సందేశాలు   [ World ↓ ]
యూజర్పేరు:
పాస్వర్డ్:

మీ పాస్వర్డ్ను మర్చిపోయారా?
నమోదు!

  ఈవెంట్స్     ఎగతాళియైన     కథలు     ప్రేమ     వంటకాలను     రిఫ్లెక్షన్స్     సైన్స్     సంఘము     కాంటెస్  


సంఘము » సందేశాలు - పేజీ 59

arrow right Pandemic Crisis Cure Concept

What happens if the world is faced with a Pandemic, for which no cure currently exists but one is on the verge of being discovered? Here is a concept, which with the proper protocols could save the human race from near extinction. Human Hibernation. Put as many of the  Pandemic victims to sleep as possible before they succumb to the virus or pathogen. Then isolate a team of scientists to figure out a cure. Once the cure is discovered inoculate the scientific team and have them go around to wake everyone up. Wake up the largest groups first and train them with videos how to inoculate the all those people that there is enough vaccine for.Each time enlisting more recovering people to help and train others; eventually over many months waking back up the entire human race from their suspended animation or hibernation event. Think it sounds to Sci Fi like for you? Well think again, because within a couple of years it will be possible. One groups of scientists have discovered that using a certain ratio of hydrogen sulfide gas that they could induce hibernation in mice. Bears and ground hogs and many other mammals can hibernate and it is likely that all mammals can do this, yes, including human beings. Therefore as this technology becomes available and with the proper protocols it is possible to save the entire human race from such a Pandemic or possible extinction. We need to have a plan, think on this.

Bandu2 - Herit.gif  వర్గం: సంఘము   »   2 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right DNA Testing Breaks Down Barriers in the Court Room

DNA testing has three major applications for forensic studies: identification of missing persons; identification of victims of wars, accidents, and natural disasters; and crime investigation. Annually, more than 20,000 forensic DNA tests are performed in the UK. Two out of  three of all criminal cases using DNA evidence involve sexual assault, the rest are cases dealing with burglary, murder, and other types of violent crime. During the last 15 years, DNA analysis became an indispensable police tool in fighting crime because it allows unambiguous identification of the criminal by traces of biological material left at the crime scene. It can also acquit innocent suspects based on DNA evidence.Criminal justice system now relies heavily on DNA-based evidence. Since it was first used in the Enderby murder case (1986), thousands of perpetrators has been convicted of various crimes with the help of DNA evidence, and hundreds wrongfully convicted people have been exonerated.The most common samples collected at the crime scene are blood, semen, and saliva; virtually any biological material or objects handled by a perpetrator can be now used for forensic DNA testing. Clothing, furniture, and other items which may have traces of DNA, are now routinely used for obtaining DNA evidence. The technology is so sensitive that it allows identification of a person by analysing DNA collected from a fingerprint left on the surface of an object or from a single hair left at a crime scene.When a crime scene sample or a sample from a suspect is analysed, a DNA profile is produced. A DNA profile is a digitalised representation of an individual's genotype with respect to the DNA markers tested. In the UK, all crime scene DNA profiles together with those of all suspects and arrestees for any recordable offence are deposited into a National DNA Database (NDNAD), which is the world's first criminal DNA database. As of 2004, the UK national DNA database held over two and a half million DNA profiles collected from suspects and convicted criminals which is estimated to be about 40% of UK criminally active population as well as more than 200,000 crime scene samples. UK Police use the NDNAD as an investigative tool to help solving a wide range of crimes including murder, rape, sexual assault, robbery, terrorism, burglary and arson and have almost doubled their clearance rate for volume crimes such as house burglary, and motor vehicle offences. As each new subject sample profile is added to the database, it is checked against all contained crime scene sample. When a new crime scene sample profile is added, it is checked against DNA profiles of all suspected individuals as well as against other crime scene sample records. Since its inception in 1995, the NDNAD had matched more than 200,000 crime scene samples to suspects and more than 20,000 crime scene samples to other crime scenes. Every week more than 300 crime scene samples are matched to the suspect and convicted criminal's database.However, a DNA match between a suspect and a crime scene does not automatically guarantee a conviction. DNA evidence is just another piece of evidence, although very strong one, and on its own is often not enough to convict someone of a particular crime. DNA evidence must always be taken in conjunction with other pieces of evidence and the weight of DNA evidence is impossible to estimate without taking into account the circumstances of the case. Even when a strong match between a defendant and a crime scene sample is presented by the prosecution, non-DNA evidence may be pointed to someone else as the real perpetrator of the crime. This "other" evidence can decrease the weight of DNA evidence and increase the chances of successful defence.The discovery of DNA fingerprinting 20 years ago had revolutionised the legal profession. Criminal and non-criminal justice systems were handed a very powerful tool to solve crime and resolve civil cases. Understanding how DNA testing can be applied in legal profession will bring benefits to both lawyers and their clients.Avi comes from an international business background with Citibank where he specialised in managing projects in London, Europe, South America and Asia Pacific. In 2004 he was awarded the prestigious Shell Live Wire Entrepreneur of the Year award for his business. Working closely with the charities and various media outlets Avi strives to increase public awareness as to the benefits of DNA testing and the continuing impact that technological advances will have on all our lives.Learn more about DNA testing or how you can receive your own free home DNA paternity testing kit.

