't work

I play A4 suited, then he shoved and I had to fold

Then my chips diminished to 150,000

Blind raised to 5-10

It had passed by me twice I had 150,000 in the button

I had 142,000 in the button

My big blind was the chip leader

A good one, a good reg.

Then I got to the button in gap

I looked my KQ, then I thought: - 14 blinds...

I threw it, calmly

Small fold, then he snap called

When he did that, I asked him: "- Queens?" and he showed a pair of Ks, dude!

Busting me, dude!

If they were QQ...

I asked about Queens, because of course QQ would have busted me anyway,

But that's because of his snap call, dude...

It was AK, AA, QQ! That was it... it was a mess!

The flop was AAK

I was expecting an A, calling it like: - A, A, A...

Turn river, a piece of cake, right?

with bunch of As in the deck

If it were QQ I had them

and he had tributed JJ, TT at the same way

Well, it's part of the game!

Well, I almost got there again!

I busted in the 51st place, out of 2,000 people

I'm really way ahead in this journey,

but I'm not looking for the "almost" I want my bracelet!

Let's keep the chin up!

I'm going to sleep, refresh my brain, finish my Popsicle today

And I'll be there tomorrow again!

More 10-hour game!

- Get your head together, dude! - Don't worry, I'm calm!

- I did what I had to do! - That's right!

It's part of the game!

But my moment has to come! It has to come, you know?

Three homestretches

5 ITMs

Damn! You're kidding me!

It's coming! Let's be patient!

Let's keep focus and patient! It's coming!

I'm arriving DAY 2 at Planet Hollywood with $500k guaranteed

I passed!

There were 4 DAYs 1

I played DAY 1 C and I passed in this first attempt

Let's go!

They might be paying around $130k-140k for its champion

There's no bracelet in this tournament

But they are important to fill our days off

Let's go!

It's a Turbo game and there are around 100 people left

I want to know now, I'm curious to know how many people left to ITM because it's really close!

There must have been 5 people left, if that!

Let's go!

Well guys, one ITM more!

I'm really glad about it, well done!

Planet Hollywood 500k is paying $142k for its champion

It's a good prize

It's not WSOP, there's no bracelet, but a tournament with an important prize really attracts me

Now 120 players left

I have 10 blinds

You know?

But everybody on the table is short, so I have an ordinary strategy as if it were any Turbo tournaments

Let's go! I can make it! I still believe!

One step more, many people start to bust now

And I'm gonna make it! Here we go! 50 left!

I just busted Planet Hollywood 500k

There were less than 100 players yet

It was a good tournament with a good structure, but I was short

After the bubble burst I had 10 blinds, I ended up bursting A9 suited

I found a small with a pair of T

He paid, of course! Unfortunately it didn't beat mine

Let's keep holding on!

We're already in the car headed to WSOP to play an Omaha today

It started a little bit earlier today and I'm late

Omaha is one of the fewer tournaments I don't care of starting it late

As it doesn't have ante and it's not my main game

which is Texas Hold'em, right?

So, there's no problem of starting it a little bit late

They must be playing 100-200, so I probably lost the first two initial blinds

There's no problem! It's okay! Here I go!

Omaha is gonna be mine this time!

Let's speak with Garridão before his game starts

Because it seems that I earned $25

Let's go!

Look his little face, look!

Hey Garridão!

The clock hasn't started yet!

Look at this!

It's 11:03, look!

Show it! 11:03! What's up Garridão?

- I don't want to talk! - Why don't you want to talk?

Take a look at Garridão! He said it'd start at 11 o'clock sharp!

It hasn't started yet folks, you see?

GL Garridão!

I wanted a more expensive bet, but he didn't...

Damn.

What's up, guys?

I'm here at WSOP room, right next to my table

The event is starting now!

And it's different, it's $1,500 Shootout

For you guys who aren't familiar to it, it consists of unique table scheme, like Sit & Go

So you play against 9 players and if you win, you pass to DAY 2, already ITM

In DAY 2 you play a new table with 9 players

You can't leave the table, you must eliminate all of the competitors

And then if you eliminate them all, you pass to FT

Which is the sum of everyone who has won on the tables

It's a WSOP FT, it means that if you win 3 tables in a row

You acquire the much-dreamed-of bracelet

Hey guys, a tournament that I really appreciate to play is happening today

Shootout

It seems to be easy, but it isn't!

It's the same level of difficulty, you leave the same amount of players behind

But if you look the opponents, the victory seems to be easy!

Take a look at them!

But if I beat them and gather chips then I'd have an ITM

It seems to be easy, but it isn't!

It's not that simple! But, here we go!

Let's chase it!

The feeling of knowing who you're about to beat is awesome!

Where you must gather chips! Let's go!

Here our $1,500 Shootout journey starts!

The shortest way to get to a bracelet

It's not the easiest, but it's the shortest

Let's go guys! Here we go!

Here is Fostera de la Herrera, my friends.

*****

Yes.

Is it the same?

Well, I think it should be shorter, right?

I think shorter is better

- *** - Shorter...

- Shorter? - Yeah!

- Number 4? - 4!

Now it's cutting something.

It's cutting now?

Now you're losing hair

Am I?

My hair was looking like a lion's mane, dude!

It was huge!

Huge? Look mine, then!

Yours is kinda complicated as well

We're at a real barber shop, look!

Look this amount of people!

- Let's go, guys! - The funny thing is...

...everybody is facing the streets, in Brazil we stay facing the mirror

Never had seen it before, without seeing what's happening

That's strange!

Take a look, everyone is facing the streets

Nobody is facing the mirror

It's different, right?

What's the name of this place?

What's the name?

This guy didn't understand the haircut I asked for,

I hope he does it right

I'm afraid he may be shaving my head

I wish I were fluent now, I wouldn't be shitting myself

Garridão is afraid because that guy is shaving his head without allowing him to face the mirror

It's all hair Garridão! If something goes wrong, it grows again, dude!

Yeah! It's a mega production!

That's it, buddy!

Damn, that was a fair haircut!

$15

A pretty fair price!

And they served us pretty well, they are 10 out of 10!

- Like that! - They were fast!

They were fast!

I appreciated that! The place is really cool!

- Thank you! - Thank you, buddy!

- Thank you very much! - Thank you!

Welcome! Welcome to America!

Thank you!

Hey guys!

One more ITM to count! One more bubble!

If everything works well, one DAY 2 more!

It's an awesome tournament

If I win today I'll play only on July, 8th

There'll be 4 Fridays where all players play

On Friday I can classify for playing in day 8

Then, I'll play DAY 2

DAY 2 will be... It'll be within 15 days

From 1,606 people that have joined the game, now there are 243 left

So I need to beat 242

One more ITM to count! It's always interesting!

DAY 2 then?

Where's the big corn cob?

- Patrick! - Patrick!

- The small corn cob is here today! - Where's the small corn cob?

Look! The small corn cob! I havn't seen him!

I'm sure he's Big Corn Cob's brother! For sure!

I'm in the bubble!

There are 2 left to get the money!

Dealer is standing, checking things... People are rushing

Maybe it has already burst and they don't know

They'll find out now

Many people... Turbo tournament, they bust very quick

These people aren't sure of what's going on

And I'm here...

12 blinds, maybe 13

Only waiting for it to burst

Then I'll play two levels more

And to finish the day, I'll pass to DAY 2

I guess it has burst!

I guess this confusion and this delay are happening because it has burst

It has burst! It's burst! It's burst!

Parabéns jogadores!

Vocês estão todos no dinheiro!

Gimme the money, guys!

Parabéns, jogadores!

Gimme the money, dude!

One more ITM to count!

Now, two levels with 20 minutes each

- 40 minutes to win this time! - What is it? The fourth?

Is it the fourth ITM?

The fourth one from WSOP and one more from Planet Hollywood

- So, it's the fifth in total - Good.

What's up ,guys?

We both have just busted Giant

A good and cheap tournament

Flight C

Last blind level

We both were ITM, but we didn't pass to DAY 2

- Tell us what happened, Foster - Only sad stories, guys!

Only sad stories!

AK, I found AA

Garridão JJ found AQ and they hit us

But it's okay, guys!

We got an ITM more, one more ITM we got!

We could've passed to DAY 2, but we both busted in the last blind level

There were 18 levels today

- Too many - Busting in the last one, I mean...

We almost got there... July, 8th that would be our DAY 2

But it's okay! ITM is always good, right?

Right!

And there is a tiny little part on it!

It was Flight C and there are Flight D and E yet!

As this is a cheap tournament, the level is really weak

What's the advantage now?

- We can... even we stayed ITM... - It's a lie!

...as we didn't pass to DAY 2

It's the system they arrange for this kind of tournament

- We can still play this two next Flights - Again!

- So, we'll be there for sure! - Will we be there next Friday?

Next Friday and also the following one

Why not? Of course!

Let's go!

For more infomation >> Vegas Time Ep.7 - Passando a Maquina - Garrido e Foster - Duration: 12:54.

-------------------------------------------

Peugeot 108 1.0 e-VTi 5-DRS Blue Lease (AC/BlueTooth) - Duration: 0:54.

For more infomation >> Peugeot 108 1.0 e-VTi 5-DRS Blue Lease (AC/BlueTooth) - Duration: 0:54.

-------------------------------------------

Mercedes-Benz E-Klasse Youngtimer 200 Automaat Classic 56451 km! NAP - Duration: 0:59.

For more infomation >> Mercedes-Benz E-Klasse Youngtimer 200 Automaat Classic 56451 km! NAP - Duration: 0:59.

-------------------------------------------

Terra Viva #1 - Duration: 28:37.

For more infomation >> Terra Viva #1 - Duration: 28:37.

-------------------------------------------

PREGAÇÃO SOBRE O APÓSTOLO PAULO - Palavra de Deus (Nivaldo Nassiff) - Duration: 13:49.

For more infomation >> PREGAÇÃO SOBRE O APÓSTOLO PAULO - Palavra de Deus (Nivaldo Nassiff) - Duration: 13:49.

-------------------------------------------

Eckhart Tolle - Pare de reclamar - Duration: 13:50.

For more infomation >> Eckhart Tolle - Pare de reclamar - Duration: 13:50.

-------------------------------------------

Tatuagem Warcraft Danny Tattoo - Duration: 4:28.

This work I did at the end of last year. But the images of the end of this healed tattoo video were made in April of that year of 2017

Certainly one of the tattoos that I liked to do, not only for the theme, but also for the style: realism

Many details, lots of texture, at last lots of fun

If you are a tattoo artist, remember that it is important for you to feel happy doing a job. Take it easy, take the time you need.

This work was done in 3 sessions.

End of first session.

In this second session I did again the extencil

I've been asked several times how to do the bristle texture. The answer is:

Liner needle

Bristle by bristle. Can be done before or after general shading with the magnum.

In this second session the focus was the snout and the eye of the wolf. The rest was marked only. Oh, and this is ...

The tattoo has no contour at all. A classic realism.

In the third and last session I finished the texture and the ears.

And of course, I made a shade outside to give a frame to the drawing.

End of the third session

After 4 months of healing.

For more infomation >> Tatuagem Warcraft Danny Tattoo - Duration: 4:28.

-------------------------------------------

ANÁLISE MIUI8 EUROPÉIA V8.5.2.0 - XIAOMI REDMI NOTE 4 MTK - Duration: 7:31.

For more infomation >> ANÁLISE MIUI8 EUROPÉIA V8.5.2.0 - XIAOMI REDMI NOTE 4 MTK - Duration: 7:31.

