Showing posts with label your. Show all posts
Showing posts with label your. Show all posts

Friday, June 9, 2017

Making your own Marsala Chai

Making your own Marsala Chai


If coffee were perfumes, chai latte would be the one Id wear in Autumn. I love the smell of it and perhaps someone should invent chai perfume. Id buy it for sure. Not surprisingly chai latte is one of my favourite drinks to order at cafes. Then I came across marsala chai at this amazing Indian restaurant when I was in Taiwan on holiday - it was rich and creamy, full of spice and sweet. Hmmmmmm.

I found a recipe online the other day and have been experimenting with it by tweaking it here and there. Normally at home Id make my chai over a pot on a stove using cardamon pods and real ginger amongst other spices - but since I plan to take these to work, I had to settle for the ground spices which is not as strong in flavour.

I found these tea bags at the $2.50 Japanese store near work (Maruyu on Clarence Street)! Perfect for my instant chai tea experiment!

Tea bags $2.50

For my chai tea mixture, I also added milk powder so I wouldnt have to add milk as it cools down my tea. I like my tea really hot!

Mixture of all the spices + tea and milk powder

Tea bags all ready to go!

Marsala Chai Tea
Recipe adapted from AllRecipe

Ingredients
  • 1 cup nonfat dry milk powder
  • 1 cup powdered non-dairy creamer
  • 1 cup French vanilla flavored powdered non-dairy creamer (I omitted this)
  • 2 1/2 cups white sugar (I used brown sugar)
  • 1 1/2 cups unsweetened instant tea (I used Dilmahs black tea)
  • 2 teaspoons ground ginger
  • 2 teaspoons ground cinnamon
  • 1 teaspoon ground cloves (I added whole cloves instead)
  • 1 teaspoon ground cardamom (I added 2 teaspoon)
  • 1 teaspoon fennel
Directions

In a large bowl, combine milk powder, non-dairy creamer, vanilla flavored creamer, sugar and instant tea. Stir in ginger, cinnamon, cloves and cardamom. In a blender or food processor (or by hand), blend 1 cup at a time, until mixture is the consistency of fine powder.

Add them to the empty tea-bags and store in a air-tight container.

The verdict?

This mixture is pretty good and addictive. I love it with an extra teaspoon of honey too! Because they are instant and not cooked over the pot, I find that Id need to add more spices next time for the spices to be more dominant in the taste.


Available link for download

Read more »

Wednesday, June 7, 2017

LSGWebinar Influencing stakeholders and marketing your L D capability

LSGWebinar Influencing stakeholders and marketing your L D capability


Paul Trueman is posing a few challenging questions to us today:
  • How do you get learning buy-in?
  • How do you ensure that individuals want to learn, that managers give them the time to learn and that executives give you the budget to make it happen?
Paul says it takes more than just smooth marketing talk to make this work for you and today hell tell us about how we can influence stakeholders and make our L&D abilities visible. Very interesting, and something I really need to learn. Do remember, these are unedited, live-blogged notes.

Pauls in the middle of some interesting research that I guess leads to this talk. Paul does a whole heap of work, ranging from internal consulting to good old, face to face training. Paul is starting off asking what our biggest concerns are about promoting our L&D departments. Here are some of the responses we saw:
  • Mindsets
  • Budgets
  • Balancing quality and value
  • Tailoring content to demand
  • Getting mangement to understand where were coming from
  • Resistance to change
  • Getting management to understand the value of investing in learning
Given some of those responses Pauls moving into the agenda for his presentation.
  1. How can we promote learning and development as a beneficial investment?
  2. What are the key drivers for different stakeholders?
  3. How can we articulate the value learning and development adds to the business?
  4. How do we communicate the benefits to learners?
A background of Pauls Case Study

Pauls work is with his company, Eaga Plc. Eaga is a Newcastle company, partner owned since 2007. They have about 4500 partners and they manage the governments warm front scheme and the BBC digital switchover scheme. Their culture is about empowering people, ensuring they look out for new ideas and to find new ways of delivering services in an innovative fashion. The culture sounds like what most companies claim to be like, and what ThoughtWorks is like!

