Schools Shut Downs Start as The Government & Media push COVID Tripledemic

0

In a move that reeks of governmental fear-mongering and coordinated manipulation, several school districts across the country are shutting their doors and switching to remote learning. The cause? A so-called “tripledemic” threat that seems more like an attempt to control us than a genuine health concern. These shutdowns are not about protection; they are about coercion, fear, and an erosion of our freedoms.

In states like Kentucky and Texas, school districts are canceling classes after so-called outbreaks of COVID, the flu, and strep have been reported, sending students and staff home. Officials like Scott Lockard, the public health director for the Kentucky River District, are claiming an intense uptick in COVID cases, while others cite additional concerns like strep throat, RSV, and stomach viruses.

But is this a legitimate crisis or the latest hyped-up scare tactic?

Adding to the fear are warnings about the recent COVID mutant (EG.5 or Eris) and a so-called deadly spread of the respiratory syncytial virus (RSV), which officials claim results in 14,000 deaths among older adults annually.

In South Texas, the superintendent of Runge ISD announced a temporary closure due to a surge in COVID-19 cases, further adding to the panic. Meanwhile, institutions nationwide are again imposing COVID-19 mask mandates, and rumors are swirling that the Federal Government is preparing for more COVID mandates and restrictions.

When will this madness end?

We’ve seen this play before—draconian policies, restriction of liberties, and a 24/7 fear campaign from the media, all under the claims of keeping the public safe. Yet, after years of shutdowns, mandates, and large-scale vaccine campaigns, it’s clear that these things did nothing to stop the virus – some think they only made it worse.

And now, Colleges like Rutgers University and Morris Brown College are reviving useless policies from 2020, all while the Biden administration is buying Covid equipment and spending $1.4 billion on more Covid “countermeasures” and vaccines. It’s a runaway train of spending and fear-mongering that seems to have no end.

But perhaps people are starting to wake up! With only 17% of Americans getting their Covid booster shot, according to CDC data, and more and more people saying NO to the tyranny, there’s hope that this madness can be stopped.

The “tripledemic” is a transparent and alarmist narrative that our country cannot afford to fall for again. The school shutdowns and remote learning are not about protecting our children; they’re about maintaining control and perpetuating fear.

Preparedness Resources:

Unique Food Storage Ideas: The Most Surprising Locations

0

Unique Food Storage IdeasAre you dreaming of packed pantries and bountiful basements, but currently housed in a small living space?

You don’t have to let your dwelling ruin your passion for preparedness!

Do YOU Live In A ‘Danger Zone’ County? Find out NOW with my Danger Zone County List & Special Report – It’s 100% FREE… Click here now for Instant Access!

Get Down For Food Storage Solutions

“Under the bed” is a great location to store things, right?

Well, why stop at just the bed?Under Couch Food Storage

Look around your space and find every piece of furniture taking up space.

Does it have legs that give you a few inches of room between the floor and the unit?

That unused gap is an excellent space for dried foods or cans.

Maybe your office desk has enough space for a couple of food buckets underneath.

Or your couch can hide a couple of low-profile boxes full of dehydrated goods.

The kids’ furniture isn’t out off-limits.

Do you have a new bundle of joy in your small apartmentUnder Baby Crib Food Storage?

There is plenty of room for both the princess and your peas.

Slide boxes of canned goods underneath the crib or toddler bed.

Want a free family-first food planning guide?

Click here to instantly download this Complete Checklist PDF. No purchase necessary.

Look Up For Food Storage Ideas

When you’ve run out of floor space, then it’s time to go vertical.

Make the most of wall space by installing shelves that go up all the way to the ceiling.

You can even utilize space above windows and doors by installing single shelf brackets above the door or window frames.

High kitchen ceilings allow for some open space above the kitchen cabinetry.

Rather than use this design for decorating, try keeping some items from your stockpile up there.Above Kitchen Cabinets Food Storage

Don’t want to see boxes or cans out in the open?

Fill up a few cloth or wicker storage baskets first, then place the baskets on top of the cabinets for a less cluttered look.

Always keep in mind that a little bit of re-arranging of non-food items can give you more space for your emergency food storage.

  • Can you hang your pots and pans from the ceiling?
  • Mount a spice rack on the door?

Relocating your spice drawer can give your food pantry more room for your long-term food storage.

Now use that free drawer wisely with food good organization practices.

Food Storage Ideas In Plain Sight

Have you ever seen those restaurants that decorate with cans of Italian tomatoes, fancy olive oils, or dried garlic ropes and peppers hanging from the ceiling?

Why not store your items the same way?

An added benefit is you can spark a conversation about preparedness when friends are over and see your food stash.

Of course, it pays to think wisely about what’s out in the open.

Oils, foods kept in mason jars, and other foods break down more quickly when exposed to light.

Keep on display only the items you are rotating out to use first, and keep the rest of your bulk storage in a darker place.

Hanging In There With Your Food Stock

Everyone knows you can stuff the floor of your closets with food-grade buckets and stacked cans.

But did you know you can also hang your essentials next to that old motorcycle jacket?

Just fill an oversized zip-top storage bag with pre-sealed packages of pasta or dehydrated foods (think lightweight).

Place the handle of the bag over the “hook” part of any regular plastic hanger and hang it on the closet rod.

Alternatively, you could utilize a hanger with pants clips, clipping them on the edges of one or even several bags, and hang them up.

Shoe Rack Food Storage LocationAlso, try installing a tension rod behind the clothing rod in your closet for even more hanging space.

Over-the-door pocket shoe organizer is also a wonderful way to sort and stock your surplus food items.

Clear pockets can give you an idea of how much you’ve accumulated with just a quick glance.

A hanging shower caddy can be mounted in places other than just the shower.

Try mounting it in a closet or hallway, on the back of cabinet doors, or on the side of your kitchen island.

It’s the perfect place for extra salt and spices.

Want a free family-first food planning guide?

Click here to instantly download this Complete Checklist PDF. No purchase necessary.

The Perfect Survival Food Storage Hiding Place

One place that is often overlooked is the wall behind a perpetually open interior door.

Stack some food bins if there’s enough room or create slim shelving about the depth of a mason jar to hide your canned goods behind the open door.

Think about your appliances like the refrigerator or washer and dryer.

Do you have a small space between the appliance and the wall?

Stack extra cans to your arm’s length deep.

You can create an entire preparedness pantry by dividing off a section of your bedroom or living area.

Simply hang a dividing curtain about 2 feet from an existing wall.

This area can house all of your bulk food supply, without sacrificing a ton of your already limited space.

If you have invested in larger preparedness storage containers, like stackable buckets or bins, this is the perfect place to house them.

If there is no room to create your own curtained closet, consider using your existing window treatments.

Place your buckets on the floor by the window so they are out of sight behind the drapes.

By being creative with your decorating, you might find a few more unique food storage hiding places too.

Swap It Out

Try trading simple furniture for storage-friendly pieces.

How about swapping that tiny TV stand for a full-sized dresser?

The spacious drawers can store dry packaged foods and essentials, and you still have just as much room for your entertainment essentials.Living Room Trunk with Food Storage Potential

Trade the coffee table for a large trunk and fill it with your emergency food cache.

Swap a regular ottoman for one that opens up for storage.

Try storage-friendly bench seating in your dining area instead of chairs.

When you switch your furniture out for high-capacity pieces, you’ll find more ways to store the foods you’re stocking.

Low Profile and Stackable Storage Bins

In order to utilize low profile spaces such as under furniture, you need the right kind of containers…the lower the better.Low Profile Storage Containers

Check out this small food storage container that will easily slide under furniture and it looks good too.

The Last Resort Solution

If you live in a small apartment or house, odds are there are some affordable storage units not too far away.

If this is true for you (and you can afford it) you can store a lot of food buckets, dried goods, and cans in a small rental unit dedicated solely for this purpose.

The biggest downside to this is when SHTF you’d have to leave your home periodically to acquire more of your stash.

Not an ideal food storage idea but better than starvation.

Want a free family-first food planning guide?

Click here to instantly download this Complete Checklist PDF. No purchase necessary.

How Much Food Do You Really Need?

In tight living quarters you really only want to stockpile the amount of food you need…no more, no less.

If you can be strategic and lower the amount of food you actually need then the less food you’ll need to find store locations for.

In order to find out how much food you should have stockpiled, you need to figure out how many calories you and your family need each day.

So I put together a “family first food guide” to help you do just that.

Want a free family-first food planning guide?

Click here to instantly download this Complete Checklist PDF. No purchase necessary.

Then once you know your family’s total calories needs, you can decide how many days, months, or years you are stockpiling for.

Based on these 2 numbers you can figure out how much survival food your family needs for any given emergency time frame you decide.

If you need to get creative with your prepper food storage, the best tip out there is to inventory your stash.

With hiding places like behind the curtains, it would be easy to forget about some foods until it’s too late, which is certainly a waste of your time and space.

Be sure to list not only the foods you have stocked and the dates but the creative place you have stowed your treasure.

And keep a copy of your list (on paper) in an easy-to-find location.

Prepare, Adapt & Overcome,

  • Cofounder Of Skilledsurvival.com & TheResilientLife.com
  • Born & Raised On A Rural Farm In The Midwest
  • Mechanical Engineering Grad From A Major University
  • Engineer With A Major Food Manufacturing Company
  • 10+ Years Researching, Writing, & Teaching Preparedness
  • Mission: Help Folks Stop Living A Life Fragile To The Future
  • P.s. Do You Live In A ‘Danger Zone’ County?

    Find out now using my Danger Zone County List & Special Report it’s absolutely FREE. In minutes you’ll know EXACTLY where you stand and if you should be worried or not..

    The post Unique Food Storage Ideas: The Most Surprising Locations appeared first on Skilled Survival.

    Ultimate 42 Step Guide To Protecting Your Privacy Online

    0

    How To Protect Your Privacy Online With Cyber Security

    How To Protect Your Privacy Online

    You’re careful.

    You avoid sharing personal information with strange websites.

    You never fill out those random pop-up surveys.

    You don’t click any suspicious email links.

    Sure, you occasionally make online purchases, but only with reputable companies you trust.

    Maybe you’ve even bought a virus protection package to prevent malware, spyware, and phishing.

    But, guess what…it probably doesn’t matter.

    Sadly complete privacy is a thing of the past.

    Do YOU Live In A ‘Danger Zone’ County? Find out NOW with my Danger Zone County List & Special Report – It’s 100% FREE… Click here now for Instant Access!

    Here’s an example of why I say that:

    Head over to www.familytreenow.com and you’ll see this:

    familytreenow.com

    Enter your first name, last name, and the state most associated with you.