-------------------------------------------

Outdoor Terraces Ideas. Creative Verandas and Screened Porches Design - Duration: 5:30.

Outdoor Terraces Ideas. Creative Verandas and Screened Porches Design

Watch more videos! Subscribe to the channel!

For more infomation >> Outdoor Terraces Ideas. Creative Verandas and Screened Porches Design - Duration: 5:30.

-------------------------------------------

CATCHING LAPRAS!! | Roblox Pokemon Brick Bronze | Turn ON CC!! - Duration: 1:52.

You will need a Pokemon that can use fly

Then Fly to Cragonos Cliffs

Go into the far end of the cave

Use Rock Climb

WOW!

Then use Surf

Then use Surf again

It should be here but it Doesn't show it for me because i already caught Lapras

BYE!! THX FOR WATCHING

For more infomation >> CATCHING LAPRAS!! | Roblox Pokemon Brick Bronze | Turn ON CC!! - Duration: 1:52.

-------------------------------------------

Du kannst heute noch frei sein (You can be free today) - Duration: 7:30.

For more infomation >> Du kannst heute noch frei sein (You can be free today) - Duration: 7:30.

-------------------------------------------

Naike Rivelli fa impazzire il web con una foto maliziosa| K.N.B.T - Duration: 2:17.

For more infomation >> Naike Rivelli fa impazzire il web con una foto maliziosa| K.N.B.T - Duration: 2:17.

-------------------------------------------

Apresentação&Covite - Duration: 2:13.

For more infomation >> Apresentação&Covite - Duration: 2:13.

-------------------------------------------

Paolo Bonolis figli: la famiglia allargata del conduttore - Duration: 2:58.

For more infomation >> Paolo Bonolis figli: la famiglia allargata del conduttore - Duration: 2:58.

-------------------------------------------

Trono Over, Gemma Galgani ha il respiro pesante: Giorgio Manetti svela due grossi segreti - Duration: 3:40.

For more infomation >> Trono Over, Gemma Galgani ha il respiro pesante: Giorgio Manetti svela due grossi segreti - Duration: 3:40.

-------------------------------------------

Free will or Free won't?? Do we really have Freewill or is it an illusion? - Duration: 4:51.

Imagine you are at you friend's place, helping him out in a project.

when you both take a break, he asks you, whether you would like tea or coffee.

and lets say you like both, but chose coffee instead.

Choosing coffee, was no doubtedly your free-will.

or, is it.

Well, what Is freewill?

free-will is the ability to act and make decisions, without any external constraints or inflence.

your choice of coffee might seem your free-will at first, but its not.

Our brain is made-up of approximately 100 billion neurons that are involved in the decision

making process.

we live in a world of cause and effect.

and there are alot of causes that have an effect on every decision that we make.

in-fact, these decisions can be a group of subconscious thoughts just popping-up in our

brain.

like, i like the consistancy of coffee more than tea.

their coffee tastes really good! drinking coffee makes me more active! all these subconscious

thoughts become tiny-subconscious decisions which either increase the probability of one

option, or decrease it.

all working together, resulting in the action that we call, a conscious decision.

even if you would have to choose letter A, B, or C.

your brain would take action based on your previous history, information, beliefs and

pattern related to the letters.

In 1983, benjamin libet performed an experiment involving a volunteer.

the volunteer had to randomly make conscious decision, like flicking their wrist, all according

to their free-will.

while all of this was going on, the activity of their motor cortex was being recorded by

an EEG machine.

motor cortex is that part of our brain, that is involved in control and execution of voluntary

actions.

no-one was expecting what happened next.

to everyone's surprise, the motor cortex became active, hundreds of miliseconds before the

conscious decision was made.

as if, the conscious decision was destined to happen.

hence, questioning the existence of free-will.. ok, but what if you flip a coin to decide

the cup of tea or coffee.

now what?

totally random, right? think it again.

coin-flips appear random only due to our lack of knowledge and data.

if we could know every elementary information, data, conditions and their exact values , forces

and properties for a particular coin flip, we could predict the result, even before the

outcome is revealed! infact, this is not so far fetched idea.

there already are coin-flipping robots that can flip coins and predict the outcomes that

are 100 percent accurate every time.

all of these facts & also the laws of physics say, the universe is deterministic.

but then there is the world of quantum mechanics, where you could never know where an electron

in a probability wave is.

or predict when a radioactive decay will take place.

the outcomes of this world can never be determined beforehand.

the only thing that can be determined, is their probability of being one outcome or

the other.

so, if everything is deterministic, and free-will is an illusion, then is punishing the criminals

really a valid act? because it would mean, they're punished for their crimes, even though

the action they did was destined to happen.

well.

all the crimes done by every criminal is completely deterministic, if given all the necessary

factors influencing the same.

but in-fact, punishing the guilty is necessary because if not done, it would influence others

to do more crimes.

hence increasing the criminal activity.

but, if free-will really exists, it leaves us with many unanswered questions.

like, is commiting suicide, a person's free-will? or : was creating our universe, god's free-will?

furthermore, you might also have some questions.

let's discuss them in the comments below.

And guys don't forget to subscribe, as there are more interesting episodes coming soon.

thanks for watching.

we'll see you in our next episode! till then, stay curious and have a nice time!

hey! here are few other videos you can watch.

and if you want to suggest any topic for an episode, let us know in the comments below.

For more infomation >> Free will or Free won't?? Do we really have Freewill or is it an illusion? - Duration: 4:51.

-------------------------------------------

Opel Astra Sports Tourer 1.4T Innovation - Navi - Clima - Parkeersensoren - Duration: 0:57.

For more infomation >> Opel Astra Sports Tourer 1.4T Innovation - Navi - Clima - Parkeersensoren - Duration: 0:57.

-------------------------------------------

Believe in YOURSELF (Motivation Video) - Duration: 1:51.

Just wanted to make this short little video here for y'all

Right now I'm currently at the Grand Canyon, yes THE GRAND CANYON

Just wanted to say that I believe in y'all.

If you ever have had a dream, or have a dream,

A lot of people don't have faith in themselves, they don't have the belief that they're

able to unlock their TRUE potential. I just want to say

that I believe in you. I don't want you to

just rely on my belief, I want you to start coming up with your own

belief in yourself

because self-motivation is so powerful now adays, it'll take you to

far distances in the world, i want you to have belief in yourself

in yourself that you're able to go out there

and achieve big things guys

there may be times that you don't have belief in yourself when something bad happened

and it kinda just set you back and out you down

right, but everybody has those types of moments, but it's

up to you to get back on your feet, gather yourself up

and know that those things happen all the time,

and know that that's just part of the journey

For more infomation >> Believe in YOURSELF (Motivation Video) - Duration: 1:51.

-------------------------------------------

Jumanji: Welcome To The Jungle Trailer (HD) (English & French Subtitles) - Duration: 2:34.

For more infomation >> Jumanji: Welcome To The Jungle Trailer (HD) (English & French Subtitles) - Duration: 2:34.

-------------------------------------------

HOW I LEARN ENGLISH BY WATCHING TV SHOWS - vocabulary, hacks, topics - Duration: 13:15.

Hello guys and welcome to my channel in this video I'm going to talk about TV

shows that helped me learn new English vocabulary there are loads of words that

I still do not know, that are from particular topics of our lives and I

don't feel this urge to actually sit down and learn them. But there are

certain things that I can do every day to improve my English and you can

totally do them! And this thing is super easy - it's just watching a TV show in

English! so I'm going to talk about my most favorite TV shows that hook me up,

that make me watch them every day, and because I'm watching them every day in

English, I'm learning new words every time. If you're interested, please

continue watching this video.

The first show I'm going to talk about is the Silicon Valley, because I live in

San Francisco and Silicon Valley is really close (some people consider

San Francisco to be a part of the Silicon Valley). There are loads of offices here and also

run one startup and the Silicon Valley show is a highlight of my weekend

because every Sunday I wait for the new show to come out and they always talk

about a lot of things that are connected with startup live like fundraising and

legal stuff and actually Silicon Valley life and there are so many particular

things that you can learn from the show what if I told you there's an app on the

market I'm not aware oh you wait - you're inside okay you haven't even

gotten the bottle of water yet Hedden I'll meet you in there I just need to

finish this call sure cool with a k' okay for example pitching your company

you will hear a lot of pitches during the show and you will learn how to make

the elevator pitch you will see bad examples of pitching your company just

like this one and you would be able if you're running your company you would be

able to imagine yourself in the same situation jinyang what are you doing

this is Palo Alto people are lunatics about smoking here we don't enjoy all

the freedoms that you have in China also Silicon Valley show talks a lot about

Silicon Valley culture like drinking kombucha I actually have ha an MC bottle

just here with me and about quitting smoking because nobody smokes here

everyone is about healthy lifestyle and houses that they show are really typical

for the Silicon Valley they talk about pricing they talk about you know they

actually use the actual meeting spots for example the Four Seasons Hotel in

Palo Alto it wasn't some series of the show so it really gives you this inside

in the Silicon Valley lifestyle well done so what kind of terms she do you

think she's gonna wanna leave a lot of work to do but you certainly knew how to

play to your audience so I'd say it looks good oh and as I said Silicon

Valley show has a lot of vocabulary that is connected to fundraising like term

sheet which is an offer from you to investor with your with your company's

valuation with how much money they going to invest so guys if you're dreaming up

running your company in the Silicon Valley or if you're interested about IT

stuff Silicon Valley is a must see show I love it it's my number one right now

the second show that I really like and where I take all of my legal vocabulary

from is the suits I have started watching them back and I think 2013 and

if you're interested in becoming a lawyer in the States I think this is the

first thing you should start with like watch the suits you will get acquainted

with a legal culture with the East Coast culture it's completely different from

the Silicon Valley everybody wears suits this is and everybody's like those

lawyers they drive cool cars they go to parties and this will give you an

impression of how the best law firms function in the United States he wants a

trial I'll give him a goddamn trial Your Honor

the example of words that you can learn from this movie is a very mental trial

which is when you're going to trial actually go to go to the courtroom and

negotiate with a judge and present yourself and yeah you know what I'm

talking about right and how they talk to charge they call the judge your honor so

all of those legal things illegal lifestyle I would say this like Silicon

Valley is for intermediate / upper intermediate this I would say upper

intermediate level of English because there are lots of specific words that

you would not know and sometimes they would prevent you from understanding the

plot so if you are intermediate and you want to watch the suit I would recommend

switching on English subtitles Your Honor this is the fraudulent attorney I

spoke with you about before trial we asked that he either refrain from

speaking or be removed from the court with an immediate ruling with the

dismissal is with Bridget other words that have learned from this

show are fraudulent attorney which is like spake attorney and dismiss the case

stop the case like all of those Lexus and talk with prejudice which means that

you have some particular attitude to the case before you actually start the case

so you have some some of your own interests and this is by the way how I

advise you guys to translate the words do not translate them into your own

language we try to guess their meaning from the contest contest and context and

maybe use English the English vocabulary so you would be able to learn the word

with its meaning and not with its translation into your own language make

sure what's going on I'm not getting into the bar probably real problem might

I have a way to get you into the bar and what's the catch

we know what's wrong with you is wrong with me is I don't feel like going back

to prison and another very important topic in this show is taking L SAT the

exam that you need to get into masters in legal education in the states and

also taking the bar exam the the exam that you need to take to

become a lawyer in the state and actually shot a real bar exam so they

show how the experience look like and they showed Rachel with the main

character they're preparing for the L SAT and I know many people are for

watching this vlog we'll be taking some of those exams so I think it's really

useful and even if you don't have anything to do with a legal sphere like

me for example it was still really a good time for me watching this is the

next show is actually this first show I started watching in English and this is

the first show that I seen from the very beginning up to the very end so I

started with house m.d. and then I went on to the Sex in the City and whatever

but house m.d. was really helpful in terms of medical English and in terms of

in terms of understanding how American medical system works because when you

watch house m.d. you get an idea how doctors cabinet looks like how doctor

talks to you using her inhaler all the time go through one a week

you sure you're using it right do I look like an idiot

no would you show me how your inhaler works just and there are loads of worse

that you can learn from house m.d. for example the easiest one is inhalers the

thing they used to fight your asthma or if they're as other like names of

diseases and I feel this is really helpful and it also helped me when I

came here I knew how medical system in America works because I was like I don't

six seasons of house m.d. and you're learning new new medical stuff you're

learning how you describe different diseases so definitely watch house m.d.