The Eaga people development team has 22 people and currently invest 2 million GBP in training each year. They have heaps of face to face delivery with the support of their LMS.

They seem to have a strong set of values focussing on embracing change and continuous improvement. Thats a win for the L&D team because people are keen to keep improving and they dont have to drag people into initiatives and embracing change helps them to keep turning around soon to respond to the organisations changing skill needs.

Promoting L&D

Paul and his team promote L&D by conducting an annual partner engagement survey. Eaga has also has five key divisions with a key L&D partner assigned to work with each division. They support all their partners with additional academic funding options. They fund 50% of any external courses if that is relevant to their business.

They listen to their internal customers and take training evaluation very seriously. They also ensure that each partner has a personal development plan with the support of their line managers, L&D and HR.

Managing Stakeholders

Each partner wants skills development and career growth. So if the L&D teams dont invest in training approaches, this pushes the partners back. Pauls showing us several quotes and testimonials from his partners proving his point.

Paul also mentions that his department level stakeholders are looking for ways to make their groups more efficient. Again, hes showing us several testimonials from the managers that show their satisfaction.

Senior level management wants to know their skills base to be able to make effective business decisions on partner allocation. Paul and his team need to keep the senior management informed about this current state of the world so they can use this information to decide how theyll drive the business.

The key that Paul is trying to drive is that we need to go from the value that each individual stakeholders looking for and communicate in a language that makes sense for them.
I thought Pauls messages were quite simple and very common-sensical though I didnt get heaps out of it. In any case, you are welcome to carry on this discussion with Paul on his email address. It takes heaps to come out and tell your story, so I congratulate Paul on that! And btw, if you wanted to learn about more influence patterns, please do look through Mary Lynn Manns work in this area.

Available link for download

Read more »

Wednesday, May 31, 2017

Make Your Google Chrome Faster With Easy Steps

Make Your Google Chrome Faster With Easy Steps




Make Google Chrome Faster With Secret Setting.

Google chrome allows you to use unofficial browser features called “flags” while they are being tested or are generally unstable. These features are strictly experimental and may break or disappear at any time. In other words, take advantage of them while you can.
You cannot access these secret settings from menu. To access these settings enter (chrome://flags) without brackets into your address bar. Hit the Enter key, and you can see the hidden settings of google chrome.
Now here are secret hacks which will make Google Chrome fast on your computer.
Use ctrl+f to find the respective settings and change them accordingly as listed below.
Here are 10 settings you can change to get faster chrome.
1: Set “Maximum Tiles” to 512
2: Change the Number of “Raster Threads” to 4
3: Enable Offline Cache Mode
4: Enable Touch Events
5: Enable SPDY/4
6: Enable Experimental Canvas Features
7: Enable Experimental Websocket Implementation
8: Enable Accelerated Overflow Scroll
9: Enable Checking for Conflicts with 3rd Parties
10: Enable Fast Tab/Window Close.
After changing all these settings, restart the chrome browser and enjoy.
Remember these are beta settings and you if you feel any problem then reset settings to default.

Available link for download

Read more »

Saturday, May 27, 2017

Make Your Game Easy Then Make It Easier

Make Your Game Easy Then Make It Easier


I started writing my first RPG for Spiderweb Software in 1994. Yes, this makes me old. When I started my cute, little shareware business, I had a lot of instincts for how to write a good role-playing game. Happily, about 85% of those instincts were good ones, so I was able to write solid games and make a living.

But 15% of my original instincts were not good. In fact, they were terrible, and it has taken many years for me to realize that. Even now, I have to fight those bad instincts with all of my heart, and I lose as often as I win.

