సందేశాలు   [ World ↓ ]
యూజర్పేరు:
పాస్వర్డ్:

మీ పాస్వర్డ్ను మర్చిపోయారా?
నమోదు!

  ఈవెంట్స్     ఎగతాళియైన     కథలు     ప్రేమ     వంటకాలను     రిఫ్లెక్షన్స్     సైన్స్     సంఘము     కాంటెస్  


సంఘము » సందేశాలు - పేజీ 38

arrow right Selling the Difficult: How to Sell What People Dont Understand How to Buy

I'll play a seller, using conventional selling methods, selling something difficult to understand; you be the prospective buyer. As we go through the process together, note your reactions, how your beliefs are being challenged, what 'objections' and emotions come up for you  as I try to 'sell' you. Once we're done with that component, I'll review how it would be different using Buying Facilitation; hopefully you'll be able to take that to the bank.Here we go (and please excuse me for being a bit playful and provocative. I can't pass up the opportunity!):CONVENTIONAL SELLINGAs a subscriber and reader of my newsletter, you have probably garnered some understanding of the Buying Facilitation process. You have probably read Selling with Integrity, or gone to our site, or read several of the past newsletters.So... Just out of curiosity... What's going on with your sales effort? Your sales training effort? Are you getting the numbers you want? Are you meeting your projections? If not, why are you still using that same sales program you're using? Have you thought of doing something different? What would stop you from using a new method to get better results?You must know by now, obviously, that my methodology would bring in the best results of any 'sales' training. So why aren't you calling me and purchasing a training program?Why aren't you buying hundreds of copies of Selling with Integrity to give to your sales people?Here I could offer you a pitch as to why Buying Facilitation is better than SPIN or Solution Selling or Sandler. I could tell you why and how it works better - to close more sales and make your sellers brand ambassadors, not to mention give pure value-add by making your sales people true consultants to the buyer. Yadayadayada.Hey. Maybe you're not buying because you don't believe or understand that Buying Facilitation would help your sales people be better consultants. Or bring in more revenue.Or is it because you are comfortable with what you've got in place now? Or that you don't want to go through the change process? Or that you think you are already doing the best you can do? Or that you love your current vendor? Or is it because you think that if you add something new you'd have to throw away the huge investment you've already made in sales training?Of course, I can handle the objections to all of the above!! I can tell you that if you are thinking any of the above, you've made an error in judgment - and obviously my job now is to dispel these objections and make you see the TRUTH - that my product will be better.......Got it?How did that feel? What do you know now that you didn't know before? About my product? About your needs? About your choices? About your willingness to change? About what your decision team needs to notice or consider before you do anything differently?How do you feel about being pushed into a corner? About being 'wrong' on the end of my 'right'? About feeling dumb to my being smart? About your confusion and need to defend your beliefs?By 'selling', I end up juxtaposing our belief systems and our behaviors. Even though I set this all up 'nicely', and am willing to be your 'consultant', you know darn well that my overriding desire is to sell you my training and get you to see that using my stuff would be better than what you've got.PRODUCT VS. NEED VS. DECIDINGObviously, the fact that I have a 'great product' is not good enough. As a prospective buyer you'd have to figure out:--If you are ready, willing, and able to make a change now;--If there is anything you are actually missing;--How to get your team to want to change;--Whether or not to believe that doing something different would make a difference;--What you'd want to get out of a training that's different from what you have now;--What you would be willing to put up with to get that change;--How your culture/company would handle a shift at this point in its life cycle.And even if you don't mind change or the chaos change brings, you would have to convince your team to buy in to the need to do something different - and that doing something different would include an out-of-the-box buying-support method vs. a sales method.In other words - and I know I've said this - it doesn't matter what your product is or how you sell it if the buyer doesn't know how to align the culture and buying team around a decision. And it's NOT just a decision about the problems your product solves - it's about the entire environment that holds and maintains the problem.NEED AND PROBLEMS AND DECISIONSLet's take a bit more time now and look at the system here.You've got a great product. Worked hard at creating it, testing it, piloting it. You've gotten good press and your competition can't touch you.But those prospects you've targeted - those exact people who need your product, who are suffering because they are not using your product - don't think they need you. They kindly listen to your pitches. They admit they are having problems in just the area your product handles. They even know they cannot fix the problem doing what they are doing. But they aren't buying.What's stopping them? What's making it more viable for them to keep doing what they are doing - losing money or time or market share or employee/partner good will - rather than buy your product and solve their problem?I've heard many, many sales folks say that the reason their product isn't being purchased is because buyers don't understand the product or why they need it; or they get confused between your product and others that perform almost-similar tasks and believe them to be comparable.What's going on?Sellers often think they need to educate their prospects. Call centers and financial institutions are famous for spending huge amounts of time and money in giving their reps lots of product training, believing that if they can pitch or present the features and benefits skillfully, buyers will know how to buy. Yet information does not teach someone how to make a decision (see Newsletters of 3/7/01 and 1/17/02 about the differences between information and criteria).As we saw in my initial example, people can have all the information in the world about a product and that won't teach them how to make a buying decision if they believe that they are doing as well as they can be doing given all the factors involved.What do you need to be doing to help them understand that they need to buy your product?WHAT'S THE PROBLEM?Let's take a look at how your prospect experiences his/her environment - those areas that you don't necessarily think about when you are selling your product.1. it's working the way it's always worked.People can't always tell that there is something wrong. When a software company called me recently to bring Buying Facilitation in to their call center, they claimed they wanted to become more 'customer centric.' Yet they only had an incoming call center: they were presenting a problem to their prospects by giving the prospects a one-way buying channel. It's hard to be customer centric when you are limiting the ways that buyers can connect.2. the work environment is created around maintaining the problem.The call center folks did not notice there was a problem; it had always been that way. All of the six sigma measurement tools and the sales teams and the management initiatives were based on this particular type of sales strategy.Was it customer centric? Not at all. It needed to be changed - but first the client had to recognize there was a problem.A more conventional sales approach would be to say:

Bandu2 - Herit.gif  వర్గం: సంఘము   »   3 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Aerodynamics and Hydrodynamics of the Human Body, Birds, and Boeing

