How to Eat Healthy at a Buffet Posted: 06 May 2017 05:00 PM PDT Eating at a buffet is a great way to try new dishes and enjoy a great meal with friends, colleagues, or family. With so many food choices and the option to go back for seconds or thirds, it can be tricky to make healthy decisions. Next time you are at a conference, a wedding, or having dinner with friends at a buffet-style restaurant, take the time to plan ahead and avoid unhealthy, high-calorie dishes. If you survey the buffet, select nutrient-rich foods, and commit to practicing portion control, you can enjoy a healthy meal at a buffet. EditSurveying the Area - Find a table far away from the buffet. The average person makes three trips to a buffet, but if you sit further away, you are less likely to get up and go back for more servings.[1] If you are dining at a buffet-style restaurant, ask the hostess if you can be seated far away from the buffet table. While at a wedding reception or an event that has open-seating, choose a table that is on the opposite side of the room from the buffet stations.
- Keep your back toward the buffet. If sitting far away from the buffet is not an option, try to seat yourself facing the opposite direction. If you cannot see the carving table or the dessert section of a buffet, you may be less enticed by the array of foods available.[2] Keeping your back to the food can be an effective way to prevent you from getting up for another serving and to curb your cravings.[3]
- Look over the entire buffet before filling your plate. Before you grab a plate and hop in the buffet line, take a few minutes to scan the entire buffet to review your options. Knowing what is available ahead of time will help stifle the urge to fill your plate with samples and small bites of every dish that looks appealing.[4]
- As you look over the buffet, notice where everything is located. Look for the servings of vegetables and fruits first, and then concentrate on adding a lean animal-based or plant-based protein.
- Next, think about what whole grains are available, like steamed brown rice, quinoa, or whole wheat pasta.
EditControlling Your Portions - Decide how much to eat before you look at the buffet. Your eyes may be bigger than your stomach, so consider how much you would like to eat before glancing at the options. Decide how many times you will permit yourself to visit the buffet. Craft a plan and commit to it before hopping in line.
- Perhaps you will allow yourself to have a small starter, one healthy plate, and a small dessert, or perhaps you would like to have two moderately sized plates for dinner.
- Imagine your plate is divided in quadrants. When you begin to fill up your plate at a buffet, imagine that the plate is divided into four sections. This will help you visualize what a healthy meal should look like. One half of your plate should be reserved for vegetables and fruits, one quarter of the plate should contain a lean protein, and the last quadrant is reserved for whole grains.[5]
- Fill your plate with vegetables and fruits. Focus on filling about half or even three-fourths of these quadrants with vegetables and fruits.[6] Try to fill up on low-calorie, nutrient-rich vegetables and fruits to control your calorie intake while fueling your body.[7]
- Portion out proteins. Scan the buffet and look for healthy, lean proteins such as fish, turkey, or chicken. Plan to limit your red meat intake, and avoid processed meats, bacon, and cold cuts.[8] To control your portion sizes, grab a piece of protein that is similar in size to a stacked deck of cards.[9] This should fill about one quadrant of your plate.
- Eat a variety of whole grains. Look for whole grains like quinoa, whole wheat pasta, or brown rice to fill up the last quadrant of your plate. Avoid processed grains like white rice, white pasta, and white bread.[10] This should fill up the last quadrant of your plate, and should be similar to the size of a hockey puck.
- Eat slowly to control your food intake. Looking at all the delicious food on a buffet may make you very hungry and eager to get back to the table to chow down, but be careful not to eat too quickly. Once you have satisfied your hunger, it takes about 20 minutes for your brain to pick up the signal. When you eat slowly, you are giving your brain time to catch up with your stomach to tell you that you are full. Eating slowly can help you consume fewer calories and prevent you from visiting the buffet one too many times.[11]
EditMaking Healthy Selections - Start your meal with a cup of soup or a small salad. Enjoy a low-calorie soup or small salad at the beginning of your meal to satiate your hunger and help you control your calorie intake for the rest of the meal.[12] Soups like vegetable soup and broth-based soups are low in calories, and a small salad with fresh, raw vegetables provides a nutrient-dense starter.
