Thursday, July 17, 2008

Security Tips

1. Safety tips to avoid Identity Theft

Here are some safety tips to protect you from ID theft:--

Never disclose personal information to anyone you do not trust.

Do not provide your information until and unless you are sure about the caller. If in case of doubt you call them using the bank phone number.

Remember that banks always ask for specific characters like last 4 digits of your card or SSN not your entire card number or SSN for verification.

Ensure that your personal documents are always secure. Your personal documents include your bank account details, credit cards, driving license, plastic cards, card receipts, financial statements and even utility bills.

Periodically peruse your bank statements to check for any transactions that have occurred without your knowledge.

Dispose of financial statements, card receipts and other personal documents with utmost care. Tear or cut into pieces any such documents before trashing them.

Keep the authorities informed if you have lost any personal item. For example, report a stolen credit card.

Raise an alarm if you receive a telephone call or letter saying you have beenapproved or denied credit for accounts you know nothing about, or you receive a credit card statement for an account that you never opened.

While paying by credit card, never let it out of your sight. Raise an alarm if the card is being swiped more than required, or if it is being scanned.

In case of a change in address, ensure to notify the correct address to all recipients who send you statements to your address.

2. Safety tips to avoid Phishing

Here are some safety tips to protect you from phishing:--

When you receive emails claiming to be sent by banking institution asking you to enter your account details, DO NOT do so! Your bank already has your details and clearly would not want them again.

Check if the email that you receive has your name spelt correctly. Fraudsters simply try to guess your name by your email address. DO NOT open emails that have your name spelt incorrectly.

Check the email to see if it is addressed to your name. Fraudsters never personalize emails, they will refer you as “Dear Customer” or “Dear Valued Customer” because they send emails randomly to a million email addresses and they even don’t know that you have an account with the bank. Your bank or ecommerce company on the other hand will refer you with your name.

DO NOT respond to emails that seem like they are sent from your bank. Some of the claims made in these emails may be the following:
1. You are to receive a refund,
2. The bank is trying to protect you from a fraud
3. The bank needs some security and maintenance update on your account as asks for your
account details.

If you receive such email always check back with your bank directly or speak to the customer service representative of the bank.

NEVER enter your credit card details and password in a website which you suspect is not genuine.

DO NOT share your account details, password, or credit card details with anyone who you do not know or trust.

DO NOT open unsolicited emails.

It is a good practice to type in the URL of your bank yourself, or bookmark it if the URL is difficult to remember. DO NOT follow links to a banking website from another website or email.

Verify a website’s URL carefully before you provide your login details on any web page.Fraudsters create fake websites that have URLs closely resembling the original.

Log in to your accounts regularly and look for account transactions that you do not recognize.

DO NOT send your account details and/or password over an email to anyone.

3. Safety tips to avoid Card Fraud

Here are some safety tips to protect you from credit card, debit card, and ATM skimming fraud:

Credit Card

Always check your monthly bank statements for any suspicious transactions,

Shred the financial documents with care

Do not store your personal and credit card information on the computer

Do not write the PIN number down.

During the online transactions, check if the web address starts with HTTPS, which ensures the encryption of all important data.

Never delay to report a lost credit card as the repercussions can be highly disastrous.

Close the account that you suspect is being hit by the fraud.

Thoroughly check the authenticity of the firm, the website, or any other transactional society where your money would be flowing through.

Never give away your personal information over the phone unless you are sure of the person the other end.

Take a pause before venturing into any kind of online transaction and decide upon the authenticity of the transaction.

Debit Card:

When you key in your PIN number at an ATM, make sure that you sufficiently obscure the keypad from being viewed by an onlooker.

NEVER let the merchant take your debit card out of your sight. There is no need for him/her to do so, unless he/she intends to do something unlawful.

Secure your debit card physically by storing it at a safe place.

NEVER write your PIN number at a place where it can be seen by someone who you do not intend to show it to.

ALWAYS shred the receipts from merchants that you no longer require, especially when you have paid for using your debit card.

If you do not receive your debit card or PIN number from the bank within a reasonable amount of time after requesting one, check with the bank when it was sent and when you should expect to receive it. It may have been picked up by someone else in transit.

When at an ATM, make sure that no external devices are attached to the ATM machine and no wires are hanging around.

Check your account statements carefully for transactions that you may not have made.


Using ATM machine and Point of Sale:

Safeguard your credit cards and ATM cards at all times.

Never let these cards out of your sight

You swipe a credit card only once, if it’s being swiped more than once, you need to question this action.

