INPUT ARTICLE: Article: A small hoop or a lightweight chain are good options. You can even create your own belly-button jewelry designs using simple materials such as straight pins, beads, wire cutters and pliers. If the earring has a hook, either snip it with wire cutters or use needle-nosed pliers to open that link or loop attached to the hook and pull it apart from the rest of the earring. Using a straight pin with a beaded head, slide small beads onto the pin in a custom pattern.  Slide the beads over the pin in whatever arrangement you like. Remember, the pin head will be the bottom of the jewelry, so the beads should be small enough they don't slide over it. Don't make the pin arrangement longer than what you'd like dangling from your navel. Using needle-nosed pliers, bend the remainder of the pin so it forms a 90-degree angle. Clip the sharp end of the pin so that only about 1 centimeter of bare wire remains. Bend the remaining wire into a small loop using needle-nosed pliers. The loop will be the top of the belly-button ring. The best adhesives to use are spirit gum, nail glue, eyelash glue or body glue. You will find it helpful to add glue to both the jewelry and your skin, then stick them together. To give the fake belly-button piercing a more realistic appearance, add a jewel about an inch above your navel. If you don't have a sticker, you can use wire cutters to snip off the post from a rhinestone earring (as long as it has a flat back) and glue the jewel to your skin. While the size of the rhinestone is based on your personal preference, choosing a jewel the same size or smaller than the pin head you chose will look most realistic. Be sure you don't move around or touch the pieces for several minutes. It's also helpful to lay down flat while the glue dries.

SUMMARY: Find a lightweight dangling earring. Remove the post from existing jewelry by snipping it with wire cutters. Create your own beaded jewelry by sliding beads onto a pin. Attach the earring to the top side of your navel. Place a rhinestone sticker above the earring. Allow the adhesive to dry.


INPUT ARTICLE: Article: Go to the login page for the account that you suspect was hacked and attempt to log in with your email address/username/phone number and password.  If your account password won't work and you didn't change your password, look for a password reset email from the account. You can usually reset your password and secure your account from such an email. Unfortunately, if you can't log into your account and your email address isn't accessible, the only thing that you can do is report the account as hacked to the company or service to which the account belongs. Irregular activity may include anything from messages or posts that you didn't create to radically different account settings. On social media, you may also find that you're following different accounts or that your bio has changed. On platforms like Facebook, a common hacking method involves a friend "sending" a link to you; if you click the link, it will be forwarded from your messenger to other friends or contacts on the platform.  If you see people responding to you even though you didn't send a message, you may have been hacked.  Avoid clicking links from anyone you don't trust, and verify the contents of links with people you do trust before opening the links. This website hosts a list of sites which have had their information stolen over recent years. Go to https://haveibeenpwned.com/PwnedWebsites and scroll through the list of websites there; if you see a website on which you have an account, look at the details of the hack.  If the hack took place well-before you created your account, you're probably fine. If the hack took place any time after you created your account, change your password for the website and any connected services (e.g., your email address) immediately. A staggeringly large number of high-profile websites such as Sony and Comcast are on the "Have I Been Pwned" list, so the chances that you have at least one potentially compromised account are high. To both avoid getting hacked in the future and minimize the damage if you do get hacked, consider doing the following:  Enable 2-factor authentication (which verifies that you're logging into your account by sending a text message to your phone) on any available platforms. Never use the same password twice (e.g., use a different password for each of your accounts).  Change your password immediately if you ever accidentally leave your account logged in on a shared computer, smartphone, or tablet.

SUMMARY:
Attempt to log into your account. Look for irregular activity on your account. Pay attention to any recent messages. Check the "Have I Been Pwned" website. Prevent future complications.