The aerodynamics of the human body are very interesting indeed. This may sound somewhat funny, because human beings can't fly, however our desire to fly has enabled us to adapt and innovate to achieve the same purpose. Man has always dreamed of being able to fly like the  birds. The aerodynamics of the human body are quite serious in many sports. To confirm this, just at Lance Armstrong in a tour to France.http://www.fascatcoaching.com/f_one.htmlBicycle racing aerodynamics against the relative wind are quite serious. In most bicycle races the riders are doing in excess of 60 mph for a large part of the race and the aerodynamics of the human being are as serious as they are in it modern day automobile performance, fuel economy and directional control. Wind Tunnel testing for bicycle racing gear such as helmets, racing frames, racing attire are coming place. We know that NASA material science is also used in modern sports from everything from skies to golf clubs, Jamaican Bobsleds to swimming suits and from marathon running shoes to those bicycle components.Aerodynamics, material sciences and human geometry (biometrics, ergonomics) are as common in the Olympics as they are in Auto Racing, Dick Rutan and the X-Prize, Reno Air Races, Space Flight and in modern military equipment operation. In the Wright Brothers first aircraft the pilot laid out on the wing so he was fully part of the aerodynamics from the first flight.Now we have parachutes, parasailing, ultra-lights, Gyro-Copters, Jet packs, etc, where the aerodynamics of the human being is a huge factor. Having had the chance to race competitively street motorcycles in my day, I can tell you it is a huge component to performance. The human body is what it is, the bike is already quite aerodynamically designed, how the body is placed when you accelerate the motorcycle to 185 plus mph makes a huge difference. Whether you are shooting a man out of a cannon or jumping off the pier into the Annual Human Powered Flight Contest into the Hudson Bay, this is no joking matter, aerodynamics of the human body is just as important in racing, sport as it is for the birds in the sky or the fish which fly.The aerodynamics and fluid dynamics of many species especially species of prey will ultimately decide their survival, if they fail to have the adequate speed, then they will not be able to eat. If a species, which is hunted cannot dodge or move fast enough then it will have no other option than to massively reproduce to avoid extinction or maintain tight formations, swarms, herds or social order to use the safety in numbers principle. The fastest bird, the peregrine falcon was clocked at 217 mph in Germany while in a dive. Most Falcon's can catch their prey in midair are at speed of around 100 mph, although usually much less. No wonder the Military named the F-16 the Falcon?The spine-tailed swift has a maximum speed a high of 106 mph in level flight. Thus the Falcon might have a tough time extending it's wings at that speed for the proper speed to catch it, thus it can live near Falcons without being eaten and the Falcon will then go after lesser prey with better odds of eating. If you look at the F-14 it has the ability to bring it's wings out for slow flight and keep them swept for accelerated and sustained cruising speed, very similar to the bird. The first moveable winged jet aircraft was the well-known X-5, which variable in-flight wing configurations as did the F-111, B-1 and several others. Many aircraft have been designed to change various other configurations for many reasons, the F-8 Crusader changed it's angle of attack and the SST and Concorde change it's nose on take offs.Most modern fighters have speed brakes to slow them down. All techniques stolen from nature, as birds adjust their heads in flight for visibility, adjust their angle of attack when approaching relative wind for faster climb, adjust wings for diving and stick out their feet to slow down. Well, yes these techniques were stolen from nature alright, that is pretty much the case, yet we have obviously improved on natures designs in this dimension. After all we are now building aircraft capable of Mach 5 and others, which can carry many hundreds of tons in payloads. In skydiving you learn quickly how to maneuver your body to achieve your intended path. A bird would do much the same only be 100 times better at it since it practices all day long everyday.Most ordinance, which is delivered, such as bombs need to be dropped well under the speed of sound so that they do not in fact create their own new trajectory as they fly away from where they are pointed and need to be delivered. Having been employed washing cars in my day, I can tell you we may in fact have stolen that idea too. Aircraft like birds do lots of adjusting and playing around with configurations to allow them to take advantage of various situations as needed, thus aerodynamically speaking man has copied the observations he has witnessed from birds since his first flight. How about another example, the Bald Eagle, the United States of America's official mascot? Well it has a souring level flight speed of around 50 mph, which is quite fast in bird terms. While souring The adult Eagle's wing span is between 6 and 7 feet.Largest discovered was 7.9 feet, but the wings folded back can allow the eagle to dive at very fast speeds of around 75 mph as it would be most difficult to attain significant speed with such large wings extended. Different configurations and methodologies can also be applied to human body aerodynamics with a little bit of modification. All the while having an incredible accuracy in it's vision, which would make military intelligence proud indeed as the F-15 Eagle relies enhanced equipment and the human component, which is 3-4 times less adapted than the eagle's eyes, yet with the newest technology we again have adapted to better nature. If we look at the aerodynamics of nature and the process of evolution we see the most adapted species in the air as the Eagle and Falcon, which are truly marvels of 100's of millions of years, we begin and appreciate our ominous task of re-engineering. As we look to build aircraft, MAVs, UAVs to serve mankind's needs we should make a note of this. As we develop smaller technologies and demand versatility we will definitely be looking at the best nature has to offer in the way of suggestions.http://worldthinktank.net/wttbbs/index.php?showforum=23A human parachutist in a dive has been clocked also 217 mile per hour, the maximum speed for the Falcon. We might ask ourselves, is the organic aerodynamic speed limit for evolution on this planet 217 mph? This presently includes our knowledge of the flight speeds of our most adapted species on the planet presently. Is this figure correct for previous periods? What was the speed of the Pterodactyl? Was the air thinner or thicker under 10,000 ft. back then? Would it have needed to go faster? Maybe, but if so from what? Once you are the fastest and have no higher food chain component to go after, why would you evolve into a higher performing animal? Well if you played, had contests and displays of agility for procreation, pecking order, competed for territorial rights with your fellow species, then you might evolve to be better and have greater performance, developed higher cognition, hunting skills, defense skills and evolved to fly faster too. This would be inline with current animal and human behavior in our current period and the writings of the past 10,000 plus years of written recorded history and observational study of species on earth.We know from the study of aerodynamic, hydrodynamics and racing that there are also issues with ROI or issues with diminishing returns. For instance if a Pterodactyl were to fly faster, it would need to develop more muscle, lose weight, spend more time developing flight skills.http://numbat.murdoch.edu.au/Anatomy/avian/avian2.htmlHowever this takes time away from hunting. It would cause issues with its ability to fight off other pterodactyls and would mean more food intake was needed. So a happy medium would eventually be reached for continuation of the species, social order, etc. So then, is that compromise or happy medium 217 mph? A man falling in freefall from an aircraft fully tucked and using the BMPs for rapid decent max'ed out at 217 mph, like the Falcon. It is highly interesting that these organic matter speeds that the highly evolved Falcon is so similar to the diving speed of a human being. We can learn a lot about how the human body interacts with the elements and the study of aerodynamics has lots to still learn from nature.

Bandu2 - Herit.gif  వర్గం: సంఘము   »   3 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right MAVs, UAVs, and Insect Flight Characteristics

