Please email me at:
Or use the form below.
[contact-form 1 “Contact form 1”]
The no-pants guide to spending, saving, and thriving in the real world.
No one likes to think about the possibility of dying too young. But knowing that potential exists, you take the smart step of protecting those you love by carrying term life insurance. But what about preventing the worst? Did you know your iPhone or Android device can call for help or record vital information if you ever find yourself in a life-threatening situation? Here are five personal safety apps that could save your life.
1) myGuardianAngel
Once this app allows you to reach all of your emergency contacts with the push of one button. You enter the contact information for anyone you would want to get in touch with if you were in any sort of emergency as soon as you download it. If you are in an emergency, the app will call your contacts, send them an e-mail with your GPS location and immediately begin recording audio and video from your phone.
2) StaySafe
This app is good for anyone who works or travels alone. You can schedule the app to automatically notify friends or family after a certain period of time when your phone is inactive. For example, you can estimate how long you expect to drive from one location to another on your own and then the phone will contact someone automatically if you are out of contact longer than expected. That way your friends will know to send help because something is wrong, even if you aren’t in a position to contact them yourself. StaySafe sends your contacts a detailed GPS location for you so that they can easily find you and bring help.
3) RESCUE
This full-service app can help you on the scene as well as notify your emergency contacts for you. If you are in trouble, you can trigger the app to sound a loud alarm that might frighten off anyone who might be planning to do you harm. The alarm can also help someone find you if you are lost or unable to move from your current location. When the alarm is triggered, the app will also send immediate notifications to your emergency contact list so that they can begin to send help right away. Emergency services such as the police and fire department can also be set for notification through the RESCUE app.
4) Night Recorder
This is a good app to have when you need to make a quick recording of your surroundings for any reason. The app can be set to begin recording at a touch. If you are stranded, you could create a recording by speaking about the landmarks you can see and explaining how you got to your current location. The recorder can then send an email of your recording to anyone on your contact list.
5) iWitness
With this app, you can instantly make video or audio recordings of your situation so that there is a permanent first-hand record of everything that happens. It is a handy tool for anyone who has been in a car accident or involved in a medical emergency because you can go back and look at the video to see exactly what happened if there is any question about it later. The app will also contact emergency services or your personal emergency contacts if you are in trouble. The built-in GPS locator will transmit your exact location so that people can find you quickly and easily.
Post by Term Life Insurance News
I’ve been walking though my analytics data. That is the Big Brother software I use to know everything about each one of my dear readers. It’s all part of my master plan to rule the world. Muwahaha!
Some of the results are interesting.
The single most-used search term to find this site is “slow carb diet“, which is great, because I really enjoyed writing that post. I’ve been slacking on the diet lately, but I’m still down more than 30 pounds. I’m currently ranked #3 in Google for this term. If I move up 2 more spots, I’ll outrank Tim Ferriss for his own product. If I aggregated all of the “slow carb” variations, this post probably accounts for more than half of my traffic from Google.
Many of you come here by searching for “how to have a perfect life“. I’ll do everything I can to help you achieve that, but it’s going to take work on your part. There are no shortcuts.
“Beat the Check” is another popular search term, but a very bad game to play. It’s almost impossible to win it, since the Check 21 Act of 2004.
It’s interesting that “trained husband” brings a few of you each month. My question: are you shopping, or exploring a new fetish? Don’t be shy.
I’m a bit amazed that “zombie wheels” is something people actually search for, but 140 people hit Google looking for that term every month, and a few of them make it over here.
“How to stretch a meal“, “things you should buy online“, and “unsecured loan advice” are some of the top personal finance terms bringing you all in, though “how to make a bunker” and its variation are popular, too.
“Hoe can you force your wife” is a bit disturbing. Most of the results are naturally for sex. I can’t help but hope that I’ve either really disappointed this visitor, or convinced him that force is a bad idea.
“How much did a pound of gold weigh in 1854?” is a search that makes me giggle. To the best of my knowledge, the troy scale has been used to weigh gold for a lot longer than that.
That was a fun little stroll through my statistics. Hopefully the fact that I used “fetish” and “sex” in a post will draw more crazy search terms.
How did you find me? Inquiring minds want to know, so please tell me in the comments.
Skip to the bottom if you’re familiar with PRISM and don’t want to hear any political talk and rampant violations of our Constitutional rights, but still want to protect your privacy.