My worst instinct has to do with game difficulty. Im a hardcore nerd of the old school, and Im not truly satisfied unless a game is really difficult. Other people, also known as "regular humans," do not, in fact, want this.

I used to succinctly describe my views about game difficulty thus:

People will forgive a game for being too hard. They will never forgive it for being too easy.

No. This is, in fact, completely, 100% opposite from the truth. A better summary of reality would be:

People will happily forgive a game for being too easy, because it makes them feel badass. If a game is too hard, they will get angry, ragequit, hold a grudge, and never buy your games again.

Video games are leisure time expressions of adolescent power fantasies. They should only be hard if players specifically request that they be hard.

I tend to like hard games. I am perfectly happy if any given title has 3 or 4 fights that requires 3 or 4 tries each to beat. But I am increasingly recognizing that this makes me a bit of a mutant. I am also realizing that while I like (or at least dont mind) the occasional repeated failure, I dont require it. I blasted through Brutal Legend with ease and I still had a great time. Plants vs. Zombies is easy, and it is also terrific. On the other hand, a game like Ninja Gaiden 2, which would happily make me refight bosses ten times on the easiest difficulty level ... Well, that was just stupid. Never again.

After long reflection, here is my new rule for RPGs I write:

When a player is on the default difficult level, has built his or her characters poorly, and is playing straight through the main storyline with mediocre tactics, that player should almost never be killed.

I can almost hear the heads of hardcore gamers imploding with impotent nerdrage. But seriously. If you have a problem with this, I think youre getting a lot of your fun from making other people have less fun.

Of course, a game should have harder difficulty levels. And, if a player chooses to opt-in on higher difficulty, they should be seriously nasty. But, when played on the default difficulty, the game should be accessible to your mom or average eight-year old.

Im about to release my next game, Avernum 6. And it doesnt live up to what I have learned. In fact, in parts, it gets downright tricky. But then Im going to write an all-new game series, and I promise that it will be pretty easy on Normal difficulty.

And if you turn the difficulty up to Torment, well, Ill be gunning for you.

Oh, and one parting thought.

If your game is actually fun, killing the player wont make it more fun. But nothing sucks all of the fun out of a good game faster than repeated failure.

Available link for download

Read more »

Thursday, May 4, 2017

Make your car a WikiLeaks Support Vehicle with magnets stickers

Make your car a WikiLeaks Support Vehicle with magnets stickers


Bumper stickers... youll find a couple at the end of this post

This is a little project from the BeanLab, inspired by @karwalski, @WikiLeaksUte,  @WikiRacingTeam,  @WikileaksCar,  @WikiLeaksKayak and of course the fantabulous original @WikileaksTruck... which youll also find here (where you can buy some cool stuff too!).



Like the badge designs, many of these designs will work on a variety of applications. You can just email me the particular specifications (dimensions & file type) your printer needs, and Ill send you the files you need. Feel free to request designs too! If youre interested in wearing any of my designs on an ethical Organic Cotton T, get in touch with the BeanLab.

Car magnets

A great way to jazz up your vehicle with a WikiLeaks support design, without permanently marking it. And you can get some affordable magnets printed by uploading hi-res jpegs - or I can email you better quality files. These designs are around A3 in size.

Of course theyll work well as stickers too. Youll also find a couple of bumper sticker designs later in this post.


Join the WSV fleet

Transform your car into a WikiLeaks Support Vehicle

The MGCTFU strikes terror in the hearts of the corrupt

Form your own Mobile Government Corruption Task Force Unit... yeah thats a MGCTFU


Turn Top Secret on its head

These designs for Australia (really?!!)

Not sure about the design. But maybe you like it or would like your own slogan on it?

Remember any of these designs can be adjusted to different dimensions... just ask the Bean

Bumper stickers

Bumper stickers... an old favourite for getting a message out there
 Heres one place online where you get your bumper sticker printed easily. Just upload a hi-res file... There are plenty of options online in different parts of the world... and dont forget your local digital print shop.

 

On your bike?

Your bicycle too can be a WSV! Heres a couple of stickers designs for bikes. Request your own.




 

Spread the Love with WikiLeaks heart stickers

If theres enough demand, this bean is looking at producing a few items for WikiLeaks, Julian Assange and Bradley Manning supporters.

Many people are producing their own posters, Tshirts, badges etc and all of these designs are free to be used by all. The idea is to make it even easier for those who dont have the time or motivation to produce their own supporters gear. It also provides the option to personalise some items with custom designs.

Supporters gear consists of items you can distribute to promote discussion and also to raise funds. Sydney supporters recently raised some of the cost of their rally with badges for donation.

Heres an initial offer for WikiLeaks heart stickers
And heres the file to DIY... or send me dimensions or a template for files for your project


And of course, dont forget the Official WikiLeaks Store, where you can buy some very cool gear including the only mug this bean drinks from... and help keep WikiLeaks strong!

Youll find some great gear at the Art Superheroes shop too, including their amazing Handmade Polycarbonate and Kevlar Guy Fawkes Masks, WikiLeaks Adhesive Vinyl Decals, and Signed Limited Edition Prints of the WikiLeaks Truck.

And if youre really into DIY checkout the StencilFiles, a new WikiLeaks supporters street art project and sharpen your scalpel.


Available link for download

Read more »

Monday, April 24, 2017

Make Your own My little sandbox

Make Your own My little sandbox


Just the other day I was looking around the internet for some sensory ideas. With the change in seasons, I am anticipating those cold (very cold, were in Vermont!) winter days when we can only get outside for a few minutes at a time. Around here our hands are covered all winter so although we dig, build and play in snow, much of a sensorial touching and feeling experience is limited. Last winter we had our indoor sandbox which provided some much appreciated sensory play. While I havent gotten an indoor sandbox going yet, I did come across a great little idea in the meantime. Have you seen these before?
Its called a My Little Sandbox. There is a whole series of them (found on Amazon) and theyve got good reviews. I thought it looked like something my daughters would enjoy so I made up one for our home.



Our sand is pretty well mixed with dirt, leaves and sticks from a summer of outdoor play, so I opted for using rice in our Little Sandbox. I had this miniature farm from long ago that fit perfectly.



After observing my daughters play, the rice has worked out well and is easier to clean up (they are good about not misusing it and can sweep it up independently if needed.)





They have enjoyed using it and I like that it provides the sensory experience of the rice along with encouraging creativity and imagination.




This post has been shared on:
Come play at the Childhood 101 We Play link up

A resource for bloggers to share early childhood play ideas


Available link for download

Read more »

Sunday, April 23, 2017

Make Your Summer Plans with this Welcome Summer Banner

Make Your Summer Plans with this Welcome Summer Banner


6DaysofSummerFunwiththeSUPERMOMS

Its Day 3 of our 6 Days of Summer fun with the super Moms. 
Check out my post and how-to over at Random thoughts of a Supermom!

Available link for download

Read more »

Sunday, April 2, 2017

Locky Hackers Could Hijack Your System When You Open MS Word Doc file

Locky Hackers Could Hijack Your System When You Open MS Word Doc file


locky-ms-word-doc-hijacking-system - picateshackz.com

If you receive a mail masquerading as a companys invoice and containing a Microsoft Word file, think twice before clicking on it.

Doing so could cripple your system and could lead to a catastrophic destruction.

Hackers are believed to be carrying out social engineering hoaxes by adopting eye-catching subjects in the spam emails and compromised websites to lure the victims into installing a deadly ransomware, dubbed "Locky," into their systems.

So if you find .locky extension files on your network shares, Congratulations! You are infected and left with just two solutions: Rebuild your PC from scratch or Pay the ransom.

Locky ransomware is spreading at the rate of 4000 new infections per hour, which means approximately 100,000 new infections per day.


Microsoft MACROS are Back

It is hard to digest the fact that, in this 2016, even a single MS Word document could compromise your system by enabling Macros.

This is where the point to appreciate hackers sheer brilliance of tactics.


locky-ms-word-doc-hijacking-system - picateshackz.com

Locky ransomware is being distributed via Microsoft 365 or Outlook in the form of an Invoice email attachment (Word File that embeds viciousmacro functions).

The concept of macros dates back to 1990s. You must be familiar with this message: 

"Warning: This document contains macros."

Now macros are back, as cyber criminals discover a new way to get internet users to open Microsoft Office documents, especially Word files that allow macros to run automatically.


Also Read:

  • Facebook Hacking Software - The Windows-based Trojan That Has Accelerated Globally
  • Kali Linux Tutorial: DDoS Attack Using GoldenEye Tool In Kali 2.0 (Sana)
  • Hack Facebook Account In Same Wi-Fi Network Using Faceniff Android App



How Does Locky Work?

locky-ms-word-doc-hijacking-system - picateshackz.com

Once a user opens a malicious Word document, the doc file gets downloaded to its system. However, danger comes in when the user opens the file and found the content scrambled and a popup that states "enable macros".

Here comes the bad part:


  • Once the victim enables the macro (malicious), he/she would download an executable from a remote server and run it.
  • This executable is nothing but the Locky Ransomware that, when started, will begin to encrypt all the files on your computer as well as network.

Locky ransomware affects nearly all file formats and encrypts all the files and replace the filename with .locky extension.

Once encrypted, the ransomware malware displays a message that instructs infected victims to download TOR and visit the attackers website for further instructions and payments.

Locky ransomware asks victims to pay between 0.5 and 2 Bitcoins ($208 to $800) in order to get the decryption key.

One of the interesting note on Locky is that it is being translated into many languages, which heighten its attack beyond English boundaries to maximize the digital casualties.

Locky Encrypts Even Your Network-Based Backup Files

The new ransomware also has the capability to encrypt your network-based backup files. So its time for you to keep you sensitive and important files in a third party storage as a backup plan in order to evade future-ransomware infections.

A researcher named Kevin Beaumont along with Larry Abrahms of BleepingComputer initially discovered the existence of Locky encrypted virus.

To check the impact of Locky, Kevin successfully intercepted the Locky traffic yesterday and realized that the cryptovirus is spreading out rapidly in the wild.
"I estimate by the end of the day well over 100,000 new endpoints will be infected with Locky, making this a genuine major cybersecurity incident — 3 days in, approximately a quarter of Million PCs will be infected," Kevin said in a blog post.

One hour of infection Statistics:

locky-ms-word-doc-hijacking-system - picateshackz.com

Among the highly impacted countries include Germany, Netherlands, United States, Croatia, Mali, Saudi Arabia, Mexico, Poland, Argentina and Serbia.

Available link for download

Read more »

Monday, March 13, 2017

making your own google dorks for hacking understanding dorks

making your own google dorks for hacking understanding dorks


 hi Sniper haxXx there i was going to make video tutorial with urdu voice but my micro phone got pissed so i maked article on it now how can you make dorks ? its very easy

i will tell you those google dorks which are commonly used by Hackers in daily life.
remember one thing that when ever you want to twin two dorks like if you want to join another dork with dork then you will use & symbol... lets start

1# inurl:
inurl: dork is basically used to find the entered text in url like in picture or e.g if we goto google and search for inurl:.co.in then this will find ever domain which contain .co.in like u can see in pic




Next dork is
2# intitle
this google dork is used to the entered text in website title like if we search " intitle:file upload" then google will search all those websites whose title is file upload as u can see in pic below

