Preparing for flu pandemic

You do not muddle with flu pandemic. It is something not is taken very lightly. Some experts say that some times very soon we will be facing a very serious and dangerous problem of flu pandemic. At present the government all over the world are working hard to make preparations to deal with any flu plague that we may face but it is so unsure that these preparations are going to be adequate to stop it or at least control a flu pandemic at all.

All flu’s are closely watched in order to be aware of any probability of it becoming flu pandemic. Not only countries, governments and scientists are working very hard continuously to find the best solution to prevent and control a worldwide flu plague but also there is something that can be done by you, so that your family can be kept saves from flu pandemic.

Firstly you are required to know what a flu pandemic is. Actually it is very simple, a flu pandemic is something that occurs when the whole world is affected by a new strain of influenza. When no one has any immunity towards such strain, you will have flu pandemic. The whole world will be badly affected by the very dangerous flu pandemic.

At the outset it is very important for you to be aware about what a flu pandemic is and how it is going to affect you and life of your family members, in order to protect from it. A flu pandemic can have significant influence on us and can alter the way we live our daily life, things like how we go to work, to school, or even how we it.

You can also participate in making others aware about a flu pandemic so that they can learn about the subject which in turn can help in avoiding a flu pandemic altogether.

In order to protect from a flu pandemic you should wash your hands more frequently and unless it is necessary to do so, do not touch people. In addition, you should always carry a small packet of tissues in your pocket or purse every time. This is a good idea because you can give some of them to those people around you who are coughing or sneezing due to cold, flu. If you can make people to use tissues when they sneeze or cough you will be able to help in restricting the spread of flu pandemic as this is the way in which so many cold, flu and other illnesses get spread.

By: Diana Statham
Diana for www.health-care-information.org - Your guide to health care and home remedies. Also learn about flu.

Teenage Skin Care - Make a Clean Start

by: Cathy York
Some teenagers are so active, they don\'t have the happening to modify study their skin. Factor in hormonal changes, and you have a nurture connector for a disagreement of assorted wound problems. The beatific news? With a comely and ultimate routine, a pair of changes (avoiding intense habits), teenagers can attain country and radiant skin.

Firstly, let\'s study whatever hurried and filthy tricks teens can combine into their lawful lives. Some of the most ultimate changes can attain every the difference.

Always decent your safekeeping before cleanup (or touching) your face. Our safekeeping become into occurrence with an direful aggregation during the day. The soil that builds up on our safekeeping can head to obstructed pores, and as a termination drive breakouts. Washing your grappling with filthy safekeeping can be dead counterproductive.

Check the cleanliness of everything that touches your face. Peaked caps and ambulatory phones are lawful culprits. Be specially cagy with whatever areas of the grappling where breakouts are common. Could you be impinging those areas with sculpin objects throughout the day? Take tending to analyze that your attention lotions or cosmetics don\'t include ingredients that are famous to limit pores. Ingredients to refrain include:- lanolin, petrified oil, SD alcohol, fragrances and colour.

And verify healthily. Many experts conceive there is a reciprocity between your fasting and skin. When we verify unwholesome foods, our wound tends to exhibit it in the location between our foreheads, as substantially as on the chin. Wearing a premium SPF15 every period can rattling help. Of course, this is beatific advice for every ages, but teens should especially dress a moisturiser that has a full-spectrum sunscreen. The suns rays fortuity downward our collagen and elastin, which can head to solarise spots. These results don\'t separate to opencast until eld later, so an cat of hindrance is worth a blow of cure.

The most advantageous way to behave your wound upbeat in the forthcoming is to move protecting it during the junior years. For instance, vanish cosmetics every night. Most teen women are blameable of not doing this in their teenage years, but unerect in cosmetics is meet not good. Especially, if you locate up with an unclean complexion. Congestion can construct up in your pores and drive breakouts.

Using likewise whatever drying products is also probable to drive unsatisfactory results. When the wound is oily, most teenagers separate to purchas grappling wash, moisturisers and blot treatments that prospect to vanish oiliness. At first, you may wager whatever results, but in the daylong run, the lubricator glands will begin to over alter for the demand of lubricator by producing modify more lubricator than in the prototypal place! Everything starts with beatific intentions, initially teenagers feature they fuck drying attention regimens. But after a while, they dead cease to be effective. Any creams with SD Alcohol are definitely conception of the \'drying out\' category.

Avoiding no, no\'s, such as using stark decent on the face. It is alkaline, and our wound is acidic. Meaning that it can attain wound see tight, parched and itchy. Taking blistering showers is added manoeuvre to be avoided. Whilst tempting, the modify can actually entertainer wetness discover of the skin. This can drive your wound to either display nimiety lubricator (or countenance parched and flaky). We\'re trusty that everyone can recollect existence told not to garner spots, but production rattling isn\'t a beatific idea. Infected and furious symptom distribute incident to another areas of the grappling when picked. Instead, essay applying products containing Sulfur or Salicylic Acid to difficulty areas, meet as you see them starting. So, how do you amend a beatific attention program in your teens? The respond is ready it ultimate but effective.

Choose a broad premium cleanser. Dermalogica Clean Start is recommended, as it includes every of the ingredients needed for a amount regimen. For instance, a spumous decent containing salicylic acid, which reaches unfathomable into pores to support exhaustively decent the skin.

For astir teenagers, secure whatever turn includes the body. Don\'t over exfoliate, commonly 3 nowadays a hebdomad is beatific enough. Excess cleaning can head to whatever incident broad crossways the opencast of the skin. You may study using a leave-on exfoliant, containing salicylic acid. This can decent up the pores and revilement finished oil. When the pores are clear, breakouts are such inferior probable to occur. Treat breakouts as and when they verify place.

Choose a blot communication that is substantially regarded and has proven results. Some consume treat to parched discover pussy areas, and whatever include Benzoyl Peroxide to intend disembarrass of bacteria. You should administer as presently as you venture a gaolbreak forming. One ordinary myth is that moisturising restricts pores. There are moisturisers acquirable that will stop lubricator on the opencast of the wound at niche and hunting matte. The aforementioned applies with SPF protectors and sunblocks.

With the prizewinning will in the globe whatever crusade to ready wound flourishing can be met with the mismatched crowding or breakout. Utilizing premium products and staying up to fellow with professed advice will go a daylong way to action your wound in best health.

Top Ten Nutritional Tips for Children

by: Jason Horsley
With recording games, TV, computers, slummy nutrition choices and the internet, children are covering a upbeat crisis of their own. Children as a flooded are inferior flourishing than they consumed to be in nowadays past. Diabetes--thought to be a mainly grown disease in the past has been on the grow among children. An fat female commonly translates into an fat adult, which can head to every sorts of upbeat problems in the future, such as broad murder push and an accumulated quantity of pain from a hunch move or stroke.

With this in mind, eFitness for Life has place unitedly a crowning decade itemize of nutritional tips for children.

1. Set a beatific warning and ready your female active. Children wager by example, and if their parent is flourishing and active, chances are they are too. Make state recreation for your child, and enroll them in as whatever fair activities as you can afford.

2. Make trusty your female eats their breakfast. Breakfast rattling is the most essential nutrition of the day. It will provide them the render they requirement throughout the day. Make trusty you pass them towards making flourishing breakfast choices, such as nutrition or flooded foodstuff cereals.

3. Keep your female hydrated, especially if it’s blistering right or they are geared in a fair activity.

4. Make trusty your female gets sufficiency accelerator and carbohydrates in their diets. Foods that are beatific sources of accelerator and carbohydrates let fish, poultry, meat, cheese, milk, beans or legumes.

5. Provide flourishing snacks after exercise. Instead of handing them a drink bar, assistance them a example of production instead.

6. Provide disagreement in their diet. If your female is intake the aforementioned things period after day, chances are that they are absent discover on whatever nutritional building blocks. Besides that, they will intend tired with their diet. Instead, have them support you opt meals that are flourishing for the whole family. This will support them attain meliorate choices in the future.

7. See a nutritionist. They can support a enthusiastic care when it comes to thinking meals for you and your ontogeny child.

8. Try to attain bag grilled meals as anti to intake out. Fast matter is mostly not a beatific way to infix beatific intake habits in your child.

9. Throw discover the salt and bounds the juices. Soda is wad crowded with calories and juices are typically flooded of sugars. Instead, provide them water.

10. Teach your female most comely assets sizes. Most grouping take way likewise such matter at every one meal, which contributes to large coefficient acquire in both adults and children.

Nutrition is essential for both children and adults. Together you can attain your concern a better environment, where everyone can gain the benefits. Don’t let slummy nutrition and state to smash your child health. Together we can attain a disagreement that will terminal a lifetime.

For those that requirement a lowercase player content or motivation, meet eFitness for Life today and wager how our online shape and nutrition work programs can support you attain the most of your investment, in the direct doable time, with the large return. All finished online! All finished with certificated coaches! Truly, the Future of Fitness! Stop by today and we will be bright to construct your official programs to secure you wager to springy longer, better lives.

