How many steps should you take a day?

stock-photo-20249366-back-view-of-going-young-coupleMany people nowadays are taking a more healthy approach by taking steps to stay in shape. If you are a very active person and on your feet most of the day. Traveling back and forward to many different assignments with in your work area. Your probably don’t have to worry.

How many steps should you take a day? There’s been many researchers that have study this. A very active person usually takes 10,000 steps a day. If your strides are an average of two and half feet long. That’s close to 5 miles a day.
Many people have different stride length so a smaller person who takes shorter steps will be walking less on distance but could take same amount of steps. You can increase the walking speed to get more exercise out of your walking and burn more calories.

stock-photo-43494838-family-walking-dog-through-winter-woodlandClimbing stairs is another way burning calories. Maybe taking the stairs a few times a week instead of the elevator. There are many ways to increase your step count to get to your goal.

Ten Thousand steps is not easy to take on at the beginning.This is something that you gradually get to. If your are currently taking 3000 steps a day,and you want to get t0 10,000 steps a day.

Ystock-photo-40423300-business-people-commuting-of-hong-kongou start by increasing it by 500 a day. Do that for a week until you could manage it easy. Then increase it again 500 a day for another week.That’s 4000 now .

If you can successfully accomplish this week by week basis you will get to 10000 steps around 3 months. If do the math is about an increase of 2,000 a day per month increase.

How do you count your steps?

This is done by wearing what it’s call a Pedometer. Pivotal Living Tracker 1 (2nd Generation) Black

This device you wear it to keep track of your steps.First steps you take in the morning is when you get up. So is recommended to wear it when you get up until you go back to sleep later on.

Here are  ways that can help you increase your steps a day.

If you have a dog. Walking your dog is a nice way to get start it in the morning if you are a dog owner. Change your walking routines on a daily basis. Never take the same way everyday. Have a few different choices of ways you take your walking path. An alternate them daily.

stock-photo-16306943-young-woman-with-labradorIf you like shopping when you park at a store park. Park a little further. This way you walk further to the store to gain more steps on your daily routine.

If that’s store is a few blocks away. You can increase your steps a day by walking to the store instead of driving there.

Gardening around the house another way of gaining steps a day. You know do a little weeding.

Find neighbors who are interested in walking and see if you can form a little walking group thing going in your neighborhood.


A Person with sedentary lifestyle. May average about 1,000 to 3,000 steps a day. According to A sedentary lifestyle is a type of lifestyle with no or irregular physical activity.

A person who lives a sedentary lifestyle may colloquially be known as a slob or couch potato. couch-potato-1319240

Sedentary activities include sitting, reading, watching television, playing video games, and computer use for much of the day with little or no vigorous physical exercise.

A sedentary lifestyle can contribute to many preventable causes of death.

Screen time is the amount of time a person spends watching a screen such as a television, computer monitor, or mobile device.

Excessive screen time is linked to negative health consequences.

Engaging in a step program is great way to get some off the couch and into a little exercising. Set small goals that could be accomplish daily and slightly increase it by 1 week or 2. Taking steps is not really running or walking. But just keeping track of your steps.How many steps should you take a day? up to you. You take steps everyday anyways why not count them for a healthier you.



Thank you and feel free to leave me comment

or you can reach me in Wealthy Affiliates

Your Friend



How safe is your home?

How Safe are you with your Home?

This is a question that only gets answer when you have just become a victim of a break in. One of the worst feelings you can imagine. You come home thinking what your going to cook for dinner and other things on your mind.


You get Home and when you approach your door, you see that it’s open and your start feeling something is wrong. Your stomach starts to tremble and you step in the house. You just notice that you have been robbed and you feel like crap to put it politely.

First things you check is not what is worth more money but what is priceless. like a Family Jewel or item that is irreplaceable. This really sucks people. Don’t be a victim and protect yourself from what you think is not going to happen to you.

Nowadays the break ins are increasing. There’s no safe place anymore. You need to take the necessary steps to improve the security of your home and self preservation when confronted with an event you did not see for coming.

stock-photo-15466146-home-burglary-headlineYou know if you are not in the most safe place in the city. The first thing you should be thinking about getting to protect your home is a security system. When it comes to security systems you really have to do you research and see what system is right for you.

What do I mean by this? Are you single and don’t know crap about anything? Or are you the type that does everything and you know everything cause you GOOGLE it or you look in YOUTUBE for instructions.

The future of Electronic security is taking a turn into Do It Yourself security systems, One of the main reason this is possible, the advancement made in the wireless technology. Let’ not us forget the advancement in battery life power for these devices as well.

Easy installations, for some even this easy installation is not easy enough and they might require a Technician to install it. In this case you would not buy a DIY system. Your best bet will be looking for a company that will install system for you.

If the company is charging you to much for installation. i suggest you cancel and seek another company. The reason i say this. I been servicing and installing alarm systems for over 25 years. Wireless system are a cakewalk for any experience tech.

