Showing posts with label Ecademy. Show all posts
Showing posts with label Ecademy. Show all posts

Sunday, December 19, 2010

Google for Christmas

35 Essential Computer User Google Links

The greatest advent of Google is that you are always connected wherever you go and able to access your account via the omnipresent Google cloud.

The list has been broken down into several sections to make it easier for those beginning their Google experience and those who want to augment their abilities.

Google has many well-known and some lesser-known products that everyone who uses Google should be familiar with. Whether you are practicing social networking as an Internet user, or as a professional you will need to know Google well to share information and continue to get others involved as Googlers.

These are just some of the Google Products that are designed to make your surfing of the Internet more enjoyable and productive for you. Many of these products are very useful aids for helping you to keep up to date with your postings on the Internet.


Google Basics
  1. Google Account - Signing-up once here and creating a single Google account will give you access to all of Google's products, features, and services.
  2. Google Mail or Gmail - For sending and receiving email.
  3. Google Top Searches - More search options to help you research more accurately
  4. Google Hot Trends - With Google Trends, you can compare the world's interest in your favorite topics.
  5. Google Blog Search - Blog Search is Google search technology focused on blogs.
  6. Google Web History - Keeps a record of your Internet use while logged into your account.
  7. Google News Search - Need more information on a theme or topic? News Search will look for you.
  8. Google News Archive Search Allows you to search and explore historical archives.
  9. Google Image Search -Need an image for your project? Image Search will speed up the search for you.
  10. Google Reader - Google Reader constantly checks your favorite news sites, RSS feeds, and blogs for new content.
  11. iGoogle - Your own personalized Google user interface page that promotes searches and your selected content.

Google Intermediate
  1. Google Video - A collection of 'User Videos' that may or may not be on 'YouTube.' And also a place where users can host their videos.
  2. Google Alerts - Email updates (web, news, etc.) based on your choice of query or topic.
  3. Google Calendar - A very useful aid that effectively reduces scrap paper and never gets lost, use it in combination with other Google products.
  4. Google Docs - Create and share documents on-line. This product allows the creation of documents similar to Microsoft Word and Excel. Very easy to use and permits users work together at the same time despite time zone differences.
  5. Google Custom Search Engine - Create your own custom search engine for your external hosted website.
  6. Google Sites - Allows users to create and host their own website.
  7. Google Talk - Instant communications, a simple fast chat and messenger program.
  8. Google Chrome -Google's browser software, its fast, simple and secure.
  9. Google Adsense - Google AdSense matches ads to your site's content, and you earn money whenever your visitors click on them.
  10. Google Earth - Google Earth lets you travel almost anywhere on Earth to view satellite imagery, maps, and terrain.

Google Advanced
  1. Google Gadget Ventures - Google Gadget Ventures is a new Google pilot program dedicated to helping developers create richer, more useful Google Gadgets.
  2. Google Grants - The Google Grants program supports organisations to help the world in areas such as science and technology, education, global public health, the environment, youth advocacy, and the arts.
  3. Google Code University - Provides tutorials and sample course content so CS students and educators can learn more about current computing technologies and paradigms.
  4. Google Ad Words - Display Ad Builder for website advertising.
  5. Google Analytics - Google Analytics is the enterprise-class web analytics solution that gives you rich insights into your website traffic and marketing effectiveness.
  6. Google Data Protocol - The Google Data Protocol is a REST-inspired technology for reading, writing, and modifying information on the web.
  7. Google Maps API -
  8. Google Base - Simply describe your items on Base to make them as easy as possible for people to find when they search.
  9. Google Research - Google’s mission and the enormous scale of Google’s operation lead to fundamental questions in Computer Science and Engineering; the technical excitement of this, and the real and practical benefit we can bring to Google’s users through our integrated approach, all contribute to the excitement of doing research at Google.

Branded Products Owned by Google

  1. Blogger -Access thousands of blogs and search through them for useful postings - Or, start your own.
  2. Youtube -A collection of 'User Videos' that may not be on 'Google Video'.
  3. Picasa - An off-line | on-line tool for organizing and editing your photos and images.
  4. FeedBurner - Great program to creating, directing and making feeds and blogged information go all over the place.Supports RSS 2.0 and Atom and more.
  5. Gears - Gears is an open source project that enables more powerful web applications, by adding new features to your web browser:

Sunday, March 7, 2010

The Non-Recycled Plastic Bottle


The Non-Recycled Plastic Bottle


Hands up who carefully recycled the plastic bottles they used in the last year.

Each and everyone of us throws into ever decreasing landfill sites enough plastic bottles for us all to be proud owners of one of these giant footballs!

Thursday, January 21, 2010

Great 'Electronic' Wall of China

The Newest Wall against humanity is up, freedom of information is blinding 30% of the world's Internet population.

This entry is taken from the Times onlne and can be followed up by you dear reader anytime you like...
http://technology.timesonline.co.uk/tol/news/tech_and_web/article6996738.ece

Hillary Clinton guards Internet freedom in attack on
China’s new ‘Berlin Wall’


Hillary Clinton has deepened a row over freedom of expression in China by warning Beijing that its alleged attack on Google would have “consequences” and comparing its censorship of the internet to the Berlin Wall.

The US Secretary of State’s criticism — coming days after the internet company said that it would withdraw from the world’s most populous nation in protest at curbs imposed on its users — is a serious intensification of the dispute that now threatens relations between the two powers.

“Countries that restrict free access to information, or violate the basic rights of internet users, risk walling themselves off from the progress of the next century,” Mrs Clinton said, adding that the US and China “have different views on this issue, and we intend to address those differences candidly and consistently.

“Countries or individuals that engage in cyber-attacks should face consequences and international condemnation. In an internet-connected world, an attack on one nation’s networks can be an attack on all.

“We stand for a single internet where all of humanity has equal access to knowledge and ideas,” she told an audience in Washington, in a speech that also named Iran, Saudi Arabia, Egypt, Tunisia, Uzbekistan and Vietnam as nations that censored the internet or harassed bloggers.

About 30 per cent of the world’s internet users had restricted access, she said. “No nation, no group, no individual should stay buried in the rubble of oppression.”

Mrs Clinton challenged China to conduct a thorough and transparent investigation into the recent cyber- attacks on Google, which also targeted dozens of other US companies. She warned that China’s economy — now second only in size to the US — would ultimately be harmed by its attempts to control information.

Google said that those behind the computer attack tried to plunder its software coding, and the e-mail accounts of Chinese human rights activists. Chinese citizens find information about sensitive subjects such as the Tiananmen Square uprising filtered on google.cn and other search engines.

The social networking sites Facebook and Twitter, as well as the video site YouTube, are blocked. Throwing the US Government behind Google’s new stance on China, Mrs Clinton urged technology companies to refuse to support censorship, and called on US businesses not to support suppression in search of quick profits.

Its rival search engine Yahoo! has come out in support of Google’s move since it was announced last week.