3# intext:

this google dork is used to find entered text in url and description as if we enter intext: welcome admin user name . now this will search every text in description and url too like in pic below
 4# inall:admin login
this google dork is used to find text every where weather in title or description or in url etc as if we enter inall:admin login this will search every where admin login text in website as in pic below

how can you twin dorks ?
yes you can twin the dorks by adding & symbol like
inurl:.co.in & inurl:/admin/index.php & intext:user pass

now what are the advantages of those dorks and why hackers use them ?  many of hackers use them for finding admin panels as for finding admin panel dork is inurl:/admin/index.php & intext:/welcome admin user name pass . now this dork will find admin panels and many hackers use those dorks for finding upload paths to upload their shells like inurl:.co.in & inurl:upload.php & intext:browse . now this dork will find upload paths in indian sites.. i recommend you to learn that because in future tutorials we gona need this


Sorry for written article :/


Available link for download

Read more »

Thursday, March 9, 2017

Make sure write cache is enabled on your RAID controller

Make sure write cache is enabled on your RAID controller


Using a write cache protected by battery (BBWC) is well known and one of the best practices in RDBMS world. But I have frequently seen situations that people do not set write cache properly. Sometimes they just forget to enable write cache. Sometimes write cache is disabled even though they say they set properly.

Make sure that BBWC is enabled. If not enabled, you will be able to easily get better performance by just enabling it. The following is a DBT-2 example.

Write cache is disabled:

# iostat -xm 10
avg-cpu: %user %nice %system %iowait %steal %idle
21.16 0.00 6.14 29.77 0.00 42.93

Device: rrqm/s wrqm/s r/s w/s rMB/s
sdb 2.60 389.01 283.12 47.35 4.86
wMB/s avgrq-sz avgqu-sz await svctm %util
2.19 43.67 4.89 14.76 3.02 99.83


Write cache is enabled:

# iostat -xm 10
avg-cpu: %user %nice %system %iowait %steal %idle
40.03 0.00 16.51 16.52 0.00 26.94

Device: rrqm/s wrqm/s r/s w/s rMB/s
sdb 6.39 368.53 543.06 490.41 6.71
wMB/s avgrq-sz avgqu-sz await svctm %util
3.90 21.02 3.29 3.20 0.90 92.66

Both run same applications(DBT-2), but the server activity was significantly different each other. I got 85% better result when write cache is enabled.


Checking write cache and battery status

BBWC is mostly equipped with H/W raid controller so operational command depends on products. Here is an example of "arcconf" command result.

# /usr/StorMan/arcconf GETCONFIG 1 AL
...
--------------------------------------------------------
Controller Battery Information
--------------------------------------------------------
Status : Optimal
Over temperature : No
Capacity remaining : 99 percent
Time remaining (at current draw): 3 days, 1 hours, 11 minutes

--------------------------------------------------------
Logical device information
--------------------------------------------------------
Logical device number 0
...
Read-cache mode : Disabled
Write-cache mode : Enabled (write-back)
Write-cache setting: Enabled (write-back) when
protected by battery
...

--------------------------------------------------------
Physical Device information
--------------------------------------------------------
Device #0
Device is a Hard drive
...
Size : 140009 MB
Write Cache : Disabled (write-through)
...


Write cache should be enabled only when battery backup is working. In other words:
- Write cache on logical device (H/W raid controller) is enabled when protected by battery
- Write cache on physical device is disabled
- The battery has enough capacity and long enough remaining time

I recommend DBAs to monitor write cache status regularly (adding this to your monitoring scripts), including battery status checking. Long time ago I was asked for urgent help to fix a problem that application performance suddenly went down. I looked into problems then found that write cache unexpectedly turned off because a battery was expired. If you successfully detected that battery capacity was decreased before write cache was disabled, you would be able to take an action before server performance suddenly goes down (i.e. allocating scheduled down time in order to replace the battery).