they also talk about medical exam so if you're looking to become a doctor in the

state this is the number one thing that you should do as long as your daughter

had trouble breathing about a week now the best dads wait two or more no it's

not like it's serious I checked online and I have more something or something

it's the number one killer teens no medical and needless to say his humor is

amazing you're going to laugh I know hundreds of times during just one

episode you're going to love it so house m.d. please watch if you're

interested in medical English the fourth show is thousands of cards house of

cards is the show where you get acquainted with an American political

system you see a guy who wants to become a president and how he actually becomes

president through sabotage gossip um bribes whatever so all of the tedious

political schemes there they are shown in this show and there are lots of

things that you can learn from it as well

my personal favorite is how on the main actor says yes this is the East Coast

accent I guess an upper-class accent so he's so like you have to listen to it

okay with solemnly swear I Francis J

Underwood do solemnly swear that I will faithfully execute that I will

faithfully execute the office of President of the United States the

office of print yes here we go again Secretary of State that's what I wanted

that's all I wanted that's what I was promised and now here I am president of

these United States as you know guys I come from Russia and they say our

President Vladimir Putin has actually watched this show so yeah I guess if

you're a politician or you want to become politician interest in politics

house of cards must see the only thing that you should know is that English

there's really complicated so Fair times when I do not get what they mean and I

guess your level should be advanced to watch it without vocabulary or you

should wash it with subtitles maybe sometimes even in your own language

because there are so many things that you're not if you're know coded politics

aren't just sending them in a foreign language like English would make it even

more difficult but please feel free to try and let me know if you've already

seen house of cards let me know if you're getting the idea of what they try

to say and the last but not the least is the madman the madman is the show about

marketing and advertising in the United States in the 60s everything takes place

in New York and New York and success is amazing like the fashion that they have

there and the music is adorable but the most important thing there is they teach

you how to tell a story and storytelling is a really important skill for any

entrepreneur because you need to tell a story to your customers you need to tell

a story to investors you need to tell story to your partners and in the madman

you see the main character Don Draper presenting every day he's presenting to

to these companies an advertising company in he's presenting advertising

ideas to their clients it's clean simple and it's tantalizingly and complete

what's missing one thing

pastor Hines you mean the Heinz ketchup it's Himes it only means one thing it

feels like half an ad the greatest thing you have working for you is not the

photo you take or the picture you paint it's the imagination of the consumer

they have no budget they have no time limit and if you can get into that space

your ad can run all day and you know what highest actually bought that ad

from the movie creators and they paid them a lot of money and actually placed

it on air settings the great job was done behind the toe so if you're

interested in marketing if you are interested in how people create ads and

how creative marketing works the madman is definitely something you need so

these are my top five favorite shows to learn English and I've given you some

examples how to learn English through watching TV shows let me know which TV

shows you're watching or if you have with any of those that I've mentioned I

hope you guys enjoyed watching this video please don't forget to like it and

don't forget to subscribe to my channel and if you want to learn English every

day please consider visiting linguae trip call for language courses all over

the world and cap tuition let me know what you think and I'll see you in the

next video bye

you

For more infomation >> HOW I LEARN ENGLISH BY WATCHING TV SHOWS - vocabulary, hacks, topics - Duration: 13:15.

-------------------------------------------

【Meron】 It's Okay to Cry (🅥🅞🅘🅒🅔 🅐🅒🅣🅘🅝🅖) - Duration: 0:44.

It's okay to cry.

Once you start to cry,

You can't hold it back anymore.

It's okay to cry because nothing can stop you.

If you

cried a lot,

Surely,

Your heart will feel relieved.

And then . . .

All the days you spent crying

will

surely

be replaced with happy moments.

So,

don't worry about it

Right now,

You can cry as much as you want.

For more infomation >> 【Meron】 It's Okay to Cry (🅥🅞🅘🅒🅔 🅐🅒🅣🅘🅝🅖) - Duration: 0:44.

-------------------------------------------

DIY Lip Balm! How To Make 5 Miniature Candy, Oreo & Bubblegum Lip Gloss DIYs! {Easy} Makeup Projects - Duration: 13:32.

hey guys welcome back to my channel today Im going to show you 5 DIY Lip Balm

ideas you have never seen before

if you enjoy this video click that like button and comment down below with any future video

suggestions you might have if you are not already subscribed and would

like to see more fun DIY videos please click that subscribe button.

the first idea will be DIY miniature Oreo cookie lip balm

so I'm going to start by modeling these miniature oreos after this oreo go pack that looks like

this the first thing I'm going to do I'm going

to take some of the oreo cookies from the go pack and I'm going to split those apart

and put the cream filling in one bowl and some oreos in another bowl.

crush the oreo cookies until they are really fine

here are mine after they were crushed in a microwave safe bowl and the cream from

the Oreo and also some vaseline melt that in the microwave on 10 second increments

until it is fully melted once its melted add some of the Oreo cookies

to the lip balm mixture i will be using one of these mini cups with

a lid i will leave a link down below to where i found these and just pour the lip balm mixture

into the cup and set that in the freezer for about 10 minutes.

here is mine once it was out of the freezer to finish this off head to the link down below

to print out this printable and then cut it out

wrap the label around the cup and secure with tape and or glue

and there is the DIY miniature Oreo cookie lip balm

the 2nd DIY lip balm with be hubba bubba bubblegum lip gloss

for this one you will need one of these hubba bubba containers

cut the container on the seam so you are left with 2 halves

I'm going to use a wand i got from one of these packs online i will leave a link down

below for these if you don't have one of these you can also use a wand from an old lip gloss

or you can make your own by watching this video right here and the link will be down

below if the wand is to big for the container cut

it down to size hot glue the wand to the inside of the container

to make the lip gloss you can either use vaseline or un petroleum jelly

place enough vaseline in a cup to fill the bubblegum container

to tint this one pink I'm going to use some pink eye shadow if you don't want to use eye

shadow you can also use Kool aid or Jello to give this a bubblegum scent I'm going to

use this bubblegum flavoring add the lip gloss mixture to the bottom bubblegum

container and wipe off an excess and thats all there is to this easy hubba

bubba bubblegum lip gloss the third idea will be a DIY miniature taffy

taffy candy lip balm start by carefully removing the wrapper from

a miniature taffy taffy

once you have the candy wrapper removed just clean off candy from the back side

to make the mold for my lip balm I'm going to use this box right here and I'm just to

cut down the middle of it so i have 2 halves you can choose any type of box this is just

the one i had since the end of my box is open I'm just going

to hot glue that together here is what i have at this point

now I'm going to take a piece of parchment paper and line the box

to make the lip balm in a microwave safe container Im going to add 2 tablespoons of beeswax along

with 2 tablespoons of coconut oil and melt that in the microwave on 15 second increments

until it is fully melted once its melted to give this one some tint

to look like a taffy taffy I'm going to use a piece of pink lipstick

once the lipstick was melted into the mixture then what i did was i grabbed an ice pack

and set my box on top of that a pour my lip balm mixture in there and then set in the

freezer for about 20 minutes here is mine after i took it out of the freezer

just lift the parchment paper away from the box

cut the lip balm mixture into little piece that look like taffy taffy

next I'm going to glue the side and the bottom of my candy wrapper together leaving the top

open

place the lip balm piece into the taffy taffy wrapper and thats how you make these DIY miniature

taffy taffy candy lip balms the next idea will be a bottle pop lip gloss

for this one you will need one of these bottle pop candies

I'm going to use an x acto knife to go around the label to cut it into 3 sections to keep

it in tact as much as possible once you are done cutting the label you should

have 3 different pieces save the candy thats in the bottom part and the wash out the pieces

this next step is optional but what i did was i cut the top part of this tab right here

choose whatever wand you would like measure in the bottle and cut off an excess

hot glue the wand into the bottle cap to start making the lip gloss you can use

vaseline or un petroleum jelly place enough vaseline in a cup to the fill

the candy container then start slowly adding in the candy to the

vaseline and stirring it together this next step is also optional but mine had

more of a green tint and i wanted to match the bottle pop so i added one drop of blue

food coloring and mixed it in to make the top of the bottle I'm going to

use a piece of blue polymer clay and I'm going to form into the shape of bottle top

once you have the shape you like then place it on the top of the bottle so it gets the

hole in the bottom of it then remove it and bake it according to the package instructions

once its baked and cooled down glue it to the bottle top

add the lip gloss mixture to the bottom and now you can put the piece back together

and the top my label was moving around so i just glued around it so it would stick in

place and thats all there is to this easy and fun

bottle pop lip gloss and thats last idea will be a DIY blow pop

lip balm for this one you will need something that

kind of resembles a blow pop and I'm going to use these mini vending machine capsules

start by coating one of the capsules with olive oil so the lip balm mixture won't stick

to it to make the lip balm mixture for this one

in a microwave safe container I'm going to add 1 tablespoon of beeswax along with 1 tablespoon

of coconut oil and melt that in the microwave on 10 second increments into it is fully melted

if you don't have beeswax or coconut oil you can also melted down a chapstick

once its melted to give this one some tint you can tint it with a piece of lipstick or

a crayon before you pour the mixture into the container

you will need a sucker or lollipop stick pour the lip balm mixture into the vending

machine capsule place the lollipop stick in the center then put that in the freezer for

about 10 minutes here is mine after i took it out of the freezer

just kind of going around the side a little bit and it should release

carefully remove a wrapper from a blow pop and thats how you make these easy blow pop

sucker lip balms once your done you can take the wrapper and

wrap it back up i hope you guys enjoyed these 5 DIY lip balm

ideas leave me a comment and let me know you favorite as always please remember to like

subscribe comment and share until next i hope you all have an amazing day

For more infomation >> DIY Lip Balm! How To Make 5 Miniature Candy, Oreo & Bubblegum Lip Gloss DIYs! {Easy} Makeup Projects - Duration: 13:32.

-------------------------------------------

It Comes At Night | Who Opened The Door? + 7 Theories and Questions Answered - Duration: 18:20.

It Comes At Night is probably my favorite horror movie of the year so far because of

the psychological quandaries the film poses.

Questions like, Who opened the door?

What is "it"?

Is the ending of the movie dream or reality?

In this video, I'll be giving my interpretations on some of the many ambiguities posed by writer/director

Trey Edward Shults, who I'll be referring to as Shultsy for the rest of this video for

some reason.