Bandu2 - Herit.gif  వర్గం: సంఘము   »   2 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Mississippi River Mouth Debris Jetting Using Acoustic Transducers

The Mighty Mississippi is backing up and causing flooding issues due to over growth build up at its river mouth. This is dangerous because that region is already so close to sea level. In fact much of the City of New Orleans is 12-feet under sea level and protected by a  man-made seawall. If we could clear the path to the ocean and watch the fertilizer run off from up river, we may save ourselves a lot of future outlays in the event of a sea wall breach. The current estimate is 155 Billion Dollars in FEMA aid if a large category Hurricane makes a direct land hit at New Orleans, Louisiana.Using acoustic transducers to molecularly align the water molecules to make them thicker, fast moving water can be forced into a smaller and smaller area and used like a large volume pressure washer. This jetting effect can help clear out some of the growth and allow water to flow thru the area into the Gulf of Mexico and reduce the rising water build up of the current constriction. It will also help prevent the formation of large algae blooms, which poison fish and can get into water supplies. Although no one has ever tried this before and the power consumption to do this would be intense, it is considerably better than doing nothing and what we learn in trying and researching this could in fact yield transfer technologies in many other sectors.Currently we have a problem, which is getting worse and New Orleans is a time bomb in our future for catastrophic calamity. Many locals will not leave in the face of a Hurricane, instead throw Hurricane Parties like there is no tomorrow. Unfortunately all this sound fun, but if they are anything short of Olympic swimmers with something very buoyant in the ever increasing bayou; there will not be a tomorrow for them anyway. Anyway, y'all think on this one and get back to me.

Bandu2 - Herit.gif  వర్గం: సంఘము   »   2 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Archaeology

