Wednesday 17 April 2013

Best Quotes to Remember


BEST QUOTES


1. EVERY ONE KNOWS ABOUT ALEXANDER GRAHAM BELL, WHO
    INVENTED PHONES, BUT HE NEVER MADE A CALL TO HIS FAMILY.
   ……   BECAUSE HIS WIFE AND DAUGHTER WERE DEAF.

             THAT'S LIFE - " LIVE FOR OTHERS! ".


2. THE WORST THING IN LIFE IS "ATTACHMENT " ... IT HURTS WHEN YOU LOSE IT.
   THE BEST THING IN LIFE IS " LONELINESS " BECAUSE IT TEACHES YOU EVERYTHING
    AND WHEN YOU LOSE IT YOU GET EVERYTHING.


3. LIFE IS NOT ABOUT THE PEOPLE WHO ACT TRUE TO YOUR FACE ...
    ITS ABOUT THE PEOPLE WHO REMAIN TRUE BEHIND YOUR BACK.


4. IF AN EGG IS BROKEN FROM OUTSIDE FORCE ... A LIFE ENDS.
    IF AN EGG BREAKS FROM WITHIN ........... LIFE BEGINS
    GREAT THINGS ALWAYS BEGAN FROM WITHIN.


5.  ITS BETTER TO LOSE YOUR EGO TO THE ONE YOU LOVE
    THAN TO LOOSE THE ONE YOU LOVE ... TO  YOUR EGO.


6. A RELATIONSHIP DOESN'T SHINE BY JUST SHAKING HANDS  IN GOOD TIMES.
    BUT IT BLOSSOMS BY HOLDING FIRMLY IN CRITICAL SITUATIONS.


7.  HEATED GOLD BECOMES ORNAMENTS.
     BEATEN COPPER BECOMES WIRES.
     DEPLETED STONE BECOMES STATUE.

     SO MORE PAIN, MORE GAIN (VALUE).


8.  WHEN YOU TRUST SOMEONE TRUST HIM COMPLETELY
     WITHOUT ANY DOUBT ...  AT THE END YOU WOULD GET ONE OF THE TWO :

     EITHER A LESSON FOR YOUR LIFE OR A VERY GOOD PERSON.


9.  WHY DO WE HAVE SO MANY TEMPLES, IF GOD IS EVERYWHERE?
      A WISE MAN SAID:  AIR IS EVERYWHERE

     BUT WE STILL NEED A FAN TO FEEL IT.



Save Your PC


TIPS TO SAVE YOUR PRIVACY IN NETWORK

          New malware is still being introduced at an alarmingly exponential rate: In the last five years alone it has risen by approximately 5,000%. Such growth rates may be any shareholder's dream but here they are evidence of the immense profitability of the hacker industry. Your personal data, online connections or even access to your PC make the cash registers ring. This makes developing increasingly sophisticated and less easily detected ways of infecting your PC, more and more lucrative for clever programmers. However there is no need to panic, as we will show you in this article how to avoid unnecessary risks and how to keep on surfing the web with your PC safely in 2013! 


1 - Keep Your System up-to-date

We all know that update notifications can be annoying. Still, your PC and all installed programs should always be up-to-date. Malware programmers often use newly discovered software weaknesses (so-called "vulnerabilities") to smuggle their malware onto your PC via exploits. Therefore it is of utmost importance to update your software on a regular basis (especially if it is widely used) in order to close potential security gaps as soon as possible. The following software on your PC should always be kept up-to-date:
·         OS (Windows operating system)
·         Your browser: MS Internet Explorer, Firefox, Chrome, Opera, etc.
·         Adobe Acrobat Reader
·         Adobe Flash Player
·         Java Runtime
·         Apple Quicktime Video Player
·         Your media player (VLC, iTunes, Windows Media Player)

2 - Use Secure Passwords

 

Your PC can be as secure as a safe, but that is useless if an unauthorized person gets their hands on the keys. Regardless of whether it is your Windows login, web mail or a password to a website: use only secure passwords! A secure password consists of at least eight characters and contains a number, an uppercase letter and a special character, such as "ApL47bAk!". Avoid common words like names and use different passwords for all your accounts and connections. If you use one password for all, a hacker gains access to all your data just by cracking one password successfully. To keep track of several passwords, we recommend using a password manager.