Just for clarity's sake, let's do a quick recap of all the character names.

The original family is led by Paul and his wife is Sarah.

They have a teenage son is named Travis.

The guest family consists of the father, Will, who is married to Kim and they have a young

boy named Andrew.

There will be spoilers ahead, so if you haven't seen this movie, just pause this video, spend

the next 97 minutes watching it, then unpause this video.

Ready?

Go.

Who Opened The Door?

The end of the film is driven by the introduction of the sickness into the household.

This starts one night when Travis is awake, as he often is, to find the little boy Andrew

sleeping in the middle of the living room.

He wakes him up and returns him to his room, where he crawls into bed with his parents,

who don't seem to wake up.

As Travis is returning to bed he hears something in the house.

He approaches the door and finds that it's partially open, with their dog, who had run

away earlier dying on the floor.

This of course causes panic and finger pointing from both families.

Paul worries that Andrew wandered out and caught the disease from the dog, and he uses

the fact that Andrew was out of his room as evidence that he may be a sleepwalker.

Will points out the fact that Andrew can barely reach the doorhandles then implies that Travis

may have actually been the one to open the door.

The obvious flaw in that story is that we know Andrew was out of his room, so unless

someone opened it for him, it's proof he's able to reach the doorknob.

But the possibility of it being Travis still exists.

Kim knows he has sleep issues and tends to wander around after dark due to their prior

kitchen conversation in the middle of the night.

Kim and Will both seem to be fairly innocent.

We can see them sleeping while when Travis brings Andrew back to their room.

It's easy to assume that Paul and Sarah would also be asleep at the time, and that

they would have no reason to open the door and endanger themselves like that.

After thinking about it further, I don't think Sarah could be responsible because of

her generally non-malicious attitude.

I can, however, come up with a reason that Paul might have been the one to open it.

Paul is very hostile towards Will as soon as they meet.

The only reason, it would, that he even allows Will to survive at first is that Will mentions

the fact that he and his family have food but no water.

Paul formulates the plan to have them move in, use them to learn how to be more self-sustainable,

as we see in the scenes with Travis learning from Will; before framing them and killing

them in order to gain sole access to the livestock while maintaining trust of his own family.

If that is his plan, it is a most devious one.

Some might go so far as to say that he lured Will in, using the fire set at the beginning

of the movie to attract potential victims to take advantage of.

However, while this is a possibility, I don't think that's what happened.

Paul knows about his son's sleep issues and, while I think he will do immoral things

to protect his family, I don't see him doing something that would potentially put them

in danger, especially so soon after having to put down his own father.

I believe there is another possibility.

So when they find the dog, he's lying inside the house, so he's out past the red door,

but not all the way outside past the last door.

In simpler terms, if you compare their setup to an airlock, he's inside the airlock,

meaning someone, or something, opened that door to let the dog in.

You might argue that the doors were just accidentally left open, which already seems like an unlikely

possibility to me given how seriously they take security, but I think the main factor

that disproves that is the symptoms of the dog.

The human symptoms seem to include large boils, excessive perspiration and excretion of blood

from the mouth.

The dog however looks to have excessive bleeding and from what I remember, a huge gash in the

body, and while we don't know how the symptoms differ from animals to humans, I would say

it looks more like the dog was attacked than diseased.

So then the question becomes, who attacked the dog?

In the scene where the dog runs away, it's basically left open ended.

He runs off, seems to be barking at something, goes out of sight, and then suddenly just

stops barking.

You could make the case that that's what "it" is, some kind of monster or mutant

that comes out at night to spread the disease.

And while the idea of that is pretty creepy, it's almost less unsettling than the alternative,

which is that other humans have found out where they live, come into their house, and

killed their dog to try to spread the disease to them.

There's actually more evidence to support this theory than the monster theory, because

when Paul and Will go to retrieve Will's family, they are attacked by other humans.

For seemingly no reason other than to possibly jack some supplies.

While we never find out the true intentions of their aggression thanks in part to Paul's

overactive trigger finger, we at least know that there are people out there in the wilderness

who want to kill Paul.

For all we know, they were already on their way to kill Paul and his family when he and

Will set out.

So based on all of the information we have, I would theorize that one of the marauders

from the wild captured the dog, infected it and killed it, then dumped it back in the

house to try and destroy the family, with the hope of later driving them out and salvaging

their supplies.

What Is It?

When I first saw the movie in theaters, it ended, the credits rolled, and the first thing

I, or anyone else in the theater said, was, "so wait, why is it called It Comes At Night?"

Shultsy hasn't given us an answer on that.

I'm going to go ahead and assume that he's not talking about Stephen King's IT, or

the It that Follows people.

We already talked about the possibility of there being some kind of monster out there,

so let's talk about those possibilities.

I think the reactions of the dog are the best evidence for the theory.

If there is a creature out there, that's probably what is causing his animals instincts

to go on high alert.

It wouldn't be that different from how animals seem to have a sense for real predators or

natural disaster.

Some say that animals and little kids are somehow on closer wavelengths to the paranormal,

and the two who seem to freak out the most before that fateful night are in fact the

dog and the child.

I personally don't think Shultsy intended anything paranormal going on though.

"It" could be more of a metaphorical connotation.

Could "it" be a reference to the sickness?

That would seem to make sense, seeing as how we are never given a proper name for this

disease.

And if you think about it, all the characters who have, or seem to have this illness appear

to get their symptoms at night.

The grandfather at the beginning of the movie is put down at night, and the dog shows up

dying at night, Andrew starts coughing and crying at night and of course Travis has both

nightmares about the sickness and the sickness itself seems to come up at night.

And while we're on the topic, another possibility is that "it" is supposed to represent

dreams or nightmares, which almost always come at night.

Unless you're me and you stay up making YouTube videos instead…

I NEED SLEEP.

But if you think about it, dreams kind of makes sense because all the paranoia, all

the damage to Travis's mental health ties back to his dreams.

He can't sleep because his nightmares are haunted by the sickness.

His waking hours are all spent trying to strengthen the family's protection against the sickness.

In a way, he has a separate disease of his own, the one that lives in his head.

And also, without him being up and about at night, they probably never catch Will, and

of course, he probably never contracts the disease from either Andrew or the dog, whichever

one of the two were the ones to transfer it.

But above all of that I think that "it", is something far scarier.

Scarier than some monster out in the woods.

Scarier than some crazy nomads competing for resources.

Scarier than a disease that has wiped humanity to its brink.

What I'm talking about, is fear itself.

When you think about it and dig a little bit deeper, fear and paranoia are what drive all

the suspense in the entire film.

When Will first breaks into the house, Travis and his family fear the unknown intruder.

When Paul kills the marauders in the wild, he does so out of fear.

The two families drift apart and become paranoid about what they don't know about each other.

That's out of fear.

That turns them against each other and they come to fear each other.

But it's also important to think about what builds this fear.

Most of the suspense comes when the families are locked away in their own rooms, discussing

their lack of trust for each other because of what they don't know about each other's

past.

Discussing what should be done with the other party.

Discussing morals and safety precautions all due to fear of the unknown.

These conversations, by nature, take place in private.

After sun has gone down.

From the safety of their own bedrooms.

It comes, at night.

Water vs Fire

You may have noticed a couple of opposing motifs in this movie, and please go ahead

and let me know which ones you've noticed in the comments.

I'm going to talk about Water and Fire and what they symbolize in the film.

Fire and water are opposites.

They cancel each other out.

However, they are both used for the same purpose in It Comes At Night: cleansing.

At the beginning of the film, fire is used to cleanse the disease from the house when

they burn Travis's Grandfather.

The next step for their family is to try to move on from their loss, and not long after,

Will shows up looking for supplies.

Paul captures him and ties him to the tree, then waits it out to make sure he doesn't

have the sickness.

That's when Paul makes his prisoner an offer.

He asks him to tell the truth, and in exchange, he will supply him with water.

So this is the first example of someone using water to cleanse and achieve purity, even

if it is less directly than other examples.

Throughout the film, as Travis struggles with nightmares of him suffering from the sickness

or contracting the sickness, he periodically takes showers to try to not only literally

keep himself clean and disease free, but also to try to clear his mind and hopefully help

improve his situation.

I would also it's no coincidence that the shower head is so pathetic and depressing

and barely manages to keep him covered, similar to how his current living situation is currently

barely keeping him covered, keeping him alive.

We do end up seeing Travis in the bathroom again, but this time there is no running water

on him, just a black liquid running from his nose.

The precautions that have been taken didn't work and now Paul will have to turn back to

the only cleansing solution that has been known to work, the fire.

I'm going to explore this topic a little deeper in the upcoming segment, so just remember

what I've said about two opposite elements being used for a similar purpose.

Who Are The Real Bad Guys?

Something that It Comes At Night does differently than a lot of films, is that it remains objective

about it's characters and allows the audience to take sides based on what they see.

For the most part, we as the viewers are not manipulated into choosing one side or another,

except maybe by one fact, which is that we are introduced to Paul's family first and

meet them in the midst of a tragedy, the loss of a love one, causing us to want to feel

some compassion for them.

For much of the story, Travis seems to be our protagonist; his parents: the allies.

However, before the end of the movie I was beginning to question Paul and Sarah's morality

in the situation, and have come to think that they may be the real antagonists of the story.

So let's take a step back and analyse everything that has happened from an analytical and psychological

standpoint.

Paul loses his father to the disease, and as result becomes extremely strict about the

family's routine and safety precautions.

We don't really know anything that happens before this, only that the epidemic didn't

take place that long ago because Travis still remembers what life was like before it.

Will breaks into the house and Paul shows no mercy striking him down and taking him

prisoner.

At this point I'd like to point that the story isn't necessarily told from Paul's

point of view.

Both characters have unknown pasts, which are occasionally talked about, but it's

up to us to figure out if they are lying.

Well played Shultsy.

Well played.

Next thing you know, Paul is moving in Will and his family.

He doesn't really give them much of an option, given his paranoia about having someone out

there in the world who knows where they are and knows they have resources.

So if we can just run with the idea of Will being the protagonist, then this is his inciting

incident, this is what kicks the story into motion for him.

On the way out, they are both attacked by marauders, but eventually gain the upper hand.

Paul finds himself in a position where he can either let the guy go or kill him.

Will is thinking logically and suggests that they try to get some information out of him,

but Paul just goes ahead and pulls the trigger.

This shows something about both of their characters.

This also won't be the last example of Paul withholding or avoiding the release of information,

and as someone who is supposedly a victim, behaviour as such seems awfully suspicious.

And then to add to that, when Will questions him on it, he becomes accusatory, as if he's

trying to shift blame off of himself.

Remember what I said about water and fire?

Let's continue to analyse the story, by framing the characters as these elements.

Will is water, trying to cleanse the world and do what's best for his family in a logical,

non-destructive way.

Paul is fire, he'll burn through anything to stay clean -- lives, resources, pets, friends

and even family.

Let's fast forward a little bit to the part where the dog runs off.

First, Travis gives chase.

Will takes off after him, and it would seem his intention is to protect him from whatever

happens.

Paul on the other hand, is just FURIOUS at Travis for endangering himself like that.

This could be an essential turning point in the movie, another potential opportunity to

learn more information.

Answers to questions like, "What got the dog so riled up?"

"What lies beyond their property?"

"What got to the dog that made it suddenly stop barking?"

Paul doesn't allow any of this to be answered and uses his dominant position in the household

to retract both of them and cut off any chance at learning more.

