Category Archives: Uncategorized

Dee Zee | 1306 | GMC | C3500 Pickup | V8, 7.4 | Running Boards


Dee Zee, Inc, based in Des Moines, Iowa, is celebrating over 28 years as a leading supplier of aftermarket truck accessories. Dee Zee announced their arrival with the introduction of 12 custom fit britetread or extruded aluminum running board applications at the 1977 Sema Show in Las Vegas. From that November to today, Dee Zeesâ mission is to market the highest quality truck products while satisfying the needs of their customers. Dee Zee has expanded the initial offering of 12 boards to over 120 running boards and accessories. Their product lines now boast over 80 different toolboxes, 20 tube products, 34 Mossy Oak® Break Up ⢠CAMO products, and 32 heavy-duty products. The various product lines account for over 2,000 total SKUâs.
Get Perfect Gift..

My Personal Story – A Message From the Cave


This article is a personal story.It’s about something I’ve been struggling with for years (my entire life, really). And it strongly presented itself again in the past couple of months.The reason I choose to share this with you,even though it feels a bit vulnerable and uncomfortable, is because I think reading my story can be helpful to you.I don’t want to waste your time, so before I dive into it I’ll first help you determine if my story might be relevant to you.My story will probably inspire you if you:
Always felt different than the people around you. You didn’t quite understand them and how they (inter)acted. You often felt like you didn’t fit in (and still feel that way from time to time). It’s like someone forgot to hand you the manual to social interactions and how the world works when you were born;
Are someone who feels that what you have to offer is weird, or strange, and you feel pressure (from others or yourself) to adjust or adapt, and you don’t want to but don’t know how to make your business work YOUR way;
Are an introvert and/or HSP (highly sensitive person) just like me.
So, here’s my story for those of you who are still here:If you know me or have been reading my ezine for a while, you’ve probably heard me refer to my ‘inner hermit’ before or heard me call myself a hermit.(Hence the ‘message from the cave’ above this article – I kinda liked that joke myself)The reason I feel I am a hermit is because I am both extremely introverted and highly sensitive – great attributes for a coach, but not so great attributes for fitting into society (Or living a life like most people do. Or building a business like most entrepreneurs do.)My energy drains from social interaction and even from just being around people. And yes, this also happens even if the activity is something I truly enjoy and I really like the people I’m with.(If you recognize this, you are most likely an introvert as well)Of course, every introvert has extravert moments and vice versa.I’m not a complete lunatic living on the edge of society without ever talking to anyone but myself and my cat.(That I don’t even have..)But if I want to be able to function, be happy and healthy AND be able to fulfill my mission, I need to spend between 75 – 90% of my time alone.As you can probably imagine, achieving this in a society that is completely build and structured around extraverted people, who thrive on being around people, social activities and interaction, is a REALLY tough job.Over the years I have learned how to deal with this.I learned how to manage my energy; how to restore myself when I was drained; how to set boundaries; how to say NO; etc.I also learned how to structure my business, my programs, my services and my marketing in a way that works for me.(Which was also a challenge. A lot of the things most business coaches teach don’t work for me.)This year my business grew a lot, and much faster than I expected.Which is of course wonderful news and I am very, very grateful for it.But… as a result I had too little time for myself again.I felt stressed, completely drained, unhappy, and totally disconnected from my soul and the world – which is how I always feel when I don’t spend enough time alone.I asked myself:How the hell am I going to take good care of myself, make sure I have plenty of time to be alone, make plenty of money, reach more people, have way less social interaction, publish my book and launch 2 new programs in 2013- all at the same time?!?And for the gazillionth time, I wondered WHY I had such a weird and seemingly contradictory combination of my mission and my personality:
I need to be alone most of the time yet I work with people.
I don’t want to leave the house and I hate to travel yet it’s my mission to reach millions of people worldwide.
I want to make a difference in the lives of so many people, yet I can only have interactions with clients for a very limited amount of time.
I love coaching people but it completely drains my energy if I have too many clients.
I slowly found my answer this year, and made a powerful decision as a result of it.I decided to structure my business in a way that serves my inner hermit for 100% instead of 90%, just as I have already done in my personal life.This decision means that in 2013 I will only have interactions with clients for a maximum of 4 hours a week, spread out over 2 days. (These client hours include any kind of interaction I have with my clients and potential clients: coaching sessions, group calls, teleseminars, sales conversations etc.)The rest of the time I can develop and launch 2 new programs, work on my business and marketing, publish and launch my new book, etc. etc.Right now, I am restructuring my business and programs to make this decision a reality.I can only do this now, after I learned how to apply marketing and business principles to my business in a way that worked for me.But the most important reason I am now able to do it MY WAY for 100% without making any compromises, is this:Because I finally accepted and embraced my inner hermit completely, and to acknowledge it as my gift and my strength instead of seeing it as a burden I had to work around.Some of the lessons I’ve learned that I truly and deeply hope are helpful to you as well, are:
Every aspect of who you truly are has valueand is something that in one way or another helps you fulfill your purpose and be the best version of yourself you can possibly be – even those aspects that you think are weird, painful or a burden to yourself and/or others;
It is entirely possible to be a hermit or an introvert and run a successful business at the same time. Being an entrepreneur gives you the freedom to structure your life and your work in a way that serves you 100% – especially when you are an introvert!
Enjoy, share and celebrate your uniqueness! It is your gift to the world.
I hope reading my story inspired and served you.And I would love to hear your comments, thoughts, and whatever you recognize in my story.

