Spreading Obesity, Turning the Tide

ktadmin Posted in News, Recipes and Health Facts, Training notes๏ผŒ
4

Someone sent me this graphic and it really shocked me! While the media will do the occasional story on obesity in adults or children I have never seen it presented like this.

 

Obesity from 1985 to 2001

 

This simple graphic really puts the problem in perspective! I wonder if there is any correlation to the spread of fast food or chain restaurants during the same period? Don’t get me wrong I am not excusing the problem or blaming the problem on these restaurants. That is just an observation. I do think however that given the progression of the problem we shouldn’t expect the solution to arrive any faster. That isn’t very good news for our kids but it is realistic. The first steps to recovery for any problem require us to admit there is a problem and get educated about the cause and solution.

 

What is needed is another fitness craze in the country! Personally I’d like to see a Martial Arts fitness craze, more fun then running! ๐Ÿ˜‰ Seriously we do need a fitness craze but it has to be a healthy craze. It can’t be filled with fad diets, gimmick exercises and unrealistic goals. Yes everyone has a stomach muscles under there somewhere but that doesn’t mean we have a hidden six-pack!! Not that you can’t get there but that shouldn’t be your goal, it isn’t realistic when you are struggling to loose 20, 30, 40, 50 pounds or more. To get a six-pack you need to get rid of almost all of your body fat. That isn’t a realistic goal for most adults with responsibilities! That isn’t to say you can’t work towards it but set realistic goals, or goal stages.

 

With goal stages you can still shoot for the end game (say six-pack abs) but there are realistic goals that lead to the ultimate goal. Perhaps your first goal is to cut out all snacks and do 30 sit-ups a day. This will be a difficult goal for many to achieve but it is attainable and realistic. So forget the 30 minute abs while you wait for your Pizza delivery!

Talk about unrealistic!!

So wake up America, start taking an interest in your health and learn more about how to eat and exercise healthy in future articles here! Until then eat healthy and train hard.

Self-Defense is a Posture

ktadmin Posted in News, Self-Defense๏ผŒ
0

Once again I find myself reading a story about the subtle aggressions of China towards the America. As reported here China has penetrated key U.S. databases. This was reported by the highly reputable SANS Institute. They detail an aggressive, non-stop campaign by China to penetrate key government and industry databases in the United States already has succeeded and the United States urgently needs to monitor all internet traffic to critical government and private-sector networks โ€œto find the enemy withinโ€. The SANS Instituteโ€™s director of research is quoted as saying that empirical evidence analyzed by researchers leaves little doubt that the Chinese government has mounted a non-stop, well-financed attack to breach key national security and industry databases, adding that it is likely that this effort is making use of personnel provided by Chinaโ€™s Peopleโ€™s Liberation Army. The โ€œsmoking gunsโ€ pointing to a government-directed effort are keystroke logs of the attacks, which have been devoid of errors usually found in amateur hack attacks, the use of spear phishing to gain entry into computer networks, and the massively repetitive nature of the assault, the SANS research director said. SANS earlier this week placed espionage from China and other nations near the top of its annual list of cybersecurity menaces, reporting that targeted spear phishing is the weapon of choice used in the assault on U.S. databases and those of its allies.

The question here is what are we doing in response to this shot across our bow? Largely nothing. Yes there are those that quickly say our government is to strong and insist that they are doing something we don’t know about. Rubbish. The days of America as a super power have ended because ‘we the people’ traded our desire for freedom in for selfish en devours. What does that mean!? Yes I read minds… It means that as the only successful Republic and truly free country in the history of the world we have a responsibility to defend that freedom. I do not advocate war any more then I advocate fighting. Experience and history teaches that war and fighting are often avoided if you have the spin to stand up early and call out those in the wrong. Our fate with China was sealed when MacArthur was stopped from invading and defeating communism during the Korean Conflict. All for personal fears of an insecure President afraid of another fictitious Presidential aspirations. Doing what is right is hard…always because it calls for personal sacrifice. I have been watching and warning people about the Chinese threat for over almost 20 years, I am use to being laughed at. It is my hope that I am the fool but increasingly current events prove me correct.

What happens when you wait to long to do the right thing and stand up for what it right? You have little ground to stand on. What happens when you sell all of your interests and production to your enemy? Yes, Enemy because by definition Communism can never be friend of a free Republic, something we seem to have forgotten. Sad really, so many good Americans have lost their lives to fight for freedom only to have later generations give it away. Perhaps we got tired of fighting, understandable but inexcusable. For my part All I can do is to raise awareness so that ‘we the people’ will raise our voices and demand a stronger posture when dealing with any type of aggression from our enemies.

Self-Defense is not a reaction it is a posture.ย  This is a lesson for Countries and Men.

