

Elevate Your Career with AI & Machine Learning For Dummies PRO and Start mastering the technologies shaping the future—download now and take the next step in your professional journey!
CyberSecurity – What are some things that get a bad rap, but are actually quite secure?
Cybersecurity is an important issue for everyone, from individuals to large organizations. There are many things that get a bad rap when it comes to cybersecurity, but that doesn’t mean they’re not secure. For example, PGP (Pretty Good Privacy) is a method of encrypting emails that is considered to be very secure. However, it can be difficult to set up and use. Another example is using very long passwords that are actually a sentence. This may seem like a security risk, but it’s actually more secure than a shorter password because it’s more difficult for hackers to guess. Additionally, changing the default port for certain services like databases can help to prevent hacking. Unplugging the ethernet cable may also seem like a security risk, but it’s actually one of the most effective ways to prevent data breaches. Finally, browser password managers are often considered to be insecure, but they’re actually quite secure if used properly. Cybersecurity is an important issue, and there are many things that can be done to help prevent hacking and data breaches.
There are a lot of CyberSecurity myths out there. People think that X, Y, and Z are the most secure way to do things when in reality, they are the least secure. The biggest myth is that PGP is unbreakable. PGP has been broken many times and is not a reliable form of CyberSecurity. Another myth is that very long passwords are secure. The problem with very long passwords is that they are difficult to remember and often get written down somewhere. If a hacker gets ahold of your password, they can easily access your account. The best way to prevent CyberSecurity breaches is to use MFA, OAuth, and two-step verification whenever possible. These methods make it much more difficult for hackers to gain access to your accounts. While they may not be foolproof, they are the best CyberSecurity measure available.
1- PGP
PGP is a Form of Minimalism
As a protocol, PGP is surprising simple. Here is what happens if you want to use it to securely send a message to someone:
- You get from them a PGP identity (public key). How you do that is entirely up to you.
- Your PGP program uses that identity to perform a single public key encryption of a message key.
- Then the message key is used to encrypt the message which is added to the encrypted message key to make the encrypted message.
- Your correspondent does the opposite operations to get the message.
If you want to sign your message then you:
- Hash the message.
- Do a public key signature operation on the hash and attach the result to the message.
- Your correspondent checks the signature from your PGP identity, which they have acquired somehow.
The simple key handling is where the minimalism comes from. It is why PGP can be used in so many non-email contexts.
As a contrast, consider the Signal Protocol for instant messaging. I will not attempt to describe Signal in any detail as I would get parts of it wrong. It would also make for a pointlessly long article. There is a high level description of the Signal protocol here. None of the following comments are intended to be critical, they are intended to give an idea of the level of complexity of the protocol in total:
- Signal has at least 2 systems for creating forward secrecy. Each system requires a system to deal with loss of synchronization.
- A Signal session requires the storage and maintenance of a lot of state information.
- Signal normally uses a server based “prekey” system to deal with the case where a client is offline and thus is unable to negotiate.
- Signal achieves partial deniability with a triple Diffie-Hellman key exchange. OpenPGP achieves complete deniability by not signing the message in the first place.
- Supporting the Signal protocol in practice requires a separate system to store and protect past messages1). Since this is at odds with forward secrecy such a system will end up with a system to delete old messages.
The Signal Protocol is built on ideas from the Off the Record (OTR) protocol. Interestingly enough, OTR was intended to improve PGP by adding extra functionality. Signal adds functionality on top of the OTR functionality. So Signal could be considered the result of an attempt to improve something by making it more complex.
I believe that reliability and security are best achieved with simple systems. OpenPGP is a standard that describes such a system.
2- Very long passwords that are actually a sentence
It could be bad if you just came up with it and forget it, and people think it’s bad if it only has lowercase and no numbers or punctuation. But a 5-6 word sentence could be quite secure, especially if it’s a bit weird. “Lemons make a delicious snack in my house.”
3- Writing passwords down.
I tell all my old relatives to write their passwords down in a little notebook. As long as there isn’t someone there regularly I don’t trust, it is much better than using same password and if their physical security at their house is compromised, there are bigger concerns than a notebook of banking passwords.
