Cleaning
clean bathroom tips
organize your closet
how to fix a leaky faucet
how to keep a clean kitchen
removing stains from your carpet
Money
how to coupon
what to do when you can’t pay your bills
see if you’re paying too much for your cell phone bill
how to save money
How to Balance a Check Book
How to do Your Own Taxes
Health
how to take care of yourself when you’re sick
things to bring to a doctor’s appointment
what to expect from your first gynecologist appointment
how to make a doctor’s appointment
how to pick a health insurance plan
a list of stress relievers
how to get free therapy

how to remove a splinter


how to avoid a hangover

Emergency
what to do if you get pulled over by a cop
a list of hotlines in a crisis
things to keep in your car in case of an emergency

how to do the heimlich maneuver

Food
recipes that take 30 minutes or less
Yummy apple thing
Brownie in a cup
Cookie in a cup
French bread pizza
Egg tacos
panera mac n cheese recipe
different salad recipes
harry potter recipes
healthy recipes
various cookie recipes
chocolate cupcakes w/ eggless cookie dough topping
s’mores pie 
nutella hot chocolate
peanut butter nutella swirl cookies
cookie in a mug
starbucks holiday drinks
fruit leathers 
brownie in a mug
how to make ramen 1000x better
eggless cookie dough (not to bake, just to eat)
make recipes using things you already have
how to put together a very fancy cheese plate 
make different flavored lemonades
various desert recipes
make tiny chocolate chip cookies
20 dishes every cook should know
learn how to make your own tea
Macaroni and cheese in a mug
Study snacks (2)
40 on-the-go breakfast recipes
Home
what the hell is a mortgage?
first apartment essentials checklist
how to care for cacti and succulents
the care and keeping of plants 
Getting an apartment
Job
time management
create a resume
find the right career
how to pick a major

how to avoid a hangover

how to interview for a job

how to stop procrastinating

How to write cover letters
Travel
ULTIMATE PACKING LIST
Traveling for Cheap 
Travel Accessories
The Best Way to Pack a Suitcase
How To Read A Map
How to Apply For A Passport
How to Make A Travel Budget
Better You
read the news
leave your childhood traumas behind
how to quit smoking

how to get a book published


how to knit


how to use a polaroid camera


how to solve a rubik’s cube


how to stop biting your nails


how to stop procrastinating


how to stop skipping breakfast


how to stop micromanaging


how to stop avoiding asking for help


how to stop swearing constantly


how to stop being a pushover

learn another language
how to improve your self-esteem
how to sew
learn how to embroider
how to love yourself
learn how to do yoga
100 tips for life
learn how to make your own cards

Cleaning

Money

Health

Emergency

Food

Home

Job

Travel

Better You

(via empathy-vs-apathy-nyc)

thenonbinarysafespace:

Please take this survey if you are nonbinary, and signal boost it afterwards. (Signal boost even if you aren’t!)

(via empathy-vs-apathy-nyc)

fyblackwomenart:

"Kirikou and the Sorceress" is a 1998 traditional animation feature film written and directed by Michel Ocelot. Drawn from elements of West African folk tales, it depicts how a newborn boy, Kirikou, saves his village from the evil witch Karaba.

fyblackwomenart:

"Kirikou and the Sorceress" is a 1998 traditional animation feature film written and directed by Michel Ocelot. Drawn from elements of West African folk tales, it depicts how a newborn boy, Kirikou, saves his village from the evil witch Karaba.

(Source: bewareofmpreg, via empathy-vs-apathy-nyc)

(Source: lgbtqblogs, via empathy-vs-apathy-nyc)

thepoliticalfreakshow:

The Heartbleed bug affects everyone save the most tech-illiterate doomsday preppers. It’s a severe security flaw so widespread that Google, Yahoo, Facebook, Tumblr, Instagram, Netflix, Wikipedia, and countless other sites have all fallen prey to it for the past two years. While those sites are busy patching their systems and checking for breaches, and while you are changing your passwords, I’ve got some more bad news for you: There is an even worse bug out there. It affects many of these same sites, and while the extent of its threat is not yet fully known, it should be taken very seriously. None of the major Internet companies have fixed this bug yet, and many of them are doing absolutely nothing about it.

