How_RRQ To_TO Hide_VV0 Anything_PN1 19_MC ingenious_JJ new_JJ ways_NN2 to_TO conceal_VVI everything_PN1 from_II your_APPGE personal_JJ info_NN1 on_II the_AT Internet_NN1 to_II a_AT1 few_DA2 extra_JJ pounds_NN2 on_II your_APPGE hips_NN2 ._. 
One_MC1 of_IO the_AT first_MD pictures_VVZ my_APPGE son_NN1 drew_VVD in_II school_NN1 was_VBDZ of_IO himself_PPX1 peeking_VVG out_RP from_II behind_II a_AT1 tree_NN1 ._. 
He_PPHS1 called_VVD it_PPH1 "_" I_PPIS1 Hide_VV0 ,_, "_" and_CC I_PPIS1 saved_VVD it_PPH1 for_IF years_NNT2 ,_, stuck_VVN to_II our_APPGE refrigerator_NN1 ,_, because_CS I_PPIS1 found_VVD a_AT1 lot_NN1 of_IO humor_NN1 and_CC truth_NN1 in_II it_PPH1 ._. 
When_CS you_PPY 're_VBR small_JJ ,_, hiding_VVG things_NN2 is_VBZ a_AT1 daring_JJ game_NN1 ._. 
With_IW age_NN1 ,_, not_XX only_RR do_VD0 we_PPIS2 lose_VVI our_APPGE secret_NN1 hiding_VVG places_NN2 ,_, but_CCB it_PPH1 becomes_VVZ tougher_JJR to_TO conceal_VVI our_APPGE flaws_NN2 ,_, our_APPGE opinions_NN2 ,_, our_APPGE past_NN1 ,_, our_APPGE emotions_NN2 ,_, our_APPGE mistakes_NN2 ,_, and_CC ,_, of_RR21 course_RR22 ,_, our_APPGE treasures_NN2 ._. 
What_DDQ follows_VVZ is_VBZ n't_XX designed_VVN to_TO help_VVI you_PPY hide_VVI from_II the_AT law_NN1 or_CC pull_VV0 off_RP anything_PN1 illegal_JJ ._. 
Rather_RR ,_, its_APPGE purpose_NN1 is_VBZ to_TO help_VVI you_PPY preserve_VVI some_DD measure_NN1 of_IO dignity_NN1 in_II a_AT1 world_NN1 that_CST wants_VVZ to_TO know_VVI and_CC expose_VVI all_DB ._. 
Here_RL are_VBR 19_MC little_JJ trees_NN2 ,_, so_RR to_TO speak_VVI ,_, that_CST you_PPY can_VM squirrel_NN1 things_NN2 away_RL in_II or_CC crouch_VV0 behind_RL ._. 
Kitchen_NN1 Problems_NN2 You_PPY can_VM hide_VVI everything_PN1 from_II overcooked_JJ vegetables_NN2 to_II stale_JJ rolls_NN2 ._. 
View_VV0 the_AT 10_MC Ways_NN2 to_II Hide_NN1 Cooking_NN1 Goofs_NN2 slideshow_VV0 for_IF details_NN2 ._. 
A_AT1 Few_DA2 Extra_JJ Pounds_NN2 According_II21 to_II22 Stacy_NP1 London_NP1 ,_, cohost_NN1 of_IO TLC_NP1 's_VBZ What_DDQ Not_XX to_II Wear_NP1 ,_, it_PPH1 's_VBZ easy_JJ to_TO look_VVI 10_MC or_CC 15_MC pounds_NN2 lighter_NN1 by_II following_VVG this_DD1 "_" clothes_VVZ diet_NN1 ._. "_" 
A_AT1 Few_DA2 Extra_JJ Years_NNT2 Women_NN2 do_VD0 n't_XX have_VHI to_TO resort_NN1 to_II Botox_NP1 injections_NN2 or_CC plastic_NN1 surgery_NN1 to_TO look_VVI a_RR21 little_RR22 younger_JJR ._. 
