Discover how to stop hair loss

In one of my other articles, I revealed that plugged hair follicles are one of the main conditions that start hair thinning and baldness. The other condition is insufficient blood circulation in the scalp.

When you don’t have enough blood circulating in your scalp, then your hair roots don’t get enough nutrients to support the life and strength of your hair in the follicle.

The hardest place to get good circulation is at the top of your scalp. It is the furthest point away from your heart. It is the area that is less stimulated. The sides of your head are stimulated as you sleep and move your head around the pillow. That is one reason why most people still have hair on the sides of their head while the top is completely bald.

So what the ways you can increase blood circulation to the top of your head to stop hair loss?

Here are two ways to stop hair thinning

* Use herbal remedies to increase body and scalp blood circulation * Use hot and cold hydrotherapy

Use herbal remedies to increase body and scalp blood circulation

There are several herbs that provide increase circulation to all parts of the body. Two good standby remedies are ginkgo biloba and cayenne pepper. Use ginkgo biloba as indicated on the label. Ginkgo increases the blood circulation in the brain and all parts of the head.

Use Cayenne pepper in the formulation made of Heart Foods Company. This Cayenne strengthens the heart giving it the ability to pump blood to the furthest reaches of the body.

There are two other herbal formulations that have recently come out to provide increase circulation to all parts of the body – vital cell and Arjuna.

Vital cell is a Chinese herbal combination that is available in the US. It is a powerful remedy that helps to re-establish small veins that have closed off. This creates more pathways for blood to go where it is needed and where it once went.

Arjuna is another herb that comes from another country – India. It is now readily available in the US. Arjuna is the latest herb to be exposed as good for preventing and reducing arthrosclerosis. By reducing narrowing of the arteries in the head, strokes can be avoided and a side benefit is the scalp get more blood.

Use Hot and Cold Hydrotherapy to prevent hair loss

I have talked about this natural way of bringing more blood into the scalp. It’s a technique I use every time I shower. At the end of your shower, run hot water over your head for 20 seconds, turn the hot water off and allow the cold water to run over your head for 20 seconds.

Do this hot-cold water technique three – four times and end with the cold water. This technique allow blood to move in and out of the lower layers of your scalp giving you a blood massage and providing more nutrients to your hair roots. As a side benefit, you are bringing in more blood to your brain giving you more brain power as long as use this technique.

Use herbs to improve you blood circulation to your scalp and use hot-cold water to blood massage your scalp. By doing this, you will find less hair loss and you may even start to see some hair growth.

Article Source: http://www.afroarticles.com/article-dashboard

What Are Food Labels And How To Read

Food labels will give you information about the elements of the food and can help you to decide what to choose as part of an overall healthy eating plan.

Food labels provide information about nutrition facts. They also tell you what's in a packaged food (i.e., the ingredients). Some food labels also state which country the food came from, whether the food is organic, and certain health claims.

Information that are given in a label:

Reading food labels seem to be the most effective way to understand the amount and kinds of nutrients that are provided in the item. It lets you make sensible food selections.

The following information will help you to read a food label.

Serving size: The amount of servings stated in the food label refers to the quantity of food people usually consume. It determines the amount of nutrients that enters the body. This means that if you will follow strictly what the serving size is, you will obtain the same amount of nutrients according to the serving size that was given in the label.

Calories, Calories from Fat and Percent Daily Values: This part of a food label provides the calories serving and the calories that come from fat. If you need to know the total number of calories you eat every day or the number of calories that come from fat, this section provides that information. Remember that this part of the label doesn't tell you whether you are eating saturated or unsaturated fat.

On the right side of a food label, you'll see a column that lists percentages. These percentages refer to the percent daily values (%DV). Percent daily values tell you how much of something, whether it's fat, sugar or vitamin A, one serving will give you compared to how much you need for the entire day. It will help you gauge the percentage of a nutrient requirement met by one serving of the product. One way to use this section of the label is when you comparison shop.

Fat, Sugar, Sodium and Carbohydrate: This section of a food label shows the name of a nutrient and the amount of that nutrient provided by one serving of food. You may need to know this information, especially if you have high blood pressure, diabetes or are eating a diet that restricts certain nutrients such as sodium or carbohydrates.

Food labels also include information about how much sugar and protein is in the food. If you are following a low-sugar diet or you're monitoring your protein intake, it's easy to spot how much of those nutrients are contained in one serving.

Vitamins, Minerals and Other Information:

The light purple part of the label lists nutrients, vitamins and minerals in the food and their percent daily values. Try to average 100% DV every day for vitamins A and C, calcium, iron and fiber. Do the opposite with fat, saturated fat, sodium and cholesterol. Try to eat less than 100% DV of these.

Reading Label Lingo:

In a food label following terms are used to indicate the contents of the food. To read a label you have to know about the phrases. They are-

1. 'Low in calories' means that the food can be eaten frequently without going beyond guidelines for a good diet.

2. No calories or calorie free - Contains less than 5 calories per serving.

3. 'Low in sodium' means less than 140mg. a serving.