For those of you who haven’t been paying attention, the PRISM program is an NSA program to monitor electronic activity.
Lots of electronic activity.
The companies identified to be working with the NSA in this grand overreach include AOL, Apple, Facebook, Google, Microsoft, PalTalk, Skype, Yahoo! and YouTube. For most people, that is the definition of “the internet”. If you’re doing it online, the NSA is–or could be, at their leisure–watching.
This isn’t a crazy conspiracy theory. This is happening, and the government has admitted it. In fact, when this broke, the executive branch’s response was along the lines of, “Don’t worry, we’ll find the guy who leaked this information.”
On top of that, the government has been demanding phone records from at least Verizon on a daily basis.
In addition, the Justice Department was just busted wiretapping Associated Press phones.
Seriously, if you put this in fiction, nobody would buy it, because it’s ridiculous in the land of the free.
As far as the people who say I’ve got nothing to worry about if I’m not doing anything wrong: shut up. You can speak again when you give me your email passwords, bank records, and let me install a toilet cam in your house. What are you trying to hide?
Seriously, there is such a mess of non-legislative administrative regulations that are considered felonies that the best estimate is that most people commit three felonies a day, without realizing it.
When we live in a system with so many rules that have never been voted on and our legal system refuses to consider legitimate ignorance of the law to be a defense and we have a collection of secret laws that are a felony to disclose or violate, government spying gets far more dangerous.
The Foreign Intelligence Surveillance Act of 1978(FISA) is the law the NSA is using to justify all of these data requests. The law, that we all must obey, is being overseen by a small subcommittee in Congress, and the FISA courts are just a small subset of the judges. The judges are signing warrants allowing the wiretaps and massive surveillance, but that is clearly unconstitutional and, hence, illegal.
The text of the Fourth Amendment to the Constitution, the supreme law of the United States is: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
Any warrant that cannot name a place to be searched is illegal.
Any warrant that cannot describe the person to be monitored is illegal.
Any warrant that is not backed by probable cause is illegal.
Tell me how “I want to watch what everyone is saying on Facebook and seize all of the data” meets any of those criteria.
Bueller?
Wiretapping the AP is a serious violation of the First Amendment, too. “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.”
“Congress shall make no law…abridging the freedom of speech, or of the press..and to petition the Government for a redress of grievances.”
Monitoring the press in case somebody breaks a story the government doesn’t want broken is crap.
How can we petition the government for redress of grievances that they call a felony if the company discloses the violation to us? It’s self-serving circular crap.
When you throw the IRS harassing charities working for the “wrong” politics, you start to pine for the good old days of Nixon-level fair play and integrity.
To be fair, FISA got nasty with the Patriot Act, which was an abomination enacted by a different political party. Hey, Washington, next time try to remember that your laws will someday be administered by your political enemies, k? (NSA: I trust you’ll pass the message for me?)
There are four main pieces to discuss, based on the scandalous Constitutional violations reported recently.
1. Social media monitoring. There’s nothing to this. If you post things on Facebook, the government sees it and knows it’s you. Don’t post anything you don’t want broadcast to the police, your grandmother, and your priest.
2. Internet browsing. There is very little that is secure on the internet. The government can subpoena your ISP and get any records they keep. Unless you go anonymous and encrypted. Welcome to TOR. The Onion Router is a system that encrypts your internet traffic and bounces it all over the world. Once you enter TOR, nothing you do can be tracked, until your internet request leave the TOR system. The system is not centrally owned or controlled, so nobody in the system can track what you are doing.
For example, if I use the TOR browser to search Wikipedia, a snoopy NSA goon could tell I’m using it, and they could tell there was a request from the TOR system to Wikipedia, but they can’t tie one request to the other. If I’m dumb and log into Facebook, I lose that anonymous shield.
That’s solid protection from anyone watching your internet traffic.
How do you use it?
Easy. Just install the Tor Bundle. When you want the NSA to stop snooping over your shoulder because you want to do a search on erectile dysfunction, you launch TOR and the TOR browser and search without having to share your embarrassing secrets.
3. Email. Email is easily the least secure means you can communicate. When you send an email, that message is in plain text, and it bounces from server to server until it reaches the recipient. Any of the involved servers can keep a log of the traffic and read your email.
Never, ever, ever, ever put anything incriminating or important in an email. Don’t send credit card numbers, your social security number, or the address of your meth lab.