If you notice something suspicious about the card slot on an ATM (like an attached device), do not use it and report it to the responsible authorities.

Never trust your ATM card and credit card PIN numbers to strangers.

Beware of your surroundings while withdrawing money at ATM centers. Do not crumple and throw away the transaction slips or credit card memos: read them, make a mental note of the details and then, either tear them or shred them to trash them.

Periodically check your account balances on Internet or by requesting your bank or credit
card company to send you statements to ensure that no transactions are happening behind
your back.

While entering any personal identification numbers, use your discretion to shield the keypad so
that your hand movements are not very visible and you enter your passwords secretly.

4. Safety tips to avoid Online Fraud

Here are some safety tips to protect you from online banking fraud and online auctions fraud:

Online Banking

DO NOT leave your personal documentation at places where it can either be picked up or viewed by anyone who does not need to see them.

DO NOT log in to your online account from an insecure computer network.

When accessing your bank’s Web site, check that the URL is correct and that you are not becoming a victim of phishing.

DO NOT key in your online banking account login details at a website about which you are not sure.

NEVER follow a link in an email which claim is from your bank. Type in your bank’s URL in the browser yourself. DO NOT open any attachments in those emails.

When available, use alternative methods to enter account login details. For example, some banks allow you to click on an on-screen keyboard when logging in and avoid key presses altogether.

DO NOT give your account details over the phone, unless you have initiated the call to a bank’s service center.

Scan your computer periodically to ensure that no spy ware or key logger is installed.

Keep your antivirus software regularly updated

DO NOT respond to emails that ask you to enter your bank account details in any way.

DO NOT send personal information and bank account details over email.

Online Auctions

Be aware of phishing. Verify that you are receiving emails from the correct source and that you are logging in at the correct website.

When making payment, prefer using your credit card over online transfer. Using a credit card give you the opportunity of a chargeback in case the transaction turns out a fraud. Use debit card, wire transfer, or money order only when you trust the seller.

Use reputed escrow services. An escrow service mediates a buyer and a seller. They accept money from buyers and release them to a seller only when the buyer confirms that the product was received to his/her satisfaction. But be wary of sellers or buyers who themselves pose as an escrow service to cheat the other—a buyer posing as an escrow service gets a product released without making payment, or a seller poses as an escrow service to trick the buyer from making a payment.

Check for feedback and rating of the buyer, which most online auction website provide.

DO NOT entertain emails received from outside of the auction website mentioning that the highest bidder has withdrawn and you are now entitled for a product. They veer you off the auction website and you lose any protection that the website may provide.

NEVER make a deal with a seller outside the auction. Although they sound lucrative, you are at a very high risk of being cheated.

READ the auction website’s terms and conditions, buyer protection policy, refund policy before making a transaction. Here, they list in how many days the order will be fulfilled, what if the product you receive is not the same as what was advertised, and so on. Also check that the policies are fair on both buyers and sellers.

Check if the product you are purchasing has appropriate warranty and documentation with it. If not, make sure that you intend to purchase it without that protection. Check if shipping and delivery is covered by the seller or if you have to bear those costs.

Check that you are not purchasing a product that you are not allowed to possess lawfully.

BE WARY of products that offer revolutionary results. In most cases, they are fraudulent claims.

DO NOT respond to emails that ask for your personal information, such as your log in details or credit card details.

READ the online auction website for feedback on the seller and a rating that they give to sellers and buyers. Most online auctions rate the sellers and buyers based on their transactions’ feedback.

READ the product features and the model number that you intend to purchase. Verify these with what is being advertised by the seller.

When giving your credit card details or your debit account details at a website, check that the

Internet connection you are using is secure. Look for a lock at the bottom or https (an‘s’ appended to ‘http’) in the address field of your browser. These indicate that the connection is a secure one.

Avoid making a transaction if anything in the auction seems suspicious to you.

If you are cheated on any product purchase, be sure to post a note on the online auction website and let them know personally.

Romance Scams:

Fraudsters pose as beautiful girls and enroll themselves in various dating and social networking sites. Novice users not aware of this ploy get attracted to them by seeing some fake pictures/videos and contact them. Fraudsters then exploit them to the maximum extent like:

Claiming that they are in deep financial trouble and would like you to support them with some money.

Claiming that they need money as he/she wants to come to US and marry her/him.

Get bank accounts from them for transferring stolen money making them money mules.

Use their address to send bill pay check (sent from compromised accounts) and asking them to cash the check at their bank account and forward the cash to them.

Using their address to send purchased goods bought by stolen cards and then asks them to forward to their country as most of the online shops do not send goods overseas.