“I hope that refusal to support politically motivated censorship will become a trademark characteristic of American technology companies. And when their business dealings threaten to undermine this freedom, they need to consider what’s right, not simply the prospect of quick profits,” she said.

The State Department is to hold a high-level meeting next month with companies that provide network services, for talks on internet freedom. Mrs Clinton wants technology companies to help to provide new tools that will “enable citizens to exercise their right of free expression” by circumventing censorship.

Relations between the US and China are already troubled by quarrels over trade, Taiwan and human rights. Earlier a senior Chinese minister sought to contain the row, saying that Google’s dispute should not be over-stated. Beijing has until now treated the spat as a commercial matter, declaring that the search giant must obey China’s laws and traditions.

Hours before Mrs Clinton’s speech, He Yafei, the Chinese Vice-Foreign Minister, told the official Xinhua news agency: “The Google incident should not be linked to bilateral relations, otherwise that would be over-interpreting it.” However, two state-controlled newspapers yesterday accused Google of allowing itself to be used by the US Government for political purposes, and warned that it would pay a high price for doing so.

Google, which informed US authorities about the cyber-attacks before going public, praised Mrs Clinton’s words. “Free expression and security are important issues for governments everywhere, and at Google we are obviously great believers in the value to society of unfettered access to information,” it said in a statement.

Wen Yunchao, a prominent blogger based in Guangzhou, southern China, said that the speech would boost the morale of those who sought greater internet freedom in China, but that more details of America’s efforts to advance the cause around the world were needed. China is home to the world’s largest online population of 382 million people.

---------------------------------------------------

Postscript

Many of us have friends in China, Expats as well as Chinese friends on the various sites many of us network on. It is not a case of them ignoring our messages, it is simply a case oftheir access to the Web has been removed against their own free will.

Expats have and are finding ways to get past this Electronic Wall by gaining access to VPN networks (In a nutshell), an escape tunnel avoiding censorship and monitoring by use of virtual networks.

Friday, December 18, 2009

Internet Safety - Part 2

Internet Safety – ‘Cyber-Bullying’ is ‘Beatable’

By Dr. Peter James – Independent researcher, writer, and web tactician.

Yesterday Part 1 was published here...

Internet Safety Tips - Part 1

Part 2 follows on below.

Fraud Email
Everyone gets junk and scam emails, be it Mr ‘Microsoft’ Bill Gates, your favourite film star or singer, even me, efforts are made to curb this daily threat but without employing many of the suggestions in this article, it is a hard battle to win. Now my own spam emails received is low at around five or six items a week. If your IP address gets hi-jacked, you can send spam unknowingly. A few months ago whilst on holiday I found that despite not being on the Internet during the 5 days away that 1000+ spam emails had been sent using my IP address. The matter was resolved 6 weeks later and the offender caught, literally, no one is exempt from the ‘Cyber-Bully’ or Internet nastiness out there today.

There are always plausible reasons given to get you to respond to them, many are from banks that you do not have an account with at all. Never open or respond to them at all, if it is from your bank, go to the nearest branch and sort it out there, not over the Internet or phone, many bogus emails use false logos, and ghost embedded addresses to fool the recipients into responding. In the time it takes to re-read this paragraph, a computer operator elsewhere in another part of the world could electronically rob your bank account!

Have you brought anything in the last few days? Has anyone brought anything from you? Apart from the odd promotional email from ‘EBay’ or maybe a follow up question from a buyer or seller – You know who they are; there is no need for ‘EBay’ to contact you at all. Any such emails can be deleted without a second thought. The contents look good and the links work to bogus sites – not ‘EBay’ – they usually contain ‘bugs’ of various descriptions, all designed to get into your computer and feed back any useful information found on it. Want to see EBay’s latest offers, go to the EBay website much safer than opening the ‘offer you can not refuse’ email.

The scenario is very similar to ‘EBay’, again they look good and just like all scam emails they contain false links, sometimes phone numbers, impressive reproduced layout and a lot of ‘English’ spelling mistakes. (A fact many non-native ‘English’ speakers miss completely when responding to ‘scam’ emails.) Along with other poorly educated people, they happily answer all questions asked and lose thousands every day to these ‘Cyber-Criminals/Bullies’ - The same rule for PayPal special offers applies as well.

Phone numbers that are not
It is possible to buy phone numbers for other countries and many do this for genuine legally accepted reasons. Just because it is a ‘UK’or 'USA' etc number to ring, does not mean your call (along with the bogus contact name) is going to that country. Invariably the call never does, answered in a completely different country to the one dialled on your phone. In the event that you find such a number in an email, there is a very high chance that is an attempt to reassure that the email is genuine.

Lottery winner
Bin them! Do not waste a second opening them, each one is aimed at making you a lot poorer and the ‘Cyber-Bully/ Criminal’ a lot richer. You have not won anything at all. Your lottery winnings are false, every lottery has a ticket with ‘Your’ chosen numbers on it that will be in your possession, not faceless individual, – Foreign lotteries; do not normally sell outside their own national borders. Again badly written ‘English’ gets thousands of greedy individuals to empty their bank accounts chasing the mythical money they have not won, not only not won – The winnings never exist at all! – If the email were on paper, the paper would be worth more than the contents written on it.

Inheritance emails
Again bin them without opening them, the wording in the mailbox as to ‘From’ and ‘Header’ contents usually give them away first, if any is present in the header that is. As with any unknown names if in doubt – ‘Delete’ without opening. The header usually wants you to contact someone; this someone has a false name and phone number and is only intent on passing you along a chain of fraudsters getting you to part with as much money as possible on the way. Later after a few months respite they get in touch with you again and go through the whole rip-off process again. Think about this: ‘Why they do not know your name if you are actually inheriting such a large sum of money?’

Microsoft Junk emails
Microsoft do not, repeat do not send junk emails, nowadays nearly all Microsoft emails are by subscription only, only sent by request. You can happily delete any you have not asked them to send, as they will not be from Microsoft at all.

Password request / Locked account emails
If your mate across the street, a stranger in the bar where you have a beer, or a bus passenger asked for your password, bank details etc, would you give them to them. No! So why do people happily do so to an unknown plausible electronic enquiry? These details are yours and yours alone not for Jo/ Joe Public – Keep them safe!

If a stranger asked you for your ‘Front Door Key’ would you give it to them?


Passwords
Use a clue to remind you, never write the password down just write the clue down. Anyone can find it in your absence or even in front of you without you knowing.

Incidentally, forget any ideas of using big words from dictionaries or any other dictionary word unless disguised - Once access is gained to your computer from an illegal source, in nearly all cases, an incredible amount of dictionaries come into action as your data is trawled looking for passwords that you may have stored on it.

A far more secure combination today is around 16 characters/symbols long.

I say 'far more', owing to the fact that a 'Secret' is only a 'Secret' until you tell one other person. - So keep those passwords 'SECRET'

Use different on each website
In the event you have so many website passwords, then try to group your site passwords so that in the event that if a password is found, the password will not give access to all of the websites that you use, just a few. If there are several passwords on one site make sure that every password is different, adding a figure at the end of the main password is not a good idea.