But what if you want to have a dirty conversation with your spouse without letting the sick voyeurs at the NSA listen to you ask your wife what she’s wearing and how would she like it torn off?
Use PGP. OpenPGP is a free software encryption program that is basically impossible to decrypt. It’s known as public-key encryption, which means that anybody can encrypt a message to you that only you can read.
It’s like magic.
To use PGP, the easy way(for Windows users) is to get Gpg4win. Install that, then open Kleopatra. This will let you generate your encryption key. You do that by:
You now have a set of PGP keys. To get your public key that others can use to send you messages, right-click your certificate and select “Export certificates”. Pick a path to save the certificate, then do so. You can open this file with notepad to get your public key, or you can email the file out. There is no need to worry about security with this file.
You will end up with something that looks like my public key here:
—–BEGIN PGP PUBLIC KEY BLOCK—–
Version: GnuPG v2.0.20 (MingW32)mQENBFGyPPkBCAC8zc5B7srG/ZyRMpokP3KyIMd9GA4n94wT89sP/yWFylbTKXDM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=fHba
—–END PGP PUBLIC KEY BLOCK—–
To get your private key, that you can use with any number of plugins for your email client, right-click on your certificate and select “Export secret keys.”
You can either use PGP as a plugin for your email client, or you can use Kleopatra’s feature “Sign/encrypt files”. To do that, write your message in a file, then select the feature inside Kleopatra. You’ll end up with an encrypted file you can attach to your email that snoopy government man can’t read.
4. Phone calls. This would appear to be harder, since your phone is largely out of your control. There’s nothing practical you do about a landline, except to avoid saying anything sensitive. On your cell phone, you have options, assuming you use a smartphone.
For Android users, it’s free an easy. Install Redphone. If you place a call with Redphone, it checks to see if the caller also uses Redphone. If he does, it places an encrypted call over your data plan to the other phone. Nobody can listen in to an encrypted call. The same company also makes a program for texting.
For iPhone users, you’re stuck with Silent Circle for $10/month, which may be a better option, since there is support for more devices, including Android. It was designed by the guy who designed PGP and handles texting and email, too.
There you are, the whats, whys, and hows of modern, hassle-light, private communications. Doing what we can to foil bad government programs is our patriotic duty.
“Walk on road, hm? Walk left side, safe. Walk right side, safe. Walk middle, sooner or later, [makes squish gesture] get squish just like grape. Here, karate, same thing. Either you karate do “yes”, or karate do “no”. You karate do “guess so”, [makes squish gesture] just like grape. Understand?” -Mr. Miyagi
It occurred to me that lately, I’ve changed my day-to-day cash flow plans a couple of times.
A year ago, I was running on a fairly strict cash-only plan.
A month ago, I was running on a strict budget, but doing it entirely out of my checking account.
Now, I’m loosening the budget reins, and moving all of my payments and day-to-day spending to a credit card, including a new balance that I can’t immediately pay off.
The thing is, changing plans too often scares me. Like the quote at the beginning of this post, I start worrying about being squished like a grape.
The simple fact is that any plan will work.
If you want to get out of debt, just pick a plan and run with it. If that means you follow Dave Ramsey and do the low-balance-first debt snowball, good for you. Do it. If you follow Suze Ormann and do a high-interest first repayment plan, great. Do it. If you follow Bach and pay based on a complicated DOLP formula to repay in the quickest manner, wonderful! Do it!
Just don’t switch plans every month. If you do that, you’ll lose momentum and motivation. Squish like grape! Just pick a plan and go. It really, truly does not matter which plan you are following as long as you are following through.
This applies to other parts of your life, too. For example, there are a thousand fad diets out there. Here’s a secret: they all work. Every single one of them, whether it’s Weight Watchers, slow carb, or the beer-only diet. The only thing that matters is that you stick to the diet. If you manage that, you will lose weight on any diet out there. Except for the jelly bean and lard diet. That one will make you extra soft.
Another secret: the productivity gurus are right. Every single one of them. David Allen, Stephen Covey, Steve Pavlina, and the rest. They all have the One True Secret to getting the most out of your day. Really. Pick a guru and go! But don’t try to Get Things Done in the morning and do 7 Habits at night. Changing systems, changing plans, changing your mind will make you sabotage yourself.
The real secret to accomplishing great things, whether it’s paying off $100,000 of debt, dropping 40 pounds in 3 months, or tripling your productivity is to do it. Just get started and, once you’ve started, don’t stop. If you keep going and stay consistent, you’ll accomplish more than anyone who hops from system to system every few weeks.