We write down all the passwords to our most secure systems – but then we rip them in half and put them in 2 separate safes.
AI-Powered Professional Certification Quiz Platform
Web|iOs|Android|Windows
🚀 Power Your Podcast Like AI Unraveled: Get 20% OFF Google Workspace!
Hey everyone, hope you're enjoying the deep dive on AI Unraveled. Putting these episodes together involves tons of research and organization, especially with complex AI topics.
A key part of my workflow relies heavily on Google Workspace. I use its integrated tools, especially Gemini Pro for brainstorming and NotebookLM for synthesizing research, to help craft some of the very episodes you love. It significantly streamlines the creation process!
Feeling inspired to launch your own podcast or creative project? I genuinely recommend checking out Google Workspace. Beyond the powerful AI and collaboration features I use, you get essentials like a professional email (you@yourbrand.com), cloud storage, video conferencing with Google Meet, and much more.
It's been invaluable for AI Unraveled, and it could be for you too.
Start Your Journey & Save 20%
Google Workspace makes it easy to get started. Try it free for 14 days, and as an AI Unraveled listener, get an exclusive 20% discount on your first year of the Business Standard or Business Plus plan!
Sign Up & Get Your Discount HereUse one of these codes during checkout (Americas Region):
AI- Powered Jobs Interview Warmup For Job Seekers

⚽️Comparative Analysis: Top Calgary Amateur Soccer Clubs – Outdoor 2025 Season (Kids' Programs by Age Group)
Business Standard Plan: 63P4G3ELRPADKQU
Business Standard Plan: 63F7D7CPD9XXUVT
Set yourself up for promotion or get a better job by Acing the AWS Certified Data Engineer Associate Exam (DEA-C01) with the eBook or App below (Data and AI)

Download the Ace AWS DEA-C01 Exam App:
iOS - Android
AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version
Business Standard Plan: 63FLKQHWV3AEEE6
Business Standard Plan: 63JGLWWK36CP7W
Invest in your future today by enrolling in this Azure Fundamentals - Pass the Azure Fundamentals Exam with Ease: Master the AZ-900 Certification with the Comprehensive Exam Preparation Guide!
- AWS Certified AI Practitioner (AIF-C01): Conquer the AWS Certified AI Practitioner exam with our AI and Machine Learning For Dummies test prep. Master fundamental AI concepts, AWS AI services, and ethical considerations.
- Azure AI Fundamentals: Ace the Azure AI Fundamentals exam with our comprehensive test prep. Learn the basics of AI, Azure AI services, and their applications.
- Google Cloud Professional Machine Learning Engineer: Nail the Google Professional Machine Learning Engineer exam with our expert-designed test prep. Deepen your understanding of ML algorithms, models, and deployment strategies.
- AWS Certified Machine Learning Specialty: Dominate the AWS Certified Machine Learning Specialty exam with our targeted test prep. Master advanced ML techniques, AWS ML services, and practical applications.
- AWS Certified Data Engineer Associate (DEA-C01): Set yourself up for promotion, get a better job or Increase your salary by Acing the AWS DEA-C01 Certification.
Business Plus Plan: M9HNXHX3WC9H7YE
With Google Workspace, you get custom email @yourcompany, the ability to work from anywhere, and tools that easily scale up or down with your needs.
Need more codes or have questions? Email us at info@djamgatech.com.
Did I say passwords? I meant encryption keys.
4- Changing default ports for certain services like dbs
Most of the gangs out there use tools that don’t do a full search, so they go through the default port list
5- MFA in general.
Takes 60 seconds to set up, and an additional 5s each time you use it, but can save you hours if not days of manual recovery efforts with support to regain access to a compromised account. Yet people don’t like the idea.
If you are using TOTP for your MFA, you can even put it right in the browser with a plug-in. I use this approach for work. It’s very convenient.
If you use a password manager that supports TOTP and auto type (e.g. KeePassXC) then you don’t even need to mess with it once you have it set up.