4. 'Reduced' means the product has at least 25 percent fewer calories of an ingredient than the regular product.

5. 'Good source' means one serving has 10 to 19 percent of Daily Value for that nutrient.

6. 'Low fat' means the product contains no more than 3 grams of fat per serving.

7. 'Lite' means that the food contains at least 50 percent less fat than the food it's being compared with.

8. 'Fresh' means that the food cannot have been frozen, processed, heated or chemically preserved.

9. 'Organic' means foods that have been prepared to a certain production standard. They have been grown without the use of conventional pesticides, artificial fertilizers, or sewage sludge. They have also not been processed without ionizing radiation or food additives.

10. No preservatives - Contains no preservatives (chemical or natural).

11. Sugar free - Contains less than 1/2 gram of sugar per serving.

12. Reduced sugar - at least 25% less sugar per serving than the reference food.

13. No preservatives added - Contains no added chemicals to preserve the product. Some of these products may contain natural preservatives.

14. No salt or salt free - Contains less than 5 mgs of sodium per serving.

15. High fiber - 5 g or more per serving.

16. Good source of fiber - 2.5 g to 4.9 g. per serving.

17. More or added fiber - Contains at least 2.5 g more per serving than the reference food.

Common Mistakes to Avoid When Reading a Food Label:

Until you become accustomed to reading food labels, it's easy to become confused. Avoid these common mistakes when reading labels:

A label may say that the food is reduced fat or reduced sodium. That means that the amount of fat or sodium has been reduced by 25% from the original product. It doesn't mean, however, that the food is low in fat or sodium. For example, if a can of soup originally had 1,000 milligrams of sodium, the reduced sodium product would still be a high-sodium food.

Don't confuse the % DV for fat with the percentage of calories from fat. If the 15% that 15% doesn't mean that 15% of the calories come from fat.

Rather, it means that you're using up 15% of all the fat you need for a day with one serving (based on a meal plan of 2,000 calories per day).

Don't make the mistake of assuming that the amount of sugar on a label means that the sugar has been added. For example, milk naturally has sugar, which is called lactose. But that doesn't mean you should stop drinking milk because milk is full of other important nutrients including calcium.

Article Source: http://www.afroarticles.com/article-dashboard

Privacy Thieft

Identity theft occurs when someone uses your personal information, like your name, you birthday, telephone number number, or credit card number, without your permission, to commit fraud or other crimes. It's important to protect your personal information, and to take certain steps quickly to minimize the potential damage from identity theft if your information is accidentally disclosed or deliberately stolen:

Be careful when giving out personal information in a website, email, instant messaging systems, chat rooms or on message boards, especially when you are not sure. You have to right to ask why and how the information is to used.

Read privacy.

Close compromised credit card accounts immediately.

Monitor your credit card statements. Keep in mind that fraudulent activity may not show up right away.

Consult with your financial institution about any unusual activities on your accounts.

Contact relevant government agencies to cancel and replace any stolen driver's licenses or other identification cards.

Watch for signs of identity theft: late or missing bills, receiving credit cards that you didn't apply for, being denied credit or offered less favorable terms for no apparent reason, or getting contacted by debt collectors or others about purchases you didn't make.

Don't send a picture of yourself, your friends or family to someone you met or chat with online.

If you plan to meet someone that you have met on the Internet, take you're your friend along. People in real life can be different from how they are online.

Don't open up e-mails, files, or website links from people you don't really know.

Peer to Peer

Peer-to-peer (P2P) file-sharing allows users to share files online through an informal network of computers running the same software. File-sharing can give you access to a wealth of information, but it also has a number of risks. You could download copyright-protected material, pornography, or viruses accidentally. Or you could mistakenly allow other people to copy files you don't mean to share.

The following are the safety tips if you decide to share resources:

Set up the file-sharing software very carefully, checking the proper settings so that other users won't have access to your private files.

Consider installing anti-spyware software. Some file-sharing programs install spyware that can monitor your browsing habits and send that data to third parties.

Adjust the file-sharing program's controls so that it is not connected to the P2P network all the time. Some file-sharing programs automatically open every time you turn on your computer.

Use anti-virus software and a firewall and update them regularly. Files you download using a P2P network could be mislabeled, hiding a virus or other unwanted content.

Tips When Investing

The Internet allows investors to access account information 24/7, initiate securities transactions from virtually anywhere, and quickly and offer inexpensively research for investment opportunities. But the Internet is not fail-safe.

The following tips will help you to invest wisely online:

Protect your passwords for your online investment accounts. Keep passwords in a secure place, and don't share them on the Internet, over email, or on the phone.

Don't reply to spam unless you're certain that the message comes from a legitimate source. This includes not responding to such messages that offer an option to "Remove me from your list."

Don't give personal information in an e-mail or instant message . It could be a trick. Most legitimate companies won't ask for personal information by e-mail.