When the Egypt Exploration Fund was created they had memoranda and articles of incorporation that directed the funding for site excavations which showed promise of being outside the Bible Narrative - should not be researched! This troublesome kind of bias is beyond reproach  because sites like Memphis have been built over and for all intents and purposes destroyed. In the efforts of people like Schliemann (Troy) and Evans (Crete) to uncover their dreams that led from the 'myths' of Homer they also confused and made horrible mistakes that allow debunking science to discredit artifacts that would have proven valuable. There are so many examples of actual government destruction of artifacts and people's careers that it is hard to pick one single example.Despite the negative aspects of archaeology illustrated in the Kensington Rune Stone response of Mr. Wiseman; there is a very real possibility that the truth will become realized in sufficient degree for good people to regain their freedom. W. F. Albright is considered the 'father of Biblical Archaeology' by the Biblical Archaeology Review. His admission and awareness that the Phoenicians are the major creators of the Bible in the 50s and 60s has not reached the public or even the academics at large. In time and with a great deal of outside detective work it seems some of us are able to paint a new picture of history, due in large part to the effort of archaeologists even if they don't know the meaning behind the things they uncover. In 1982's December issue of the National Geographic they were still promoting 'The People's of the Sea' theory that Gasten Maspero (a French historian of the 19th century) created from very little factual data. This issue dealt with the 'digs' at Deir el-Balah in the Gaza strip! Moshe Dayan (The Israeli Defense Minister) was a purchaser and assembler of some of the artifacts that look very ethnically diverse. The site was admittedly cosmopolitan and had been used by many different cultures as well as some key figures from history. Here is a quote from the inset to an artists' rendition.

Bandu2 - Herit.gif  వర్గం: సంఘము   »   2 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it must be your worst nightmare--to wake up and learn that you are a bankrupt. Some crook stole your personal data and all the money you have been sweating blood for years has flown to somebody else's account. Almost  everybody must have heard that such a tradegy is called identity theft and millions of people in the USA alone suffer the same every year. Poor consolation for its victims, isn't it?Unfortunately, businessmen frequently are targets for identity thieves, especially online. Lots of articles on identity theft,

Bandu2 - Herit.gif  వర్గం: సంఘము   »   2 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Web and Computer Security

