How to know who you are

Humans are not meant to stop growing. In fact, no living thing on earth is meant to stop growing. We are all alive, reaching for the sun.

Progress in life is all about reinvention. I am going to preface all of this by saying that reinvention is not the same thing as endlessly seeking reward or achievement. There is a difference. Seeking an achievement usually implies an “end.” You win the trophy and then you’re “done.” That’s not what you want to aim for–because as soon as you say you’re “done,” you are no longer reaching and stretching yourself, which means you stop growing.

Reinvention, however, leaves the end open–which is actually a good thing. Reinvention is what allows you endless opportunities to continue exploring new parts of yourself. Exploration is growth, and growth in this sense is not outward facing but inward.

Whenever you find something about yourself you want to change, you need to look for a way to reinvent it.

1. See yourself outside yourself.

Imagine you are a sculptor. A sculptor looks at his or her piece of stone and endlessly questions new ways to shape it. And if he or she thinks of something to change, there is no emotional attachment. They just do it. This is how you need to see yourself–as a work of art, always in progress. No need to get upset, or come down hard on yourself when you see something you do not like. Instead, like an artist, just get to work.

2. Find the habit associated with the thing you want to change.

Far too often, people focus too much on the thing they want to change instead of the habits that formed the thing in the first place. For example: They try to solve being overweight with doing a lot of ab exercises, without acknowledging that the problem is their poor diet. To truly reinvent aspects of yourself, you have to find the habit that created that trait in the first place–and then adjust the habit.

3. Practice every day, no matter what.

Change is not something you do some days and then take a break from other days. Change is a shift in lifestyle. It requires daily dedication, to the point where that new habit takes the place of an old one and no longer requires conscious effort.

4. Set realistic goals.

You can’t just wake up one morning and say, “I’m not going to be impatient anymore!” Yes, you are. And you actually help yourself by acknowledging that a bad habit like that won’t be solved immediately. Instead, set the goal to be more patient during your team meeting that happens every morning. Use that as an isolated practice space and subconscious reminder of what it is you want to practice. Focus on that for a few weeks, and then go from there.

5. Constantly look in the mirror.

Things get dangerous when you refuse to stop and really look at yourself–when you avoid self-reflection. There is a time and a place for “go go go” mode, and then there is a time and place for reflection mode. Both are necessary. And you will quickly find that unless you take the time to ask yourself the tough questions, you will fall off track and not know how you got there.

6. Surround yourself with people who will tell you the truth.

If everyone around you is telling you “yes,” then you have a serious problem. You need people who are going to challenge and question you. You need people who won’t be afraid to tell you the truth. Tough feedback is essential for personal growth.

7. You have to take risks.

You will never become the person you want to be by continuing to be the person you currently are. Growth’s only request is that you step out of your comfort zone. That’s it. And unless you are willing to take that risk, to take that uncomfortable leap into the unknown, you will forever stay exactly where you are.


Reinvention is an art. It is a process. It is not a “quick fix” or an “overnight solution.” It is a deliberate practice, day in and day out, until you realize who it is you want to be, you already were all along.

You can see who a OneDrive for work or school, SharePoint, or Teams file or folder has been shared with at any time.

See whom a file or folder is shared with

In your document library, select the file or folder.

Above the list of files, select Share.

The Send link window opens.

If the item is currently shared with anyone, a Shared with list appears at the bottom of the Send link window.

How to know who you are

Each circular item in the list represents a person or group that the item has been shared with.

Point your mouse at any item to see the name of the person or group.

Click any item in the list to see more details about who can access the file. See Manage access to a file later in this article for more details.

If there isn’t a shared with section, the item isn’t currently shared.

Manage access to a file or folder

When you select an item in the Shared with list, the Manage Access panel opens:

The Links Giving Access section shows the links that have permissions to the file or folder. Click the ellipsis (. ) to see the users that the link has been shared with.

How to know who you are

The Direct Access section shows people and groups who have direct access to the file or folder. (This includes groups that have access to the site where the file or folder resides.)