    Don’t worry; you’re not giving up any new data, you’re just checking to see what this single site knows about you.

    Now scroll through the results.

    See if you can find you.

    Once you find one that looks like you, click on it and see what comes up.

    If you’re like most people (including me), you’ll see many of your relatives’ names (father, mother, siblings, etc.) and you may also see some close acquaintances’ names (friends, roommates, business partners, etc.).

    You’ll probably recognize your past home addresses.

    How does that make you feel? Violated? Frustrated?

    Welcome to the internet age, where even your offline personal data is being uploaded to the web.

    Then assembled to reveal YOUR personal data to the entire world.

    I don’t know about you, but I wasn’t happy to see my results, I never agree with this.

    I didn’t approve of this. How in the world did my personal information become someone else’s website service?

    It’s an absolute outrage!

    And the worst part is we can’t put the cat back in the bag.

    This data can never be erased.

    It’s too late.

    So I start asking myself, what’s next? My family, acquaintances, and addresses are bad enough.

    But when will my internet activity become part of the online universe? On full display for the world to see.

    If you want to keep some semblance of privacy, you’re going to have to get serious about it.

    You need an online privacy plan.

    Want a free 78 item prepper checklist?

    Click here to instantly download this Complete Checklist PDF. No purchase necessary.

    word privacy surrounded by computer code

    Frightful Examples Of What’s To Come…

    In no way do I support or condone the website “Ashely Madison” (a website created so married people can cheat on each other).

    I only use it as an example of what’s already happening.

    The site was hacked in 2015, and 40 million customer emails were revealed.

    To this day, you can enter any email address (your own, a spouse, a friend, co-worker’s) and see if they were ever on Ashely Madison’s email list.

    And if you found them on that list your perception of that person would change, right?

    But what if someone else accidentally typed in the wrong email address (happens all the time) but this time it was YOUR email address?

    Or what if someone who dislikes you signs up using your email address out of spite?

    Here’s a quote from the Ashley Madison data breach investigation:

    “None of the accounts on the website need email verification for the profile to be created, meaning that people often create profiles with fake email addresses, and sometimes people who have similar names accidentally confuse their email address, setting up accounts for the wrong email address.”

    – Source [bold sections by Skilled Survival]

    governement

    How About NSA And The Government?

    Let’s take this one step further. What happens when the government has data on who frequents certain websites?

    It’s not hard to imagine our out-of-control government wanting to know who’s a conservative and who’s a liberal.

    They could use this data against you (if you’re not on their side).

    How? Maybe they decide that conservatives should become targets for IRS tax audits.

    Actually, we don’t have to imagine this scenario, this stuff is already happening.

    Remember the 2013 IRS targeting scandal?

    Here’s a quote to ponder:

    “In early May 2013, the Treasury Inspector General for Tax Administration released an audit report confirming that the IRS used inappropriate criteria to identify potential political cases, including organizations with Tea Party in their names.”

    Source [bold sections by Skilled Survival]

    You can’t make this stuff up.

    We’re quickly approaching an era of no privacy.

    And to top it off, every day we hear about new hacks and data breaches from national companies such as Yahoo, Target, Adobe, LinkedIn, Snap Chat, CVS, eBay, Sony, Home Depot, TD Ameritrade, Apple, Facebook, etc., etc., etc.

    The list is very long and growing almost daily, click here to see the entire list; it’s eye-opening.

    What About Malware and Ransomware?

    With the world’s workers going remote in 2020, the ransomware trends have only continued to get worse.

    A recent survey shows some quite alarming statistics:

    • 51% of businesses were hit by ransomware in 2020
    • 1/4 of ransomware victims paid the ransom to hackers
    • The average ransom demand was $178,000
    • The average ransom demand for small businesses was $5,900
    • The largest ransom demand was $11.8 million

    So What Can You Do To Protect Your Privacy?

    While it’s getting harder to protect your privacy 100%, it’s still possible to safeguard much of it.

    But you can no longer “just be careful” and avoid doing stupid things, you must become proactive.

    Here are the detailed steps to protecting your personal privacy.

    Home WiFi Network Protection

    Let’s start with the network you have the most control over, your home WIFI network.

    You lock your doors at night, right?

    You’d never let a stranger waltz right into your kitchen to make a sandwich.

    So why would you allow this for your home’s WIFI network?

    Don’t you know your WIFI signal doesn’t stop at your front door?

    It often carries out to the street.

    Unbelievably, it’s estimated that 79% of home routers are at risk of attack.

    The last thing you want is a creep parking outside your home to get access to your WIFI and personal network information.

    So if you haven’t done so yet, lock it down.

    plugging in an ethernet cable into a router

    Update Your Router Settings

    One of the more susceptible areas of your home’s WIFI network is your router.

    Many people don’t take the time to change the default passwords, change their SSID, turn on encryption, or update their firmware.

    1. Grab An Ethernet Cable

    The first step to making these critical security improvements is to get your hands on an Ethernet cable.

    Yes, Ethernet.

    It’s old school but it’s the safest way to update your router’s firmware (later step).

    You want to avoid any connection loss when updating your firmware as this has been known to cause some routers to turn into plastic paperweights. For example,

    As one person asks in a Netgear forum: “Can I Update Firmware Without Ethernet Cable To My Computer?”

    Answer: “it’s not recommended because there is no real way to determine when WiFi will drop during the upgrade process. You could easily brick your router. Purchase an Ethernet dongle for your laptop. It’s handy to have..”

    Source [bold section by Skilled Survival]

    In case you don’t know what the term “brick your router” means, it’s when your router is fried, “done for,” worthless, or destroyed…

    2. Log In To Your Router

    So once you’ve got your Ethernet cable, physically connect it from your computer to your router.

    Log in to your router’s backend. For most routers, you can find the backend login screen by typing in the following IP address into your web browser: 192.168.1.1

    However, if this doesn’t work, you’ll need to read your router’s owner’s manual to find your router’s IP address.

    Or you can try going to www.routeripaddress.com and locating your router’s model name to find it.

    Your router’s model name will be located somewhere on the device itself.

    3. Audit Your Username and Password

    Once you’ve accessed your router, it’s time to update your username and password.

    Never leave these in the default settings.

    Every hacker (and anyone with basic computer knowledge) knows the standard default passwords for a new router is:

    • Username: admin
    • Password: admin

    If you leave yours like this, sorry to say it, but you’re asking for it.

    With passwords, the more complex, the better.

    That’s why I recommend looking into a password manager (password managers are discussed later).

    4. Change The SSID

    The next security update is to change your WIFI SSID.

    Before you freak out, SSID is just a fancy acronym.

    It stands for Service Set Identifier, but honestly, it’s just the name of your WIFI network.

    When you search for WIFI networks, it’s the name you see. That’s it.

    When you see a list of available WIFI networks, it’s the names you see. That’s it.

    But you should change yours from the default. Use something creative so you know it’s yours but not too personal.

    Pro Tip: Try using something menacing like “you’ve been hacked” or “this is a virus”.

    It helps keep strangers (or cheap neighbors) from trying to connect to your network because who has the courage to connect to a WIFI network called “you’ve been hacked”?

    Your friends and relatives may raise an eyebrow when they want to connect to your network but tell them why and they’ll think you’re a genius.

    5. Or Hide Your SSID

    What’s even better than using scary WIFI network names?

    Hiding it.

    Modern routers let you adjust this setting.

    Turn it on and your SSID won’t show up at all in WIFI network searches.

    The good news is:

    Your computers and devices that are already set up and connected will be fine.

    It’ll only be a hassle when you want to connect a new device (smartphone, smart TV, etc.).

    When this happens you can either type in the SSID info manually in the setup step (since you won’t see it).

    Or you can go back into your router, allow the SSID to display, connect and then hide the SSID again.

    Is this a pain in the butt?

    Of course, but if you want to protect your security and privacy that’s what it takes in today’s world.

    Get used to it.

    6. Double-Check Your Encryption Settings

    Now it’s time to embrace encryption. Another jargon term but necessary to understand and use.

    Without getting too technical, you need to switch from WEP to WPA2-AES and disable the PIN method of using WPS.

    You want to use WPA2-AES because it’s the newest and strongest form of encryption.

    That’s all you really need to know.

    If you can’t enable WPA2-AES encryption because your devices are too old then it means you’re long overdue for new devices (computers and routers).

    Want a free 78 item prepper checklist?

    Click here to instantly download this Complete Checklist PDF. No purchase necessary.

    7. Check For Firmware Updates

    The next step in your router security adventure is to check and update your firmware.

    New security breaches occur almost daily. So to combat these new breaches, router companies periodically push out new firmware updates.

    These firmware updates patch new security holes.

    However, if you’ve never updated your firmware there’s a good chance you have security holes.

    And this is not a one-and-done task. You should check and update your router’s firmware on a set schedule.

    Once a year will work for most people.

    Normally, on the login screen, you’ll see a “check firmware” button.

    Click it, follow the prompts, and update to the latest version.

    8. More Router Setting Changes

    A couple more router security tips to consider: Do you plan to ever change your router settings when you’re far away from home?

    Probably not.

    Do you want someone else to have the ability to change your router settings remotely?

    Hell no!

    So go ahead and turn remote management off.

    Look for something named Remote Management, Remote Access, or Remote Administration settings.

    Now since we’re talking about remote management, why don’t you go ahead and just turn your WIFI off when you’re out of town?

    Unless you have devices such as a WIFI doorbell or a NEST learning thermostat (that uses the internet while you’re away), you might as well turn it off while on vacation.

    9. Time For A New Router?

    If your router is too old to make these adjustments, it’s time for a new one.

    The good news is:

    That a new router can significantly increase your data speeds.

    I personally upgraded my router about two years ago and it was money very well spent.

    Before upgrading I was struggling to stream any video content, now it’s coming in at HD levels with no problem.

    This might not be your issue but it was for me.

    If you decide to get a new router skip 802.11b or 802.11g and make sure it follows the newer, faster 802.11ac standard.

    You are now no longer a part of the masses with unsecured routers.

    Congrats!

    Computer Setting For Privacy

    Once you’ve got your router on lockdown, it’s time to focus on your computer and online settings.

    I’ll start with one of the most important privacy and security actions: your passwords.

    hacking a password with tweezers

    10. Use A Password Manager

    This one changed my life.

    Everyone should become a LastPass user.

    The FREE plan allows you to manage all your desktop passwords.

    And for only $12 per year for their premium option, such as family sharing and priority support.