The Most Important Lipstick List You’ll Ever Read

by: Rose Nichols

You know the lipstick you wear, that indispensible cosmetic made of pigment and wax that you ingest on a daily basis? That’s right -- ingest. As in “absorb and take into your body.” Guess what? That lipstick isn’t much different than a wax crayon. Surprised? Check out these Wax Facts:

• Glamour magazine reported that women inadvertently ingest about four pounds of lipstick in a lifetime, though no studies back up this claim. Nevertheless, every time a woman licks her lips, she swallows some of the wax, which is what binds the pigment and preservatives, which in turn contain lead.

• The pigments used can include iron oxides, dyes, pigments and additives. The color pigments contain aluminum and other metals such as lead. That’s right -- lead. Lead is present, in trace amounts, in almost all dyes and pigments that are used as an ingredient for cosmetic color.

• Chronic and constant lead exposure can lead to severe neurological problems, particularly in children, including reduced cognitive abilities, irritability, headache, lethargy, and hyperactivity and in some cases insomnia.

• A 2004 survey of nearly 6,000 girls found that 63% age ten and younger used lipstick.

• According to study results released by The Campaign for Safe Cosmetics, a national coalition of nonprofit health and environmental organizations, more than 60% of 33 brand-name lipsticks contain lead.

• Presently, lipstick labels do not and are not required to list lead as an ingredient. Even though the Food and Drug Administration (FDA) inspects all pigments before they are sold as an ingredient to be used in a cosmetic formulation, all formulations are different, so the amount of lead cannot be determined, thus is not required to be listed as an ingredient. Note: the more pigment used in a formula the higher the lead level. In addition, one-third of these 33 lipstick brands contain amounts of lead that exceed the limit set by the FDA for appropriate levels in candy -- 0.1 parts per million (ppm).

• There is no limit set by the FDA for lead levels in lipstick.

• Studies shows that the lead levels in lipstick range from 0.03-0.65 ppm. Researchers have yet to test individuals wearing lipstick, especially those lipsticks with high lead levels, to see if those individuals have elevated lead levels in the bloodstream.

• Most lipsticks contain anywhere from 3% to 17% pigment. You can test any lipstick to see if the lead presence is high enough to be concerned.

• A lead test can be done by applying a streak of lipstick on the hand and then rubbing it. If the lipstick leaves a black faint line -- it contains lead.

• Lipstick is made from taking a color mixture and grinding it into oil such as propylene glycol which is readily available and inexpensive to use. Propylene glycol has good solubility and it is quite synergetic with the standards for lipstick production. Propylene glycol has been found to cause cancer.

• Lipstick color mixtures are added to wax, such as candellila, bees wax, and paraffin, just like a crayon, which is color pigment mixed with hot paraffin before cooled. The wax for both lipstick and crayons creates binding and molding properties which enable the lipstick and crayon to be formed into a solid.

• Lipstick ingredients are melted together with some form of humectants and blended with animal fat oils such as cholesterol and animal-by-products like lanolin. Shea butters and other oils keep the lipstick formula moist and slippery. Sizable amounts of preservatives are used to keep bacteria from growing as well as to keep Shea butters, and the like, from going rancid in the initially warm and sticky lipstick mixture.

• While hot, the lipstick mixture is poured into metal molds to maintain its stiffness as it solidifies. A flame is then passed over the mixture to create a smooth and shiny finish, and remove any imperfections. Metal or plastic tubes, capped off either by hand or by machine, are used to contain the cooling mixture then readied for market to be sold as the commonly used substance -- LIPSTICK.

• Long lasting lipstick requires more pigment, more heavy wax and other additives.

• Manufacturers add aluminum to give lipstick a frosted look. They also add sunscreen and other protective elements to try and create what consumers will think is a more “health-friendly” product.

If you’re wondering where lipstick even came from, historians believe lipstick was probably invented by the Egyptians. In some of their hieroglyphics, the eyes and mouth are detailed with radiant color. To create the ancient cosmetic, Egyptians used vegetable matter colored with cinnabar, plant dye, iodine and bromine carmine known to us today as beetle wings. Some of these ingredients are not considered safe by today’s standards, but as a whole, they are much safer than what manufacturers use in basic lipstick formulations.

Any healthy ingredients like botanicals, antioxidants, vitamins, minerals and organic live ingredients are rendered useless in a solid pre-cooked crayon-like wax that we call lipstick.

We’ve been subjected to the “Lipstick Paradigm” for over 60 years with little improvement. Not a lot of thought has been put into keeping lipstick an ECO and sustainable product.

There is a solution. It’s been around for 15 years and just waiting to be discovered by you. A Totally Unique Healthy Answer, with:

~ Natural Flavored 190 proof corn grain alcohol from the heartland of America
~ Sun Screens (UVA/UVB)
~ Moisturizers
~ Botanicals (certified organic)
~ Minerals (13 trace minerals)
~ Vitamins (pharmaceutical grade)
~ Film Formers/ the same ones used in pill and candy coatings (all natural)
~ Humectants
~ More vibrant colors with 90% less pigment (FDA approved)
~ De-ionized water
~ Antioxidants
~ Organic Live Ingredients
~ Vegan
~ Kosher
~ Most important of all -- Guaranteed Smear-Proof
~ No animal products or animal by products
~ No petroleum products
~ No lacquers
~ No waxes
~ No added preservatives
~ No Glycols
~ No Parabens
~ No Urea
~ No Lead
~ No Aluminum
~ Never-Cooked
~ No peanuts or peanut by products

See what was brought back from the future for your healthy conscious lifestyle and enjoy the empowering benefits it creates. Change your life in a nanosecond with our liquid botanical color solution that replaces lipstick for Lips, Brows, Eyes, Face and Lashes -- Lip-Ink ®. Color, the way Nature intended.

Written by the Cosmetic Chief “Lip Diva®” Rose Nichols, President & CEO of www.lipink.com.

Dry Winter Skin: How to Deal with it

Your skin in winter can become very dry - even to the point of being painful. I myself began feeling the effects of the cooler weather in early October. It usually doesn't hit me this hard but this year I'm having a real difficult time with it. My lips became tender and chapped, and I had to switch to a different formula of daily facial cleanser because the exfoliating beads in my current cleanser were irritating my skin. My face became red and flushed. I'll have to limit my daily exfoliation to just twice a week. Also my hands and feet became very dry.

Ah, winter. It can be so peaceful yet so unforgiving. Indoors you're subjected to dry heat and outdoors you're bombarded with harsh winter UV rays from the sun and chilling winds. Yes, the sun's rays are still just as dangerous as they are in the summer and they will reflect off any snowy surfaces, bouncing the rays right back on to you. You're going to need a good facial moisturizer with SPF in it.

Here are some more tips to help you combat dry winter skin:
1)Use a lip balm (preferably with SPF) and do not lick your lips under any circumstances. That just makes it worse.
2)Keep your hands moisturized with a good quality hand cream. Make sure you have a tube of hand cream with you at all times.
3)Drink plenty of water and limit your alcohol intake. Alcohol is a dehydrator.
4)Buy a humidifier if you don't already have one. It may help keep your heating bills down as well. You know, the whole heat and humidity thing. Think Amazon rainforest.
5)Use a shower filter. It will filter out the skin-drying chlorine in your tap water. Avoid using hot water in the shower even though it feels so good on a cold winter morning. It will only strip your skin of its natural oils and cause water to evaporate more quickly. Use warm water onyl. Also, it pays to switch from soap which can dry the skin, to a silky body wash which will help your skin retain moisture. Pat your skin dry when exiting the shower, don't rub. Apply a nice moisturizer while your skin is still damp to help seal in moisture.

When the humidity drops to 50 percent or less, you will need to pay even more attention to your moisturization routine. Stay away from harsh scrubs or cleansers since they will eliminate most of the skin's oils and dry your skin out more easily. This applies to skin care products as well as cleaning products.

My favorite winter skin care tip is before you go to bed, apply a thick, rich moisturizer to your feet, concentrating on the heel area. Then put on a nice cushy pair of socks. When you wake up your feet will be soft and smooth and well-hydrated.

Not paying attention to extremely dry skin can lead to health issues and act as a welcome mat for rashes and skin infections. So take good care of your skin and enjoy your winter!

Author Bio
Katrina Price is a skin care consultant and the owner of www.skincareteacher.com

Article Source: http://www.ArticleGeek.com - Free Website Content

Facts To Know About Perfume

Perfume (Latin \"per fume\" message \"through smoke\") was highly pet by the Egyptians, Romans, and Arabs. In East Asia, perfumes were odorize based. People consumed to attain perfumes from spices and herbs aforementioned bergamot, myrtle, coriander, conifer resin, and almond. The consume of flowers came exclusive after Avicenna, an Persian student and physicist showed the impact of distillation, whereby oils could be extracted from flowers. In 1370, at the behest of Queen Elizabeth of Hungary, the world\'s prototypal recent odourise - \"Hungary Water\" was prefabricated by combining fragrant oils in beverage solution.