Think twice before opening attachments or clicking links in e-mail or instant messages, even if you know the sender. If you cannot confirm with the sender that an attachment or link is safe, delete the message.

Don't buy anything or give to any charity promoted through spam emails. Spammers often swap or sell the e-mail addresses of those who have bought from them, so buying something through spam may result in even more spam.

Criminals use spam to prey on people's desire to help others. If you receive an e-mail request from a charity you'd like to support, avoid donation scams by calling the organization directly to find out how to contribute.

Don't forward chain e-mail messages. Not only do you lose control over who sees your e-mail address, but you also may be furthering a hoax or aiding in the delivery of a virus.

If you receive abusive, harassing, or threatening e-mail messages or have been the target of a phishing e-mail scam, report it to MyCERT.

Report phishing scams and other fraudulent e-mail to the company that has been misrepresented and also to MyCERT. Contact the organization directly and not through the e-mail you received.

Shopping

Shopping on the Internet can be economical and convenient. Shopping on the Internet is no less safe than shopping in a store or by mail.

The following tips will help you to shop safely:

Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have questions or problems.

Know exactly what you're buying. Read the seller's description of the product closely, especially the fine print.

Know what it will cost as there may be hidden charges. Make sure you know the shipping and handling charges and the total charges.

Paying by credit card offers you better protection as the credit card company is part of the transaction.

Read the refund policies and delivery information.

Always print and save records of your online transactions.

Medical Insurance Plans

There are plenty of reasons why everyone should have one of the medical insurance plans available. If you are looking online for a quote for medical coverage you are on the right path to providing financial security to your family. There are numerous techniques you can make use of to help you save money with a health plan that you definitely can benefit from.

A health insurance plan is something one cannot really go without. It is not a good idea to rely on the fact that children have free insurance and neglect yourself and your partner. You have to pay expensive bills on the doctor every time you get injured or sick.

When an emergency happens and you have to rush to the emergency room without having a medical plan, your budget will be definitely shattered. It is thus a vital thing to have the best financial provision with the assistance of one of the medical care plans.

Prior to purchasing a medical insurance plan, you need to go shopping for the plan that will most certainly suit your needs. There are some individual health plans which are not so expensive. If you pay cash every time when you need serious medical attention, you will never be able to save up for other dreams or plans you may have for your children or your retirement. An affordable health insurance is the best technique of saving money with health.

After deciding over the kind of coverage that you need, you need to take a closer look at the quotes for health insurance. You have to decide on what amount of money are you willing to pay monthly for the health insurance plan.

Try to choose one of the cost effective medical insurance plans that are effective as well for you and for your whole family.

Researching medical insurance plans is easy when you utilize the online resources that are available. We all need medical health insurance and need it at rates that we can afford. This is where the Internet works to our advantage, allowing us to find the coverage we need at the cost that we can afford.

Eats you can afford

Suffering a case of tight wallet syndrome doesn't mean you have to forgo delicious meals. Here are easy thrifty recipes you can try at home.

The current economic slowdown has gotten everybody in a pickle resulting in consumers being not as frivolous with the ringgit as they once were.

Prices of goods are on the rise and as people find a common ground in trying to taper their spending, more and more of us are – for the lack of a better term – tight fisted with money these days.

Food is one of the first things that seem to hit most of us during this economic slowdown with the majority of the public now changing their eating habits and have gone so far to opt from dining out in order to save a little cash.

Restaurants are realising this too as more eateries and franchises, even fast food ones, offering special "value for money" offers in order to make up for this current deficit.

But if you want something a little more substantial, nutritious and tasty compared to salted fish, soy sauce and steam rice on a daily basis, then do take heed of these meal suggestions (from RM5 to RM30) you can attempt at home. We guarantee they'll satisfy your hunger pangs without putting a dent into your wallet.

Best for RM5

Although the omelette is widely considered as a breakfast item, it's also versatile enough to be had at any time of the day especially with a wide variety of ingredients added in.

A three-egg Spanish omelette, for example, is perfect to satisfy that hunger pang or as a quick snack. To make the omelette more appetising and fulfilling, use chopped onions, sliced bell peppers and mushrooms with a little shredded cheddar cheese for the filling.

If you're the carnivorous type, some sliced sausages, chopped ham and bacon bits will definitely work a treat.

Start off by heating the pan with a little oil, sweat the onions and add in the peppers, mushrooms and meat items. Cook for a minute and add in beaten eggs into the mix, cook until eggs are set and add in pepper and salt to taste and cheddar cheese before folding. Set into plate and add in a dash of Tabasco sauce before serving. (Serves two persons)

Best for RM15

Spaghetti is a cheap option as it's easier to store, cook with and most importantly saves you time and money.

Plus, pasta sauces these days come in all sort of flavours, which you can also easily modify on your own.

For added variety and a bit more of a kick, do consider adding in canned tuna or meat items like sliced chicken fillets or minced beef for a meatier option to the dish.