Change passwords each month
Regularly change your passwords; it is in your own interest to do so and prior to this if you suspect someone else may know a password. A second option exists; if you do not use particular websites regularly, use the sites password reminder service, yes it takes a few minutes of your time but is well worth the effort involved.

Passwords...
Never share them - Never email them - Ignore requests for them


The passwords that you use to access ‘Chat’, ‘Windows’, your various accounts etc are yours and ‘Unique’ to you! No one else needs or needs to know them, not even the company website that you use, only their computers do. In every case, individuals are ‘locked out’ from this information and no one has any right to ask you for it. Electronic reminders are just that, no human is involved in the reminder at all.

Many systems do not send it; they send a temporary replacement instead, so that you can re-access your account. (A step that stops interception of the email whilst in transit to you)

Yes, there are even 'Spy-Bots' that read the body (Main Part) of your email content in transit looking for email addresses and nothing else, so try to disguise any email addresses you send to others - Doing this, actually makes them invisible to these 'Spy-Bots' - Example... donald(dot)duck(at)quackers(dot)com(dot)au

Email addresses that you enter in the 'Header' of your email are quite safe from illegal interception these 'Spy-Bot' Internet Nasties.

Naughty Websites...
All are lockable by you! Every ‘web site’ is lockable from your browser, just as every unwanted ‘email’ or ‘chat individual’ may be locked on the relevant provider. All responsible parents on every computer in the home should take these actions, before any problems start in the future.

That token fee of 1 Euro / $1 / £1 etc is more than just a means of verifying the users age, in many cases it is a ‘Yippee’ another sucker has given us permission to go on a spending spree at their expense. Result; loads of extra expenses many will go un-noticed by you as the Credit Card is usually paid by Direct Debit, with no questions asked by the Card owner at all. Tracker cookies are now safely implanted on your computer from this transaction.

Cookies...
Cookies are useful aids that enable regularly visited websites to open faster. Unfortunately, there are also ‘malicious’ cookies; these tend to turn up in emails and some downloaded programs as well. Employing the email precautions above will help reduce them, as will regular virus and spyware scans and updates of said programs. Another precaution you can take is to ‘Save’ rather than ‘Run’ a new program that you download, this will enable you virus and spyware programs to scan and remove any problems before they get the chance to ‘hide in your computers registry. Many new ‘Bugs’ self-duplicate, meaning you will get it back within seconds of removal as its clone left behind elsewhere in the registry reproduces itself.

Key-loggers sit there on your hard drive recording every keystroke and mouse click that you make. Then your computer sends this information to another (Unknown to you at all) computer in ‘Cyber-World’.

Conclusion...
At the time of writing, There are sadly still several thousand missing children in the world related to ‘chat’ and other instant message issues. There were a little over 4,100 recognised frauds in progress and a list of over 400 recognised Internet Fraudsters at large, with 420,000+ frauds deleted from the Internet. Together with a large number of hi-jacked, IP addresses by unknown parties. With your help in adopting as many of the above advice items, larger numbers of Internet crimes will be solved and the perpetrators caught and punished. Even better still thousands of children will be re-united unharmed with their families and the ‘groomers’ will not be able to lead many more astray in the future.

Another point not yet clarified as ‘a fact’ is ‘chat’ systems being used as an extension to street and playground bullying, to incite violence or crime on the victim against other victims, keeping the ‘actual’ aggressor/ perpetrator safe and sound.

URL Help websites to note:

  1. Internet fraud - http://www.fraudwatchinternational.com/
  2. Child web safety - http://www.thinkuknow.co.uk/
  3. Internet Police UK - http://www.wiredsafety.org/gb/law/uk_police_information.html
  4. FBI Cybercrime - http://www.fbi.gov/cyberinvest/cyberhome.htm


There are many more, most countries have them, in some form. Your first priority should be to contact your local Police in the event of personal issues and missing persons, they can help far quicker and will take all the necessary steps needed both where you are and contact more specialised units/ teams as needed.

Please enjoy the Internet it has a wealth of information on it and the vast majority of users are genuine, the minority spoil things in the ‘Cyber-World’, as well as the ‘Real World’.
Learn to be safe not sorry, together we can stamp out ‘Cyber-Crime’ - ‘Cyber-Bullying’ and develop a much safer ‘Cyber-World’

In case you ever wondered, there is a last page on the Internet, its URL is… http://www.shibumi.org/eoti.htm

Enjoy your life and help others to enjoy theirs, together we can make this borderless Internet safer, together Internet crime will be reduced. Everyday people like me are working behind the scenes to give you a better safer Internet, everyday the Internet gets a bit safer for all. With your help, we can all be winners and stop the minority from running our lives, fuelling our fears and feeding our limited knowledge to blame those who are not guilty in any way for the minorities actions against us all.


Part 3 follows tomorrow - Extra anytime tips whilst out and going about your daily life.

Internet Safety Tips - Part 1

Internet Safety – ‘Cyber-Bullying’ is ‘Beatable’

By Dr. Peter James – Independent researcher, writer, and web tactician.

Introduction

I shall be covering five topics in this article, all are interlinked, and all are forms of ‘Cyber-Bullying’. Just because you do not see your aggressor, face-to-face does not diminish the impact they can have on a victim or victims as an ‘Invisible’ perpetrator. No one is exempt from the tactics used by the ‘Cyber-Bullies’, young or old, experienced or not in the ways of the Internet. Everyone is a target, only experience, shared and then applied information, observations passed to the correct authoritative parties and applied diligence by each of us that use the Internet, can finally slow, halt, stop and then begin to reverse this trend, that is seemingly out of control but this is not so.

It is not my intention to preach to the converted, or suggest tips to experts in the computer field, rather brass tack information that is easily applied by most people. Rattle a few sleepy brain cells that may have dozed off into checking your ‘Current’ settings are still securely set after a series of updates etc. The bulk of the suggestions here do not need any programming skills at all, just a bit of common sense.

Everyday a constant battle waging against such people, everyday perpetrators are caught, everyday new methods to avoid detection are created, and everyday methods to avoid detection are destroyed, blocked from ever being used again by them.

This Battle goes on behind the scenes; the perpetrators do not carry a sign saying, “Hey, I’m an Internet Bully”. Likewise, those hunting them do not carry a sign saying, “I hunt Internet Criminals”. No, it is a cloak and dagger business. As an ordinary user of the Internet, you play a key role in this daily battle. Simply by applying some of the advice given below to your web activity will help to make the Internet safer and harder for the ‘Cyber-Bullies’ to achieve their goals, easier for the Internet crime fighters to catch the offenders.

One of the biggest sources of information to the ‘Cyber-Bully/ Criminal’ is your ‘Hard drive’ yes, the one you got rid of when you trashed your old computer. The one you threw in the rubbish when you upgraded to a bigger one. The one you sold so that you could afford the brand new super-duper better computer that could do everything but make a cup-of-tea.