The bug does not have a name. This is because the bug has not yet been found—at least, not by anyone who’s telling. But it is almost certainly there, and it’s likely there’s more than one of them. Right now, damage control efforts around Heartbleed are sucking up all the oxygen, but very soon it will be time for what engineers call a postmortem.

That discussion is going to be difficult. Anyone who tells you that there are positively no other bugs in OpenSSL code, where Heartbleed was found, or in any of the other core pieces of open source infrastructure, is full of it—or at least more optimistic than any competent engineer should be. OpenSSL is a networking security package in ubiquitous use by the biggest tech companies around. It is maintained by a part-time team of about 10 people, all but one of whom work a day job. OpenSSL co-founder Steve Marquess writes, “These guys don’t work on OpenSSL for money. They don’t do it for fame. They do it out of pride in craftsmanship and the responsibility for something they believe in.” Their hard work is effectively pro bono, their Web page asks for donations, and their budget is less than $1 million a year. They are not a nonprofit, because it “would require more of an investment in time and money than we can justify at present,” according to Marquess.

How do we minimize the risk that thoseunknown bugs aren’t exposing us too badly?

The good thing about the Heartbleed debacle is it’s sufficiently arcane that Congress isn’t going to be jumping in and Monday-morning quarterbacking the way they did with healthcare.gov. Unlike Apple’s embarrassingly simple “goto fail” bug in OS X, from February (which I explained here), Heartbleed requires a bit more technical knowledge to grasp. This xkcd comic explains it well; any C programmer will recognize it and shake their head, as it represents a sort of vulnerability all too common in C code. Here is the fix, which (a) seems good, but (b) makes me wish the code could be rewritten from scratch in a safer language. Unfortunately, that’s akin to wishing that the Los Angeles highway system or the New York subway system were rebuilt from scratch. Once code like this is out in the wild and everyone is using it, changing it even slightly is like switching horses midstream.

So I do not blame the engineers, who are the unappreciated sewer workers of the software world, doing the dirty job that keeps things running and getting very little appreciation for it. The bug was created by someone not even working on the project, who added a small feature that was reviewed by a single OpenSSL member, who also did not catch the bug.

Are there other zero-day bugs in OpenSSL, or in other core infrastructure like Apache or BIND? Almost certainly. And OpenSSL’s lack of funding is not the only problem. After all, Apple’s “goto fail” disaster was created by one of the richest companies on Earth. Target managed to lose 40 million credit-card numbers to hackers. Microsoft patches its Windows security vulnerabilities monthly if not more often—and sometimes it tells the government about them first—and somewhat shady operatives around the world trade so-called “zero day” exploits that haven’t yet been discovered by the security community. The NSA spends your hard-earned tax dollarspurchasing security exploits from firms like the French Vupen. In 2012, the going price for an unrevealed iOS exploit was up to $250,000, according to a Forbes investigation; a Windows exploit would only net you $120,000.

The NSA (and other purchasers) don’t reveal these exploits to security companies, tech companies, or the public; they keep them on hand for their own cyberoperations. Notably, the NSA’s Stuxnet virus, targeted against Iran’s nuclear centrifuges, used four zero-day bugs to help infect computers around the world before making its way into the firewalled Iranian nuclear intranet via an unsuspecting employee’s USB stick.

This is why the fuss over whether the NSA knew about Heartbleed is somewhat beside the point. If the NSA knew, they wouldn’t tell us. If the NSA didn’t know, they should have, since Russian and Chinese governments might have been using it against American computers for the last two years. And it’s certain they know of far manyother bugs that they aren’t telling anyone, even if they missed this one. And since the agency pretty much operates with no oversight whatsoever, to the extent that even their water-carrier Dianne Feinstein is now fed up with them for spying on her, we should not expect any of this to change.