Since his goal is to protect his family, he really could benefit from such information.

I think this is the point in the story where Will starts to have second thoughts and realize

that although Paul may have good intentions as all good anti-heroes do, he could be going

about it in a harmful way.

He's fire.

Will's water.

This key difference between them continues to cause clash through the climax of the film.

Andrew gets sick and they both have different ways of going about it.

Will wants to just leave and fend for themselves out in the wild.

Paul is uncompromising in his plan to kill Andrew.

This part is told from Paul's point of view in order to maintain the suspense of the true

condition Andrew is in.

Most movies are told through the protagonist, but I just don't think that's the case

here.

The guy goes on to kill Will, then as Kim and Andrew are clearly just terrified and

trying to escape, he shoots them down as well.

It's also heavily implied that he does the same to his own son.

I'm not even trying to suggest that he is entirely in the wrong.

I think the best villains in fiction have a good reason for what they are doing, and

what makes them evil is the way they go about it.

I think it's reasonable to say that Paul is scarred from what happened to him at the

beginning of the epidemic, and these scars have made him jaded and unrelenting.

I feel like he's endured something that anyone in his situation would have the same

reaction to.

Did Travis Infect Andrew?

This theory is going to be a little shorter, and I don't necessarily think it's true,

but I'd like to bring it up so that we can open a discussion in the comments.

WHICH TOTALLY WON'T TURN INTO A SHITSTORM CAUSE THE COMMENTS ARE SUCH A HAPPY PLA--

But anyways, what do you guys think about the idea that when Travis took Andrew's

hand to take him back to bed, that he was infecting the child, not the other way around.

The only evidence against it is that Andrew gets his symptoms first, but who knows, maybe

something like that would show up sooner in a child.

I also think it's possible that Travis has actually had the sickness for quite a while,

and it first began to manifest itself as a psychological attack, which merely precedes

the physical symptoms.

That would also explain why we hear Andrew crying at night after he gets infected before

we ever see if he actually has the boils or anything.

Anyways, just some food for thought.

Or should I say, pudding bread for thought…?

What is the disease?

What does it represent?

Not much is known about what the disease is actually supposed to be or what it's supposed

to represent.

We just have a couple of small clues, the first of which is this painting shown at the

outset.

I researched it and found out it is called The Triumph of Death by Pieter Bruegel.

Shultsy actually talked about this painting in an interview with BirthMoviesDeath, link

in description, where he said the following:

"So I'd seen the timeless house I wanted in the film, and I saw the family that should

live in it, but I wasn't quite sure why.

And I had this book on Bruegel, and I stumbled on The Triumph of Death painting, and found

out he made it during the Black Death, the bubonic plague, and I was just haunted by

it, this vision of skeletons literally pulling people to their graves in a hellscape.

I was drawn to it."

Shultsy has also mentioned in several interviews that this movie was essentially binge-written

at the time of his father's death, so this ended up being a very personal piece for him.

His dad died of cancer after a lot of suffering, so it would seem that the pain that comes

to the victim and their family during cancer treatment inspired the effects of the disease

in the movie.

Obviously cancer isn't contagious, so I see the fictional disease as a combination

of the effects of cancer with some of the symptoms and characteristics of bubonic plague

in the 14th century.

Is the ending a dream?

I was originally going to wrap it up here, but after surfing around the internet and

reading some reviews, I decided to cover one more theory, the idea that the dark ending

was merely a dream, that the true disease is actually a mental disease, and Travis is

being driven crazy by it.

The theory proposes that his obsessive paranoia with the disease causes him to lose touch

of what's real and what's not, a la Inception.

This causes him to fall into a nightmare, which, by the end of the movie, he is unable

to pull himself out of.

The theory is backed on the presentation of dream scenes in comparison to the climactic

scene.

The dreams are all shot in anamorphic lenses, which basically give the camera a much wider

angle of view, making characters look smaller and less significant.

The music in the climax was also similar to the dream sequences.

I like both of those choices, but I just don't think Shultsy was trying to say that this

scene was a literal nightmare.

I think it was more along the lines of "now your worst nightmares have become reality."

This is what it's like to live a nightmare.

I'm basing this off one thing, and one thing only: the headspace of Trey Edward Shults.

Writing this movie days after losing his father, he had to have had a pretty dark outlook on

life.

Things probably felt hopeless.

He probably felt helpless.

Living in a nightmare, that he knew he couldn't wake up from.

So if you enjoyed this movie, let's all show our support to Shultsy.

Go ahead and like this video if you'd be interested in seeing him direct another horror

film and let's see how things stack up.

As for me, my name is CZ and I too direct psychological horror movies among a few other

things.

Check out these links to see some of the stuff I do here on the channel, and if any of it

looks interesting to you, then go ahead and subscribe to CZsWorld for new horrors every

week.

You'll also need to ring that deathbell for notifications and I'll see you in the

next one.

Assuming we both survive.

For more infomation >> It Comes At Night | Who Opened The Door? + 7 Theories and Questions Answered - Duration: 18:20.

-------------------------------------------

Berry Cheesecake Recipe - Duration: 8:01.

A creamy, sweet and delicious no bake cheesecake topped with berries.

So simple and easy to make.

Start with making the biscuit base, it couldn't be simpler or easier, only 2 ingredients.

A packet of biscuits and melted butter.

I'm using digestive biscuits here, graham crackers are basically the same thing, but

you can use any type of biscuits you would like.

The chocolate kind also work perfectly.

Place the biscuits into a food processor and process them until you have crumbs.

Alternatively if you don't have one you can place them into a large bag and use a

heavy object like a rolling pin or frypan to crumble them up.

If you would like the full recipe for this berry cheesecake it will be on my website

as well as full measurements listed in the information box below.

Once your biscuits resemble fine crumbs, pour them into a small bowl and pour over cooled

melted butter.

Use a wooden spoon to mix the biscuits and butter together until they are well combined.

Pour the biscuit crumbs into a lined cake tin, this makes it so much easier to remove

later, and use a spoon to compact the crumbs down.

It doesn't have to be perfect, I always find cheesecakes look better rustic, and place

it into the fridge to set.

Cheesecakes are one of my favourite desserts, and there are so many different flavours make.

If you think like me, make sure to subscribe to my channel and watch my other cheesecake

recipes.

Once the cheesecake base is in the fridge setting, we can start to make the filling.

Pour cold cream into a large mixing bowl and using a whisk beat it until it starts to form

soft peaks.

Whisking by hand should only take 3-4 minutes but you can use a hand mixer if you would

prefer.

Using it straight out of the fridge makes it much easier to whip than at room temperature.

Make sure to use cream for whipping, it should be around 30%, it may be called double cream,

whipping cream, or heavy cream.

When the cream starts to hold shape stop whisking and set it to the side to be used a bit later.

In a larger clean bowl add the room temperature cream cheese, and measure out about 2/3 of

a cup of icing sugar or powdered sugar for some sweetness.

They are both the same thing just different names.

Using a whisk or a wooden spoon beat the cream cheese and sugar together until there are

no longer any lumps and they are well combined.

Let me know in the comments below what your favourite dessert is, and what sweet recipe

you would like to see next here on my channel next.

If you're a fan of waffles for breakfast or dessert make sure to be subscribed as they'll

be coming up soon.

The berry flavour is in the topping of the cheesecake so to flavour the filling I'm

using the zest and juice from a medium sized lemon.

Make sure to choose a lemon with a very bright yellow shade and using a hand held microplane,

zest the skin.

You just want the yellow, make sure not to get any of the white underneath as this is

what makes the zest have a bitter flavour.

Use a knife and cut the lemon in half and squeeze the juice from each side over the

mixing bowl catching the pips with your hand.

Use the whisk to mix the zest and juice until well combined.

This next step depends on how you want to serve your cheesecake, from the fridge or

partially frozen.

Cheesecakes that aren't baked are usually set using gelatine, whereas baked cheesecakes

contain eggs.

Frozen cheesecakes on the other hand can set by just being frozen.

All of these methods allow you to cut into the cheesecake while it still holds its shape.

If you are going to freeze your cheesecake to set you can skip this next step, or if

you are serving it from the fridge you can use gelatine or agar agar.

I'm using powdered gelatine and dissolving it in a few tablespoons of boiling water.

Pour the gelatine into the cheesecake filling and use the whisk to combine.

Lastly add the whipped cream and fold the cheesecake filling together until everything

is perfectly combined.

Pull the cheesecake base out of the fridge and top with the filling.

Use an offset spatula to smooth out the filling, again it doesn't need to be perfect, just

make sure it's pretty even.

Place the cheesecake back into the fridge to set for a few hours before making the topping.

Lastly for the berry topping.

There are a few different things you can do here, I'm taking the easy way because it's

so simple and delicious, but you can also do it from scratch.

Using a can of your favourite type of berries in syrup, pour it into a blender and blend

until smooth.

The can of berries already contains sugar so there is nothing more you need to do.

If you would prefer to use fresh or frozen berries you will also need to make a quick

simple syrup which is just equal part water and sugar which is simmered in a saucepan

until the sugar dissolves.

Strain the berries through a sieve to remove any of the pips, they're not too fun to

bite into in this cheesecake.

You can pour this straight onto the cheesecake if you are going to freeze it to set, or else

you'll need to use gelatine or agar agar like with the filling.

Dissolve the gelatine in a few tablespoons of boiling water and mix into the berry mixture.

Pour over the cheesecake and place into the fridge to set for at least 4 hours or overnight.

If you're freezing your cheesecake remove it from the freezer about 20-30 minutes before

you are going to serve.

Top high with berries, serve with whipped cream or it's perfect just on it's own.

I hope you enjoyed this cheesecake recipe, make sure to take a look at my other cheesecake

recipes.

Thank you for watching and I will see you in my next video.

For more infomation >> Berry Cheesecake Recipe - Duration: 8:01.

-------------------------------------------

C&C Red Alert 2 Mental Omega 1.2 - Skirmish with Allies - Duration: 1:00:38.

Mental Omega 1.2 for C&C Red Alert 2 Yuri's Revenge. Mental Omega 1.2 is the first part of Mental Omega mods for Red Alert 2, dating back to the January 2005 when first public release was made.

Mental Omega 1.2, this is a real piece of history shown to you - a first ever public release of this masterpiece.

This version didn't have the campaign, but the skirmish and no need for either NPatch, RockPatch and surely Ares.

Lots of the units from 1.2 were based on the Red Alert 2 concept sketches like Hydra and Focus Tanks, Soviet Rhino Tank is based on the art from the installation process.

Some units from Mental Omega 3.3 made it's first apperance here like immortal Centurion Siege Crawler, Akula Missile Subs, Siege Cadre or Aeroblazes.

Mental Omega 1.2 in terms of gameplay is very different from Mental Omega 3.3, it's much closer to the vanilla Yuri's Revenge.

Some things might be shocking, like dogs able to bite Tesla Troopers or Desolators or Elite Centurion destroying buildings in one volley.

Sorry for the massive slowdowns but the Red Alert 2 and older titles in overall have performance issues on Windows 10.

I haven't been also able to finish the Skirmish properly because some cloaked units are hidden on the map, old YR mod thing ( ͡° ͜ʖ ͡°).

This mode in Skirmish gives player the ability to build and train all units for selected faction, including country specials.

Thus you might observe such known units like Abrams Tanks, Aeroblazes and Blizzard Tanks, together with "forgotten" Demolishers artillery pieces.

The Abrams Tank has it's main AP cannon and lasers, but it's lasers are only used against infantry units on the field.