Usually when you sing up with an alarm company is for 3 to 5 year contract. There going to make over $3000 usually on an alarm contract. They can afford to pay the tech to install it and not charge you. You tell them what there getting for your signup they will comply normally and install it for free.

You have to remember something when considering a wireless system. How big is your house? These wireless devices have a range with the wireless signal. So when installing these wireless sensors you can’t have to much distance. If you keep range within 100 feet and not to many walls or obstructions in the way your good to go.


If you get system installed by a tech the best thing to do is TEST your system after the installation has been completed. Have the Technician wait before he leaves and test that everything works. You need to arm system and open every single protective area and make sure it reports properly.

Same goes if you did installation. Test system by arming it and then opening every alarm point to make sure everything is received by your alarm system. After your done testing your system call the monitoring station and make sure every signals was received.

I can help you with anything that you have a question for. If you have any questions on anything on this post please feel free to leave drop a comment or a question. Thank you



Please feel free to drop me a comment.

or You can reach me in Wealthy Affiliates.

Your Friend


How to Prevent CyberBullying.

How To Prevent CyberBullying.

In Reality you can’t ever prevent Cyber bullying .But you can take certain precautions and educate yourself.First thing identify the different forms of Cyber Bullying. Understand the different ways it can happen . Always remember that the Internet is Public.

verbal_abuse_by_emobunny07-d3bnq4vWay to look at it is ,if you are in a room full of strangers and people you know well.You would not say something stupid in the room or anything that can embarrass you or someone else.

Then don’t say it Online! Google never Forgives or Forget remember that. Please be careful what you put out there in messages, Do not share personal information that can be share or looked at by other people.

bullOn your Social networking sites check your privacy settings.This is so you can control who sees and what you don’t want seen.

You need to check privacy settings often due to ever changing internet policies.

Never share private information. Like details about yourself. Phone number,school or address.

The only person who should know your password is you and  the same people who put you in this World.Your Parents.

Don’t ever give your password away. Remember no internet service is ever going to send you a message asking for your password.

Educate yourself and others and share knowledge with your friends every where you go. Online ,at gatherings,

You can post it on your social sites. If you are witnessing a person being cyber-bully ,you should speak out . at this point you would need to encourage the friend being bully..


We have to set certain rules at home to make sure Kids don’t fall victims to cyber-bullying.

If you know a Child that’s being cyber-bully,tell them to seek out an adult immediately so they can do something about it.

Don’t get involve with any discussion online that can potentially involve you as a bully and you end up on the wrong side of the argument.

Video Full Movie On Cyberbully from Channel 4 Posted by legendofme26


Feel free to Drop me a Comment .

Or you can reach me at Wealthy Affiliates

Your Friend


Cyber Security

stock-photo-31068622-safety-concept-cyber-security-on-digital-backgroundCybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cybersecurity.

The New Cyber criminals have now ways to get backed up by Criminal organizations and or radical political groups.

Today’s Cyber criminal have more resources available to plan an Attack and have more technical knowledge. Most of these groups are not motivated by money alone.They are better organized and have funds available to them in many different ways.

stock-photo-3413560-teen-boy-in-the-darkThis is not just a kid in the basement breaking into big corporations for kicks and giggles.

New criminals know what to do with the stolen data they just got a hold of. The kid in the basement would not know what to do with that data.

Criminal organization knows exactly what to do or who to sell stolen intellectual property to on the gray or black market. Criminal organizations and nation-states have far greater financial resources than independent individuals.

Some of these organizations would look like a legitimate business with an office. Equipped with cubicles for computer operators( Cyber-criminals Station).  A receptionist to take calls from customer there scamming.That phone number they just called probably changes the next day.stock-photo-42016610-group-of-business-people-discussing-network-security

Not only do we face more sophisticated adversaries today, but the types of information of value to them are continually expanding as well.

These groups can do interesting things with the most seemingly innocuous bits of information.

The way attack strategies are design nowadays is not a direct attack against a high value server.

The new cyber criminal attacks a certain individual on the server there planning to break into. This is done by getting an individual to click an infested link.

stock-photo-31670732-hacker-programing-in-technology-enviroment-with-cyber-iconsResulting in the users computer getting infected by malware . At this point the malware acts as a control point so the attacker can gain root access to users  computers.

This malware most likely be running in the background. The attacker now has a control point inside the network. Allowing to further expand there attack.

“The key here is that instead of malware and network exploits being separate disciplines as they were in the past, they are now integrated into an ongoing process”.’ Key components of the advanced attack strategy include infection, persistence, communication, and command and control.”  …Resource: Cybersecurity For Dummies, Palo Alto Networks

Once the attacker has a hold of the shell access. First thing they do is exploit the target. After this, they deliver the malware in the background through the app that’s open already or connection.

stock-photo-42348230-virus-attackIn fact, based on its own research, Palo Alto Networks has found that as much as 90 percent of unknown or targeted malware capable of avoiding traditional antivirus technology is delivered from real-time web applications as opposed to corporate e-mail.