Twin Air Liquid Power Oil Spray – 600ml. 159016M


Boost your bikes performance with the first biodegradable air filter oil that works in ALL riding conditions.
GREEN Liquid Bio Power prevents dirt, dust, and even water from entering your carburetor.
Alcohol base allows easy, even penetration, then dissipates quickly to form a super-sticky, dirt-grabbing shield.
Available in Spray or in Liquid form

Read More..

Wireless Security – Getting It Right


It may sound strange but is true that several organisations, which have adopted Wireless networking, are open to severe security breaches. Mostly the reasons are that organisations simply plug the access points and go live without bothering to change the default factory settings. Wireless local area networks are open to risk not because the systems are incapable but due to incorrect usage. The biggest problem lies with inadequate security standards and with poorly configured devices. For a start, most of the wireless base stations sold by suppliers come with the in-built security Wired Equivalent Privacy (WEP) protocol turned off. This means that unless you manually reconfigure your wireless access points, your networks will be broadcasting data that is unencrypted.In the old world of wired local area networks, the architecture provides some inherent security. Typically there is a network server and multiple devices with an Ethernet protocol adapter that connect to each other physically via a LAN backbone. If you are not physically connected, you have no access to the LAN.Compare it with the new wireless LAN architecture. The LAN backbone of the wired world is replaced with radio access points. The Ethernet adapters in devices are replaced with a radio card. There are no physical connections – anyone with a radio capability of sniffing can connect to the network.What can go wrong?Unlike the wired network, the intruder does not need physical access in order to pose the following security threats:Eavesdropping. This involves attacks against the confidentiality of the data that is being transmitted across the network. In the wireless network, eavesdropping is the most significant threat because the attacker can intercept the transmission over the air from a distance away from the premises of the company.Tampering. The attacker can modify the content of the intercepted packets from the wireless network and this results in a loss of data integrity.Unauthorized access. The attacker could gain access to privileged data and resources in the network by assuming the identity of a valid user. This kind of attack is known as spoofing. To overcome this attack, proper authentication and access control mechanisms need to be put up in the wireless network.Denial of Service. In this attack, the intruder floods the network with either valid or invalid messages affecting the availability of the network resources.How to protect?There are 3 types of security options – basic, active and hardened. Depending upon your organisation needs, you can adopt any of the above.BasicYou can achieve the basic security by implementing Wired Equivalent Standard 128 or WEP 128. The IEEE 802.11 task group has established this standard. WEP specifies generation of encryption keys. The information source and information target uses these keys to prevent any eavesdroppers (who do not have these keys) to get access to the data.Network access control is implemented by using a Service Set Identifier (SSID – a 32 character unique identifier) associated with an access point or a group of access points. The SSID acts as a password for network access.Another additional type of security is Access Control List (ACL). Each wireless device has a unique identifier called Media Access Control address (MAC). A MAC list can be maintained at an access point or a server of all access points. Only those devices are allowed access to the network that have their MAC address specified.The above implementations are open to attack. Even when you do turn on WEP, there are still problems inherent within it. The problem lies in the protocol’s encryption key mechanism, which