Well, if that would have been said to me by my father when I was 2 years of age, I would have understood. But when today, my own computer tells me that when I am 34, I wonder why I spent $1500 on my computer hardware and software just to enjoy the (un-realized) benefits of  this great and revolutionary information technology?Today’s cyberspace is hazardous. None of today’s PC users can claim that they never had a computer virus issue or a PC security breach. Now, if you count today’s number of PC users worldwide, they will soon be 1 billion by 2010 according to analysts. When I see all the computer viruses, infections, trojans, and what not around me, and compare it with the 1 billion innocent computer users around the world, I simply feel sorry not only for those billion users but for myself too. But again, as a common user myself, I must admit it was not all doomsday for the whole industry since 1987 when I started to use computers. So, as a responsible member of this great IT revolution, I must share some of the best tips and tricks that I learned to use to make the minimum room for productivity on my computer.Please note this is a tutorial for someone who has basic know-how of computer usage. For those who are newbies, I would recommend asking a local expert’s help before trying anything out mentioned in this tutorial. In that case, make room for payment from deep pocket. For your own convenience, print this tutorial for step-by-step instructions.Whenever my computer is infected, I act on any of the following options;1. FORMAT HARD DISK: I back up all of my data on a CD-Writer if it is still accessible. And then format the whole hard disk drive and re-install each and every application.2. USE SOFTWARE: I exhaust all anti-virus and other software options. This is usually my first priority as compared to formatting the whole computer hard disk drives.Now, let me explain both options in detail;PRE-REQUISITES: Make sure you have a CD-Drive (Writer), empty writable CDs, Windows OS CD (bootable) that contains files such as Format.exe, Scandisk.exe, FDisk.exe, and Attrib.exe files. Microsoft Office CD, Anti-Virus CD, GoldenHawk CD Writing Software in DOS (copy2cd.exe and cdtools.exe), Serial Numbers of your License, Driver CDs of Motherboard, VGA, Network, Sound and Modem devices. Optionally, download (using www.download.com or www.tucows.com) these software from any Internet Café when your own computer is inaccessible and save it on a CD so that you can use it anytime for security purposes;Golden Hawk DOS based CD Writing SoftwareHTech Fireman Windows based CD Writing SoftwareDriver Genius ProPartition MagicAVG AntiVirusSpywareBlaster & SpywareGuardSpybot Search & DestroyAd-AwareIE-SpyAdZoneAlarmHiJackThis & CWShredderI have intentionally avoided mention of many commercially good and more friendly software’s mention here as I wanted everything to do FREE without any additional costs apart from the usual OS licenses. For your own convenience, you can research Google or Yahoo search engines find further information about such commercial software and their availability / pricing.1. FORMAT HARD DISKI know it is painful and surgical type of solution, but sometimes, it is the ONLY solution left after exhausting all of our efforts to revive our computer machine after a virus attack. Follow this procedure;Booting Up: Try booting your computer normally first and see if you can login easily. If you can’t or your computer hangs up, try holding F8 key when starting Windows and you will get the Safe Mode. Even if you don’t get the Safe Mode, don’t worry.Power up your computer and press DEL key or F2 key to login your CMOS. In CMOS, go to Boot Preferences and make CD Drive as boot drive as your first boot drive and change the hard disk drive as the second boot drive. If you don’t see your CD Drive in the boot-up options, your CD Drive is not properly installed. Check the connectors or ask your CD Drive provider for instructions to install the CD Drive. Now, when your CD Drive is ready, insert your Windows OS CD in the CD Drive and restart your computer machine. When prompted, select the option “Boot from CD with CD Option”. When you get the prompt, Notice the CD Drive letter that was allocated to your CD Drive when it installed the CD Driver. It is usually D: drive or the last drive letter depending on the number of your partitions. Note it down as it is the actual drive letter where you will have to type a DOS command like d:You should now be able to run all software utilities such as Format, Scandisk, FDisk or Windows Installation Setup.exe files. Right now, simply make sure they exist by typing a DOS command dir at the CD drive letter. If you don’t find it with this simple directory command, use dir/s filename to search the file. For example, to search fdisk.exe file, type dir/s fdisk.exe.BACKING UP YOUR DATA: Before formatting your hard disk drive, please make sure you have proper back up of your critical data files such as Microsoft Word, Excel, Powerpoint, etc files on a CD or any other media for backup that you have access to. In this tutorial, we assume you have a CD-Writer installed for taking backups on Writeable CDs. Their capacity is usually 700MB or less. Here, you should seriously consider using Zipping software like WinZip or WinRAR.VIA WINDOWS: If you can luckily login to your Windows OS, you should run the CD-Writer software such as HTech Fireman to back up all of your data on an empty CD. If you don’t know how to do it, read their user manual for detailed instruction set. If you can’t access your Windows OS, read on.VIA DOS: Some of the files that you wish to make back-up, may be hidden. To un-hide them, use attrib *.