- Avoid cream-based soups like clam chowder or lobster bisque, which can pack a lot of calories and fat. Visit the soup station at a buffet and grab a cup of tomato puree soup or an egg-drop soup.
- If there is a salad bar available, look for dark, leafy greens to serve as your base. Add raw or steamed vegetables like broccoli or peas, and avoid adding cheeses, croutons, and heavy, creamy salad dressings.
- Head back to your table and enjoy your starter before plating your main entrée.
- Opt for grilled, steamed, or broiled dishes. Skip the fried chicken legs or fish and chips at a buffet. Choose a healthier grilled chicken breast seasoned with herbs or fish that has been broiled with vegetables. At a Chinese buffet, skip the fried vegetables and load up on steamed broccoli, snow peas, and carrots. Avoid piling your plate with noodles or pasta dishes that have been pan-fried or stir-fried.
- Fried foods absorb a lot of calories and fat from the hot oil. Over time, consuming them can increase your weight and risk for diseases.
- Grilled, baked, and broiled dishes are lower in fat and calories, and they retain much of their nutritional content during cooking.[13]
- Avoid dishes covered in marinades, heavy sauces, and salad dressings. Marinades, salad dressings, and heavy or syrupy sauces can be deceivingly high in calories, fat, sodium, and added sugars.[14] Look for dishes that are seasoned with herbs and mixed with steamed vegetables, and avoid salads that are already coated with dressing.
- A cup of creamy pasta carbonara, for example, can contain almost 400 calories and over 400 milligrams of sodium.[15] Look for a pasta dish that is lightly coated with a tomato-based sauce instead.
- A tablespoon or 15 milliliters (1 fl oz) of ranch dressing can contain around 16 grams of fat and 143 calories.[16] Select a vinaigrette dressing or drizzle a small amount of extra virgin olive oil on your salad.
- Say no to soda. An average cup of soda can contain around 300 calories and 19 grams (0.67 oz) of sugar, and lemonade and other fruity drinks can also pack a lot of calories and sugar.[17] Order a glass of water or an unsweetened iced tea while dining at a buffet to minimize your calorie intake.
- Harmonize your flavors. A meal made up of many different flavors may stimulate you appetite, causing you to eat more. Try to harmonize and simplify the flavors on your plate, which may help you feel full and satiated. For instance, instead of cheesy broccoli, salad with ranch dressing, and beef with red wine sauce, choose a salad with a citrus-based dressing and fish with lemon or a similar citrus marinade.[18]
- Your food does not need to fit the same flavor profile from meal to meal — variety between lunch and dinner is great. Just try to keep the flavors within each meal simple and harmonious.
- Pass on the waffle or pancake station at a breakfast buffet. Waffle and pancake stations are often found at hotel breakfast buffets. Although they are tasty, these sugary breakfast items can contain a lot of sugar and carbs with minimal nutritional value. Topping them off with 1 tablespoon or 15 milliliters (1 fl oz) of maple syrup can add an additional 52 calories.[19]
- Opt for an egg-white omelet or a bowl of oatmeal to load up on protein and fiber that will fuel you throughout the day.
- If you do wish to indulge but don't want to consume all those calories and sugar, opt for a multi- or whole grain waffle or pancake and use a minimum amount of syrup.[20]
EditSources and Citations Cite error: <ref> tags exist, but no <references/> tag was found
|
How to Send GIFs in WhatsApp on an iPhone Posted: 06 May 2017 09:00 AM PDT This wikiHow teaches you how to send an animated GIF photo to a contact in WhatsApp. Edit10 Second Summary 1. Open WhatsApp. 2. Open a conversation. 3. Tap +. 4. Tap Photo & Video Library. 5. Tap GIF. 6. Select a GIF. 7. Tap the white arrow. - Open the WhatsApp app. It resembles a phone inside of a speech bubble on a green background.
- If you aren't logged into WhatsApp, enter your phone number and tap Continue.
- Tap . It's at the bottom of the screen, to the left of the Settings option.