A quick boil of the pasta and a saucepan is all that's needed for this hearty pasta meal. A dash of pepper and salt with a sprinkle of rosemary herbs to the meat and a quick stir-fry in a little olive oil (before adding in the pasta sauce) will add a little depth to the dish. Throw in chopped peppers and sliced mushrooms.

For a more Malaysian flavour, feel free to sprinkle in some dried chillie flakes to the dish as well. (Serves three to four)

Best for RM30

Nothing is heartier than a roast chicken meal and even though it takes a little preparation time, it's easy enough to do on your own.

All you need is a whole chicken (patted dry) marinated with butter or olive oil, thyme, rosemary or basil, a dash of Worcestershire sauce and a tablespoon of Montreal Chicken Seasoning.

Marinate the chicken with the ingredients – especially inside the cavity – and tie the bird up around the wing and thigh area before placing in the roasting pan.

Preheat oven to about 180 to 200 degree Celsius and place a few potatoes (wrapped in aluminium foil) into the pan as well. Roast the chicken for approximately one hour and 15 minutes or until done; you can tell by the golden brown skin colour.

To make absolutely sure, prick the side of the chicken thigh to see if there's a clear juice oozing out of it. Once you're sure it's done, remove the chicken and leave it aside to cool.

Cut the chicken into quarters and serve with a portion of baked potato. Last but not least, toss in a few salad leaves or a scoop of baked beans to complete your meal. (Serves four)

by Richard Augustin

Material girls

Does love still matter in the 21st century? Why is it when a good-looking woman marries a rich man, we always assume she is marrying him for his net worth?

While tall, dark and handsome was once the criteria for a dream man, the new breed of women today will tell you she will settle for short and ugly ... as long as he comes with cold hard cash.

It really seems like some women are more interested in how much moolah a man has in his checking account than how much love he has in his heart.
Gad Elmaleh and Audrey Tautou Star in Priceless. A young gold digger(Tautou)mistakenly woos a mild- mannered bartender (Elmaleh)thinking he's a wealthy suitor.

So just who are this new breed of women? There is a name for them – gold diggers.

We constantly see them fictionalised on the big screen; an upcoming Malaysian movie Pisau Cukur tells of two gold diggers who pursue rich men on a cruise ship.

In the French movie Priceless, Audrey Tautou is cast as a beautiful woman who selects her beaus based on the size of their wallets and there are also real-life celebrities who have been labelled that by the media. Remember the late Anna-Nicole Smith and her old but rich husband?.

More recently, Heather Mills was accused of being a gold digger when she married Paul McCartney despite proclaiming her love forthe Beatle. Of course, her divorce settlement of £24.3mil (RM170mil) did not do well to support her case.

I'm sure many of us know of a friend who is in a relationship with with someone completely wrong for her but so perfect for her Gucci and Prada penchant.

Here are a few of those kinds of stories ...

For love or money?

Self-confessed gold digger Sasha, 28, shares her thoughts: "I want to be financially stable and everyone knows that one of the fastest ways to do this is to marry a rich man. Is there anything wrong with wanting to live a good life, even if it means having love come second?"
Heather Mills

Sasha's view is not uncommon. Years ago, families eagerly married off their young daughters to the most sought-after bachelors who most often hailed from well-to-do families.

The only difference is, back then women had to be coquettish to attract a man. Today, she literally has to put herself out there in her best skimpy black dress!

Examples of successful pursuits in would include the achievements of soccer wives Coleen McLoughlin and Cheryl Tweedy – women who are known for whom they marry rather than their own successes.

Still, there's nothing wrong with that. If you think about it, even Cinderella did everything she could to nab her Prince Charming.

But it seems the act of gold digging is getting more attention today and shamelessly aiming for the richest is accepted and even highly advocated. In fact, there are online sites – sugardaddies.com, seekingmillionaire.com – to help gold diggers snag themselves a champion.

Psychologist Dr Sheila Keegan agrees, "People want an instant route to fame, wealth and success. Greed is no longer perceived as a bad thing, and women are admired for being smart, but not necessarily clever. It's seen as a question of who's using whom. Anna Nicole Smith may have got millions, but J Howard Marshall got to share his bed with a beautiful busty blonde while he was in his 80s."

With divorce rates on theup, some may even see marrying rich as a safety net should anything go wrong. Think of it as a business transaction.

She compromises on good looks and a great sense of humour for a secure future and comfortable life. And should the marriage end, Miss Gold Digger still gets to walk away with a hefty settlement.

"Relationships are about compromise, aren't they?" says Tasmina Perry, the author of Daddy's Girl, a book which examines the subject. "Gold diggers are just prepared to compromise that little bit more than most."
Anna Nicole Smith

Can money really buy love? Apparently so, if you go by the trend. As righteous as a woman may want to be, how many can actually say they are not tempted by the thought of being showered with gifts, diamonds, luxurious holidays and an easy comfortable life?

Even after earning her own money (and lots of it as well), sometimes a woman just wants to be pampered. Besides, after the love is gone, which is more enticing – a mortgage and loans, or a charming penthouse suite and an unlimited supplementary charge card?