According_II21 to_II22 Bobbi_NP1 Brown_NP1 ,_, author_NN1 of_IO Bobbi_NP1 Brown_NP1 Makeup_NN1 Manual_NN1 ,_, you_PPY can_VM give_VVI yourself_PPX1 a_AT1 "_" makeup_NN1 face-lift_NN1 ._. "_" 
Although_CS moisturizer_NN1 ,_, foundation_NN1 ,_, blush_VV0 ,_, and_CC eye_NN1 shadows_NN2 and_CC liners_NN2 all_DB play_VV0 important_JJ roles_NN2 ,_, Brown_NP1 says_VVZ ,_, under-eye_NN1 concealer_NN1 is_VBZ key_JJ ._. 
Pick_VV0 a_AT1 yellow_JJ tone_NN1 that_DD1 's_VBZ one_MC1 or_CC two_MC shades_NN2 lighter_JJR than_CSN your_APPGE foundation_NN1 ._. 
(_( If_CS you_PPY 're_VBR unsure_JJ ,_, stripe_VV0 several_DA2 shades_NN2 on_II your_APPGE cheek_NN1 and_CC check_VV0 the_AT mirror_NN1 in_II natural_JJ light_NN1 ;_; the_AT one_PN1 that_CST disappears_VVZ is_VBZ ideal_JJ for_IF you_PPY ._. )_) 
Apply_VV0 the_AT concealer_NN1 along_II your_APPGE lower_JJR lash_NN1 lines_NN2 and_CC into_II the_AT inner_JJ corner_NN1 of_IO each_DD1 eye_NN1 using_VVG a_AT1 small-headed_JJ brush_NN1 with_IW firm_JJ bristles_NN2 ._. 
Personal_JJ Info_NN1 on_II Your_APPGE Laptop_NN1 An_AT1 estimated_JJ two_MC million_NNO laptop_NN1 computers_NN2 are_VBR stolen_VVN ,_, lost_VVD ,_, or_CC misplaced_VVN in_II the_AT United_NP1 States_NP1 annually_RR ,_, and_CC some_DD 600,000_MC are_VBR lost_VVN every_AT1 year_NNT1 in_II airports_NN2 ._. 
To_TO protect_VVI sensitive_JJ information_NN1 stored_VVN on_II yours_PPGE ,_, there_EX are_VBR two_MC options_NN2 ._. 
For_IF $59.99_NNU per_II year_NNT1 (_( or_CC $109.99_NNU for_IF three_MC years_NNT2 )_) ,_, Computrace_NP1 LoJack_NP1 for_IF Laptops_NN2 Premium_JJ software_NN1 provides_VVZ the_AT backing_NN1 of_IO a_AT1 "_" theft_NN1 recovery_NN1 team_NN1 "_" that_CST will_VM track_VVI your_APPGE stolen_JJ computer_NN1 ,_, report_VV0 its_APPGE location_NN1 to_II police_NN2 ,_, and_CC remotely_RR delete_VV0 personal_JJ data_NN ._. 
Computrace_VV0 LoJack_NP1 has_VHZ been_VBN a_AT1 top_JJ seller_NN1 for_IF years_NNT2 ._. 
But_CCB a_AT1 new_JJ ,_, free_JJ program_NN1 ,_, from_II researchers_NN2 at_II the_AT University_NN1 of_IO Washington_NP1 and_CC the_AT University_NN1 of_IO California_NP1 ,_, San_NP1 Diego_NP1 ,_, allows_VVZ you_PPY to_TO track_VVI your_APPGE laptop_NN1 's_GE whereabouts_NN2 and_CC even_RR takes_VVZ a_AT1 photo_NN1 of_IO the_AT thief_NN1 (_( if_CS the_AT computer_NN1 is_VBZ a_AT1 Mac_NN1 with_IW a_AT1 built-in_JJ camera_NN1 )_) ._. 
Your_APPGE Anxiety_NN1 When_CS Speaking_VVG in_II Public_JJ Schedule_NN1 a_AT1 massage_NN1 a_AT1 few_DA2 hours_NNT2 before_II your_APPGE big_JJ presentation_NN1 ,_, says_VVZ Susan_NP1 Mackewich_NP1 ,_, an_AT1 executive_NN1 producer_NN1 at_II Gizmo_NN1 Enterprises_NN2 ,_, a_AT1 media_NN production_NN1 company_NN1 in_II New_NP1 York_NP1 City_NN1 ,_, who_PNQS 's_VBZ seen_VVN her_APPGE share_NN1 of_IO nervous_JJ performers_NN2 ._. 