How to know who you are

When viewing who has access to a file or folder, internal users will have their name and job title displayed. External users will only have their email address displayed, with External User below the address.

Levels of sharing access

There are different options for sharing:

Anyone gives access to anyone who receives this link, whether they receive it directly from you or forwarded from someone else. This may include people outside of your organization.

People in gives anyone in your organization who has the link access to the file, whether they receive it directly from you or forwarded from someone else.

People with existing access can be used by people who already have access to the document or folder. It does not change the permissions on the item. Use this if you just want to send a link to somebody who already has access.

Specific people gives access only to the people you specify, although other people may already have access. If people forward the sharing invitation, only people who already have access to the item will be able to use the link.

Note: If a sharing option has been greyed out, your organization’s admins may have restricted them. For example, they may choose to disable the Anyone option to prevent usable links being forwarded to others.

There are also different levels of permission:

Can view allows the recipient to only view the file or folder; they cannot make changes to it. This can be further restricted by selecting the option to Block download, which means they cannot save a local copy.

Can edit allows the recipient to make changes to the file or folder.

Additionally, when creating a link, you can set an expiration date, as well as a password to access the file. (You will need to provide the password to the person or people you’re sharing the file with.)

How to know who you are

Is your internet acting funny? Have your connections slowed down? Or are you just worried that someone may have access to your WiFi network? These are all good reasons to do a quick check of your WiFi connections and, if necessary, beef up security to keep unknown entities from hogging your bandwidth.

While sharing your WiFi with a stranger may seem unlikely, harmless, or both, doing so can drain your bandwidth, slow your connections, and, if you have multiple devices set up to share access on your network, it is even possible that your secret guest could access that information too. This leads to a common question: “How do I see who’s on my WiFi?”

In most cases, it’s probably just someone who needs a WiFi connection. It might even be someone who you shared your password with in the past. I used to work at an internet call center, and this issue was a huge call driver, although in most cases the caller’s concerns were unfounded. Still, it’s good to know how to check for yourself.

The simplest way to remove unwanted WiFi users is to change your password — and don’t share the new one. But if you want to take things a step further and find out exactly who is on your network, there are several ways to access a list of the devices that are currently using your WiFi.

How to access a list of connected devices

The most accurate way to access a list of connected devices is to log into your router’s settings page. If your router was provided by your internet service, such as Spectrum, you may be able to easily log into your account to find this info. If you provided your own router, you can access the router settings by using the access information that is typically found on the back of the router. You may also be able to use a related phone app, like Netgear’s Nighthawk and Orbi apps, which are designed to help you manage your router settings for those specific devices.

To check your router settings and connected devices, remain connected to the WiFi and open your router settings page. Simply type the prescribed IP address into a browser and it will bring you to the page where you can access your router settings. This login information is usually found on the back of your router in the form of an IP address in numbers. When you put the IP into a browser that is connected to your home WiFi, it brings you to a login page. Often, the default login is also listed on the back of the router.

Once logged in, you can make changes to the network name and password and see which devices are listed as connected. Some more sophisticated devices will list the specific equipment by name: Samsung TV, MacBook Pro, etc. But others might only give you the device’s MAC address, which means you’ll need to look up the MAC addresses on each of your devices in order to confirm a match. The MAC address for your device is listed along with the serial number, usually as part of the sticker or plate that lists the serial number and other identifying information. It’s also listed in the settings section.

How to help prevent future WiFi intruders

So what do you do now? Well, you may be surprised by how many devices are actually connected to your WiFi. If you find devices that you know are not yours, there isn’t much you can do to identify who they belong to. But you can immediately disconnect them by changing your password, and keeping it a secret.

Not sure how to change your password? This is usually done in that same router settings page we discussed before, but some providers or manufacturers allow you to make changes via their own app or website.

Some tips on keeping the code secure: Don’t use your name or address as a password. Don’t use a password that matches a network name. And don’t share your password with your neighbors, who might then share it with their neighbors, and so on, and so on, until everyone is connected to your WiFi.