Sugardaddie.com director Paul Homewood defends the gold digger.

"There is an opinion that women on this site are just after the men for their money. But in fact, most of them are here for the quality of the men," he says. "They are looking for men who have ambition, who want to get on in life. The men on here are professional men, city bankers, doctors and so on. Why shouldn't that be attractive to women?"

Bye-bye feminism

Does this spell the death of feminism and equality? Have all that women fought so hard for come to this: the size of his pay check and the car he drives?

And what happens when Mr Millionaire decides to go for a younger and more attractive gold digger?

"I've dated men after men, all of whom have bought me gifts, wined and dined me at the most expensive restaurants," says Lina. "Yes, sometimes I get dumped for another taller, prettier, sexier woman. It happens. But I am sure one day I will find my man, and he will be able to provide me with not only love and a good life for me and our children."

It is not difficult to see why more and more men are complaining about how hard it is to meet women who are sincere. "Unsuitable'' men are brushed off simply for not wearing the right suit or living at the ideal address. i

If he has a lot, he wins; if he barely makes enough, then he'll spend Valentine's Day all aloneuntil he does.

For better or for worst, for richer or for poorer? Forget about it – in the gold digger's world, it is all about the money.

Like Madonna sang in Material Girl, "They can beg and they can please. But they can't see the light, that's right. Cause the boy with the cold hard cash is always mister right."

Subjects' names have been changed to protect their privacy. Some quotes were sourced from www.dailymail.co.uk and www.independent.co.uk.

How to spot a gold digger

* She wants to marry. Now. A gold digger for push for marriage fast so that she won't lose out on the opportunity with Mr. Rich.

* She gives love. Quickly. Want to snag him now? Miss Gold Digger will quickly dish out good old loving for her target to snare him.

* She plays the role of a good wife. Too soon. She cooks, cleans and washes. She doesn't nag him when he goes out with the guys. Why? So she can show him exactly what a great partner she will be.

* She makes him pay for everything. Always. Pay for her dinner. Buy her the latest designer bag. Help out with her credit card bill. A gold digger will have no qualms asking him for financial favours. That's what he is for anyway, right

by S.C. Chua

Online Auction

Thinking of bidding in an online auction, or selling some of your stuff? Internet auctions are a great resource for shoppers and sellers, but you need to be aware of the issues.

Evaluate how soon you need to receive the item you're bidding on, and whether you can tolerate it being delivered late, or even not delivered. Many complaints about Internet auctions fraud involve late shipments, no shipments, or shipments of products that aren't the same quality as advertised.

Whether you're a buyer or a seller, read each auction site's Terms of Use before using it for the first time — sites may charge fees, follow different rules, or offer different protections.

Carefully consider your method of payment. Learn what recourse you have if something goes wrong. Don't send cash, and don't use a money transfer service.

Don't reply to "phishing" emails: messages that look like they've been sent by an auction website or payment service and ask for your password or other personal information.

Know who you're dealing with. Avoid doing business with sellers you can't identify, especially those who try to lure you off the auction site with promises of a better deal. Confirm the seller's telephone number in case you have questions or problems.

Know exactly what you're bidding on. Read and print a copy of the seller's description of the product closely, especially the fine print. Save copies of all emails you send and receive from the auction site or seller.

Online Banking end Scam

Fraudsters use a method known as phishing to send e-mail or instant message spam that looks like messages coming from reputable companies such as banks and auction sites. The forged message is trying to entice you to click a link on a Web page or in a pop-up window. If you click on the link, it could download a virus or lead you to a situation where you are asked to key in confidential information. There has been an increase in reported cases of phishing scams over the years and the techniques used are becoming also becoming more sophisticated, therefore it is important that we to know how to recognise and prevent from phishing activities.

Tips for safe Online Banking:


Keep your password and PIN code safe, and change them regularly. If you conduct transactions in a number of websites, use different passwords for each. Create unique passwords that are difficult to guess, e.g. use combination of letters and numbers.

How do you know the website is secured? Look at the status bar for the icon when you visit the bank site.

Be sure that the email attachments before you open are from trusted sources. Do not respond to emails asking for personal information, login information or change password notification via email. If not sure of the correspondence, contact the bank.

Never click on the link in email messages. Manually key-in URL address into the browser’s address bar.

Use an antivirus, anti-spyware and firewall program that is popular and well supported by the vendor. Ensure the programs are up-to-date and frequently updated.

Install or enable security updates for your operating system.

Memorize your password and if possible, do not write it down anywhere. Report identity theft or any suspicious activity immediately to the bank.

If you decide to go to other websites linked via your internet banking website, read the privacy and policy information of that website first, before conducting any transaction.

Check your account balances regularly to ensure that no fraudulent withdrawal has taken place.

If your bank account has been compromised, act fast and inform the bank, and the Cyber security authority.

When visiting your online banking site, check that the Date and Time matches the date and time when you last signed in.