Then_RT ,_, when_CS you_PPY 're_VBR at_II the_AT podium_NN1 ,_, sip_NN1 room-temperature_NN1 (_( not_XX cold_JJ )_) water_NN1 to_TO soothe_VVI your_APPGE vocal_JJ cords_NN2 ,_, and_CC ,_, if_CS you_PPY feel_VV0 anxiety_NN1 building_NN1 ,_, massage_VV0 the_AT pad_NN1 of_IO muscle_NN1 between_II your_APPGE thumb_NN1 and_CC index_NN1 finger_NN1 ._. 
It_PPH1 's_VBZ an_AT1 acupressure_NN1 point_NN1 ,_, and_CC it_PPH1 's_VBZ something_PN1 your_APPGE audience_NN1 wo_VM n't_XX notice_VVI ._. 
Your_APPGE Medical_JJ Identity_NN1 The_AT soaring_JJ cost_NN1 of_IO health_NN1 care_NN1 is_VBZ spawning_VVG a_AT1 new_JJ crime_NN1 :_: medical_JJ identity_NN1 theft_NN1 ,_, in_II which_DDQ someone_PN1 uses_VVZ your_APPGE insurance_NN1 information_NN1 and_CC health_NN1 records_NN2 to_TO obtain_VVI medication_NN1 or_CC even_RR surgery_NN1 ._. 
It_PPH1 happens_VVZ to_II 250,000_MC people_NN each_DD1 year_NNT1 ,_, says_VVZ the_AT World_NN1 Privacy_NN1 Forum_NN1 ._. 
To_TO protect_VVI yourself_PPX1 ,_, the_AT WPF_NP1 recommends_VVZ that_CST you_PPY :_: closely_RR review_VV0 all_DB "_" explanation_NN1 of_IO benefits_NN2 "_" letters_NN2 from_II your_APPGE health_NN1 insurer_NN1 ,_, annually_RR request_VV0 a_AT1 list_NN1 of_IO benefits_NN2 paid_VVN by_II your_APPGE insurer_NN1 in_II your_APPGE name_NN1 (_( sometimes_RT thieves_NN2 alter_VV0 billing_NN1 info_NN1 )_) ,_, and_CC check_VV0 your_APPGE medical_JJ file_NN1 every_AT1 time_NNT1 you_PPY visit_VV0 the_AT doctor_NN1 ._. 
Google_VV0 ,_, Microsoft_NP1 ,_, and_CC dozens_NNO2 of_IO other_JJ companies_NN2 will_VM also_RR store_VVI your_APPGE personal_JJ health_NN1 records_NN2 (_( PHRs_NP1 )_) online_RR ._. 
While_CS there_EX are_VBR advantages_NN2 to_II having_VHG a_AT1 complete_JJ medical_JJ history_NN1 in_II one_MC1 convenient_JJ location_NN1 ,_, some_DD companies_NN2 have_VH0 "_" de-identified_VVN "_" these_DD2 records_NN2 and_CC sold_VVN them_PPHO2 to_II marketers_NN2 ._. 
Pam_NP1 Dixon_NP1 ,_, executive_NN1 director_NN1 of_IO the_AT WPF_NP1 ,_, does_VDZ not_XX generally_RR recommend_VVI PHRs_NP1 that_CST are_VBR not_XX maintained_VVN by_II health_NN1 care_NN1 providers_NN2 ._. 
Look_VV0 for_IF that_DD1 exact_JJ wording_NN1 in_II the_AT privacy_NN1 statement_NN1 ._. 
(_( Electronic_JJ health_NN1 records_NN2 ,_, or_CC EHRs_NN2 ,_, are_VBR maintained_VVN exclusively_RR by_II health_NN1 care_NN1 providers_NN2 ._. )_) 
Your_APPGE Tracks_NN2 Online_RR Just_RR as_CSA your_APPGE computer_NN1 's_GE browser_NN1 maintains_VVZ a_AT1 history_NN1 of_IO the_AT websites_NN2 you_PPY visit_VV0 ,_, your_APPGE Internet_NN1 service_NN1 provider_NN1 (_( ISP_NP1 )_) may_VM keep_VVI an_AT1 electronic_JJ log_NN1 of_IO the_AT ones_NN2 you_PPY peruse_VV0 ._. 