Okay you wiped it / formatted it / clever you! Rather a case of ‘Stupid you’, (thats how the 'Cyber-Criminals' will see you) every hard drive contains a range of personal information on it, from the cat’s birthday to Aunt Edna’s home address, from your email address book to your personal Bank details, all useful information to the ‘Cyber-Criminal’.

All Data is recoverable by software you can only dream about, guess who has it?

That is right you guessed correctly. Passing on your old hard drive also allows the illegal copying of legal ‘Operating Systems’. As each illegal copy comes to the attention of Microsoft’, they are locked + the original copy as well from any further updates. (An illegal program generally has too many non-combination check numbers in it) This is not a ‘make money’ move it is a ‘make safer’ the Internet move, all pirate software has flaws that allow bugs, viruses etc onto the offending computer far easier than a ‘legal’ up to date secure ‘Operating System’ does.

  • Do not sell on your computer with the hard drive in it.
  • Do not trash your old computer + hard drive at the local dump.
  • Do not leave it out + hard drive for the bin men.
  • Do not pass it on + hard drive as a present to someone else.
  • Do not sell add on hard drives or give away etc for the same reasons.
  • Do remove your hard drive and store in a safe place.
  • Do destroy your hard drive if no longer needed by you.

How to destroy the old hard drive

With a hammer, or drill some holes in the hard drive, even embed it in concrete, or lose it in the Sea. Nothing else will effectively destroy the hard drive or any of the contents on it.

In each case make sure you (and others) are safe from flying particles whilst destroying the hard drive.

Every hard drive removed by the rightful owner is one less the ‘Cyber-Criminal’ can buy in bulk; literally, container loads of old computers are regularly purchased to further their activities. The hard drive you got rid of last week could be ripping of umpteen friends and Aunt Edna in a week or so from now.
The method being used to do so was on ‘Your old hard drive!’

It is possible nowadays for you to recieve 'Spam Emails' from yourself!

Email addresses gleaned from old hard drives often contain, not only your old email addresses but also those of friends you are possibly not in contact with today.

Try not to close an account with a website, by just changing your address and opening a new account on the same website (because you forgot your password for example).

Your recorded CDs etc with data, personal details on etc, should be shredded or at the very least scratched very heavily to destroy the readability of the CD for exactly the same reasons.

Email Precautions

You have not won anything...
One of the Cyber-Criminals favourite bullying tactics is the ‘Lottery’ prize awards. ‘Microsoft’ do not run lotteries at all, National Lotteries of various countries etc rarely if ever run such events to online persons, the chance of winning is way below ‘Zero’. All emails are designed to fool you, ‘Bogus’ Telephone numbers routed to another country, Plausible false names, along with extremely bad English are all methods used to fool the ‘fools’ amongst us.

Do not open it ‘ever’ check it has not been ‘spammed’ by mistake from a genuine sender by reading the header only. In the event that this is not the case then delete straight away, (More reasons for this are further on in this article).

Do not use your name as an email...
Unless you absolutely have to, never use your real name in an email address, no ordinary email user needs to do this. By using your ‘Real Name’, you supply all sorts of traceable help to ‘Cyber-Bullies’. Failing to use your real name on the web was frowned upon a while back, now it is becoming a necessary step to protect ones self from Identity theft, the higher your web profile the more chance of being a victim of the ‘Cyber-Nastiness’ on the Internet.

You email address is yours...
Email allows you to send mail to everyone at the click of the mouse; the click sends everyone the entire list of recipients as well. Meaning that everyone gets to know ‘so-and-so’s’ email address, that they did not know before or your best friend did not want known in the first place, silly you! Next time you send a blanket email, use the BCC facility, then your friends, associates or family will not get everyone’s address just yours and their own. You do not share your home phone number or home address with everyone you do not know. So why do you believe you have the right to share everyone’s email address without the owner’s permission?

Never open unknown received mail...
Just because an email has not gone into the ‘Spam’ file does not mean it is safe, if in doubt do not open it, instead instantly delete it. In the seconds it takes to open it, a ‘Trojan’, ‘Virus’ or ‘Key logger’ can become active, trawling your address book and hard drive passing itself on invisibly to other people you know or do not know. Doing the same to their computer as the ‘Bug’ is doing to your computer now. The latter will sit there on your hard drive recording and sending information to an unknown to you at all computers somewhere else in ‘Cyber-World’

Never open unknown received attachments...
The reason above also applies. In the second it takes to open it, a ‘Trojan’ or ‘Virus’ can be active, trawling your address book and hard drive passing itself on invisibly to other people you know. Some viruses sit for months like time bombs before becoming active, making them hard to locate or trace back to source.

Some attachments actually have false headings and or '*.---' endings to file names.
The attachment may indicate that aphotgraph is attached, chances are (if you are not expecting one and the email is from someone you do not know)it actually contains a virus of some kind ready to spread onto your computer.

Always use reputable valid and up to date ‘Anti-Virus’ and ‘Spyware’ programs and also ‘Legal’ computer ‘Operating Systems’ and ‘Software’ programs – the crucial bits missing from pirate software, make it much easier for others to get into your computer from the other side of the world (or even next door!).

Chat programs...
Each ‘Chat’ program has the facility to record onto your hard drive every typed word and most pictures (or references) and emoticons used by both parties. Please do activate it and keep a copy of every chat (Parents, activate it and store everyone’s chats in your own partition, for everyone’s peace of mind. Trusting your siblings is one thing, making sure they are safe is another). Would you let them have a total stranger in your home? This is what you are doing now. The chat record could be very useful if a loved one ever goes missing for no apparent reason, it may help find them faster and in a healthy condition again.

The stranger you are going to meet, you know the one you let into your home and life everyday, sometimes several times a day, the one who has not shared a true photograph of themselves. Told you little about them apart from what you wanted to know, possibly later than direct a response to your questions.

Please take these wise steps before going to meet them for the first few times.
  1. Take a friend with you, or arrange to meet them later at said place.
  2. Ring a friend regularly to let them know you are all right (this can be coded if you wish)
  3. Never txt anyone as there is no proof it is ‘You’ sending the txt message.
  4. If you do not take a friend with you, arrange a time to meet and place (preferably a public one) before leaving home and do not leave this chosen spot no matter how much your ‘New friend’ wants you to.
  5. Remember! Your teenage friend could so easily be someone much older.
  6. If everything is ok, great, have a good time but remember to follow the safety rules above.