* +r +s +h.Now, use the software from Golden Hawk file named as copy2cd.exe to backup your data files or directories on a writeable CD. Before using this command, make sure you are in an appropriate path on the computer such as E:/ where the actual file copy2cd.exe file resides;Copy2cd c:data*.* f:Here we assumed that f: is a CD Writer drive. Now, repeat the same for all of your files to back up. When finished, run cdtools.exe command i.e. cdtools f: to finish by selecting option “Disc Finalization”.If you can’t back up your data using the above-mentioned procedure, either ask an outside expert’s help personally or via internet. If all fails, forget your data forever and carry on installing a new OS as mentioned in this tutorial.Backing up Your Drivers: An interesting tool to mentioned here is a software that automatically backs up all of your drivers of CD, modem, sound card, vga, usb, printer or just about anything that is currently installed on your system. But this software works only in an operational windows OS, and not in DOS. It is a good and time-saving practice to keep a backup of all of your drivers on a CD by using such a software. Its name is Driver Genius Pro and it is commercial software, not a freeware.USING FDISK: You may skip this option and go straight to Formatting Hard Disk option, if you wish to use other useful partitions that may contain your data. Before going ahead with this option, Make sure there is no useful data left on your computer to be backed up. This option will delete all of the computer partitions and create new ones.i) Boot up your computer using Windows OS CD.ii) Run this command fdiskiii) Press option 3 to delete all current partitions.iv) To create a new partition, select option 1 and select Y to answer the maximum size question by the program.v) Next, select option 2vi) Press Esc key to quit and restart your computer toSee the URL http://www.compguystechweb.com/troubleshooting/fdisk/fdisk_scr.html for detailed instructions alongwith screenshots. Now, that you have created the primary partition, you can continue to format the newly created partition. There is a very user-friendly but commercial software called Partition Magic by PowerQuest to manage your partitions easily after installation of Windows.FORMATTING HARD DISK: Now that you have created new partitions, It is time to format them so that you can start installing Windows. This is how you make your C: drive usable by your Windows OS for installation. Boot up your computer with Windows CD and type format c: command at the prompt. When prompted for maximum size, press, YES. After complete processing you will be presented with the successful report about the formatting of the C: drive. Select your new drive name and press ENTER to finish.INSTALLING WINDOWS: Microsoft has made it very easy for a newbie to install a completely new OS on a newly formatted partition. It is all wizard based and you simply have to click NEXT each time whenever asked a question. Boot up your computer from the Windows CD and select Start with CD Option. When on DOS prompt, change to the CD Drive that it just created which is usually d: if you have only one partition C. Now type command setup.exe to start the windows installation process.During installation, make sure you properly name your PC as per your preferences and select your regions and Time zone. When finished, the computer will re-boot and during next re-boot it may ask some drivers of your Sound Card, VGA, Network, or other devices attached. Provide the requisite driver CDs and locate the paths of the appropriate drivers. If you are not sure, leave it like that and press NEXT to ignore. When your windows installation is complete, you can install Microsoft Office, setup internet connection and start using it as normally as you would. Please make sure you install all the security software such as anti-virus, anti-spyware, adware, and other software as mentioned in the next section.2. USE SOFTWAREInstalling Anti-Virus: Download free AVG Antivirus software and install it. Make sure you get its free key from their website by registering. This software is not auto-updated for critical viruses and for an auto-update version, you will have to pay. If you wish to pay, we would recommend world’s most popular brands Symantec, McAfee and Trend Micros instead. No matter what Anti-Virus software you install, make sure you enable its Auto-Protect feature for automatic protection of your computer’s resources and in-coming or out-going emails from any virus attack. Some software even allow you to setup silent detection and destruction without any disturbance to your work. Further, they are auto-updated via internet at the regular interval that you setup. Hence, you can rest assured that whenever a security threat is spread all over the world, your software will automatically download the requisite updated version and install its defense on your computer.BROWSER SECURITY: To setup your browser (Internet Explorer on Windows) for maximum security against the usual threats, follow this procedure;i) Start up your browserii) Go to IE > Tools > Windows Update > Product Updates, and selected Security Updates to be automatically updated. Microsoft releases patches and security patches from time to time to make sure your system's security is up-to-date.iii) Now, go to Internet Options/Security/Internet, press 'default level', then OK. Now press