6- Oauth for 3rd party apps.
Those “sign into our app with your (Google, Microsoft, etc) account” things. As long as you trust the ID provider and the app, it’s usually secure. More so, considering it prevents password reuse, and you aren’t exposed if any of those 3rd party apps have a breach.
7- Two-step verification.
Yes it’s annoying to need two devices every time you want to log into your most precious accounts, but trust me, I’d rather take the extra 10 seconds to authorize a login than go through the hell of having my account breached.
8-Biometric Authentication.
The argument is that ‘you can’t change your face/finger’ but it is actually more secure than other ‘magic link’ providers.
Let me be clear, there are some providers that are still iffy on security. But there are also some that have device native authentication (you need the device to auth), they don’t store passwords or password hashes, and only has public keys.
One example of this is https://passage.id/ which is about as secure as you can get.
9- Zoom.
Yes, they had a bunch of issues at the start, but they fixed them. I would much rather work with a company that had security assessments and fixed the problems rather than a company which has never been assessed.
10- Unplugging the ethernet cable.
11- Browser password managers?
Rant moment: reasons cybersecurity fails
<Rant>
People don’t see value of putting effort in cybersecurity because they don’t see any material gains from it. The best thing they can see is nothing bad happening.
No news isn’t good enough of a good news. This is enough to mostly ignore all cybersecurity advice altogether.
This is similar to people not taking care of themselves health-wise, because the best things they can see is not getting sick.
</Rant>
Why do cyber attackers commonly use social engineering attacks?
Hackers commonly use social engineering attacks because they can be very effective. By using social engineering, hackers can take advantage of people’s trusting nature and willingness to help others. They can also exploit the fact that people are often not well-informed about security and privacy issues. For example, a hacker might pose as a customer service representative and ask for someone’s password. Or, they might send an email that looks like it is from a trusted source, such as a bank or government agency, and ask the recipient to click on a link or download an attachment. If the person falls for the deception, the hacker can gain access to their accounts or infect their computer with malware. That is why it is important to be aware of these types of attacks and know how to protect yourself.
Cyber attackers commonly use social engineering attacks for a number of reasons. First, hacking into a person’s or organization’s computer systems is becoming increasingly difficult as security measures become more sophisticated. Second, even if a hacker is able to gain access to a system, they are likely to be discovered and caught before they can do any significant damage. Third, social engineering attacks allow hackers to bypass security measures and obtain sensitive information without being detected. Finally, social media platforms have made it easier for cyber attackers to obtain personal information about their targets and to carry out attacks. As a result, social engineering attacks are an attractive option for many cyber attackers.
To conclude:
Cybersecurity is often thought of as a complex and technical field, but there are actually many simple things that everyone can do to help stay safe online. For example, one way to protect your online communications is to use PGP encryption. This type of encryption is incredibly difficult for even the most skilled hacker to break, but it’s also easy to use. Another way to improve your cybersecurity is to use very long passwords that are actually a sentence. This may seem daunting, but using a phrase as your password makes it much harder for hackers to guess. Additionally, changing the default ports for certain services can help prevent unauthorized access. And finally, unplugging the ethernet cable when you’re not using it is a great way to physically block hackers from accessing your device. By following these simple tips, you can dramatically improve your cybersecurity and protect your privacy.