Users need to be careful when comes to dating scams because it is an emotional loss apart from a monetary loss. They might lose trust on the Internet and people altogether.

If you are interested in dating an online partner you need to verify the partner carefully before you begin the relationship. If the partner is based overseas, then make sure to call them and verify the phone number and address of the place given by the partner. Because most of the fraudsters even though use a US or UK phone number, they use the forwarding feature of these numbers and stay overseas.

5. Safety tips to protect your Computer

Here are some safety tips to protect you from Key loggers, Trojans, and spy ware:

As a common practice do not open suspicious or unsolicited emails (spam emails). Delete them from your Inbox.

Even if you do open a spam email, under any circumstances do not click on any links, or open/download any files attached to them.

Make sure that you have very good anti-virus software installed on your computer that not only protects your computer from viruses but also from unwanted programs. And make sure you update any latest versions to that software.

Make sure that you have automatic updates / firewall turned on and regularly download the security patches if you are a windows user.

Be very wary when you access websites that provide free downloads (such as music, serial keys, adult content, games, movies etc). They may install harmful programs without your knowledge.

Do not use software on your computer that auto-completes online forms. This can give internet scammers easy access to your personal and credit card details.

While downloading files from the internet make sure it is from a known or reputed source. If the file is an executable application (for example, if the file name ends with “.exe”), make sure you know exactly what it will do.

If a pop-up screen appears on your screen and prompts you for an action (for example if it asks you to ‘Agree’ or ‘Accept’ something), then be sure to read the text in the pop-up screen and any terms and conditions carefully and only when you are sure of the safety should you take an action.

Tata Motors to introduce Air Car

Tata Motors to introduce Air Car - Nano's not the only awaited one now....

Tata Motors to introduce Air Car - Is it the next big thing?
Tata Motors is taking giant strides and making history for itself. First the Landrover-Jaguar deal, then the world's cheapest car and now it is also set to introduce the car that runs on air, compressed air to be specific..


With fuel prices touching nearly $150 per barrel, it is about time we heard some breakthrough!
India's largest automaker Tata Motors is set to start producing the world's first commercial air-powered vehicle.
The Air Car, developed by ex-Formula One engineer Guy Nègre for Luxembourg-based MDI, uses compressed air, as opposed to the gas-and-oxygen explosions of internal-combustion models, to push its engine's pistons. Some 6000 zero-emissions Air Cars are scheduled to hit Indian streets by August of 2009.

The Air Car, called the MiniCAT could cost around Rs. 3,50,000 ($ 8177) in India and would have a range of around 300 km between refuels.

The cost of a refill would be about Rs. 85 ($ 2). Tata motors also plans to launch the world's cheapest car, Tata Nano priced famously at One Lakh rupees by October.

The MiniCAT which is a simple, light urban car, with a tubular chassis that is glued not welded and a body of fiberglass powered by compressed air. Microcontrollers are used in every device in the car, so one tiny radio transmitter sends instructions to the lights, indicators etc.
There are no keys - just an access card which can be read by the car from your pocket. According to the designers, it costs less than 50 rupees per 100Km (about a tenth that of a petrol car). Its mileage is about double that of the most advanced electric car (200 to 300 km or 10 hours of driving), a factor which makes a perfect choice in cities where the 80% of motorists drive at less than 60Km. The car has a top speed of 105 kmph. Refilling the car will, once the market develops, take place at adapted petrol stations to administer compressed air. In two or three minutes, and at a cost of approximately 100 rupees, the car will be ready to go another 200-300 kilometers.

As a viable alternative, the car carries a small compressor which can be connected to the mains (220V or 380V) and refill the tank in 3-4 hours. Due to the absence of combustion and, consequently, of residues, changing the oil (1 litre of vegetable oil) is necessary only every 50,000Km.] The temperature of the clean air expelled by the exhaust pipe is between 0-15 degrees below zero, which makes it suitable for use by the internal air conditioning system with no need for gases or loss of power.

Wednesday, July 9, 2008

See What you inhale every day

Hi All,
Before you smoke kindly see ingredients you inhale.
Decide whether is it worth smoking.

Nicotine
Nicotine is a powerful insecticide and poisonous for the nervous systems. Furthermore, there is enough (50 mg) in four cigarettes to kill a man in just a few minutes if it were injected directly into the bloodstream. Indeed, fatalities have occurred with children after they had swallowed cigarettes or cigarette butts. When diluted in smoke, nicotine reaches the brain in just seven seconds, it stimulates the brain cells and then blocks the nervous impulse. This is where addiction to tobacco arises. Nicotine also causes

accelerated heart rate, but at the same time it leads to contracting and hardening of the arteries: the heart pumps more but receives less blood. The result is twice as many coronary attacks. Nicotine thus also increases the consumption of lipids (which is why it has a weight-loss effect) and induces temporary hyperglycaemia (hence the appetite suppressing effect).