If you really appreciate my content and videos, please leave a like and subscribe to it.

Support the World Beyond for their masterpiece album "Mindshell"!

For more infomation >> C&C Red Alert 2 Mental Omega 1.2 - Skirmish with Allies - Duration: 1:00:38.

-------------------------------------------

A Guide for the Savvy Journalist in a World of Ever Decreasing Privacy - Duration: 34:33.

A

Guide for the Savvy Journalist in a World of Ever Decreasing Privacy

by Edward Morgan

You can see the eBook PDF-version of this guide here.

1.

Introduction

Many veteran journalists, but not only these, surely noticed that we are all of a sudden

bombarded again from all-over with mentions of Watergate.

Books like George Orwell�s 1984 are on display at bookstores and an air of danger to freedom

of speech and freedom of the press is spreading slowly like a dark cloud over the Western

Hemisphere, raising old fears.

When an American serving president accuses a former president of surveillance; when he

prevents central US media outlets access � so far always granted, and taken for granted

� to press conferences he holds; and when he incessantly knocks and accuses the media

of being the country�s enemy number one, it isn�t surprising that memories of President

Nixon surface up more with every self-pitying tweet about SNL, and that even Republican

Senators such as John McCain express fear for the future of democracy.

And McCain is not alone.

Many journalists whom I have spoken with recently, expressed concern for whatever lays ahead

for the freedom of the press.

At a time when it�s possible to express the following statement � �Donald Trump

controls the NSA� � and not be held a liar, anything�s possible.

Add that to the fact that recent news on CIA taught us that almost all encryption systems

can be compromised, if someone has the perseverance to crack them � and you are en route to

envisioning an utterly Dystopian world, where you cannot even get too comfortable laying

on your sofa, in front of your own smart TV.

The good news is that it is nevertheless possible to make it difficult for anyone to try and

intercept your emails, the text messages you�re sending or your phone calls.

You can take measures to make the lives of those who want to uncover your sources and

the information being revealed to you, much harder.

Of course, the degree of effort you�re prepared to take to protect your privacy, your sources�

anonymity and your data�s safety, should be commensurate to the likelihood of a real

threat, be that hacking or spying.

�The old-fashioned promises � I�m not going to reveal my source�s identity or

give up my notes � are kind of empty if you�re not taking steps to protect your

information digitally�, says Barton Gellman of the Washington Post, whose source, former

NSA contractor Edward Snowden, helped uncover the scope of the NSA�s and British GCHQ�s

operations, to his interviewer Tony Loci.

Loci herself, who covered American judicial system for AP, The Washington Post and USA

Today, and was herself held in contempt of court for refusing to identify sources, would

probably endorse that.

So, what is it that needs to be done to ensure that a journalist�s sources and data are

secure and well?

Grosso modo, the tips can be described as falling within the following categories:

Securing on-device applications and functions- This is known as reducing the �attack surface�,

i.e. limiting the installed apps to the bare minimum, installing only from trusted sources,

selecting apps that require minimal rights, keeping the system fully patched and updated,

and having as many security controls (based on recent best-practices white papers) on

the device.

Isolating your devices and/or their environment� For example, the physical insulation of a

computer for the purpose of checking files, or the use of prepaid mobile devices.

Acting cautiously both in the digital and real world- This has a lot to do with common

sense and a little less to do with software: For example, never write down the name of

the source, certainly not on any app or on any document that�s stored on your computer

� and most certainly not on anything stored on the cloud.

2.

Communicating with your source and safeguarding the sensitive data

Let�s begin by listing what you can do when it comes to communicating with a source, and

storing sensitive information obtained thereof:

Beware of big names: Presume that large companies� encryption systems and possibly even big name

operating systems (proprietary software) have back doors that secret services in their country

of origin (at least in the US and the UK) can access.

Bruce Schneier, Security Expert, explains it here.

Always encrypt everything: Security experts use simple math to make their point: as you

raise the cost of decrypting your files (say, for intelligence agencies like the NSA), you

automatically increase the degree of effort expended on following you.

If you�re not Chelsea Manning, Julian Assange, or Edward Snowden and if you weren�t involved

in active surveillance around Trump Tower apartments, They may give up the effort even

if your encrypted communications were stored.

And should anyone decide to track you despite your efforts, it will be more of a headache

if you use strong encryption like AES (Advanced Encryption Standard) and tools like PGP or

openVPN, which are the strongest widely available encryption methods (VPN�s are used by the

US government itself).But if you want bullet-proof security, you will need more than the AES

encryption method.

P.S. if you want to discover the year your information landed at the NSA�s hands, just

have a peek here.

Perform full disk encryption: This is done just in case someone gets their hands on your

computer or phone.

Full disk encryption can be done using FileVault, VeraCryptor BitLocker.

Putting a computer to �Sleep� (instead of Shutdown or Hibernate) may allow an attacker

to bypass this defense.

Here, Mika Lee gives a complete guide for encrypting your laptop.

Avoid chatting with sources on the phone: All phone companies store data related to

the caller and the receiver�s numbers, as well as the location of the devices at the

time calls were made.

In the US and several other countries, they�re required by law to disclose information on

registered calls in their possession.What can be done?

You should use a secure call service, such as the one the Signal app � which was tested

repeatedly for security � possesses.

Although this may mean that both the source and the editor need to download the app as

well, the process takes just a few minutes.

Here is a guide on how to use it.

Just for the hang of it, check out how many of your non-journalist friends are hanging

out there.However you choose to communicate with your source, do not bring your mobile

phone to sensitive meetings.

Buy a disposable device and find a way to convey its number to the source in advance.

The source needs to have a disposable safe device too.

Authorities can track your movement through cellular network signals and it�s advised

to make it harder on them to locate you retroactively in the exact same cafe where the source was

sitting.

If you fail to follow this rule, all local authorities will be required to do is ask

(politely and legally) for the video filmed by the caf�s security camera at the time

of your meeting.

Choose secure messengers: your calls (cellular ones and via landlines) can be monitored by

law enforcement agencies and each SMS is like a postcard � all text is fully visible to

those who may intercept it.

Therefore, use Messengers that allow for secure end to end call: signal, which was already

mentioned above, and Telegram are considered to be the safest (although Telegram as well

as WhatsApp�s web apps were compromised once and then fixed).

According to some experts, you can also consider using SMSSecure, Threema and even Whatsapp.The

Signal Protocol has been actually implemented into WhatsApp, Facebook Messenger, and Google

Allo, making conversations using them encrypted.

However, unlike Signal and WhatsApp, Google Allo and Facebook Messenger do not encrypt

by default, nor notify users that conversations are unencrypted � but offer end-to-end encryption

in an optional mode.

You should also keep in mind that Facebook messenger and WhatsApp are both owned by Facebook.Adium

and Pidgin are the most popular Mac and Windows instant messaging clients that support the

OTR (Off the Record) encryption protocol and Tor � the web�s best encrypted browser,

which we will get to in detail later (See how to enable Tor in Adium here and in Pidgin

here).

Naturally, you could also use the Tor Messenger itself, which is probably the safest of them

all.Two final notes on texting: A cyber security expert I�ve discussed this with, says you

should also have a working hypothesis that text is encrypted but the fact that these

specific two individuals are talking, at this present time, might not go unnoticed.The second

note is you should also remember to delete the messages in your phone (although this

may not be enough to withstand a forensic check), just in case your device falls in

the wrong hands, to avoid exposing them.

Do not use organizational chats: Slack, Campfire, Skype and Google Hangouts should not be used

for private conversations.

They are easy to break in, and are exposed to disclosure requests for courts use, to

resolve legal issues at the workplace.

Therefore, it�s best to avoid them, not only when it comes to conversations with sources,

but also conversations between colleagues, editors, etc., when you need to pass information

received from your source, whose identity must be kept under cover.

Many popular VoIP services like Jitsi have built-in chat features, and several of them

are designed to offer most of Skype�s features, which make them a great replacement.

In extreme cases, consider using a Blackphone: This phone, which strives to provide perfect

protection for web surfing, calls, text messages and emails, is probably the best substitute

for a regular phone if you are about to topple your government or getting ready to publish

secret military files.

An anti-bullet vest may also come in handy.

Alternatively, try to do without a cell phone, Or opt for a cellular phone RFID signal-blocking

bag.

There�s always an option that even the Blackphone can be tracked using its IMEI (the mobile

phone�s ID).

Protecting Data on your computer: It�s very easy to break regular passwords, but it can

take years to break passphrases � i.e., random combinations of words.

We recommend trying secure password management tools like: LastPass and 1Password and KeePassX.

You�ll need to remember only one password, versus too many Passwords.

And still, when handling important services such as your email, do not rely on password

managers: Just make sure you remember the password.In an interview to Alastair Reid

in journalism.co.uk, Arjen Kamphuis, an information security expert, recommended that for encrypted

hard drives, secure email, and unlocking laptops, one should choose a password of over 20 characters.

Of course, the longer the password, the harder it is to crack � but the harder it is to

remember too.

That�s why he recommends the use of a passphrase.

�It can be anything, like a line of your favorite poetry,� Kamphuis says, �maybe

a line from something you wrote when you were nine that no one else will know about�.Reid

reports this thought provoking calculation, using the Gibson Research Corporation�s

password strength calculator: A password like �F53r2GZlYT97uWB0DDQGZn3j2e�, from a random

password generator, seems very strong, and indeed it is, taking 1.29 hundred billion

trillion centuries to exhaust all the combinations even when the software is making one hundred

trillion guesses per second.Screenshots from GRC.com, showing the difference in strength

between a password and a passphraseThe phrase: �I wandered lonely as a cloud�, he points

out, is so much easier to remember and is also more secure, taking the same software

1.24 hundred trillion centuries to exhaust all possibilities.

Well, passphrase it will be.

Two-factor authentication is also a very good idea.

In a regular two-stage authentication you sign in with your password and receive a second

code, often via a text message to your smartphone.

You can use Yubikey, as well as hardware tokens to further secure sensitive files on your

computer.

For more information, read the 7 golden rules for password security.

Assign a computer for inspecting suspicious files/attachments: The easiest way to distribute

malware and spyware is through installation via USB or through attachments and email links.

It is recommended therefore you use one air-gapped computer to examine these threats under quarantine.

With this computer, you can freely use a USB and download files from the Internet, but

do not transfer the files to your regular computer or re-use that USB.

How to buy your own secured computer: Security expert Arjen Kamphuis recommends purchasing

a pre-2009 IBM ThinkPad X60 or X61.

These are the only modern enough laptops with modern software systems, which enable replacing

low level software.

Another point to take into account is that you should not buy your computer online, as

it may be intercepted during delivery.

Kamphuis recommends buying it from a second-hand store for cash.

He also points out that you should abolish all connectivity: Remove all Ethernet, modem,

Wi-Fi or Bluetooth capabilities.

Personally, I know security experts who wouldn�t trust such a computer.

ThinkPad X60.

Don�t buy it online

Educating your Sources: It�s possible that by the time the original and valuable information

reaches you, it�s already too late.

Your source may have made every possible mistake, leaving behind a trail of evidence.

But beyond the need to secure the information once it�s in your hands, you should strive

to teach your sources how to hide the information: store it securely and communicate safely via

safe devices.

Most people have no clue how to handle sensitive information, and in general what they�re

up against the moment they get in touch with you.

Use a designated secure system for receiving documents: Replace Dropbox or Google Drive

and use something less popular but more secure.