source: r/cybersecurity
Source: r/cybersecurity
- 9 Rewarding Cybersecurity Certifications That Pay Offby Techridge Solutions (Cybersecurity on Medium) on May 12, 2025 at 7:09 pm
Cybersecurity isn’t just a buzzword anymore — it’s the backbone of every modern business. From small startups to global enterprises…Continue reading on Medium »
- What I Read January 2018: Org Innovation, Strategy, Cyber Conflictby Michael Lortz (Cybersecurity on Medium) on May 12, 2025 at 7:06 pm
(Moving my past articles from my blog to here. Interesting to see what I was reading and writing about seven years ago. Many topics that…Continue reading on Hybrid Analyst »
- Best IT Consulting Firms in New Zealandby Susan Clinton (Cybersecurity on Medium) on May 12, 2025 at 6:55 pm
New Zealand is becoming a top place for technology and business. Many companies, big and small, need help with their IT (Information…Continue reading on Medium »
- Does the size of a company affect its average cost/loss due to cybercrime?by Brian J Lalla (Cybersecurity on Medium) on May 12, 2025 at 6:46 pm
ProblemContinue reading on Medium »
- Navigating the Cloud-Native Maze: An Observability-First Approach to IAM and DevOpsby Satbir Singh (Security on Medium) on May 12, 2025 at 6:46 pm
The digital landscape has transformed. We’ve embraced the dynamism of the cloud, the scalability of microservices orchestrated by…Continue reading on Medium »
- New article on blogby M S Sripati (Cybersecurity on Medium) on May 12, 2025 at 6:41 pm
Disclaimer — this is not the original article. Original article on — https://sripati.infoContinue reading on Medium »
- Traveling Smart with Primasim: Is eSIM Safe for Travelers?by PrimaSIM (Security on Medium) on May 12, 2025 at 6:40 pm
In a world where travel is more connected than ever, how we access mobile data while abroad is rapidly evolving. Enter eSIM — short for…Continue reading on Medium »
- How to Reset Kali Password Without Re-Installationby Toheeb Kayode Adisa (Cybersecurity on Medium) on May 12, 2025 at 6:37 pm
When I embarked on my cybersecurity journey, Kali Linux was my go to operating system, because of its robust suite of tools was both a…Continue reading on Medium »
- How to Safely Migrate a WordPress Site Without Downtimeby Shubradeb (Cybersecurity on Medium) on May 12, 2025 at 6:32 pm
Migrating your WordPress site can feel like defusing a bomb — one wrong move, and your website goes down. Whether you’re moving to a new…Continue reading on Medium »
- Fighting Financial Fraud and Inequality with AI: My Journey in Applied Researchby Md Tanvir Rahman (Cybersecurity on Medium) on May 12, 2025 at 6:19 pm
In an era where cyber-enabled financial fraud costs the U.S. economy billions and traditional credit systems continue to exclude large…Continue reading on Medium »
- HTB — Escape Write-upby Nikita Astashenko (Cybersecurity on Medium) on May 12, 2025 at 6:04 pm
Target IP: 10.10.11.202 Domain Names:sequel.htb Difficulty: MediumContinue reading on Medium »
- DPAPI Blob Huntingby Tom O'Neill (Cybersecurity on Medium) on May 12, 2025 at 5:58 pm
Be vewy, vewy quiet, I’m hunting secretsContinue reading on Medium »
- Cybersecurity for Beginners: 5 Mistakes You’re Probably Making (and How to Avoid Them)by Javier García - Cibersecurity Engineering (Security on Medium) on May 12, 2025 at 5:12 pm
Since the rise of the home computer as we know it in the 1970s, we’ve experienced many paradigm shifts.Continue reading on Medium »
- The Security Paradox: Why Blockchain Users Shouldn’t Have to Choose Between Control and Protectionby Liam Stein (Security on Medium) on May 12, 2025 at 5:08 pm
The Blockchain Security DilemmaContinue reading on Foolproof Labs »
- Who’s Knocking? — A Video Intercom as the Guardian of Your Homeby Smartopert - Smart-Home.Guru (Security on Medium) on May 12, 2025 at 4:26 pm
For over 30 years now, multi-unit buildings in Hungary have been equipped with door intercoms. Over the past decade, video intercoms have…Continue reading on Medium »
- Building a Secure Telehealth Platform with Amazon Chime SDK and WAFby AWS Cloud Architect (Security on Medium) on May 12, 2025 at 4:22 pm
IntroductionContinue reading on AWS Tip »
- Weird Leak? Favicon Caching Might Be Exposing Youby An0n (Security on Medium) on May 12, 2025 at 4:18 pm
"Metadata in Plain Sight: A Hidden Browser Fingerprint Vector" Continue reading on Medium »
- Django REST Framework: Authentication & Permissionsby Michal Dróżdż (Security on Medium) on May 12, 2025 at 4:02 pm
We’ll walk through how to secure your Django REST Framework API using Django’s default cookie-based authentication. You’ll…Continue reading on Medium »
- Privacy Notice dan Choice: Sebuah Peringatan, Penting namun Terabaikanby Barry Sahya (Security on Medium) on May 12, 2025 at 3:46 pm
Bahas peran privacy notice dan choice dalam perlindungan data, tantangan desainnya, serta pentingnya kepatuhan terhadap prinsip GDPR.Continue reading on Medium »
- O futuro da comida começa no campoby PovCast (Security on Medium) on May 12, 2025 at 3:02 pm
Diante do avanço das mudanças climáticas e da ameaça à produção de alimentos, o futuro da segurança alimentar global se desenha entre…Continue reading on Medium »
What is Google Workspace?