Habits of chatter...
We all have a limited command of our own language and each language has a limited number of ways to use a particular phrase. By reading a chat message, it is possible to see something that you do not know or understand, just as if you are listening to someone speaking. Just as you would ask ‘what do you mean’ verbally, you can do the same in a chat message as well. In the event that you do not understand the response, or it seems to indicate an ‘exciting’ do this answer, be careful it may not be someone in your own age group or someone who can be trusted. Parents, if your sibling starts talking in words above their own natural ability to date, or showing an interest in something far too old for them, listen and take note, flying off the handle too quickly could easily push this issue away and become a secret to be kept from you. A sudden change in vocabulary may be a sign of an interaction outside siblings known friend and adult associations. It is much better to observe, listen, and discuss than to ‘shut the stable door’ after the horse has bolted.

Watch for grooming...
All the clues to this are visible in changes in a persons behaviour, be they young or old, taking on ‘new’ words wanting to do ‘this’ or ‘that’. Dress code may change as well, when you hear words like – ‘so-and-so’ does this… ‘Does that’ or ‘I want…? Etc’ the selling pitch is like an advert to millions on TV, except here it is aimed at a perceptively naïve youngster. The fact they are starting to trust and believe an ‘Invisible’ electronic friend more than someone in the ‘Real’ world is another subject, nevertheless just as big a problem.

Habits...
Very similar in many ways to the above paragraph and very closely associated to ‘normal’ everyday life. Changes in behaviour may slip in and free usage of names etc easily linked to friends, films or TV and ‘natural’ growing up, quite possibly the same as known ‘for real’ go un-noticed as similes’ with net activity and ‘real’ friends are not usually noticed in many cases. Some habit changes may go un-noticed at first, accepted as just a part of growing-up.

I can't tell you, its a secret...
We all like to have and keep secrets from others, with the intention of dishing out a surprise ‘gift’ or ‘treat’ at the appropriate time. The secrets I refer to are neither of these, rather the secrets laid in by ‘devious’ manipulation of a youngsters mind. These secrets may become evident due to a ‘slip-of-the-tongue’, do not press for an answer, instead wait patiently and introduce it another way. A one parent firing squad is ‘out’ bring the matter up gently as if a ‘secret of yours as a teenager’ for example may be a way to dig it out, if you know your sibling well, this will not pose a problem. However, in the event that you are too busy with your own life… No matter how little you know your child, you will be aware of habits, care or not you will have noticed changes taking place.

Habit changes are noticeable in many ways, but not as easy if the youngster is a loner or has only a few friends. Eating habits could be a clue here, suddenly loving peas or carrots for example, or, not eating fruit, maybe wanting a curry every day. Over many centuries, foodstuffs have been a weapon used against others in many ways; this is simply a variation on a theme, wishing to cook or lay the table could be links, or are they? ‘One Swallow does not make a summer’

Playing detective...
This is where you can learn to use your memory, linking the above four entries together, may provide many clues to who your siblings’ ‘Mystery person’ is. Habits, clothing, and food are some, along with films, music, or TV Heroes. The liking of black things is a phase most youngsters go through, this may not be a help. However it is a clue, just as for example ‘Strawberries’ are suddenly a favourite dish whereas they did not like them till recently, could be the clue needed to enable the authorities to catch an offender and return a loved one back to the family fold safe and sound.

Photographs...
Posted photographs and shared photographs may not be the person or persons in them at all. In several cases where a youngster has gone to meet the ‘new friend’ for the first time, the ‘new friend’ has turned out to be a lot older than photographs posted on chat etc, sometimes the excuse given is that ‘so-and-so’ is doing… ‘So I have come to meet you in their place and will take you to meet them ‘X’ asked me to apologise for not being here.’ (Or words similar to this example)

Lack of photographs...
Why? Maybe they are new to ‘chat’. In the event a picture never appears after talking them through the methods or you have doubts, end the ‘electronic’ relationship, it is better to be safe than sorry at the end of the day.

Does the other person on chat have a software problem? Is the chat set up correctly, is a webcam actually attached, settings may show one is present but actually is not. Which ever applies it does not matter who it is at the other end, never put on a ‘floor show’ for the other person. Especially if you never see them at all on their webcam, or accept invitations to do so by unknown parties, you never know who could be watching. Many children are tempted this way by ‘groomers’. Near enough, every webcam has a USB, remove, and lock it away when not needed or record its activity in your partition most can be. This is another variation on the ‘safe than sorry’ rule.

Any noted suspicions are worth noting down, any clues are worth remembering, and be it an observation of yours, a friend, or even a sibling. In the event of something going horribly wrong, then a clue like so-and-so likes / dislikes ‘tomato’s’ could be the very clue needed to apprehend and get a loved one returned safely home. Literally any suspicions should be reported to the correct authorities, let them decide it is their job not yours.

URL Help websites to note:
  1. Internet fraud - http://www.fraudwatchinternational.com/
  2. Child web safety - http://www.thinkuknow.co.uk/
  3. Internet Police UK - http://www.wiredsafety.org/gb/law/uk_police_information.html
  4. FBI Cybercrime - http://www.fbi.gov/cyberinvest/cyberhome.htm

In Part 2 tomorrow...

Fraud Email - Phone numbers - Lottery winner - Inheritance - Microsoft Junk
Password request / Locked account emails - Password safety tips
Deposits - Naughty Websites - Cookies - Conclusion

Wednesday, December 16, 2009

Crazy Cartoons - V - Computer Game Violence

Ok, 'Bugs Bunny' is a bit violent I know...

http://youtube.com/watch?v=WM5Gwzk3Vfc

But Elmar Thudd and other cartoon baddies in it are always back to themselves in a matter of seconds to have another go at catching 'Bugs'

'Tom & Jerry' are not much different on the violence stakes either... http://youtube.com/watch?v=iG5Px3A0u0w

All sorts of horrible things happen to 'Tom' every episode, he's always better within seconds as well.

Poor old 'Wile E Coyote' forever chasing 'Roadrunner', he is technically killed at least 6 if not more times an episode...

http://youtube.com/watch?v=bgsFVqfu-rM

But he really does catch 'Roadrunner' in the end believe it or not, even though it takes years of episodes to do so...

http://youtube.com/watch?v=KJJW7EF5aVk


Which brings me to my frustration...

Why, after 65 odd years of being treated to death and destruction on a regular episodic basis are such animated cartoons cited as inducing violence and inciting said in the so called 'youth' today? .

Yet these cartoons can only be seen on 'YouTube' and the likes in so many Country's now. Yet Computer Games, where you have to deliberately 'Steal', 'Kill', 'Rob' , 'Maim' , 'Blow Up', is one allowed to do these and other such despicable acts to others, sometimes while 'Playing' against others on networked 'Games'. Carry on being allowed and called harmless?

The former mentioned cartoons did not do so, or boost the crime figures through the ceiling, or produce 'Copy Cat' violence etc on 'Real People' as the degenerates of today do, totally unable to unplug their minds from illusion at the right time, believing they can live as the 'Games' teach them, as they unleran reality and learn anti-social skills by 'Playing' and 'Living these games. Society loses heavily. Crime goes up, Fear of todays youth goes up, Trust in said plummets and society loses out 'Big-Time'. So what is the difference between the two items?