Carbon monoxide (CO)
This is the asphyxiating gas produced by cars, which makes up 1.5% of exhaust fumes. But smokers inhaling cigarette smoke breathe in 3.2% carbon monoxide – and directly from the source. Oxygen is mostly transported in blood by haemoglobin. When we smoke, however, the carbon monoxide attaches itself to the haemoglobin 203 times more quickly than oxygen does, thereby displacing the oxygen; this in turn asphyxiates the organism. This causes the following cardiovascular complaints: narrowing of the arteries, blood clots, arteritis, gangrene, heart attack, etc. . . . but also a loss of reflexes and visual and mental problems. It takes between six and 24 hours for the carbon monoxide to leave the blood system.

Irritants
These substances paralyse and then destroy the cilia of the bronchial tubes, responsible for filtering and cleaning the lungs. They slow down respiratory output and irritate the mucus membranes, causing coughs, infections and chronic bronchitis.

Tars
As the cilia are blocked (see paragraph above), the tars in the cigarette smoke are deposited and collect on the walls of the respiratory tract and the lungs, and cause them to turn black. So, just because a smoker is not coughing, it doesn't mean that he or she is healthy! And this fact merely serves to pour water on one of the most common and poorest excuses given by smokers. The carcinogenic action of the tars is well known: they are responsible for 95% of lung cancers. It takes two days at least after cessation of smoking for the cilia to start functioning properly again, albeit only gradually. By smoking one packet of cigarettes every day, a smoker is pouring a cupful of these tars into his or her lungs every year (225 grams on average)!

Chemistry of Tobacco Smoke
No less than 4000 irritating, suffocating, dissolving, inflammable, toxic, poisonous, carcinogenic gases and substances and even radioactive compounds (nickel, polonium, plutonium, etc.) have been identified in tobacco smoke. Some of these are listed hereafter: Benzopyrene, dibenzopyrene, benzene, isoprene, toluene (hydorcarbons) ; naphthylamines; nickel, polonium, plutonium, arsenic, cadmium (metallic constituents) ; carbon dioxide, methane, ammonia, nitric oxide, nitrogen dioxide,
hydrogen sulphide (gases); methyl alcohol, éthanol, glycerol or glycerine, glycol (alcohols and esters); acetaldehyde, acrolein, acetone (aldehydes and ketones); cyanhydric or prussic acid, carboxyl derivatives (acids); chrysene, pyrrolidine, nicoteine, nicotinine, nicoteline, nornicotine, nitrosamines (alkaloids or bases); cresol (phenols), etc.

Tuesday, July 8, 2008

New FRAUD strategies - Keyboard

PLEASE BE CAREFUL WHENEVER YOU'RE USING A PC AT A PUBLIC PLACE (Like INTERNET CAFES..ETC).
CHECK THE BACK OF THE PC AND SEE IF THE BELOW DEVICE IS THERE..IF SO..DO NOT USE IT!!!!





شبكة تصاميم نت . www.tsamym.net




شبكة تصاميم نت . www.tsamym.net

. New storing device fits at the end of the keyboard cable connecting to the PC specialized to save
all typed keys in it…
Mostly could be used in net cafes, exhibitions, hotels and airports therefore be
careful especially the people who use the internet in these places to enter their bank accounts online
or any other important sites.
After you enter the bank account and leave the PC it will be easy to
open your account again as all what you have typed has been saved in the Black device.

Therefore, you should check the PC for any suspicious piece behind it before using the net in public
places for important sites

Monday, July 7, 2008

Dangers of Excessive Salt Consumption

Dangers of excessive salt consumption are contributing to diabetes,high blood pressure, cataracts, kidney stones, osteoporosis and stomach cancer.No one challenges that the human body needs salt to function. Sodium is the main component of the body's extracellular fluids and it helps carry nutrients into the cells. Sodium also helps regulate other body functions, such as blood pressure and fluid volume, and sodium works on the lining of blood vessels to keep the pressure balance normal.You cannot exist without sodium, but the amount we need is quite small.The recommended safe minimum daily amount is about 500 milligrams of sodium with an upper limit of 2,400 milligrams. However, lowering sodium intake to 1,800 milligrams would probably be healthier.