Bandu2 - Herit.gif  వర్గం: సంఘము   »   2 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right HackAttack

P C. owners are constantly at risk from attacks by hackers. Spy ware, viruses, trogan horses, and all sorts of other malevolent programs are all trying to take control of your computer.What can we do about it? How can we be sure that we are properly protected against them?A  hacker will generally not be interested in doing damage to your PC. His main interest is in gaining control of your computer so that he can use it to send out hundreds of thousands of e-mails in your name with the intention of crashing your mail server.This can get you into very serious trouble with the server. This is something that you do not want. How are you going to prove that you were not to blame?How do the hackers do it? What tools do they use?A port scanner. What is a port scanner? A port scanner can locate PCs that are on line and check for an open port. A hacker using a program such as 'Super Scan' can find an open port to gain entrance to your computer. Once in, he can use your computer as if it were his own. The only difference is that to all intents and purposes it is you that is causing all of the trouble.The main port that the hacker is interested in is port 80. This is the one that you use to log on to the internet.I am not going to confuse you with all the various programs that are designed to show you what ports are open at any particular time. What you need to know is how to protect your computer against these attacks.There are a number of programs designed to show you what is going on inside your PC. I will give you a short list of some that are recommended by some of the program makers.The one that I would not be without is: www.testmyfirewall.com As its name implies it will test your firewall for flaws and scan for open ports and any other security problems you may have. You do have a firewall, don't you?Another one is: www.pestscan.com This will scan for any nasties that are already on the computer.Lastly, I use: http://www.security.symantec.com This will run a security check of all my systems.Don't put of what you should be doing today. Make sure that your protection is doing its job. Check that you have the latest version of whatever protection you are using. An out of date system is worse than useless. It gives a false sense of security and suddenly you find yourself in serious trouble with your ISP.It is your responsibility to ensure that your computer will not cause problems for someone else. There are so many free systems out there that you have no excuse for not using one or more of them.Be safe. Be happy. Be responsible. All the best. ?Bob?---Robert has been on line for over four years and earns a very good living from some of the very best affiliate programs on the web. This is one of his favorites. If you are interested in growing your very own opt-in mailing list in the shortest possible time, take a look now.http://www.bz9.com/robjfar 'It's free.'

Bandu2 - Herit.gif  వర్గం: సంఘము   »   2 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article". And, of course, the Web is swarming with the ones like "10 Steps to Protect Your PC from  Spyware

Bandu2 - Herit.gif  వర్గం: సంఘము   »   2 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Why you Must Secure your Digital Product and Thank You Web Page

A couple of years back, I paid my dues the 'hard way'.My web site was up and running, the sales letter had been 'crafted' with the most influential marketing techniques and the profits had been consistently coming-in, until...Until I noticed a considerable 'drop in  ClickBank sales' for 2 months in a row. You can't imagine how this extensive declination in sales, affected my mood and self-esteem.I started critiquing my sales literature all over again and re-evaluating every tidbit of my marketing strategy... everything seemed to be

Bandu2 - Herit.gif  వర్గం: సంఘము   »   2 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker.Feeds are simple, really. What's even more exciting is that they are extremely easy to use, and even better, they are  completely safe from Viruses, being Spammed or receiving Junk Mail. How? Basically because there is no transfer of information to your computer.Unlike e-mail, which is a transfer of information (data), feeds are read from files stored on someone's server out in cyberspace. There is no transfer of data to your hard drive at all.Even better than e-mail, you control what information you read.Here's an example of how you would find, add and use a feed.Let's say you are browsing the web and you come across a site you are interested in, let's say a fashion site. Most sites are still using mailing lists, but will be using feeds in the very near future. If you sign up for their mailing list for example, because you may want to know when they have a sale, you will receive information via e-mail. But there could be a few problems with this.First viruses, spyware, adware, etc. are transferred via e-mail, many times without the knowledge of the person who sent it.Second, you may want to unsubscribe from the mailing list but the company may have made it difficult to do that.Third, you may want to actually read their e-mail but it gets recognized as Spam or Junk Mail by your mail program and you may never see it, or you may delete it because you are not sure if you should open it.Although many companies have used mailing lists successfully, they are now finding it frustrating because of Spam and Junk Mail filters, and unwanted Viruses, Spyware, Adware attachments, etc. Additionally the fewer places you leave you e-mail address, the better.If the same fashion site has a feed however, you can use it to read their information any time you want, and you can delete the feed if you find that it's not want you want.The first thing you will do is to use a reader. We have a free reader that is easy to set up, and easy to use. Once you have the reader set up you simply add feed URL's to your reader.When you open your reader the top menu will have some options for you. With our free reader a small window opens when you start up the program. From that small window you can add a feed. The top menu as well will allow you to add a feed under the