Answer is 'Money', loads of it! There is far more generated income from violent computer games in the form of taxes for Governments and Profits for companies than in the 65 year old cartoons. Sod the individual, 'Fill the nations coffers' with blood money please, we make more for wasting than the cost of damage done by them, money first, individuals last, greed is far more important, besides it makes it easier to control the masses if we let the degenerates bully, frighten and scare the decent people into being mice, makes it easier all round and ensures job security for the 'Boy's as well'. Who cares if the youth of today play these games all the time, then get the fixation in their tiny minds that it isn't a game, that it is really reality.

The powers that be don't care, so perhaps we should!

Answers on a postcard (or email) please.

A, B, Catch you later dear reader.

Sunday, September 13, 2009

Pause for breath, see what you are miss...

Too many people put off something that brings them joy just because they haven't thought about it, don't have it on their schedule, didn't know it was coming or are too rigid to depart from their routine.

I got to thinking one day about all those women on the Titanic who passed up dessert at dinner that fateful night in an effort to cut back. From then on, I've tried to be a little more flexible.

I cannot count the times I called my friend and said, 'How about going to lunch in a half hour?' A various stammered responses, such as, 'I can't. I have clothes on the line. My hair is dirty. I wish I had known yesterday, I had a late breakfast, It looks like rain.' And my personal favorite: 'It's Monday.' She died a few years ago... We never did have lunch together.

So many of us cram so much into their lives, we tend to schedule our headaches. We live on a sparse diet of promises we make to ourselves when all the conditions are perfect!

We'll go back and visit the grandparents when we get Steve toilet-trained... We'll entertain when we replace the living-room carpet... We'll go on a second honeymoon when we get two more kids out of college. We love excuses!

Life has a way of accelerating as we get older. The days get shorter, and the list of promises to ourselves gets longer. One morning, we awaken, and all we have to show for our lives is a litany of 'I'm going to,' 'I plan on,' and also 'Someday, when things are settled down a bit.'

When anyone calls my 'seize the moment' friend, they are open to adventure and available for trips. They keep an open mind on new ideas. Their enthusiasm for life is contagious. You talk with her for five minutes, and you're ready to trade your bad feet for a pair of Roller blades and skip an elevator for a bungee cord...

Not touched ice cream in 10 years. I love ice cream. It's just that I might as well apply it directly to my stomach with a spatula and eliminate the digestive process. Go on spoil yourself, you deserve it... If the car hits an iceberg on the way home, You will have died happy, a few millimetres on the stomach is nothing it gives a loved one more to cuddle.

Now... go on and have a nice day. Do something you WANT to... not something on your SHOULD DO list. If you were going to die soon and had only one phone call you could make, who would you call and what would you say? Why are you waiting?

Have you ever watched kids playing on a merry go round or listened to the rain lapping on the ground? Ever followed a butterfly's erratic flight or gazed at the sun into the fading night? Do you run through each day on the fly? When you ask ' How are you?' Do you hear the reply?

When the day is done, do you lie in your bed with the next hundred chores running through your head?

When you worry and hurry through your day, it is like an unopened gift... Thrown away... Life is not a race... Take it slower.Hear the music before the song is over.

Every Day is National Friendship Day.. Show your friends how much you care. Send this to everyone you consider a FRIEND. If it comes back to you, then you'll know you have a circle of friends.

Life may not be the party we hoped for... But while we are here we might as
well dance and enjoy ourselves! A frown is a smile tht is upside down!

Monday, August 24, 2009

A Daily Quote from Boffins Neuron - 22nd to 28st August 2009

A Daily Quote from Boffib1157's Neuron to start each day...

Saturday - 22nd August 2009
"Reality is - Waking up realise what you could have done may have helped someone besides you."

Sunday - 23rd August 2009
“Living life as an amateur will build you a road to serious wounds”

Monday - 24th August 2009

"There are no White lies, they are all as Black as night!"

Tuesday - 25th August 2009
"There are times when it is wise to turn a blind ear and / or a deaf eye for notice to be taken by someone."

Wednesday - 26th August 2009
"When all is said and done, try to make sure it leaves a positive memory for others to live with."

Thursday - 27th August 2009

"Reality is - Realising you are not as old as you thought you were, as you have now grown up."

Friday - 28th August 2009

"Reality is - Growing up and realising that it is a never ending part of life’s wonderful tapestry"

Sunday, August 16, 2009

A Daily Quote from Boffins Neuron - 15th to 21st August 2009

A Daily Quote from Boffib1157's Neuron to start each day...

Saturday – 15th August 2009
“Being there is one thing, having a positive impact is another, especially after negative actions."

Sunday – 16th August 2009
"A good leader never asks others to do what is not yet in the capable area of another."


Monday – 17th August 2009

"You can not share Love, Trust & Respect with others if you have none of these for yourself."

Tuesday – 18th August 2009
"Reality is - Recognising you are different, be different, not just another slice in the loaf of bread."

Wednesday – 19th August 2009
"It doesn't matter how Rich you are, unless you have an Asbestos Suitcase - You can't take it with you."

Thursday – 20th August 2009
"No matter how hard you try, you can't change the past, but you can ruin the present whilst fretting about the past ruining your future."

Friday – 21st August 2009
"Reality is - Missing the boat because you thought the tide was out."

Saturday, August 8, 2009

A Daily Quote from Boffins Neuron - 8th to 14th August 2009

A Daily Quote from Boffib1157's Neuron to start each day...

Saturday - 8th August 2009
"Native speakers know their own tongue better than anyone, never order them to do otherwise, there is more to protocol & manners without adding your 'Ignorance' to it"

Sunday - 9th August 2009
"Opportunity knocks only once, but temptation leans on the doorbell! (Various)"

Monday - 10th August 2009
“Failure to master a particular skill will cause many delays in multiple lives around you”

Tuesday - 11th August 2009
“Do not give up learning about a subject, even if it has become second nature to you”

Wednesday - 12th August 2009
"Reality is - Not making a name for yourself, rather a case of letting others make it for you!"

Thursday - 13th August 2009
"Getting there is easier when you remember that the 2nd step is the hardest."

Friday - 14th August 2009
“Pragmatic thinking is essential, just entertaining likes and dislikes is a waste of ones life”

Monday, July 20, 2009

A Daily Quote from Boffins Neuron - 18th to 24th July 2009

Sat 18th July 1009
"Depth of perception is limited to the Breadth of ones knowledge"

Sun 19th July 1009
"Live in a fantasy and your life will be a delusion."

Mon 20th July 1009
"Nature loves curves, Man loves Geometry, try not to square peoples natures with the latter."

Tue 21st July 1009
"Our interactions with others leaves impressions, try to leave lasting and positive ones only."

Wed 23rd July 1009
"Reality is - Waking up and realising you are not where you could have been in life."

Thu 24th July 1009
"The Wise sleep when they can, the young sleep because thy need to, fools sleep anywhere and anytime."