    Here are the main reasons you need LastPass:

    • Only need to remember 1 password to login to all your sites
    • Start creating high-security super complex passwords
    • Use unique passwords for every site
    • Autofill’s in your email and passwords; if you so choose
    • All password data is encrypted (which means your passwords can only be seen by you)
    • You can add 2-step authentication to drastically increase the security (more details on 2-step authentication later).

    If you’re like me and have lots of sites and passwords, you need a password manager in your corner.

    LastPass is trustworthy, protects you and your data, and improves your online privacy from all the bad actors out there.

    If you’re still using simple (easy to crack) passwords like “Steve12” or “Rover1” or even “ihatemyjob” you are at high risk.

    Instead, use LastPass to create complex (very difficult to crack) passwords that look more like this “fL3&sE$^tW$z#”, and start sleeping better at night.

    up close webcam

    11. Your Gadgets Are Spying On You

    Does your computer or smartphone have a camera built-in?

    Or a desktop webcam?

    Then you should know it can be used to spy on you.

    One word comes to mind; creepy. Imagine someone watching through your open laptop.

    Probably recording what they see.

    Malicious actors can turn on your cameras and watch your every move.

    Here’s a small news snippet about one such creep:

    In all, Mijangos unlawfully accessed and could control more than 100 computers.

    He read their emails, watched them through webcams without their knowledge and most damaging was his discovery of nude photos they had taken of themselves. Mijangos then threatened to post the images online unless his victims were willing to provide more racy photos or videos to him or if they went to police, according to court documents.

    – Source – [bold sections by Skilled Survival]

    What’s even worst is most of Mijangos victims were teenage girls.

    The archive of voyeurism was staggering: over 15,000 webcam-video captures, 900 audio recordings, 13,000 screen captures. In total, he had infiltrated more than 230 victims, including juveniles.

    – Source [bold sections by Skilled Survival]

    The only good news it’s an easy problem to solve and you don’t need high-tech software to protect your privacy from this invasion.

    You just need a sticker.

    Place a webcam sticker over the camera when not in use and voila, problem solved.

    browsers settings drawing

    Focus On Your Browsers

    Web browsers are in the business of making money.

    The searcher (you) is the product, the advertisers are the customer.

    The more people who use a specific browser the more money they make on ads.

    And advertisers always want to know more about YOU.

    So browsers, by default, are not set up with a high level of private security.

    This is a shame, so you have to take proactive action to protect your online browsing privacy. Here’s how:

    12. Check Links Before You Click

    Don’t be a click-happy-nincompoop.

    If an online or email link seem sketchy, trust your gut, it’s probably not safe.

    But if you still want to click it, check it first.

    You’ll need to copy the link without clicking the link.

    Hover your mouse’s pointer over the link and the address will display in the bottom corner of your browser.

    Now, right-click on the link to access the drop-down menu. Copy the link address.

    Now head over to urlvoid.com.

    Paste the copied address into their search bar.

    Click the scan button and see what comes up.

    Is this foolproof? Absolutely not.

    But it’s better than clicking blind.

    13. Add HTTPS

    Websites that use HTTPS means they encrypt the data that travels back and forth between their website and your computer.

    Unfortunately, this newer standard is difficult to implement and so is not yet widespread.

    You can tell if a site is using HTTPS if its web address starts with it, as opposed to starting with the old “HTTP” standard (notice no “S’ at the end – the “S” stand for secure).

    While it’s currently impossible to avoid all sites that don’t have the new standard yet, you can do yourself a favor and add an extension to help.

    Download the HTTPS Everywhere extension from Electronic Frontier Foundation.

    This will ensure your connections will be encrypted anytime you connect a website that supports the HTTPS standard. It works with Chrome, Firefox, and

    14. Block Ads

    We’ve come a long way from old-school billboards and commercials.

    While most ads suck, the online sort can be more than just annoying.

    They often snoop on your online activities without your consent.

    Consider adding an ad-blocking extension such as Adblock Plus, DisconnectPrivacy Badger, or UBlock.

    Google It Written On A Chalk Board

    15. Make G Behave or Ditch Them All Together

    G owns search.

    They dominate the market by a massive margin, with over 60% of U.S. searches.

    And once people develop a habit of using it they keep using it. No matter what the privacy setting is.

    So I have 2 suggestions for you.

    16. Meet “Duck Duck Go”

    The first and most surefire way to protect your online search history and data is to use Duck Duck Go.

    Weird name a for search engine, but they are the “bee’s knees” when it comes to search privacy.

    Think simple, spam-free search results without sketchy stuff. Minus recording your IP address. Minus tracking cookies.

    No personal information was collected. No personal information was shared.

    Just glorious search engine privacy.

    You’re welcome.

    Note: I’ve recently changed to using Brave as my privacy browser of choice.

    17. Restrict the Big G

    Alright for everyone who can get off the G train cold turkey, then you should still limit their data collection.

    Honestly, for as big and dominant as G is they do provide a good amount of privacy control.

    But not by default. For the most part, it’s up to you to turn it off and restrict it.

    So go to My Account to control what data you agree to be collected and how it’s shared.

    Specifically, go to Personal Info & Privacy to review Location, Search, and YouTube Search History.

    Feel free to delete all your history at once or one item at a time.

    Also, make sure to prevent G from recording your private data going forward.

    18. Ditch G For Good?

    You can delete your G account if you want to go hardcore.

    This option cannot be undone.

    So make sure you are ready for it.

    Go to My Account or Services, find the “cancel my account” option, take a deep breath, and follow the prompts.

    Again, you will lose all your G account data (old emails, calendar, history, G+ data, etc.) going this route so don’t do it unless you’re 100% ready.

    Want a free 78 item prepper checklist?

    Click here to instantly download this Complete Checklist PDF. No purchase necessary.

    19. Wearables (a.k.a. Spyables)

    Most wearable fitness-based devices (such as Fitbit) use Bluetooth technology to connect to your smartphone.

    However, Bluetooth is not secure. It’s fairly easy for data access “sniffers” to nab the data being transferred.

    Data such as a user’s name, password, address, and GPS. Not the sort of information you want tech-savvy strangers to know.

    So go low-tech and turn off your Bluetooth syncing while you’re away from home.

    Then turn it back on once you get home.

    Data that are not being broadcast can’t be snatched out of the air.

    Problem solved (plus, the battery life of your wearable and phone will improve).

    metal padlock laying on a circuit board

    Protect Yourself From Ransomware

    Ransomware is alive and well.

    Hackers are making a fantastic living by blackmailing innocent people with their own data.

    The way ransomware works is a hacker either steals a person’s data or takes over their computer.

    Then they contact the victim and demand money to save the data from destruction (or the sharing of personal data).

    If it’s data that you would hate to lose or data that you would be ashamed to share, they use this as leverage (i.e. blackmail) to get you to pay up…or else.

    Scary stuff. And it’s growing in popularity.

    “On average, Ransomware infects 30,000 to 35,000 devices in a month.” – Source

    That’s a whole lot of misery for hundreds of thousands of people each year.

    And the frequency of attacks and the number of “dollars” demanded are both rising at incredible rates.

    It’s only a matter of time before you (or someone you know) are affected.

    Notice I used “dollars” in quotes above, that’s because often ransomware hackers demand getting paid in cryptocurrencies like bitcoin.

    Side note: If you’re going to own any cryptocurrencies, you’re going to want to store them in a hardware wallet to keep them safe from hackers stealing them from you.

    On a personal note, I have a friend who’s Dad’s data was held hostage via ransomware.

    Get ahead of this before you’re a victim too. You need to:

    1. Back-Up Your Data
    2. Keep Software Programs Up To Date
    3. Use Data Encryption

    20. Back Up Your Data

    Use a storage system that backs up all your important files and data automatically.

    That way, if you’re ever hit with ransomware, you’ll be able to restore your files without having to succumb to these scums’ demands.

    Here’s an extensive backup guide to help get you started.

    As you’ll discover in the guide you have 3 backup options to consider: bootable, external, or cloud. The choice is yours.

    21. Keep your Software Up To Date

    Set your computer and phone to update software automatically.

    This will make certain that you don’t have any unnecessary old security software loopholes.

    When a new security patch is pushed out, you will get it ASAP.

    image of the word encryption in red

    Use Data Encryption

    Encryption is for everyone. Nearly everyone uses encryption every day.

    But few people even understand what it is.

    Encryption is the act of scrambling data from sender to receiver.

    If someone sees the scrambled encrypted data during transmission, it looks nonsensical to them.

    Unless they have the encryption key.

    The key takes the scrambled information and unscrambles it.

    Another example: Let’s imagine there are 3 people in a room and only 2 of these people know Morse code.

    The 2 people who know Morse code start tapping back and forth, laughing and pointing, etc. (they know the key) but the third person is clueless.

    The data being transmitted (long and short taps) is encrypted as far as the third person is concerned.

    So encryption scrambles your digital data so it’s unreadable to anyone who doesn’t have permission to access it.

    Without encryption, online purchases would be impossible since you’d be sharing your credit card information with the entire world.

    Want a free 78 item prepper checklist?

    Click here to instantly download this Complete Checklist PDF. No purchase necessary.

    22. Encrypt Your Smartphone

    Your smartphone knows nearly everything about you.

    With GPS, it knows where you are all day long (assuming you take it with you).

    It knows who you called, what websites you visit, who you text with, what you said, etc.

    The good news is most smartphones today have encryption available.

    You just need to take the time to enable it…

    Look in your phone’s settings and find the Security option (it may be called something else on your phone).

    Then look for the Encryption option. Now follow the prompts.

    23. Encrypt Your Computers

    You can encrypt your entire computer’s hard drive or just specific sensitive files.

    The step to enabling encryption on your computer is different from PC or Mac and it also depends on the OS version.

    Here’s an article that will help you get started in figuring out how to encrypt your computer’s hard drive system.

    24. Encrypt Your USB Drives

    USB drives get misplaced.

    So you’d hate to accidentally leave it laying around only to have a stranger plug it in and go through your data.

    You should get an Apricorn flash drive with built-in encryption.

    They cost a few dollars more but consider it a single-fee insurance policy to protect your data.

    25. Encrypt Your Cloud Data

    Some folks are worried about storing their data in the cloud.

    And I don’t blame them.

    You are giving up a lot of control of your data for convenience.

    You’re essentially allowing your data to be stored at a remote server somewhere.

    However, for some, convenience is worth the risk.

    For example:

    With small businesses or for a long-distance family, the cloud makes sharing data and photos much easier.

    So if you decide you want to use the cloud you must

    1. Avoid uploading your most sensitive information
    2. Make sure it’s encrypted

    Dropbox is a popular cloud-based application that provides data encryption.