Google Workspace is a cloud-based productivity suite that helps teams communicate, collaborate and get things done from anywhere and on any device. It's simple to set up, use and manage, so your business can focus on what really matters.
Watch a video or find out more here.
Here are some highlights:
Business email for your domain
Look professional and communicate as you@yourcompany.com. Gmail's simple features help you build your brand while getting more done.
Access from any location or device
Check emails, share files, edit documents, hold video meetings and more, whether you're at work, at home or on the move. You can pick up where you left off from a computer, tablet or phone.
Enterprise-level management tools
Robust admin settings give you total command over users, devices, security and more.
Sign up using my link https://referworkspace.app.goo.gl/Q371 and get a 14-day trial, and message me to get an exclusive discount when you try Google Workspace for your business.
Google Workspace Business Standard Promotion code for the Americas
63F733CLLY7R7MM
63F7D7CPD9XXUVT
63FLKQHWV3AEEE6
63JGLWWK36CP7WM
Email me for more promo codes
Active Hydrating Toner, Anti-Aging Replenishing Advanced Face Moisturizer, with Vitamins A, C, E & Natural Botanicals to Promote Skin Balance & Collagen Production, 6.7 Fl Oz
Age Defying 0.3% Retinol Serum, Anti-Aging Dark Spot Remover for Face, Fine Lines & Wrinkle Pore Minimizer, with Vitamin E & Natural Botanicals
Firming Moisturizer, Advanced Hydrating Facial Replenishing Cream, with Hyaluronic Acid, Resveratrol & Natural Botanicals to Restore Skin's Strength, Radiance, and Resilience, 1.75 Oz
Skin Stem Cell Serum
Smartphone 101 - Pick a smartphone for me - android or iOS - Apple iPhone or Samsung Galaxy or Huawei or Xaomi or Google Pixel
Can AI Really Predict Lottery Results? We Asked an Expert.
Djamgatech

Read Photos and PDFs Aloud for me iOS
Read Photos and PDFs Aloud for me android
Read Photos and PDFs Aloud For me Windows 10/11
Read Photos and PDFs Aloud For Amazon
Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more)
Get 20% off Google Google Workspace (Google Meet) Standard Plan with the following codes: 96DRHDRA9J7GTN6(Email us for more)
AI-Powered Professional Certification Quiz Platform
Web|iOs|Android|Windows
FREE 10000+ Quiz Trivia and and Brain Teasers for All Topics including Cloud Computing, General Knowledge, History, Television, Music, Art, Science, Movies, Films, US History, Soccer Football, World Cup, Data Science, Machine Learning, Geography, etc....