How to know who you are

By Isabella: What are you? Who are you? Who do you think you are and who are you really? Are you presenting the best of you when you exit your home and engage the world? What do you lead with? When you meet a new potential lover, husband, wife, life partner or friend, what do you share about yourself? Do you lead with your woes or your triumphs? Do you lead with engaging stories that might inspire others or do you drag people down or wear them out with drama and inertia?

You’d be surprised at how many humans lead with their hard luck stories; whether it is a cheating spouse, doctors’ visits and sickness or being broke, most people don’t realize they are doing it. I truly believe that “Whatever you hang around with you become,” and I live my life to that quote since I am the one who wrote it. If you surround yourself with broken people you become part of the narrative and eventually you will break too. If you surround yourself with angry people their anger feeds right into you. When you look at the Salem witch trials of 1692-3, you can easily see how mass hysteria led to the false accusations, convictions and deaths of people who were clearly innocent. Being around those who espouse conspiracies theories or who subscribe to the fear of anything are toxic to well-being.

How to know who you are

Since the 2016 election of Dictator Donald Trump many weak or damaged Americans have increasingly become dark and dependent on his barrage of lies and deceptions. They have literally given up their power to hearsay and falsehoods and have surrendered all reason. These are the very same types of people who became Scientologists and run akin to those 1000 souls who followed Jim Jones to their death in the Guyana massacre of 1978. Followers are not leaders, nor are they independent thinkers, skeptics or intelligent souls who check and verify before aligning to anyone.

The same is applicable to those you engage with every day. The real contagion is ignorance and fear and those who subscribe to that which is not supported by facts and history are doomed to fall if they are not careful.

These days the darkness seeks to find the weak, the meager, the lost and the truth deniers. Who you befriend is as important as who you marry. Who you listen to could mean the difference between a walk in peace or a walk in turmoil and confusion. You choose it all and the universe responds to whatever you choose.

Choose kindness, choose being a good person, thoughtful, considerate of others, honest, loyal and ethical. Choose to give more than you take and choose to create a life of meaningful purpose, not one of randomness. Giving is heart healthy so is decency and walking in integrity. Why lie? Why cheat? Why be late? Why be rude? Why be unforgiving? Unless of course you like sickness and disease which is precisely what all of these create in your body. Lies are always uncovered, cheating is always discovered and being rude or unforgiving just creates negative karma and you are the one who will pay in the end for all the above. In today’s society “Karens” are all over You Tube and with so many cell phones and cameras in every city it behooves you to think before you speak or act. Don’t be caught on camera being a “Karen” it will follow you the rest of your life.

Think, pray, meditate, love yourself, love others, give, have compassion, be honest, have integrity, be kind. Be the light that glows not the darkness that consumes. It’s simple really.

My name is Isabella and if you’d like to learn more about how to evolve, be more prosperous, attract more love and live healthier, get in touch with me. I’ve spent nearly 30 years helping others and I would love to help you.

How to know who you are

With beams of Love, Light and Infinite Laughter,

Great relationships give life significantly more purpose, and in business, they translate to resources, advice and stability. Trust is at the heart of these connections.

These 15 signs are dead giveaways that you’re dealing with a keeper:

1. They are consistent.

A trustworthy person will use roughly the same behavior and language in any situation. They have the self-control to maintain character and follow through on what they say they’ll do, even when they are tempted to walk it back. They won’t wear different masks or pretend they’re someone they’re not just to impress. Switching gears comes from having learned reliable new information, not from self-serving whims. What’s more, what they say matches what you hear from others.

2. They show compassion and humility.

Both these traits demonstrate that the person can think of others well and doesn’t consider themselves as more important than anyone else. Because they are more outwardly focused, they’re less likely to step on your toes or betray you to get something they need or want.

3. They respect boundaries.

Trustworthy individuals don’t try to impose their will on others because they don’t feel the need to control those around them. They avoid bullying and acknowledge that no means no.

4. They compromise and don’t expect something for nothing.

Small sacrifices show that the individual recognizes that trust is a two-way street. They’re willing to give a little to get something back later. And if they do ask for something, they’re sure to demonstrate the value of their request.

