Tuesday, January 14, 2014

Cool How To Make images

http://ift.tt/1clwDe5

Check out these How to Make images:


Modern Mechanix — A Battle of Wits (Dec, 1930) …item 3.. How the Spamhaus DDoS attack could have been prevented (March 29, 2013) …

images Cool Cool How To Make images



Image by marsmet547

Preventing spoofing through BCP38 will prevent this type of amplification attack. "There is no way to exploit DNS servers of any type, including open recursors, to attack any third party without the ability to spoof traffic," said Arbor Networks’ Roland Dobbins. "The ability to spoof traffic is what makes the attack possible. Take away the ability to spoof traffic, and DNS servers may no longer be abused to send floods of traffic to DDoS third parties."

.


……..*****All images are copyrighted by their respective authors ………

.


… message headder for item 2. White House demands China cease alleged hacking activity


U.S. companies are increasingly complaining that intellectual property is being stolen through attacks "emanating from China on an unprecedented scale," Tom Donilon, the president’s national security adviser, said during a speech at the Asia Society in New York.

.


…………………………………………………………………………………………………………………………………………………………………….

.

…..item 1a)…. Modern Mechanix … Yesterday’s Tomorrow Today …


Fawcetts … Modern Mechanics And Inventions … Dec. 1930 … 25 cents …


http://ift.tt/1m2ytcl;


.

.

………………………………………………………………………………………………………………………………………………………………………

.

…..item 1b)…. Modern Mechanix … Yesterday’s Tomorrow Today … blog.modernmechanix.com


Publication: Modern Mechanix


http://ift.tt/1m2yv3U

.

.

………………………………………………………………………………………………………………………………………………………………………

.

…..item 2)…. White House demands China cease alleged hacking activity …


… CNET News … news.cnet.com


CNET News Security & Privacy


Obama’s national security adviser says China must end recent cyberespionage traced to back to that country or risk impacting relations with the U.S.

.

………………….


img code photo … Keyboard


http://ift.tt/1clwEyK;


(Credit: Jared Kohler/CNET)


………………….

.


by Steven Musil … March 11, 2013 4:35 PM PDT


http://ift.tt/1clwEyO;


The White House warned China today to end a campaign of cyberespionage against U.S. companies, saying in its toughest language yet on the issue that the hacking activity threatens to derail efforts to build stronger ties between the two countries.


U.S. companies are increasingly complaining that intellectual property is being stolen through attacks "emanating from China on an unprecedented scale," Tom Donilon, the president’s national security adviser, said during a speech at the Asia Society in New York.


"The international community cannot afford to tolerate such activity from any country," Donilon said. "As the president said in the State of the Union, we will take action to protect our economy against cyberthreats."


Donilon’s remarks come after a recent report that an "overwhelming percentage" of cyberattacks on U.S. corporations, government agencies, and organizations originate from an office building on the outskirts of Shanghai that’s connected to the People’s Liberation Army. China has denied any involvement and condemned the report for lack of hard evidence.


Related stories


… Meet the ‘Corporate Enemies of the Internet’ for 2013

… How Skype monitors and censors its Chinese users

… Officials: China is ‘too dependent on Android’


After The New York Times and The Wall Street Journal accused hackers in China of perpetrating months-long network breaches at the newspapers, a handful of companies have revealed that they too have been victims of recent hackings, including Apple, Facebook, Microsoft, and Twitter, although some of those are suspected of originating from Eastern Europe.


Saying that cybersecurity has become "a growing challenge" to the two countries’ economic relationship, Donilon outlined the actions it would like the Chinese government to take to address U.S. cybersecurity concerns.


"We need a recognition of the urgency and scope of this problem and the risk it poses — to international trade, to the reputation of Chinese industry, and to our overall relations," Donilon said. "Beijing should take serious steps to investigate and put a stop to these activities. Finally, we need China to engage with us in a constructive direct dialogue to establish acceptable norms of behavior in cyberspace."