List of Freely available programming books - What is the single most influential book every Programmers should read
- Bjarne Stroustrup - The C++ Programming Language
- Brian W. Kernighan, Rob Pike - The Practice of Programming
- Donald Knuth - The Art of Computer Programming
- Ellen Ullman - Close to the Machine
- Ellis Horowitz - Fundamentals of Computer Algorithms
- Eric Raymond - The Art of Unix Programming
- Gerald M. Weinberg - The Psychology of Computer Programming
- James Gosling - The Java Programming Language
- Joel Spolsky - The Best Software Writing I
- Keith Curtis - After the Software Wars
- Richard M. Stallman - Free Software, Free Society
- Richard P. Gabriel - Patterns of Software
- Richard P. Gabriel - Innovation Happens Elsewhere
- Code Complete (2nd edition) by Steve McConnell
- The Pragmatic Programmer
- Structure and Interpretation of Computer Programs
- The C Programming Language by Kernighan and Ritchie
- Introduction to Algorithms by Cormen, Leiserson, Rivest & Stein
- Design Patterns by the Gang of Four
- Refactoring: Improving the Design of Existing Code
- The Mythical Man Month
- The Art of Computer Programming by Donald Knuth
- Compilers: Principles, Techniques and Tools by Alfred V. Aho, Ravi Sethi and Jeffrey D. Ullman
- Gödel, Escher, Bach by Douglas Hofstadter
- Clean Code: A Handbook of Agile Software Craftsmanship by Robert C. Martin
- Effective C++
- More Effective C++
- CODE by Charles Petzold
- Programming Pearls by Jon Bentley
- Working Effectively with Legacy Code by Michael C. Feathers
- Peopleware by Demarco and Lister
- Coders at Work by Peter Seibel
- Surely You're Joking, Mr. Feynman!
- Effective Java 2nd edition
- Patterns of Enterprise Application Architecture by Martin Fowler
- The Little Schemer
- The Seasoned Schemer
- Why's (Poignant) Guide to Ruby
- The Inmates Are Running The Asylum: Why High Tech Products Drive Us Crazy and How to Restore the Sanity
- The Art of Unix Programming
- Test-Driven Development: By Example by Kent Beck
- Practices of an Agile Developer
- Don't Make Me Think
- Agile Software Development, Principles, Patterns, and Practices by Robert C. Martin
- Domain Driven Designs by Eric Evans
- The Design of Everyday Things by Donald Norman
- Modern C++ Design by Andrei Alexandrescu
- Best Software Writing I by Joel Spolsky
- The Practice of Programming by Kernighan and Pike
- Pragmatic Thinking and Learning: Refactor Your Wetware by Andy Hunt
- Software Estimation: Demystifying the Black Art by Steve McConnel
- The Passionate Programmer (My Job Went To India) by Chad Fowler
- Hackers: Heroes of the Computer Revolution
- Algorithms + Data Structures = Programs
- Writing Solid Code
- JavaScript - The Good Parts
- Getting Real by 37 Signals
- Foundations of Programming by Karl Seguin
- Computer Graphics: Principles and Practice in C (2nd Edition)
- Thinking in Java by Bruce Eckel
- The Elements of Computing Systems
- Refactoring to Patterns by Joshua Kerievsky
- Modern Operating Systems by Andrew S. Tanenbaum
- The Annotated Turing
- Things That Make Us Smart by Donald Norman
- The Timeless Way of Building by Christopher Alexander
- The Deadline: A Novel About Project Management by Tom DeMarco
- The C++ Programming Language (3rd edition) by Stroustrup
- Patterns of Enterprise Application Architecture
- Computer Systems - A Programmer's Perspective
- Agile Principles, Patterns, and Practices in C# by Robert C. Martin
- Growing Object-Oriented Software, Guided by Tests
- Framework Design Guidelines by Brad Abrams
- Object Thinking by Dr. David West
- Advanced Programming in the UNIX Environment by W. Richard Stevens
- Hackers and Painters: Big Ideas from the Computer Age