The essay of a odourise is of alive meaning and is handled by an proficient famous as a perfumer, who deals with direct scents aforementioned rose, jasmine, cola, etc; modifiers aforementioned esters; blenders aforementioned linalool and hydroxycitronellol; and fixatives aforementioned resins, vegetation scents, and yellowness bases. The resulting neaten is explained in a singable metaphor of 3 \'notes\', namely, crowning notes (consisting of alacritous evaporating diminutive filler molecules) aforementioned citrus and colorful scents; region notes (consisting of andante evaporating job filler molecules) aforementioned chromatic and chromatic scents; and humble notes (consisting of slowest evaporating maximal filler molecules) aforementioned fixatives etc. All these notes impact unitedly aforementioned a singable chord.

Perfume oils let vaporific compounds in broad concentrations and thusly have to be weakened by solvents, so that trauma is not caused when practical direct on wound or clothes. The ordinary dissolver is clean alcohol or alcohol integrated with water. Fractionated palm lubricator or wax, viewless perception fats much as jojoba, can also behave as solvents and weaken the odourise oil. The odourise lubricator is boost integrated with another fragrant compounds. Generally, the proportionality of fragrant compounds in odourise select is 20% to 40%; in eau de parfum is 10% to 30%; in eau de grooming is 5% to 20%; and in eau de cologne is 2% to 5%.

The lubricator immersion in a odourise along with another fragrant compounds, determines the intensity, longevity, and toll of the odourise and thusly it is a intimately incommunicative info of every perfumer and odourise house. By adjusting the proportionality take and the notes of the perfume, variations on the aforementioned sort may be created aforementioned Chanel\'s Pour man and Pour man Concentree.

Classification of perfumes is never complete, owing to its ever-evolving nature. The tralatitious arrangement comprises of categories aforementioned Single Floral, Floral Bouquet, Ambery, Woody, Leather, Chypre, and Fougere; patch the recent arrangement comprises of Bright Floral, Green, Oceanic/Ozone, Citrus/Fruity, and Gourmand. In 1983, archangel Edwards, a odourise consultant, created a newborn smell arrangement \"The Fragrance Wheel\", which categorised and sub-grouped fivesome accepted families, videlicet Floral (Floral, Soft Floral, Floral Oriental), Asiatic (Soft Oriental, Oriental, Woody Oriental), Woody (Wood, Mossy Woods, Dry Woods), Fougere (has smell elements from every the families), and Fresh (Citrus, Green, Water).

Perfumery has consumed a sort of fragrant sources aforementioned plants, animals, and polysynthetic sources in the making of perfumes. Plants are consumed as a maker of perfume compounds and primary oils. The parts of plants that are consumed are:

1 - Bark (cinnamon, cascarilla);
2 - Flowers (rose, jasmine, osmanthus, tuberose, mimosa, vanilla);
3 - Blossoms (citrus, ylang-ylang, clove);
4 - Fruits (apples, strawberries, cherries, litsea cubeba, juniper berry, vanilla, oranges, lemons, limes, grapefruit);
5 - Leaves and Twigs (lavender, patchouli, citrus, violets, sage, rosemary, hay, tomato);
6 - Resins (labdanum, myrrh, manducate benzoin, Peru balsam, frankincense/olibanum, pine, fir, amber, copal);
7 - Roots, Bulbs, and Rhizomes (vetiver roots, colorful and stop rhizomes);
8 - Seeds (coriander, cocoa, mace, cardamom, anise, nutmeg, caraway, tonka bean);
9 - Woods (agarwood, birch, rosewood, sandalwood, pine, birch, juniper, cedar).

Animal sources let Ambergris, Castoreum, Musk, Rom terpenes, Honeycomb, and Civet. Other uncolored sources let Lichens and Protists. Synthetic sources let polysynthetic odorants synthesized from oil distillates, conifer resins, etc. Modern perfumes are mostly prefabricated from polysynthetic sources as they let fragrances not discovered in nature, aforementioned Calone is a polysynthetic bilobed that imparts a marine antimonial ozonous fragrance. Synthetic aromatics are more conformable than uncolored aromatics, and are hence, widely consumed now in recent acquirable perfumes.

Email Spam

For organisations and staff, most business communication takes place over email systems for messages and exchanging of documents (attachments). Therefore, it is crucial that every employee is aware of the threats faced on email systems and they know how to handle emails, especially from sources that are not trusted. Spam emails are received by many everyday and information in handling them is important for all staff.

The following are some safety tips to protect your organisation from email frauds:

Delete spam e-mail messages without opening them. Sometimes even opening spam can alert spammers.

Don't reply to spam unless you're certain that the message comes from a legitimate source. This includes not responding to such messages that offer an option to "Remove me from your list."

Don't give personal information in an e-mail or instant message . It could be a trick. Most legitimate companies won't ask for personal information by e-mail.


Think twice before opening attachments or clicking links in e-mail or instant messages, even if you know the sender. If you cannot confirm with the sender that an attachment or link is safe, delete the message.

Don't forward chain e-mail messages. Not only do you lose control over who sees your e-mail address, but you also may be furthering a hoax or aiding in the delivery of a virus.

If you receive abusive, harassing, or threatening e-mail messages or have been the target of a phishing e-mail scam, report it to MyCERT.

Report phishing scams and other fraudulent e-mail to the company that has been misrepresented and also to MyCERT. Contact the organization directly and not through the e-mail you received.

Backup Data

Information and data is vital for the function of any business, e.g. customer records, transaction record, employee data. Therefore the safeguarding and protection is crucial for organisations. Backup provides alternative for company to recover valuable files and documents after a data loss event such as when a hacker attacks or a disaster (e.g. fire, flood) that can harm your business environment or cripple the conduct of business. Organisation must always be prepared to continue their business effectively even if an intruder corrupted the computer systems or destroyed software programs, or deleted files and folders on servers.

The following are the tips for performing effective backup for your data:

Establish backup schedule on daily, weekly and monthly basis to backup all documents. Whenever there is a modification to original content, backups should be created instantly.

Maintain backups for a period of time to allow for recovery process or fixing issue that is not revealed instantaneously.

Use automation backups, as creating copies manually can be time consuming and tedious.

Run a set of tests on the backup process by periodically restoring the contents and verifying its accuracy.

Setup extra computers to constantly duplicate data in original computer for immediate recovery.

Make sure the backup process creates a date and time log so the contents of the backup can be validated.

Create backups on various types of medium (portable disk copy and CDs copy) to offer flexibility in recovery process.

Backup copies should be located in secure place, preferably not on office's premise to avoid same disaster that destroys the original.

Dealing Malware

Computer viruses are software programs deliberately designed to interfere with computer operations, record, corrupt, or delete data, or spread themselves to other computers in the organisation and the network, often leading to disruption of work affecting your productivity at work. Computer viruses range from the mild annoyance to the downright destructive, and come in many different forms. The good news is that with an ounce of prevention and a little knowledge, you are less likely to fall victim to viruses and you can diminish their impact.


The following are the tips to help avoid or spreading of viruses:


Use an updating mechanism or system that would update all computers in the network automatically when new updates are available.

Set your computer OS and security applications (anti-virus, anti-spyware, firewalls) to update automatically.

If a computer is infected, isolate the infected computer from the network.

If malicious code exploit one of more of the network services, block access to that service until it is rectified.

Use a Internet firewall.

Never open an e-mail attachment from someone you don't know.


Avoid opening an e-mail attachment from someone you know, unless you know exactly what the attachment is. The sender may be unaware that it contains a virus.

Keep you network servers updated that host public services, e.g. HTTP, FTP and Email services.

Email servers should set to block or remove email with attachment used to spread virus, e.g. .VBS, .BAT, .PIF, .SCR, .EXE files.

A Guide to Proper Skin Care

When it comes to proper skin care, there are many important things to know. After all, you are going to be living in your skin for the rest of your life, so keep it looking and feeling healthy and beautiful. Your skin is the most noticeable part of your body, and the best way to achieve proper skin care is to start incorporating a few important steps into your daily routine. Simply by adding these few extra steps to your regular skin care routine, you will notice almost immediate results.

Cleanse

Cleansing is one of the most important steps, but before you choose a proper face cleanser you need to determine what your skin type is. The basic types are oily, normal, dry, or sensitive. If you are not sure which type you have, it isn’t hard to find out. All you do is wash your face and pat dry, making sure not to rub because this can tear the skin. Now take a few pieces of rice paper and press on different spots of your face. If your skin is oily, the paper will stick. If the paper falls right off, then your skin is dry. If it sticks a bit but then falls off, you most likely have a normal or combination skin type.

Now comes the hard part. You have to find a good cleanser that your skin is going to respond well to. This can be particularly difficult if you have sensitive skin, because many products will be too harsh for you to use. Even if you have oily skin, you want to avoid bar soaps, as they are much too rough on the skin, especially on the face where the skin is most delicate. One of the most important skin care rules of all is to not cleanse too often—typically washing once in the morning and once at night should be enough.

Exfoliate

Another critical part of skin care is exfoliation. Regularly exfoliating your face is especially important, because it will help get rid of dead skin cells and leave your skin looking healthy and smooth. Exfoliating is simple. All you need to do is lightly moisten your face, then, using a loofah, rub a dollop of exfoliating cleanser on your face. You can use sugar or any other grainy products as well. Rub in circular motions, avoiding scrubbing too hard under the eyes because the skin there is very thin. Continue rubbing for a few minutes, then rinse off your face with warm to cool water.

