Thursday, June 17, 2010
June Seminar
Place: Lockport Ward Hamm Road, Lockport NY
Subject: Self Defense
"Good lesson in self defense--done in a tactful way. Thank you."
"Many good examples given"
"Thank you for the techniques you taught, they were simple to learn--good job."
"Good job! Very understandable--I hope I never have to use it."
"It was a very good seminar, I enjoyed it a great deal."
"It was a very interesting class and I will remember what you taught us. We love you."
"Very useful. I learned a lot."
"I loved it!!"
"Very impressive!!."
"Excellent!!! Every one needs to learn this information. It was very Enlightening!!! God Job!!!!"
"Super Class"
"The moves you taught seemed simple and very effective. The class gave me more confidence. I loved the quotes that you used--they were very empowering."
Saturday, May 8, 2010
Answering the Door
Sacramento police have seen a burglary spree that starts with a knock and ends with burglars coming face to face with homeowners. Police say the burglars break-in when no one answers the door thinking no one is home.
Burglars hit four homes last Thursday in just more than an hour. This time victims got a good description of the getaway car. And police caught up with three suspects in the suspected getaway car the next day.
Friday, April 16, 2010
When Walking
Tuesday, November 3, 2009
Self Defense Quizes
Each quiz is only 10 questions, and you get immediate feedback on how you did on each question, along with additional information on each question's topic. A fun way to learn self-defense.
Select a self-defense quiz below to get started!
General I - Information everyone should know
General II - More on what everyone should know
Women - You're female or want to help a female
Parents - For all guardians of children
Children - One just for the kids
Advanced - Various systems and techniques
Equipment - Personal protection and training equipment
Found originally on the following web site: http://www.selfdefenseresource.com/quiz/index.php
WHY PORTRAYING SELF CONFIDENCE IS IMPORTANT
Low self esteem or fearfulness looks like slouched shoulders; head down, arms folded in front or in pockets. Confidence looks like walking tall, shoulders back, head up, eye to eye contact, arms at the side. One statistic revealed that those trained in martial arts are less likely to ever be attacked because of the way they carry themselves. They’ve been trained to defend themselves and to not take a weak position. They have confidence.
Try this experiment. The next time you’re in a public place, mall, grocery store, the beach, no matter, walk past all the people and look them directly in the eye. You might want to smile a little or offer a “how ya doin’?” so they don’t think you’re stalking them. You’ll be amazed at the number of people who will not look at you. They’ll look down or away but not at you. Of course, in some cultures it’s not proper to look people in the eye. Be sensitive to that. But in many circles you will find it hard to find 10 people who will look at you.
By you looking at them, in some subconscious way you’re communicating that you are not afraid. You’re not sending nonverbal clues that you lack confidence. To get into the practice of always looking people in the eye, take it one step further and see what color eyes they have. It only takes a quick glance, you’re not starring down people but if you make an effort to determine eye color, you can be confident that you’re properly looking people head on in the eyes.
Get your hands out of your pockets when you walk. Uncross those arms that are locked across your chest. Not only does it look stronger and friendlier to have open arms, it’s safer. Should the need arise that you need to thwart off a would-be attacker; you’re going to need your arms to free yourself. How easy it is for one to come up from behind you and grab you if your arms are tucked neatly away? You’re just making it easy. How can you poke out eyeballs, or jab Adam’s apples or throw an elbow to the ribs if your arms are hugging yourself.
“But I AM scared,” you confess. There are two things you can do about that. One is take some self defense classes and learn how to not be afraid. The other and immediate method to change how you project yourself is to fake it until you make it. You may be scared out of your wits, but if you get the self talk going, “I am NOT afraid” and get the body language to follow it, head up, shoulders back, arms open, then you’re at least giving the allusion that you are not a weak prey.
Half of your battle is in the mind. Do something about it.
Written by Emily Clark
To read the entire artcile please go to the following web site http://www.selfdefenseresource.com/women/articles/confidence.php
Parking Lot Safety Tips
If you have gone shopping make sure you are not distrcated by your bags, children---have your keys out and ready.
If you don't feel comfortable walking to your car by yourself, ask some one to walk out with you or when you see a group of people that you feel comfortable with walk out with them. At many places there are security guards, they get paid to make sure you are safe so use them if you feel comfortable around them.
Before getting into your car look around, under and in it
Park close to the place that you are going into specially if you know you may be getting out during the night (dark)
Report suspicious looking and loitering people
Tuesday, October 13, 2009
Cyber Self Defense
Security researchers are warning that Web-based applications are increasing the risk of identity theft or losing personal data more than ever before.
The best defense against data theft, malware and viruses in the cloud is self defense, researchers at the Hack In The Box (HITB) security conference said. But getting people to change how they use the Internet, such as what personal data they make public, won't be easy.
