Crowder Tackles the Silly Liberal Anti-Second Amendment Argument: ‘Should Everyone Own Tanks?’

https://www.louderwithcrowder.com/media-library/image.jpg?id=28736226&width=980

Oh, few issues push buttons quite like the Second Amendment, which, in truth, shouldn’t push buttons at all, right? It’s in black and white as Constitutional law, and the precedence for such a right is undeniable. But still, people bicker about it, split hairs, and grasp at straws to argue for limitations and modifications to this fundamental right. Why would this time be any different?

Enter from stage right this dude! Who believes limitations on God-given rights, like those enumerated in the Constitution, are sometimes necessary for the good of society—sound a little familiar?

“I don’t believe that I should be able to go buy a tank. That’s promotion of general welfare. That’s domestic tranquility. […] So, in my mind, the government should and ought to limit certain things. For example, I should not be able to buy a tank.”

To each their own, I suppose. I’d love to be able to buy a tank, and I do think people should be able to buy tanks. Maybe I’m in the minority.

The Second Amendment is not for hunting or sport shooting; it’s to allow for the citizenry to be armed to the teeth against the government, against any who would threaten their liberty. So, yeah, toss tanks in there, too.

Check out the entire conversation, though, to see how this kid fares in the discussion with Steven.

Get your content free from Big Tech’s filter. Bookmark this website and sign up for our newsletter!

Louder With Crowder

Linux Kodachi: Extreme Privacy Protection Out of the Box

https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2022/01/kodachi-linux.jpg

Privacy is one of the main reasons many people switch to Linux from Windows. For new Linux users, though, the learning curve involved with configuring a Linux system prevents them from fully achieving the privacy protection they want.

There is one Linux distribution, however, that delivers extreme security and privacy protection out of the box—even if you’ve never used Linux before. With Linux Kodachi, you’re protected automatically from the moment the system boots.

What Is Linux Kodachi?

Linux Kodachi is a live Debian-based Linux distribution that you can run directly from a USB drive on virtually any computer. It is similar to the TAILS Linux distribution but with some added layers of security and an easier setup for Linux beginners.

When used as suggested by the distribution’s developers, Linux Kodachi allows you to create a secure environment that makes it virtually impossible for anyone online to identify or track you as you go about your business.

On top of encrypting and anonymizing all internet connections, the system comes with some of the most advanced security and privacy tools already installed and ready to go. Kodachi even includes an emergency self-destruct button that will destroy the entire system along with any data it may contain.

In addition to protecting you while you work, the system also covers your tracks when you’re done. When you shut down the live system, all evidence of anything you did during your sessions vanishes, leaving the host computer untouched.

MAKEUSEOF VIDEO OF THE DAY

How to Install Linux Kodachi

Since Linux Kodachi is a live Linux distribution, you can boot it directly from a USB, DVD, or SD card. You can also boot and use it through virtualization software such as VMware, VirtualBox, or GNOME Boxes.

You can find all of the latest information about Kodachi along with download links for the most recent release at Eagle Eye Digital Solutions. There is a lot of information on the page that can be somewhat confusing at first glance (but well worth reading).

Download: Linux Kodachi

Once downloaded, you’ll need to create a bootable USB drive from the ISO image using a program such as Etcher. Then, of course, you’ll need to reboot your computer using the live Linux Kodachi USB.

When the live USB boots, the boot screen will have several options you can choose from. The easiest way to use Kodachi is to simply select the first live option: kodachi Legacy Live.

This will provide you with a fully functional and protected live system that leaves no trace of your session on the host computer. For a full explanation of the other boot options, you should refer to the Linux Kodachi website.

It will take a few moments for Kodachi to set itself up and then you’ll be presented with a heavily customized version of the XFCE desktop.

The desktop continuously displays a long list of details about your computer and internet connections organized into three columns on the right side of the screen.

The first column shows the status of hardware, such as processor and RAM usage. The second column displays mostly security information such as VPN and Tor status, encryption, and firewall settings.

The last column shows Linux system information such as kernel version and system uptime along with detailed network traffic information.