    I’m sure there are others but make certain you do your research and turn the encryption option ON if it’s not ON by default.

    You should also only choose a cloud-based Storage Company that supports 2 step authentication.

    26. 2 Step Authentication

    • Is the cloud convenient? Yes.
    • Does it use data encryption? Maybe.
    • Does it have 2 step authentication? It better, or you shouldn’t use it.

    Most cloud-based storage companies tout their data encryption tactics.

    And as long as you use a strong secure password and 2 step authentication, you’ll significantly lower the risks of an intruder gaining access.

    So what’s 2 step authentication?

    It’s basically a second form of proving you are, who-you-say-you-are.

    The first step is your password.

    But as we all know, passwords can be hacked (especially if they are simple and short).

    But by adding a second “step” of authentication, you’re dramatically reducing the chances of your accounts being compromised.

    With 2-step-auth enabled, not only does a hacker have to brute force cracked your password.

    But they now must also have your 2nd authentication code as well.

    This hacker headache alone makes it not worth the time to pursue your accounts.

    The most common way 2 Step Authentication works is to either send an SMS text of the code to your phone (or through an app) that generates unique codes every minute.

    The bottom line is:

    When you enable 2 step authentication on your accounts, you’ll start by logging in as normal and instead of gaining immediate access, you’ll have to enter a unique code.

    Depending on the account, the code may be sent to your phone via text or you might be able to get the code through an app.

    You enter the unique, time-limited, code, and then you get access to your account.

    A bit of a pain? Yes. Worth it? Yes.

    Your best privacy option is to either avoid using cloud storage or only use it for data you wouldn’t mind the entire world seeing.

    This takes us to the next topic…

    gps device on dashboard of car

    Stop Over-Sharing

    27. GPS Tracking

    Most phone apps (especially popular ones like Facebook) by default track your GPS data.

    With some apps, you can turn off this function, and you should.

    And if you can’t turn off the function, then I suggest you remove the app from your phone entirely.

    The other option is to turn off your phone’s GPS and only turn it back on when you are actually using it for navigation purposes.

    No one needs to know where I’m at, or where I’ve been, period.

    28. Turn On Log In Approvals

    “Log In Approvals” is just Facebook’s version of 2 step authentication.

    This means even if someone steals or guesses your password, they would also need a unique code to get in.

    Making it much less likely.

    So turn on “login approvals” to lock down your Facebook account.

    You can find the setting in your Facebook account settings area.

    29. Become Elusive

    Maybe you’re not interested in having an old high school crush looking you up on Facebook and friending you.

    So what’s the best way to avoid this awkward fate?

    Hide.

    You have the option to show up in the Facebook search results or not. Go to the “who can look me up?” settings section on Facebook.

    But like most privacy settings, by default, you will show up in the search.

    So you have to be proactive and turn that setting off.

    Want a free 78 item prepper checklist?

    Click here to instantly download this Complete Checklist PDF. No purchase necessary.

    Protection On Public WIFI

    Many people enjoy connecting to free public WIFI at places like Starbucks.

    Just find the network, accept the terms, and start surfing.

    But did you decide to automatically connect to that network whenever it’s in range for future convenience? Oops.

    Because what if a hacker creates a WIFI network that sounds like Starbucks ‘ official one?

    Maybe the real Starbucks connection was named “WIFI Starbucks,” and the hacker created a rogue WIFI called “Starbucks Official.”

    You wouldn’t know which one was the safe WIFI, so you connect to the wrong one; oops, you’ve just been hacked.

    You can combat this by asking the Starbucks staff (or whichever business you’re visiting) which WIFI is legit and never allowing your computer to automatically connect to public WIFI.

    Also, never conduct sensitive affairs on public WIFI networks, such as logging into bank accounts.

    30. Enable Your Computer’s Firewall

    A computer firewall acts as a front door for your computer.

    It won’t automatically let outside computers link to yours without your permission.

    Just as you would leave your front door open for anyone to walk into your home.

    Go to your computer’s security settings and double-check that it’s enabled.

    31. Hide Your Computer

    Once your firewall is enabled go a step further and cloak your computer.

    If the bad guys can’t find you, then they can’t hurt you.

    On a PC, it’s normally under Advanced Sharing settings.

    With a Mac, you can enter stealth mode in your firewall options.

    32. Use The Automatic Options

    Whenever you decide you want to join a public network, make sure you classify it as one.

    You can classify any network you connect to as “home” or “public”.

    When you classify it as “public” your operating system will forget the network when you log off.

    These terms and options are for PCs.

    For a Mac, use the free-to-download ControlPlane app.

    VPN letter blocks

    33. Use A Virtual Private Network

    In my opinion, this is the most crucial step to protecting your privacy when browsing online in public or private!

    “Incognito” windows don’t record your online history in your browser but that’s about it.

    Your computer’s IP address still shows where you’ve been online.

    A Virtual Private Network (or VPN for short) is a simple but effective online privacy tool.

    A VPN routes your internet connection through a remote server.

    So all of your internet activities are not tied back to you or your computer.

    Without A VPN: You’re Computer —–> Websites
    With A VPN: You’re Computer —–> Virtual Server —–> Websites

    All computers have a unique address called an IP address.

    When you visit a website, you’re essentially leaving your computer’s IP address at the front door.

    However, if you route your connection through a VPN you don’t leave YOUR IP address at the front door, you leave the VPN’s IP address.

    And the VPN’s address is not tied back to your IP address, so it lets you surf the web anonymously.

    Genius!

    Without the VPN anyone with a bit of technical know-how can see which sites you visit and how often.

    However, with a VPN your information and privacy are protected.

    Unfortunately, with a VPN you get what you pay for. And you can’t trust any old fly-by-night VPN operation.

    I recommend Using Hide My Ass

    That’s why I recommend HMA. They were founded in 2005, they have thousands of remote servers, they encrypt all the data, and I’ve been a satisfied customer since 2012.

    They are worth every penny to help protect my online privacy.

    Never go online without it.

    34. Go Long and Short

    Always, always, lock your mobile phone screen.

    The FCC estimates that about 1 million smartphones are stolen each year.

    And if you’re like most Americans, you keep a boatload of sensitive and personal information on this device.

    And often, out of convenience, your apps are set to automatically keep you signed in.

    So with a single tap, you get full to access your personal accounts (without having to enter an email or password).

    This is the typical setup for your Facebook app, Twitter app, Dropbox app, etc.

    Are you OK with a thief having unfettered access to these accounts?

    I didn’t think so.

    The best way to protect your smartphone’s data is to make your pin code or finger swipe code longer and more complex.

    Don’t get lazy and use a common pin code like 1234, 0000, 1111, 2222, etc.

    In a recent pin code data study conducted by datagenetics.com they discovered:

    The most popular password is 1234…

    …it’s staggering how popular this password appears to be. Utterly staggering at the lack of imagination...

    …nearly 11% of the 3.4 million passwords are 1234!!!

    If any of these easy combinations sound like your pin.

    Do yourself a favor and change it to something random or even better yet, go with a 6-pin random code for even more security.

    Smartphone thieves will attempt all the obvious combinations first and if your pin is one of these they will get in.

    If it’s not an obvious code they will eventually give up.

    Now Go Short

    Now, a pin code is utterly useless if you have a super long screen timeout.

    The good news is:

    You can change this setting.

    You can choose from “immediate timeout” all the way to “never timeout”.

    The bottom line is:

    The shorter the better.

    I recommend having it set to immediate timeout for the highest amount of security.

    Sure it’s a bit of a hassle to have your screen locked while in the middle of reading an article.

    But this will prevent a thief from having hours and hours of access to your smartphone data.

    If your phone auto locks in under a minute, then chances are a thief will never get easy access to your data from the start.

     Protect Your Mail

    fishing hook laying on computer keyboard

    35. Avoid The Phishing Nets

    You’ve probably heard of the term phishing.

    It’s those real-sounding emails that are sent in an attempt to get you to click a link and share information.

    Oftentimes these emails look authentic.

    They pretend to be from a company you use asking you to “update your password”.

    But they are really phishing for your password by asking you to change it.

    Once they have your password and can get into your account.

    The easiest way to stay safe from these sorts of attacks is to use two-factor authentication.

    This prevents anyone with just your password from accessing your accounts.

    They would need the 2nd factor as well (see the prior section on two-factor authentication).

    36. Be Skeptical Of All Emails

    Nowadays, most legit companies don’t ask you to click links in emails to update passwords.

    But if you’re ever uncertain, you can always open up a new browser window and type in the URL that’s displayed; bypassing having to click the link.

    Links can say one thing but do another.

    Or they can redirect from one location to another. So click all links with a healthy dose of skepticism.

    37. Pick Up The Phone

    Again, one of the best ways to avoid these new-aged scams is to not play the game.

    Pick up a phone and call the company.

    Ask them about the email you got.

    This will provide the proof you need to find out if the email was legitimate or not.

    38. Use 10-Minute Email

    Occasionally, you are willing to trade your email address for access to a website, to sign up for a loyalty card, or to get an email receipt.

    But what if you only want the one-time service and don’t really want to give up your real email address?

    Use www.10minnutemail.com instead.

    This service allows you to create an email address that is only functional for 10 minutes (or 20 if you choose).

    After that time is up, the email address self-destructs and 10minutemail doesn’t retain any personal data.

    Just be aware, you won’t have access to any follow emails from the company.

    So only use the 10-minute email option with companies you don’t trust. You don’t want to miss out if they’re sending you emails you actually want.

    39. See Who “Sharing” Your Email

    Don’t you hate when you get an email from some random spammer?

    Doesn’t isn’t it frustrating you don’t know which company gave away your data to that spammer?

    Start using this neat trick to find out who the original a$$hole was.

    If you have a Gmail account, Type “+” “websitename” before the @ symbol.

    For example:

    If your Gmail address was [email protected] and you signed up with XYZ Company, you’d submit your email address as [email protected]

    Now all emails from the XYZ company will still go to your email address but will now include some extra info.

    So if you ever get spam emails from a random company you’ve never heard of, you’ll know who sold your privacy down the river.

    Want a free 78 item prepper checklist?

    Click here to instantly download this Complete Checklist PDF. No purchase necessary.

    row of old rural mailboxes

    40. Shred Sensitive Snail Mail Documents

    Going through your trash or stealing from your mailbox is an old-school way for hackers and thieves to collect personal data.

    Way too many companies send unsolicited offers through the mail.

    And while it’s annoying, they often put sensitive personal info in the offers as well (I’m looking at you Credit Card companies).

    You need to shred those documents before they get shoved into your waste bin.