Moisture

Moisturizing is the next important step in any skin care routine, even if you have very oily skin. You need to use some type of moisturizer, especially after cleaning and exfoliating the face. Moisturizers work by sealing moisture into the skin, and it also ensures that the skin is smooth and supple. The best way to do this is by using your fingertips. Dot the moisturizing cream around the area of your face, and then gently massage the cream into your face, making sure to get around your T-zone area, which is down the nose and across the forehead. Make sure that while you are massaging the cream you are using alternating strokes and never over-moisturize, as this can cause your skin to look oily.

Proper skin care is critical to looking and feeling healthy and youthful, and by taking proper care of your skin now, you will be doing yourself a great justice in the future. Your skin will remain soft, smooth, and supple, even as you age.

Article Source: http://www.afroarticles.com/article-dashboard

Wireless Access

Wireless Internet access can offer convenience and mobility. But there are steps you should take to protect your wireless network and the computers on it.


Use encryption to scramble communications over the network. If you have a choice, use Wi-Fi Protected Access (WPA) encryption as it is stronger than Wired Equivalent Privacy (WEP) encryption.

Use anti-virus and anti-spyware software, and a firewall.

Most wireless routers have a mechanism called identifier broadcasting. Turn it off so your computer won't send a signal to any device in the vicinity announcing its presence.

Change the identifier on your router from the default so a hacker can't use the manufacturer's default identifier to try to access your network.

Change your router's pre-set password for administration to something only you know. The longer the password, the tougher it is to crack.

Allow only specific computers to access your wireless network.

Turn off your wireless network when you know you won't use it.

Don't assume that public "hot spots" are secure. You may want to assume that other people can access any information you see or send over a public wireless network.

Careful Spyware

Spyware is a program or script that performs certain behaviors such as advertising, collecting personal information, or changing the setting of your computer, usually without your consent. Spyware are usually not easily seen and carries out its activities silently.

The following are some signs of telling when a spyware is installed in your system.

You see pop-up advertisements or screen even when you are not connected to the web.

The web page that your web browser opens first is different from your usual homepage.

You notice a new toolbar in your browser that you did not install.

Your computer is slower than usual.

Your computer crashes or hangs for no reason.

Any unusual activity on your computer.

The following are some tips on how to protect your system from spyware:

Update your operating system by downloading all critical updates and security updates.

Use an anti-spyware program and perform regular scan.

Adjust your browser security setting to “medium” or higher.

Install and use a firewall.

Safe Computing Tip

Access to information and communicating with people near and far has never been easier. With Internet, you can order books, download music and games; make new friends, play games and more. However, the internet can give online scammers, hackers, and identity thieves access to your computer, personal information and more. It is important for parents to protect their children as well and to educate them the dangers of Internet.

By being aware of the dangers in the internet, you can minimize the chance of an Internet mishap and protect your family and friends. Knowing the threats can help you protect your information and your computer. To be safer and more secure online, you should adopt these seven basic practices.

Be careful when giving out personal information in a website, email, instant messaging systems, chat rooms or on message boards, especially when you are not sure. You have to right to ask why and how the information is to used.

Protect your personal information. It's valuable.

Know who you're dealing with.

Use anti-virus and anti-spyware software, as well as a firewall, and update them all regularly.

Make sure your operating system and Web browser are set up properly and update them regularly.

Protect your passwords.

Back up important files.

Know who to contact if something goes wrong online.

Indecent Content

The Internet provides wealth of information on virtually anything. This also includes information or content that is seen to be unsuitable for internet user, especially kids and teenagers. The nature of contents ranges from that is violent, misleading, unverified, false and menacing. The law and regulations for web content varies from country to country, whereas the Internet platform is an open and global platform. Anyone can create a website and post content of any nature. It is easy to say that it’s up to the user to view or read the content but kids and teenagers may not be able to assess the suitability and may be influenced from viewing or reading such information.

As parents and adult, following are some of the tips for educating your children on handling website contents:

Ask your children to share their online experience, e.g. the website they have visited and the friends they have made. This is a good way of monitoring their online activity. It is important that parents include this in their daily conversations with them.

It is good to educate your children when they are young on online safety and more importantly the content they can find or come across. They will know their do’s and don’ts as they have been nurtured at their earlier years. Just like in real life, parents tell us, “look before you cross the road”. This advice becomes a natural habit over the years because our parents have said so.

Whenever your child go surf the internet, parents should occasionally sit together and explore the internet with them. Parents need to guide them to the suitable websites or perhaps, bookmark some sites for them.

Computers should be placed in the common areas of your home, e.g. living room. Parents will find it easier to monitor their children.

Parents should check all file sharing software such as P2P. They should only download or send legal files.

Inform your children if they feel uncomfortable about a website they have visited, they must tell you, so you could verify or block the website. To block in Internet Explorer, refer to the following instructions.
Steps to block websites in Internet Explorer 7:

In the Menu Bar click Tools -> Internet Options -> Content. In the Content Advisor box, click Enable.


Click the Approved Sites tab. Enter the address of the website.

Keep in mind - if you want to block the complete website put * in front. For example to block myspace completely, type *.myspace.com Click Never and then OK.


Click on the General tab and sure to select Users can see websites that have no ratings.


Enter a password you can remember easily with a hint.

Click OK to surf the Internet safely.


Parents should consider using content/filtering software to monitor their children’s online activity and access. There are some good web filtering software such as K9 Web Protection, NetDog Internet Filter, and SafeSquid.

Do some investigation on your children’s online activities by checking their cookie, cache files and history on their computer.

Set your web browser to “block pop-ups”. This eliminates the possibility of children clicking on pop-ups that may lead to inappropriate website or download viruses.

Teenagers are creative, experimental and eager to explore new things. Parents should practice the same to study the current trends and issues. Parents should bookmark good websites that talk about internet safety and share this with their children and friends.

Hate Speeches

With the Internet, any form of information can be expressed without any moderation or restriction. People can post and write articles to express their feelings of anger, hate, frustration or prejudice.

As a responsible citizen and Internet user, certain precautions should be taken to ensure so that you do not land in the hands of the law.

You should not share information that is highly sensitive or degrading on public domains or websites that is accessed by many people. If possible avoid all together.

Careful when you receive any emails with hate speeches or any form of recorded information that may be highly sensitive. You should delete and do not forward them.

Don’t believe any of information with malicious content posted on the Internet or blogs. It is advised to use your sound judgment to verify the information stated as it may not be true at all. It may only to provoke us to hate certain individual or organization without a clear proof.

Install content filtering software that can block sites which you may not want your children to access, e.g Content Advisor in IE7.

Educate your child on the difference between valid, true and false information. Tell them to seek your advice if they are not sure.

Discover how to stop hair loss

In one of my other articles, I revealed that plugged hair follicles are one of the main conditions that start hair thinning and baldness. The other condition is insufficient blood circulation in the scalp.

When you don’t have enough blood circulating in your scalp, then your hair roots don’t get enough nutrients to support the life and strength of your hair in the follicle.

The hardest place to get good circulation is at the top of your scalp. It is the furthest point away from your heart. It is the area that is less stimulated. The sides of your head are stimulated as you sleep and move your head around the pillow. That is one reason why most people still have hair on the sides of their head while the top is completely bald.

So what the ways you can increase blood circulation to the top of your head to stop hair loss?

Here are two ways to stop hair thinning

* Use herbal remedies to increase body and scalp blood circulation * Use hot and cold hydrotherapy

Use herbal remedies to increase body and scalp blood circulation

There are several herbs that provide increase circulation to all parts of the body. Two good standby remedies are ginkgo biloba and cayenne pepper. Use ginkgo biloba as indicated on the label. Ginkgo increases the blood circulation in the brain and all parts of the head.

Use Cayenne pepper in the formulation made of Heart Foods Company. This Cayenne strengthens the heart giving it the ability to pump blood to the furthest reaches of the body.

There are two other herbal formulations that have recently come out to provide increase circulation to all parts of the body – vital cell and Arjuna.

Vital cell is a Chinese herbal combination that is available in the US. It is a powerful remedy that helps to re-establish small veins that have closed off. This creates more pathways for blood to go where it is needed and where it once went.

Arjuna is another herb that comes from another country – India. It is now readily available in the US. Arjuna is the latest herb to be exposed as good for preventing and reducing arthrosclerosis. By reducing narrowing of the arteries in the head, strokes can be avoided and a side benefit is the scalp get more blood.

Use Hot and Cold Hydrotherapy to prevent hair loss

I have talked about this natural way of bringing more blood into the scalp. It’s a technique I use every time I shower. At the end of your shower, run hot water over your head for 20 seconds, turn the hot water off and allow the cold water to run over your head for 20 seconds.

Do this hot-cold water technique three – four times and end with the cold water. This technique allow blood to move in and out of the lower layers of your scalp giving you a blood massage and providing more nutrients to your hair roots. As a side benefit, you are bringing in more blood to your brain giving you more brain power as long as use this technique.