Use Web browsers that uses strong encryption (128bit encryption) – For Windows systems - Firefox 1.0, IE 5.5 and NN7.2, For Apple Macintosh OS 10.2 - Apple Safari 2.0, Firefox 1.0.



Are You a Victim? Look out for these signs:

It is known that phishers always come out with new phishing tactics to lure their victims, therefore you should learn to observe some of the signs. Phishing activities are mostly carried out via email and websites. Phishing via email usually involves fraudulent email that looks like a legitimate email, usually asking you to either update or verify your online account. A phishing website can have similar look and features as a legitimate website. Therefore it is important that you learn to tell the differences between phishing email/website and the real email/website. The consequences of not being able to identify could lead you to identity theft and financial losses.


Phishing Email
Common phrases usually used by phishers in phishing emails:

“Verify your account” - a trick to gain your online account information such as your account number and password

“If you don’t’ respond within 24 hours, your account will be deleted” - an urgent message to seek for quick action

“Dear Valued Customer” or “Dear Customer” - a general salutation instead of addressing specific customer

“Click the link below to update your account information” – a trick to direct you to a phishing website

“Please provide your username and password” - a trick to gain your username and password

“You have won…” – a trick to gain your trust and cooperation to follow instruction in email

Phishing Website
Common tactics used in phishing website:

Genuine looking front page and content. Some may even have legitimate logo taken from the real website.


URL that looks similar to legitimate URL. Example: URL ‘www.abcbank.com.my’ could appear as ‘www.abcdbank.com.my

Fake URLs are masked to trick you into thinking that you are accessing a real website

Use of the names and official-looking logo of real company or financial institutions

Use of fake forms to collect your information look real and official

Use of fake pop-up window to collect your account information with actual legitimate website opened in the background



How to Protect Your Web Browser from Phishing?

You can use anti-phishing programs or toolbars to defeat phishing. There are dozens of such programs and tools you can download freely to help combat phishing scams. These tools usually come in the form of web browser extensions, plug-ins or toolbars. The following are some links for information and downloads on anti-phishing tools and web browser plugins:


Mozilla Firefox 2 Phishing Protection
http://www.mozilla.com/en-US/firefox/phishing-protection/


Click here to view video clip on Mozilla Firefox 2 Phishing Protection

Microsoft Phishing Filter
http://www.microsoft.com/protect/products/ yourself/phishingfilter.mspx

Click here to view video clip on Microsoft Phishing Filter

Netcraft Anti-Phishing Toolbar
http://toolbar.netcraft.com/

Mobile Safety Tip

Smart phones, cell phones, and handheld PCs can also be infected with viruses but it is not as widespread as you may have heard reported, but the problem is on the rise. Your mobile device can be infected when you download programs or files that are already infected. In the case of mobile phones, that might mean downloading photos, video clips, ring tones, cell phone themes, or other programs.

Mobile viruses can also spread through cell phones that are equipped with Bluetooth, a technology that allows you to transfer data between different devices, such as sending photos from your cell phone to your printer or transferring addresses stored on your device. If you have Bluetooth enabled on your mobile device and in "discoverable mode" (see the manual that came with your device for more information), and you come within 30 feet of another infected device that also has Bluetooth enabled and is running the same operating system as your mobile device, then you might get infected.

The following are some tips to help protect against mobile viruses:

Only download or accept programs and content (including photos, video clips, ring tones, mobile device themes, and games) from a source you trust. Our recommendations mentioned for safe computing, also apply when you surf the Web, send e-mail, or download programs using a mobile device. If you don't know whom an attachment is from or if you weren't expecting it, do not to open it or download it at all.

If your phone is equipped with Bluetooth, turn it off or set it to non-discoverable mode when you're not using it. Only accept incoming data from a source you trust. For more information, see the instructions that came with your mobile device.

If your phone is equipped with Infrared beam, only allow it to receive incoming beams when you're receiving data from a source you trust.

Download and install antivirus software for your mobile device.

Remember to treat your phone or other handheld device as carefully you would your wallet, especially in places that are prone to theft.

Lock or protect your mobile device with a password, so if you do lose your mobile device, a thief will have a more difficult time using it to make phone calls or access personal information you may have stored on it.

Malware

Computer viruses are software programs deliberately designed to interfere with computer operation, record, corrupt, or delete data, or spread themselves to other computers and throughout the Internet, often slowing things down and causing other problems in the process. Just as human viruses range in severity from the 24-hour flu to the Ebola virus, computer viruses range from the mildly annoying to the downright destructive, and come in new and different forms. The good news is that with an ounce of prevention and a little knowledge, you are less likely to fall victim to viruses and you can diminish their impact.

The following are the tips to help avoid viruses:

Keep your computer system current by enabling the "automatic update" feature.

Use an Internet firewall (Note: Windows XP with SP2 has a firewall already built-in and active).

Subscribe to industry standard antivirus software and keep it current.

Never open an e-mail attachment from someone you don't know.

Avoid opening an e-mail attachment from someone you know, unless you know exactly what the attachment is. The sender may be unaware that it contains a virus.