    Here are the snail mail documents everyone should shred:

    • Anything with your social security number on it
    • The same goes for Birthdate
    • Credit Card numbers
    • Account numbers
    • Medical Insurance Number

    But, shredding everything you intend to throw out is ok too.

    I use the adage of “when in doubt, shred.”

    If you don’t already have one, get yourself a quality paper shredder.

    41. Shut Off Unsolicited Credit Card Offers

    You won’t miss out, I promise. They don’t send you these offers to “save” you money.

    They send these unsolicited offers because they make themselves lots and lots of money, at your expense.

    Plus, they put your personal privacy at risk.

    These “offers” can get stolen, filled out by identity thieves, and get the actual Credit Cards sent to their address.

    Then it’s just a matter of activating them and quickly piling up debt before you notice.

    And while you’ll unlikely to be on the hook for such damages, it’s a personal privacy security mess.

    You can put a stop to many of these unsolicited offers by going to optoutprescreen.com or calling 888-567-8688.

    This service is run by the Consumer Credit Reporting Industry.

    If you ever feel like you need more credit, shop around online on your terms, you don’t need these unsolicited offers coming in the mail.

    42. Receive Less Mail Overall

    What about all those other unsolicited offers?

    You can reduce those too by up to 80%

    using dmachoice.org. I also recommend you visit their “Learn More” page first to get an idea of how it all works.

    Action Plan

    Cyber Security and Privacy Action Plan

    Odds are, you got so into reading this cybersecurity and privacy guide that you forgot to take action.

    That’s ok because this is your kick-in-the-pants reminder to go back to the top and slowly work your way through all the action items.

    Unless of course, you want to kick yourself later for only doing half the work.

    Information not put to use is…useless.

    Your personal data will thank you.

    Prepare, Adapt & Overcome,

  • Cofounder Of Skilledsurvival.com & TheResilientLife.com
  • Born & Raised On A Rural Farm In The Midwest
  • Mechanical Engineering Grad From A Major University
  • Engineer With A Major Food Manufacturing Company
  • 10+ Years Researching, Writing, & Teaching Preparedness
  • Mission: Help Folks Stop Living A Life Fragile To The Future
  • P.s. Do You Live In A ‘Danger Zone’ County?

    Find out now using my Danger Zone County List & Special Report it’s absolutely FREE. In minutes you’ll know EXACTLY where you stand and if you should be worried or not..

    The post Ultimate 42 Step Guide To Protecting Your Privacy Online appeared first on Skilled Survival.

    Bighorn Sheep: Are They Dangerous?

    0

    Many domestic animals have diverged quite radically from their wild or ancestral counterparts. Let’s look at sheep, for instance.

    While it’s true that sheep can grow to be quite large and sometimes physically powerful, they don’t hold a candle to their wild cousins.

    bighorn sheep

    In the United States and elsewhere in North America, bighorn sheep are the largest of the mountain-dwelling sheep species.

    With huge, curled horns from which they derive their name and surprisingly muscular physiques, these aren’t the cuddly white lambs you think of when you hear the word sheep.

    And chances are those horns aren’t for show: are bighorn sheep dangerous?

    No, bighorn sheep aren’t considered to be dangerous to humans. Though they’re extremely powerful, very large and heavy and have impressive horns they are so rarely encountered at close range by people that attacks are almost unheard of.

    This is one of those situations that, even though an animal has the capability to easily cause immense harm to a human, they aren’t really a problem.

    That’s because these animals are almost never encountered at close range in the wild.

    Bighorn sheep are so suited to their environment and so elusive it’s almost unthinkable that any human could get close enough in time for a bad encounter to happen before the sheep moved away.

    Anyway, there is more to know, so keep reading and I’ll tell you all about them…

    What’s the Big Deal with Bighorn Sheep?

    Bighorn sheep share many overall characteristics and social structures with their domesticated cousins you’ll find on farms around the world.

    Bighorn sheep are heard animals, or flock animals I guess you would say, and in any given group you’ll find mostly females but also males.

    Most of the time, there’s little in the way of true conflict until mating season, when sexually mature males will begin to jockey for position, and access, to females.

    It is this mating behavior and competition that leads to some of the most well-known encounters that play out between these huge and impressive sheep: when two males square off, they size each other up, circle, back up and then charge before leaping and clashing horns.

    In the mountains and hills where these sheep typically live, the resulting crash! can sound like gunshots!

    Speaking of where these sheep live, that will give us a clue as to why actual confrontations with humans are so very rare: bighorn sheep tend to live on some of the steepest, rockiest and most impassable terrain in North America.

    This gives them ample protection from people and other predators: that’s because bighorn sheep exploit this terrain thanks to their physical adaptations which gives them tremendous grip and sure-footedness when climbing.

    Because most people are hard-pressed to even get close to sheep in this terrain, and combined with the excellent senses these animals have, most herds of bighorns will see a person approaching from a long way away. Then, they simply prance away across the mountainside to escape.

    Accordingly, circumstances where a bighorn sheep and a human are close enough to actually touch each other, at any time and for any reason, are extremely rare.

    No. Although they are generally skittish when they detect any animal that might be a threat, bighorns are not territorial.

    There are far more likely to simply move away when they spot trouble, and in any case whole flocks will move from place to place to find food and also engage in migratory behavior and some areas to avoid the worst weather.

    Bighorn Ram BATTLE in Wyoming!

    Yes, particularly during mating season. Outside of mating season, clashes are generally only social affairs where individual members of the flock that don’t like each other have to work out some aggression and re-establish the pecking order, as it were.

    During mating season, sexually mature males will clash with each other to establish dominance and secure access to eligible females.

    Bighorn Sheep ATTACKS Vehicle – (“Bam Bam” is DEAD).wmv

    As a rule, no. This is simply because it’s almost impossible to get close enough to them for the sheep to get aggressive with people.

    Chances are extremely high that they will see you coming from a long way away and then just leave, gaining considerable ground since they are so well adapted to the terrain you find yourself in.

    But, on the offhand chance that you do, somehow, get close enough to one of these large and powerful sheep, they could prove to be dangerous.

    Yes, there have been, though as I mentioned, these attacks are incredibly rare. Among all wild animal species in total, there are so few Bighorn sheep attacks on people in the wild that they can hardly be said to happen at all.

    A bighorn sheep is only likely to become aggressive if you get close to it, particularly during mating season or if you come upon a ewe that has lambs.

    Once again, the circumstances under which such an encounter might happen are vanishingly rare.

    If, for whatever reason, you do see bighorn sheep in the wild and you could get close to them, hold that intrusive thought at bay and just keep away.

    Incredibly strong, especially compared to other mammals. These sheep have to be strong and downright athletic to live and thrive in the environments that they inhabit.

    Bighorn sheep can commonly be seen leaping across chasms, clambering up and down seemingly vertical and impassable rock faces and maintaining a trot or canter across vast distances that would make most cross-country runners green with envy.

    Even looking at their fights, ones that happened between males anyway, we see that their endurance really is legendary. Some clashes will go on for the better part of a day before one male submits!

    Bighorn sheep do have teeth and can bite, but it is highly unlikely that they would try to bite you when they could just lead with their huge and incredibly hard horns instead.

    A bighorn sheep attack looks exactly how you are imagining it: they charge and ram, utilizing their immense horns combined with their speed and body weight to deliver immense impacts on opponents.

    If you were to be attacked by a bighorn sheep and then knocked to the ground, it would either continue head-butting you or perhaps stomp and kick you for good measure.

    And again, these are not common domestic sheep: adult bighorns can weigh more than 400 pounds (180 kilos), and some impressive male specimens can clear 500 pounds (226 kilos). The horns alone on a male weigh around 25 pounds and can weigh a lot more.

    Now consider that males and females alike can dash on flat ground, flatout, at faster than 20 miles an hour and you can do the math if you want to figure out how bad the impact would be.

    Put bluntly: if you get rammed by one of these huge sheep, you’re going to be all broken up because of it.

    If you, somehow, put yourself in a position to be attacked by a bighorn sheep you’re going to have two major problems.

    The first is that you can easily be knocked over an edge or down a steep slope by a ram and that could prove fatal all by itself.

    The second problem is that, considering where bighorns live, you will be unlikely to put distance between yourself and the sheep quickly enough once it has become aggressive.

    If you have weapons, by all means defend yourself. If you don’t, try to put anything between yourself and the sheep to block a charge, but it had better be something like a boulder, a tree or something else that can actually prevent the impact.

    Your flimsy backpack is not going to do much good as a shield.

    If this is not an option, lie down on the ground, cover your head and neck and protect yourself as best as you can. Hopefully, when the sheep sees you’re no longer a threat, it will give up and move on.

    No. Bighorn sheep, like all sheep, are strictly herbivorous and do not eat meat. That means they won’t eat you.

    No, or at least none that are commonly known. Aside from your typical blood-sucking parasites like fleas, ticks and the like, bighorn sheep don’t carry much in the way of germs or other diseases that can be transmitted to people.

    20 survival items ebook coverLike what you read?

    Then you’re gonna love my free PDF, 20 common survival items, 20 uncommon survival uses for each. That’s 400 total uses for these dirt-cheap little items!

    Just enter your primary e-mail below to get your link:

    We will not spam you.

    Opossum: Are They Dangerous?

    0

    If you’ve ever gotten a good look at those needle-sharp teeth, I don’t blame you for thinking possums are dangerous.

    I think everybody, especially people living in the South, have been surprised by them in the night: hanging out near the deck or popping out of the trash can.

    opossum

    Those beady black eyes, the loud hiss, the flashing white fangs. Sheesh, it is enough to give anyone the willies!

    But plenty of experts tell us that possums are truly not aggressive and really not dangerous. What’s the truth? Are possums actually dangerous?

    No, possums are not dangerous to people. Even though possums have sharp teeth and may sometimes bite if cornered or handled, they’re far more likely to run for it or feign death.

    And there you have it. Possums really are the definition of all bark and no bite, and it’s not to say that they can’t bite but these animals are genuinely non-aggressive and will typically try other survival strategies when confronted or threatened rather than attacking.

    Nonetheless, possums are common, and it’s all but certain you’ll run into one at one point in your life, and maybe even at close range.

    Keep reading, and I’ll tell you everything you need to know about human interactions with possums…

    Possums are marsupials, and the largest marsupials in North America. In fact, the common Virginia Possum is the only true opossum found in the United States.

    Unlike other mammals, possums are almost entirely unique, and they’re regularly referred to as living fossils. It isn’t entirely true, but there aren’t any other animals quite like them.