Use herbs to improve you blood circulation to your scalp and use hot-cold water to blood massage your scalp. By doing this, you will find less hair loss and you may even start to see some hair growth.

Article Source: http://www.afroarticles.com/article-dashboard

What Are Food Labels And How To Read

Food labels will give you information about the elements of the food and can help you to decide what to choose as part of an overall healthy eating plan.

Food labels provide information about nutrition facts. They also tell you what's in a packaged food (i.e., the ingredients). Some food labels also state which country the food came from, whether the food is organic, and certain health claims.

Information that are given in a label:

Reading food labels seem to be the most effective way to understand the amount and kinds of nutrients that are provided in the item. It lets you make sensible food selections.

The following information will help you to read a food label.

Serving size: The amount of servings stated in the food label refers to the quantity of food people usually consume. It determines the amount of nutrients that enters the body. This means that if you will follow strictly what the serving size is, you will obtain the same amount of nutrients according to the serving size that was given in the label.

Calories, Calories from Fat and Percent Daily Values: This part of a food label provides the calories serving and the calories that come from fat. If you need to know the total number of calories you eat every day or the number of calories that come from fat, this section provides that information. Remember that this part of the label doesn't tell you whether you are eating saturated or unsaturated fat.

On the right side of a food label, you'll see a column that lists percentages. These percentages refer to the percent daily values (%DV). Percent daily values tell you how much of something, whether it's fat, sugar or vitamin A, one serving will give you compared to how much you need for the entire day. It will help you gauge the percentage of a nutrient requirement met by one serving of the product. One way to use this section of the label is when you comparison shop.

Fat, Sugar, Sodium and Carbohydrate: This section of a food label shows the name of a nutrient and the amount of that nutrient provided by one serving of food. You may need to know this information, especially if you have high blood pressure, diabetes or are eating a diet that restricts certain nutrients such as sodium or carbohydrates.

Food labels also include information about how much sugar and protein is in the food. If you are following a low-sugar diet or you're monitoring your protein intake, it's easy to spot how much of those nutrients are contained in one serving.

Vitamins, Minerals and Other Information:

The light purple part of the label lists nutrients, vitamins and minerals in the food and their percent daily values. Try to average 100% DV every day for vitamins A and C, calcium, iron and fiber. Do the opposite with fat, saturated fat, sodium and cholesterol. Try to eat less than 100% DV of these.

Reading Label Lingo:

In a food label following terms are used to indicate the contents of the food. To read a label you have to know about the phrases. They are-

1. 'Low in calories' means that the food can be eaten frequently without going beyond guidelines for a good diet.

2. No calories or calorie free - Contains less than 5 calories per serving.

3. 'Low in sodium' means less than 140mg. a serving.

4. 'Reduced' means the product has at least 25 percent fewer calories of an ingredient than the regular product.

5. 'Good source' means one serving has 10 to 19 percent of Daily Value for that nutrient.

6. 'Low fat' means the product contains no more than 3 grams of fat per serving.

7. 'Lite' means that the food contains at least 50 percent less fat than the food it's being compared with.

8. 'Fresh' means that the food cannot have been frozen, processed, heated or chemically preserved.

9. 'Organic' means foods that have been prepared to a certain production standard. They have been grown without the use of conventional pesticides, artificial fertilizers, or sewage sludge. They have also not been processed without ionizing radiation or food additives.

10. No preservatives - Contains no preservatives (chemical or natural).

11. Sugar free - Contains less than 1/2 gram of sugar per serving.

12. Reduced sugar - at least 25% less sugar per serving than the reference food.

13. No preservatives added - Contains no added chemicals to preserve the product. Some of these products may contain natural preservatives.

14. No salt or salt free - Contains less than 5 mgs of sodium per serving.

15. High fiber - 5 g or more per serving.

16. Good source of fiber - 2.5 g to 4.9 g. per serving.

17. More or added fiber - Contains at least 2.5 g more per serving than the reference food.

Common Mistakes to Avoid When Reading a Food Label:

Until you become accustomed to reading food labels, it's easy to become confused. Avoid these common mistakes when reading labels:

A label may say that the food is reduced fat or reduced sodium. That means that the amount of fat or sodium has been reduced by 25% from the original product. It doesn't mean, however, that the food is low in fat or sodium. For example, if a can of soup originally had 1,000 milligrams of sodium, the reduced sodium product would still be a high-sodium food.

Don't confuse the % DV for fat with the percentage of calories from fat. If the 15% that 15% doesn't mean that 15% of the calories come from fat.

Rather, it means that you're using up 15% of all the fat you need for a day with one serving (based on a meal plan of 2,000 calories per day).

Don't make the mistake of assuming that the amount of sugar on a label means that the sugar has been added. For example, milk naturally has sugar, which is called lactose. But that doesn't mean you should stop drinking milk because milk is full of other important nutrients including calcium.

Article Source: http://www.afroarticles.com/article-dashboard

Privacy Thieft

Identity theft occurs when someone uses your personal information, like your name, you birthday, telephone number number, or credit card number, without your permission, to commit fraud or other crimes. It's important to protect your personal information, and to take certain steps quickly to minimize the potential damage from identity theft if your information is accidentally disclosed or deliberately stolen:

Be careful when giving out personal information in a website, email, instant messaging systems, chat rooms or on message boards, especially when you are not sure. You have to right to ask why and how the information is to used.

Read privacy.

Close compromised credit card accounts immediately.

Monitor your credit card statements. Keep in mind that fraudulent activity may not show up right away.

Consult with your financial institution about any unusual activities on your accounts.

Contact relevant government agencies to cancel and replace any stolen driver's licenses or other identification cards.

Watch for signs of identity theft: late or missing bills, receiving credit cards that you didn't apply for, being denied credit or offered less favorable terms for no apparent reason, or getting contacted by debt collectors or others about purchases you didn't make.

Don't send a picture of yourself, your friends or family to someone you met or chat with online.

If you plan to meet someone that you have met on the Internet, take you're your friend along. People in real life can be different from how they are online.

Don't open up e-mails, files, or website links from people you don't really know.

Peer to Peer

Peer-to-peer (P2P) file-sharing allows users to share files online through an informal network of computers running the same software. File-sharing can give you access to a wealth of information, but it also has a number of risks. You could download copyright-protected material, pornography, or viruses accidentally. Or you could mistakenly allow other people to copy files you don't mean to share.

The following are the safety tips if you decide to share resources:

Set up the file-sharing software very carefully, checking the proper settings so that other users won't have access to your private files.

Consider installing anti-spyware software. Some file-sharing programs install spyware that can monitor your browsing habits and send that data to third parties.

Adjust the file-sharing program's controls so that it is not connected to the P2P network all the time. Some file-sharing programs automatically open every time you turn on your computer.

Use anti-virus software and a firewall and update them regularly. Files you download using a P2P network could be mislabeled, hiding a virus or other unwanted content.

Tips When Investing

The Internet allows investors to access account information 24/7, initiate securities transactions from virtually anywhere, and quickly and offer inexpensively research for investment opportunities. But the Internet is not fail-safe.

The following tips will help you to invest wisely online:

Protect your passwords for your online investment accounts. Keep passwords in a secure place, and don't share them on the Internet, over email, or on the phone.

Don't reply to spam unless you're certain that the message comes from a legitimate source. This includes not responding to such messages that offer an option to "Remove me from your list."

Don't give personal information in an e-mail or instant message . It could be a trick. Most legitimate companies won't ask for personal information by e-mail.

Think twice before opening attachments or clicking links in e-mail or instant messages, even if you know the sender. If you cannot confirm with the sender that an attachment or link is safe, delete the message.

Don't buy anything or give to any charity promoted through spam emails. Spammers often swap or sell the e-mail addresses of those who have bought from them, so buying something through spam may result in even more spam.

Criminals use spam to prey on people's desire to help others. If you receive an e-mail request from a charity you'd like to support, avoid donation scams by calling the organization directly to find out how to contribute.

Don't forward chain e-mail messages. Not only do you lose control over who sees your e-mail address, but you also may be furthering a hoax or aiding in the delivery of a virus.

If you receive abusive, harassing, or threatening e-mail messages or have been the target of a phishing e-mail scam, report it to MyCERT.

Report phishing scams and other fraudulent e-mail to the company that has been misrepresented and also to MyCERT. Contact the organization directly and not through the e-mail you received.

Shopping

Shopping on the Internet can be economical and convenient. Shopping on the Internet is no less safe than shopping in a store or by mail.

The following tips will help you to shop safely:

Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have questions or problems.

Know exactly what you're buying. Read the seller's description of the product closely, especially the fine print.

Know what it will cost as there may be hidden charges. Make sure you know the shipping and handling charges and the total charges.

Paying by credit card offers you better protection as the credit card company is part of the transaction.

Read the refund policies and delivery information.

Always print and save records of your online transactions.

Medical Insurance Plans

There are plenty of reasons why everyone should have one of the medical insurance plans available. If you are looking online for a quote for medical coverage you are on the right path to providing financial security to your family. There are numerous techniques you can make use of to help you save money with a health plan that you definitely can benefit from.