Fri 25th July 1009
"Time is a man made illusion invented by some control freak somewhere back in history."

Saturday, July 11, 2009

A Daily Quote from Boffins Neuron - 11th to 17th July 2009

A Daily Quote from Boffib1157's Neuron to start each day...

Saturday 11th July 2009
"Reality is - Waking up and realising the World was there all the time waiting for you to join in."

Sunday 12th July 2009
"Religious leaders & Philosophers will always disagree with each other till one of them proves God exists and the other has an ex-directory phone number to prove they are right."

Monday 13th July 2009
"After you have learnt, copied, mimicked, aped, suffered, and reacted to life, how much of the real you is there left?"Tuesday 14th July 2009"Unbiased imagination very often leads to 'Unconquerable' progress that furthers the interests of many rather than a few."

Wednesday 15th July 2009
"Spare a thought and some time for those around us with 'Invisible Injuries' from life - Not just those who have 'Visible Injuries' for a short’ish while."

Thursday 16th July 2009

"A thought provoking quote a day, keeps the cobwebs at bay."

Friday 17th July 2009
"Throw something away and it will be needed, keep what is not and it never is needed till thrown away."

Monday, June 8, 2009

A job well done by Gmail team

Last night in front of my very eyes;

My personal Gmail account was compromised.

Yes, folks it can happen that quickly.

Gmails team swung into action very very quickly on receipt of my report.

Once they received my report it they acted very quickly to sort the problem out.

The whole process from noticing to getting my Gmail account back took exactly 22 minutes.

Thanks Gmail team, well done!

Saturday, May 23, 2009

Doctor - Some health questions on my mind....

HEALTH QUESTIONS

Q: Doctor, I've heard that cardiovascular exercise can prolong life. Is this true?
A: Your heart is only good for so many beats, and that's it...don't waste them on exercise. Everything wears out eventually. Speeding up your heart will not make you live longer; that's like saying you can extend the life of your car by driving it faster. Want to live longer? Take a nap.

Q: Should I cut down on meat and eat more fruits and vegetables?
A: You must grasp logistical efficiencies. What does a cow eat? Hay and corn. And what are these? Vegetables. So a steak is nothing more than an efficient mechanism of delivering vegetables to your system. Need grain? Eat chicken. Beef is also a good source of field grass (green leafy vegetable). And a pork chop can give you 100% of your recommended daily allowance of vegetable products.

Q: Should I reduce my alcohol intake?
A: No, not at all. Wine is made from fruit. Brandy is distilled wine. That means they take the water out of the fruity bit so you get even more of the goodness that way. Beer is also made out of grain. Bottoms up!

Q: How can I calculate my body/fat ratio?
A: Well, if you have a body and you have fat, your ratio is one to one. If you have two bodies, your ratio is two to one, etc.

Q: What are some of the advantages of participating in a regular exercise program?
A: Can't think of a single one, sorry. My philosophy is: No Pain...Good!

Q: Aren't fried foods bad for you?
A: YOU'RE NOT LISTENING!!! ..... Foods are fried these days in vegetable oil. In fact, they're permeated in it. How could getting more vegetables be bad for you?

Q: Will sit-ups help prevent me from getting a little soft around the middle?
A: Definitely not! When you exercise a muscle, it gets bigger. You should only be doing sit-ups if you want a bigger stomach.

Q: Is chocolate bad for me?
A: Are you crazy? HELLO! Cocoa beans! Another vegetable!!! It's the best feel-good food around!

Q: Is swimming good for your figure?
A: If swimming is good for your figure, explain whales to me.

Q: Is getting in-shape important for my lifestyle?
A: Hey! 'Round' is a shape!

Well, I hope this has cleared up any misconceptions you may have had about food and diets.

And remember:

'Life should NOT be a journey to the grave with the intention of arriving safely in an attractive and well preserved body, but rather to skid in sideways - Chardonnay in one hand - chocolate in the other - body thoroughly used up, totally worn out and screaming 'WOO HOO, What a Ride!'

AND FINALLY...

For those of you who watch what you eat, here's the final word on nutrition and health. It's a relief to know the truth after all those conflicting nutritional studies.

1. The Japanese eat very little fat and suffer fewer heart attacks than Englishmen and Americans.

2. The Mexicans eat a lot of fat and suffer fewer heart attacks than Englishmen and Americans.

3. The Chinese drink very little red wine and suffer fewer heart attacks than Englishmen and Americans.

4. The Italians and French drink a lot of red wine and suffer fewer heart attacks than Englishmen and Americans.

5. The Germans drink a lot of beers and eat lots of sausages and fats and suffer fewer heart attacks than Englishmen and Americans.

6. Algerians have almost no sex and suffer fewer heart attacks than Englishmen and Americans.

7. Brazilians seldom stop having sex and suffer fewer heart attacks than Englishmen and Americans.

CONCLUSION

Eat and drink what you like. Speaking English is apparently what kills you.

Tuesday, January 13, 2009

Who Did You Ignore Today Then?


A wonderful collection of anecdotes for you to read, inwardly digest, share and (I trust) put into daily use.

First Lesson - Cleaning Lady.

During my second month of college, our professor gave us a pop quiz. I was a conscientious student and had breezed through the questions until I read the last one: 'What is the first name of the woman who cleans the school? Surely this was some kind of joke. I had seen the cleaning woman several times. She was tall, dark-haired and in her 50's, but how would I know her name?

I handed in my paper, leaving the last question blank. Just before class ended, one student asked if the last question would count toward our quiz grade. 'Absolutely,' said the professor. 'In your careers, you will meet many people. All are significant. They deserve your attention and care, even if all you do is smile and say 'hello.'


Second Lesson – Helping Strangers

One night, at 11:30 p.m., an older African American woman was standing on the side of an Alabama highway trying to endure a lashing rainstorm. Her car had broken down and she desperately needed a ride. Soaking wet, she decided to flag down the next car. A young white man stopped to help her; generally unheard of in those conflict-filled 60's... The man took her to safety, helped her get assistance and put her into a taxicab.

She seemed to be in a big hurry, but wrote down his address and thanked him. Seven days went by and a knock came on the man's door. To his surprise, a giant console colour TV was delivered to his home. A special note was attached...

It read: 'Thank you so much for assisting me on the highway the other night. The rain drenched not only my clothes, but also my spirits. Then you came along. Because of you, I was able to make it to my dying husband's bedside just before he passed away ... God bless you for helping me and unselfishly serving others.'

Sincerely; Mrs. Nat King Cole.


Third Lesson - Always remember those who serve.

In the days when an ice cream sundae cost much less, a 10-year-old boy entered a hotel coffee shop and sat at a table. A waitress put a glass of water in front of him. 'How much is an ice cream sundae?' he asked. 'Fifty cents,' replied the waitress.

The little boy pulled his hand out of his pocket and studied the coins in it. “Well, how much is a plain dish of ice cream?” he inquired. By now more people were waiting for a table and the waitress was growing impatient. 'Thirty-five cents,' she brusquely replied.