Many Americans are consuming much higher amounts of salt, up to 9,000 milligrams a day with harmful effects. Some argue that a healthy kidney can get rid of it [the excess], but in many cases, that happens at the expense of losing calcium. It's likely that the habitual high intake of salt produces physiological changes in the kidney, which increases the risk of high blood pressure. For women, this habitual lack of calcium may eventually be linked to the bone disease of old age, osteoporosis, in which long-term calcium loss causes bones to weaken and break easily.

About 6,000 to 8,000 years ago, our ancestors went from gathering food and hunting to cultivating crops and raising animals. To survive, they needed to preserve and to stockpile foods for the long winter months. You can dry vegetables and dry meats, but the other way to preserve food is to salt it. However, adding salt to food did more than cut bacterial growth. It added a whole new dimension to the pleasures of eating: Salt adds flavor and heightens existing flavors, even in sweets, and salt helps process basic raw ingredients into other food products. Of these, cheese is perhaps one of the most familiar examples, since salt is necessary in its formation.

For Americans today, eating preserved and processed foods has become commonplace. It is almost impossible to prepare a meal without using some processed food. Besides, not only is salt one of the four taste categories-- salty, sweet, sour, and bitter--salt offers certain technical advantages in the kitchen. Salt raises the boiling point of water, which helps heat penetrate into cooking foods, and it helps condition dough in baked products. The biggest advantage of using salt is that it enhances other flavors.

Scientists are concerned about the amount of salt in processed foods. Seventy-five to eighty -five percent of the sodium consumed is in processed foods. What the food industry includes during processing, we can't take out. If we reduce our salt intake [at the table], that won't solve the problem. There's salt in bread, processed meat, cheese, canned vegetables-- these are all hidden sources of salt. Salt in restaurant foods, and that includes pizza, fast-food chains and Chinese restaurants, the sodium levels are very high.

Physicians in China over 4000 years ago warned patients that if they used too much salt in their food, their "pulse" would harden. The higher the salt intake, the higher the prevalence of hypertension. Higher-than- normal blood pressure may lead to heart attacks, kidney disease, and strokes.

Sprinkle salt on a slug and it will shrivel up and die because the salt has dehydrated it, and that is exactly what salt does to the human body.

Too much salt causes 'vasoconstriction' of the blood vessels, which means they shrink in size or constrict because the salt has dehydrated the cells, forcing water out of them and making them narrower.

It's this shrinking or tightening of the blood vessels that pose health risks. When blood vessels become narrower, the heart has to work harder to force the blood around the body and this increases the risk of high blood pressure, heart attacks and strokes. If you already have high blood pressure or coronary heart disease (when the arteries become narrowed because fatty deposits have formed on the inside wall of the blood vessels), then you are adding to your risk of having a stroke or heart attack by eating excessive salt.

Persistent high blood pressure--conventio nally defined as readings of 140/90 or above--is one of the most common health conditions, affecting nearly 50 million Americans. People at greatest risk for high blood pressure are those with a family history, the elderly, middle-aged men, and middle-aged Black women.

Yet everyone is vulnerable, because blood pressure normally rises with age, a fact corroborated by numerous studies, and high-salt intake contributes to that rise. The fundamental conclusion is that salt relates to high blood pressure independent of other factors affecting blood pressure, like alcohol and obesity. It is believed that too much salt causes the sodium channels (structures that move sodium into and out of cells) to work too hard and gradually the channels begin to fail. This process is irreversible, so that by old age, even if people cut back on salt, their kidneys can no longer flush extra amounts of salt from the body without an increase in blood pressure.

High-salt intake is bad news for other problems ... it induces insulin resistance and increases the risk of stomach and esophageal cancers by damaging the lining of the throat and stomach. Also, salt allows Helicobacter pylori bacteria to thrive, which can increase the risk of stomach cancer. It also aggravates asthma and contributes to kidney stones, osteoporosis and cataracts. In postmenopausal women the consumption of excessive salt has been shown to increase the level of bone minerals excreted through urine.

While many people say they crave salt and use it liberally in their food, restricting salt intake is only really a matter of making some adjustments. If people make a concerted effort to reduce salt intake,initially they notice that things don't taste salty enough. But if they go through a transition period and then go back to foods they used to like, they find them too salty.

The World Health Organization (WHO) proposes that population average salt intakes should not exceed 5g per person per day. Salt causes food to absorb more water, adding weight to a product at virtually no extra cost. Examples include processed meat products such as sausages, hot dogs and bacon.