The Obama administration has expanded its emphasis on cybersecurity in recent months, resulting in the signing of a long-anticipated executive order last month that allows companies to share confidential information with intelligence agencies without oversight. President Obama said at the time that the order would "strengthen our cyberdefenses by increasing information sharing and developing standards to protect our national security, our jobs, and our privacy."


Topics:Cybercrime Tags:White House, cybersecurity, China


About Steven Musil


Steven Musil is the night news editor at CNET News. Before joining CNET News in 2000, Steven spent 10 years at various Bay Area newspapers. E-mail Steven.

.

.

……………………………………………………………………………………………………………………………………………………………………..

.

…..item 3)…. How the Spamhaus DDoS attack could have been prevented …


… CNET News … news.cnet.com


Internet engineers have known for at least 13 years how to stop major distributed denial of service attacks. But, thanks to a combination of economics and inertia, attacks continue. Here’s why.


by Declan McCullagh March 29, 2013 4:00 AM PDT


http://ift.tt/1clwDef;


Nearly 13 years ago, the wizardly band of engineers who invented and continue to defend the Internet published a prescient document they called BCP38, which described ways to thwart the most common forms of distributed denial of service attack.


BCP38, short for Best Current Practice #38, was published soon after debiliating denial of service attacks crippled eBay, Amazon.com, Yahoo, and other major sites in February 2000. If those guidelines to stop malcontents from forging Internet addresses had been widely adopted by the companies, universities, and government agencies that operate the modern Internet, this week’s electronic onslaught targeting Spamhaus would have been prevented.


But they weren’t. So a 300 gigabit-per-second torrent of traffic flooded into the networks of companies including Spamhaus, Cloudflare, and key Internet switching stations in Amsterdam, Frankfurt, and London. It was like 1,000 cars trying to crowd onto a highway designed for 100 vehicles at a time.


Cloudflare dubbed it, perhaps a bit too dramatically, the attack "that almost broke the Internet."


BCP38 outlined how providers can detect and then ignore the kind of forged Internet addresses that were used in this week’s DDoS attack. Since its publication, though, adoption has been haphazard. Hardware generally needs to be upgraded. Employees and customers need to be trained. Routers definitely need to be reconfigured. The cost for most providers, in other words, has exceeded the benefits.


"There’s an asymmetric cost-benefit here," said Paul Vixie, an engineer and Internet pioneer who serves on the Internet Corporation for Assigned Names and Numbers’ security advisory board. That’s because, Vixie said, the provider that takes the time to secure its networks makes all the investment, while other providers "get all the reward."


BCP38 is designed to verify that someone claiming to be located in a certain corner of the Internet actually is there. It’s a little like a rule that the Postal Service might impose if there’s a deluge of junk mail with fake return addresses originating from a particular Zip code. If you’re sending a letter from San Francisco, the new rule might say, your return label needs to sport a valid northern California address, not one falsely purporting to originate in Hong Kong or Paris. It might annoy the occasional tourist, but it would probably work in most cases.


This week’s anti-Spamhaus onslaught relied on attackers spoofing Internet addresses, then exploiting a feature of the domain name system (DNS) called open recursors or open recursive resolvers. Because of a quirk in the design of one of the Internet’s workhorse protocols, these can amplify traffic over 30 times and overwhelm all but the best-defended targets.


Preventing spoofing through BCP38 will prevent this type of amplification attack. "There is no way to exploit DNS servers of any type, including open recursors, to attack any third party without the ability to spoof traffic," said Arbor Networks’ Roland Dobbins. "The ability to spoof traffic is what makes the attack possible. Take away the ability to spoof traffic, and DNS servers may no longer be abused to send floods of traffic to DDoS third parties."


Other countermeasures exist. One of them is to lock down open recursive resolvers by allowing them to be used only by authorized users. There are about 27 million DNS resolvers on the global Internet. Of those, a full 25 million "pose a significant threat" and need to be reconfigured, according to a survey conducted by the Open Resolver Project. Reprogramming them all is the very definition of a non-trivial task.