Kodachi comes with a wealth of privacy and security tools installed. Many of them activate automatically when the system boots. By default, with no intervention from you, the live system enables three major privacy and security-enhancing features:

  • Automatic connection to a VPN (all network traffic)
  • Automatic connection to the Tor network (browser traffic)
  • Automatic DNS encryption

This provides multiple layers of communication encryption out of the box. For those who want more, there is a wide variety of additional options that you can enable with the click of a button.

The Kodachi dashboard shows detailed security information about your current session along with a long list of configuration options. You can change how the system handles internet connections as well as which services and providers make up those connections.

At the time of writing, you can choose from configurations for:

  • Nine different VPN services plus the ability to add your own
  • 36 different Tor routing options
  • 23 different secured and unsecured DNS options

Linux Kodachi Software and Applications

Kodachi comes with a fully equipped toolbox of applications designed to allow you to do just about anything you want with your computer while maintaining your privacy and security.

There is a full system menu accessible from the left panel, but you’ll find most of the applications you probably want to use in folders attached to the dock at the bottom of your screen.

Among the pre-installed software, you will find several different browsers including Firefox, Tor Browser, and a few variants modified for extra security. You’ll also find an ample selection of security-oriented applications such as KeePass, OnionShare, Exif Cleaner, BleachBit, and more.

Using Kodachi With Persistent Storage

The Linux Kodachi system is fully functional when running as a live system from the USB. You can, however, create a live USB drive with persistent storage or install the operating system on the hard drive of your computer.

Installing Kodachi on your hard drive is as easy as clicking on the Install_Kodachi_Offline icon that appears on the live system’s desktop. For advanced users who want to create a bootable USB drive with persistent storage, we recommend following the instructions on the developer’s website.

Special Considerations When Using Persistent Storage

To maintain the highest level of security when installing Linux Kodachi on a hard drive, you should enable full disk encryption when the installer gives you the option.

With this option enabled, you will need to enter a password before the system boots. Without the password, the system will not load and the data on the hard drive will be unreadable.

With disk encryption enabled, you can then enable System Nuke after installation completes. This process will create a second boot password which will “nuke” the system if you enter it. When this process is triggered, encryption headers are instantly removed from the hard drive making it impossible to decrypt the data on it.

So, for example, if someone forces you to enter your password or give it to them so that they can enter it, using the special nuke password will instantly leave the entire contents of the hard drive in a permanently encrypted state.

A Warning About Users and Passwords

If you’ve installed Kodachi with persistent storage, it is a good idea to disable the automatic login function (you can do it through the Kodachi dashboard) and set a unique password for both the regular and root user accounts.

The default user account is kodachi (all lowercase) and the password for both the user account and the root account is r@@t00 (the last two digits are zeros).

Because Kodachi depends heavily on custom shell scripts, most of the functionality of the system will not work correctly if you log in under any account other than the default kodachi. You can change the passwords as you see fit, but you should not delete the kodachi user or log into the system under another user name.

Now You’re Ready to Explore the Web Anonymously

With Linux Kodachi running, you’re ready to use and explore the internet anonymously. Using the provided specialized browsers on top of the system’s base security and privacy protection, it will be virtually impossible for anyone to identify you as you move across the internet or deep web.

You can do everything you need to do (even browse dark web websites) with the confidence that you won’t be tracked.

The Best Dark Web Websites You Won’t Find on Google

The dark web isn’t for everyone, but some of it is worth exploring. Here are the best dark web websites worth checking out.

Read Next

About The Author

JT McGinty
(13 Articles Published)

JT is a tech industry veteran with more than 25 years of experience. From tech support to programming and system administration, he has done it all. He particularly enjoys teaching new users the freedom and power of Linux.

More
From JT McGinty

Subscribe to our newsletter

Join our newsletter for tech tips, reviews, free ebooks, and exclusive deals!

Click here to subscribe

MUO – Feed

5 Free Tools All Laravel Developers Must Have

https://postsrc.com/storage/KNiY9olGZToFin5xTLvFe4aOY4Z9idnhgAuYYf4U.jpg

In this post, you will get a brief overview of the

5 tools all Laravel developers must have and use for better productivity

to speed up the development of your Laravel project. Let’s get started.

Laravel Valet / Laragon

Laravel Valet

is a development tool that’s only Available for macOS that can greatly speed up your Laravel development. Out of the box Laravel Valet will allow you to straight away run a freshly new installed Laravel project under the “.test” domain (example.test). Behind the scene, it configures all of the necessary dependencies PHP, Nginx, MySQL, and other required tools by making use of Homebrew.