3 - Use a Router

It is common these days for internet connection packages to include a router. A router enables several devices to simultaneously use the same internet connection. From a security standpoint, this is a huge advantage as your PC does not connect to the web directly, which makes it difficult to directly address and attack it. If, for whatever reason, you still do not have a router, you should consider it a good investment. The same rules apply here: always keep the router up-to-date with regular firmware updates and use a secure admin password.

4 - Avoid File Sharing Websites


Apart from the fact that they mostly offer illegal content, file sharing websites are among the most common sources for malware infections. Cracked programs or so-called key generators ("keygens") in particular are often infected with malware. It is safer to download original software from the manufacturer's website or from well-known download sites.

5 - Use Restricted User Accounts

 

Many Windows users use the administrator account. As an administrator, you have unrestricted access to modifying important system settings, which allows malware executed as an administrator to spread with ease. If you have Windows XP you should use an account with restricted user rights for working and browsing the web. Windows Vista, 7 and 8 come with a built-in and redesigned User Account Control (UAC). Any process likely to cause damage or be a threat to the security of your system needs the administrator's permission to do so. Never grant administrator rights to any unknown or suspicious programs!

6 - Avoid Dubious Websites and E-mail Attachments

Today, most malware is spread via so-called "drive-by downloads". Modern websites use technologies that enable the continuous communication between your browser and the web server without asking you, the user, for confirmation. Programmers of criminal websites rely on this technology to take advantage of security gaps in various browsers. We recommend staying away from any dubious or shady websites (file sharing, warez and erotic websites in particular) and to keep your browser up-to-date as described in point 1.
E-mail attachments are another popular way of spreading malware. Use of a good spam filter is the most effective solution. Always remain skeptic if you receive e-mails from unknown senders and pay particular attention to any attachments before opening them; executable files like .exe are often disguised as documents or images. E-mails with password-protected zip archives attached are almost always malware and cannot be checked by virus scanners due to this password protection. For more information on this topic and fake e-mails please refer to our article Current E-mail traps.

7 – Be careful when using WiFi 

 

There are many public WiFi hotspots available free of charge that allow you to check your e-mails and surf the Internet when you are on the go using your laptop or smartphone. But whenever you log into a website or check your e-mails via an unsecured WiFi connection, others can read your log-in data. This applies when logging in to online-banking sites, forums, web mail, ebay or Facebook – in a general, to any login. When using public WiFi hotspots, avoid sending confidential data unless it is absolutely necessary, and even then only over a secure connection!
You can recognize a secure connection to a site by the presence of "https://" in the address bar (HTTPS = Hypertext Transfer Protocol Secure). If using e-mail software, you should enable secure authentication within the software. Comprehensive tips on how to securely use WiFi networks can also be found in Emsisoft's knowledgebase: How to use your WiFi securely and efficiently at home and on the go.

8 – Beware of download wrappers and automatically activated check boxes

After downloading useful software from the web, you may often find a new browser or tool bar has unexpectedly appeared on your PC. This is often due to inattentive users rapidly clicking on "Next" during installation. Many companies have unfortunately come to bundle their software with other programs, due to financial reasons. Confirmation should be required at installation time, but the corresponding check boxes are generally already preselected, meaning you must uncheck them in order to avoid installing the additional software. A general fact: Any program installed on your PC not only consumes space on your hard drive as well as system resources, but also represents a potential source of risk through exploits.
Download wrappers are even nastier. Some download portals resort to them to download the intended target file. You thus receive the download wrapper first instead of the desired file. The wrapper then downloads the desired software onto your PC. This allows for the display of annoying banner ads during the download and installation or may even aggressively trick you into downloading other software or tool bars that you do not want. As if this is not already bad enough, this practice opens the floodgates to hackers. So please pay close attention when downloading and installing and have a look at our article on download wrappers.

