Saturday, 21 January 2012

Cyber Safety Tips Parents online

The first step in reducing risks online is talking. Talking to your children about what they should and should not do when they are online. Find out the activities they are currently doing online and talk about them. Children love to show off their talents, and when you are interested in what they are doing online, nine times out of ten they will be more than happy to show you what they know. Let them teach you some of the different chat programs they use, what sites they visit and music download software they use.


The next step is to let them know the rules in the house to online use. An Internet use contract can be downloaded and printed; you and your children can read it and sign it so there are no misunderstandings of appropriate use in your home. A list of rules can be found under the documents section of this website or click here for rules to post by your home computer.

I will now cover the rules of online safety so you have a good understanding of how to keep your children safe in a wired world.

1. Make sure your child does not spend all of his/her time on the computer. People, not computers, should be their best friends and companions.

This is a rule that has recently had to be enforced at our house. I use RAZZUL software at home and it is great for children, but because of all the games that can be accessed online for kids, it seems my girls are getting a little addicted to it. I have talked with them about this and things are getting much better, and I have also activated the time limit feature in the software to only allow a certain amount of time online on weekends and weekdays. There is no time allowed on the Internet until all homework is completed and chores done as well. This rule is important especially in this day and age when childhood obesity is on the increase due to lack of exercise. I would much rather see my children having fun outside with their friends, than inside watching TV or in front of a computer.
Too many parents use the Internet as a babysitter, much like the TV. When we have things to do it is nice to have our children occupied, but let’s make sure they are not spending all of their time glued to the computer screen.

2. Keep the computer in an area where it can be monitored, like the family room, kitchen or living room, not in your child’s bedroom.

I am always surprised during my lectures at how many parents have a computer in their child’s bedroom connected to the Internet. Computers hooked to the Internet should always be in an area where it can be monitored by adults. My wife and I built a home 3 years ago and when designing it we made sure there was a desk area between the kitchen and the family room for a computer to sit. This is where my children can access the Internet and it is always in view of us whether we are in the kitchen or family room. We had the luxury or designing our house to accommodate this but no matter how your home is set up it is always possible to put the computer area in a place where it can be monitored, especially in this day of wireless networks in our homes.
Other homes have the computer in the basement, but I have to ask - is that a place where parents frequent? Usually not, and it is not a great place to have the computer hooked to the Internet either. We have to be able to see what our children are doing online. We have to monitor activity to make sure they are staying safe.

3. Learn enough about computers so you can enjoy them together with your kids.

You have read this book so now you are learning! Again I suggest you sit down with your children and let them teach you more. You will be surprised at how eager they will be to show you their abilities. We all like to brag a bit and children are no different.
If you have to search for something for work or find an interest or hobby on the Internet, ask your kids to help. Have them show you the best way to search for things and locate them. Spend some quality time with them, and let them teach you.

4. Teach them never to meet an online friend offline unless you are with them.

Although this sounds like common sense, so many children have met with people in person that they met online as a stranger. I explained how easy it is to build rapport with children, but unfortunately children don’t really understand this concept. Children are very trusting and don’t think there are people in this world who will harm them. It is up to you to let them know they do exist. There are too many children who have gone missing because of these types of meetings. We see them in the news every week. If there is one rule in this whole book you remember, remember this one; children should never, I repeat NEVER meet with someone in person they have met online unless accompanied by a parent, not another older friend, A PARENT!

5. Watch your children when they’re online and see where they go.

Now that your computer is out in the open (Rule Number 2) keep an eye on what sites they like to visit, or what chat programs they like to use. Knowing what your children are doing online will help you determine how much time they should be spending online as well as give you an idea of why they use the Internet. You may see them going to sites that are not really appropriate for them and when you see this you can now discuss this with them, and advise them why it is not appropriate. You can also see how many people are on their chat list, or what chat rooms they are going into and what the topic of that room is. Remember, POS means “Parents over shoulder!”


6. Make sure that your children feel comfortable coming to you with questions and don’t over react if things go wrong.

Communication is the key and your children have to know that they can come to you with any problems and not get the third degree. I explained a past investigation in this book where the young girl did not want to get into trouble for having a virus on the computer so she complied with a boy’s request to take naked pictures of herself. This is a perfect example of being afraid of going to your parents with a problem, and I don’t have to tell you how much worse that outcome was. Sit down with your children and let them know they can come to you with any problem that arises from not only their Internet use, but any problems they encounter in life.

7. Keep kids out of chatrooms or IRC channels unless they are monitored.

This sounds like a definite rule and to a certain extent it is. I am not a big fan of chatrooms because of all the nonsense that occurs within them. I have entered teen chatrooms during investigations to find that children can use foul language and they use these arenas to spout off (flame) and bully others. I don’t feel they are a healthy place for children to hang out, but if your child feels they just have to be in them, then they should be monitored at all times. Links to inappropriate sites are posted in these rooms and in the IRC (Internet Relay Chat) channels, files are traded to occupants that are not only inappropriate but illegal as well. There are certain websites that have monitored chatrooms for children but again these should be approved by the parents. Instant messaging with friends is common for most youth, but the need for chatrooms where many unknown individuals hang out is not a necessity.