Normally attacks that are targeted will develop its own unique type of malware. Since these attacks are specifically customized for that specific target.These attacks are hard to detect. They avoid security by avoiding traditional antivirus detection.

The Primary role of malware attacks plays a central role in the attackers arsenal. An the life cycle of the attack. Cyber criminals have found waysstock-photo-62866222-malware-wordcloud-concept-illustration to deliver malware undetected. Hiding malware communications (with encryption), and avoiding traditional signature-based detection.

These attacks are sophisticated but they do have there vulnerabilities of their own. Today’s threats are networked threats that need your network to communicate. If a threat can’t communicate, the attack can be largely neutralized.

Also there is numerous opportunities exist in your network to detect. The fact that the attack has multiple steps to accomplish full attack.  If an attacker can infect targets, persist on, communicate with, and manage infected hosts, then the attacker can do almost anything.

Organizations need to focus on expanding visibility beyond the network perimeter — both inward and outward. This is best accomplished with network segmentation and a next-generation firewall to enforce central controls on internal and external (such as remote and mobile access) network traffic.

stock-photo-23331063-cyber-attack-headline The sky is NOT falling! Today’s threats are not so advanced that they are impossible to control. They are not completely new, just more common and better organized. Solutions do exist, and organizations can adopt best practices and adapt to changes in the threat landscape. Don’t fall into a trap. The attackers have evolved, but security has as well.





Feel Free to Drop a Comment

You can also find me in Wealthy Affiliates

contact me at:

Wish you all the Best




Resource: Cybersecurity For Dummies, Palo Alto

What to do when Password is stolen.


Most of us don’t practice good password management. To many times we would not create a unique password. We don’t care about creating a unique password each time a password is required.

It becomes a concern when a huge site that has a large amount of members gets hacked. If you are the type that uses the same password for everything.

You could be putting yourself at risk. Guess what? the bad guys know this.


I did some research and found ways you can protect yourselves if you think your password has been stolen. Because we can’t control website password practices.

Change your password .It is not as simple as you think. You must change the password for every account you used the same password. Now you got to think about what data did the hackers where exposed to.

There some people like to store all there information in there e-mail folders. Lets say you send it your self a password list so you can remember all your passwords.

The hacker got a hold of your email password now, he has access to all your other passwords.


If you think your accounts password for your Bank,Utilities  or any other places have been affected.

Make sure you call them and check if there’s been any activity.  Keep a record of everyone you have spoken to.

Is suggested you keep backups of your contacts. Criminals would erase your contact list so you can’t warn them of the scam.

Spread the word to Relatives and friends first, that your account has been compromised.


If you can Monitor your bank activities or if you have some kind of credit monitoring service that monitors your credit..

When using passwords use strong passwords.  You can save yourself  a big head ache just by using strong passwords.

Don’t use a simple password for everything. Use movie lines or catchy phrases you heard. Changed them them into a passwords.

Get creative at the same time,find a way to remember them.

Feel free to Drop me a Comment.

Or you can reach me at Wealthy Affiliates

Your Friend




Steps To Take When Cyber-bullied

When you have been a victim of cyber bullying.You must encourage your teenager  not to respond to the 12535053-please-stop-bullying-sign-on-white-backgroundcyber bully. Usually they will try many things to get you to respond to there messages. Don’t get tempted and get involve.

Don’t forward cyberbullying messages.Block the person who is cyberbullying. Save pictures and messages as evidence.and print screenshots, emails, and text messages.


Keep evidence of cyberbullying. Record the dates, times, and descriptions of instances when cyberbullying happened. Use this evidence to report cyberbullying to web and cell phone service providers. Cyberbullying often violates the terms of service.shutterstock_109449368-390x285

 Monitor your teenagers computer usage at all times.Try to report the person responsible for the bullying.If possible, use the Report Abuse button to report them.

If it is possible, block the cyber-bullies from future contact.Get in touch with the cyber-bullies parents if it is possible.When it gets really serious Like if you get Threats of violence.sexually explicit messages. Even  child pornography send to you or photos videos.Stalking and hate crimes to. At this point you need to report it to Law Enforcement.

21313123213213213213Use this opportunity to help your child recognize that they should never cyberbully anyone else because they know how it feels and it doesn’t feel

Contact your teenagers school to report the cyber-bullying and tell them exactly what has been happening.. Cyberbullying can create a disruptive environment at school. Most often is in-person bullying.


In the United States many states ,schools are required to address cyberbullying in there anti-bullying policy.

Some state laws also cover off campus behavior that is creating a hostile and unsafe environment in the School.


Check what you post before you post on your Social Channels  or any place your post can be seen on the internet.


Feel free to Drop me a Comment.

Or you can reach me at Wealthy Affiliates

Your Friend