- If you're already in the Chats menu, skip this step.
- If you're in a conversation, tap the Back button in the top left corner of the screen.
- Tap a conversation.
- Tap . It's in the bottom left corner of the screen.
- Tap .
- Tap . This option is in the bottom left corner of the screen. You can select a GIF from this page by tapping it, or you can search for a specific one by using the Search GIPHY bar at the top of the screen.
- You can also tap Starred at the top of this page to view any GIFs you've favorited.
- Tap a GIF. Doing so will open it in edit mode, where you can do the following things:
- Add text or stickers by tapping the buttons in the top right corner of the screen.
- Add a caption by typing one into the bar at the bottom of the screen.
- Add another GIF or a photo by tapping the + icon to the left of the caption bar.
- Tap the white arrow. It's in the bottom right corner of the screen. Doing so will send your GIF to your selected contact.
|
How to Securely Leak to the Press Posted: 06 May 2017 01:00 AM PDT In times of political or social strife or upheaval, you may have information that needs to be revealed to the public. Sometimes you can't talk openly about the information you have without risking government persecution, losing your job, or putting yourself and family at harm. In these situations, you need to be able to get the information into the hands of a journalist who can inform the public, without that information being traced back to you. To securely leak to the press, think like a spy, watch your back, and always cover your tracks.[1] EditUsing Encryption Services - Research the news organization. Different news organizations use various apps that allow citizens to send them information in a secure and anonymous way. If you already have a news organization in mind that you want to use, find out what service they use.[2]
- You typically can find this out by checking the news organization's website. Don't use a work computer or search from your own home. Go somewhere with free public Wi-Fi and do your research there so there's no trace of you having visited that news organization's website.
- On the website, search for "leak" or "tip" or "source." One of these words should get you to the page that you need.
- For example, you can find information about how to leak to the Washington Post by going to https://www.washingtonpost.com/securedrop/. The landing page for leaks to the New York Times is located at https://www.nytimes.com/newsgraphics/2016/news-tips/.
- Download the appropriate app. Some news organizations use a free mobile app, such as Signal, to send and receive encrypted messages and phone calls. If you need to talk to a journalist, you may be able to use one of these apps.[3]
- You typically cannot send documents through these services, but you can talk to journalists or send and receive messages regarding document delivery, or other information.
- If the service requires you to add the journalist to your phone's contacts before you can communicate with them over the app, add them under a fake name.
- Go through SecureDrop. SecureDrop is an online document transfer service used by more than 20 news organizations. This service allows encrypted, anonymous documents to be transmitted from sources to journalists.[4]
- You also can communicate with the journalist, and they with you, by typing a document and sending it. Once the document has been sent, you can reply from within the service.
- SecureDrop only operates on the Tor browser, so you'll have to download that. The process is the same as downloading any other app, and the browser operates just like any other web browser.
- Make sure your security settings are set to the highest level before you start using SecureDrop for communications.
- Stick to public Wi-Fi. Even though these encrypted services ensure that the information you send can't be opened or read, there may still be a record of the contact itself. For that reason, avoid using the Wi-Fi at home or work, since that can be traced back to you.[5]
- Find a café, library, or another public place that has open Wi-Fi available. Go somewhere on the other side of town, or that isn't located in a place near your work, school, or any other place you frequent on a regular basis.
- If you have to communicate more than once, don't go back to the same place – find a new location for each communication.
- If you have to spend any money to get to the location, use cash. Credit or debit cards can all be traced back to you and put you in that location. Leave all electronic devices at home, since they also can be traced.[6]
- As far as transportation is concerned, walk if possible. Do not drive your own car. If you need to use public transportation, get off several stops before your destination and walk in the opposite direction, then circle back. You may want to take several forms of transportation. Avoid taxis, and avoid areas with modern surveillance cameras.