My point is that unknown bugs are a reality, not a hypothetical, and a large part of the work of any security engineer is in minimizing the possibility of them happening. Heartbleed was unusually widespread and unusually severe, but it is hardly one of a kind. The actual extent of Heartbleed’s damage is still unclear. The potential jeopardy may well greatly outweigh the actual compromise, especially if few enough people knew about Heartbleed before its discovery last week by Google security engineer Neel Mehta. But as we are seeing, Google, Facebook, and the rest are taking serious action and the security community is all over the bug. They do not want to gamble that Heartbleed didn’t expose them too badly over the last two years. The logical next question is, how do we minimize the risk that those unknown bugs aren’t exposing us too badly?

It is not a simple question, because the problem is systemic, not individual. (I will have more to say about that in my next column.) For now, consider that the underpaid OpenSSL team does at least as good a job as comparable groups at Apple and Microsoft that have far better funding, and they did a far better job than Target, which ignored their security breach even as it happened. Johns Hopkins cryptography professor Matthew Green writes, “The OpenSSL developers have a pretty amazing record considering the amount of use this library gets and the quantity of legacy cruftand the number of platforms (over eighty!) they have to support.” I agree with Green. OpenSSL is asking for government and corporate support to give the project the attention that—as we now know—it needs. Let’s start by helping them out.

(via empathy-vs-apathy-nyc)

niki-van-awesome:

spring-loaded-jesus-candles:

fireghostshigher:

A quick PSA, because working in a New Age store I realize a lot of people don’t know this.  Keep in mind this is the simple version.

The fella on the left-hand side, that’s Gautama Buddha, the Buddha, the central figure in Buddhism.  Note that he is not considered a god, but a teacher and spiritual leader, the first to attain Enlightenment in his era.  Note also how thin he is.  This is because the Buddha fasted a lot.  He was born Siddhartha Gautama.  Buddha is a title, and not actually his name.

The fella on the right-hand side is not Buddha.  This is a common misconception in the West.  That is Hotai (or Budai or Hotei depending on the language), a Buddhist monk from China and folkloric hero.  Hotai is thought by many to be a Buddha, but he is not the Buddha.  Unlike Buddha, Hotai actually is revered as a god in Chinese folklore, although not in Buddhist practice.

This post is based on things I’ve been taught by my Buddhist coworker but if I forgot or mixed up something important and you are Buddhist and you notice, please let me know.

This has been an informational post.  Have a nice day.

FOR THE LOVE OF GOD EVERYONE READ THIS. READ IT. LEARN IT. PREACH IT.

I AM SO TIRED OF EVERYONE BELIEVING THIS MISCONCEPTION.

(Source: internetdoashouting, via empathy-vs-apathy-nyc)

ihopethisfindsyou1:

wwhatevver-ampora:

moewave:

ohh-tedbundy:

A true warrior.

I can’t believe he defeated Mr.Incredible

I love how he fuckin fuckin STOMPS on Fred Flintstone

watched this for like 10ish minutes and laughed the whole time 

(Source: notienedesperdicio, via thewinddance)

laughingatmynightmare:

Many of you have sent emails asking how on earth you could get a copy of my book before it comes out in October. THIS IS YOUR ONE CHANCE.

This is the Advanced Reader Copy of my book (of which I only have FOUR, so this is very rare). It is uncorrected, which means it has a bunch of things that will be slightly different in the final version, most of which you won’t even notice. This is top secret, which is why I’m only giving one away.

I’m going to donate 100% of the proceeds from this fundraiser to my nonprofit organization, Laughing At My Nightmare, Inc. Our mission is to rid the world of negativity by teaching people how to approach adversity with humor and positivity. I’ve seen first hand the life-changing effects this perspective can have on people, and if you’ve read any of my blog, you’ll know that too. I hope you’ll consider bidding not only so you can read my book early, but also to help my organization!

(Source: lgbtqblogs, via empathy-vs-apathy-nyc)