is implemented in such a way that the key can be recovered by analysing the data flow across the network over a period of time. This has been estimated at between 15 minutes and several days. The SSID attached to the header of packets sent over a wireless Lan – is sent as unencrypted text and is vulnerable to being sniffed by third parties. Unfortunately most supplier equipment is configured to broadcast the SSID automatically, essentially giving new devices a ticket to join the network. While this is useful for public wireless networks in places such as airports and retail establishments – in the US for example, Starbucks is offering 802.11b access in some of its stores – it represents another security loophole for corporates that do not switch it off. Finally any MAC address can be change!d to another (spoofed), so the use of ACL is not foolproof either.ActiveTo implement an Active type of security, you need to implement the IEEE 802.1x security standard. This covers two areas – network access restriction through mutual authentication and data integration through WEP key rotation. Mutual authentication between the client station and the access points helps ensure that clients are communicating with known networks and dynamic key rotation reduces exposure to key attacks.Due to weaknesses in WEP, some standard alternatives to WEP have emerged. Most of the Wi-Fi manufacturers have agreed to use a temporary standard for enhanced security called Wi-Fi Protected Access (WPA).In WPA, the encryption key is changed after every frame using Temporary Key Integrity Protocol (TKIP). This protocol allows key changes to occur on a frame-by-frame basis and to be automatically synchronized between the access point and the wireless client. The TKIP is really the heart and soul of WPA security. TKIP replaces WEP encryption. And although WEP is optional in standard Wi-Fi, TKIP is required in WPA. The TKIP encryption algorithm is stronger than the one used by WEP but works by using the same hardware-based calculation mechanisms WEP uses.HardenedThere are organisations like banks, which have very stringent security requirements. They need to implement the hardened type of security systems. These are solutions certified in accordance with the Federal Information Protection Standard (FIPS 1.40). Products in this category offer point-to-point security for wireless information communication and include offerings such as AirFortress and IPSec Virtual Private Networks (VPNs). A VPN will increase the cost of your network, but you can base your decision on whether to implement it by using the same course of action that you should be taking with all other parts of your infrastructure. Map the risks against the business data that you will be passing over radio, and assess the financial impact of a breach. If the data is too critical, reassess what should be passed over the network, or use a VPN to enhance your protection.SummaryThe vendors are working towards implementing newer standards and this year we should see products implementing IEEE 802.11i that will further the authentication and encryption gains implemented by WPA. Most notably, it will add a ground up encryption standard known as Advanced Encryption Standard (AES) as well as various other enhancements.Newer standards apart, organisations must understand that achieving wireless security is essential and the good part is that it is easy. An organisation must define its security needs and use the features available in the systems accordingly. Choose a good vendor who can help you implement your requirements through standards based solutions. A good implementation must be supported by a security policy, which is well understood by everyone in the organisation. Make your employees aware that they all are responsible for security and share the cost of security breaches. Assign authority & ownership to few employees for the various parts in the security policy and make periodic reviews of their performance. Most important is to monitor your systems for any possible breaches and adapt if necessary. Never sleep well.