Extra salt is added to snack foods to create thirst in consumers, encouraging them to drink more, often in the form of commercial soft drinks. Many soft drinks companies know this and team up with the salty-snack industry to bolster each other's sales. In 1965, the merger of Frito-Lay and Pepsi-Cola Company was approved by shareholders of both companies, and a new company called PepsiCo, Inc. was formed.

Tips to reduce salt intake:

Take stock of the sources of salt in your diet, such as restaurant meals, pizza, salt-based condiments, and convenience foods. Some of these are really loaded with salt.Read the labels when shopping. Look for lower sodium in cereals, crackers, pasta sauces, canned vegetables, or any foods with low-salt .

Options

Canned foods, especially soups and baked beans are loaded with excessive salt.If you think your meals are high in sodium, balance them by adding high-potassium foods, such as fresh fruits and vegetables. Ask about salt added to food, especially at restaurants. Most restaurants will omit salt when requested. If you need to salt while cooking, add the salt at the end; you will need to add much less. The longer the food cooks, the more the salty flavor is muted and at the end, the final taste is on the top layer.

Saturday, July 5, 2008

HOW TO FORWARD E-MAIL APPROPRIATELY

A friend who is a computer expert received the following directly from a system administrator for a corporate system. It is an excellent message that ABSOLUTELY applies to ALL of us who send e-mails.

Do you really know how to forward e-mails? Most of us DO NOT know how.

Do you wonder why you get viruses or junk mail? Do you hate it?

Every time you forward an e-mail, there is information left over from the people who got the message before you -- namely their e-mail addresses & names. As the messages get forwarded along, the list of addresses builds, and builds, and builds, and all it takes is for some poor sap to get a virus, and his or her computer can send that virus to every email address that has come across his computer. Or, someone can take all of those addresses and sell them or send junk mail to them in the hopes that you will go to the site and he will make five cents for each hit. That's right, all of that inconvenience over a nickel!

How do you stop it? Well, there are several easy steps:

(1) When you forward an e-mail, DELETE all of the other addresses that appear in the body of the message (at the top). That's right, DELETE them. Highlight them and delete them, backspace them, cut them, whatever you know how to. It only takes a second. You MUST click the 'Forward' button first and then you will have full editing capabilities against the body and headers of the message. If you don't hit the forward button first you won't have full editing functions . I particularly dislike having to scroll through 200 Email addresses before I get to the email.

(2) Whenever you send an e-mail to more than one person, do NOT use the "To:" or "Cc:" fields for adding e-mail addresses.. Always use the BCC: (blind carbon copy) field for listing the e-mail addresses. This is the way the people you send to will only see their own e-mail address.
If you don't see your "BCC:" option click on where it says To: and your address list will appear. Highlight the address and choose BCC: and that's it, it's that easy. When you send to BCC: your message will automatically say 'Undisclosed Recipients' in the 'TO:' field of the people who receive it.
That way you aren't sharing all those addresses with every Tom, Dick or Harry..

(3) Remove any 'FW:' in the subject line. You can re-name the subject if you wish or even fix spelling.

(4) ALWAYS hit your Forward button from the actual e-mail you are reading. Ever get those e-mails that you have to open 10 pages to read the one page with the information on it? By Forwarding from the actual page you wish someone to view, you stop them from having to open many e-mails just to see what you sent. These are the ones that often end up having picked up a virus from somebody. This is really important!

(5) Have you ever gotten an email that is a petition? It states a position and asks you to add your name and address and to forward it to 10 or 15 people or your entire address book. The email can be forwarded on and on and can collect thousands of names and email addresses.

A FACT: The completed petition is actually worth a couple of bucks to a professional spammer because of the wealth of valid names and email addresses contained therein. If you want to support the petition, send it as your own personal letter to the intended recipient. Your position may carry more weight as a personal letter than a laundry list of names and email address on a petition. (Actually, if you think about it, who's supposed to send the petition in to whatever cause it supports? And don't believe the ones that say that the email is being traced, it just ain't so!)

(6) One of the main ones I hate is the ones that say that something like, 'Send this email to 10 people and you'll see something great run across your screen.' Or, sometimes they'll just tease you by saying something really cute will happen.

IT AIN'T GONNA HAPPEN!!!!! (Trust me, I'm still seeing some of the same ones that I waited on 10 years ago!) I don't let the bad luck ones scare me either, they get trashed. (Could this be why I haven't won the lottery??)

(7) Before you forward an Amber Alert, or a Virus Alert, or some of the other ones floating around nowadays, check them out before you forward them. Most of them are junk mail that's been circling the net for Years!