Below are some of the commands you can run:

  • valet install
  • valet start
  • valet restart
  • valet link
  • valet park
  • valet use <php>
  • valet open
Laravel Valet

For windows users,

Laragon

is a valet-like tool that can be used in the same manner. Out of the box, it comes with all of the dependencies that can be easily configured and used. Laragon has it’s own GUI so any actions such as starting and stopping PHP, Nginx can be operated from the interface.

Laragon

PHP Storm (EAP: Early Access Program)

The other tool that you need to have is a good IDE and although we knew that many use and love Visual Studio Code,

PHPStorm

is still the king for PHP development. After a fresh install, it comes bundled with all of the syntax highlighting, code completion, code inspection, and more. Well yes, you can make use of VS Code to have all of the code completion and etc by getting in the plugins, but sometimes we don’t have the luxury of time to set it up. You will be missing a lot if you are not using PHPStorm.

Jetbrains EAP
Jetbrains IDE with EAP

PHP Monitor (Only on macOS)

PHP Monitor

is a tool that works seamlessly with Laravel Valet and it will “displays the active PHP version in your status bar”. By having PHP Monitor you can bind global keyboard binding which will open up the dropdown and then once again trigger any of the actions such as “Switch PHP 8.0 or 8.1” by using command + number. 

Possible combination Ideas:

  1. Shift + Option + p (You have to set this keybinding from PHP Monitor preference)
  2. Command + 1 (Change the PHP version to 8.1)
  3. Command + 2 (Change the PHP version to 8.0)
PHP Monitor Status Bar

TablePlus

TablePlus is a freemium cross-platform database management tool available to all operating systems. It’s been around for quite a while now and really recommended tools for Laravel developers. Some of the pros of TablePlus are that it’s native, fast, secure, customizable and complete out of the box.

TablePlus

Expose

The 5th tool on the list is

Expose

(available for macOS only) and this is a tool that allows you to “Create public URLs for local sites through any firewall and VPN. Receive webhooks on your machine, test local sites on mobile devices, or share them with others.”. Expose is built by Beyond Code and this tool is free to install and use.

Below is the command to install expose but do make sure to register an account at Beyond Code to get your API token.

composer global require beyondcode/expose

And now in any of your Laravel project root folders, you can run the expose command and it will automatically create secure tunnels.

expose

Laravel News Links

Close-up Cutting Stuff

https://theawesomer.com/photos/2022/01/cutting_stuff_close_up_macro_t.jpg

Close-up Cutting Stuff

Link

Object pointed their macro camera lens at ordinary objects like wires and bolts so we could see what they look like when they’re cut in half. The slow-motion and sound effects help to heighten the impact of the visuals.

The Awesomer

Real Python: Build a Django Front End With Bulma – Part 2

In this four-part tutorial series, you’re building a social network with Django that you can showcase in your portfolio. This project will strengthen your understanding of relationships between Django models and show you how to use forms so that users can interact with your app and with each other. You’ll also make your Django front end look good by using the Bulma CSS framework.

In the first part, you extended the Django User model to add profile information that allows users to follow and unfollow each other. You also learned how to customize the Django admin interface and troubleshoot during development with the help of Django’s error messages.

In the second part of this tutorial series, you’ll learn how to:

  • Integrate Bulma CSS and style your app
  • Use template inheritance to reduce repetition
  • Structure Django templates in a folder hierarchy
  • Build routing and view functions
  • Interlink pages of your app using dynamic URLs

After finishing the second part of this project, you’ll move on to the third part of this tutorial series, where you’ll create the back end for adding content to your social network. You’ll also add the missing templates to allow your users to view the text-based content on their dashboard page.

You can download the code that you’ll need to start the second part of this project by clicking the link below and going to the source_code_start/ folder:

Get Source Code: Click here to get the source code for this part of building out your Django social network.

Demo

In this four-part tutorial series, you’re building a small social network that allows users to post short text-based messages. The users of your app can also follow other user profiles to see the posts of these users or unfollow them to stop seeing their text-based posts:

In the second part of this series, you’ll work with templates and learn to use the CSS framework Bulma to give your app a user-friendly appearance. You’ll also tackle common tasks such as setting up routing, views, and templates for individual user profile pages as well as interlinking them with the profile list page:

At the end of this part of the tutorial series, you’ll be able to access detail pages and the profile list page and navigate between them. You’ll also have Bulma added to style the pages.