MAVs and UAVs and Insect Flight Characteristics seem to have a lot in common. Millions of years of evolution in nature seem to have been one of the greatest engineering schools around. So now the schools are looking to nature. However as we study nature, nature is not good  enough. The world is not good enough that is why all species are continually either modifying to fill their niches or they perish. Designing machines after nature because it looks cool maybe fine. But a Mosquitoes job is to suck blood and reproduce and fly around to it's meal and egg laying.If we design MAVs for other purposes which nature had not thought of such as flying into something and blowing up (single mission MAVs) then obviously a miniature flying missile would be better using a rather fast inexpensive engine? A controllable bullet, and slowing the bullet down to maneuvering speed is a good idea. Slowing it down for surveillance if appropriate may require getting a few tips from nature, such as a bee or humming bird, which hovers a flower checking out which is best. And in that regard the flight characteristics are good advice. But looking at the thorax and the rest of the insect might be questionable since the little insect has other needs and is a compromise itself for it's niche or mission in life or survivability against it's food chain hierarchy; a bat, a bird, a frog, gecko, another insect or whatever.Larger UAV would take advantage of somewhat different designs. In both RC size and aircraft size there are other thoughts; extended missions and fears of irretrievability. We may wish to look at the Owl, Seagull, Eagle, Raven, Falcon, Condor or the Pterodactyl. For a slightly larger version such as a 2/3 scale aircraft or flying bomb or ICBM well they have designed these for years, in WWII under the names V-1 and V-2 and there were some you may not have heard about in years after under the names SCUD, ICBM, Lance Missile Systems. Today we have flying bombs smart as they come and Tomahawk cruise missiles all based on these old ideas. Now we wish to slow them down hunt, take pictures without being heard or seen. Silent and some deadly which is not all that different from a scout in an insect group or swarm or flock of birds or the mimic theories of today's top universities trying to copy nature.But those who study evolution ought to understand the other theories, which involve cataclysmic evolution (natural disasters), luck of the draw, survival of the fittest, superior reproductive systems, etc. There are many species that will not be on the planet in half a million years, not to mention the number of identified endangered species, many of which are not suited for life on the planet and others we have prematurely caused to decrease in numbers which make it nearly impossible to go on. We are one of them and even if we are or some similar form of what we are, you can bet we will look significantly different. Perhaps even in the next few hundred years we will have modified ourselves to be more energy efficient and adapted for this and other planets or travel.With that said we maybe copying some huge mistakes if we copy nature. Now then if you are to copy a Salmon fish or a small rodent, an ant or a bee, a cockroach or a Mosquito, then 400 million years of evolution might be a good bet. The human race being a branch of such tree shrew, primate, modern human, may not be best suited in large populations for survivability long term in the present form living on the hostile surface of this planet within linear time. So mimicking a human being for a robot would not be smart. Something else might work much better. The backbone of a human has a tailbone, we have an appendix, our feet are not correct for our frame (thank god for New Balance), all types of things that are unnecessary and problematic and have not yet evolved out of the genome. So when copying it or using it as a basis for a model is incorrect thinking, since the human being is far from perfect. Now then how can we be sure a Mosquito is the proper model to work from? What about the disease vectors within these insects? Flying bugs robots are great but be careful what you emulate.Even birds are cool for design, but that flapping wing thing? Well there is one brilliant guy out there who seems to have been studying this stuff for a decade and seems to have it figured out at Cal Tech and even this team is wondering and trying many types of materials, so what type of materials do you use? Well check out what they decided and forget the MAV idea, because at less than 20 cm, and looking like a big bug from Central America, It is called an MFI- Micro-Mechanical Flying Insect? Whatever, still its sting is worse than any living thing?http://robotics.eecs.berkeley.edu/~ronf/mfi.htmlOh well now the enemy will have to spend millions to make a better mousetrap or fly swatter? Well too late there is already a patent on it. Simply give your house robot one of these? Sure why not? Perhaps this can be used on larger UAVs or perhaps as an anti-aircraft to bring down international Terrorist pests.What can power these small bugs? The slightly larger MAVs designed for NASA have it figured out. MAV Fuel;http://nssdc.gsfc.nasa.gov/planetary/mars/marssurf.htmlSprinkling smart dust in bird feed to simulate a UAV attack on radar. But what do you feed a MFI? Remember it stands for Micro-mechanical Flying Insect. Its payload is a consideration too and with the flight of insects and unpredictability of such flight, how good is it at carrying a camera? Surely it can be used for many other things of importance besides taking pictures. But stable flight is of value for maneuvering in tight spots.The question I propose is can man better nature? Surely we can, we do every day. We modify rivers, places to live, things we eat. We bread horses and dogs to get the best ones. We have bread people as slaves, sick idea really. But soon people will be modifying for intelligence, athletics, dexterity, resistance to diseases and personal appearance. Women get augmentation and enhancements. Men take Viagra. Everything we come in contact with we modify. Soon we will control our weather, our longevity and interface with computers and plug in chips and communication devices into our skin. We will be able to better nature. We will be able to make nature better and makes systems work better. Why not modify the MAVs to serve man, not the MAV? Why not better the best. We know the weaknesses of bugs after all we kill them with pesticides. We know our own weaknesses such as fear that we use to control other human beings. We use our weaknesses to manipulate our fellow species. We do it in sports, business, leadership, education, parenting and even war (psy-ops).We should not copy weakness when looking into the behaviors of animals and insects when designing the next greatest innovations. Nature has made mistakes, this is not a perfect world, it is not good enough in so many regards. Those things we can fix, which do not adversely hurt some other important aspect of the important flows, cycles or systems, then by all means do it. I believe that these students studying nature, except for a few, are really wasting time and are not serious about their efforts. This is serious business. The few in the industry and I have named a few here are rare, less than 3%. The others are having fun in robotic engineering and can cause serious problems in the future if they do not submit to the rigorous commitment it tasks to lead us into the future.These issues of studying nature to better aerodynamics, fluid dynamics, tactics, materials, etc. are serious to many fields such as Biometrics, NanoTech, Biotech, Communication, Network Sensors, Propulsion, Fuels, etc. etc. We can design something better than before and better than nature, with new flight characteristics and move beyond the present period or anything that nature has yet to show us. Some may not be able to see where we are going in the future, but after studying all the latest technologies it is rather obvious. The human race is going to the next step. It is happening now, this maybe the era that future generations of which we may still be involved with due to longevity or human brain computer interface downloads in a big way will look back on and say wow, they really did it. Similar to the last 100 years going from the first cars to men on the moon, through two world wars and then the invention of the computer and all it's incredible uses.These new fields of science will bleed into each other, so every single building block is becoming more and more serious. These things will affect National Security in a big way. Our colleges and universities need to work harder to bring these things to market, to the military and catapult us into the future. We need more diehards in these fields who are serious and make it a religion so to speak. We need more funding to the top researchers and better work out of the other. If we have to borrow technology from the future, from the past, from nature, fine do it, but only if it makes sense and only if it works and fits into the needs of mankind. Yes this technology has so many uses. So many of the technologies we are working on do.The DNA work, and mapping and reading, next the proteins, RNA. This is the answer to health care, understanding how we work, why it works and how we can beat Cancer, AIDS, Alzheimer's, Heart Disease, MS, you name it. Hypersonic Flight, Energy research and Hydrogen Cell technologies, Super computers and programming, Weather Control, Automobile and Transportation safety, Computer-Human Interfaces, Modified Crops, National Security technologies. Look here is the deal every company knows that future profits will come from today's R and D. During the second World War we were forced to produce, create other wise we end up speaking German. We created so many great technologies and after the war received all the benefits from the other side too. When we decide we are going to do something we do it, when we have to we rise to the occasion. This is something that Americans are good at.Against all odds, against any adversity, we are performers. We must right now, decide that we are moving forward and give it our best, not half way. Not good enough for government work. All the way and since we already went to the moon last time we decided we were going to do something, I guess we had better shoot a little further this time. Forget all the reasons it cannot be done, all the excuses, all the nay sayers, let's just do it? Go buy some Nike Shoes tomorrow. Think a world with no limits. Let's blast through this dimension, through time lets think small as small as we can and let's think big and far as we can. We are living in a great period and we must make it count.

Bandu2 - Herit.gif  వర్గం: సంఘము   »   3 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Preventing Death in a Bio Threat

In the event of Bio threat how to mobilize Hospitals in case of biological emergencies should close except for broken bones and accidents. Instead those who believe they have contracted a biological terrorist induced pathogen, virus or disease should be required to stay at  home.Then mobile vans with specially trained technicians would come to them in a grid defense program. Also involved would be a grid defense mutual assistance fill in the gap program. After the people have been inoculated with the anti virus drugs, later in the week the Car Wash Guys, this just happens to be my company, but there are 21,000 independent mobile pressure washer companies in the US currently. They would be scheduled to perform a decon-foam spray down of the house, cars, yard and other contaminated objects (decon-foam to be stored at fire stations and virus serums would be stored at a military base with a couple of C-130s, and 747s available to deliver it by air to the nearest airport of the outbreak) (inoculations also would be stored in Guam, Hawaii and Alaska all at military bases with Air Guard units ready to deploy with a quick manual of protocol). Each time there was any type of breakout we would have instantaneous response. People could watch TV to see what to do. Wow, the media could actually help things for a change rather than creating hysteria.With the call centers from AT&T, Fed Ex, and other large companies assisting with call centers that are provided they are still in business, since the call centers have mostly been outsourced to India. Then people would not storm hospitals and infect the entire staff there who are only there to help them and others who work in and around the hospitals and other people there for simple things.The Grid Defense Plan would be similar to the grid response plan for home delivery services or Pizza Delivery. By combining absolute offense to our national security efforts in attacking all possible targets in hostile countries, which contain arsenals of Biological weapons and this defense plan we can curb any threat to our human race from extinction or elimination of entire states populations from a terrorist or state sanctioned biological attack. It is imperative that we realize the threat of attack is real and we can head it off now. After reviewing the plans of states and cities, I was under whelmed by the possible efforts they could contribute. Most have failed miserably, such as Seattle, Denver and SF. So first we gear-up for the worst and second and simultaneously get the bad guys offensively.In this scenario small attacks no problem, large ones a little more serious. School children should be taught what to do in case of a problem and parents should be alerted in newspapers and TV. It will work, and that solves that. Be ready and able to adapt quickly. No sense in spreading anthrax, ebola, or other virus laced into small pox for rapid spreading through normal human interaction. To keep it from becoming a national epidemic we simply stop the situation in it's tracks. Any ideas? Email me if you believe they should remain secret and post them hear if they are simple ideas. Either way if the enemy knows we are quick to respond and defeat such an act, it would not makes sense for them to make such event to serve their will, because it would be stopped quickly and strengthen our resolve and our confidence

Bandu2 - Herit.gif  వర్గం: సంఘము   »   3 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Older C-130 Hercules Aircraft Problematic