"You could stop this attack in either of two ways," said Matthew Prince, co-founder and CEO of CloudFlare, which helped defend against this week’s attack. "One, shut down the open resolvers, or two, get all the networks to implement BCP38. The attackers need both in order to generate this volume of attack traffic."


Alternatively, networks don’t need to lock down open resolvers completely. Google, which operates one of the world’s largest networks, has adopted an innovative rate-limiting technique. It describes rate-limiting as a way to "protect any other systems against amplification and traditional distributed DoS (botnet) attacks that could be launched from our resolver servers."


But few companies, universities, individuals, and assorted network operators are going to be as security-conscious as Mountain View’s teams of very savvy engineers. Worse yet, even if open recursive resolvers are closed to the public, attackers can switch to other services that rely on UDP, the Internet’s User Datagram Protocol. Network management protocols and time-synchronization protocols — all designed for a simpler, more innocent era — can also be pressed into service as destructive traffic reflectors.


The reflection ratios may not be as high as 1:30, but they’re still enough to interest someone with malicious intent. Arbor Networks has spotted attacks based on traffic amplification from SNMP, a network management protocol, that exceed 30 gigabits per second. Closing open DNS resolvers won’t affect attacks that use SNMP to club unwitting targets.


Which is, perhaps, the best argument for BCP38. The most common way to curb spoofing under BCP38 is with a technique called Unicast Reverse Path Forwarding (uRPF) to try to weed out unwanted traffic. But that needs to be extended to nearly every customer of a provider or network operator, a daunting undertaking.


Nick Hilliard, chief technology officer for INEX, an Internet exchange based in Dublin, Ireland, said:

BCP38 is harder than it looks because in order to implement it properly, you need to roll out uRPF or interface [access control lists] to every single customer edge point on the internet. I.e. every DSL link, every cable modem, every VPS in a provider’s cloud hosting centre and so forth. The scale of this undertaking is huge: there is lots of older (and sometimes new) equipment in production out there which either doesn’t support uRPF (in which case you can usually write access filters to compensate), or which supports uRPF but badly (i.e. the kit might support it for IPv4 but not IPv6). If you’re a network operator and you can’t use uRPF because your kit won’t support it, installing and maintaining individual access filtering on your customer edge is impossible without good automated tools to do so, and many service providers don’t have these.


Translation: It all adds up to being really hard.


Vixie, who wrote an easy-to-read description of the problem back in 2002, suggested it’s a little like fire, building, and safety codes: the government "usually takes a role" forcing everyone to adopt the same standards, and roughly the same costs. Eventually, he suggests, nobody complains that their competitors are getting away without paying compliance costs.


That argument crops up frequently enough in technical circles, but it tends to be shot down just as fast. For one thing, wielding a botnet to carry out a DDoS attack is already illegal in the United States and just about everyone else in the civilized world. And as a practical matter, botnet-managing criminals can change their tactics faster than a phalanx of professional bureaucrats in Washington, D.C. or other national capitals can respond.


INEX’s Hilliard said the real answer is to change the economics to make it less profitable to carry out DDoS attacks.


When sending spam was cheap, Hilliard said, he was receiving 10,000 Viagra offers a month. But after network providers took concerted steps to crack down, "the economics changed and so did the people who were abusing the Internet, and now I get about 2,000 a month, all of which end up in my spam folder," he said. "The same thing will happen to DDoS attacks: in 10 years’ time, we will have a lot more in terms of BCP38 coverage, and we won’t get upset as much about the small but steady stream of 300-gigabit attacks."


Topics:Cybercrime Tags:ddos, cloudflare, spamhouse


About Declan McCullagh


Declan McCullagh is the chief political correspondent for CNET. Declan previously was a reporter for Time and the Washington bureau chief for Wired and wrote the Taking Liberties section and Other People’s Money column for CBS News’ Web site.

.

.

………………………………………………………………………………………………………………………………………………………………………

.

.