A health insurance plan is something one cannot really go without. It is not a good idea to rely on the fact that children have free insurance and neglect yourself and your partner. You have to pay expensive bills on the doctor every time you get injured or sick.

When an emergency happens and you have to rush to the emergency room without having a medical plan, your budget will be definitely shattered. It is thus a vital thing to have the best financial provision with the assistance of one of the medical care plans.

Prior to purchasing a medical insurance plan, you need to go shopping for the plan that will most certainly suit your needs. There are some individual health plans which are not so expensive. If you pay cash every time when you need serious medical attention, you will never be able to save up for other dreams or plans you may have for your children or your retirement. An affordable health insurance is the best technique of saving money with health.

After deciding over the kind of coverage that you need, you need to take a closer look at the quotes for health insurance. You have to decide on what amount of money are you willing to pay monthly for the health insurance plan.

Try to choose one of the cost effective medical insurance plans that are effective as well for you and for your whole family.

Researching medical insurance plans is easy when you utilize the online resources that are available. We all need medical health insurance and need it at rates that we can afford. This is where the Internet works to our advantage, allowing us to find the coverage we need at the cost that we can afford.

Eats you can afford

Suffering a case of tight wallet syndrome doesn't mean you have to forgo delicious meals. Here are easy thrifty recipes you can try at home.

The current economic slowdown has gotten everybody in a pickle resulting in consumers being not as frivolous with the ringgit as they once were.

Prices of goods are on the rise and as people find a common ground in trying to taper their spending, more and more of us are – for the lack of a better term – tight fisted with money these days.

Food is one of the first things that seem to hit most of us during this economic slowdown with the majority of the public now changing their eating habits and have gone so far to opt from dining out in order to save a little cash.

Restaurants are realising this too as more eateries and franchises, even fast food ones, offering special "value for money" offers in order to make up for this current deficit.

But if you want something a little more substantial, nutritious and tasty compared to salted fish, soy sauce and steam rice on a daily basis, then do take heed of these meal suggestions (from RM5 to RM30) you can attempt at home. We guarantee they'll satisfy your hunger pangs without putting a dent into your wallet.

Best for RM5

Although the omelette is widely considered as a breakfast item, it's also versatile enough to be had at any time of the day especially with a wide variety of ingredients added in.

A three-egg Spanish omelette, for example, is perfect to satisfy that hunger pang or as a quick snack. To make the omelette more appetising and fulfilling, use chopped onions, sliced bell peppers and mushrooms with a little shredded cheddar cheese for the filling.

If you're the carnivorous type, some sliced sausages, chopped ham and bacon bits will definitely work a treat.

Start off by heating the pan with a little oil, sweat the onions and add in the peppers, mushrooms and meat items. Cook for a minute and add in beaten eggs into the mix, cook until eggs are set and add in pepper and salt to taste and cheddar cheese before folding. Set into plate and add in a dash of Tabasco sauce before serving. (Serves two persons)

Best for RM15

Spaghetti is a cheap option as it's easier to store, cook with and most importantly saves you time and money.

Plus, pasta sauces these days come in all sort of flavours, which you can also easily modify on your own.

For added variety and a bit more of a kick, do consider adding in canned tuna or meat items like sliced chicken fillets or minced beef for a meatier option to the dish.

A quick boil of the pasta and a saucepan is all that's needed for this hearty pasta meal. A dash of pepper and salt with a sprinkle of rosemary herbs to the meat and a quick stir-fry in a little olive oil (before adding in the pasta sauce) will add a little depth to the dish. Throw in chopped peppers and sliced mushrooms.

For a more Malaysian flavour, feel free to sprinkle in some dried chillie flakes to the dish as well. (Serves three to four)

Best for RM30

Nothing is heartier than a roast chicken meal and even though it takes a little preparation time, it's easy enough to do on your own.

All you need is a whole chicken (patted dry) marinated with butter or olive oil, thyme, rosemary or basil, a dash of Worcestershire sauce and a tablespoon of Montreal Chicken Seasoning.

Marinate the chicken with the ingredients – especially inside the cavity – and tie the bird up around the wing and thigh area before placing in the roasting pan.

Preheat oven to about 180 to 200 degree Celsius and place a few potatoes (wrapped in aluminium foil) into the pan as well. Roast the chicken for approximately one hour and 15 minutes or until done; you can tell by the golden brown skin colour.

To make absolutely sure, prick the side of the chicken thigh to see if there's a clear juice oozing out of it. Once you're sure it's done, remove the chicken and leave it aside to cool.

Cut the chicken into quarters and serve with a portion of baked potato. Last but not least, toss in a few salad leaves or a scoop of baked beans to complete your meal. (Serves four)

by Richard Augustin

Material girls

Does love still matter in the 21st century? Why is it when a good-looking woman marries a rich man, we always assume she is marrying him for his net worth?

While tall, dark and handsome was once the criteria for a dream man, the new breed of women today will tell you she will settle for short and ugly ... as long as he comes with cold hard cash.

It really seems like some women are more interested in how much moolah a man has in his checking account than how much love he has in his heart.
Gad Elmaleh and Audrey Tautou Star in Priceless. A young gold digger(Tautou)mistakenly woos a mild- mannered bartender (Elmaleh)thinking he's a wealthy suitor.

So just who are this new breed of women? There is a name for them – gold diggers.

We constantly see them fictionalised on the big screen; an upcoming Malaysian movie Pisau Cukur tells of two gold diggers who pursue rich men on a cruise ship.

In the French movie Priceless, Audrey Tautou is cast as a beautiful woman who selects her beaus based on the size of their wallets and there are also real-life celebrities who have been labelled that by the media. Remember the late Anna-Nicole Smith and her old but rich husband?.

More recently, Heather Mills was accused of being a gold digger when she married Paul McCartney despite proclaiming her love forthe Beatle. Of course, her divorce settlement of £24.3mil (RM170mil) did not do well to support her case.

I'm sure many of us know of a friend who is in a relationship with with someone completely wrong for her but so perfect for her Gucci and Prada penchant.

Here are a few of those kinds of stories ...

For love or money?

Self-confessed gold digger Sasha, 28, shares her thoughts: "I want to be financially stable and everyone knows that one of the fastest ways to do this is to marry a rich man. Is there anything wrong with wanting to live a good life, even if it means having love come second?"
Heather Mills

Sasha's view is not uncommon. Years ago, families eagerly married off their young daughters to the most sought-after bachelors who most often hailed from well-to-do families.

The only difference is, back then women had to be coquettish to attract a man. Today, she literally has to put herself out there in her best skimpy black dress!

Examples of successful pursuits in would include the achievements of soccer wives Coleen McLoughlin and Cheryl Tweedy – women who are known for whom they marry rather than their own successes.

Still, there's nothing wrong with that. If you think about it, even Cinderella did everything she could to nab her Prince Charming.

But it seems the act of gold digging is getting more attention today and shamelessly aiming for the richest is accepted and even highly advocated. In fact, there are online sites – sugardaddies.com, seekingmillionaire.com – to help gold diggers snag themselves a champion.

Psychologist Dr Sheila Keegan agrees, "People want an instant route to fame, wealth and success. Greed is no longer perceived as a bad thing, and women are admired for being smart, but not necessarily clever. It's seen as a question of who's using whom. Anna Nicole Smith may have got millions, but J Howard Marshall got to share his bed with a beautiful busty blonde while he was in his 80s."

With divorce rates on theup, some may even see marrying rich as a safety net should anything go wrong. Think of it as a business transaction.

She compromises on good looks and a great sense of humour for a secure future and comfortable life. And should the marriage end, Miss Gold Digger still gets to walk away with a hefty settlement.

"Relationships are about compromise, aren't they?" says Tasmina Perry, the author of Daddy's Girl, a book which examines the subject. "Gold diggers are just prepared to compromise that little bit more than most."
Anna Nicole Smith

Can money really buy love? Apparently so, if you go by the trend. As righteous as a woman may want to be, how many can actually say they are not tempted by the thought of being showered with gifts, diamonds, luxurious holidays and an easy comfortable life?

Even after earning her own money (and lots of it as well), sometimes a woman just wants to be pampered. Besides, after the love is gone, which is more enticing – a mortgage and loans, or a charming penthouse suite and an unlimited supplementary charge card?

Sugardaddie.com director Paul Homewood defends the gold digger.

"There is an opinion that women on this site are just after the men for their money. But in fact, most of them are here for the quality of the men," he says. "They are looking for men who have ambition, who want to get on in life. The men on here are professional men, city bankers, doctors and so on. Why shouldn't that be attractive to women?"

Bye-bye feminism

Does this spell the death of feminism and equality? Have all that women fought so hard for come to this: the size of his pay check and the car he drives?

And what happens when Mr Millionaire decides to go for a younger and more attractive gold digger?

"I've dated men after men, all of whom have bought me gifts, wined and dined me at the most expensive restaurants," says Lina. "Yes, sometimes I get dumped for another taller, prettier, sexier woman. It happens. But I am sure one day I will find my man, and he will be able to provide me with not only love and a good life for me and our children."