- The Soul of a New Machine by Tracy Kidder
- CLR via C# by Jeffrey Richter
- The Timeless Way of Building by Christopher Alexander
- Design Patterns in C# by Steve Metsker
- Alice in Wonderland by Lewis Carol
- Zen and the Art of Motorcycle Maintenance by Robert M. Pirsig
- About Face - The Essentials of Interaction Design
- Here Comes Everybody: The Power of Organizing Without Organizations by Clay Shirky
- The Tao of Programming
- Computational Beauty of Nature
- Writing Solid Code by Steve Maguire
- Philip and Alex's Guide to Web Publishing
- Object-Oriented Analysis and Design with Applications by Grady Booch
- Effective Java by Joshua Bloch
- Computability by N. J. Cutland
- Masterminds of Programming
- The Tao Te Ching
- The Productive Programmer
- The Art of Deception by Kevin Mitnick
- The Career Programmer: Guerilla Tactics for an Imperfect World by Christopher Duncan
- Paradigms of Artificial Intelligence Programming: Case studies in Common Lisp
- Masters of Doom
- Pragmatic Unit Testing in C# with NUnit by Andy Hunt and Dave Thomas with Matt Hargett
- How To Solve It by George Polya
- The Alchemist by Paulo Coelho
- Smalltalk-80: The Language and its Implementation
- Writing Secure Code (2nd Edition) by Michael Howard
- Introduction to Functional Programming by Philip Wadler and Richard Bird
- No Bugs! by David Thielen
- Rework by Jason Freid and DHH
- JUnit in Action
#BlackOwned #BlackEntrepreneurs #BlackBuniness #AWSCertified #AWSCloudPractitioner #AWSCertification #AWSCLFC02 #CloudComputing #AWSStudyGuide #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AWSBasics #AWSCertified #AWSMachineLearning #AWSCertification #AWSSpecialty #MachineLearning #AWSStudyGuide #CloudComputing #DataScience #AWSCertified #AWSSolutionsArchitect #AWSArchitectAssociate #AWSCertification #AWSStudyGuide #CloudComputing #AWSArchitecture #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AzureFundamentals #AZ900 #MicrosoftAzure #ITCertification #CertificationPrep #StudyMaterials #TechLearning #MicrosoftCertified #AzureCertification #TechBooks
Top 1000 Canada Quiz and trivia: CANADA CITIZENSHIP TEST- HISTORY - GEOGRAPHY - GOVERNMENT- CULTURE - PEOPLE - LANGUAGES - TRAVEL - WILDLIFE - HOCKEY - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION

Top 1000 Africa Quiz and trivia: HISTORY - GEOGRAPHY - WILDLIFE - CULTURE - PEOPLE - LANGUAGES - TRAVEL - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION

Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada.

Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA

Health Health, a science-based community to discuss human health
- Fired SpaceX employee with Crohn’s disease says bosses timed his bathroom breaksby /u/Forward-Answer-4407 on May 12, 2025 at 5:18 pm
submitted by /u/Forward-Answer-4407 [link] [comments]
- Sandwich recall issued as FDA warns of possible "fatal infections"by /u/newsweek on May 12, 2025 at 5:15 pm
submitted by /u/newsweek [link] [comments]
- Trump to sign executive order that aims to slash drug prices by 59%by /u/nbcnews on May 12, 2025 at 2:42 pm
submitted by /u/nbcnews [link] [comments]
- Trump health cuts create ‘real danger’ around disease outbreaks, workers warn | Key programs from child-support services to HIV treatment also gutted, leaving global populations vulnerableby /u/chrisdh79 on May 12, 2025 at 2:07 pm
submitted by /u/chrisdh79 [link] [comments]
- Key differences between Mounjaro and Wegovy as both go head-to-head in weight loss trialby /u/LADbible on May 12, 2025 at 1:48 pm
submitted by /u/LADbible [link] [comments]
Today I Learned (TIL) You learn something new every day; what did you learn today? Submit interesting and specific facts about something that you just found out here.