5. They’re relaxed (and so are you).

A person who is faking it and who is more likely to behave in shady ways usually will display some signs of anxiety, such as agitated body language. If the person seems at ease, they likely have nothing to hide and are being honest and open with you. You’ll likely feel calm, too, because you won’t be subconsciously picking up on and mirroring back negative cues.

6. They are respectful when it comes to time.

Trustworthy people do their best not to be late or cancel plans at the last minute because they know doing so inconveniences you and violates promises. They won’t try to rush or drag things out for their own benefit.

7. They show gratitude.

Trustworthy individuals are willing to admit they can’t do it all alone and value teamwork. They give credit where it’s due, even if it means they don’t advance as quickly or shine as much themselves.

8. They give up all the facts, even if it hurts.

Truth and transparency matters to trustworthy people. They won’t lie by omission or fudge data. They will give up even the information that could put their reputation at risk or create conflict, believing that those conflicts can be solved with good empathy and communication.

9. They confide in you.

Confiding in someone, exposing faults and all, involves a certain amount of vulnerability. So when someone confides in you, it demonstrates that the individual already trusts you and that they want you to be open with them, too.

10. They aren’t materialistic or desperate for money.

While there’s zero wrong with having nice things, trustworthy people don’t put stuff ahead of people. They’re willing to give up what they have (or could have) to help. Financial stability facilitates trust because it reduces the temptation to treat others poorly out of the need for self-preservation.

11. They’re right a lot.

Because trustworthy people value truth, they are willing to do their homework. They do the research that leads to verifiable conclusions, so they have a track record of having the right answer.

12. They skip the water cooler gossip.

Trustworthy individuals don’t like to make assumptions about anything or anybody. They prefer to get information from the source and to let the source speak for themselves. They avoid rumors because they know that rumors usually include negativity that tears people down instead of building them up. When they do talk, their language is empowering and respectful.

13. They’re learners.

Individuals who are worth your trust know they don’t have all the answers. They look for ways to learn and improve themselves constantly, and through that process, they’re willing to share the resources and facts they find.

14. You know who they’re connected to, and they try to connect you.

Both these elements show that the other person sees you as important. They want you to be part of their regular social group and meet the people you need to succeed. Others can affirm or contradict what you know about the individual, too. Subsequently, the more people the individual introduces you to, the more likely it is that they’re not hiding who they are.

15. They’re there for you and others.

Trustworthy people will listen to and support you even when they don’t need something from you. They do their best to be available to help, whatever you might be going through.

I f you’ve ever felt like something is off in a close relationship or casual encounter—you’re being pressured, controlled or even feel like you’re questioning yourself more than usual—it could be manipulation.

“Manipulation is an emotionally unhealthy psychological strategy used by people who are incapable of asking for what they want and need in a direct way,” says Sharie Stines, a California-based therapist who specializes in abuse and toxic relationships. “People who are trying to manipulate others are trying to control others.”

There are many different forms of manipulation, ranging from a pushy salesperson to an emotionally abusive partner—and some behaviors are easier to spot than others.

Here, experts explain the telltale signs that you could be the subject of manipulation.

You feel fear, obligation and guilt

Manipulative behavior involves three factors, according to Stines: fear, obligation and guilt. “When you are being manipulated by someone you are being psychologically coerced into doing something you probably don’t really want to do,” she says. You might feel scared to do it, obligated to do it, or guilty about not doing it.

She points to two common manipulators: “the bully” and “the victim.” A bully makes you feel fearful and might use aggression, threats and intimidation to control you, she says. The victim engenders a feeling of guilt in their target. “The victim usually acts hurt,” Stine says. But while manipulators often play the victim, the reality is that they are the ones who have caused the problem, she adds.

A person who is targeted by manipulators who play the victim often try to help the manipulator in order to stop feeling guilty, Stines says. Targets of this kind of manipulation often feel responsible for helping the victim by doing whatever they can to stop their suffering.

You’re questioning yourself

The term “gaslighting” is often used to identify manipulation that gets people to question themselves, their reality, memory or thoughts. A manipulative person might twist what you say and make it about them, hijack the conversation or make you feel like you’ve done something wrong when you’re not quite sure you have, according to Stines.

