background preloader

4 Basic Life Lessons from Basic Training

4 Basic Life Lessons from Basic Training
Editor’s note: This is a guest post from Mike Inscho. If you’ve been a reader of The Art of Manliness for more than a day, you know Brett, Kate, and all of the regular contributors do a fantastic job of searching out and relaying habits of great men to us. Men like Ernest Shackleton, Henry David Thoreau, and Charles Atlas, all set examples that every man can follow. I haven’t attempted to take 27 men to the South Pole, and, after having my ship become stuck in ice, somehow managed to get them all home alive like Mr. As an enlisted member of the Army, and now an Officer, I’ve gone through what was essentially two separate stints at basic training. 1. When I would travel in high school, my bags were packed with everything that I might need in an encounter. Drill Sergeant, in his infinite wisdom, was about to teach me a more efficient way to pack my bags. One day we were told we were doing a ruck march the next day and were handed a packing list. How to Apply This Lesson to Everyday Life 2. Related:  Security InformationthinkinLIFEHACKS

Hackers Deface Entire MIT Website in Aaron Swartz Suicide Revenge Attack (Updated: Hackers Speak) Top 40 Useful Sites To Learn New Skills The web is a powerful resource that can easily help you learn new skills. You just have to know where to look. Sure, you can use Google, Yahoo, or Bing to search for sites where you can learn new skills , but I figured I’d save you some time. Here are the top 40 sites I have personally used over the last few years when I want to learn something new. Hack a Day - Hack a Day serves up fresh hacks (short tutorials) every day from around the web and one in-depth ‘How-To hack’ guide each week.eHow - eHow is an online community dedicated to providing visitors the ability to research, share, and discuss solutions and tips for completing day-to-day tasks and projects.Wired How-To Wiki - Collaborate with Wired editors and help them build their extensive library of projects, hacks, tricks and tips.

8 Things Everybody Ought to Know About Concentrating “Music helps me concentrate,” Mike said to me glancing briefly over his shoulder. Mike was in his room writing a paper for his U.S. History class. On his desk next to his computer sat crunched Red Bulls, empty Gatorade bottles, some extra pocket change and scattered pieces of paper. In the pocket of his sweat pants rested a blaring iPod with a chord that dangled near the floor, almost touching against his Adidas sandals. On his computer sat even more stray objects than his surrounding environment. Mike made a shift about every thirty seconds between all of the above. Do you know a person like this? The Science Behind Concentration In the above account, Mike’s obviously stuck in a routine that many of us may have found ourselves in, yet in the moment we feel it’s almost an impossible routine to get out of. When we constantly multitask to get things done, we’re not multitasking, we’re rapidly shifting our attention. Phase 1: Blood Rush Alert Phase 2: Find and Execute Phase 3: Disengagement

How to Pick Your Way Out of Handcuffs Editor’s note: This post was written by the ITS Tactical Crew and originally ran on ITS Tactical. Today we’ll be showing you how to pick your way out of handcuffs using only a bobby pin. We realize this may be a sensitive issue to some out there, as this information in the wrong hands could be detrimental; here’s our take. The current “swinging bow rachet – type” adjustable handcuff design dates back to 1912 when the Peerless Handcuff Company patented it. It’s an undisputed fact that handcuffs can be picked with a simple bobby pin, which reveals a fundamental problem with the lock design. How to Pick Your Way Out of Handcuffs Handcuffs, like the Model 100′s made by Smith & Wesson that we’ll show, are in use by law enforcement across the United States and abroad and available to purchase by nearly anyone for around $25. We hope that articles like this help to convince law enforcement that changes need to be implemented. Lock Mechanics The way a handcuff key works is simple. Notes

Top 10 Password Crackers SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner , Ncat network connector , and Nping packet manipulator ). We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. Click any tool name for more details on that particular application, including the chance to read (and write) reviews. 12 tools Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. version 1.1 on April 24, 2010 (2 years, 5 months ago). crackers wireless version 4.9.43 on Dec. 3, 2011 (10 months ago). sniffers traffic-monitors fuzzers Categories

50 Things Everyone Should Know How To Do | EvenCool Self-reliance is a vital key to living a healthy, productive life. To be self-reliant one must master a basic set of skills, more or less making them a jack of all trades. Contrary to what you may have learned in school, a jack of all trades is far more equipped to deal with life than a specialized master of only one. While not totally comprehensive, here is a list of 50 things everyone should know how to do. Edit: Do you like this post image? 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50.

The Six Most Interesting Psychology Papers of 2015 Every year, psychologists publish a staggering amount of research—it’s impossible to read it all. Still, I gave it a shot—and here are the six papers I found most fascinating. “Estimating the Reproducibility of Psychological Science,” from Science This paper isn’t really a study; it’s the outcome of an important movement in the field of psychology. In an effort called the Reproducibility Project, researchers at dozens of universities collaborated to replicate a hundred psychology studies that were initially conducted in 2008. Is that result bad or good? In other words, the desire for novelty drives researchers to overestimate the conclusiveness of their own work. “What Works in Inpatient Traumatic Brain Injury Rehabilitation? Finally, traumatic brain injury, or T.B.I., is becoming a topic of conversation. Some of the findings are surprising: if you’re female or Asian, you’re less likely to be given a psychotropic drug, regardless of evidence for its applicability.