Until_II recently_RR ,_, this_DD1 was_VBDZ all_DB just_RR worthless_JJ data_NN ._. 
But_CCB now_RT some_DD ISPs_NN2 are_VBR considering_II selling_VVG these_DD2 lists_NN2 to_II companies_NN2 that_CST analyze_VV0 them_PPHO2 and_CC then_RT send_VV0 targeted_JJ ads_NN2 back_RP to_II you_PPY ._. 
If_CS you_PPY 're_VBR bothered_VVN by_II this_DD1 ,_, there_EX are_VBR three_MC things_NN2 you_PPY can_VM do_VDI :_: Go_VV0 to_II and_CC let_VV0 the_AT site_NN1 automatically_RR check_VVI whether_CSW your_APPGE ISP_NN1 is_VBZ using_VVG monitoring_NN1 devices_NN2 ._. 
Since_CS this_DD1 check_NN1 is_VBZ not_XX comprehensive_JJ ,_, call_VV0 your_APPGE ISP_NN1 and_CC ask_VV0 if_CSW it_PPH1 's_VBZ contemplating_VVG selling_NN1 browsing_VVG data_NN ;_; if_CS so_RR ,_, object_VV0 ._. 
Download_VV0 a_AT1 free_JJ software_NN1 program_NN1 called_VVN Tor_NN1 from_II torproject.org_NNU ,_, which_DDQ will_VM help_VVI block_NN1 those_DD2 prying_VVG ISP_NN1 eyes_NN2 ._. 
Similarly_RR ,_, when_CS you_PPY type_VV0 a_AT1 phrase_NN1 into_II a_AT1 search_NN1 engine_NN1 ,_, you_PPY 're_VBR broadcasting_VVG your_APPGE interests_NN2 and_CC personal_JJ information_NN1 ._. 
Like_II ISPs_NN2 ,_, some_DD search_NN1 companies_NN2 routinely_RR gather_VV0 ,_, store_NN1 ,_, and_CC sell_VV0 analyses_NN2 of_IO such_DA data_NN strings_NN2 ._. 
That_DD1 's_VBZ why_RRQ you_PPY should_VM never_RR search_VVI your_APPGE full_JJ name_NN1 and_CC Social_JJ Security_NN1 number_NN1 or_CC your_APPGE name_NN1 and_CC password_NN1 ._. 
Some_DD other_JJ tips_NN2 from_II the_AT WPF_NP1 :_: Do_VD0 n't_XX sign_VVI up_RP for_IF e-mail_NN1 with_IW your_APPGE favorite_JJ search_NN1 engine_NN1 ._. 
This_DD1 makes_VVZ it_PPH1 easier_JJR to_TO link_VVI you_PPY and_CC your_APPGE interests_NN2 ._. 
Use_VV0 a_AT1 variety_NN1 of_IO engines_NN2 and_CC computers_NN2 for_IF searching_VVG ._. 
This_DD1 makes_VVZ it_PPH1 more_RGR difficult_JJ to_TO profile_VVI you_PPY ._. 
Find_VV0 out_RP if_CS your_APPGE ISP_NN1 uses_VVZ a_AT1 static_JJ IP_NN1 address_NN1 system_NN1 ,_, and_CC if_CS it_PPH1 does_VDZ ,_, periodically_RR request_VV0 a_AT1 new_JJ IP_NN1 address_NN1 (_( essentially_RR your_APPGE computer_NN1 's_GE address_NN1 )_) ._. 
A_AT1 Tangle_NN1 of_IO Wires_NN2 If_CS your_APPGE computer_NN1 station_NN1 or_CC entertainment_NN1 center_NN1 looks_VVZ like_II the_AT dressing_NN1 room_NN1 at_II an_AT1 '80s_MC2 hair-band_JJ revival_NN1 ,_, tame_VV0 those_DD2 wild_JJ strands_NN2 with_IW the_AT XL_MC Cable_NN1 Organizer_NN1 or_CC a_AT1 few_DA2 smaller_JJR Cable_NN1 Turtles_NN2 from_II containerstore.com_NNU ._. 