It is not difficult to see why more and more men are complaining about how hard it is to meet women who are sincere. "Unsuitable'' men are brushed off simply for not wearing the right suit or living at the ideal address. i

If he has a lot, he wins; if he barely makes enough, then he'll spend Valentine's Day all aloneuntil he does.

For better or for worst, for richer or for poorer? Forget about it – in the gold digger's world, it is all about the money.

Like Madonna sang in Material Girl, "They can beg and they can please. But they can't see the light, that's right. Cause the boy with the cold hard cash is always mister right."

Subjects' names have been changed to protect their privacy. Some quotes were sourced from www.dailymail.co.uk and www.independent.co.uk.

How to spot a gold digger

* She wants to marry. Now. A gold digger for push for marriage fast so that she won't lose out on the opportunity with Mr. Rich.

* She gives love. Quickly. Want to snag him now? Miss Gold Digger will quickly dish out good old loving for her target to snare him.

* She plays the role of a good wife. Too soon. She cooks, cleans and washes. She doesn't nag him when he goes out with the guys. Why? So she can show him exactly what a great partner she will be.

* She makes him pay for everything. Always. Pay for her dinner. Buy her the latest designer bag. Help out with her credit card bill. A gold digger will have no qualms asking him for financial favours. That's what he is for anyway, right

by S.C. Chua

Online Auction

Thinking of bidding in an online auction, or selling some of your stuff? Internet auctions are a great resource for shoppers and sellers, but you need to be aware of the issues.

Evaluate how soon you need to receive the item you're bidding on, and whether you can tolerate it being delivered late, or even not delivered. Many complaints about Internet auctions fraud involve late shipments, no shipments, or shipments of products that aren't the same quality as advertised.

Whether you're a buyer or a seller, read each auction site's Terms of Use before using it for the first time — sites may charge fees, follow different rules, or offer different protections.

Carefully consider your method of payment. Learn what recourse you have if something goes wrong. Don't send cash, and don't use a money transfer service.

Don't reply to "phishing" emails: messages that look like they've been sent by an auction website or payment service and ask for your password or other personal information.

Know who you're dealing with. Avoid doing business with sellers you can't identify, especially those who try to lure you off the auction site with promises of a better deal. Confirm the seller's telephone number in case you have questions or problems.

Know exactly what you're bidding on. Read and print a copy of the seller's description of the product closely, especially the fine print. Save copies of all emails you send and receive from the auction site or seller.

Online Banking end Scam

Fraudsters use a method known as phishing to send e-mail or instant message spam that looks like messages coming from reputable companies such as banks and auction sites. The forged message is trying to entice you to click a link on a Web page or in a pop-up window. If you click on the link, it could download a virus or lead you to a situation where you are asked to key in confidential information. There has been an increase in reported cases of phishing scams over the years and the techniques used are becoming also becoming more sophisticated, therefore it is important that we to know how to recognise and prevent from phishing activities.

Tips for safe Online Banking:


Keep your password and PIN code safe, and change them regularly. If you conduct transactions in a number of websites, use different passwords for each. Create unique passwords that are difficult to guess, e.g. use combination of letters and numbers.

How do you know the website is secured? Look at the status bar for the icon when you visit the bank site.

Be sure that the email attachments before you open are from trusted sources. Do not respond to emails asking for personal information, login information or change password notification via email. If not sure of the correspondence, contact the bank.

Never click on the link in email messages. Manually key-in URL address into the browser’s address bar.

Use an antivirus, anti-spyware and firewall program that is popular and well supported by the vendor. Ensure the programs are up-to-date and frequently updated.

Install or enable security updates for your operating system.

Memorize your password and if possible, do not write it down anywhere. Report identity theft or any suspicious activity immediately to the bank.

If you decide to go to other websites linked via your internet banking website, read the privacy and policy information of that website first, before conducting any transaction.

Check your account balances regularly to ensure that no fraudulent withdrawal has taken place.

If your bank account has been compromised, act fast and inform the bank, and the Cyber security authority.

When visiting your online banking site, check that the Date and Time matches the date and time when you last signed in.

Use Web browsers that uses strong encryption (128bit encryption) – For Windows systems - Firefox 1.0, IE 5.5 and NN7.2, For Apple Macintosh OS 10.2 - Apple Safari 2.0, Firefox 1.0.



Are You a Victim? Look out for these signs:

It is known that phishers always come out with new phishing tactics to lure their victims, therefore you should learn to observe some of the signs. Phishing activities are mostly carried out via email and websites. Phishing via email usually involves fraudulent email that looks like a legitimate email, usually asking you to either update or verify your online account. A phishing website can have similar look and features as a legitimate website. Therefore it is important that you learn to tell the differences between phishing email/website and the real email/website. The consequences of not being able to identify could lead you to identity theft and financial losses.


Phishing Email
Common phrases usually used by phishers in phishing emails:

“Verify your account” - a trick to gain your online account information such as your account number and password

“If you don’t’ respond within 24 hours, your account will be deleted” - an urgent message to seek for quick action

“Dear Valued Customer” or “Dear Customer” - a general salutation instead of addressing specific customer

“Click the link below to update your account information” – a trick to direct you to a phishing website

“Please provide your username and password” - a trick to gain your username and password

“You have won…” – a trick to gain your trust and cooperation to follow instruction in email

Phishing Website
Common tactics used in phishing website:

Genuine looking front page and content. Some may even have legitimate logo taken from the real website.


URL that looks similar to legitimate URL. Example: URL ‘www.abcbank.com.my’ could appear as ‘www.abcdbank.com.my

Fake URLs are masked to trick you into thinking that you are accessing a real website

Use of the names and official-looking logo of real company or financial institutions

Use of fake forms to collect your information look real and official

Use of fake pop-up window to collect your account information with actual legitimate website opened in the background



How to Protect Your Web Browser from Phishing?

You can use anti-phishing programs or toolbars to defeat phishing. There are dozens of such programs and tools you can download freely to help combat phishing scams. These tools usually come in the form of web browser extensions, plug-ins or toolbars. The following are some links for information and downloads on anti-phishing tools and web browser plugins:


Mozilla Firefox 2 Phishing Protection
http://www.mozilla.com/en-US/firefox/phishing-protection/


Click here to view video clip on Mozilla Firefox 2 Phishing Protection

Microsoft Phishing Filter
http://www.microsoft.com/protect/products/ yourself/phishingfilter.mspx

Click here to view video clip on Microsoft Phishing Filter

Netcraft Anti-Phishing Toolbar
http://toolbar.netcraft.com/

Mobile Safety Tip

Smart phones, cell phones, and handheld PCs can also be infected with viruses but it is not as widespread as you may have heard reported, but the problem is on the rise. Your mobile device can be infected when you download programs or files that are already infected. In the case of mobile phones, that might mean downloading photos, video clips, ring tones, cell phone themes, or other programs.

Mobile viruses can also spread through cell phones that are equipped with Bluetooth, a technology that allows you to transfer data between different devices, such as sending photos from your cell phone to your printer or transferring addresses stored on your device. If you have Bluetooth enabled on your mobile device and in "discoverable mode" (see the manual that came with your device for more information), and you come within 30 feet of another infected device that also has Bluetooth enabled and is running the same operating system as your mobile device, then you might get infected.

The following are some tips to help protect against mobile viruses:

Only download or accept programs and content (including photos, video clips, ring tones, mobile device themes, and games) from a source you trust. Our recommendations mentioned for safe computing, also apply when you surf the Web, send e-mail, or download programs using a mobile device. If you don't know whom an attachment is from or if you weren't expecting it, do not to open it or download it at all.

If your phone is equipped with Bluetooth, turn it off or set it to non-discoverable mode when you're not using it. Only accept incoming data from a source you trust. For more information, see the instructions that came with your mobile device.

If your phone is equipped with Infrared beam, only allow it to receive incoming beams when you're receiving data from a source you trust.

Download and install antivirus software for your mobile device.

Remember to treat your phone or other handheld device as carefully you would your wallet, especially in places that are prone to theft.

Lock or protect your mobile device with a password, so if you do lose your mobile device, a thief will have a more difficult time using it to make phone calls or access personal information you may have stored on it.

Malware

Computer viruses are software programs deliberately designed to interfere with computer operation, record, corrupt, or delete data, or spread themselves to other computers and throughout the Internet, often slowing things down and causing other problems in the process. Just as human viruses range in severity from the 24-hour flu to the Ebola virus, computer viruses range from the mildly annoying to the downright destructive, and come in new and different forms. The good news is that with an ounce of prevention and a little knowledge, you are less likely to fall victim to viruses and you can diminish their impact.

The following are the tips to help avoid viruses:

Keep your computer system current by enabling the "automatic update" feature.

Use an Internet firewall (Note: Windows XP with SP2 has a firewall already built-in and active).

Subscribe to industry standard antivirus software and keep it current.

Never open an e-mail attachment from someone you don't know.

Avoid opening an e-mail attachment from someone you know, unless you know exactly what the attachment is. The sender may be unaware that it contains a virus.