If you’re being gaslighted, you might feel a false sense of guilt or defensiveness—like you failed completely or must have done something wrong when, in reality, that’s not the case, according to Stines.

“Manipulators blame,” she says. “They don’t take responsibility.”

There are strings attached

“If a favor is not done for you just because, then it isn’t ‘for fun and for free,’” says Stines. “If there are strings attached, then manipulation is occurring.”

Stines refers to one type of manipulator as ‘Mr. Nice Guy.’ This person might be helpful and do a lot of favors for other people. “It is very confusing because you don’t realize anything negative is going on,” she says. “But, on the other hand, with every good deed, there is a string attached—an expectation.” If you don’t meet the manipulator’s expectation, you will be made out to be ungrateful, Stines says.

In fact, exploiting the norms and expectations of reciprocity is one of the most common forms of manipulation, says Jay Olson, a doctoral researcher studying manipulation at McGill University.

A salesperson, for example, might make it seem like because he or she gave you a deal, you should buy the product. In a relationship, a partner might buy you flowers then request something in return. “These tactics work because they abuse social norms,” says Olson. “It’s normal to reciprocate favors, but even when someone does one insincerely, we often still feel compelled to reciprocate and comply.”

You notice the ‘foot-in-the-door’ and ‘door-in-the-face’ techniques

Often, manipulators try one of two tactics, says Olson. The first is the foot-in-the-door technique, in which someone starts with a small and reasonable request—like, do you have the time?—which then leads into a larger request—like I need $10 for a taxi. “This is commonly used in street scams,” Olson says.

The door-in-the-face technique is the opposite—it involves someone making a big request, having it rejected, then making a smaller one, Olson explains.

Someone doing contract work, for example, may ask you for a large sum of money up front, and then after you decline, will ask for a smaller amount, he says. This works because, following the larger request, the smaller appeal seems reasonable comparatively, Olson says.

What to do if you think you’re being manipulated

How you react to manipulation depends in large part on what kind of manipulation you’re facing.

If you think you or someone you know is in a manipulative or even abusive relationship, experts suggest seeking treatment from a therapist or help from organizations like the National Domestic Violence Hotline at 1−800−799−7233. A good support group can help, too, says Stines. “People in toxic relationships need to hear counterpoints somewhere. They are conditioned to think the interactions are normal. Someone needs to help them break out of that assumption.”

For other forms of manipulation, Stines suggests trying to not allow the manipulative behavior to affect you personally. “Use the motto, ‘Observe don’t absorb,’” she notes. After all: “We aren’t responsible for anyone else’s feelings.”

Often, establishing boundaries can play an important role in keeping manipulation at bay. “People who manipulate have lousy boundaries,” Stines says. “You have your own volitional experience as a human being and you need to know where you end and the other person begins. Manipulators often have either boundaries that are too rigid or enmeshed boundaries.”

In a manipulative situation, it can also help to delay your response, according to Olson. For example, refrain from signing a contract at first glance, don’t make a large purchase without thinking it through and avoid making major relationship decisions the first time they’re brought up, he suggests. “’Sleeping on it’” is often the best solution to avoid being manipulated,” Olson adds.

These are a few things you might want to stop doing when online. Veuer’s Natasha Abellard has the story. Buzz60

Your anxiety over your privacy online can now come with a running score.

An update to Mozilla Firefox shipped last week augments the tracking protection enabled earlier in that web browser by adding a report card that tallies all of the tracking attempts blocked over your last week online.

The total in a copy of Firefox running in Windows 10 that had been used for five of the last seven days: 3,078 trackers.

Most, 2,678, came from online advertising networks and analytics firms. Another 287 came from social networks: Facebook and Twitter use embedded widgets on sites such as USA TODAY’s to profile their users, a tactic Apple began blocking in its Safari browser last year.

This copy of Firefox also caught 112 “fingerprinting” attempts, in which sites attempt to track users by collecting data points about their browsing configuration instead of dropping a “cookie” file. And Firefox blocked one case of embedded content that itself included some sort of tracking mechanism.