We have certainly seen around the world many Lockheed C-130 Aircraft, which have had problems over the last five years. Many of these aircraft have in excess of 100,000 total time airframe hours on them. The British lost on in Iraq, one crashed in Germany. Several have been  lost fighting fires. The USMC lost one and the USAF lost one. Many of the older A, B and C models have been committed to moth balls, but many are still being flown as we need them, they are superb work horses and capable of unbelievable feats. The newest versions of the C-130 are hardly the same aircraft with many new features, engines, airframe enhancements fan blade style props and a completely redesigned wing; thanks to NASA and Lockheed research and development. Luckily my brother is a USMC pilot in command on a C-130 and he is able to fly the newer versions.It is the older aircraft that are the problem. After reviewing the NTSB data on Fire Aircraft, I am concerned as many with the older aircraft fighting fires with these birds and the brave men who love to fly them for actually very little money. Here is some interesting information on this matter, which tells about plane crashes. If you will remember the Forestry C-130 plane crashes, those were older C-130s and they had been modified. Here is the C-130 NTSB report:http://www.ntsb.gov/ntsb/brief.asp?ev_id=2...621X00954&key=1Here is the information about the C-130 that went down.http://www.ruudleeuw.com/tanker130.htmIt happened once before in 1994http://www.ntsb.gov/ntsb/brief2.asp?ev_id=...X94FA323&akey=1and the NTSB knows there can be a problem this aircraft had over 20,000 flight hours total time on it and Borate which use to be used before phoschek and now the newest firefighting chemicals are very corrosive. In 2000 it happened again in France.http://www.ntsb.gov/ntsb/brief.asp?ev_id=2...212X21996&key=1In 1984 there was another similar crash;http://www.ntsb.gov/ntsb/brief.asp?ev_id=2...214X41356&key=1Then again in 1985.http://www.ntsb.gov/ntsb/brief.asp?ev_id=2...214X37289&key=1 .I felt this was of concern and visited the GreyBull, WY Airport personally;http://www.carwashguys.com/072302_5.shtmlThese older C-130s and the older fire fighting aircraft have super high time airframe hours on them and recently it was discovered that the wing spar boxes on these aircraft with high time airframe hours were the weak component bringing them down. The British C-130 was claimed to have been insurgents although no one knows for sure. The issue now is when can we retire all these older C-130s and replace them with the newer redesigned versions with all the state of the art components developed by NASA and Lockheed? The answer is probably not this year or the next as we are cutting back expenditures in military budgets presently. How do you feel about our aging fleet of older C-130s and their great service to our Nation? Isn't it time to say thanks and retire them, they have done their duty, they'll get their check, it is the new generations turn to start paying into the system. Think about it.

Bandu2 - Herit.gif  వర్గం: సంఘము   »   3 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Acoustic Transducers To Detect And Eliminate Incoming Mortar Rounds

There maybe a way to use acoustic transducers to pin-point incoming enemy ordinance such as mortar rounds in order to shoot them down. Directional sound waves from acoustic transducers set at specific locations around friendly locations can create artificial barriers, which  the incoming ordinance will have to pass to reach its target and thus be detected and triangulated or quadrangulated for interception.A set of five units would be set up around the base camp is a specific arrangement and exact dimensions point upward into the sky. As the incoming mortar round crossed the sound wave it would be detected and set off an Event Code. As the mortar round again traveled forward it would hit yet another and another air-wall and a trajectory would be formed and mathematically computed. At this point the computer would decipher this information and send up a kill projectile to hit the round in mid-air.The incoming mortar or enemy round would thus be eliminated in a similar fashion by directing the kill projectile to its continued and future trajectory. With a series of mirrors and five acoustic transducers creating the sound wave barriers this should be possible to protect our troops. Although I have not done all the math required to prove this will work; I believe it will. If you have knowledge in this realm; think about and let me know what you come up with.

Bandu2 - Herit.gif  వర్గం: సంఘము   »   3 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Droughts and Salt Water Canals Random Thoughts

We need solutions to our drought crisis in this country. There are simple but expensive solutions; for instance; Desalination, salt water rivers and conservation strategies. Now before you accusing me of hyping any of the newest technologies or try to tell me it costs too  much, let me explain something about the Earth's water supply. Only 3% of the Earth's Water is fresh. This includes the water and moisture in the clouds, underground reservoirs, rivers, lakes, streams and pipelines. So if we keep increasing the population of mammals we will need to have a larger supply of fresh water. The oceans are full and the atmosphere converts this to fresh water and then it rains and we collect it. So far we end up flooding areas when we make it rain or we fail. We use up all the fresh water in the waterways, which pass through our cities and we waste the rest on things that are not important unless you love what Tiger Woods does. People say it will cost too much to take water from the ocean where 70 percent of our population lives and turn it into fresh water to serve that population's growing needs. Well I say it does not cost that much at all. Water generally and it depends where you live in the US, costs about $ 1.60-2.10 per 743 gallons, (a unit of water) do not ask me about our system of measurement I am still trying to figure out how much a fathom, knot, bushel or pint is. Apparently the scientists have not figured out the difference between a yard and a meter either judging by the crash of the last Mars Probe a few years back, even though I do not believe it actually crashed.So let us say that water tripled in price? Is that a big deal really? No, because we already use twice the water we need average household uses 20-40 units of water and if they were more conservative with the water they would use only 10-20 units thus instead. Thus their bill would be in half and if you doubled that well there you are again; no big deal really. And now you have unlimited supply and people up river do not have to supply people who choose to live in dry arid places where water is piped or canal it in from far away. Los Angeles area for instance sits on the water yet takes water from the Bay Delta, Mono Lake and Colorado River, when PHX and Las Vegas both need the water. On the East coast same thing you have the megalopolis from Boston to D.C. that needs incredible amounts of water yet nearly every major city including NYC sits within miles of the ocean. Come on people Duh? Critics say it costs too much to build, it will never pay itself back and it will kill areas of wetland, which host at least four hundred species of rare mosquitoes. (Yah the kind that carry West Nile virus with big stingers). Desalination is the answer it always has been and we can build water canals to deliver this water to almost every Major Southern US City, problem solved. We can also use this to balance out the planet in places where gravity is uneven due to our taking oil or water out of the ground, open spaces under the surface. This will also cause the Earth to spin more evenly chill out the weather patterns, slow global warming and solve hundreds of other issues. You say I am crazy, oh yah check this out;http://static.howstuffworks.com/pdf/express-v1n1.pdfand this is a known fact lets see if you score a 100% on this quiz smarty pants;http://intergate.sdmesa.sdccd.cc.ca.us/staff/sievers_j/fall%2097%20exams.htmhttp://caliban.physics.utoronto.ca/neufeld/myposts.txtand perhaps pick up a copy of Feburary edition of Scientific American.http://static.howstuffworks.com/pdf/express-v1n1.pdfNow we can figure out where to put these surface canals and reservoirs and straighten out the wheel like weights when you balance your tires and we get for that effort less intense weather, like Earthquakes, Tsunamis, Hurricanes, typhoons, Tornados, etc.http://www.geo.hunter.cuny.edu/~afrei/pg130_fall01_14_climatechange.htm andhttp://www.uwgb.edu/dutchs/pseudosc/flipaxis.htm andhttp://freespace.virgin.net/benkins.uk/Chap1.htm .What we are talking about is taking a need for water for humans and balancing out the gravity of the planet simultaneously. So lets just say we will never perfectly balance out the planet. So what if we can add salt water canals in areas, which will be closer to a balanced spinning of Earth, we have accomplished two objectives and we will gain much from this. For instance if Mono Lake were filled up with water would that extra weight be in a good spot? If yes do it; if no do not; if you do, use that as the reservoir to make your fresh water with. If you look closely at the topography of the US you will see many places were building a saltwater canal is very simple and really costs less than building a highway.http://www.srpnet.com/community/heritage/srphistory.asp andhttp://www.srpnet.com/water/newsletters/pdf/irrigreswinter01.pdfand as you can see from this PHX project the fees are not overly costly to do this as one would predict, also check out the plant being built in Tampa Bay, FL;http://www.water-technology.net/projects/tampa/http://www.water-technology.net/projects/tampa/specs.htmlhttp://www.tampaelectric.com/TENWCommNewsDesal.htmland the fees are not going to be that bad, our technology is so much better than it was before. And whereas you may turn on your TV set and see the latest floods around the world rest assured that this is a global issues now, and we will have over 60,000,000,000 people on this planet by 2045. And you know what that is really not that far away, isn't that the year the ponzi scheme called Social Security will implode? It is not really that far from now and certainly not long in the history of our species.If we want to continue on this path, we must pay attention to the needs of human life. The children born today, yes today in August of 2005 will have a life expectancy of 120 years, they will live until 2125, much longer than 2045, for 2045 is right around the corner. And this is without all the latest drugs, artificial limbs and components grown from stem cells such as hearts, kidneys, liver, bone marrow, brain tissue and lungs. All this is in the works my friend and no fundamentalist religious endeavors are going to stop the pursuit to find the cure for cancer, Alzheimer's or heart disease either. So you may plan on being around for a while and watching your grandkids become grandparents. And see all the people you helped make that have infested the planet. Now without condemning you for creating all these people, you need to think about what you are doing here. If we all decide to follow our destiny and that of our ancestors to procreate, we must be wise enough to figure out a way to feed them all, house them and look after them, and one thing above all they will need is water.The air should clean itself as we develop different ways of transportation through free enterprise and innovations such as fuel cell technologies and alternate energies. So let's concentrate on solving these drought issues by coming to a long term understanding of the real problems and then work towards those technologies which serve the entrepreneur and free market best short term, and simultaneously solve a greater need to serve the future of mankind, because it does appear that we are all congregating in the same locations and over taxing such fundamental needs as water supply.We need to control the weather and the best way to do that is to balance the planet and eliminate the variables in our weather first. The wobbling can stop, we can have drink, control the weather, have jobs, and off springs, as it appears to be one of the strongest innate needs of man and live long and fulfilling lives without risk of starvation by millions, agricultural disaster in entire continents and unpredictable weather. How serious is all this. Well there is ample time, but crisis management predicts that the best time to solve a problem is clearly before it happens. Building salt water canals is really easy, really simple and we could have them all completed in less than four or five years, plenty of time to curb any major calamity.http://www.nrdc.org/water/conservation/cabay/fcabay.asphttp://www.nws.noaa.gov/om/hod/SHManual/SHMan026_OtrAgc.htmhttp://www.ciesin.org/docs/006-238/006-238.htmlhttp://www.ciesin.org/docs/006-238/006-238.htmlhttp://md.usgs.gov/publications/wsp-2375/md-dc/Tell me when you had enough evidence of what I am saying. Stop reading only the newspapers and realize the droughts today are going to be worse in the future as we add more people, more golf courses, more lawns, more houses along the same over taxed, over worked and under supplied rivers of an Earth whose temperatures still rising even after the height of the last three years ago high of the solar maximum and yet the cool temperatures have never recovered.The planet did not cool back down yet, and even if it did, there is not enough of the current water in many parts of the country to accept more people. So if you are waiting for the down side of a short-term cycle of a heated planet it ain't happening anytime soon. Face it as it is we do not have enough water to continue this rate of population growth. Maybe in the wettest of years it can handle a few more, but not without some serious consideration to conservation, some continued excellent planning by developers, who by the way should be congratulated on their incredible success in sustainable housing and positive sharing of resources in energy conservation and use of materials.We must look at all levels of this situation. The time is coming when every year will be a drought year, simply due to predictable usage and reasonable assumptions in supply and demand. We need a solution, we need to work together and we better plan for tomorrow, because it was yesterday recently and we knew we would be here today. What say you?