    Predominantly nocturnal, possums are nomadic and they move from place to place foraging for easy access to food and water.

    They will hang around as long as it’s safe and as long as they have plenty to eat and drink for them and they’re young.

    Speaking of eating, possums are acute omnivores, and they can eat just about anything they find.

    They’re notorious for breaking into trash cans, like raccoons, for food scraps, and also climbing up to bird feeders to empty them of seeds.

    All sorts of other creatures, including insects, birds, reptiles, amphibians, worms, mollusks and more. And they eat roadkill!

    How aggressive are opossums?

    Also like raccoons, possums have highly dexterous paws which make them excellent climbers, an ability which is further assisted by their prehensile tails.

    Possums are predominantly solitary, but it’s not out of the question to see multiple family groups consisting of mothers and young congregating in a safe space with lots of food to go around.

    When confronted or cornered, possums exhibit frightening threat displays consisting of hissing, clicking, and baring of the teeth.

    A bite from a possum, even if approached, is quite rare: what isn’t rare is their most famous behavior, playing dead, commonly referred to as playing possum!

    A possum that is playing dead is actually engaging in an involuntary behavior where the animal sort of blacks out, curls its lips, starts to foam at the mouth and expels a nasty stench from its anal glands.

    It is possible that they stay this way for many minutes up to several hours before recovering, no worse for the wear.

    Hopefully, whatever was bothering the poor thing thinks it is too nasty and pitiful to deal with during that time!

    But while you should never assume that any given possum is going to play dead instead of bite you, bites from possums are in fact quite rare.

    No, not from people or larger animals. Possums know they are very low on the food chain and act accordingly, but sometimes they get territorial and grouchy if another possum invades their personal space or tries to take over a limited food source.

    Rarely. Aside from the aforementioned territorial problems or food possessiveness, possums generally ignore each other or cohabitate peacefully.

    No. Aside from a threat display, it is extremely rare for possums to display genuine aggression towards people.

    Any possum that is hissing or showing its teeth is actually desperately hoping that you’ll get frightened and leave it alone. Given half a chance, a possum will retreat from you or, if it thinks you are going to attack it, play dead.

    Yes, but actual negative interactions with humans are extremely rare. Bites from possums usually only occur when some foolish person is trying to handle the animal, or in cases where something goes wrong after they have been trapped.

    Possums look downright frightening when they are giving you that awful threat display, but triggering an attack from one is rare and difficult.

    The only thing that will reliably get a possum to attack you is prolonged handling assuming they are conscious and not playing dead.

    Any possum that is stressed from capture or after being cornered might bite in an effort to escape, and it’s hardly out of the question that a mother possum will bite to protect her babies.

    But even in all these cases, possums are just not very aggressive even in extremis, and will always prefer to run away and hide or feign death rather than go on the offensive.

    For their size, and considering the category of creature that they are, possums are surprisingly strong.

    They are very able climbers, and mother possums can be seen scaling trees and fences all the time with eight or nine babies clinging for dear life to their backs. Doesn’t seem to slow them down in the least!

    That being said, compared to any human being possums are not strong: we have immense size and strength advantages over them that will certainly prove telling in a scuffle.

    Yes, they can! A possum’s teeth are not just for show! Possums can and will bite, and they’re more than capable of inflicting a nasty bite if it comes down to it.

    They have multiple long, needle-like teeth that will give you a seriously nasty puncture wound.

    Possums don’t really attack people, not in a truly offensive manner and if they do there’s probably something wrong with it, like rabies.

    A possum might hold its ground and give you a good threat display before finally biting if you close in, but it’s highly unlikely that they will close the distance with you to deliver a bite.

    Accordingly, if you see a possum, make a point to give it plenty of room and there shouldn’t be any problem.

    On the other hand, if a possum is closing the distance with you that is definitely an indicator that something is very wrong and you need to get away from it as quickly as possible.

    Assuming you’re actively being attacked by a possum, your best course of action is to do anything that you can to prevent the possum from closing with you and biting you.

    The very best thing you can do is simply to run away, as you should easily be able to outpace a possum on flat ground.

    If that fails or it isn’t an option, use absolutely any object that you can to keep it away from you. If you don’t have anything to use as a shield, try to stomp the possum one good time and that should put it out of action for good.

    Remember, you need to avoid being bitten at all costs! If a possum can’t bite you, it can’t hurt you.

    Yes. Though a possum would never attack you with the intention of eating you (they aren’t predators like that) it is entirely conceivable that should a possum find your dead body they would start to eat you.

    Remember that possums are scavengers and have a tendency to eat carrion, and that would include you.

    Potentially, yes. Possums are known vectors of various diseases, parasites and other nasty, gribbly things you don’t want to get infected with. Salmonella, spotted fever, leptospirosis and toxoplasmosis are all potential infections.

    But, luckily, possums are only very, very rare vectors of the rabies virus. Contrary to popular belief, they aren’t the primary vector of rabies, but neither are they immune to rabies as some other people assert.

    For this reason, you always want to keep your distance from possum and avoid handling them even when they are dead.

    Likewise, any possum that is acting very strangely is cause for concern and you should call animal control.

    20 survival items ebook coverLike what you read?

    Then you’re gonna love my free PDF, 20 common survival items, 20 uncommon survival uses for each. That’s 400 total uses for these dirt-cheap little items!

    Just enter your primary e-mail below to get your link:

    We will not spam you.

    Chipmunks: Are They Dangerous?

    0

    It is hard to imagine any animal being less dangerous than a chipmunk. From their beautiful, striped fur to those adorably chubby cheeks that carry food back to their burrows, chipmunks are among the most charismatic rodents on Earth.

    Arguably it is only squirrels that have better publicity.

    chipmunk

    They are so tiny and delicate, it’s hard to imagine them being a threat to anything bigger than a sunflower seed, but looks can be deceiving. Are chipmunks actually dangerous?

    No, chipmunks aren’t dangerous. A chipmunk that is trapped or grabbed may bite, but aside from that and the possible transmission of infectious diseases, chipmunks are completely harmless to people.

    Chipmunks, like most of their rodent brethren, have impressively sharp and capable teeth that can definitely injure you, but barring the risk of infection this bite is not going to inflict any serious harm.

    Chipmunks are well-known pest animals in some places, and they can transmit diseases, so you want to know how to deal with them and more importantly how they can try to deal with you if it comes down to it. Keep reading and I’ll tell you a lot more about chipmunks…

    Chipmunks are a small species of terrestrial or semi-arboreal rodent.

    Instantly recognizable from their small size, rarely measuring longer than half a foot from end to end, they have distinctive longitudinal, light-colored stripes running across their tan or brown fur, and usually have darker, speckled contrast markings along this length.

    Chipmunks tend to be active during the daytime, sleeping at night in an underground burrow with multiple exits, a larder for food, and a main sleeping chamber.

    Like many rodents, chipmunks tend to be solitary although occasionally you’ll see one or two living together or close by.

    Like their close cousins, squirrels, chipmunks have a varied diet consisting of various plant matter but particularly seeds and nuts, and also fruit, grains, small insects, bird eggs and occasionally newborn chicks.

    Chipmunk attacks robin nest, steals chicks

    They have sharp, stout incisors that they use to gnaw through obstacles and also process their food, and they’ve been known to climb trees readily in search of nuts or eggs.

    This tendency to gnaw and climb has also made them a perennial pest around human habitation, where they demolish seedlings, songbird eggs and occasionally infiltrate homes to make their dens in out-of-the-way places.

    A surefire indicator that a chipmunk has set up residence in the area is when you see it with large, puffy cheeks.

    Those chubby cheeks aren’t fat, and they are actually oversized pouches that chipmunks use to store and haul food from the environment back to their burrow.

    Chipmunks subsist on their stored food during the winter time, and if you see a chipmunk making multiple trips back and forth you can be sure that a burrow is nearby.

    Chipmunks tend to be surprisingly territorial towards others of their own kind, most of the time, and also other rodent species but they are not territorial towards larger animals or human beings.

    This is because chipmunks no instinctively that they’re very low on the totem pole and have no real chance of running off or fending off larger animals.

    Yes, often. So long as they’re not living too close together and there is not much food pressure, chipmunks will generally get along with one another, and every now and then you’ll see a couple of chipmunks living together.

    However, territorial disputes are far from uncommon, and food shortages will lead to chipmunks fighting amongst themselves and even fighting other rodents like squirrels or rats.

    No, not directly. A chipmunk’s only concern when a person is around is to get away as quickly as possible.

    It is possible for a chipmunk to injure you by biting or, maybe, by scratching but aside from the aggravation they cause in and around homes they are not a threat.

    Yes, surprisingly enough. Don’t worry though; chipmunk attacks on people are extremely rare. It is actually very difficult to find documented cases of attacks.

    Most are simply a case of people reporting incidents on the internet, and there are a few humorous videos of chipmunks jumping on people or “charging” them after being refused food once they’ve become acclimated to human presence and particularly to people that feed them often.

    That being said, chipmunks are rodents and rodents have been known to sometimes attack people under peculiar circumstances, so you should never assume that a chipmunk won’t attack you.

    Pretty much the only reason that a chipmunk would it ever attack a person is if you grabbed it, trapped it or cornered it.

    Rodents, including chipmunks, invariably prefer to escape and run and hide, rather than fight, but fight they will if they think they have no other option.

    Even a chipmunk that you somehow managed to surprise at close range is going to run for the hills.

    It might run past you if it thinks that is its best chance of escape, but an unprovoked chipmunk attack on a person is almost unheard of.

    Not strong at all. Now, for their size, chipmunks have well-developed jaw muscles and teeth capable of impressive chewing, and their overall athleticism and endurance makes them capable diggers, climbers and foragers.

    But chipmunks at the end of the day are teeny, tiny little creatures compared to human beings, not strong at all.

    Yes, they can and they will! Like pretty much all rodents chipmunks have large and impressively well-developed incisors that they use for gnawing and eating.

    In fact, a chipmunk’s teeth will grow continuously throughout their life, and so they gnaw on things constantly in order to shorten them.

    These sharp teeth have a chisel-like profile, perfect for puncturing, and a chipmunk bite is definitely going to hurt and draw blood.

    A chipmunk attack is going to look pretty comedic at the end of the day- unless it happens to you.

    Assuming you aren’t holding the chipmunk, an event that will lead it to bite any part of you that it can reach, a chipmunk is likely to jump on you and just start biting.

    That’s the only recourse they have because their claws are far too tiny to inflict anything but the most superficial damage.

    If, for whatever reason, a chipmunk starts charging you, react quickly and try to get away from it. You should be faster than the chipmunk over open ground.