Email Spam Scam

If you send or receive e-mail, you've probably have received junk e-mail, also known as spam. Unfortunately, spam isn't limited to e-mail - it has spilled over to instant messages (IM) as well, and has become enough of a problem for instant messaging spam to warrant its own word, spim.

The following are some safety tips to protect yourself from email frauds:

Delete junk e-mail messages without opening them. Sometimes even opening spam can alert spammers.

Use anti-virus and anti-spyware software, and a firewall, and keep them up-to-date.

Avoid using public or other shared computers to access your financial accounts online, and use extra caution when using your own computer in a wireless “hot spot.”

Don't believe everything you read in online newsletters, investing blogs, or bulletin boards. Fraud artists often float false information and “hot tips” as part of their efforts to rip-off investors or manipulate the market for a particular security.

Protec Your Kid From Predactor

The Internet has become an important part of our life, we use it for work, play and study but we must be aware of the dark side similar to real life problems that can affect your children. Talk to your kids about sexual predators and potential online dangers.

Young children should not use chat rooms—the dangers are too great. As children get older, direct them towards well-monitored kids' chat rooms. Encourage even your teens to use monitored chat rooms.

If your children take part in chat rooms, make sure you know which ones they visit and with whom they talk. Monitor the chat areas yourself to see what kind of conversations take place.

Instruct your children to never leave the chat room's public area. Many chat rooms offer private areas where users can have one-on-one chats with other users—chat monitors can't read these conversations. These are often referred to as "whisper" areas.

Keep the Internet-connected computer in a common area of the house, never in a child's bedroom. It is much more difficult for a predator to establish a relationship with your child if the computer screen is easily visible. Even when the computer is in a public area of your home, sit with your child when they are online.

When your children are young, they should share the family e-mail address rather than have their own e-mail accounts. As they get older, you can ask your Internet Service Provider (ISP) to set up a separate e-mail address, but your children's mail can still reside in your account.

If all precautions fail and your kids do meet an online predator, don't blame them. The offender always bears full responsibility. Take decisive action to stop your child from any further contact with this person.

Asthma

Asthma is chronic disease usually attack respiratory tract in lungs which existence inflamed (inflammation) in respiratory tract cavity wall to bring narrowing in breath channel at the end of the day one may experience breathlessness.
Greatest asthma found at developed countries, especially those having level high air pollution whether due to fume or desert dust.
Until to this moment asthma cause not been known yet categorically although already many studies by scientist shelf. Theory or hypothesis on asthma cause yet agree with by scientist shelf in medical world.
However, what can be concluded was sufferer shelf asthma having respiratory tract having special namely very nature sensitive to various stimulation such as air pollution, sari powder, cold air, food, fur-bearing animal, mental pressure, smell or aroma sting and athletics.
Apart from that asthmatic attack was the result from sufferer experience respiratory tract infection on (ISPA) whether flu or sinisitis. Asthmatic attack also could undergo by current woman siklus menstruation, but this case happens extremely rarely.
Increase figure asthma sufferer always associated with are risk factor influence some suffering from asthma, for example hereditary factor. If a mother or father suffer asthma, then high possibility are asthma sufferer in that family member.
Asthma having its sign and symptom own, among them :
-Breathing sound especially in time breathe out. Not all asthma sufferer own breathing sound, and not all its people that breath sound is asthma sufferer.
-Suffocated narrowing result respiratory tract.
-Prolonged cough in nocturnal time or cold weather.
-Sufferer complaining felt become narrow chest.
-Serious asthmatic attack could cause sufferer not able talk because inside hardship arrange breathing.
In children's age, early symptoms traceable such as thorax itchiness or neck. During asthmatic attack, excess flurried sense from sufferer might exacerbate state. As reaction on emergency, sufferer also commonly would issue many sweat.

Preventing Kids From Sending Much Time Online

The Internet creates interest and excitement and therefore it can occupy most of your children's productive time. While in their growing years, it is important for them to manage their time and expose themselves to various activities during the day or the week in order to make their growing years more fruitful and meaningful, apart from just internet.

The following are some tips for parent to monitor their children's time online and to ensure that they are safe as well.


Ask yourself if your child's Internet use is affecting his or her school performance, health, and relationships with family and friends.

Determine how much time your children are spending online.

Get help, if your child is demonstrating strong signs of Internet addiction, consider seeking professional counseling. Compulsive Internet use may be symptomatic of other problems such as depression, anger, and low self-esteem.

Examine your own online habits. Do you have trouble controlling your Internet use? Remember, you are your child's most important role model.

Don't ban the Internet. It's an important part of most kids' social lives. Instead, establish family Internet rules about where your kids can go online and what they can do there - and stick to them. These rules might include: a limited amount of time online each day; no surfing or instant messaging until kids complete their homework; no chat rooms or online adult content.

Keep the computer out in the open. Set up your computer in a public area of your house, not in a child's bedroom.

Establish a balance. Encourage and support your child's participation in other activities - particularly physical pastimes with other children.

Help your child socialize offline. If your child is shy or socially awkward with peers, consider a social skills class. Encourage activities that will bring your child together with others who have similar interests, such as computer classes or hobby groups.

Teach your kids that not everything they read or see online is true. Encourage them to ask you if they're not sure.

Monitor your kids. Investigate software that monitors and restricts Internet use, such as the parental controls. Although filtering and monitoring tools are helpful, keep in mind that they can be disabled by a savvy computer user. Your ultimate goal should be helping your kids to develop self-control, discipline, and accountability with the Internet.

Suggest alternatives. If your children seem interested only in playing online video games, try an offline tie-in to one of their favorite games. For example, if your child enjoys fantasy role-playing games, encourage her or him to read fantasy books.

Teach Your Kid Online Safe

Internet is highly accessible to anyone who has computer at home, including your kids. It is important to teach your kids internet safety in relation to posting personal information, chatting with friends, meeting people or playing games.

The following are some tips for parents to educate their children on internet safety:

Encourage your kids to share their Internet experiences with you.

Inform your kids to tell you anything that they feel uncomfortable about on the Internet.

If your kids visit chat rooms, use instant messaging (IM) programs, online games, or other activities on the Internet that require a login name to identify themselves, help them choose that name and make sure it doesn't reveal any personal information about them.

Insist that your kids never give out your address, phone number, or other personal information, including where they go to school or where they like to play.

Teach your kids that the difference between right and wrong is the same on the Internet as it is in real life.

Show your kids how to respect others online. Make sure they know that rules for good behavior don't change just because they're on a computer.

Insist that your kids respect the property of others online. Explain that making illegal copies of other people's work—music, video games, and other programs—is just like stealing it from a store.

Tell your kids that they should never meet online friends in person. Explain that online friends may not be who they say they are.

Teach your kids that not everything they read or see online is true. Encourage them to ask you if they're not sure.

Control your children's online activity with advanced Internet software. Parental controls can help you filter out harmful content, monitor the sites your child visits, and find out what they do there.

Do not allow them to post pictures of themselves or family members.

Never give out password or credit card number to anyone.

Never accept gift offers or accept invitations to your house.

FREQUENT MISTAKE committed during EXERCISE

Exercise Extreme
Exercise exaggerated and continuously daily can converge to injuries. As good as possible selangkan a or inside two days one week so that body can rest and is restored. If you exercise heavy by today, doing much lighter in next day.
Unlimbered
Moved stretching to warm body must invariably want to start exercise. At least long five minutes.
Too quickly
If you just started exercise, start with soft and effective movement. For example swim or walk.
Too heavy a burden
Do not be influenced use heavy burdens solely to build muscle with quicker. To seek better effect, use light burden with frequent repeat. Heavy dumb bell should not exceed a or one half kilo.
Wrong move
Exercise in wrong position not only would result body damage in fact it direct no profited to yourself. If you exercise own at home, make sure body posture always in which case right.
Do not drink enough
Drink water before committing exercise, when exercise and after doing.
Eat scanty
Increase to energy with kabohidrat couple of hours before exercise. Banana or even sandwich is disc which good

Influenza A (H1N1)


48 countries have officially reported 13,398 cases of influenza A(H1N1) infection, including 95 deaths.

On 25 April 2009, the World Health Organization (WHO) declared the outbreak of swine-origin influenza A(H1N1) virus infections, first reported by the United States (US) [1] and Mexico [2], as a ’Public Health Event of International Concern‘ (PHEIC) under the International Health Regulations (2005) [3]. The pandemic alert level was raised from level 3 to level 4 on 27 April, and to level 5 on 29 April, after verification of sustained community-level outbreaks in at least two countries from the same WHO region.

On 26 April, epidemiological and laboratory investigations on three persons returning from Mexico were initiated in Spain. On 27 April, Spain reported the first laboratory-confirmed case of the new influenza A(H1N1) virus infection in Europe, in a traveller returning from Mexico. Since then, the number of confirmed cases in Spain has risen continuously and reached a total of 98 as of 11 May 2009

'Those who beginning to feel unhealthy or be early sign infection like cough and fever should immediate get treatment of nearby doctor and reduce social intercourse with other partner including eluded from attending class and work in office. This move to prevent disease transmission at school and at workplaces may involve spreading of contagion”

Design by Blogger Templates