Bandu2 - Herit.gif  వర్గం: సంఘము   »   3 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right The Fertilization Process and Implications of Test Tube Babies

Through the wonders of science, infertile couples who were previously unable to bear children, due to reasons such as blocked fallopian tubes, low sperm count, low egg quantities or advanced age of the mother, are now able to conceive through in-vitro fertilization. The  results are babies known as test-tube babies which are technically conceived outside the womb.In a natural scenario, the conception of a baby occurs when the ovum, travels from the ovaries, through the fallopian tube to be fertilized by the sperm of the father during sexual intercourse. From this point on, the fertilized egg will travel down towards the uterus and during the process division of cells will occur until it reaches its final destination at the wall of the uterus. However, in the cases of block fallopian tubes, the eggs are unable to travel from the ovaries to the uterus and conception cannot happen.Developed in the United Kingdom by Dr. Patrick Steptoe and Dr. Robert Edwards, the process of in-vitro fertilization involves removing eggs from the ovaries of the mother and combining them with the sperm of the father in a lab environment. The fertilized egg is then placed back into the uterus of the mother after 3 to 5 days and will remain there to grow till birth. Because of the low success pregnancy rate of this procedure, a few eggs are placed in the uterus to increase the odds of success. With this process, statistics have shown that the rates of multiple births have increased where 24 percent of the in-vitro fertilization births have produced twins.The first test-tube baby, Louise Brown, who was born on the 25th July 1978, marked hope for other infertile couples to have a baby through this procedure. However, many others were concerned about the ethical issues surround this. One major area of concern was the fact that as the egg is located outside the womb for a few days while the cells multiplied before being put back inside the uterus, the health issues affecting this baby is unknown. Indeed, research has been shown that test-tube babies have a higher chance of birth defects and low birth weight, and researchers still have not been able to determine the reason for this.Other issue of concern is that through this procedure, some of the eggs fertilized in the lab are later discarded. Does this procedure mean that the researchers are actually killing potential people? How is the line drawn in this case?Then there is also the issue of commercial opportunities for eggs and sperms to be bought and surrogate wombs to be rented with the purpose of creating babies. This process of embryo transfer to another mother, not necessarily the same woman who had provided the eggs, is known as placing the embryo in a gestational carrier. This procedure has been becoming increasingly common through technological advancement, which has made couples including women with uterus problems, have a chance in having their baby.Test-tube babies have really brought changes to the way in which babies are conceived and have given much hope to many who have had problems having babies through the process of . However, the downside of this are the ethical issues behind the procedure, with which still poses a big question mark and with which is still opposed by many factions.For more details on cell biology, please visit http://www.biology-online.org/tutorials/1_cell_biology.htm/Author's bioDr. Richard Waller has been helping thousands of infetile couples and gave hope to childless women since 1999 through the process of in-vitro fertilization. He is based in England.

Bandu2 - Herit.gif  వర్గం: సంఘము   »   3 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Is Your Brain Really Necessary?