Project Overview

In this section, you’ll get an overview of the topics that you’ll cover in this second part of the tutorial series. You’ll also get a chance to revisit the full project implementation steps, in case you need to skip back to a previous step from an earlier part of the series or if you want to see what’s still up ahead.

At this point, you should have finished working through part one of this tutorial series. If you did, then you’re ready to continue with your next steps, which focus on templates and front-end styling:

After completing all steps of this second part of the series, you can continue with part three.

To refresh your memory and get an overview of how you’ll work through all four parts of this series on building your Django social network, you can expand the collapsible section below:

You’re implementing the project in a number of steps spread out over multiple separate tutorials in this series. There’s a lot to cover, and you’re going into detail along the way:

✅ Part 1: Models and Relationships

  • Step 1: Set Up the Base Project
  • Step 2: Extend the Django User Model
  • Step 3: Implement a Post-Save Hook

📍 Part 2: Templates and Front-End Styling

  • Step 4: Create a Base Template With Bulma
  • Step 5: List All User Profiles
  • Step 6: Access Individual Profile Pages

⏭ Part 3: Follows and Dweets

  • Step 7: Follow and Unfollow Other Profiles
  • Step 8: Create the Back-End Logic For Dweets
  • Step 9: Display Dweets on the Front End

⏭ Part 4: Forms and Submissions

  • Step 10: Submit Dweets Through a Django Form
  • Step 11: Prevent Double Submissions and Handle Errors
  • Step 12: Improve the Front-End User Experience

Each of these steps will provide links to any necessary resources. By approaching the steps one at a time, you’ll have the opportunity to pause and come back at a later point in case you want to take a break.

With the high-level structure of this tutorial series in mind, you’ve got a good idea of where you’re at and which implementation steps you’ll handle in the later parts.

Before getting started with the next step, take a quick look at the prerequisites to skim any links to other resources that might be helpful along the way.

Prerequisites

To successfully work through this part of your project, you need to have completed the first part on models and relationships and you should confirm that your project is working as described there. It would be best if you’re also comfortable with the following concepts:

Read the full article at https://realpython.com/django-social-front-end-2/ »


[ Improve Your Python With 🐍 Python Tricks 💌 – Get a short & sweet Python Trick delivered to your inbox every couple of days. >> Click here to learn more and see examples ]

Planet Python

This is the way

Someone in Palm Beach tells New Yorkers leave if ‘woke’

Someone had a warning for New Yorkers visiting former President Donald Trump’s new hometown — leave if you are “woke.”

Palm Beach police are investigating after someone placed fliers over the weekend on New York-licensed cars parked in the wealthy island reading, “If you are one of the those ‘woke’ people — leave Florida. You will be happier elsewhere, as will we.”

Remember that I just recently wrote a post about some fucking guy who had the Progressive audacity to leave San Francisco,  because it is a failed city, for Miami but say that Miami is worse.

This is what Red Southern states have to deal with.

I’m learning all about what New Yorkers are doing to North Carolina.

Telling those fuckers to stay out with flyers is probably the nicest way Southerners have dealt with carpetbaggers.

Real Python: Deploy Your Python Script on the Web With Flask

https://files.realpython.com/media/Python-driven-Web-Applications_Watermarked.34e6451b18f1.jpg

You wrote a Python script that you’re proud of, and now you want to show it off to the world. But how? Most people won’t know what to do with your .py file. Converting your script into a Python web application is a great solution to make your code usable for a broad audience.

In this course, you’ll learn how to go from a local Python script to a fully deployed Flask web application that you can share with the world.

By the end of this course, you’ll know:

  • What web applications are and how you can host them online
  • How to convert a Python script into a Flask web application
  • How to improve user experience by adding HTML to your Python code
  • How to deploy your Python web application to Google App Engine

[ Improve Your Python With 🐍 Python Tricks 💌 – Get a short & sweet Python Trick delivered to your inbox every couple of days. >> Click here to learn more and see examples ]

Planet Python

Real Python: Deploy Your Python Script on the Web With Flask

https://files.realpython.com/media/Python-driven-Web-Applications_Watermarked.34e6451b18f1.jpg

You wrote a Python script that you’re proud of, and now you want to show it off to the world. But how? Most people won’t know what to do with your .py file. Converting your script into a Python web application is a great solution to make your code usable for a broad audience.