People put a lot of personal information on the Web, and that can be used for an attacker's financial gain. From social-networking sites such as MySpace and Facebook to the mini-blogging service Twitter and other blog sites like Wordpress, people are putting photos, resumes, personal diaries and other information in the cloud. Some people don't even bother to read the fine print in agreements that allow them onto a site, even though some agreements clearly state that anything posted becomes the property of the site itself.
The loss of personal data by Sidekick smartphone users over the weekend, including contacts, calendar entries, photographs and other personal information, serves as another example of the potential pitfalls of trusting the Cloud. Danger, the Microsoft subsidiary that stores Sidekick data, said a service disruption almost certainly means user data has been lost for good.
Access to personal data on the cloud from just about anywhere on a variety of devices, from smartphones and laptops to home PCs, shows another major vulnerability because other people may be able to find that data, too.
"As an attacker, you should be licking your lips," said Haroon Meer, a researcher at Sensepost, a South African security company that has focused on Web applications for the past six years. "If all data is accessible from anywhere, then the perimeter disappears. It makes hacking like hacking in the movies."
A person who wants to steal personal information is usually looking for financial gain, Meer said, and every bit of data they can find leads them one step closer to your online bank, credit card or brokerage accounts.
First, they might find your name. Next, they discover your job and a small profile of you online that offers further background information such as what school you graduated from and where you were born. They keep digging until they have a detailed account of you, complete with your date of birth and mother's maiden name for those pesky security questions, and perhaps some family photos for good measure. With enough data they could make false identification cards and take out loans under your name.
Identity theft could also be an inside job. Employees at big companies that host e-mail services have physical access to e-mail accounts. "How do you know nobody's reading it? Do you keep confirmation e-mails and passwords there? You shouldn't," said Meer. "In the cloud, people are trusting their information to systems they have no control over."
Browser makers can play a role in making the cloud safer for people, but their effectiveness is limited by user habits. A browser, for example, may scan a download for viruses, but it still gives the user the choice of whether or not to download. Most security functions on a browser are a choice.
Lucas Adamski, security underlord (that's really what his business card says) at Mozilla, maker of the popular Firefox browser, offered several bits of cyber self defense advice for users, starting with the admonition that people rely on firewalls and anti-virus programs too much.
"You can't buy security in a box," he said. "The way to be as secure as possible is about user behavior."
There is a lot of good built-in security already installed in browsers, he said. If you get a warning not to go to a site, don't go to it. When you do visit a site, make sure it's the right one. Are the images and logos right? Is the URL correct? Check before you proceed with filling in your username and password, he counseled.
Software updates are vital. "Make sure you have the most up-to-date version of whatever software you use," he said. Updates almost always patch security holes. Key software programs such as Adobe Systems' Flash Player and Reader are particularly important to keep updated because they're used on so many computers and are prime targets for hackers.
He also suggested creating a virtual machine on your computer using VMWare as a security measure.
"It's really hard to get people to change their browsing habits," he said. People want to surf the Web fast, visit their favorite sites and download whatever they want without thinking too much about security. "Educate them, move them along, but don't expect them to become security experts."
Internet browser makers take great care in building as much security as possible into their products and putting them through rigorous testing.
The security team for Google's Chrome browser, for example, will take the first crack at any major update to the software, hacking away to find vulnerabilities or ways to improve security, said Chris Evans, an information security engineer at Google.
After the Chrome security team takes a whack at the software and it is reworked to fix the holes they found, other security teams at Google will have a go at the product to see what trouble they can cause. Finally, the software is released in beta form, and private security researchers and others can hack away. Any problems are fixed before the final release goes out and then the Chrome team stands ready to make new patches for any other security issues that crop up.
Despite all the testing, browser makers are only one part of the security solution because they have no control over Web software or user browsing behavior.
The cloud is the Wild West: hackers and malware makers abound, phishers seek passwords and users do whatever they want to, recklessly surfing and downloading potentially dangerous content as judged by security researchers.
Companies developing Cloud applications and services will need to do more for Web security. Amazon.com with its Web Services and Google as it moves forward with initiatives, such as Google Docs, that attempt to draw people to Web applications and away from computer applications will need to work more closely with security researchers, Meer said.
And Google's work on the security in the Chrome browser highlights the reason why: Computer applications such as Chrome face intense scrutiny by security researchers throughout the Web, while Web applications do not.
"Reverse engineering keeps [big software companies] honest," said Meer. "If they hide something in the software code, sooner or later someone finds it. With Cloud services, you just don't know because we simply cannot verify it."
Cloud applications are built by one company, and nobody is looking at the code or how safe it is, said Meer. Applications for computers are different. They can be ripped apart by security experts then put back together stronger so there are no security holes, he said.
"Trust but verify," said Meer. "Just because a guy does no evil today, we cannot trust that they will do no evil tomorrow because we simply cannot verify it."
http://www.pcworld.com/businesscenter/article/173467/researchers_advise_cyber_self_defense_in_the_cloud.html