Or_CC for_IF an_AT1 inexpensive_JJ (_( albeit_CS less_RGR stylish_JJ )_) fix_VV0 ,_, simply_RR buy_VV0 a_AT1 few_DA2 different-size_JJ utility_NN1 hooks_NN2 at_II the_AT hardware_NN1 store_NN1 ,_, screw_VV0 them_PPHO2 underneath_II the_AT desk_NN1 or_CC unit_NN1 ,_, and_CC drape_VV0 the_AT cords_NN2 over_II them_PPHO2 ._. 
A_AT1 Water_NN1 Stain_NN1 on_II the_AT Ceiling_NN1 After_II fixing_VVG the_AT leak_NN1 ,_, if_CS you_PPY do_VD0 n't_XX want_VVI to_TO repaint_VVI the_AT whole_JJ ceiling_NN1 ,_, try_VV0 touching_VVG it_PPH1 up_RP with_IW Kilz_NP1 Upshot_NN1 ,_, an_AT1 aerosol_NN1 ceiling_NN1 primer_NN1 that_CST 's_VBZ tinted_VVN to_II more_RGR closely_RR match_VV0 an_AT1 aged_JJ white_JJ ceiling_NN1 ._. 
Or_CC if_CS you_PPY prefer_VV0 to_II redo_NN1 everything_PN1 (_( and_CC entertain_VV0 yourself_PPX1 in_II the_AT process_NN1 )_) ,_, try_VV0 Sherwin-Williams_NP1 Visible_JJ Solutions_NN2 ceiling_NN1 paint_NN1 ._. 
It_PPH1 goes_VVZ on_II violet_NN1 and_CC dries_VVZ bright_JJ white_NN1 in_II 20_MC minutes_NNT2 ,_, which_DDQ ensures_VVZ you_PPY do_VD0 n't_XX miss_VVI any_DD spots_NN2 ._. 
Your_APPGE Most_RGT Prized_JJ Possessions_NN2 If_CS you_PPY want_VV0 a_AT1 fun_JJ outdoor_JJ hiding_NN1 place_NN1 for_IF your_APPGE valuables_NN2 without_IW the_AT risk_NN1 of_IO forgetting_VVG where_CS you_PPY hid_VVD them_PPHO2 ,_, use_VV0 a_AT1 GPS_NN2 device_NN1 to_TO save_VVI the_AT coordinates_NN2 (_( it_PPH1 's_VBZ called_VVN geocaching_VVG )_) ._. 
Looking_VVG to_TO give_VVI your_APPGE heirs_NN2 some_DD fun_NN1 after_CS you_PPY 're_VBR gone_VVN ?_? 
Include_VV0 the_AT coordinates_NN2 to_II a_AT1 sentimental_JJ stash_NN1 in_II your_APPGE will_NN1 ,_, or_CC lead_VV0 your_APPGE beneficiaries_NN2 on_II a_AT1 treasure_NN1 hunt_NN1 by_II supplying_VVG a_AT1 series_NN of_IO coordinates_NN2 to_II various_JJ things_NN2 you_PPY 've_VH0 stowed_VVN in_II different_JJ locations_NN2 ._. 
Never_RR hide_VV0 anything_PN1 too_RG valuable_JJ ,_, though_RR ._. 
Plastic_NN1 film_NN1 canisters_NN2 ,_, Tupperware_NP1 containers_NN2 ,_, and_CC especially_RR ammo_NN1 boxes_NN2 (_( available_JJ at_II Army-Navy_NP1 stores_NN2 )_) offer_VV0 the_AT best_JJT weather_NN1 protection_NN1 ._. 
Go_VV0 to_II geocaching.com_NNU to_TO learn_VVI more_RRR ._. 
From_II Telemarketers_NP1 The_AT Federal_JJ Trade_NN1 Commission_NN1 manages_VVZ the_AT National_JJ Do_VD0 Not_XX Call_VV0 Registry_NN1 ._. 
If_CS you_PPY add_VV0 your_APPGE home_NN1 and/or_CC cell_NN1 number_NN1 (_( sorry_JJ ,_, no_AT work_NN1 numbers_NN2 )_) to_II this_DD1 list_NN1 ,_, you_PPY should_VM stop_VVI being_VBG bothered_VVN by_II telemarketers_NN2 within_II 31_MC days_NNT2 ._. 
Charities_NN2 ,_, political_JJ organizations_NN2 ,_, and_CC telephone_NN1 surveys_NN2 are_VBR exempt_JJ ,_, as_CSA are_VBR businesses_NN2 you_PPY have_VH0 called_VVN or_CC dealt_VVN with_IW in_II the_AT last_MD 3_MC to_II 18_MC months_NNT2 ._. 
It_PPH1 's_VBZ most_RGT convenient_JJ to_TO opt_VVI out_RP by_II phone_NN1 ,_, since_II calling_VVG from_II the_AT number_NN1 you_PPY want_VV0 added_JJ to_TO the_AT registry_NN1 requires_VVZ less_DAR information_NN1 from_II you_PPY than_CSN opting_VVG out_RP online_RR at_II donotcall.gov_NNU ._. 
Your_APPGE E-mail_NN1 Address_NN1 If_CS you_PPY 're_VBR ordering_VVG something_PN1 from_II a_AT1 website_NN1 and_CC want_VV0 to_TO avoid_VVI future_JJ spam_NN1 ,_, or_CC if_CS there_EX 's_VBZ someone_PN1 you_PPY 'd_VM really_RR like_VVI to_TO be_VBI honest_JJ with_IW but_CCB only_RR if_CS you_PPY can_VM remain_VVI anonymous_JJ ,_, then_RT register_VV0 for_IF a_AT1 temporary_JJ e-mail_NN1 account_NN1 at_II guerrillamail.com_NNU ._. 
It_PPH1 's_VBZ free_JJ ,_, and_CC you_PPY 'll_VM be_VBI able_JK to_TO use_VVI the_AT address_NN1 to_TO receive_VVI messages_NN2 for_IF 15_MC minutes_NNT2 and_CC send_VVI them_PPHO2 for_IF 60_MC minutes_NNT2 ._. 
After_CS that_DD1 --_JJ poof_NN1 !_! --_JJ you_PPY never_RR existed_VVD ._. 
Your_APPGE Financial_JJ Information_NN1 Financial_JJ institutions_NN2 can_VM share_VVI information_NN1 about_II your_APPGE saving_NN1 and_CC spending_VVG habits_NN2 with_IW marketers_NN2 and_CC other_JJ banks_NN2 and_CC businesses_NN2 ._. 
This_DD1 makes_VVZ you_PPY more_RGR vulnerable_JJ to_II bothersome_JJ solicitations_NN2 and_CC even_RR fraud_NN1 ._. 
Although_CS banks_NN2 are_VBR legally_RR required_VVN to_TO notify_VVI you_PPY of_IO their_APPGE policies_NN2 ,_, fine_JJ print_NN1 disclosures_NN2 are_VBR often_RR difficult_JJ to_TO read_VVI and_CC interpret_VVI ._. 
If_CS you_PPY have_VH0 accounts_NN2 with_IW any_DD of_IO the_AT following_JJ companies_NN2 ,_, here_RL 's_VBZ how_RRQ to_TO say_VVI no_UH ._. 
(_( If_CS your_APPGE bank_NN1 is_VBZ n't_XX listed_VVN ,_, visit_VV0 its_APPGE website_NN1 or_CC your_APPGE local_JJ branch_NN1 to_TO review_VVI its_APPGE privacy_NN1 policy_NN1 ._. )_) 
Your_APPGE Scent_NN1 From_II a_AT1 Blood-Hound_NP1 Sorry_JJ ,_, but_CCB if_CS you_PPY 're_VBR on_II the_AT run_NN1 from_II one_MC1 of_IO these_DD2 ,_, enjoy_VV0 your_APPGE freedom_NN1 while_CS it_PPH1 lasts_VVZ ._. 
Your_APPGE scent_NN1 can_VM be_VBI tracked_VVN through_II shed_NN1 skin_NN1 cells_NN2 and_CC even_RR exhaled_JJ breath_NN1 ,_, according_II21 to_II22 Jack_NP1 Shuler_NP1 ,_, author_NN1 of_IO Training_VVG the_AT Mantrailing_NP1 Bloodhound_NP1 ._. 