In this course, you’ll learn how to go from a local Python script to a fully deployed Flask web application that you can share with the world.

By the end of this course, you’ll know:

  • What web applications are and how you can host them online
  • How to convert a Python script into a Flask web application
  • How to improve user experience by adding HTML to your Python code
  • How to deploy your Python web application to Google App Engine

[ Improve Your Python With 🐍 Python Tricks 💌 – Get a short & sweet Python Trick delivered to your inbox every couple of days. >> Click here to learn more and see examples ]

Planet Python

Backup Performance Comparison: mysqldump vs MySQL Shell Utilities vs mydumper vs mysqlpump vs XtraBackup

https://www.percona.com/blog/wp-content/uploads/2021/12/MySQL-Backup-Performance-Comparison.pngMySQL Backup Performance Comparison

MySQL Backup Performance ComparisonIn this blog post, we will compare the performance of performing a backup from a MySQL database using mysqldump, MySQL Shell feature called Instance Dump, mysqlpump, mydumper, and Percona XtraBackup. All these available options are open source and free to use for the entire community.

To start, let’s see the results of the test.

Benchmark Results

The benchmark was run on an m5dn.8xlarge instance, with 128GB RAM, 32 vCPU, and 2xNVMe disks of 600GB (one for backup and the other one for MySQL data). The MySQL version was 8.0.26 and configured with 89Gb of buffer pool, 20Gb of redo log, and a sample database of 177 GB (more details below).

We can observe the results in the chart below:

MySQL Backup Results

And if we analyze the chart only for the multi-threaded options:

multi-threaded options

As we can see, for each software, I’ve run each command three times in order to experiment using 16, 32, and 64 threads. The exception for this is mysqldump, which does not have a parallel option and only runs in a single-threaded mode.

We can observe interesting outcomes:

  1. When using zstd compression, mydumper really shines in terms of performance. This option was added not long ago (MyDumper 0.11.3).
  2. When mydumper is using gzip, MySQL Shell is the fastest backup option.
  3. In 3rd we have Percona XtraBackup.
  4. mysqlpump is the 4th fastest followed closer by mydumper when using gzip.
  5. mysqldump is the classic old-school style to perform dumps and is the slowest of the four tools.
  6. In a server with more CPUs, the potential parallelism increases, giving even more advantage to the tools that can benefit from multiple threads.

Hardware and Software Specs

These are the specs of the benchmark:

  • 32 CPUs
  • 128GB Memory
  • 2x NVMe disks 600 GB
  • Centos 7.9
  • MySQL 8.0.26
  • MySQL shell 8.0.26
  • mydumper 0.11.5 – gzip
  • mydumper 0.11.5 – zstd
  • Xtrabackup 8.0.26

The my.cnf configuration:

[mysqld]
innodb_buffer_pool_size = 89G
innodb_log_file_size = 10G

Performance Test

For the test, I used sysbench to populate MySQL. To load the data, I choose the tpcc method:

$ ./tpcc.lua  --mysql-user=sysbench --mysql-password='sysbench' --mysql-db=percona --time=300 --threads=64 --report-interval=1 --tables=10 --scale=100 --db-driver=mysql prepare

Before starting the comparison, I ran mysqldump once and discarded the results to warm up the cache, otherwise our test would be biased because the first backup would have to fetch data from the disk and not the cache.

With everything set, I started the mysqldump with the following options:

$ time mysqldump --all-databases --max-allowed-packet=4294967295 --single-transaction -R --master-data=2 --flush-logs | gzip > /backup/dump.dmp.gz

For the Shell utility:

$ mysqlsh
MySQL JS > shell.connect('root@localhost:3306');
MySQL localhost:3306 ssl test JS > util.dumpInstance("/backup", {ocimds: true, compatibility: ["strip_restricted_grants","ignore_missing_pks"],threads: 16})

For mydumper:

$ time mydumper  --threads=16  --trx-consistency-only --events --routines --triggers --compress --outputdir /backup/ --logfile /backup/log.out --verbose=2

PS: To use zstd, there are no changes in the command line, but you need to download the zstd binaries.