Email Spam Scam

If you send or receive e-mail, you've probably have received junk e-mail, also known as spam. Unfortunately, spam isn't limited to e-mail - it has spilled over to instant messages (IM) as well, and has become enough of a problem for instant messaging spam to warrant its own word, spim.

The following are some safety tips to protect yourself from email frauds:

Delete junk e-mail messages without opening them. Sometimes even opening spam can alert spammers.

Use anti-virus and anti-spyware software, and a firewall, and keep them up-to-date.

Avoid using public or other shared computers to access your financial accounts online, and use extra caution when using your own computer in a wireless “hot spot.”

Don't believe everything you read in online newsletters, investing blogs, or bulletin boards. Fraud artists often float false information and “hot tips” as part of their efforts to rip-off investors or manipulate the market for a particular security.

Protec Your Kid From Predactor

The Internet has become an important part of our life, we use it for work, play and study but we must be aware of the dark side similar to real life problems that can affect your children. Talk to your kids about sexual predators and potential online dangers.

Young children should not use chat rooms—the dangers are too great. As children get older, direct them towards well-monitored kids' chat rooms. Encourage even your teens to use monitored chat rooms.

If your children take part in chat rooms, make sure you know which ones they visit and with whom they talk. Monitor the chat areas yourself to see what kind of conversations take place.

Instruct your children to never leave the chat room's public area. Many chat rooms offer private areas where users can have one-on-one chats with other users—chat monitors can't read these conversations. These are often referred to as "whisper" areas.

Keep the Internet-connected computer in a common area of the house, never in a child's bedroom. It is much more difficult for a predator to establish a relationship with your child if the computer screen is easily visible. Even when the computer is in a public area of your home, sit with your child when they are online.

When your children are young, they should share the family e-mail address rather than have their own e-mail accounts. As they get older, you can ask your Internet Service Provider (ISP) to set up a separate e-mail address, but your children's mail can still reside in your account.

If all precautions fail and your kids do meet an online predator, don't blame them. The offender always bears full responsibility. Take decisive action to stop your child from any further contact with this person.

Asthma

Asthma is chronic disease usually attack respiratory tract in lungs which existence inflamed (inflammation) in respiratory tract cavity wall to bring narrowing in breath channel at the end of the day one may experience breathlessness.
Greatest asthma found at developed countries, especially those having level high air pollution whether due to fume or desert dust.
Until to this moment asthma cause not been known yet categorically although already many studies by scientist shelf. Theory or hypothesis on asthma cause yet agree with by scientist shelf in medical world.
However, what can be concluded was sufferer shelf asthma having respiratory tract having special namely very nature sensitive to various stimulation such as air pollution, sari powder, cold air, food, fur-bearing animal, mental pressure, smell or aroma sting and athletics.
Apart from that asthmatic attack was the result from sufferer experience respiratory tract infection on (ISPA) whether flu or sinisitis. Asthmatic attack also could undergo by current woman siklus menstruation, but this case happens extremely rarely.
Increase figure asthma sufferer always associated with are risk factor influence some suffering from asthma, for example hereditary factor. If a mother or father suffer asthma, then high possibility are asthma sufferer in that family member.
Asthma having its sign and symptom own, among them :
-Breathing sound especially in time breathe out. Not all asthma sufferer own breathing sound, and not all its people that breath sound is asthma sufferer.
-Suffocated narrowing result respiratory tract.
-Prolonged cough in nocturnal time or cold weather.
-Sufferer complaining felt become narrow chest.
-Serious asthmatic attack could cause sufferer not able talk because inside hardship arrange breathing.
In children's age, early symptoms traceable such as thorax itchiness or neck. During asthmatic attack, excess flurried sense from sufferer might exacerbate state. As reaction on emergency, sufferer also commonly would issue many sweat.

Preventing Kids From Sending Much Time Online

The Internet creates interest and excitement and therefore it can occupy most of your children's productive time. While in their growing years, it is important for them to manage their time and expose themselves to various activities during the day or the week in order to make their growing years more fruitful and meaningful, apart from just internet.

The following are some tips for parent to monitor their children's time online and to ensure that they are safe as well.


Ask yourself if your child's Internet use is affecting his or her school performance, health, and relationships with family and friends.

Determine how much time your children are spending online.

Get help, if your child is demonstrating strong signs of Internet addiction, consider seeking professional counseling. Compulsive Internet use may be symptomatic of other problems such as depression, anger, and low self-esteem.

Examine your own online habits. Do you have trouble controlling your Internet use? Remember, you are your child's most important role model.

Don't ban the Internet. It's an important part of most kids' social lives. Instead, establish family Internet rules about where your kids can go online and what they can do there - and stick to them. These rules might include: a limited amount of time online each day; no surfing or instant messaging until kids complete their homework; no chat rooms or online adult content.

Keep the computer out in the open. Set up your computer in a public area of your house, not in a child's bedroom.