Maruti Suzuki’s 2008 small car - the splash

Based on an all-new platform Car market leader Maruti Suzuki India (MSI) is set to launch NEW MARUTI SPLASH in early 2008.This car is likely to replace their existing Wagon R model. but i wish it should come with its own name splash.

Join Keralites : http://keralites.net

Splash comes with attractive styling, compact dimensions, responsive handling, very good build quality and a high degree of environmental compatibility. Splash concept that was shown at last year’s Paris Motor Show and model debuted at the 2007 Frankfurt Auto Show

ENGINE- MARUTI Splash will also be available in Two petrol versions - 1litre 1000cc,3 Cyl65bhp and 1.2 litre1200cc, 4 Cyl Petrol 86bhp and 1.3 litre diesel engine 1248cc, 4 Cyl, Multijet 75bhp@4000rpm. All these engines will be mated to a 5-speed gearbox and will be within Europe’s much debated C02 emission cap of 140g/km.

FEATURES- Suzuki Splash The car shall also come with Suzuki’s standard set of safety features like ABS, airbags, brake assist,ASP, etc some of which may be trimmed for India, to keep costs into consideration. Also the engine & transmission options may vary for India for the petrol versions.
DIMENSIONS-
Length: 3214 mm Width: 1468 mm Height: 1382 mm

Join Keralites : http://keralites.net
The premium hatchback Splash be available in between price range of Rs 3.5l(petrol) and 4.5l(diesel) in the Indian market by mid-2008. This one’s going to be yet another winner form Suzuki, after SX4 and Swift.

Join Keralites : http://keralites.net

Thursday, July 3, 2008

Migraine Headache

Definition

Migraine is a type of headache marked by severe head pain lasting several hours or more.

Description

Migraine is an intense, often debilitating type of headache. Approximately 18% of women and 6% of men experience at least one migraine attack per year. More than three million women and one million men have one or more severe headaches every month. Migraines often begin in adolescence, and are rare after age 60.

Two types of migraine are recognized. Eighty percent of migraine sufferers experience "migraine without aura," formerly called common migraine. In "migraine with aura," formerly called classic migraine, pain is preceded or accompanied by visual or other sensory disturbances, including hallucinations, partial obstruction of the visual field, numbness or tingling, or a feeling of heaviness. Symptoms are often most prominent on one side of the body, and may begin as early as 72 hours before the onset of pain.

Causes

The physiological basis of migraine has proved difficult to uncover. Genetics appear to play a part for many, but not all, people with migraine. There are a multitude of potential triggers for a migraine attack, and recognizing one's own set of triggers is the key to prevention.

PHYSIOLOGY. The most widely accepted hypothesis of migraine suggests that a migraine attack is precipitated when pain-sensing nerve cells in the brain (called nociceptors) release chemicals called neuropeptides. At least one of the neurotransmitters, substance P, increases the pain sensitivity of other nearby nociceptors.

Other neuropeptides act on the smooth muscle surrounding cranial blood vessels. This smooth muscle regulates blood flow in the brain by relaxing or contracting, thus constricting the enclosed blood vessels and stimulating adjacent pain receptors. At the onset of a migraine headache, neuropeptides are thought to cause muscle relaxation, allowing vessel dilation and increased blood flow. Other neuropeptides increase the leakiness of cranial vessels, allowing fluid leak, and promote inflammation and tissue swelling. The pain of migraine is thought to result from this combination of increased pain sensitivity, tissue and vessel swelling, and inflammation. The aura seen during a migraine may be related to constriction in the blood vessels that dilate in the headache phase.

GENETICS. Susceptibility to migraine may be inherited. A child of a migraine sufferer has as much as a 50% chance of developing migraine. If both parents are affected, the chance rises to 70%. However, the gene or genes responsible have not been identified, and many cases of migraine have no obvious familial basis. It is likely that whatever genes are involved set the stage for migraine, and that full development requires environmental influences as well.

TRIGGERS. A wide variety of foods, drugs, environmental cues, and personal events are known to trigger migraines. It is not known how most triggers set off the events of migraine, nor why individual migraine sufferers are affected by particular triggers but not others.

Common food triggers include:

* cheese
* alcohol
* caffeine products, and caffeine withdrawal
* chocolate
* intensely sweet foods
* dairy products
* fermented or pickled foods
* citrus fruits
* nuts
* processed foods, especially those containing nitrites, sulfites, or monosodium glutamate (msg)

Environmental and event-related triggers include:

* stress or time pressure
* menstrual periods, menopause
* sleep changes or disturbances, oversleeping
* prolonged overexertion or uncomfortable posture
* hunger or fasting
* odors, smoke, or perfume
* strong glare or flashing lights

Symptoms

Migraine without aura may be preceded by elevations in mood or energy level for up to 24 hours before the attack. Other pre-migraine symptoms may include fatigue, depression, and excessive yawning.