For mysqlpump:

$ time mysqlpump --default-parallelism=16 --all-databases > backup.out

For xtrabackup:

$ time xtrabackup --backup --parallel=16 --compress --compress-threads=16 --datadir=/mysql_data/ --target-dir=/backup/

Analyzing the Results

And what do the results tell us?

Parallel methods have similar performance throughput. The mydumper tool cut the execution time by 50% when using zstd instead of gzip, so the compression method makes a big difference when using mydumper.

For the util.dumpInstance utility, one advantage is that the tool stores data in both binary and text format and uses zstd compression by default. Like mydumper, it uses multiple files to store the data and has a good compression ratio. 

XtraBackup got third place with a few seconds of difference from MySQL shell. The main advantage of XtraBackup is its flexibility, providing PITR and encryption for example. 

Next, mysqlpump is more efficient than mydumper with gzip, but only by a small margin. Both are logical backup methods and works in the same way. I tested mysqlpump with zstd compression, but the results were the same, hence the reason I didn’t add it to the chart. One possibility is because mysqlpump streams the data to a single file.

Lastly, for mysqldump, we can say that it has the most predictable behavior and has similar execution times with different runs. The lack of parallelism and compression is a disadvantage for mysqldump; however, since it was present in the earliest MySQL versions, based on Percona cases, it is still used as a logical backup method.

Please leave in the comments below what you thought about this blog post, if I missed something, or if it helped you. I will be glad to discuss it!

Useful Resources

Finally, you can reach us through the social networks, our forum, or access our material using the links presented below:

Planet MySQL

How to avoid achy feet while working at home

https://www.futurity.org/wp/wp-content/uploads/2022/01/feet-covid-19-working-from-home-slippers-1600.jpgA woman wears white unicorn slippers under her desk

If you’ve been spending more time at home during the pandemic, you may not realize how important proper footwear is for keeping certain injuries at bay.

Sean Peden, an orthopaedic foot and ankle specialist from Yale University Medicine, says not wearing supportive footwear on a regular basis can lead to foot pain and other problems.

“Many people are continuing to work at home part- or full-time, which for some can mean wearing slippers or walking around barefoot,” Peden says. “And because of that, many patients are coming to us with foot problems.”

Taking good care of your feet will not only help you avoid common injuries like tendonitis and plantar fasciitis, but it can also prevent other issues with your hips, knees, and back from developing, he adds.

Here, Peden shares some of the most common foot problems he sees—and simple treatments to get relief:

Think of shoes as shock absorbers

Just as you would pick out an appropriate shoe for your commute into the office, it’s important to put the same level of thought into selecting an at-home shoe.

Walking barefoot at home is not recommended for the same reason walking barefoot outside is ill-advised, Peden says.

“All kinds of footwear protect your feet. Over the course of weeks or months, the strain of walking barefoot can add significant stress to your arches, tendons, plantar fascia, and joints,” he says. “This can lead to a range of complications, from minor conditions such as calluses to major issues such as arch collapse.”

It may help to think of footwear as shock absorbers and, based on body type and gait, some of us need more shock absorption than others, Peden says.

“If you have sore feet—or have had foot problems in the past—wearing a pair of what I call ‘house shoes,’ or ‘house slippers,’ is a good idea.”

By that, Peden means a hard-soled, slip-on shoe or slipper that is worn exclusively inside the home (ideally) to avoid bringing in dirt or bacteria.

“To be practical, I suggest a slip-on clog or slipper without laces. That way, you don’t have to tie and untie your shoes 10 times a day,” Peden says. “A hard sole is important because the harder the sole, the less stress the joints and tendons in your foot experience with each step. The hard sole transfers that stress to the shoe rather than to the foot.”

In general, avoid fluffy, formless slippers, he advises. “If you are at home, you might go up and down stairs dozens of times a day—or do chores around the house. And those are not activities to do with footwear that doesn’t have any support,” Peden says. “A good rule of thumb is if it isn’t something you could walk in for a few blocks comfortably, you shouldn’t wear it around the house all day, either.”