I hate scammers. Whether it’s the garage-sale shoplifter, telemarketing “charities” with 99% overhead, 3-card-monte
dealers, or the guy who begs Grandma for cash every week, they all need to be strung up. Since vigilante justice is generally illegal and occasionally immoral, it’s best to just avoid the problems from the start. Here are some scams to watch out for.
Pyramid Scams – All of the little parties people throw to earn free items at the expense of their friends are pyramid schemes. Most of those are legitimate money-sinks. A few, however, exist solely to get their “consultants” to bring in more consultants. The sales aren’t the actual way to make money. If you don’t have anyone “downstream” you won’t make any money. If the focus isn’t on selling an actual product or service, but is instead on bringing in people under you, you have entered the world of pyramid scams. Generally illegal and always immoral. Don’t sign up and, if you do, don’t ask me to participate.
Advance Fees and Expensive Prizes – If you win a contest and you are expected to send money to claim your prize, it is a scam. You don’t have to pay sales tax in advance. You don’t have to pay transfer fees. Real prizes are delivered free, accompanied by a 1099, because prizes are income. No prize requires pre-payment. No loan service requires “finder’s fees”. If it doesn’t sound right, don’t pay it and certainly don’t give your bank information to anyone you can’t verify.
Work at Home – The most common work-at-home job I’ve found is stuffing envelopes. You see the signs on telephone poles all over the city. “Make $10/hour stuffing envelopes from the comfort of your own home! Just send $50 to….” When you get the instructions, you are told to hand up signs telling people to send you $50 for instructions on how to make $10/hour stuffing envelopes. Everybody is feeding off of everybody else.
Charity – Never give money to a charity over the phone. Always take the time to verify where you are sending your money. Some freak may call to tug on your heartstrings with a sob story, but you don’t have to give them money. At least ask them to send it in writing so you can do some checking, first.
Phishing – Simply put, don’t click on any link in any email, unless you know where it is going. If it is a link to a financial institution, go enter the address into the address bar yourself. If you find yourself on a site you don’t recognize, don’t give them your personal information and don’t ever reuse your usernames and passwords. If you do, one bad site could get access to everything you do online.
[ad name=”inlineleft”]Foreign Lottery – To be clear, Spain did not just hold a international lottery and randomly draw your email address. No lottery in the world works that way. If you didn’t enter the lottery while you were in Spain, you aren’t going to win it. The scam is that you need to provide your bank information, including a number of release forms so the scammers can transfer money to you. In reality, you are signing over control of your account and will be wiped out.
Nigerian/419 Emails – Ex-Prince WhateverHisNameIs wants your help to get his fortune out of WhereverHeIsFrom. The New Widow Ima F. Raud has an inheritence that she won’t live long enough to spend. They’ve both been given your name as a trustworthy person to handle the transactions in exchange for a mere $10 million. What friends do you have that would make this seem legitimate? Once again, they will get your bank information and take your money. At a minimum, they will try to get you to pay a few thousand dollars for “Transfer fees”. Don’t do it.
Overpayment by Wire – I had this one attempted on my last week. You sell something online. A potential buyer agrees to purchase the item, sight-unseen. They’ll send a cashier’s check and, after it clears, one of their agents will pick it up. Unfortunately, the buyer’s secretary screwed up and added a zero to the check. Would you mind wiring the overpayment back, minus a small fee for the hassle? The check is bogus and there is no way to verify it. You’ll deposit the check and it will be assumed to be real. The bank will make the funds available well before it comes back as fraud. You’ll see the available funds and send the money by non-refundable Western Union and some thug in Nigeria gets a new iPhone.
Foreclosure Scams – Some scammers try to prey on the vulnerable because they are, well, vulnerable. If you are facing foreclosure, be very careful about where you turn for help. One scam is to get you to sign over your home “temporarily” to clear the title. That doesn’t work, but you won’t find that out until you are handed an eviction notice and told you still owe the money.
Stranded Friends – You get an email from a friend saying he’s in London/Moscow/Sydney/Wherever, and he’s been mugged. He’s got nothing and needs $2500 to get home. Can you help? Do you really have friends close enough to ask for a $2500 international bailout, but not so close they tell you about the vacation ahead of time? Would they really be too timid to call you collect instead of begging for change to use an internet cafe?