9 – Take extra care when using online banking

Users of online-banking are generally more conscious of the risks they take when performing online transactions than with any other online service. This isn't surprising, because if the wrong person gets their hands on your login details or in the worst case your TAN numbers as well, they can easily empty your account from anywhere in the world. And this may happen faster than you think if you don't use good security software.
Even secured connections are of no use against "man-in-the-browser" attacks. Careful browsing is not enough, either, as your PC can be infected via compromised ad networks on regular websites. For a good overview of potential risks, please refer to the article Dangers to your bank account – how to perform online-banking securely. Incidently, Emsisoft Anti-Malware has recently been awarded for its excellent protection in online banking. Only 4 out of 32 tested programs passed – at the forefront: Emsisoft Anti-Malware.

Short Story (Five More Minutes)

Five More Minutes

fatherson


While at the park one day, a woman sat down next to a man on a bench near a playground. "That's my son over there," she said, pointing to a little boy in a red sweater who was gliding down the slide. "He's a fine looking boy" the man said. 
"That's my daughter on the bike in the white dress."
Then, looking at his watch, he called to his daughter. "What do you say we go, Melissa?" Melissa pleaded, "Just five more minutes, Dad. Please? Just five more minutes."
 
The man nodded and Melissa continued to ride her bike to her heart's content. Minutes passed and the father stood and called again to his daughter. "Time to go now?"
Again Melissa pleaded, "Five more minutes, Dad. Just five more minutes." The man smiled and said, "OK." "My, you certainly are a patient father," the woman responded.
The man smiled and then said, "Her older brother Tommy was killed by a drunk driver last year while he was riding his bike near here. I never spent much time with Tommy and now I'd give anything for just five more minutes with him. I've vowed not to make the same mistake with Melissa. She thinks she has five more minutes to ride her bike. The truth is, I get Five more minutes to watch her play."
Moral: Life is all about making priorities, and family is one and only priority on top of all other, so spend all time you can with loved ones.

Where Datas saved in Internet (Google)



We used Google and You Tube many a times, but have we ever peeked into the Google data centers farms, below a snapshot of the same.
 
Google allows first ever look at the eight vast data centers that power the online world


Google has given a rare glimpse inside the vast data centers around the globe that power its services.
They reveal an intricate maze of computers that process Internet search requests, show YouTube video clips and distribute email for millions of people.
With hundreds of thousands of servers, colorful cables and even bicycles so engineers can get around quickly, they range from a converted paper mill in Finland to custom made server farms in Iowa.



The online gallery reveal the interior of eight of Google's secretive server farms around the globe, from Finland to Iowa

WHERE ARE THE SERVERS?

Google's major data centers are located in: 
  • Berkeley County, S.C. 
  • Council Bluffs, Iowa 
  • Douglas County, Ga. 
  • Mayes County, Okla. 
  • Lenoir, N.C. 
  • The Dalles, Ore. 
  • Hamina, Finland 
  • St. Ghislain, Belgium.
New data centers are currently being built in Quilicura, Chile; Hong Kong, Singapore and Taiwan.

'Very few people have stepped inside Google's data centers, and for good reason: our first priority is the privacy and security of your data, and we go to great lengths to protect it, keeping our sites under close guard,' the firm said.
'While we've shared many of our designs and best practices, and we've been publishing our efficiency data since 2008, only a small set of employees have access to the server floor itself.
'Today, for the first time, you can see inside our data centers and pay them a virtual visit.
'On Where the Internet lives, our new site featuring beautiful photographs by Connie Zhou, you'll get a never-before-seen look at the technology, the people and the places that keep Google running.'
The site features photos from inside some of the eight data centers that Google Inc. already has running in the U.S., Finland and Belgium.
Google is also building data centers in Hong Kong, Taiwan, Singapore and Chile.
Virtual tours of a North Carolina data center also will be available through Google's 'Street View' service, which is usually used to view photos of neighborhoods around the world.
The photographic access to Google's data centers coincides with the publication of a Wired magazine article about how the company builds and operates them.
The article is written by Steven Levy, a journalist who won Google's trust while writing 'In The Plex,' a book published last year about the company's philosophy and evolution.