    But assuming you only noticed that you are under attack by a chipmunk when the chipmunk is climbing on you, do what you can to swat it away and then get away from it.

    Ultimately, if you are forced to defend yourself, chipmunks are so small and delicate that any solid strike should kill it more or less immediately.

    Remember: Chipmunks should invariably try to run away from you, so if you notice one acting aggressively it might be because there’s something wrong with it, it is sick or it is defending a burrow with young inside.

    No. Chipmunks are omnivores, and that means they eat both plants and meat, but no chipmunk is going to attack you with the intention of eating you.

    That said, chipmunks are rodents, and most rodents are opportunistic; if you were to die it isn’t unthinkable that a chipmunk might take a bite or two out of you- protein is protein after all!

    Yes, they can. Chipmunks, like most rodents, carry a wide assortment of communicable diseases and parasites that can infect people.

    Most seriously, chipmunks are potential vectors of rabies although the chances of chipmunks infecting a person with it are very small. Nonetheless, any obvious strange behavior or aggression from a chipmunk is a warning sign.

    Other than that, chipmunks are significant vectors of nasty germs like hantavirus and also the usual assortment of mammalian parasites like fleas and ticks.

    Ticks are an especially serious concern because they’re the most likely vector of Lyme disease and other debilitating tick fevers.

    Be very careful, and make sure you wash up and disinfect if you’re forced to handle chipmunks for any reason!

    20 survival items ebook coverLike what you read?

    Then you’re gonna love my free PDF, 20 common survival items, 20 uncommon survival uses for each. That’s 400 total uses for these dirt-cheap little items!

    Just enter your primary e-mail below to get your link:

    We will not spam you.

    Blue Jays: Are They Dangerous?

    0

    For most folks who live anywhere in the United States, the blue jay is a common sight in your yard.

    From the loud, screeching calls to their bully-like behavior at the bird feeder, these corvids are definitely unique and ubiquitous in their typical range.

    blue jay sitting on a branch

    But these birds are also known to cause quite a commotion, and plenty of people report that blue jays have even attacked them before for seemingly no reason.

    Could this be true? And more importantly, are blue jays dangerous?

    No. Blue jays are not dangerous, although they’re known to attack people that get too close to their nests, or to food sources that they frequent. A peck from a blue jay will hurt, but will not cause any significant injury.

    The worst thing a blue jay can do to you is give you a sharp peck on the head. And make no mistake, they’re a lot more likely to do that than many other bird species!

    But aside from that, the only real risk they pose to you is to your mental health thanks to their loud, squealing calls.

    Keep reading and I’ll tell you a lot more about blue jays and their sometimes aggressive behavior below…

    Blue jays are among the largest, most common and most instantly recognizable songbirds in North America.

    They also happen to be among the most intelligent, as befits any bird belonging to the family Corvidae. Blue jays count among their cousins crows and ravens, and like those birds Blue jays are extremely crafty.

    But with that intellect also comes a tendency to bully, or if you wanted to be kind, you might say that blue jays are very assertive.

    Blue jays are known to remember many different locations of food which they will service day in and day out, and much of the time they will work hard to keep other birds, and even other animals like squirrels, away from their food!

    It isn’t out of the question that blue jays will even try to run you away from their food sources!

    Aside from being food aggressive blue jays are also known to vigorously defend their nesting areas, whether or not they are nested in a tree.

    Blue jays are notorious for dive-bombing people and other animals that get too close to their nest site.

    The beak of a blue jay is strong and optimized for breaking into all sorts of tougher foods, so they can give you a pretty mean peck, certainly enough to break your skin.

    Blue jays are also known as nest raiders; taking eggs, chicks and even whole parts of a nest away from other birds, and that means they typically don’t get along with most other species.

    Although the diet of a blue jay rarely contains more than the occasional egg or chick, it is still sufficient enough to make them significant nest predators of other songbirds.

    The aggressiveness and intelligence of the blue jay, combined with its tendency to dominate food sources and run off other birds has led to them being classified as pests by some folks.

    Yes! Blue jays are among the most territorial songbirds, and are infamous for defending their preferred food sources, nesting areas, or even their preferred roosting trees from other birds and even much larger animals, people included.

    Listen for the shrill, whining warning call of a blue jay that is nearby and you’ll know it is getting irritated and preparing to do something about it.

    Sometimes. Blue jays tend to get along with others of their own kind, as is easily evidenced by the crest on their head.

    Any blue jay that is calm and comfortable will have its crest lying down, almost indistinguishable from the rest of the feathers on its head and neck.

    But blue jays that are alerted or aggravated will have a crest standing up proud, and the greater the agitation the more frazzled the crest will look.

    If you ever see two blue jays fighting, it’s probably males getting into it over access to females during the mating season or due to crowding considerations when it comes to nesting.

    Otherwise it is common to see blue jays eating or congregating in small groups peaceably.

    Blue jays will threaten people, yes, but people have little to fear from blue jays in general.

    Many blue jays will readily start to swoop and peck at humans that get too close to their nesting site, or ones that linger too long near their preferred food source.

    Blue jays will even strike at people persistently in an effort to drive them off!

    However, people really don’t have much to worry about from blue jays because the chances of any kind of significant injury are very low.

    Yes, plenty, and all the time. There are mountains of anecdotal stories about blue jays attacking people in their own yards or as they walk down the sidewalk.

    Blue jays have a definite and distinct idea of what constitutes “their territory” and they generally won’t put up with people being in it.

    Also, every once in a blue moon, pardon the pun, you’ll hear a news story about a particularly aggressive blue jay that turns into a veritable local terror, attacking people and pets indiscriminately. Many times, these birds have to be relocated…

    The #1 thing you can do to prompt a blue jay to attack you is to come too close to its nesting site.

    Blue jays rarely hesitate to alert and then attack any interloper coming near their nest, be it another bird, a mammal or even a person.

    Note that even if their nest is high up in a tree, just coming too close to the tree itself might be enough to trigger an attack, and the chances of an attack go up proportionally with your proximity to the nest.

    This can be especially likely if the blue jays been forced to nest closer to the ground.

    With a lack of taller trees, blue jays will quickly and easily nest in larger mailboxes, bushes, and any other locations of opportunity. This means you might wind up a whole lot closer to a blue jays nest than anticipated.

    Other than nesting site concerns, blue jays will sometimes get very possessive over their chosen feeding location.

    Well-stocked bird feeders and any other areas where people scatter seeds or other food will become frequent hangouts for blue jays.

    Blue jays are not strong, not compared to humans at any rate!

    These birds are intelligent problem-solvers, and ones with particularly stout beaks that are suitable for cracking open nuts, but their strength will count for nothing next to yours.

    No, not really. It’s unlikely that a blue jay can open its beak wide enough to properly bite you, and even if they do you aren’t really worried about the bite, per se.

    A blue jay’s best form of defense using its beak is to actually peck you, a task they are well suited for since their beak is so strong and sharp.

    A blue jay attack will start out with a shrill, screaming alarm call, followed by repeated close dives past you.

    If you are lucky, that is all they will do, but after a dive or two, they tend to start pecking at your head while flogging you with their wings and screaming the entire time.

    This, naturally, is very stressful and can be painful. A sharp crack from a blue jay’s beak is likely to pierce the skin and give you a small wound, although serious injuries are almost unheard of.

    The best thing you can do if attacked by a blue jay is just to get away from it, or rather get away from wherever you suspect its nest actually is.

    As soon as you put enough distance between you and the bird’s territory, it should leave you alone.

    There’s not much more you can do except to protect your head; getting pecked in the eye will definitely ruin your day and might be medically significant.

    However, if for whatever reason the blue jay won’t leave you alone or is terrorizing a child or something you can easily dispatch the bird with one solid blow; they are as tiny, frail and fragile as any other songbird.

    No. Blue jays are omnivorous, but they aren’t going to eat people. Aside from the occasional bird egg, chick and every now and then another tiny mammal or other animal, blue jays really aren’t capable of eating any meat taken from larger creatures. We are just too big.

    Generally not. Even when handling a blue jay for whatever reason, the only thing you need to worry about are common bird parasites like fleas, ticks, mites, and the like.

    20 survival items ebook coverLike what you read?

    Then you’re gonna love my free PDF, 20 common survival items, 20 uncommon survival uses for each. That’s 400 total uses for these dirt-cheap little items!

    Just enter your primary e-mail below to get your link:

    We will not spam you.

    Badgers: Are They Dangerous?

    0

    Badgers are virtually synonymous with tenacity, but are they dangerous? Most folks don’t know too much about badgers.

    These are interesting animals that are noteworthy for their intricate social and family units that form in the wild, and they’re also important game and fur animals that are harvested for their hair and for their meat.

    badger

    Chances are you won’t encounter a badger in the wild unless you head out into deep country, because they tend to keep to themselves.

    But should you be worried if you run into one? Are badgers dangerous?

    No, not really. Badgers as a rule would rather avoid contact with people than fight, but if they are cornered, grabbed or if you are threatening their young they are capable of putting up quite a fight, and badgers do have a powerful bite.

    Most North American badgers are not particularly big, but don’t make the mistake of thinking that they won’t fight if they have to.

    Badgers will do everything they can to get away from you if you come too close, but if you corner them or threaten their family unit, they may attack with ferocity out of all proportion with their size.

    Even so, badgers are not typically considered to be dangerous to people. Keep reading, and I’ll tell you everything you need to know about these interesting animals.

    Badgers really are one of the most interesting animals on Earth. Not just because they have been historically important for the products they can provide when trapped or hunted.

    It’s because of the surprisingly intricate, nuanced connections that badgers make among their own kind, sometimes even with other species!

    Badger species can be found all over the world, predominantly in North America, the United Kingdom, and throughout much of Europe though some can be found all across Asia and much of Africa.

    Badgers belong to the Mustelidae family, making them relatives to wolverines, weasels, ferrets and otters, and they look quite similar to these animals though they are notable for having a much larger and stockier body, a shorter neck and large, prominent front claws that are used for digging.

    In the wild, badgers exhibit a tendency towards living in family units, with extended families generally getting along peaceably inside a larger shared territory. These larger social units are referred to as clans.

    Some badgers, though, individually show a marked tendency towards being loners, though they may or may not temporarily rejoin a family unit for various reasons.

    In any case, all badgers, whether solitary or in a family unit, can rapidly excavate large, deep and intricate subterranean burrows called setts where they will live and sometimes store food.

    Badgers are remarkably good diggers, among the fastest found in nature, and they use these skills to track down similarly subterranean food in the form of various rodents, reptiles and other underground critters.