Child Personal Safety Program …item 2.. Child Safety — by Project YES (June 25, 2013 / 17 Tammuz 5773) …item 3.. How to Communicate with Your Kids (August 14, 2013 / 8 Elul 5773) …

images Cool Cool How To Make images



Image by marsmet548

You can access the 32-minute free Child Safety Video here. It contains more details and background information that you may find helpful. You can also find a host of free resources on child safety here including a 3-page introduction to our Child Safety Book by the renowned child safety expert Dr. David Pelcovitz.

.


……..*****All images are copyrighted by their respective authors ………

.


……………………………………………………………………………………………………………………………………………………………………….

.

…..item 1)…. Child Personal Safety Program …


… Youth Heartline … youthheartline.org/ … Child Advocacy Program …


"for Hope, Empowerment, Advocacy, Resources and Trust"


http://ift.tt/16O9jTD

.


Planning is underway for the Child Personal Safety Program (CPSP) to serve other area schools, and even the older elementary school children at those schools.

.

…………………….


img code photo … Child Personal Safety Program


http://ift.tt/1clwDeh;


…………………….

.


Youth Heartline’s CPSP is unique in the Taos community in that the Talking About Touching curriculum we use for pre-school through third grade is supported by 25 years of research about its effectiveness. We know that children learn best in a safe, trusting environment. The agency that created the TAT curriculum, Committee for Children, is heavily invested in assuring that the curriculum and its instructors establish this safety. Though the fact that child abuse exists in Taos is not a popular topic of conversation, nevertheless it is a reality, and one that actually needs to be directly addressed through education and open community dialogue. It is a fact that the more readily a community confronts child abuse, the more such incidents decline in that community. This is true because secrecy and denial create an environment in which abuse can and does flourish. The worst fact about an atmosphere that fosters child abuse—secrecy—is that the abused child is extremely likely to become an abuser himself or herself.


Prevention of abuse is the most effective way to approach this problem, and the most promising in the effort to end abuse altogether. Addressing this important topic when children are very young increases the likelihood of providing a safe environment for them. But in the end, it is the adults around children who are really responsible for provision of a safe and healthy environment for children. It is our responsibility as a community to be able to talk to each other about child abuse and how we can keep children safe. Child Personal Safety Project supports and informs parents, teachers, and other caretakers in this effort.

Please do your part to participate in this community dialogue.


Your support of the Child Personal Safety Project is of absolute importance. We thank you for the financial assistance that you can provide because you share our belief that education and discussion of the facts are the path to a community that is safe for children.


Copyright © 2013 · All Rights Reserved · Youth Heartline : Child Advocacy Programs

http://ift.tt/16O9jTJ · RSS Feed · Log in

.


.

.

………………………………………………………………………………………………………………………………………………………………………

.

…..item 2)…. Child Safety …


… aish.com … www.aish.com/f/p/


Home » Family » Parenting


Teach your kids how to protect themselves from predators. 3 short videos.

.

……………………


img code photo … Child Safety


http://ift.tt/16O9her


……………………

.


June 25, 2013 / 17 Tammuz 5773

by Project YES


http://ift.tt/16O9jTL


You can access the 32-minute free Child Safety Video here. It contains more details and background information that you may find helpful. You can also find a host of free resources on child safety here including a 3-page introduction to our Child Safety Book by the renowned child safety expert Dr. David Pelcovitz.


Child safety education really works, so please make sure you take advantage of the protection it offers your kids.


Please pass these links to others. The only way our kids will be safe is when each and every one of them is trained in child safety.


Click here to receive Aish.com’s free weekly email.


Click here if you are unable to view these videos.


.

………………………


"Child Safety On-the-Fly #1" by Project YES … YouTube


video: 5:16 minutes … Child Safety On The Fly – Part 1


Karasick Child Safety Initiative


1. No secrets from parents

2. Your body belongs to you

3. Good touch – bad touch

4. No one should make you feel uncomfortable


Predators fear children who:


— Speak with their parents regularly and are involvd in their lives

— Understand their right to personal space

— Understand appropriate and inappropriate touching

— Understand no one is allowed to make them feel uncomfortable


Center For Jewish Family Life and Project YES

http://ift.tt/16O9ka8


Let’s Stay Safe! – Download our read-aloud version!