Aura most often begins with shimmering, jagged arcs of white or colored light progressing over the visual field in the course of 10-20 minutes. This may be preceded or replaced by dark areas or other visual disturbances. Numbness and tingling is common, especially of the face and hands. These sensations may spread, and may be accompanied by a sensation of weakness or heaviness in the affected limb.

The pain of migraine is often present only on one side of the head, although it may involve both, or switch sides during attacks. The pain is usually throbbing, and may range from mild to incapacitating. It is often accompanied by nausea or vomiting, painful sensitivity to light and sound, and intolerance of food or odors. Blurred vision is common.

Migraine pain tends to intensify over the first 30 minutes to several hours, and may last from several hours to a day or longer. Afterward, the affected person is usually weary, and sensitive to sudden head movements.

Diagnosis

Migraine is diagnosed by a careful medical history. Lab tests and imaging studies such as computed tomography (CT scan) or magnetic resonance imaging (MRI) scans have not been useful for identifying migraine. However, for some patients, those tests may be needed to rule out a brain tumor or other structural causes of migraine headache.

Treatment

Once a migraine begins, the person will usually seek out a dark, quiet room to lessen painful stimuli. Several drugs may be used to reduce the pain and severity of the attack.

Nonsteroidal anti-inflammatory drugs (NSAIDs) are helpful for early and mild headache. NSAIDs include acetaminophen, ibuprofen, naproxen, and others. A recent study concluded that a combination of acetaminophen, aspirin, and caffeine could effectively relieve symptoms for many migraine patients. One such over-the-counter preparation is available as Exedrin Migraine.

More severe or unresponsive attacks may be treated with drugs that act on serotonin receptors in the smooth muscle surrounding cranial blood vessels. Serotonin, also known as 5-hydroxytryptamine , constricts these vessels, relieving migraine pain. Drugs that mimic serotonin and bind to these receptors have the same effect. The oldest of them is ergotamine, a derivative of a common grain fungus. Ergotamine and dihydroergotamine are used for both acute and preventive treatment. Derivatives with fewer side effects have come onto the market in the past decade, including sumatriptan (Imitrex). Some of these drugs are available as nasal sprays, intramuscular injections, or rectal suppositories for patients in whom vomiting precludes oral administration. Other drugs used for acute attacks include meperidine and metoclopramide.


Continued use of some anti-migraine drugs can lead to "rebound headache," marked by frequent or chronic headaches, especially in the early morning hours. Rebound headache is avoided by using anti-migraine drugs under a doctor's supervision, with the minimum dose necessary to treat symptoms. Patients with frequent migraines may need preventive therapy.

Alternative treatment

Alternative treatments are aimed at prevention of migraine. Migraine headaches are often linked with food allergies or intolerances. Identification and elimination of the offending food or foods can decrease the frequency of migraines and/or alleviate these headaches altogether. Herbal therapy with feverfew (Chrysanthemum parthenium) may lessen the frequency of attacks. Learning to increase the flow of blood to the extremities through biofeedback training may allow a patient to prevent some of the vascular changes once a migraine begins. During a migraine, keep the lights low; put the feet in a tub of hot water and place a cold cloth on the occipital region (the back of the head). This draws the blood to the feet and decreases the pressure in the head.

Prognosis

Most people with migraines can bring their attacks under control through recognizing and avoiding triggers, and by use of appropriate drugs when migraine occurs. Some people with severe migraines do not respond to preventive or drug therapy. Migraines usually wane in intensity by age 60 and beyond.

Prevention

The frequency of migraine may be lessened by avoiding triggers. It is useful to keep a headache journal, recording the particulars and noting possible triggers for each attack. Specific measures which may help include:

* eating at regular times, and not skipping meals
* reducing the use of caffeine and pain relievers
* restricting physical exertion, especially on hot days
* keeping regular sleep hours, but not oversleeping
* managing time to avoid stress at work and home

For most patients, preventive drug therapy is not an appropriate option, since it requires continued use of powerful drugs. However, for women whose migraines coincide with the menstrual period, limited preventive treatment may be effective. Since these drugs are appropriate for patients with other medical conditions, the decision to prescribe them for migraine may be influenced by expected benefit elsewhere.
Magic Jewels

Promote Your Page Too