Quick health check with mysql commands

If you are not familiar with H/W raid controller specific command but want to check write cache status quickly, using mysqlslap or stored procedure is easy.

mysqlslap:
$ mysql -e "set global innodb_flush_log_at_trx_commit=1"
$ mysqlslap --concurrency=1 --iterations=1 --engine=innodb
--auto-generate-sql --auto-generate-sql-load-type=write
--number-of-queries=100000


stored procedure:
create table t (c1 int) engine=innodb;
delimiter //
create procedure sp1(IN i INTEGER)
BEGIN
DECLARE done INTEGER DEFAULT 0;
WHILE i > 0 DO
insert into t values (1);
SET i = i - 1;
END WHILE;
END;
//
delimiter ;

set global innodb_flush_log_at_trx_commit=1;
call sp1(100000);


You will be able to insert thousands of records per second if write cache is enabled. If disabled, only hundreds of inserts per second is possible, so you can easily check.

Available link for download

Read more »

Tuesday, February 28, 2017

Make your Summer Plans with a Welcome Summer Banner 2!

Make your Summer Plans with a Welcome Summer Banner 2!


I hope everyone out there in enjoying their summer break!  I sure am .  In case you missed this banner last week in my Super Mom blog hop with Kelli at Random Thoughts of a Super Mom.....you can check it out below!


I like for Summer at our house to be SUPER FUN, of course! 
But I wanted to be sure that we were doing the important things as well (reading, making bank deposits in their savings accounts{and that means earning money by doing chores}, and working on goals (CubScouts, Piano, etc)!  I made this banner last year to help be sure we were getting the things done that we needed to get done and mixing the right amount of FUN in with it!

First, I printed out little tags with all of the things we were planning to do this summer. 
Here is my list:
Surprise!
Something Special! (this is great for those one time things)
Extra Fun (this was for when I added something on to one of our weekly activites)
School (they went to vacation bible school and a summer play school hosted by a local preschool)
Playdate (when a friend has us/them over)
Picnic at the Park
Storytime (lots of book stores host these)
Library
Meet Daddy (sometimes we meet for lunch)
Going to a Movie (we love Regals free movie program)
Going out to Dinner
Leaving on a Trip!
Playgroup (there are several that we occasionally attend)
Party
Roaring Springs (our local water park)
Bank (they get to make deposits and my husband matches it, this means they have to do their chores)
Having Friends Over
Working on Goals
Volleyballin’ (sometimes I meet up with friends to play)
Water Day (there are lots of fun pools, splash parks, and beaches on the lakes or rivers)

And here is how they look once I cut them, punched a hole in the top, and put a piece of jute rope through the hole (this makes it easy to pull them out of  the envelope).

Next, make a pocket for them.
Fold a piece of cardstock and staple the sides.  Make a label for the front and distress it with an ink pad, then punch a hole and tie on an 18 inch piece of jute rope or ribbon (tie it onto the wide ribbon when you get to that point).
     

Then, to make your envelopes:
My SIL, Jen, and I shared a box of these from Office Max. I think there was 500 in the box. I printed the days of the week, distressed the edges with an ink pad, and glued them on. Then I punched a hole in the top and hung it from an 18 inch piece of jute rope or ribbon.
                     
At this point you could be done by just hanging the days of the week onto a thicker ribbon! 

Or you can make the whole Welcome Summer Banner to make it SUPER cute.
Heres How:
First, get some chipboard shapes (they come in a "book" of 5) and some chipboard letters (or use vinyl). 
I got mine at Michaels, but I heard you can sometimes find them at Archivers in the $1 section.

Mod Podge decorative paper onto them, turn them over and cut the excess paper off with an exacto knife.

Then sand them to get the edges nice and smooth.  Distress them with an ink pad if desired.  Glue the chipboard letters on to make your words.

Punch holes in the tops and hang onto a wide ribbon. 

Leave enough room on the ends of your wide ribbon to hang.  String one or two ribbons through your chipboard and tie it to the larger ribbon.

My kids LOVE to take the tags out and see what is in store for the day and the week!
Your kiddos will enjoy a  Summer of Fun with an easy to follow plan!

Available link for download

Read more »