Our "Keep Our Children Safe" initiative is designed to raise awareness among parents about the importance of speaking to their children about safety and personal space.


Project YES is a Registered charitable 501 (c)3 organization, serving as a valuable resource for parents and children by providing a national Big Sister program to increase our children’s resiliency, an interactive website to address the myriad needs of our families, parenting forums and lectures, education and abuse prevention materials, and referrals for assistance.


For more information about the work of Project YES and to partner with us in our efforst in improving the lives of children and families, please see our website http://ift.tt/16O9ka8 or contact us at:


CFJFL/Project Yes

56 Briarcliff Drive

Monsey, NY 10952

(845)352-7100 ext. 114


email@kosherjewishparenting.com

2013


Better World Productions


………………………

.


.

.

…………………………………………………………………………………………………………………………………………………………………….

.

…..item 3)…. How to Communicate with Your Kids …


… aish.com … www.aish.com/f/p/ … Home » Family » Parenting …


The 5 most important nonverbal elements in getting your kids to listen.

.

………………….


img code photo … How to Communicate with Your Kids


http://ift.tt/15DY4Da


………………….

.


August 14, 2013 / 8 Elul 5773

by Rabbi Noach Orlowek


http://ift.tt/15DY71O


Amazing, isn’t it, the number of times we tell kids things and they just don’t seem to get it. They are our children, and therefore they must be brilliant, good-natured, and wonderful – so why don’t they listen? They seem to be able to listen and "get it" when their friends talk! Is there something wrong?


Yes, there is!

.


— Words Are Not Enough


I was once approached by a parent who was having problems with his six-year-old. I asked what he had tried before seeing me. He said that he would lecture his child and tell him in no uncertain terms that what he was doing was wrong. I asked him if this had helped when he, the parent, had been a child, and he said that it hadn’t. He also admitted that this approach wasn’t working with his child either. Why continue to do this? I asked. He said he didn’t know what else to do.


Of course we need to talk to our children. We use words all the time, speaking to even very young children, even infants. But we must remember that talking is not the primary way that we communicate our most important messages to our children. Because they are more emotional than adults, children react more readily to nonverbal messages.


This does not mean that we shouldn’t speak to our children. Certainly words are ultimately a primary way of communication, but even verbal communication has strong nonverbal components.


Rav Shlomo Wolbe, z"l, in a remarkable exposition on speech, refers to proper speech as a harp.[1] Just as when someone plays a harp, a combination of many factors give the sound its proper resonance, so effective speech is made up of a combination of the words spoken, the emotion behind the words, and the character of the speaker. The emotions and the character of the speaker are powerful nonverbal components in maximizing the effectiveness of our speech.


If our words carry greater import when the nonverbal parts of speech are utilized in communication between adults, then certainly this is true when we speak to our children. It is important, therefore, to define the nonverbal parts of speech that can give impetus to our words. Let us mention the most important ones.

.


— Tone of voice


The Talmud tells us[2] that the members of our household accept authority when words are spoken softly. A soft tone of voice suggests self-control, and people are more likely to follow someone who is in control of himself. A person may shout hysterically that he is in control of himself, but the nonverbal message is far more powerful, and it is the one that will leave its mark.

.


— Eye contact


Rav Yitzchok Hutner, zt"l, tells us that a person’s emotional reality is apparent in his eyes, as the saying goes, "The eyes are the window to the soul."[3] When we make eye contact, we are accessing the deepest recesses of the person. It is for this reason that a look into someone’s eyes is considered an emotional message, whether of love or hatred. Let us make soft, loving eye contact with our children when we speak to them. Not an unrelenting stare, but enough to transmit our nonverbal emotions to them.

.