- TIL that in 1953, Ringo Starr developed tuberculosis and was admitted to a sanatorium, where he stayed for two years. While there, the medical staff attempted to alleviate boredom by encouraging patients to participate in the hospital band, resulting in his initial encounter with a drumset.by /u/milkywaysnow on May 12, 2025 at 8:01 pm
submitted by /u/milkywaysnow [link] [comments]
- TIL Taxi drivers are less likely to die from Alzheimer's disease. Having to memorize routes is hypothesized to have beneficial effects on the hippocampus, a brain structure involved in learning and memory, which degenerates in Alzheimer's diseaseby /u/Endonium on May 12, 2025 at 7:26 pm
submitted by /u/Endonium [link] [comments]
- TIL that while the Simpsons episode "Marge vs. the Monorail" is now considered one of the show's best, that was not always the case. When it first aired, many fans and even cast members cited it as the worst episode, as it abandoned a realistic tone for straight-up comedy.by /u/originalchaosinabox on May 12, 2025 at 7:11 pm
submitted by /u/originalchaosinabox [link] [comments]
- TIL that restaurateur Guy Fieri was born with the last name “Ferry” - but later changed it to “Fieri” in memory of his paternal grandfather, Giuseppe Fieri, an Italian immigrant who had anglicized his surname to Ferry upon arriving in the United States.by /u/waitingforthesun92 on May 12, 2025 at 6:06 pm
submitted by /u/waitingforthesun92 [link] [comments]
- TIL NYC subway stations have a "zebra board" on the platform that the train conductor needs to visually confirm and point at before opening doors - this ensures the train is stopped at the right place. The protocol originated in Japan, where the additional gesture helps to reduce cognitive errors.by /u/blueberrisorbet on May 12, 2025 at 6:02 pm
submitted by /u/blueberrisorbet [link] [comments]
Reddit Science This community is a place to share and discuss new scientific research. Read about the latest advances in astronomy, biology, medicine, physics, social science, and more. Find and submit new publications and popular science coverage of current research.
- A randomized, double-blind, placebo-controlled study determined that CB1 receptor antagonist selonabant was effective at blocking THC-induced effects in healthy adults, finding that selonabant significantly reduced "feeling high" and increased "alertness" in subjects compared to a placebo.by /u/OregonTripleBeam on May 12, 2025 at 5:12 pm
submitted by /u/OregonTripleBeam [link] [comments]
- Spoan Syndrome: A rare genetic condition found in a remote town where 'almost everyone is a cousin'by /u/clumsyinsomniac on May 12, 2025 at 4:39 pm
submitted by /u/clumsyinsomniac [link] [comments]
- Nobel Prize winners who moved more frequently or worked in multiple locations began their prize winning work earlier than did laureates who never moved. The researchers speculate that moving leads to laureates meeting more top scientists whose ideas can influence their own.by /u/geoff199 on May 12, 2025 at 3:51 pm
submitted by /u/geoff199 [link] [comments]
- Psychopaths Are More Attractive, Study Warns: A new study published in the journal Personality and Individual Differences examined how people perceive strangers' trustworthiness based on facial appearance alone.by /u/newsweek on May 12, 2025 at 2:58 pm
submitted by /u/newsweek [link] [comments]
- Meteorites and marsquakes hint at an underground ocean of liquid water on Mars. Seismic waves slow down in a layer between 5.4 and 8 km below the surface, which could be caused by the presence of liquid water.by /u/mepper on May 12, 2025 at 2:57 pm
submitted by /u/mepper [link] [comments]
Reddit Sports Sports News and Highlights from the NFL, NBA, NHL, MLB, MLS, and leagues around the world.
- The White Sox lost 121 games last season. This year’s Rockies have been worse so farby /u/Economy_Swim_8585 on May 12, 2025 at 10:37 am
submitted by /u/Economy_Swim_8585 [link] [comments]
- End of an Era: Virat Kohli Bids Farewell to Test Cricketby /u/Far_Road_11 on May 12, 2025 at 7:25 am
Video: 30th test century submitted by /u/Far_Road_11 [link] [comments]
- MLB-worst Colorado Rockies fire manager Bud Black after winby /u/PrincessBananas85 on May 12, 2025 at 5:24 am
submitted by /u/PrincessBananas85 [link] [comments]
- Bobrovsky stops 23 shots, Panthers top Maple Leafs 2-0 in Game 4 and tie series at two games apieceby /u/Oldtimer_2 on May 12, 2025 at 2:39 am
submitted by /u/Oldtimer_2 [link] [comments]
- Stars get disputed goal off Petrovic's skate to take 2-1 series lead over top-seeded Jetsby /u/Oldtimer_2 on May 12, 2025 at 1:44 am
submitted by /u/Oldtimer_2 [link] [comments]