Painful tendonitis

One of the most common foot problems Peden has seen in patients since the pandemic started is Achilles tendonitis, or inflammation of a tendon (a thick cord of tissue that connects muscles to bones). The Achilles tendon runs from the back of your calf to your heel bone. Achilles tendonitis can cause pain and swelling in the foot and ankle.

An injury, overuse, and flat fleet are all causes for Achilles tendonitis, Peden says. “It can be an issue especially if people with flat feet spend six months to a year not wearing supportive shoes on a regular basis,” he says. “The tendon in the arch of the foot becomes inflamed as the foot gets flatter. It is quite painful and can be debilitating.”

Peden says he is also seeing more patients with posterior tibial tendonitis, which causes a collapsed arch or flat foot.

The Fix: For acute pain, the first things to try are rest, ice, and staying off your feet as much as possible. Finding footwear with good arch support is another must, Peden says.

“Some people might need an ankle brace or additional inserts for their shoes, but for the vast majority, proper footwear is the answer. These tendon flares generally last a few months, but patients usually see improvement within a week or two.”

People with tendon issues should get proper treatment, Peden says. “You want to avoid developing a chronic tendon issue, because those are harder to cure.”

Plantar fasciitis: ‘stabbing’ heal pain

Many patients have developed plantar fasciitis, inflammation of the band of tissue on the bottom of your foot.

A common symptom is a stabbing pain in the heel that can be the most intense when you first step out of bed in the morning. That’s because the plantar fascia, which runs from the heel to the base of your toes, tightens overnight.

The plantar fascia supports the arch of the foot and absorbs stress. Too much stress—from standing on your feet on a hard surface for a long time, improper shoes, or running—can cause irritation and tiny tears in the band of tissue.

“The pain is usually on the bottom part of the heel,” Peden says. “It’s associated with tight Achilles tendons and calf muscles. If people spend a lot of their day sitting, for example, the muscles can tighten up, and wearing improper footwear can exacerbate the issue.

“For people who work outside the home and are on their feet all day, including nurses, they should wear a supportive shoe—and not something too soft or flexible. This can include sneakers, a hard clog, or a work shoe, depending on personal preference.”

The Fix: Besides supportive footwear and avoiding walking around barefoot, treatment should include a home stretching program to address the tightness in the calf muscles and Achilles tendons, Peden says.

Another effective treatment is to wear a soft, flexible splint that holds your foot at a 90-degree angle while you are sleeping; this keeps the plantar fascia stretched out. You can also wear a splint while lying on the couch watching TV.

As painful as plantar fasciitis can be, Peden says it is not a progressive condition. “People often worry it’s the start of something like arthritis, which continues to get worse,” he says. “It might take a few months of conservative, noninvasive, nonsurgical treatments, but patients with plantar fasciitis typically get better.”

Physical therapy and lifestyle

Exercise, physical therapy, and weight loss can all make a difference in addressing foot pain, too.

“One pound of additional weight on your body leads to six pounds of additional pressure on your foot. So, if you lose 10 pounds, that is really taking 60 pounds of pressure off your foot,” Peden says.

With the pandemic, many people have gained weight, which compounds the problem. But the key is not to do too much too quickly to try to reverse it, Peden says.

“If you try to lose weight by suddenly walking too much, that’s hard on your feet, too, and may lead to other foot problems. So, I often recommend cross-training, including low-impact cardio activities like biking or swimming. You can walk, but try to take it easy and, as always, wear good, supportive shoes.”

Hiking shoes are often a good option, particularly if you walk on uneven surfaces, including trails. “They are a little safer than sneakers, and protect your foot and ankle better,” he says.

In certain cases, physical therapy is recommended for lingering foot issues. “Physical therapists have many techniques that can speed up the recovery process,” Peden says.

Surgery is rarely needed for chronic conditions like tendonitis or plantar fasciitis. “We always treat our patients first with nonsurgical options to hopefully manage the condition before we ever talk about surgery,” Peden says.

But if you are feeling foot pain, don’t be afraid to seek medical help, Peden advises.

“I know people have different comfort levels right now about seeking medical care during the pandemic, but if you have a foot issue and it’s been hurting for a while, you should go see your doctor. There are likely easy solutions.”

Source: Yale University

The post How to avoid achy feet while working at home appeared first on Futurity.

Futurity