One of Google's server farms in Council Bluffs, Iowa, which provides over 115,000 square feet of space for servers running services like Search and YouTube


Google colour codes its servers depending on their location, while piping in the buildings is coded depending on what it carries - with cool water in blue tubes and warm in red



Google's Douglas County data centre in Georgia is so large the firm provides Google branded bicycles for staff to get around on

The data centers represent Google's nerve center, although none are located near the company's headquarters in Mountain View, Calif.
As Google blossomed from its roots in a Silicon Valley garage, company co-founders Larry Page and Sergey Brin worked with other engineers to develop a system to connect low-cost computer servers in a way that would help them realize their ambition to provide a digital roadmap to all of the world's information.
Initially, Google just wanted enough computing power to index all the websites on the Internet and deliver quick responses to search requests. As Google's tentacles extended into other markets, the company had to keep adding more computers to store videos, photos, email and information about their users' preferences.
The insights that Google gathers about the more than 1 billion people that use its services has made the company a frequent target of privacy complaints around the world.
The latest missive came Tuesday in Europe, where regulators told Google to revise a 7-month-old change to its privacy policy that enables the company to combine user data collected from its different services.
Google studies Internet search requests and Web surfing habits in an effort to gain a better understanding of what people like. The company does this in an effort to show ads of products and services to the people most likely to be interested in buying them. Advertising accounts for virtually all of Google's revenue, which totaled nearly $23 billion through the first half of this year.
Even as it allows anyone with a Web browser to peer into its data centers, Google intends to closely guard physical access to its buildings. The company also remains cagey about how many computers are in its data centers, saying only that they house hundreds of thousands of machines to run Google's services.
Google's need for so many computers has turned the company a major electricity user, although management says it's constantly looking for ways to reduce power consumption to protect the environment and lower its expenses.


Here hundreds of fans funnel hot air from the server racks into a cooling unit to be recirculated in Oklahoma. The green lights are the server status LEDs reflecting from the front of the servers


The Iowa campus network room, where routers and switches allow data centers to talk to each other. The fiber cables run along the yellow cable trays near the ceiling.


Even the water pipes reflect Google's brand: These colorful pipes are responsible for carrying water in and out of an Oregon data center. The blue pipes supply cold water and the red pipes return the warm water back to be cooled.


In Hamina, Finland, Google chose to renovate an old paper mill to take advantage of the building's infrastructure as well as its proximity to the Gulf of Finland's cooling waters.


Google's server farm in Douglas County, Iowa


The exterior of a Dulles, Oregon server farm


Denise Harwood, a Google Engineer, diagnoses an overheated CPU. For more than a decade, Google has built some of the world's most efficient servers.


A Google data center in Council Bluffs, Iowa.


Each server rack has four switches, connected by a different coloured cable. Colours are kept the same throughout data centres so staff know which one to replace in case of failure.

Credit Card Saving Tips

 

Useful credit card saving tips


A vast majority of credit card users are unaware as to how their card functions and what rules they must abide with in order to incur minimal fees. Many of them don't realise for the fact that they can put their credit cards to work. Instead of thinking it as an indispensible evil and subsequently paying penalties, interest charges and late fees one must duly comprehend the cost saving element of their card that is in-built in it. Here are a few basic but effective tips, how you can save money by the use of a credit card.