Establish a balance. Encourage and support your child's participation in other activities - particularly physical pastimes with other children.

Help your child socialize offline. If your child is shy or socially awkward with peers, consider a social skills class. Encourage activities that will bring your child together with others who have similar interests, such as computer classes or hobby groups.

Teach your kids that not everything they read or see online is true. Encourage them to ask you if they're not sure.

Monitor your kids. Investigate software that monitors and restricts Internet use, such as the parental controls. Although filtering and monitoring tools are helpful, keep in mind that they can be disabled by a savvy computer user. Your ultimate goal should be helping your kids to develop self-control, discipline, and accountability with the Internet.

Suggest alternatives. If your children seem interested only in playing online video games, try an offline tie-in to one of their favorite games. For example, if your child enjoys fantasy role-playing games, encourage her or him to read fantasy books.

Teach Your Kid Online Safe

Internet is highly accessible to anyone who has computer at home, including your kids. It is important to teach your kids internet safety in relation to posting personal information, chatting with friends, meeting people or playing games.

The following are some tips for parents to educate their children on internet safety:

Encourage your kids to share their Internet experiences with you.

Inform your kids to tell you anything that they feel uncomfortable about on the Internet.

If your kids visit chat rooms, use instant messaging (IM) programs, online games, or other activities on the Internet that require a login name to identify themselves, help them choose that name and make sure it doesn't reveal any personal information about them.

Insist that your kids never give out your address, phone number, or other personal information, including where they go to school or where they like to play.

Teach your kids that the difference between right and wrong is the same on the Internet as it is in real life.

Show your kids how to respect others online. Make sure they know that rules for good behavior don't change just because they're on a computer.

Insist that your kids respect the property of others online. Explain that making illegal copies of other people's work—music, video games, and other programs—is just like stealing it from a store.

Tell your kids that they should never meet online friends in person. Explain that online friends may not be who they say they are.

Teach your kids that not everything they read or see online is true. Encourage them to ask you if they're not sure.

Control your children's online activity with advanced Internet software. Parental controls can help you filter out harmful content, monitor the sites your child visits, and find out what they do there.

Do not allow them to post pictures of themselves or family members.

Never give out password or credit card number to anyone.

Never accept gift offers or accept invitations to your house.

FREQUENT MISTAKE committed during EXERCISE

Exercise Extreme
Exercise exaggerated and continuously daily can converge to injuries. As good as possible selangkan a or inside two days one week so that body can rest and is restored. If you exercise heavy by today, doing much lighter in next day.
Unlimbered
Moved stretching to warm body must invariably want to start exercise. At least long five minutes.
Too quickly
If you just started exercise, start with soft and effective movement. For example swim or walk.
Too heavy a burden
Do not be influenced use heavy burdens solely to build muscle with quicker. To seek better effect, use light burden with frequent repeat. Heavy dumb bell should not exceed a or one half kilo.
Wrong move
Exercise in wrong position not only would result body damage in fact it direct no profited to yourself. If you exercise own at home, make sure body posture always in which case right.
Do not drink enough
Drink water before committing exercise, when exercise and after doing.
Eat scanty
Increase to energy with kabohidrat couple of hours before exercise. Banana or even sandwich is disc which good

Influenza A (H1N1)


48 countries have officially reported 13,398 cases of influenza A(H1N1) infection, including 95 deaths.

On 25 April 2009, the World Health Organization (WHO) declared the outbreak of swine-origin influenza A(H1N1) virus infections, first reported by the United States (US) [1] and Mexico [2], as a ’Public Health Event of International Concern‘ (PHEIC) under the International Health Regulations (2005) [3]. The pandemic alert level was raised from level 3 to level 4 on 27 April, and to level 5 on 29 April, after verification of sustained community-level outbreaks in at least two countries from the same WHO region.

On 26 April, epidemiological and laboratory investigations on three persons returning from Mexico were initiated in Spain. On 27 April, Spain reported the first laboratory-confirmed case of the new influenza A(H1N1) virus infection in Europe, in a traveller returning from Mexico. Since then, the number of confirmed cases in Spain has risen continuously and reached a total of 98 as of 11 May 2009

'Those who beginning to feel unhealthy or be early sign infection like cough and fever should immediate get treatment of nearby doctor and reduce social intercourse with other partner including eluded from attending class and work in office. This move to prevent disease transmission at school and at workplaces may involve spreading of contagion”

Definition of Nursing

Question
When I refer to dictionary, it said that nursing are some sort of aiding the doctor... when I ask some nurses they hate of being refer to doctor's hellper... Please tell me the correct definition of nursing?

Answer
"Nursing encompasses autonomous and collaborative care of individuals of all ages, families, groups and communities, sick or well and in all settingsNursing includes the promotion of health, prevention of illness, and the care of ill, disabled and dying . peopleenvironment, research, participation in shaping health policy and in patient and health systems management, and . Advocacy, promotion of a safe education are also key nursing roles"
— ICN - International Council of Nursing

Design by Blogger Templates