The reason for the apparently absurd question in the title is the remarkable research conducted at the University of Sheffield by neurology professor the late Dr. John Lorber.When Sheffield's campus doctor was treating one of the mathematics students for a minor ailment, he  noticed that the student's head was a little larger than normal. The doctor referred the student to professor Lorber for further examination.The student in question was academically bright, had a reported IQ of 126 and was expected to graduate. When he was examined by CAT-scan, however, Lorber discovered that he had virtually no brain at all.Instead of two hemispheres filling the cranial cavity, some 4.5 centimetres deep, the student had less than 1 millimetre of cerebral tissue covering the top of his spinal column. The student was suffering from hydrocephalus, the condition in which the cerebrospinal fluid, instead of circulating around the brain and entering the bloodstream, becomes dammed up inside.Normally, the condition is fatal in the first months of childhood. Even where an individual survives he or she is usually seriously handicapped. Somehow, though, the Sheffield student had lived a perfectly normal life and went on to gain an honours degree in mathematics.Professor Lorber (who was a member of the committee sitting to decide who should be awarded the Nobel Prize) identified several hundred people who have very small cerebral hemispheres but who appear to be normal intelligent individuals. Some of them he describes as having 'no detectable brain', yet they have scored up to 120 on IQ tests.No-one knows how people with 'no detectable brain' are able to function at all, let alone to graduate in mathematics, but there are a couple theories. One idea is that there is such a high level of redundancy of function in the normal brain that what little remains is able to learn to deputise for the missing hemispheres.Another, similar, suggestion is the old idea that we only use a small percentage of our brains anyway - perhaps as little as 10 per cent. The trouble with these ideas is that more recent research seems to contradict them. The functions of the brain have been mapped comprehensively and although there is some redundancy there is also a high degree of specialisation - the motor area and the visual cortex being highly specific for instance. Similarly, the idea that we 'only use 10 per cent of our brain' is a misunderstanding dating from research in the 1930s in which the functions of large areas of the cortex could not be determined and were dubbed 'silent', when in fact they are linked with important functions like speech and abstract thinking.The other interesting thing about Lorber's findings is that they remind us of the mystery of memory. At first it was thought that memory would have some physical substrate in the brain, like the memory chips in a PC. But extensive investigation of the brain has turned up the surprising fact that memory is not located in any one area or in a specific substrate. As one eminent neurologist put it, 'memory is everywhere in the brain and nowhere.' But if the brain is not a mechanism for classifying and storing experiences and analysing them to enable us to live our lives then what on earth is the brain for? And where is the seat of human intelligence? Where is the mind?Lorber's discovery is far from isolated. In researching my book 'Alternative Science' I found literally scores of such cases of scientific discoveries that are well-attested with strong direct laboratory evidence, and yet are ignored by conventional science. Many more such examples are also given on the Alternative Science Website.Copyright Richard Milton 1994-2005Richard Milton is a writer, journalist and broadcaster and author of five books including the controversial 'Alternative Science'. His Alternative Science website at http://www.alternativescience.com contains many extraordinary examples of hard scientific evidence for anomalous phenomena being ignored.

Bandu2 - Herit.gif  వర్గం: సంఘము   »   3 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's time to start a new work week. A shower, some coffee, and you're in the car and off. On the way to work you're thinking of all you need to accomplished this week. Then, on top of that there's the recent merger  between your company and a competitor. One of your associates told you, you better be on your toes because rumors of layoffs are floating around.You arrive at the office and stop by the restroom to make sure you look your best. You straighten your tie, and turn to head to your cube when you notice, sitting on the back of the sink, is a CD-ROM. Someone must have left this behind by accident. You pick it up and notice there is a label on it. The label reads

Bandu2 - Herit.gif  వర్గం: సంఘము   »   3 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is  actually from an identity thief. These crooks are hoping people that have an account with the business will click on the link and submit their account information for verification purposes. These thieves are phishing for account information. Phishing is a sophisticated way to lure you to phony websites where you voluntarily surrender your passwords and account information to identity thieves without realizing it.These types of emails often threaten you. You must take action within a limited time or the consequences will be dire. Some AOL customers received a phishing email stating if they did not verify their account information within 24 hours, their service would be terminated. Other phishing emails will state your account has been flagged or has a problem and the account information needs to be verified. We received an email for Pay Pal that stated our account had been flagged and we needed to verify our account information. The identity thieve was lucky. We do have an account with Pay Pal. We open the email and it appeared to be an email from Pay Pal. We click on the link and it took us to https://www.paypal.ae.com. The site looked Pay Pal's website. The web page was asking for our account information for verification purposes. We knew right away it was a phony because our Pay Pal account was opened with another email address. This particular site has been shut down, but doesn't mean the identity thieve was caught. You could receive a phishing email from the same thieve tomorrow. What can you do to avoid such a trap?First, realize reputable companies will never send you an email asking you to confirm your account information. The email will look authentic and this may cause you some concern. If this is the case, you can always call the company and ask about your account. An alternative to calling is checking your account online. Do not click on the link in the email. Log completely out of your email and open another window and type in the company's web address to verify your account.You're probably thinking why would you want go to the trouble to close your email and open another browser window. The link in the email is a cloaked redirection link that will take you to another website that is not associated with the company. A cloak link will show you the correct web address when you move your mouse over it. If you do click on that link, the web address, or URL, will be similar to the company's address, but it will not match exactly. The website will look just like just like you expect it too look. The web page will ask for your account information. You're just one click away from submitting your account information to the identity thieve. We went to the actual Pay Pal website and, sure enough, our account was ok.Identity thieve have been known to attach a file to a phishing email. The attachment contain a program to transmit your personal information on your hard drive to the identity thieve. You will never know the program has been installed on your computer. Never open an email attachment unless you specifically requested it and are expecting an email with an attachment. The phishing email may be from someone you know. His or her computer could be infected with a virus that sends email to everyone in his or her address book. Delete the emails with attachments without opening the email.Finally, if you get an email that is phishing for your information, forward it to spam@uce.gov. If you know how open the email headers, cut and past that information into the email to help the FCC track down these identity thieves.George Burks of http://www.mybiweeklymortgagepayment.com has offered a biweekly mortgage payment plan with no enrollment fees since 1999. His interest in financial topics is varied and includes identity protection. Please visit our financial library.

Bandu2 - Herit.gif  వర్గం: సంఘము   »   3 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right What Can Be Done About Spyware And Adware

Having a good Spyware eliminator on your computer is vital now a days with all of the different Spyware, Adware, and other malicious computer parasites that are out there. Most of them are reasonably priced and very easy to use.Two of the biggest things that these  Anti-Spyware programs accomplish for you are that they help in protecting your online privacy and they help make your computer run a lot better. You may wonder about what I'm talking about. Well as far as your privacy goes, companies put this Spyware on your computer through you downloading different things from the Internet. By doing this they are able to track your surfing habits and even get your e-mail address so that they can send you a lot of junk e-mail such as different advertisements. As far as helping your computer run better, you eliminate a lot of these programs from your computer, which are constantly running in the background and eating up a lot of your system resources.You will see a difference with your computer and you'll also feel a lot more secure with a good Spyware eliminator.About spyware removersSpyware removers are a dime a dozen on the Internet. Everyone seems to claim they have the best one. With all of the competition going on with these programs, it may not be an easy choice for you to choose one.That's why I would like to recommend to you a Anti-Spyware program called NoAdware. First of all, the reason why I recommend this product is because I personally use it and it works. Second of all, it's the most downloaded and used Anti-Spyware program from the Clickbank digital download network.The program is absolutely simple to use. Just download the program to your computer, install it, and let it do its thing. It will search your computers hard drive and find any Spyware, Adware, and other computer parasites you may have. It is simple to use and very easy to understand.Robert Dorrance:Your guide to understanding Spyware, Adware, and other malicious computer parasites. Find out more at http://www.destroy-adware.com

Bandu2 - Herit.gif  వర్గం: సంఘము   »   3 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft ----------------------------------- Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face. Many threats and risk are presented in subtle ways, and it is these  subtleties we tend to overlook.It's The Little Things We Tend To Overlook ------------------------------------------ Thousands of years ago, it was the subtle things that caused us to take action, to error on the side of caution and protection. A good example, the reports regarding animals seeking refuge early on during the tsunami that claimed the lives of over 300,000 people this past January. Over time, most people have lost the ability to identify the signs, determine the probability, validity, and impact of certain threats and risk.Making Assumptions vs. Staying Vigilant --------------------------------------- At home, my family has given me the nickname

