Bet you’ve never seen one of these!
Funny eh.
The sound quality is surprisingly good.
I’m lying. I don’t own a cassette.
Cars, Security and a Peek into my Life
Because unlike Google, it doesn’t track me.
From their site:
Other search engines save your search history. Usually your searches are saved along with the date and time of the search, some information about your computer (e.g. your IP address, User agent and often a unique identifier stored in a browser cookie), and if you are logged in, your account information (e.g. name and email address).
With only the timestamp and computer information, your searches can often be traced directly to you. With the additional account information, they are associated directly with you.
Results come from about 50 different sources such as Yahoo!, Wikipedia, Bing, and its own web crawler DuckDuckBot.
It also deletes results from content farms – low quality sites that turn out 4,000+ articles per day, designed specifically to rank well in Google.
Above is a typical results page.
Image results.
You can set it to be the default search engine in both Safari and Firefox. And also iOS: Settings > Safari > Search Engine > DuckDuckGo
Try it out – DuckDuckGo.com
Why don’t more manufacturers offer coloured seat belts? They’re so good looking.
Found in a 2016 Porsche GT4.
It’s a +$410 upgrade.
Photo by Angelo Parisi

The largest tire shows where the maximum tire contact, and load, is.
Examples:
– when coming into a turn, complete all braking before initiating the turn. Then it’s off the brakes and start to turn the wheel
– yes you accelerate out of a turn, but only after the majority of the turn is complete, and the steering wheel is unwound to almost straight
From when I attended the Audi sportscar experience.
Blog tag = 2017 Audi R8
When a stranger shows up to your place of business, don’t take it at face value they are who they claim to be.
By exploiting people’s trust, manners, and our social nature to be helpful, impersonation is an effective way to gain physical access to somewhere otherwise off-limits.
The attacker will seem genuine, probably because they’ve prepared by collecting information about your organization.
They will look the part, and it will make sense what are they asking for
Example: “Oh you’re wearing a tool belt and construction vest, it seems logical you’d like access to our mechanical room, okay I’ll take you there.”
She donned a set of medical scrubs, got some grocery store chocolates and balloons and showed up at the target’s business.
“No, I’m not on today’s appointment list, I’m a singing telegram sent by a secret admirer of Mr. Jones.”
Then better yet, “No I don’t have my ID on me, but look, my name is written on my stethoscope.”
Michele says the security guards did the right thing by escorting her up to see Mr. Jones. In she went and sang her heart out. Everyone loved it, so they forgot about her because she was then left alone to roam the building.
– pest control, because no one wants to deal with bugs
– play to stereotypes and expectations – she’s a woman so must be the underling, and her male counterpart the boss
– a woman lowers people’s guard, take advantage of a gender bias
– exploit the automatic response to authority. Example: wear a safety vest and hard hat to direct traffic, without having to offer an explanation
– ask lots of questions
– ask to see ID
– stop the stranger and ask a non-yes/no question like, “what can I help you find?”
– never leave a guest unattended
– don’t feel shy to be a stickler
This has been Part 2/3 in a series with Michele Fincher, Chief Influencing Agent at Social Engineer, Inc., a premier consulting and training company which specializes in the art and science of social engineering (SE.)
Meet Michele here.
Blog tag = Social Engineering (25)