  • Never carry more than one credit card. Although it may sound like financial conservativeness, it's the right way to go. When it comes to plastic card- less is more.
  • Avoid carrying a balance on your card as it is the most expensive way of borrowing cash.
  • Prefer credit card over debit card – why to use your own money when you can get through the month on someone else's money.
  • Always pay your card's bills well within the prescribed time, thus avoid getting charged for late payment.
  • Have a detailed look at your monthly statement and ensure that you were not double charged, received credits from all your returns and charged for purchases you never did.
  • Opt for reward cards, so long you are spending money anyway, why not earn some points.
  • Keep a check on your credit score as it will fetch you higher credit limits along with better rates.
  • Avoid taking cash advances with your card as you are liable to pay interest from the very get go. It is exorbitantly expensive, hence should be avoided.
  • Be within you credit limits to avoid penalties.
  • Be caution to zero percent interest rate teasers as nothing comes without a price tag. It may be free for initial few months but usually it is adjusted as time progresses.
  • Define your credit card budget so you don't overshoot it.

Body Language

BODY LANGUAGE

Body language is the gestures, postures and facial expressions through which a person communicates.

Would it not be exciting if you could read and interpret body language allowing you an access to the mood and thoughts of the person in front of you?
If you could read and understand the body language of your spouse, boss or client, you might be able to persuade them or close a deal more effectively by doing things that are exactly in harmony with their thoughts and mood! Imagine having that kind of power of persuasion in your hands!

What is body language?
Body language means non-verbal signals what people use to communicate – like stance, gestures and facial expressions. Experts opine that non-verbal signals account for more than 60 per cent of our daily communication. These non-verbal communications – facial expressions to movement of our body convey more information about us than we can imagine!
So, how can body language help you understand people better? Read on to learn more
Handshake
Imagine being able to accurately predict that state of mind/mood or thoughts of a person while shaking hands with him/her!
Here's what a handshake can tell you:
  • A firm handshake with the palm pointing downwards always means that the person is confident.
  • A wilted handshake with the palm pointing upwards means that the person is either shy or nervous or tensed.
  • If the person's palm comes in contact with your palm it means that the person is sincere and has nothing to hide.
  • An extended arm shows that a person is enthusiastic and confident.

Eyes

  • Those who look at everything else but you while you are talking to them might be a sign of nervousness or distraction. It might also indicate submissiveness.
  • If the person looks at you with a side glance or obliquely, it could mean that he/she is distrustful or unconvinced.
  • Staring at the ground or looking down could mean they are upset or trying to hide something emotional.

Clenched fist

Clenching fists could imply aggressiveness or negativity. A person with clenched fist may be conveying frustration or anger. He might also be resisting your views or opinions and it may also be a sign of defensiveness.

Mouth

  • A person with pursed lips may be indicating distaste, disapproval or distrust.
  • If the person is biting his/her lips it could mean worry or stress.
  • And a person with a covered mouth could be hiding a smile or smirk or an emotional reaction.

 Arms and legs

While evaluating body language, look out for these signs that the arms and legs may convey:
  • Crossed arms could mean that the person is not open to social influence. Though a lot of people may cross their arms, it could still mean that they are reserved or self-protective.
  • People who stand with their hands placed on their hips indicate that they are in control or it could also be a sign of aggressiveness.
  • Crossed leg could be an indication that the person is in need of privacy.
  • Fidgeting fingers and hands indicate that the person is impatient, bored or even angry.
  • Tapping of foot, shifting of weight or frequent movement of foot could mean that the person is nervous, excited, impatient or intimidated.

Conclusion

Reading the signals that people send out through their body language is an excellent social skill. While, some of us can read it almost instantly, there are some who are quite oblivious. So with a tad bit of attention you can read body language and with slightly more practice, it can become second nature!
All the best my Friends...Start using Body Languge expressions...to communicate better...!

Brain

BRAIN


1) There are no pain receptors in the brain, so the brain can feel no pain.

2) The human brain is the fattest organ in the body and may consists of at least 60% fat.


3) Neurons develop at the rate of 250,000 neurons per minute during early pregnancy.


4) Humans continue to make new neurons throughout life in response to mental activity.