Celebrate Every Day With Me: The Best Ever Picture Hanging Tip There is nothing like company coming over for a little motivation to clean your house and take care of those put-off tasks. (I’m sure you are much better than I am!) After painting my daughter’s room this summer, I have been lax at putting everything up on the walls. Half way through the task of hanging items on her wall, I stumbled on this amazing idea on Pinterest. What You’ll Need: A piece of wood and a small nail. How to Make It: Drive the nail through the wood just enough that you will leave a mark on the wall when pressed. Hang your mirror/picture on the nail, supporting it as needed. Put it in place on the wall and push. Update: For those leaving comments and not quite getting it, here is a little step-by-step recap. 1. 2. 3. 4. 5. 6.

Researchers crack the world’s toughest encryption by listening to the tiny sounds made by your computer’s CPU Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening — yes, with a microphone — to a computer as it decrypts some encrypted data. The attack is fairly simple and can be carried out with rudimentary hardware. The repercussions for the average computer user are minimal, but if you’re a secret agent, power user, or some other kind of encryption-using miscreant, you may want to reach for the Rammstein when decrypting your data. This acoustic cryptanalysis, carried out by Daniel Genkin, Adi Shamir (who co-invented RSA), and Eran Tromer, uses what’s known as a side channel attack. A side channel is an attack vector that is non-direct and unconventional, and thus hasn’t been properly secured. This might sound crazy, but with the right hardware it’s actually not that hard. Here you can see the frequency spectrogram of various CPU instructions (down the right hand side)

100 Free Online Ivy League Courses You Should Take Just for Fun | Eduk8 By Alisa Miller Even those without top notch grades can now go to Ivy League schools. With the the availability of open courseware classes coming out of some of the finest schools in America, the range of subjects is astounding. If you have ever wondered about the beginnings of Hip Hop, wanted to learn a new language, would like to create a film for social change, or are interested in learning about robotics while playing with Legos, then these courses are right up your alley. Health and Nutrition From an aging population to autism to creating chemistry in the kitchen, these < ahref=" courses provide interesting perspectives on health and nutrition issues. Health Across the Lifespan: Frameworks, Contexts, and Measurements. Fine Arts From the art of color to theater to music, these courses will expand your knowledge while learning something fun. Composing Your Life: Exploration of Self Through Visual Arts and Writing. Child Development and Psychology

Psychology History Compiled by Kathy Jo Hall (May 1997) Biography Theory Time Line Bibliography Carl R. Rogers is known as the father of client-centered therapy. Dr. Rogers is a leading figure within psychotherapy and developed a breaking theory of personality development. Rogers horizons began to expand when he encountered the Freudian psychoanalytic climate of the Institute for Child Guidance where he diagnosed and treated children. Rogers has authored over a hundred publications explaining his theory of personality development. Overview of Rogers Theory Theory of Personality Development Rogers' therapy was an extension of his theory of personality development and was known as client-centered therapy, since the basis of the therapy was designed around the client. In order for an individual to experience total self-actualization the therapist must express complete acceptance of the patient. 1.

Many uses for baking soda. - StumbleUpon While doing research for this article, we were amazed at the number of uses for baking soda. When one looks back in history, before we had such a huge array of different cleaning products, baking soda was one of the items most frequently used. It worked great, it was economical and best of all it was safe to use. In fact, Grandma had hundreds of uses for baking soda,we have collected some of the most popular ones. If you have additional tips involving uses for baking soda, add them at "Submit A Tip," and we add them to this list. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 31. 32.Sprinkle soda in tennis shoes, socks, boots and slippers to eliminate odor. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 48. 49. 50. 51. 52. 53. 54. 55. 56.For sunburn use a paste of baking soda and water it will help relive the burning and will help you from peeling as bad. We will be adding more uses for baking soda as we find them.

How to surf anonymously without a trace Skip to comments. How to surf anonymously without a trace ComputerWorld ^ | 12 March 2007 | Preston Gralla Posted on Tue Mar 13 14:29:37 2007 by ShadowAce The punchline to an old cartoon is "On the Internet, nobody knows you're a dog," but these days, that's no longer true. It's easier than ever for the government, Web sites and private businesses to track exactly what you do online, know where you've visited, and build up comprehensive profiles about your likes, dislikes and private habits. And with the federal government increasingly demanding online records from sites such as Google and others, your online privacy is even more endangered. But you don't need to be a victim. What they know about you Whenever you surf the Web, you leave yourself open to being snooped upon by Web sites. Sites use a variety of techniques to gather and collate this information, but the two most basic are examining your IP address and placing cookies on your PC. Protect yourself: Surf anonymously To: ShadowAce

Free Online Course Materials

Related: