Yipee! I have officially completed my first day of the fast and currently eating everything. Just kidding! Not really… Seriously though, it wasn’t that bad and I reckon it’s because I had a really good breakfast. So, without further adieu, the following are my top 5 breakfasts to keep you full an entire day, fasting or not, either way.
1. Bircher muesli (Oats are probably the most filling breakfast food ever. Top with raw nuts and fresh fruit for extra oomph! If you’re feeling adventurous, try my peanut butter and banana variety, HERE.)
2. Chocolate chia-seed pudding (Excuse me while I drool into my keyboard…but in all seriousness, this breakfast is super nutritious and super filling because both chia seeds and raw cacao are incredible SUPERfoods (see what I did there?). Alternatively, for a simple chia pudding, click HERE.
The Convenience and Curse of the Hi-Tech Social Media
By Apolinario Villalobos
Hackers can pick up personal information from ATM receipt and airline boarding pass. There is a gadget today that can be used to scan them for personal information of the identification owner. The best thing to do then is shred into pieces the used airline boarding pass and ATM receipt. Do not throw used boarding pass ATM receipt in trash cans or just anywhere in their intact form.
Restrain yourself from posting revealing personal information in your facebook to impress viewers. Do not use this social media as a diary. The most no-no is posting the interior of your lavishly furnished homes, again, to impress friends. Some even go to the extent of posting jewelries as if telling viewers to eat their heart out in envy, while others announce to the world that they will be out-of-town to enjoy weeks-long vacation.
Hackers can pick up passwords and usernames in free wi-fi sites, so that it is advised that upon reaching home, the passwords that were used in free wi-fi sites should be changed immediately. Some hackers frequent free wi-fi areas such as malls, airports, parks, hotel lobbies, and others to fish for easily hacked passwords.
Delete the history in the computer used in internet cafes. Hackers can retrace the route taken by browsers who forgot to delete the sites and pages that they opened and explored. The sites opened by the browser can betray his or her personality that hackers can use in invading his or her privacy. This should also be done when using personal computers such as laptop or desktop as they might be used by “friends” with unpleasant intention.
It is sad to note that the high-technology that brought about comfort and unquestionably helpful social media also brought with it a curse of destruction to the careless. The best protection that we can give ourselves is a reminder not to be too trusting.