Bandu2 - Herit.gif  వర్గం: సంఘము   »   2 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential  information. Several websites offering cheap airline tickets in fact weren't selling anything; the aim was to cheat users out of credit card details.Of course, these sites have already been identified and disabled, but who knows whether (or better to say when) other ones will appear again, this time offering all kinds of products.The scam is very simple; the thieves simply wait until some unsuspecting user who is searching for airline ticket offers, finds their site offering dirt-cheap airline tickets. Really pleased with himself and looking forward to the trip, the user fills in the form, entering his credit card number, expiry date and verification value (CVV).As soon as these details have been entered, an error page appears; it tells the user that the transaction has been unsuccessful, and offers instructions on how to pay for the ticket by postal money order. So the user may well be fooled twice. He loses his credit card details, putting them right into the hands of cyber-crooks, and then loses money, if decides to buy the ticket by money order.Luis Corrons, the director of PandaLabs, comments on this scam:

Bandu2 - Herit.gif  వర్గం: సంఘము   »   2 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without a user's knowledge. It gathers information and reports it back to its source. It ties up bandwidth, slows down CPU speed and generally is a nuisance.In its more malicious forms, it can disrupt the PC so much  that it is unusable; it can run up modem bills, it can spam or send copies of itself to everyone in your address book and it can download pornographic material to your PC.The last is probably the one most likely to make everyone stand up and take notice. Downloading porn at the office can get you fired, downloading child porn anywhere can get you arrested.The only way to keep these and all the other problems associated with spyware from infecting your life and disrupting your activities is prevention. As the old saying goes, an ounce of prevention is worth a pound of cure.There are numerous programs available (both for free and for pay) that offer protection from spyware and its related cohorts. Most free programs remove spyware that's already been downloaded and installed to your machine, such as Ad- Aware, one of the first original anti-spyware programs.The free version requires that you scan to capture and remove spyware. The pay for version includes a real-time scanner that actually prevents spyware from downloading or installing itself.There are numerous other products on the market, but don't be taken in by their pronouncements of being anti-spyware. Be wary, a few of the free programs are just spyware themselves.Security for your PC at the home includes using up-to-date virus software, installing an effective firewall, employing reputable anti-spyware tools, making sure all patches and being sure to install all updates for the operating system. The best thing to do is to avoid risky online behavior or the downloading of every free offer that literally

Bandu2 - Herit.gif  వర్గం: సంఘము   »   2 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Facts You Should Know About Web Site Design and Search Engine Optimization

1. Web site File Structure / File NamingMost search engines do not recognize beyond two directory levels.Make sure to name your files and directories with keywords.Don't separate keywords using the underscore instead use hyphens.File names should be not too long.2. Load  TimeIf a page doesn't load in 8 seconds, Web site will lose 1/3 of the visitors.Images and Graphics -Image optimization will help to improve the load time. Images can be optimized using the "GIFBOT" image optimization tool (http://www.netmechanic.com/accelerate.htm)3. Browser Compatibility / Screen ResolutionsMake sure the all the web pages are compatible with the latest versions of Internet explore and Netscape. (Eg: IE 4.0 and above, Netscape 4.7 and above)Screen resolution is very important. Compatibility in 800 and 1024 resolution is a must.4. Site MapA very important page on a web site.Search Engine spider's prefers Site maps.Name the Site Map page-using hyphen (site-map.html).Make sure the site map has links to every page of the web site.Use key words on the anchor.Try to describe the links with two or three lines.Give a link o the site map from all the pages of the site.Keep the site map simple with no or few images.5. HTML ValidationMake sure the coding is done according to the W3C standards. (http://validator.w3.org)Search engines are constantly rewarding web sites that utilize clean and validated HTML.Validate the HTML coding using the "CSE HTML Validator" before the site goes live. (http://www.htmlvalidator.com/)6. Custom 404 Error PageThrough the custom 404 error page, make it easy for the users to find where they want to go.Use HTML links and include a search box.For information on how to create custom 404 pages for every type of server, visit the 404 Research Lab (http://www.plinko.net/404/). The site also features many examples of custom 404 pages.7. Cascading Style Sheets (CSS)Cascading Style allows Webmasters to control Web page design parameters, such as margins, font/typeface appearance, link appearance, colors, and placement.CSS decreases download time. Style sheets alone don't matter to the search engines.8. Using JavaScript / Frames / FlashJavaScript - JavaScript is not search engine friendly and not important to the engines, so move it to a separate .js file.Frames ? Try to avoid using frames. In a situation of using frame make sure to use the Tag. Frames must be navigational within the frames. Include an option to use the site with or without frames. And, use JavaScript to keep frames intact.Flash ? Search Engine spiders cant read the flash (Except Fast.com). Anyway Flash can be used for demos and presentations.Layers ? It is recommended not use layers.9. Font Styles and ColorsFont Styles ? It is important to use the font styles compatible with the browsers.Colors ? Web Safe Colors A few years ago, when most computers supported only 256 different colors, a list of 216 Web Safe Colors was suggested as a Web standard. The reason for this was that Microsoft and Mac operating system used 40 different