— Touch


The Vilna Gaon teaches us[4] that touch is a primary means of transmitting emotion. When touch is coupled with earnest words, it has an enormous effect. Touch is so powerful an emotional tool that the Torah has placed special stress on where and how it can be used. This topic is beyond the scope of this work, but for our purpose, parents certainly need to be aware of the importance of harnessing the power of touch to communicate with their children.


With older children, if there is a strain in the relationship, touch must be used cautiously. It is very personal and could be considered invasive or aggressive if employed by someone to whom the child does not feel close.

.


— Sincerity


Before speaking with anyone, take the time to feel deeply what you are about to say. This is doubly true with children. This brings to mind the famous saying "Words that come from the heart enter the heart."[5] Children can sense very quickly how sincere you are. This has to do with your honesty, with how much you believe in what you are saying, and with the degree to which you are prepared to back up your words.


The most eloquent words will be ineffectual if the child senses that you are not really ready to stand behind your words and enforce them or that you do not really believe in what you are saying. In either case, your words will be flouted with impunity; worse, you will be considered a hypocrite in the child’s eyes.


Rav Moshe Feinstein, zt"l,[6] explained that we must be sincere and be true models of what we want our children to be based on God’s demand that we be a holy nation since He is holy. God is saying, so to speak, that I can demand holiness from you, because I Myself am holy.


Yes, sometimes we may fall short from what we aspire to be, but certainly we must be totally in line in our hearts, totally sincere, in what we say to our children. Otherwise, we are teaching them hypocrisy, and we are sure to eventually lose their respect. From there to losing them to the street is but a short step.

.


— Facial expression


The Prophet tells us that a person’s facial expression is a powerful guide to the emotions that are behind his words. It says, "The face testifies against them."[7] It is no coincidence that the Hebrew word for "face," panim, is related to the Hebrew word penim, "inside," for the face tells us what the person is thinking and feeling.


The Talmud teaches us that it is better to show another person "the white of your teeth" (i.e., give them a smile) than to give him a drink of milk.[8] Rav Avigdor Miller, zt"l, says[9] that this means that even when a person has come in from a long walk on a hot day, and he really needs a drink, a smile does more than a cold, refreshing glass of milk.


Young children are especially sensitive to our facial expressions, and they react to what they see on our faces long before they comprehend what we are saying to them. Children are emotional beings, and the sense of sight touches their emotions before they can even understand the words we’re saying to them.


All this is a powerful argument for paying special attention to the nonverbal components that come with the words we utter.


It is told that Rav Yosef Chaim Sonnenfeld, zt"l, avoided using a telephone for important conversations.[10] The nonverbal parts of speech that we have mentioned are far more powerful in person than over the phone.

.


— Other factors


In addition to the five nonverbal elements just mentioned, there are other factors that can affect the success or failure of your communication with your child. They are also nonverbal and deeply influence how your words will be taken. For instance:


… 1. Be conscious of the setting. Our surroundings deeply affect what goes on in our heads. Just as a child is less likely to open up to a principal when he is seated on the other end of a huge mahogany desk than if the principal takes him out for pizza – or at least sits next to him on the same side of the desk – so would a parent do well to pay heed to the surroundings that he chooses when talking to a child.


Not only is the child affected by the location where the conversation is taking place – so is the parent. At home the parent is often distracted and can’t give the child full or continuous attention. This lack of attention is a deep nonverbal message. When a person is given full attention, the respect he is accorded encourages him to express his feelings more freely. If I feel respected, I feel hopeful that my words will be respected, and that encourages me to open up.


Also, the fact that the parent went through the trouble to go to a setting more conducive to communication sends a powerful message to the child. He realizes how important he is to the parent.


Take a child out when you need to speak about something sensitive. Turn off your cell phone; even better, make sure your child sees you turn it off. He needs to see that you consider the time with him important and you don’t want to be disturbed. Try to make the environment as relaxing and nonthreatening as possible. And remember, don’t save these kinds of encounters only for lectures; otherwise, the child will get uneasy just at the suggestion of a "little talk" outside the home.


A nine-year-old stole his aunt’s cell phone and then denied it. His mother, who enjoyed a generally good relationship with her child, drove to a place that was quiet and green. Then she began to cry. When her son asked what was wrong, she said she was hurt he had lied to her. The child, in those calm and beautiful surroundings, apologized and promised never to lie again. There is no question that if there had not been a good relationship in place, the tears and the environment would not have helped, but there is also no doubt that the serene surroundings contributed to an atmosphere that fostered openness and closeness.


… 2. Be calm, focused – and listen! It is important to put other matters out of your mind when you are talking to your child. This helps the child to relax and open up. It also lets you to see matters with more perspective. Thinking about stresses at work will not help you be patient as you discuss a behavioral issue with your child.


Cultivating calmness and focus also helps you be a better listener, which, ironically, is an enormous factor in good communication. The best way to be a good conversationalist is to be a good listener first! Listening is in itself a powerful, vital element in establishing a good relationship with a child. It is part of the effort that we make to show our children that we are trying to understand them. One of the greatest compliments that we can give our children is to make the sincere effort to understand them. Then there is a great hope that they will make the same effort.

.


— Turning Ideas into Action


Find ways to show your child – nonverbally – that you have heard and respected what he said. A couple of examples of nonverbal messages:


… 1. Ask the child about something she said to you yesterday or, better yet, some time before. It can be an idea the child stated or a worry or any other emotion that the child shared with you. Your remembering what she said sends a powerful nonverbal message that you hear and respect her.


… 2. Repeat to the child what he shared with you and how much you enjoyed or found meaningful what he told you.


Click here to receive Aish.com’s free weekly email.


Turning Ideas into Action .. This has been excerpted from Turning Ideas into Action by Rabbi Noach Orlowek, published by ArtScroll/Mesorah Publications. It is one of 32 “mindsets” – short, Torah-based chapters, each dealing with an important aspect of our lives and self-development. Rabbi Orlowek is famed for his parenting classes, and his “Parenting Mindsets” are critical to anyone raising children in today’s fast-paced, often bewildering world.

.

………………….


img code photo … Turning Ideas into Action … Rabbi Noach Orlowek


http://ift.tt/15DY4Dc


………………….

.


A respected educator, author and speaker, Rabbi Orlowek taught for 16 years in Aish HaTorah Jerusalem, and is currently mashgiach in Yeshiva Torah Ore, Jerusalem. He is a well-known speaker and counselor, specializing in parenting, personal growth, and interpersonal issues. He is the author of My Child, My Disciple, My Disciple, My Child, Raising Roses among the Thorns, and Turning Ideas into Action.

.


Footnotes


Pelech HaShetikah V’Hahodayah ("The Art of Silence and Praise"), Elul 5739 (1979).

Gittin 6b; Shabbos 34a.

Rav Hutner cites this well-known aphorism in a letter published in Iggros U’Kesovim 136.

Chiddushei Aggados, Berachos 6a.


This phrase doesn’t appear in the Talmud but seems to be an application of the gemara in Berachos 6b: "Whoever has yiras Shamayim, his words are heard." See Michlol HaMa’amarim V’Hapisgamim (Jerusalem: Mossad HaRav Kook, 1961), vol. 1, p. 502; see also Shirah Yisrael by Rav Moshe Ibn Ezra, p. 156, where this saying appears.

Derash Moshe, Kedoshim, p. 22.

Yeshayahu 3:9.

Kesubos 111b.

Sha’arei Orah, vol. 2, p. 105.

See Guardian of Jerusalem (ArtScroll History Series, 1983).

.


.

.

………………………………………………………………………………………………………………………………………………………………………

.

.

.




99 Inspirational Words from the Mouths of Greats...


The post Cool How To Make images appeared first on 99 Things You Wish You Knew.






via WordPress http://ift.tt/1amx2gA

No comments:

Post a Comment