The little boy again counted his coins. 'I'll have the plain ice cream,' he said. The waitress brought the ice cream, put the bill on the table and walked away. The boy finished the ice cream, paid the cashier and left. When the waitress came back, she began to cry as she wiped down the table. There, placed neatly beside the empty dish, were 2 nickels and 5 pennies... You see, he couldn't have the sundae, because he had to have enough left to leave her a tip.


Fourth Lesson – Life’s obstacles in our path.

In ancient times, a King had a boulder placed on a roadway. Then he hid himself and watched to see if anyone would remove the huge rock. Some of the king's wealthiest merchants and courtiers came by and simply walked around it. Many loudly blamed the King for not keeping the roads clear, but none did anything about getting the stone out of the way.

Then a peasant came along carrying a load of vegetables. Upon approaching the boulder, the peasant laid down his burden and tried to move the stone to the side of the road. After much pushing and straining, he finally succeeded. After the peasant picked up his load of vegetables, he noticed a purse lying in the road where the boulder had been. The purse contained many gold coins and a note from the King indicating that the gold was for the person who removed the boulder from the roadway. The peasant learned what many of us never understand! Every obstacle presents an opportunity to improve our condition.


Fifth Lesson - Giving when it Counts...

Many years ago, when I worked as a volunteer at a hospital, I got to know a little girl named Liz who was suffering from a rare & serious disease. Her only chance of recovery appeared to be a blood transfusion from her 5-year old brother, who had miraculously survived the same disease and had developed the antibodies needed to combat the illness.. The doctor explained the situation to her little brother, and asked the little boy if he would be willing to give his blood to his sister.

I saw him hesitate for only a moment before taking a deep breath and saying, 'Yes I'll do it if it will save her.' As the transfusion progressed, he lay in bed next to his sister and smiled, as we all did, seeing the colour returning to her cheek. Then his face grew pale and his smile faded.

He looked up at the doctor and asked with a trembling voice, 'Will I start to die right away'.
Being young, the little boy had misunderstood the doctor; he thought he was going to have to give his sister all of his blood in order to save her but he had chosen to save her anyway.

Wednesday, December 24, 2008

20 Economic Models.........as explained with Cows


SOCIALISM
You have 2 cows.
You give one to your neighbor.

COMMUNISM
You have 2 cows.
The State takes both and gives you some milk.

FASCISM
You have 2 cows.
The State takes both and sells you some milk.

NAZISM
You have 2 cows.
The State takes both and shoots you.

BUREAUCRATISM
You have 2 cows.
The State takes both, shoots one, milks the other, and then throws the milk away...

TRADITIONAL CAPITALISM
You have two cows.
You sell one and buy a bull.
Your herd multiplies, and the economy grows.
You sell them and retire on the income.

SURREALISM
You have two giraffes.
The government requires you to take harmonica lessons

AN AMERICAN CORPORATION
You have two cows.
You sell one, and force the other to produce the milk of four cows.
Later, you hire a consultant to analyze why the cow has dropped dead.

ENRON VENTURE CAPITALISM
You have two cows.
You sell three of them to your publicly listed company, using letters of credit opened by your brother-in-law at the bank, then execute a debt/equity swap with an associated general offer so that you get all four cows back, with a tax exemption for five cows.
The milk rights of the six cows are transferred via an intermediary to a Cayman Island Company secretly owned by the majority shareholder who sells the rights to all seven cows back to your listed company. The annual report says the company owns eight cows, with an option on one
more. You sell one cow to buy a new president of the
United States, leaving you
with nine cows. No balance sheet provided with the release.
The public then buys your bull.

A FRENCH CORPORATION
You have two cows.
You go on strike, organize a riot, and block the roads, because you want three cows.

A JAPANESE CORPORATION
You have two cows.
You redesign them so they are one-tenth the size of an ordinary cow and produce twenty times the milk. You then create a clever cow cartoon image called 'Cowkimon' and market it worldwide.

A GERMAN CORPORATION
You have two cows.
You re-engineer them so they live for 100 years, eat once a month, and milk themselves.

AN ITALIAN CORPORATION
You have two cows,
but you don't know where they are. You decide to have lunch.

A RUSSIAN CORPORATION
You have two cows.
You count them and learn you have five cows. You count them again and learn you have 42 cows.
You count them again and learn you have 2 cows. You stop counting cows and open another bottle of vodka.

A SWISS CORPORATION
You have 5000 cows. None of them belong to you.
You charge the owners for storing them.

A CHINESE CORPORATION
You have two cows.
You have 300 people milking them.
You claim that you have full employment, and high bovine productivity.
You arrest the newsman who reported the real situation.

AN INDIAN CORPORATION
You have two cows.
You worship them.

A BRITISH CORPORATION
You have two cows.
Both are mad.

AN IRAQI CORPORATION
Everyone thinks you have lots of cows.
You tell them that you have none. No-one believes you, so they bomb the fcuk out of you and invade your country. You still have no cows, but at least now you are part of Democracy....

AN AUSTRALIAN CORPORATION
You have two cows.
Business seems pretty good. You close the office and go for a few beers to celebrate.

Monday, December 22, 2008

Merry Xmas to all our 5021 Friends and Contacts!


A Christmas greeting to all of our friends and contacts around this 'Global Village'

Seasons greetings and a Happy new year to you all!
Peter, Cristina and Mihai


Thursday, November 27, 2008

Communication - The Three P's

Three not so little words that speak volumes - or do they, do they fall on deaf ears, or kick-start your Neurons?

P Put known knowledge to use effectively.
U Use what you know to learn even more.
R React and respond to questions raised.
P Put your new knowledge to daily use.
O Observe and learn from any mistakes made.
S Seek further advice to learn much more.
E Each day has something new for you to learn.


P Put your thoughts into words.
R Reach out and share with others.
O Observe and help others grow as well.
G Grow your knowledge and experience gradually.
R Remember your weaker areas and improve on them.
E Each day is a clean page in your life.
S Sitting back and criticising others helps no one at all.
S Step in and help others grow as weak areas emerge.


P People do not always say what they see.
E Each one of us is very different from yourself.
R Reach out and share your knowledge with others.
C Care that your message is in not in coded form.
E Each case has similarities that are different in some way.
P Patience when you reveal any new truths to others.
T Time is on your side if you can be patient and have support.
I Instincts and awareness work well together.
O Others may not see as clearly as you do at this time.
N Never forget others may not like your choice of words.

Sunday, November 16, 2008

Reality is... - Quotes from my Neuron

"Reality is - Fiction turned into Fact."

"Reality is - Waking up and seeing what you could have done would have helped others as well."

"Reality is - Realising that Technology is not the answer to problems, we are the answer to life’s problems."

“Reality is - Recognising that if an element of doubt exists, then you have a starting point for further progress or clarification to begin."

“Reality is - Realising that sharing an opinion is far better than keeping a thought inside your own head.”