Bandu2 - Herit.gif  వర్గం: సంఘము   »   2 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Transforming A Site From Good To Excellent

One of the challenges of moving a web site up from good to excellent is transforming it from just a bunch of web pages and graphics to an interactive experience. Another term for this is community - a place where people can come to communicate with others. The very best web  sites have mastered this transformation, thus attracting return visitors again and again.The whole point of a web site is to communicate ideas and concepts to other people. If you are just putting up pages and graphics, then you are performing half of a communication. You are telling people what you think, want, desire or need.The other half of communication is listening. That's why merely adding an email form (or link) and a guestbook go a long way to improve your visitor's experience with your web site. You are giving them the opportunity to tell you what's on their mind. If you also take the time to answer their messages and perhaps even get involved in an online communication - then you may very well have a friend for life.You can add even more value (and get a few more visitors as well) by adding a

Bandu2 - Herit.gif  వర్గం: సంఘము   »   2 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...

arrow right Use Feng Shui Techniques To Design a Harmonic Website For Your Business

By following feng shui guidelines and techniques, you can build and design a business website that is not only visually attractive but also attractive to wealth and prosperity. The elements that are part of a business website are somehow equivalent to the objects  distributed through a working space since the website is the electronic version of the actual business' offices. Therefore, the website design and the elements that will be in it should follow feng shui guidelines in order to be properly balanced.The colors used to design your website are very important and you should choose it carefully. If you want a website which feels lively and active, it should contain yang elements, while if you wish it to be quiet or passive, it should have yin prevalence. Yang colors are all the bright and cheerful ones, while ying colors are all the dark shades. Therefore, a website with predominance of a light and bright color would be more yang than a dark or off colored one where yin would have prevalence.It is important that you keep your business' website general appearance clear and tidy. A messy or cluttered website would not only make the user feel overwhelmed but it would also be an obstacle for your business prosperity. Your business website should be designed having its graphics and written content clear and organized. Besides this, the general appearance should be as natural and easy to follow as possible. Anybody who visits your business website should feel welcome and comfortable in it, and this should be achieved by providing a clear and welcoming main page and allowing an easy navigation through the entire website.The lines you use for your business website and its graphics are also important regarding feng shui harmony. Straight lines and shapes with cutting edges are not natural and when having too many of them it can be harmful for your business' prosperity. Therefore, you should try to use as many curved and smooth lines as possible, since this would not only help you adding nature inspired elements to the website but also bring wealth to it.About The AuthorJakob Jelling is the founder of http://www.fengshuicrazy.com Please visit his website and learn all the feng shui tips you'll ever need!

Bandu2 - Herit.gif  వర్గం: సంఘము   »   2 పుస్తకాలు   »   తేదీ: 02/01/2012 05:46   »   ద్వారా: Mouhamadou-bamb ...