This update to that free, open-source browser also makes it easier to check which sorts of trackers populate any one site by breaking out those placed by social networks and those set by advertising and analytics firms. To see, click or tap the purple shield icon at the left of the address bar.

A copy of Firefox running in Windows 10 reported that USA TODAY’s home page unsuccessfully attempted to place three social-media trackers, two from Twitter and one from Facebook. It also counted 10 advertising and analytics trackers blocked.

But that second list also revealed that half of these trackers were standard-issue site-analytics tools from New Relic and Chartbeat that help site owners gauge visitor interest. Mozilla uses Google Analytics on its own site for the same purpose — and Firefox blocks that as well.

How to know who you are

How your boss is likely tracking you, spying on your devices (Photo: Storyblocks)

On a Mac, meanwhile, Firefox reported not 10 but 94 cross-site trackers at USA TODAY, including many set by such ad networks as Taboola and Google’s DoubleClick subsidiary.


Firefox’s primary competitor in the market for privacy-enhanced browsing is Safari, and with this update it sets up an interesting contrast.

Apple says it will err on the side of blocking all cross-site tracking — as determined by an algorithm each copy of Safari runs — even if that may break legitimate site functions. But Safari offers no hint of which trackers it blocks aside from the dialog it presents when interrupting social-media widgets like Facebook’s “like” and “share” buttons.

Firefox, meanwhile, relies on a list of trackers maintained by the web-privacy firm Disconnect and lets users see which ones it blocks at any site. Mozilla, a non-profit, also makes a point of saying it doesn’t want to break the ability of sites to make money from ads.

Analysts have worried that Mozilla and Apple will do just that by going too far in stopping anything that looks like surveillance, even if it’s standard site analytics. In August, Stratechery analyst Ben Thompson warned against “an absolutist approach” that would kill smaller ad firms and keep Google and Facebook atop the online ad industry.

Google Chrome

What about the browser Google ships and which a large majority of the web uses, Chrome? Back in May, Google executives said they would add vaguely-described privacy controls to the browser but didn’t offer a shipping estimate beyond a blog post saying “We will preview these new features later this year.”

As of Oct. 30, “later” has not yet arrived.

All user names are stored in /etc/passwd file and can be displayed with help of cat command or grep command/egrep command:
cat /etc/passwd
grep ‘^userNameHere’ /etc/passwd
grep ‘^tom’ /etc/passwd
Let us see all examples and usage in details.

How to show current logged in users in Linux

  • The current time ( 22:11:17 )
  • How long the Linux server has been running (18 days)
  • How many users are currently logged on Linux (2 users)
  • The system load averages for the past 1, 5, and 15 minutes (1.01, 1.04, 1.05)

The following info displayed for each current logged in user:

  • sweta – Login name
  • pts/10 – The tty name
  • minitx – The remote host/desktop/laptop name
  • 22:11 – Login time
  • 5.00s – Idle time
  • 0.04s – JCPU (it the time used by all processes attached to the tty. It does not include past background jobs, but does include currently running background jobs.)
  • 0.02s – PCPU (it is the time used by the current process, named in the “what” field.)
  • vim – The command line of their current process

Find out who you are currently logged in as on Linux

Execute the following command:
Another option is to just type the following id command:

Use the whoami and id commands to find out who you are currently logged in as on Linux based system

Linux show who is logged on

  • No ads and tracking
  • In-depth guides for developers and sysadmins at Opensourceflare✨
  • Join my Patreon to support independent content creators and start reading latest guides:
    • How to set up Redis sentinel cluster on Ubuntu or Debian Linux
    • How To Set Up SSH Keys With YubiKey as two-factor authentication (U2F/FIDO2)

Join Patreon


This page showed how to find out current logged in users in Linux and what they are doing from the terminal. For more info see man pages using the man command:
man w
man who
man whoami

? Get the latest tutorials on Linux, Open Source & DevOps via RSS feed or Weekly email newsletter.

? 1 comment so far. add one