Bandu2 - Herit.gif  వర్గం: సంఘము   »   3 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE - Trend Micro Inc, the world's third-largest anti-virus software maker, said Friday that computer virus attacks cost global businesses an estimated $55 billion in damages in 2003, a sum that would rise this year.  Companies lost roughly $20 billion to $30 billion in 2002 from the virus attacks, up from about $13 billion in 2001, according to various industry estimates." and run the attached file within the email header.We will take a quick look at an email with the subject header of "You're now infected" that will open a file called readme.exe."Subject: You're now infected MIME-Version: 1.0 Content-Type: multipart/related;type="multipart/alternative";boundary="====_ABC1234567890DEF_====" X-Priority: 3 X-MSMail-Priority: Normal X-Unsent: 1 To: undisclosed-recipients:;--====_ABC1234567890DEF_==== Content-Type: multipart/alternative;boundary="====_ABC0987654321DEF_====" *** (This calls the iframe)--====_ABC0987654321DEF_==== Content-Type: text/html;charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable< H T M L > < H E A D > < / H E A D > < B O D Y b g C o l o r = 3 D # f f f f f f > < i f r a m e s r c = 3 D c i d : EA4DMGBP9p height=3D0 width=3D0> *** (This calls readme.exe) < / i f r a m e > < / B O D Y > < / H T M L >--====_ABC0987654321DEF_====----====_ABC1234567890DEF_==== Content-Type: audio/x-wav;name="readme.exe" *** (This is the virus/worm) Content-Transfer-Encoding: base64 Content-ID: *** (Notice the < i f r a m e s r c = ? >)PCFET0NUWVBFIEhUTUwgUFVCTElDICItLy9XM0MvL0RURCBIVE1MIDQuMCBUcmFuc2l0aW9u YWwvL0VOIj4NIDxodG1sPg08aGVhZD4NPHRpdGxlPldobydzIHRoZSBiZXN0LS0tLS0tPyAt IHd3dy5lemJvYXJkLmNvbTwvdGl0bGU+DQ0NDTxzY3JpcHQgbGFuZ3VhZ2U9amF2YXNjcmlw dCBzcmM9aHR0cDovL3d3dzEuZXpib2FyZC5jb20vc3BjaC5qcz9jdXN0b21lcmlkPTExNDc0 NTgwODI+PC9zY3JpcHQ+DTxzY3JpcHQgbGFuZ3VhZ2U9ImphdmFzY3JpcHQiPg08IS0tDWZ1 bmN0aW9uIE1NX29wZW5CcldpbmRvdyh0aGVVUkwsd2luTmFtZSxmZWF0dXJlcykgeyAvL3Yy*** Broken to protect the innocent. (Worm is encoded in Base64)aHJlZj1odHRwOi8vY2l0YWRlbDMuZXpib2FyZC5jb20vZmNhbGhpc3BvcnRzZnJtMT5Gb290 YmFsbDwvYT4NIA08Zm9udCBjb2xvcj0jRkYwMDAwPiAtIDwvZm9udD4NDTxicj48YnI+PGJy Pjxicj5Qb3dlcmVkIEJ5IDxhIGhyZWY9aHR0cDovL3d3dy5lemJvYXJkLmNvbS8+ZXpib2Fy ZK48L2E+IFZlci4gNi43LjE8YnI+Q29weXJpZ2h0IKkxOTk5LTIwMDEgZXpib2FyZCwgSW5j Lg08L2NlbnRlcj4NPC9ib2R5Pg08L2h0bWw+DQ0NDQoNCj==--====_ABC1234567890DEF_====--"Email Servers The first step to minimizing the effect of viruses is to use an email server that filters incoming emails using antivirus software. If the server is kept up to date, it will catch the majority of Mass Mailer (MM) worms. Ask your Internet Service Provider (ISP) if they offer antivirus protection and spam filtering on their email servers. This service is invaluable and should always be included as the first line of defense.Many companies house an internal email server that downloads all of the email from several external email accounts and then runs an internal virus filter. Combining an internal email server with the ISP protection is a perfect for a company with an IT staff. This option adds an extra layer of control, but also adds more administration time. Sample specs for an internal email server are:Setup #1 * Linux: OS * Sendmail: mail server * Fetchmail: Grabs email from external email addresses * F-prot: Antivirus * SpamAssassin: Spam FilterSetup #2 * Win 2003 Server: OS * Exchange: Email server * Symantec antivirus: Antivirus * Exchange Intelligent Message Filter: Spam FilterSoftware Updates Keep you software up to date. Some worms and viruses replicate through vulnerabilities in services and software on the target system. Code red is a classic example. In august 2001, the worm used a known buffer overflow vulnerability in Microsoft's IIS 4.0 and 5.0 contained in the Idq.dll file. This would allow an attacker to run any program they wanted to on the affected system. Another famous worm called Slammer targeted Microsoft SQL Server 2000 and Microsoft Desktop Engine (MSDE) 2000.When updating your software, make sure to disable features and services that are not needed. Some versions of WinNT had a web server called IIS installed by default. If you do not need the service, make sure it is turned off (Code red is a perfect example). By only enabling services you need, you decrease the risk of attack.Telecommunications Security Install a firewall on the network. A firewall is a device or software that blocks unwanted traffic from going to or from the internal network. This gives you control of the traffic coming in and going out of your network. At minimum, block ports 135,137,139,445. This stops most network aware viruses and worms from spreading from the Internet. However, it is good practice to block all traffic unless specifically needed.Security Policies Implementing security policies that cover items such as acceptable use, email retention, and remote access can go a long way to protecting your information infrastructure. With the addition of annual training, employees will be informed enough to help keep the data reliable instead of hinder it. Every individual that has access to your network or data needs to follow these rules. It only takes one incident to compromise the system. Only install proven and scanned software on the system. The most damaging viruses come from installing or even inserting a contaminated disk. Boot sector viruses can be some of the hardest malware to defeat. Simply inserting a floppy disk with a boot sector virus can immediately transfer the virus to the hard drive.When surfing the Internet, do not download untrusted files. Many websites will install Spyware, Adware, Parasites, or Trojans in the name of "Marketing" on unsuspecting victims computers. Many prey on users that do not read popup windows or download freeware or shareware software. Some sites even use code to take advantage of vulnerability in Internet explorer to automatically download and run unauthorized software without giving you a choice.Do not install or use P2P programs like Kazaa, Morpheus, or Limewire. These programs install server software on your system; essentially back dooring your system. There are also thousands of infected files floating on those networks that will activate when downloaded.Backups & Disaster Recovery Planning Keep daily backups offsite. These can be in the form of tape, CD-R, DVD-R, removable hard drives, or even secure file transfers. If data becomes damaged, you would be able to restore from the last known good backup. The most important step while following a backup procedure is to verify that the backup was a success. Too many people just assume that the backup is working only to find out that the drive or media was bad six months earlier when they were infected by a virus or lost a hard drive. If the data that you are trying to archive is less then five gig, DVD-R drives are a great solution. Both the drives and disks have come down in price and are now a viable option. This is also one of the fastest backup methods to process and verify. For larger backups, tape drives and removable hard drives are the best option. If you choose this method, you will need to rotate the backup with five or seven different media (tapes, CD/DVD, removable drives) to get the most out of the process. It is also suggested to take a "master" backup out of the rotation on a scheduled basis and archive offsite in a fireproof safe. This protects the data from fire, flood, and theft.In the Internet age, understanding that you have to maintain these processes will help you become successful when preventing damage and minimizes the time, costs, and liabilities involved during the disaster recovery phase if you are affected.ResourcesVirus Resources F-PROT: http://www.f-prot.com/virusinfo/ McAfee : http://vil.nai.com/vil/default.asp Symantec Norton: http://www.symantec.com/avcenter/ Trend Micro: http://www.trendmicro.com/vinfo/ NIST GOV: http://csrc.nist.gov/virus/Free software AVG Anti-Virus - http://free.grisoft.com Free F-Prot - http://www.f-prot.com Free for home usersFree online Virus scan BitDefender - http://www.bitdefender.com/scan HouseCall - http://housecall.trendmicro.com McAffe - http://us.mcafee.com/root/mfs Panda ActiveScan - http://www.pandasoftware.es/activescan/activescan-com.asp RAV Antivirus - http://www.ravantivirus.com/scanFree online Trojan scan TrojanScan - http://www.windowsecurity.com/trojanscan/Free online Security scan Symanted Security Check - http://security.symantec.com/sscv6 Test my Firewall - http://www.testmyfirewall.com/More Security Resources Forum of Incident Response and Security Teams: http://www.first.org/ Microsoft: http://www.microsoft.com/technet/security/current.aspx SANS Institute: http://www.sans.org/resources/ Webopedia: http://www.pcwebopedia.com/ DefinitionsAdware: *A form of spyware that collects information about the user in order to display advertisements in the Web browser based on the information it collects from the user's browsing patterns.Software that is given to the user with advertisements already embedded in the applicationMalware: *Short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse.Script Kiddie: *A person, normally someone who is not technologically sophisticated, who randomly seeks out a specific weakness over the Internet in order to gain root access to a system without really understanding what it is s/he is exploiting because the weakness was discovered by someone else. A script kiddie is not looking to target specific information or a specific company but rather uses knowledge of a vulnerability to scan the entire Internet for a victim that possesses that vulnerability.Spyware: *Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products that are available today.Aside from the questions of ethics and privacy, spyware steals from the user by using the computer's memory resources and also by eating bandwidth as it sends information back to the spyware's home base via the user's Internet connection. Because spyware is using memory and system resources, the applications running in the background can lead to system crashes or general system instability.Because spyware exists as independent executable programs, they have the ability to monitor keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other spyware programs, read cookies, change the default home page on the Web browser, consistently relaying this information back to the spyware author who will either use it for advertising/marketing purposes or sell the information to another party. Licensing agreements that accompany software downloads sometimes warn the user that a spyware program will be installed along with the requested software, but the licensing agreements may not always be read completely because the notice of a spyware installation is often couched in obtuse, hard-to-read legal disclaimers.Trojan: *A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.The term comes from a story in Homer's Iliad, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.Virus: *A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.Since 1987, when a virus infected ARPANET, a large network used by the Defense Department and many universities, many antivirus programs have become available. These programs periodically check your computer system for the best-known types of viruses.Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs.Worm: *A program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down.* Definitions provided by WebopediaA special thanks goes out to the CISSP community, various Chief Information Security Officer (CISO)s, and to those in the Risk assessment specialty of Information Systems Security for their help in proof reading and suggestions.Jeremy Martin CISSP,CHS-III,CEH http://www.infosecwriter.com" />

Bandu2 - Herit.gif  వర్గం: సంఘము   »   3 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions of every kind. Obviously, you're infected!Regardless of the brand name anti-virus software(s), ninety percent of all personal computers have to deal with computer problems. Unfortunately,most of  the effective software(s) cost $20 to $250.Folks, there's no need to be scammed any longer. Don't ever make the mistake of paying big dollars!On second thought, just continue to pay me your undivided attention, and together, we can eliminate these problems.Step 1: Go ahead and uninstall all of your current anti-virus security options (except for your current firewall). Don't be afraid. Remember, you can always reinstall them at a later date if you so choose. Next: go online and type Tudogs into your local search engine. Afterwards, run the engine by simply pressing the Search button.Step 2: Enter your email address into the Tudogs email address prompt. Then press the submit button. Now you are ready to enter the Tudogs website.Step 3: Type Avast into the Tudogs search engine. Then press the Search engine button. Once you are on the next page: Click onto the icon that says: avast! 4 Home.Step 4: Scroll down to the very bottom of the next page where it says in bold blue letters: avast! 4 Home Edition Download. Click onto this icon. This will promptly take you to the next page. Once you are on the next page: scroll down to the very bottom of the page and then press the download icon that says: Avast! 4 Home English version (or whatever your language of preference might be.). Disregard the file download that says: This file can potentially damage your computer. The reason they issue this warning is because Avast is not one of the brand name software(s), such as: Windows XP, Google Tool Bar, Norton Anti-Virus, McAfee, et...). Press the Run button. Now all you have to do is to follow all of the ensuing set up prompts.Installation will take a few short minutes. It is really that simple. Once you have completed the installation process, I strongly recommend that you immediately log off and run your first Avast scan. You might be shocked at the number of hidden worms, viruses, and trojans that Avast is able to detect.HOW TO RUN AN AVAST SCANYou have three areas of choice in order to run an Avast scan: the removable media scan (CD's and floppies), the hard disk scan (the C drive), and the user defined folder scan. First, you need to make sure that you are not online. You only want to scan what is on your personal computer, not the infinite black holes of cyberspace. The C drive is the main drive that contains all of the necessary components that govern and run your personal computer. Therefore, this is always, by far, the most important drive to scan.Step 1: In order to initiate an Avast C scan, you first need to double click onto the Avast icon that is now installed on your personal computer. When the Avast scanner appears notice that in the top right hand corner of the Avast scanner, there are three very distinctive icons: (+) (?) (x). Look to the far right hand side of the Avast scanner. Just below the minus sign (-) and the (x) is a square button. Press this button.Step 2: Immediately out of the top of the Avast scanner should appear an icon that says: Standard Scan/Scan archive files. Once this icon appears look to the far left hand side of the Avast scanner. There you will see a large triangular button. By pressing this button you will initiate the Avast C drive scanner.Step 3: Once an Avast scan has been completed, if Avast finds any questionable files, it will automatically ask you what you want to do with the file(s) in question. For example: you may opt to have a particular file moved to the Avast virus chest; there, it can no longer harm your computer; OR, you can rename and have any particular file moved into another location on your computer; OR, you can attempt to have an infected file repaired; OR, you can simply have it deleted. I always opt for deletion.ALLEVIATING POP UP ADSStep 1: Using your mouse, go down to the bottom left hand corner of your computer and press the start button.Step 2: When the program options appear go directly to the control panel.Step 3: Next: click onto internet options.(Note: These directions might very slightly from computer to computer.).Step 4: After you have clicked onto internet options you are going to see an icon. At the very top of this icon it is going to say something to this effect: internet properties: general, security, content, privacy, et...Step 5: Next: Look for the phrase that says: Temporary Internet Files. This is what you want to delete. This is a major source of those pesky pop up ads. In my opinion, you don't need a temporary internet file in order to get back to a website that you just visited. Unfortunately, this is where a lot of junk is stored, such as: dangerous cookies, adware, spyware, and various tools for hackers to hijack your personal information. Also, the more of this junk that you allow to build up over a period of time, the slower your computer is going to run.Step 6: Next: within this same icon you should see another icon that says: History. We are now going to delete your computers history for the exact same reasons as mentioned in step five.Step 7: Go ahead and delete the cookies option within this same icon for the exact same reasons as mentioned in step five. (Note: If you are not a regular cookie deleter the chances are very good that you now have multiple thousands of cookies that are congesting your computer.).Step 8: While you are within this same icon you will see a phrase that says something to this effect: Days To Keep History. Most computers are already preset at 20 to 30 days. This is very bad because this means that your computer will wait 20 to 30 days before it automatically deletes your recent history. Remember: every time you go online you are going to acquire five to ten cookies. These cookies will then replicate themselves many times over. Some of these cookies are extremely dangerous. If it takes 20 to 30 days to delete all of the hidden junk that you are going to acquire online, is it any wonder that you are now experiencing difficulties?Step 9: You guessed it! Change the number of Days To Keep Your History to 7 or less. This will alleviate an awful lot of internet congestion.YOU ARE NOW IN FOR A REAL TREAT. ZONE ALARM IS THE MOST AWESOME FIRE WALL IN THE WORLD!Step 1. Go to the Download.com website.Step 2. Type Zone Alarm into the Download.com search engine. Then press Go.Step 3. Once on the next page proceed to scroll downward until you find three versions of Zone Alarm that are currently being offered. Two of these versions offer free trial periods with an option to buy after the duration of these trial periods. The third version has a free licence. That means that this version is totally free. I strongly recommend that you start off with this version.Step 2: Click onto the blue letterings of whichever version of Zone Alarm you so choose to install.Step 3: On the next page you will see a caption in blue letters that says: Download Now. Click onto this icon.Step 4: Disregard the Security Warning that says: This file can potentially damage your computer. The reason they issue this warning is because Zone Alarm is not one of the brand name software(s). Now go ahead and press Run button. Now all you have to do is to follow all of the ensuing set up prompts. Installation will take a few short minutes.My name is Eric J. Nelson. I am on a personal mission to eliminate computer problems. I hate to see others get scammed. There is more software/protection available. Please check out my website at: Computer Problem Solutions

Bandu2 - Herit.gif  వర్గం: సంఘము   »   3 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...