EditLeaking by Email - Buy a dedicated computer. If you've decided to send a regular email, you'll have to spend a little money to make sure the information cannot be traced back to you. Your first purchase should be a computer or tablet that you will only use to communicate with the journalist to whom you're leaking information.[7]
- It doesn't have to be a fancy computer – a cheap machine running Windows is sufficient. Buy a new machine, not a used one, because you don't know what's on a used one. This machine shouldn't set you back more than a few hundred dollars.
- Get the information or data you need onto the computer, but do not email yourself anything from your own work or personal email address, and don't log onto any of your personal accounts on this computer. If you do, the computer can potentially be traced back to you.
- Do not access your home or work Wi-Fi network using this computer.
- Enable full disk encryption. Almost all newer personal computers provide you the ability to encrypt all information on the hard drive with a few clicks. Once enabled, no one will be able to access any information stored on your hard drive without your username and password.[8]
- On a Windows machine, enter "encryption" from the start menu and select "change device encryption settings." Choose the "Manage BitLocker" option, turn on BitLocker, and follow the instructions from there to set it up.[9]
- On a Mac, click on "Security & Privacy" from your system preferences. Choose the FireVault tab and unlock it with your username and password so you can update your preferences. Then turn on FireVault and follow the instructions.[10]
- If the dedicated computer you bought does not have an option for full disk encryption, you also can download software that will do this for you. Download a free program such as TrueCrypt or DiskCryptor.
- Find a location with open Wi-Fi. To securely leak to the press using email, go to a café or other place that has open Wi-Fi available to the public. Look for a location that isn't in an area you normally frequent, and don't go to the same location more than once.[11]
- Once there, turn the Wi-Fi on the computer and connect to the network. Don't bring any personal devices with you, because they can be traced and you don't want them to show that they've accessed the same network.
- Both on the way to the location and once you get there, use cash to pay for any purchases you have to make – do not use your own credit or debit cards, even a prepaid card, because they can be traced back to you.
- Set up email encryption. Encryption can be set up on any computer and protects your information and data from being read or understood by even the most sophisticated government surveillance technology.[12]
- You can install encryption software within your email service, as well as on the computer as a whole. Once encrypted, the information is scrambled and cannot be read unless the person has the right key to decrypt it.
- "Pretty Good Privacy" (PGP) is a free encryption service for emails. Go to the PGP website at http://www.pgpi.org/ and download the latest version of the software for your computer. Save the file to your computer, then unzip and install it.
- Follow the prompts on the installation screen to finish setting up PGP. You will then be prompted to restart your computer to complete the installation. Once PGP is running, no one can read emails you send without the proper key to decrypt them.
- Create a new email account. You don't want to email the journalist from a personal or work email account. A free account from a service such as Gmail will work just fine. Avoid using any name that can be connected to you.[13]
- The best email address for purposes of anonymity is a series of random letters and numbers.
- Do not use a personal email address or any email address that can be traced back to you, as a "recovery" email address.
- Activate two-factor authentication (2FA). Two-factor authentication will keep your new email account more secure because it adds an additional step to the log-in process. Most of them send a text message to your mobile phone. Even if someone obtains or hacks your password, they still won't be able to get into your email account.[14]
- If the email service you're using sends a text message as the second factor, make sure you don't enter the phone number associated with a personal or work phone. You might use the phone number associated with your burner phone.
- You can find a list of all websites and email services that support 2FA at https://twofactorauth.org/.
- Email your contact. Once you've got your email address set up, use it to email the journalist the information you want to leak. If you're writing a personal account, avoid giving any personal information that could lead to the discovery of your identity, or your role in the organization from which you're leaking information.[15]
- Shut everything off. After you've finished typing your email and sent it, turn off the Wi-Fi on the computer and close all apps. Fully delete the cache and cookies from the web browser, then shut down the computer.[16]
- After you've shut down the computer, remove the battery. If at all possible, carry the battery separately from the computer. For example, you might put the battery in your pocket and carry the computer in a backpack.
- Destroy the device when you're done. If you no longer need to communicate with the journalist, or if you fear you're about to get caught, you must thoroughly destroy the computer so that no information can be pulled off of it.[17]
- Wipe the device back to its factory settings, using the most secure erase option that is available. Then turn the device off and smash it with a hammer.