For example, SecureDrop is a designated system allowing you to receive files from anonymous

sources and to safely scan and check them.

Edward Snowden described Dropbox as �hostile to privacy� and recommended Spideroak instead.

OnionShare is another free service that allows transferring files easily and anonymously.

Don�t keep notes: neither on a laptop, nor calendars or contact lists on your cellphone

or computer or in the cloud � do not keep record of your sources name, initials, phone

number, email or user name in messengers.

Just don�t.

Visual tracking: On the way to sensitive meetings, avoid using public transportation and guide

your source to do the same.

You should also avoid meeting places such as modern malls, where video cameras are spread

all over the place.

Evading social media: Some people prefer to opt for radical anonymity.

If for some reason, you need to vanish from the face of the earth without leaving a fully

blown profile behind on every social media, totally delete your accounts.

It�s different from �deactivating� them, a state in which all your info is stored and

can be re-activated.

Make friends among hackers: This will help you avoid big mistakes, save time and headaches

and keep you up to date on the technological arms race.

Payment method: Pay for everything in cash, consider using Bitcoins � buy them anonymously

(use this Business Insider guide for that purpose) � and, if you have somebody willing

to accept them at the other end of the transaction, use Dash.

A pre-paid credit card from an online store is also an option.

Scribble wisely: If you jotted down information on a piece of paper, what they used to call

a note in the Precambrian world, destroy it.

And don�t forget even that wrinkled one at the bottom of your pocket.

Yes, right next to that gum

3.

How to become anonymous online

Beyond securing the communications with your source, and protecting possible breaches of

the sensitive data you get hold of, you should also avoid being tracked while browsing.

Online habits can disclose or provide hints as to the story you�re working on, or worse,

hint or disclose the identity of your source.

Here are the golden rules for surfing the net safely and then, at the next chapter,

for securing your email account:

Private browsing mode: There are two basic ways to maintain anonymity while surfing the

web.

The first, most basic and popular, yet insufficient way is to browse the information in private

mode, an option that most browsers allow.

Your browsing history will not be saved, and basic tracking technologies, which advertisers

use, such as HTTP cookies, will be prevented from creating your detailed profile.

But this is more of a nice to have privacy: It basically hides your browsing history from

family members who can access your computer.

Your IP address can still be monitored and information regarding all the sites you visited

is still exposed to your ISP.

Use alternative browsers: browsers, such as Dooble, Comodo Dragon or SRWare Iron, which

focus on user privacy, are limited in capabilities.

You can achieve a similar degree of privacy offered by these browsers simply by deleting

cookies � bits of code which have been downloaded to your system by websites you visit, that

monitor your activity and sometimes even follow which content you consume; Another way to

remain anonymous is by neutralizing your browser�s location settings, and installing various

features aimed at achieving anonymity.

To check whether you disabled all cookies effectively, you can use the app CCleaner,

which also handles Flash cookies, but none of these browsers are fully encrypted.

The only standard browser that ensures total privacy is the Tor browser.

Tor is ugly and slow, but it will protect you and your sources.

The next section will give a more detailed account of it.

TOR: This �notorious� browser, which was developed by the US Navy, allows you to operate

in a hidden network, carry out private communications and set up web sites anonymously.

Tor�s browser, which can be downloaded at Torproject.org, makes it very difficult to

monitor your activities on the internet, or let governments or your ISP pinpoint your

location.

The only drawback is that it�s slow at times, a bit cumbersome � but that�s only because

Tor routes you through three encrypted random relays around the world, before landing you

at your destination site.

You should also bear in mind that your neighbors may be shady characters.

Another option related to Tor is to download Whonix, a secure operating system that is

focused on privacy.

It works as an access gate to Tor, and only allows connections with Tor sites and users.

But the most popular Tor OS is Tails (The Amnesiac Incognito Live System).

Tails can be booted from a USB stick or DVD, and it anonymizes all information.

Edward Snowden is considered a fan of this software.

Qubes is another OS that supports Whonix and is recommended by Snowden.

Alternative search engines: Google, the most popular search engine, saves your search history

in order to optimize the results.

To stop this personalization you should click on: Search Tools > All Results > Verbatim.

Or you sign into your Google account on www.google.com/history, find a list of your previous searches and

select the items you want to remove by clicking the �Remove Items� button.

DuckDuckGo.

A search engine that doesn�t store your info

But to avoid being monitored entirely, it�s preferable to use a search engine such asDuckDuckGo.

If you find it difficult to give up Google, download Searchlinkfix to at least keep away

URL Trackers.

Direct treatment of �short-term� computer memory: Another way to neutralize options

for monitoring your surfing is by deleting the DNS (domain name system) cache.

Deletion is done using simple commands in the operating system.

Rebooting the router � which sometimes has a DNS cache � or rebooting the computer

can also reboot both their respective DNS cache, if the router has one.

Try to avoid HTML Web Storage: Web Storage is built into HTML5, and unlike cookies, the

stored information is impossible to monitor or selectively remove.

Web storage is enabled by default, so if you�re using Internet Explorer or Firefox, simply

turn it off.

You can also use the add-on Better Privacy for Firefox to remove the stored information

automatically.

The Click and Clean extension will do the same job for Google Chrome.

Use a VPN: As I mentioned already, your ISP can monitor the sites you surf, and anyone

who wants to eavesdrop on you, can also intercept your communications.

To protect all incoming and outgoing communications, it�s important to make use of a VPN (For

a complete explanation, click here).

VPN encrypts all your communications, so that even the ISP or the secret services, or just

hackers hovering around your favorite coffee shop�s Wi-Fi, won�t be able to know who

you sent an email to, which service you used, etc.The use of a VPN is very common among

people who, for example, wish to see the complete Netflix movies catalog outside of the United

States, but not every VPN is suitable for journalists.

A VPN for journalists won�t necessarily be the fastest one or have the best support,

but it has to be trusted not to keep VPN logs � that is, it cannot determine who you are,

what sites you�ve visited and so on.A safe VPN is bound to be provided by a company who�s

not located at one of the �14 Eyes� countries, where intelligence networks are allowed to

collect and share information with one another; firstly and foremost, in the USA.

So VPN companies located in the territory of the former Soviet Union countries have

an advantage.

Their courts do not easily hand out orders to retrieve information collected by local

companies, be it regarding their citizens or foreign nationals.

Here you�ll find a list of 5 VPN services that stand out regarding privacy and all are

located outside the �14 Eyes� countries.wBy the way, even if governments are out on the

hunt for Traffic that is sheltered by a VPN, you can still use stealth VPNs like TorGuard,

to confront the challenge, whether it is active government censorship or just spying you�re

dealing with.

Tor and VPN�s give you the perfect protection when someone is trying to retrieve your browsing

history in order to profile you.

Repair DNS leaks: Using a VPN does not protect you completely, because that DNS Traffic may

hint at your identity.

DNSLeakTest.com will allow you to detect such leakage.

If the test shows that DNS is of your VPN, you can relax, but if it shows that the DNS

is of your ISP, you are not anonymized.

In this case you, check out what you can do here.

Virtual Machines: This nifty little trick is actually a second (virtual) computer, which

operates as an app in your operating system.

You can download files or open links in a similar way to the isolated computer I recommended

earlier, so that your computer is less exposed to malware or spyware of any kind.

Virtualization software, like VirtualBox should be opened using a secure operating system.

File downloading is done with the virtual machine Internet connection shut down; after

using the file, you�ll need to delete it � and depending on your adversary, perhaps

delete it along with the machine.

HideMyAss proxy server.

I�ll hide yours, if you�ll hide mine

Proxy server: As in the case of virtual machines, here too the activity moves to another �area�

and allows you to keep safe from spying and other attacks.

Actually, the proxy servers substitute your IP address with theirs, which can mislead

people into thinking you�re in a different country, for instance.

HideMyAss.com/proxy, Psiphon (open source) and JonDonym all provide a similar service.

Some experts say that these should be used with a VPN and/or Tor for higher levels of

security.

But then, some experts I�ve talked to claim that if you bother using Tor, you�re as

secured as one can be anyway.

Three more types of extensions that can increase your level of security: To verify that the

Internet protocol where you operate is https secure, you can install an extension called

HTTPS Everywhere , made by the Electronic Frontier Foundation�s (EFF), one of the

organizations that funds the Tor Project.

This extension is recommended by many cyber experts; it will ensure that websites you

visit use the secure protocol, which is definitely not an insurance policy against anything,

but better than the unencrypted protocol.The second type of extension controls the data

that javaScript is revealing to websites (in order to improve your browsing experience).

Two popular options here are ScriptSafe and NoScript.Another extension is the Ghostery

browser.

This extension will reveal who is following you among 2,000 companies, and will allow

you to block unwanted ones.

It�s sweet, but you probably won�t be blocking the NSA this way.

Privacy badger, a project by the EFF, also works similarly.

4.

Securing your email

How should you protect your e-mail?

The problem with maintaining the confidentiality of emails is even tougher: Google and Microsoft

will most likely just give out your emails to government agencies if and when required

to do so.

What should you do?

Safe extensions: The simplest option, assuming you use common Web mail services such as Yahoo

and Google, is to install the browser plugin Mailvelope, and make sure that the person

on the receiving end does too.

This extension simply encrypts (and decrypts) the e-mail.

A similar but limited extension to Gmail called SecureGmailwill perform a similar job.

Emails that go through this extension are encrypted, and can�t be decrypted by Google.

Another possibility is �Encrypted Communication�, which is a simple to use Firefox extension.

For that you will need a password that the recipient has access to � but remember to

never transmit the password by email.

Secure email providers: Hushmail is an example of an email service that provides better security

than the more common networks you use, but it may be forced to hand over emails to the

US government under a court order, and it does log IP addresses.

Another email service with similar features and security levels is Kolab Now, which prides

itself amongst other things with storing data exclusively in Switzerland.

Disposable Email Addresses (DEA�s): This is an email created ad hoc for a specific

purpose, which is completely anonymous and is deleted immediately after use.

This solution, commonly used when signing up for various services in order to avoid

spam, is also a great solution for maintaining anonymity.

However I wouldn�t advise journalists to communicate with their sources over it, because

security is not its strongest trait.

There are dozens of such temporary emails, but the British Guardian, for example, recommended

Guerrilla Mail and Mailinator.Using Guerrilla Mail in the Tor Browser ensures that not even

they can connect your IP with your email address.

Likewise, if you use email encryption software, such as GnuPG, on Tor, you�re all set and

secure.

So, let�s talk a bit about email encryption.

Encrypting your mail: Wired got this recommendation from Micah Lee, a privacy-focused technologist

who worked with the EFF and First Look Media (here is an interview Lee held with Edward

Snowden): Encrypting messages with webmail can be tough.

It often requires the user to copy and paste messages into text windows and then use PGP

to scramble and unscramble them (PGP � Pretty Good Privacy � is an encryption program

that provides cryptographic privacy and authentication for data communication).

That is why Lee suggests a different email setup, using a privacy-focused email host

like Riseup.net, the Mozilla email app Thunderbird, the encryption plugin Enigmail, and another

plugin called TorBirdy that routes its messages through Tor.As Reid pointed out in his interview

with Kamphuis on journalism.co.uk, Greenwald almost lost the NSA story because he initially

ignored Snowden�s instructions on email encryption.

In other words, if you want a story that will go down in history it makes sense to be secure.

Kamphuis agrees that PGP can be trusted.