Therefore_RR ,_, changing_VVG clothes_NN2 ,_, crossing_VVG water_NN1 ,_, or_CC using_VVG scent-masking_JJ products_NN2 will_VM not_XX deter_VVI a_AT1 well-trained_JJ bloodhound_NN1 ._. 
Bad_JJ Breath_NN1 Instead_II21 of_II22 nibbling_VVG on_II a_AT1 sprig_NN1 of_IO parsley_NN1 or_CC lemon_NN1 rind_NN1 ,_, have_VH0 a_AT1 cup_NN1 of_IO black_JJ or_CC green_JJ tea_NN1 ._. 
According_II21 to_II22 Christine_NP1 Wu_NP1 ,_, PhD_NNA ,_, who_PNQS organized_VVD the_AT 2007_MC conference_NN1 of_IO the_AT International_JJ Society_NN1 for_IF Breath_NN1 Odor_NN1 Research_NN1 (_( what_DDQ ,_, you_PPY missed_VVD it_PPH1 ?_? )_) ,_, green_JJ tea_NN1 in_RR21 particular_RR22 contains_VVZ high_JJ levels_NN2 of_IO catechins_NN2 ,_, which_DDQ "_" chemically_RR bind_VV0 to_II smelly_JJ breath_NN1 compounds_NN2 and_CC mask_VV0 them_PPHO2 ._. "_" 
For_IF the_AT greatest_JJT effect_NN1 ,_, have_VH0 the_AT tea_NN1 without_IW sugar_NN1 and_CC swish_VV0 it_PPH1 around_RP in_II your_APPGE mouth_NN1 before_II swallowing_VVG ._. 
When_CS drinking_VVG tea_NN1 is_VBZ n't_XX an_AT1 option_NN1 ,_, chew_VV0 a_AT1 piece_NN1 of_IO cinnamon_NN1 gum_NN1 for_IF 20_MC minutes_NNT2 ._. 
Wu_NP1 's_GE research_NN1 team_NN1 found_VVD that_CST the_AT gum_NN1 killed_VVD 50_MC percent_NNU of_IO bad-breath_JJ bacteria_NN2 ._. 
From_II All_DB Those_DD2 People_NN in_II Your_APPGE Past_NN1 You_PPY Never_RR Want_VV0 to_TO See_VV0 Again_RT If_CS your_APPGE home_NN1 phone_NN1 number_NN1 is_VBZ publicly_RR listed_VVN ,_, there_EX 's_VBZ a_AT1 good_JJ chance_NN1 that_CST by_II typing_VVG it_PPH1 into_II Google_NP1 or_CC any_DD popular_JJ online_JJ people_NN finder_NN1 ,_, your_APPGE name_NN1 ,_, address_NN1 ,_, and_CC even_RR a_AT1 map_NN1 to_II your_APPGE house_NN1 will_VM pop_VVI up_RP ._. 
To_TO hide_VVI this_DD1 kind_NN1 of_IO information_NN1 ,_, first_MD unlist_NN1 your_APPGE number_NN1 with_IW your_APPGE phone_NN1 company_NN1 (_( or_CC cancel_VV0 your_APPGE landline_NN1 entirely_RR and_CC use_VV0 your_APPGE mobile_NN1 )_) ._. 
Your_APPGE Identity_NN1 From_II Thieves_NN2 When_CS Traveling_VVG Newer_JJR credit_NN1 cards_NN2 ,_, driver_NN1 's_GE licenses_NN2 ,_, and_CC passports_NN2 increasingly_RR contain_VV0 radio_NN1 frequency_NN1 identification_NN1 (_( RFID_NP1 )_) tags_VVZ ._. 
This_DD1 technology_NN1 is_VBZ similar_JJ to_TO bar_VVI coding_NN1 ,_, but_CCB the_AT information_NN1 contained_VVN is_VBZ about_II you_PPY rather_II21 than_II22 a_AT1 product_NN1 ._. 