5) Alcohol interferes with brain processes by weakening connections between neurons.




6) Altitude makes the brain see strange visions – Many religions involve special visions that occurred at great heights. For example, Moses encountered a voice emanating from a burning bush on Mount Sinai and Muhammad was visited by an angel on Mount Hira. Similar phenomena are reported by mountain climbers, but they don't think it's very mystical. Many of the effects are attributable to the reduced supply of oxygen to the brain. At 8,000ft or higher, some mountaineers report perceiving unseen companions, seeing light emanating from themselves or others, seeing a second body like their own, and suddenly feeling emotions such as fear. Oxygen deprivation is likely to interfere with brain regions active in visual and face processing, and in emotional events.


7) Reading aloud and talking often to a young child promotes brain development.


8 ) Information travels at different speeds within different types of neurons. Not all neurons are the same. There are a few different types within the body and transmission along these different kinds can be as slow as 0.5 meters/sec or as fast as 120 meters/sec.


9) The capacity for such emotions as joy, happiness, fear, and shyness are already developed at birth. The specific type of nurturing a child receives shapes how these emotions are developed.


10) The left side of your brain (left hemisphere) controls the right side of your body; and, the right side of your brain (right hemisphere) controls the left side of your body.


11) Children who learn two languages before the age of five alters the brain structure and adults have a much denser gray matter.


12) Information can be processed as slowly as 0.5 meters/sec or as fast as 120 meters/sec (about 268 miles/hr).


13) While awake, your brain generates between 10 and 23 watts of power–or enough energy to power a light bulb.


14) The old adage of humans only using 10% of their brain is not true. Every part of the brain has a known function.


15) A study of one million students in New York showed that students who ate lunches that did not include artificial flavors, preservatives, and dyes did 14% better on IQ tests than students who ate lunches with these additives.


16) For years, scientists believed that tinnitus was due to a function within the mechanics of the ear, but newer evidence shows that it is actually a function of the brain.


17) Every time you recall a memory or have a new thought, you are creating a new connection in your brain.


18) Memories triggered by scent have a stronger emotional connection, therefore appear more intense than other memory triggers.


19) Each time we blink, our brain kicks in and keeps things illuminated so the whole world doesn't go dark each time we blink (about 20,000 times a day).


20) Laughing at a joke is no simple task as it requires activity in five different areas of the brain.


21) The average number of thoughts that humans are believed to experience each day is 70,000.


22) There are two different schools of thought as to why we dream: the physiological school, and the psychological school. While many theories have been proposed, not single consensus has emerged as to why we dream. Some researchers suggest that dreams serve no real purpose, while other believe that dreaming is essential to mental, emotional and physical well-being. One theory for dreaming suggests dreams serve to clean up clutter from the mind.


23) The Hypothalamus part of the brain regulates body temperature much like a thermostat. The hypothalamus knows what temperature your body should be (about 98.6 Fahrenheit or 37 Celsius), and if your body is too hot, the hypothalamus tells it to sweat. If you're too cold, the hypothalamus makes you start shivering. Shivering and sweating helps get your body's temperature back to normal.


24) Approximately 85,000 neocortical neurons are lost each day in your brain. Fortunately, this goes unnoticed due to the built-in redundancies and the fact that even after three years this loss adds up to less than 1% of the total.


25) Differences in brain weight and size do not equal differences in mental ability. The weight of Albert Einstein's brain was 1,230 grams that is less than an average weight of the human brain.


26) A living brain is so soft you could cut it with a table knife.


27) There are about 100,000 miles of blood vessels in the brain.


28) London taxi drivers, famous for knowing all the London streets by heart, have a larger than normal hippocampus, especially the drivers who have been on the job longest. The study suggests that as people memorize more and more information, this part of their brain continues to grow.


29) The brain can live for 4 to 6 minutes without oxygen, and then it begins to die. No oxygen for 5 to 10 minutes will result in permanent brain damage.


30) Our brain often fools us. It often perceives things differently from the reality.