As he and Reid explain, with PGP encryption, you have a public key, like your public phone

number, and a private key.

The public key can go on Twitter biographies, business cards, websites and wherever else

your work is publicized, but the private key must be stored securely, as with any other

sensitive information.

Then, when a source wants to send information, they will use your public key to encrypt their

email, that only your private key can unlock.Kamphuis recommended the GNU Privacy Guard, an open-source

version of PGP, that is simple to set up and has an active support community.

For encrypting files, data and hard drives, he suggested consulting his free eBook, �Information

security for journalists�, published with Silkie Carlo and released through the CIJ,

which fully explains the process.If you do choose to encrypt the message itself regardless

of your mail provider�s identity, using zip with a password is a good idea, and 7ZIP

is a recommended tool for accomplishing that.

Back to basics: Yes, I know that this is back to email security 101 � but please try to

avoid phishing.

Watch the �from� field in your email for little misspellings; someone else can pose

as somebody you know.And one last word on email encryption: One of the real problems

to bear in mind is that even after encrypting them, not everything is encrypted.

The email addresses of the sender and recipient, the subject line and the time and date when

the email was sent, are all out on the open.

Attachments and the message itself are the only data that is encrypted.

5.

Final words

These are perhaps the most radical pieces of advice I ran through, when preparing this

eBook.

As Micah Lee put it when interviewed on privacy on WIRED: �If your computer gets hacked,

the game is over.

Creating a virtual sandbox around your online communications is a good way to keep the rest

of your system protected.

Tor is awesome and can make you anonymous.

But if your endpoint gets compromised, your anonymity is compromised too.

If you really need to be anonymous, you also need to be really secure�.

And Journalist Tony Loci puts it in even harsher words in an article published in an eBookabout

the future of cross border investigative journalism for the Nieman foundation at Harvard: �Some

journalists, computer scientists and privacy advocates are so alarmed that they recommend

reporters go old school� and rely on in-person interviews

and snail mail�.

I hope I have helped people in the trade, and others, gather some information that will

clarify what needs and can be done to ensure your

and your source�s security in these hectic times.

For more infomation >> A Guide for the Savvy Journalist in a World of Ever Decreasing Privacy - Duration: 34:33.

-------------------------------------------

Learn English Words - TENACIOUS - Meaning, Vocabulary Lesson with Pictures and Examples - Duration: 1:07.

Tenacious not readily letting go of or giving up

Even though Jackson was smaller than his other teammates, his tenacious attitude allowed

him to accomplish as much as they did.

Trapped in the cabin, the tenacious teenager would not quit until she found a way to escape.

Even as the man tried to chase him away, the pit bull refused to release his tenacious

grip on the little boy.

The reporter's tenacious search for the truth helped solve a murder case that had

been open for twenty years.

Tenacious not readily letting go of or giving up

Tenacious not readily letting go of or giving up

Tenacious not readily letting go of or giving up

For more infomation >> Learn English Words - TENACIOUS - Meaning, Vocabulary Lesson with Pictures and Examples - Duration: 1:07.

-------------------------------------------

Eckhart Tolle - Pare de reclamar - Duration: 13:50.

For more infomation >> Eckhart Tolle - Pare de reclamar - Duration: 13:50.

-------------------------------------------

GG LIVE | Bloodborne #3 (PS4) - Duration: 4:36:54.

For more infomation >> GG LIVE | Bloodborne #3 (PS4) - Duration: 4:36:54.

-------------------------------------------

3rd person by NoLeads +subtitles - Duration: 2:51.

. .

. .

. point to temples like im spock

im limping when i walk my words are filled with mysteries

in secrets when i talk see in sequence like a hawk

these frequencies that squawk head east

i left for peace amongst deceased

i ran the block know the locks to see the game

no door to hold the frame supported by the ordinary

sequence of insane time to free yourself from your chains

these ciderella stains cause really your the king or Queen thats

feeling all this pain yeah i said that shit again

reflection, we became aggressive, still undressing in the camera

for some fame when did panic turn to pain

a lust to entertain a swords thats gone to rust

it sits in stone thats in the rain use your phone to fit the frame

re shape as if you train not hppy just erase it

just keep fucking with your brain money, hoe's it's all the same

no limits to their shame just let me crack this guiness

and continue

to explain .

. .

. .

beam me up i scream to scotty

there's poison in my cup discussed it with my boys

we've come to thing they knows whats up

all in place to make a buck we're treated like some schmucks

but NoLeads takes the lead and sentenced greed

when lightning struck no repence

don't give a fuck you reep the webs you live in

so tell me why these people act in treason aint in prison

not accountable traditions has lead me to suspicions

they fed me with this texts that fights my inner intuitions

im to bright to simply listen and parrot what i hear

id rather look & search than spend my years lost in the mirror

smoke a blunt and drink some beer get social,

open ears approach it like an optimist

cause Optimus is here and its time to roll out..nL

For more infomation >> 3rd person by NoLeads +subtitles - Duration: 2:51.

-------------------------------------------

Learn English Words - ECLECTIC - Meaning, Vocabulary Lesson with Pictures and Examples - Duration: 1:20.

Eclectic something that is made up of various sources or styles

The restaurant's menu was eclectic and included foods from a number of ethnic groups and cultures.

In Gerald's library, you will find an eclectic mix of books because he will read just about

anything.

My friends are an eclectic group of individuals who can rarely agree on a single topic.

The sculptor used an eclectic assortment of materials to create his latest piece of art.

While Henry is a well-known country music lover, his wife's music taste is more eclectic

and includes everything from classical music to rock music.

Eclectic something that is made up of various sources or styles

For more infomation >> Learn English Words - ECLECTIC - Meaning, Vocabulary Lesson with Pictures and Examples - Duration: 1:20.

-------------------------------------------

BACK WITH SOME "EXTRA" DEEMO [Deemo: Level Ex Collection, Part 1] - Duration: 13:57.

For more infomation >> BACK WITH SOME "EXTRA" DEEMO [Deemo: Level Ex Collection, Part 1] - Duration: 13:57.

-------------------------------------------

38-4 Nuketown destruction! Peacekeeper gameplay - Duration: 5:14.

For more infomation >> 38-4 Nuketown destruction! Peacekeeper gameplay - Duration: 5:14.

-------------------------------------------

Mel B has splashed all of her Spice Girls fortune as she returns to court in bitter divorce battle - Duration: 3:04.

Mel B has splashed all of her Spice Girls fortune as she returns to court in bitter divorce battle

MEL B has wiped out her multimillion Spice Girls fortune, a court was told, as the former pop star appeared at her bitter divorce battle for the first time.

The singer, 42, faced Stephen Belafonte, who she says tortured her with years of physical and mental abuse, in court in Los Angeles on Friday. Mel B and her hubby made improvident choices with their money.

The pair both have outstanding tax debts after making improvident lifestyle choices, Los Angeles Superior Court was told. Grace Jamra, representing Belafonte, said: She wiped out all her Spice Girls money, approximately 50 million if not more.

Mel has taken out a temporary restraining order against Stephen, who she says got their nanny pregnant, and claims the abuse was so bad she tried to take an overdose.

And the pop icon, who filed for divorce on March 20, says Stephen subjected her to multiple physical beatings and threatened to release a sex tape.

Mel B may have splashed all her Spice Girls cash.

In a the filing earlier this year she wrote: I have tried to leave the Respondent many times. Every time I tried, the Respondent threatened me with violence and threatened to destroy my life in every way..

Stephen Belafonte, who denies all accusations and says hes been made to look like a bad guy, refutes the claims that Mel is hard-up after splashing her cash.

He says she makes between $220,000 and $250,000 a month after landing a $1. 587 million Americas Got Talent deal, adding that she makes $300,000 a year from her work with a nutrition company. Stephen Belafonte has been accused of abusing Mel.

In court, Belanfonte has also been accused of being involved in adult pornography and the importation of women from other countries to work in the industry as well as possible money laundering.

Lawyers for Belafonte have branded the allegations outrageous and unfounded, and nothing more than a smear campaign.

Mel B and Stephen Belafonte have a child together.

For more infomation >> Mel B has splashed all of her Spice Girls fortune as she returns to court in bitter divorce battle - Duration: 3:04.

-------------------------------------------

SPOILER ALERT – Emmerdale's Charity tells Debbie she's going to out cheating Frank - Duration: 4:45.

SPOILER ALERT – Emmerdale's Charity tells Debbie she's going to out cheating Frank

It's been a fair few months since Charity and Frank's little Home Farm scam ended up with them indulging in some impromptu late-night frolicking in the neighbouring woods.

But Frank's been kidding himself if he thinks Charity would ever let such a hefty bit of ammunition go to waste. Fuming, Charity tells Debbie that she's going to out Frank.

Megan, on the other hand, is none the wiser and thinks everything is rosy with her cheating Romeo. "Megan has definitely fallen for Frank," says Gaynor Faye, who plays the unlucky-in-love businesswoman.

"But for her, the worst possible scenario would be Frank cheating on her with Charity. It all starts innocently enough when Leyla convinces Megan to do a bit of business with Charity.

But despite them cracking open the bubbly over their new venture, Charity can't stand the sight of Frank and Megan looking all loved-up.

Fuming, Charity tells Debbie that she's going to out Frank, but then reassures him that she's not actually going to go through with it.

However, putting that particular genie back in the bottle is not going to be easy as David and Tracy have overheard the whole conversation.

Tracy confronts her dad about his indiscretion, but as everyone gathers for a family meal, will she and Charity keep their mouths shut? And if they don't, will Megan believe them?.

"Megan doesn't think that anyone would ever cheat on her," explains Gaynor. "And yet her ex-husband, Jai, did. Frank chased her for ages, so why would he then go elsewhere when he's got what he wanted?". Emma tries to silence Arthur.

When Emma Barton wants something sorted, woe betide anyone who gets in her way. When Emma Barton wants something sorted, woe betide anyone who gets in her way.

Now, the nurse is on a mission to track down that highly incriminating video of her conning Ashley into thinking he didn't see her on the bridge after James' fall.

What's more, she needs to spin Arthur a yarn about what she was 'really' doing with his dad. When Laurel finds her rifling though Mulberry Cottage, Emma just about manages to talk her way out of it.

But as Arthur gets more and more stressed by it all, he decides he really needs to tell his mum what's freaking him out.

The only trouble is Laurel's more worried about Arthur's recent bed-wetting, so she turns to Emma for advice – handing her son to the killer on a plate….

Lawrence is horrified to be confronted by Tim, wielding one of his own weapons. Will he pull the trigger?. You'd have thought that Lawrence would have learnt that intimidating people to get what he wants is not a good idea.

But when a handwritten letter arrives from Chrissie's biological uncle Tim (ex-Holby City actor Mark Moraghan), Lawrence can't resist going round mob-handed to warn him off. Job seemingly done, it's full steam ahead with the Home Farm clay-pigeon shoot.

As the event kicks off, though, Sam realises that one of the guns is missing and, later, Lawrence is horrified to be confronted by Tim, wielding one of his own weapons. Will he pull the trigger?.

Emma is on the hunt for Arthur's video.

Bernice's counselling session with Dan and Kerry doesn't go to plan.

Will Tracy tell Megan the truth about Frank and Charity.

Laurel asks Emma for help with Arthur.

Debbie helps Charity behind the bar at The Woolpack.   Emmerdales Rhona Goskirks stalker revealed as Pierce Harris mother Martha.

No comments:

Post a Comment