Armed_VVN with_IW an_AT1 RFID_JJ reader_NN1 ,_, a_AT1 thief_NN1 could_VM pick_VVI your_APPGE pocket_NN1 of_IO information_NN1 without_IW your_APPGE cards_NN2 ever_RR leaving_VVG your_APPGE wallet_NN1 ._. 
From_II a_AT1 Bolt_NN1 Out_II21 of_II22 the_AT Blue_JJ And_CC finally_RR ,_, if_CS past_JJ sins_NN2 have_VH0 you_PPY ducking_VVG in_II thunderstorms_NN2 ,_, then_RT consider_VV0 the_AT StrikeAlert_NN1 Personal_JJ Lightning_NN1 Detector_NN1 ._. 
It_PPH1 's_VBZ the_AT size_NN1 of_IO a_AT1 personal_JJ pager_NN1 and_CC will_VM notify_VVI you_PPY of_IO approaching_VVG cloud-to-ground_JJ lightning_NN1 up_RG21 to_RG22 40_MC miles_NNU2 away_RL ._. 
How_RRQ to_TO Find_VV0 Your_APPGE Employees_NN2 and_CC Children_NN2 Popular_JJ new_JJ mobile_JJ phone_NN1 services_NN2 ,_, like_II Loopt_NP1 and_CC Google_NP1 Latitude_NN1 ,_, use_VV0 GPS_NN2 and_CC other_JJ technologies_NN2 to_TO beam_VVI the_AT user_NN1 's_GE location_NN1 to_II friends_NN2 ,_, and_CC vice_RR21 versa_RR22 ._. 
While_CS the_AT technology_NN1 makes_VVZ for_IF a_AT1 fun_JJ social-networking_JJ tool_NN1 ,_, employers_NN2 and_CC parents_NN2 may_VM want_VVI to_TO co-opt_VVI it_PPH1 and_CC use_VVI it_PPH1 on_II the_AT phones_NN2 they_PPHS2 provide_VV0 to_II employees_NN2 and_CC kids_NN2 ._. 
(_( Note_VV0 to_II those_DD2 being_VBG tracked_VVN :_: To_TO find_VVI out_RP if_CS any_DD of_IO these_DD2 services_NN2 has_VHZ been_VBN installed_VVN without_IW your_APPGE knowledge_NN1 ,_, look_VV0 in_II your_APPGE phone_NN1 's_GE applications_NN2 menu_NN1 or_CC watch_VV0 for_IF messages_NN2 that_CST it_PPH1 sends_VVZ periodically_RR to_II users_NN2 ._. )_) 
Of_RR21 course_RR22 ,_, tracking_JJ people_NN this_DD1 way_NN1 is_VBZ n't_XX perfect_JJ ._. 
Your_APPGE assistant_NN1 could_VM cover_VVI up_RP the_AT fact_NN1 that_CST he_PPHS1 's_VBZ on_II a_AT1 golf_NN1 course_NN1 by_II activating_VVG the_AT Hide_NN1 feature_NN1 or_CC ,_, even_RR more_RGR deviously_RR ,_, by_II programming_VVG in_II the_AT home_NN1 address_NN1 of_IO his_APPGE "_" sick_JJ auntie_NN1 ._. "_" 
How_RRQ to_TO Find_VV0 a_AT1 Liar_NN1 The_AT story_NN1 of_IO Pinocchio_NP1 may_VM not_XX be_VBI entirely_RR mythical_JJ ._. 
When_CS someone_PN1 is_VBZ lying_VVG ,_, the_AT cells_NN2 lining_VVG the_AT inside_NN1 of_IO the_AT nose_NN1 swell_NN1 and_CC release_VV0 histamine_NN1 ,_, which_DDQ causes_VVZ itching_VVG ._. 
As_II a_AT1 result_NN1 ,_, liars_NN2 are_VBR more_RGR likely_JJ to_TO touch_VVI and/or_CC scratch_VVI their_APPGE noses_NN2 ,_, says_VVZ Alan_NP1 Hirsch_NP1 ,_, MD_NNA ,_, founder_NN1 of_IO the_AT Smell_NN1 &;_NULL Taste_NN1 Treatment_NN1 and_CC Research_NN1 Foundation_NN1 ,_, who_PNQS has_VHZ studied_VVN this_DD1 Pinocchio_NN1 effect_NN1 ._. 