    Near areas of human habitation, badgers are also marked predators of small livestock, particularly poultry and eggs, and sometimes vulnerable individuals of smaller species like goats and sheep.

    But something that is even more remarkable is the fact that badgers, in the wild, can form a sort of pact or you might even say friendship with other species, usually coyotes and wolves.

    These interactions have been caught on video multiple times, so if you see a badger following a coyote or wolf, they might be working together!

    Whether you find a badger with its family or alone, you can generally depend on them retreating from any contact with a human being unless they feel cornered or feel like their young is threatened.

    Badgers will typically protect their territory from certain animals and from other badgers that aren’t part of the clan unit. Individual badgers might also have beef with individuals of other clans, and this can lead to scuffles.

    However, it’s rare for a badger to act territorial towards a human or any other large animal in their territory as long as they aren’t getting too close to their burrow.

    That might provoke a defensive response to run off the intruder!

    Yes, sometimes. Territorial pressures as described above can lead to fights between badgers, and mating season pressures can cause horny males to turn downright belligerent towards other males.

    But aside from these instances as long as there is peace between neighboring clans and lone individuals badgers tend to get along.

    Badgers generally do not threaten people except when they feel cornered, are restrained directly or if they feel like they must protect their young. In these cases, a badger will usually go on the attack directly.

    It is encounters like this that have given rise to the badger’s well-deserved reputation for tenacity and ferocity, however! So stay alert!

    Yes, indeed there have been. There are quite a few well-known historical instances of badger attacks on humans.

    Generally, though, this is a direct result of human impingement on their immediate territory or due to a botched attempt to trap or kill them. Badgers greatly prefer to run and hide from humans and other larger animals rather than fight if they are able.

    Even so, compared to other wild animals and wild mammals in particular badger attacks are rare.

    DON’T MESS with a Snarly Badger!

    Coming too close to a badger’s burrow, pursuing it when it is trying to get away, coming too close to a badger with young or trying to trap, restrain or handle a badger will definitely provoke an attack.

    Badgers are actually quite strong, much stronger than you would think for an animal that usually is no bigger than a medium-sized dog.

    Like most animals in their category, badgers have very strong jaws with great flexibility, and also impressive stamina that they use to dig quickly and for a long time.

    A badger bite is a serious medical event, and can inflict lasting injuries, so don’t underestimate them.

    Yes, absolutely: badgers can and will bite. The bite of a badger is quite severe, and their immense jaw strength and sharp, stout teeth means they can easily inflict significant puncture wounds or even break bones.

    Worse yet, badgers have a tendency to bite and lock on as they thrashed to inflict even more damage, so it isn’t out of the question they could very literally bite a chunk out of you.

    When badgers attack they go all out. They will charge immediately and try to bite, but they will also swipe with their claws. But it is the bite you have to worry about as discussed above.

    A badger that is provoked to violence might chase you for some distance, so be prepared for a lengthy retreat if you don’t want to engage the badger.

    The very best thing you can do to respond to a badger attack is simply to get away. If you’re able, run away as quickly as you can.

    Badgers are surprisingly quick and nimble, but they have very short limbs so you should be able to outmaneuver them in most types of terrain.

    If you cannot outrun the badger or if that just isn’t an option, defend yourself using whatever you have at hand and prioritize using any tool that can keep the badger from reaching you or put it down at a distance. Do everything that you can to avoid being bitten.

    However, use great care if you’re going to try to restrain the badger when you come into contact with it…

    They are surprisingly wiry, agile animals, and they have a tendency to twist inside their loose-fitting skin to bite from unexpected angles, so don’t assume you are safe just because you have a hold of its neck.

    Not really. Unlike a bear or a mountain lion, a badger is not going to attack you with the intention of making dinner out of you. But, badgers are carnivores, or at least carnivorous, and that means they eat meat.

    Badgers have also been known to scavenge meat from fresh and relatively intact corpses, so if for whatever reason something were to happen to you and badger territory it is possible that badgers might nibble on your body.

    To be perfectly clear, a badger is not going to try to kill and eat you.

    Badgers do carry a few diseases of note that you might want to worry about, although badgers are very low on the list of concerns when it comes to animal-to-human transmission.

    The most significant disease that badgers are known to carry is bovine tuberculosis, more of a concern for anyone who owns cattle or other livestock.

    It is possible for badgers to transmit this disease to cows through the environment, and then cows can transmit the disease to people through milk, although pasteurization typically takes care of it.

    20 survival items ebook coverLike what you read?

    Then you’re gonna love my free PDF, 20 common survival items, 20 uncommon survival uses for each. That’s 400 total uses for these dirt-cheap little items!

    Just enter your primary e-mail below to get your link:

    We will not spam you.

    Can You Drink Boiled Salt Water In An Emergency?

    0

    Everyone understands instinctively how precious water is to survival. Going even a single day without a drink of water can leave you crippled or dead when the chips are down.

    sea water

    Precious few people can survive outside in the elements for more than a few days, at most, without it.

    And that’s the paradox of the sea when it comes to survival: surrounded by limitless water, and none of it safe to drink!

    But there’s got to be something we can do to make use of it: Is it possible that you can drink boiled salt water in an emergency situation?

    No, boiled salt water is not safe to drink. Boiling doesn’t eliminate the salt content of salt water, though it can reduce harmful microorganisms as usual.

    In fact, boiling your collected salt water is only going to make it even worse for you because it concentrates the salt present in the water.

    That means if you boil and drink it in a desperate attempt to quench your thirst, it’s only going to dehydrate you even faster and trash your internal organs.

    This is a survival problem that’s as old as time, so keep reading and I’ll tell you more about the issue…

    If you drink salt water, whether it is from the ocean or it is fresh water simply contaminated with salt, the only thing you will do is speed up your own demise.

    That is because your body simply cannot deal with the immense concentration of salt present in the water.

    If you’re already dehydrated, this is a double whammy: you’ll dehydrate even faster because your body will end up releasing moisture that it has stored to flush even more urine from your body in an effort to eliminate the salt.

    In no time at all, you’ll be facing hypernatremia, which is a higher-than-normal concentration of salt in the bloodstream.

    This is a life-threatening condition, particularly in a survival situation…

    A person that is suffering from hypernatremia will have an elevated heartbeat or irregular heart rhythm, intense nausea and vomiting, loss of equilibrium, and eventually, seizures as their organs start to shut down.

    Death usually results from either cardiac arrest or swelling of the brain.

    It’s easy to see how a person that is stuck with only salt water to drink could eventually go mad from desperation, drinking the salt water in an effort to quench their thirst and only accelerating their bad end.

    Indeed, this has happened many, many times throughout history…

    Not long, not very long at all, and in fact, drinking salt water is only going to accelerate your end versus going without water at all.

    Dehydration is only ever made even worse by consuming salt water, and there is no injury, no ailment, no sickness that cannot be made even worse by consuming salt water.

    When a person starts to drink salt water, the end is not far off…

    No. Or rather, you cannot drink salt water after boiling it. Boiling salt water will help to kill other biological contaminants in it, however, and that does make salt water more suitable for various chores and other tasks, such as the washing of clothing or dishes and other equipment.

    Even so, it is still just as dangerous to you after it has been boiled, or even more so!

    No. Boiling salt water doesn’t do anything to remove salt from it. In fact, it just does the opposite.

    When you boil salt water, the water turns to steam and leaves the rest of the water and the salt it contains behind. The salt does not evaporate!

    So, considering you have the same amount of salt but less water, what you are left with is a smaller quantity of water that is even saltier than it was before you started boiling it!

    Because of this, drinking boiled salt water is going to be even worse for you!

    Boiling salt water will still kill microorganisms like viruses, bacteria, parasites, and more that might be hiding in it.

    This is definitely a useful step toward purifying the water for whatever purpose, but it’s nowhere near enough to make it safe for you to consume.

    And, as detailed above, the other thing that boiling salt water will remove from it is the water itself! It will turn to steam, float away on the air and then condense elsewhere, leaving you with less water.

    Yes, strictly speaking, as I said above, boiling salt water does purify it but only in terms of eliminating germs, not rendering it safe for human consumption.

    Even germ-free salt water is still way too dangerous for you to drink, and doing so will result in hypernatremia and your eventual end.

    No. Sterilization tabs, iodide, and other chemicals that preppers typically use to purify water in the same way do nothing to eliminate the salt content which can bee lethal.

    Although, once more, they might prove to be a useful step in rendering salt water completely safe via a multi-step process, they do nothing to overcome its inherent unsuitability as potable water.

    Something else to keep in mind is that the presence of salt might interfere with the normal function of the chemicals.

    If at all possible, you should remove the salt from the water through desalinization or some other procedure before moving on to chemical sterilization if it is still required.

    How To Drink Salt Water Safely.

    Yes. You can make salt water drinkable, but this is usually very difficult and time-consuming without specialized technology.

    That said, where there is a will there is a way, and if you have the will and a little bit of know how you can try distillation, using field expedient methods or a specialized appliance, or desalination, which relies upon an appliance.

    As mentioned above, by using distillation or desalination.

    Distillation you might already be familiar with: it is a process by which water is evaporated into steam, but the steam is captured and allowed to recondense in a separate container.

    Through this process it leaves all other contaminants, including salt, behind.

    In the field, this can be done with something as simple as a transparent piece of plastic, a shallow hole in the ground and some kind of a container that will catch the condensate from the plastic.

    Desalination is much more involved, and is a process that is most commonly used above ocean-going ships and boats and sometimes at a much larger scale to supply fresh, drinkable water to coastal and other nearby settlements.

    Although there are models available that are basically the size of a countertop appliance, this isn’t something that you’ll be able to carry with you as part of your survival kit, to say nothing of providing power to it.

    If you’re concerned about making use of salt water in a survival scenario, you are strongly advised to learn as much as you can about different methods for distilling it.

    This takes a long time, but it can provide you with a steady supply of safe, drinkable fresh water from salt water.

    20 survival items ebook coverLike what you read?

    Then you’re gonna love my free PDF, 20 common survival items, 20 uncommon survival uses for each. That’s 400 total uses for these dirt-cheap little items!

    Just enter your primary e-mail below to get your link:

    We will not spam you.

    The Agawa ADK 26 Best 2 Piece Axe, or Gimmick?

    Link to Axe https://adk26-transforming-hatchet.kckb.st/83d38148 LINK WILL WORK SOON Im happy to have had the pleasure to be one of the first to test out this new 2 part axe from Agawa. Check out my thoughts after some use in this video. New Merch here! https://www.bunkerbranding.com/pages/joe-robinet Instagram https://instagram.com/joerobinetbushcraft/