Say Thanks You

ktadmin Posted in Events & Holidays, For Kids, News๏ผŒ
1

Something cool that Xerox is doing by showing they are committed to helping people across the nation express their gratitude to our troops overseas. To do this they have setup the web site, www.letssaythanks.com , where you can pick out a thank you card and Xerox will print it and send it to a soldier that is currently serving in Iraq. You do not get to pick who gets the card, but it will go to some member of the Armed Services.

www.letssaythanks.com

How AMAZING it would be if we could get everyone we know to send one!!! This would make a great assignment for the kids in your Dojo to do as a community activity. This is a great site. This is a great program.

Please send a card today, it is FREE and it only takes a second.

Chuck Norris, Politics and Endorsements

ktadmin Posted in Fun Stuff, News, OffTopic, Video๏ผŒ
1

One of my readers sent this to me a while ago but I’ve been so busy I just got a chance to watch it today… I can’t believe I hadn’t seen this, but it was a definite fit, so thank you Rebecca! The Video is a political ad for Mike Huckabee who I really don’t know much about but this was a great idea on his staffs part! Enjoy….



While I try to keep the blogs content centric the above video got me thinking I should give some “air-time” to the only candidate I support, Fred Thompson. I have followed his political career for a long time now and he is a very principled man who does what he says he is going to do. I’m not trying to convert or convince anyone, you have to make your own choices but perhaps I will give you pause to give Fred some consideration. Regardless is turns out he also has a great sense of humor! In a recent Ad in typical Fred Thompson fashion he shunned the mainstream media and released this video directly to YouTube in response to a challenge from Michael “the rich fat slob who pretends to know our problems to make more money” Moore.



I can see why Fred Thompson doesn’t like the media but I like the fact that they included a clip of Moore expressing his love for America. If you missed it you’ll have to watch it again. In typical fashion the news media cut the beginning of the video which makes it lose something, here is the complete 38 second version of the video:



If you want to know more about Fred Thompson and where he stands on the issues this is a good clip to start with. Yes I said stand on the issues not spin, he actually states his stance but more importantly explains his plan on how to make his approach a reality. Haven’t heard talk like that since Ronald Reagan ran for office. And yes, I mean that as a compliment!



This is perhaps one of the best explanations of Federalism and why it is such a healthy and incredible form of government I’ve ever heard. If this isn’t a breath of fresh air then what is?!



Feel free to post comments as I would like to know what you think, other resources, links and opinions. Look forward to hearing from you…

Chinese Cyber Attacks Increase

ktadmin Posted in Identity Theft, News๏ผŒ
0

As Reported here, there have been a sharp hike in cyber-attacks from China. Security experts at Finjan examined the new wave of Chinese attacks and the mechanisms used and claims and have identified an “intricate network of connections” between China-based servers run by cyber-criminals. While trojaned systems that initiate the attacks exist all over the world however they are eventually associated with servers registered as Chinese domains. The attackers are spreading the assaults by placing entry points on a variety of websites in different regions and listed differently by URL categorization engines. The infection consists of either an I-frame or a Script tag placed on the website that causes users visiting the site to be attacked. Examples for such entry point regions are shown in Finjan’s December 2007 Malicious Page of the Month Report (free subscription required), and were found on trusted websites in the U.S., China, and Western Europe, including government and education sites. After the victim reaches an entry point, the attackers use dynamic code obfuscation methods to limit signature-based technologies from detecting the attack. The victim is redirected to a series of sites containing I-frames that will eventually force the victim to visit a site that belongs to the Chinese network. In the first part of the actual malicious attack, the cyber-criminals use new or known exploits that will infect the victim with a crime-ware Trojan. “After the initial Trojan is loaded it initiates the downloading of other Trojans from different locations. The compromised computer will then redirect to other sites in order to send statistical information about the infected PC,” the firm stated. “Finjan has discovered that different Trojans send encoded information to the same sites in China that we identified as being unique to the attack.

Artist Makes Art One Karate Chop at a Time

ktadmin Posted in News, Profiles, Reviews๏ผŒ
1

Phil Hansen over at Phil_in_the_circle_dot_com has a unique talent, he is an unconvensional artist who uses unconventional mediums for amazing results. Our obvious favorite is his tribute to Bruce made entirely with karate chops, head butts and spear hands! The results are amazing and you can purchase a print here but to truly appreciate the work you have to see the video of its creation.



Exoskeleton Combat Gear

ktadmin Posted in News, OffTopic, Video๏ผŒ
1

Well the title is a little misleading since you can’t buy one yet but this story got me to thinking about the future of MMA and WWF style competitions…

I had to share this amazing video of the latest advances in Exoskeleton technology. Imagine the applications for this type of technology! It looks like the current prototype is a little slow for say enhanced hand-to-hand combat but that will improve!