- Place the pieces in another piece of trash, such as a fast-food snack. Then go out for a walk and throw it away in a public trash can or dumpster well away from anywhere you live, work, or frequent.
EditMaking a Phone Call - Buy a burner phone. If you want to call in a truly anonymous tip to the press, you can't do it from your personal phone, or from work. In fact, you should leave all electronic devices at home when you go to purchase the burner phone.[18]
- The best place to buy a burner phone is a convenience store or bodega in a low-income part of town. Look for a place that doesn't seem to have surveillance cameras, or has older cameras with footage that gets erased and taped over frequently.
- Buy a cheap prepaid phone that has enough minutes to last as long as you need it. Expect to make at least a few phone calls. Pay for the phone with cash.
- If you're exceedingly concerned about your security or believe you are being followed, you might want to enlist a trusted friend to buy the phone for you. Don't tell them why you need it.
- Go to a random location. To make your phone call, you need to go somewhere that you don't normally frequent. Mobile phone signals can be traced, and the phone keeps records of the wireless networks and locations where it has accessed them.[19]
- Choose a place where you're not likely to be overheard, and don't turn the phone on until you reach your destination. Again, only use cash for any purchases you have to make along the way.
- Do not take any of your personal electronic devices along with you, as the records of them can be used to put you in that location.
- Avoid storing the phone number on the phone. Once you call the number and have your conversation, delete the phone's call history.
- Turn the phone off. After you've finished your phone call, wipe all information from the phone, power it completely off, and remove the battery. Return home by a different route than the route you took to get to the location.[20]
- If you have to make more calls in the future, do not go to the same location more than once. Try to keep your locations as random as possible, so a pattern cannot be discerned.
- Destroy the phone when you're done. Either when you're done communicating to the journalist, or when the phone runs out of minutes, you have to get rid of it. You'll want to go through the same process if you fear that you're about to get caught.[21]
- If you believe authorities know what you're doing and are on your trail, you may want to destroy the phone after every call.
- To destroy the phone, restore it to its factory settings, wiping all data. Then smash the phone with a hammer, including all chips in the phone.
- Disguise the pieces by wrapping them in something else, and throw them away in a public trashcan or dumpster not located near your work or home.
EditMailing Documents - Gather written copies of the information you want to leak. Make copies of any documents with care. Make sure that any printing, scanning, or downloading you have to do cannot be traced back to you.[22]
- If you have an extensive number of documents, you might want to consider downloading them to a thumb drive and mailing that instead. You can buy a thumb drive at most any discount or electronics store.
- Make sure there is nothing on the thumb drive that can be traced back either to you or to a personal or work computer.
- Buy mailing supplies in advance. You need thick manilla envelopes and stamps for mailing. You also may want to invest in a postal scale, so you can accurately determine how much postage will be necessary.[23]
- Don't go to your usual post office to buy your supplies, and don't order them online. Instead, go to a post office across town to get what you need. Pay for your mailing supplies with cash, and don't give any identifying information to the postal clerk.
- Don't get rare or collectible stamps, just get basic, standard stamps. Another option may be to get a pre-paid, flat-rate mailing envelope.
- Do not include a return address. When you address the envelope, use nondescript, block letters if you're hand-lettering the envelope. Another option is to type up a label on the computer and use that.[24]
- Use an unfamiliar sidewalk mailbox. The envelope will be post-marked, and authorities can use that information to narrow down where you might live or work. For that reason, it's important to use a sidewalk mailbox in some other part of town where you don't normally go.[25]
- As with any other trips you've made in connection with the leaking of documents or information to the press, do not use any credit or debit cards, or anything else (such as a public transportation pass) that can be traced back to you. Use only cash.
- Try to find a mailbox that isn't near or within range of any surveillance cameras. For example, you don't want to use a mailbox that's sitting in front of an ATM, because the mailbox likely can be seen from the ATM's surveillance camera.
EditSources and Citations Cite error: <ref> tags exist, but no <references/> tag was found
|
No comments:
Post a Comment