With wide spread use we would see reduced work related injuries, increased productivity, increased capabilities in Industrial jobs, Military, Shipping/Loading, Rescue and more! This is a great example of Science Fiction meeting reality, remember Alien, Matrix Revolutions, and others. How many bricks could you break with one of these?! Bet you could catch an arrow with one of these at any range!

Super Bionic Ninja Robot Hand!

ktadmin Posted in Entertainment, News, Video, Weapons๏ผŒ
1

Is this the beginning of the end? Could a Super Bionic Ninja Army soon take over the world?! In this Discovery Channel video they take on the legend that Ninja’s could catch an arrow as a defensive move.

Of course these non-believers prove that to catch an arrow is an impossible feat. But is their experiment accurate? Have they in fact ignored the super human skills Ninja Masters can acquire? Or are they in fact Ninja agents bent on insuring the Ninja secrets stay well secret!? Regardless of which reason you like the fact remains that no Ninja would try to catch an arrow from that distance when they could easily dispatch the Archer with a Shuriken or throwing dart. If they had tried to catch the arrow from further away and had their hand move with the arrow, catching it as it flew by, perhaps their “experiment” would have had a different result! We may never know the truth now as they continue to cloud the secret Ninja skills with Science and Math! If all of this hasn’t convinced you they are in fact Ninja agents sent to confuse us, how can you ignore their closing threat to take over the world with their Super Bionic Ninja Army?!

Donatello where are you?!!

Teenage Karate Girl Saves Mother

ktadmin Posted in News๏ผŒ
1

Thirteen year old Brown belt Rebecca Kelly saved her 53 year old mother, Diane two nights ago.ย  Diane was picking Rebecca up from her martial arts class when they were viciously armed attacked by 29 year oldย  James Cordingley.ย  Cordingley was high on heroin, crack cocaine and had drunk eight cans of strong lager at the time of the attack.ย  Obviously a man who was feeling NO pain.ย  The attack was motivated by threats from his drug dealer whom he owed over ยฃ60.

Cordingley grabbed Diane as she sat in her car and armed with a TASER attempted to stun her into submission.ย  Still fresh from her evening lesson, Rebecca jumped into action without hesitating.ย  She reported that she “just saw red“.ย  Rebecca went continued “Using the skills Iโ€™d learned through my karate lessons I ran and jumped on to the manโ€™s back to pull him off my mum.”ย  She then ran back to her class in Horsforth, West Yorks, and got three black belts to help her restrain Cordingley until the authorities arrived.ย  Mom, Diane was fine and just a little bit proud!

Rebecca’s actions were commendable and she acted bravely in a moment of crisis.ย  Because of her a criminal is off the streets for at least a while and her and her mother are safe.ย  While the use of the unusual ‘run and jump on the man’s back’ technique is unorthodox it seems to have worked in this case.

The Confidence Attack

ktadmin Posted in Identity Theft, News๏ผŒ
0

Confidence men know that a good Con will work over and over. So repeatedly we see old cons being applied in new ways using technology. So why is this important? Because it is one more threat to our safety and our identity. The problem is most people don’t think it can happen to them which is what the conman is counting on.

The latest old Con to resurface is exploiting the invoice play. Before technology a conman would present an invoice to a clerk and get them to think it was either authorized or that they would get in trouble if they checked because it was urgent. Well it is back in the latest email/phishing scams that are directed at certain employees at a company. The term for these attacks is “spear phishing“, cute huh? The first of these attacks surfaced two years ago but they were far and few between. But with some refining they seem ready for the mainstream and so they come in bulk.The these scams, the phisher find the name and email address of a company’s top executives, usually available on their website. Then a custom email is crafted specific to those people and their function at the company.

Most of the emails take two approaches. In the first, the email purports to be from the Better Business Bureau alerting the recipient to a complaint posted on “their” website. The web site is actually a phished (fake) version of the Better Business Bureau site. Once there the executive is lured further into entering identity and financial information that can be used to defraud the company. In the second approach, an email is sent to the executive(s) of a company about a delinquent invoice or bill. In most cases an assistance reads the executives’ email and in most cases these emails will be forwarded to the accounting or accounts payable person without the executives knowledge. Since the email is forwarded internally from an executive email the recipient might trust the source and either pay the receipt electronically or visit the accompanying link to garner further information about the invoice.

This may not seem like much of a risk to many people but it does illustrate nicely the risk of inferred trust I speak with parents about so often. This is really a play on social engineering, when you gain a little information about someone and use that to gain more. Inferred trust means that you give the appearance of knowing X so you can exploit Y, given that Y trusts X. So this age old ploy is now being crafted as an email. Just remember though to be successful it requires a few people to either not think or trust the source. We think these things can’t suceed but remember that there are still people falling victim to the Nigerian scams! SO be careful our there…