8. Encourage discussions between you and your child about what they enjoy online.

Again keeping that line of communication open with your children about their likes and dislikes on the net enhances online activity for the child, and gives you some peace of mind as the parent.

9. Teach them what information they can share with others online and what they can’t (like telephone numbers, address, their full name and school)

No information about your child should be given out over the Internet no matter what. I know that as children get older they will want to do things like having a blog site where they can do a daily journal but for the very young, absolutely no information should be given out whatsoever. Giving out this information is just giving ammunition to predators. Just a name could be enough to gather information about your child, not to mention what school they go to, phone number and address. Let your children know that this is one rule that must be abided by no matter what.

10. Get to know their “online friends” just as you get to know all of their other friends.

Just like we like to know who our children are hanging out with at school, we should know who they are chatting with online. Have your child explain who these friends are, where they met them and why they like talking with them. Signs that they may be speaking to people they should not would be a sudden shutdown of the computer when you walk by, or switching screens on the computer. You might also note if your children are getting phone calls from people you don’t know or they are getting gifts from people you do not know in the mail. This is a very common occurrence with predators over the Internet.

11. Warn them that people may not be what they seem to be and that people they chat with are not their friends, they are just people they chat with.

Even though the majority of children on the net have pretended to be someone else, someone older or even a different sex, they seem to think everyone else tells the truth online. As a parent you have to drill into them that a lot of people pretend and are not who they say they are online, even if they know the lingo, or have sent a picture of themselves.
I recently received a call from an adult who had sent money overseas to have his girlfriend fly here to Canada to visit. She never arrived and had a story that she needed more money because they would not let her on the plane for a bunch of different reasons. My first response was, “sorry to say it but you have been taken”. He said “but she sent me pictures of herself and everything.” That was all it took; a picture to say “this is me” and he believed it. Now he is out a bunch of money all because someone pretended to be someone else. I found in most of my investigations, the majority of people you speak with online are not really who they say they are, especially in the younger chatrooms.

12. Discuss these rules, get your children to agree to adhere to them, and post them near the computer as a reminder.

One thing I have learned as a motivational speaker is that posting things around my office helps me not only remember but to adhere to them. When I see affirmations every day, it keeps me on track and the same goes for rules. If they are discussed and posted, chances are your children will abide by them. Included in the CD in the back of this book is also the list of rules from this chapter. You can print them out and post them at your computer so everyone in your house knows the rules.

Monday, 16 January 2012

More Cyber Monday Shopping Tips

 

Cyber Monday – it's the start of the holiday shopping season online, and a great day for bargains; but only if you know how to find them. Here are several tips that should help:

Track the Deals

Use CyberMonday.com and dealio.com to stay on top of all of the Cyber Monday deals across the web, including information about free shipping offers and coupons.

Sign Up for Newsletters

If you plan to shop at a particular retailer, be sure to sign up for their e-newsletter a few weeks before the sales begin. It's a good way to stay abreast of special deals and promotions, and a great way to score special subscriber-only coupons.

Shop at Sites that Offer Free Shipping

Many, but not all, stores offer free shipping on Cyber Monday; so spend some time looking for those free shipping deals. Don’t see free shipping offered on the site that you're on? Then, check a competitor's site.

Seek Out Coupon Codes

Head to currentcodes.com, retailmenot.com or one of the many other sites dedicated to finding and posting coupon codes. You may just find a deal – free shipping, free merchandise, a percent off your order – to sweeten the pot.
Bonus Tip: Bookmark Retailmenot.com. Then, the next time you're shopping online, just click on the link, and it'll display all of the coupons for the site that you're on – now that's bargain shopping made easy!

Order through a Rewards Site

Access a store's website through a rewards site, and you'll earn points or even cash for your efforts. Some rewards sites worth checking out: Upromise, MyPoints, FatWallet and Ebates.

Compare Prices

Before you place an order, use a price comparison website like pricegrabber.com to make sure you're getting the best deal.

Sunday, 15 January 2012

Top 5 Tips To Shop Safe On Cyber Monday

Cyber Monday holiday shoppers beware -- scammers can be lurking with bogus websites and fake emails to separate you from your money or even your identity.

The large number of people expected to shop online Monday presents thieves with a golden opportunity to bilk unsuspecting consumers. If you're planning on letting your fingers do the shopping, here are five tips to help you stay safe.

Don't Click E-Mail Links

Following links from phony e-mail is one of the oldest methods for perpetrating any online scam. So don't be fooled by messages in your inbox offering enticing sales at known sites and then clicking away only to land on a scam site.
Instead, open up your Web browser and enter the URL to the site offering the discounts you're looking for and do a search for the items yourself. If you can't find the amazing deal from the e-mail, it’s probably a scam, says Ron Meyran, director, security product marketing for security firm Radware.

Ridiculously Deep Discounts

With many retailers offering deep discounts, sometimes as much as 50 percent, it may be tough to figure out which deals are too good to be true. The best way not to be taken in by a scam is to only shop at sites you know and trust.
You can also check out the Better Business Bureau to see if the site you're visiting is accredited by the group. The National Retail Federation's CyberMonday.com also has a list of legitimate retailers offering Cyber Monday discounts.

Secure Your Purchase

The BBB advises you to make sure your purchase is secure by only entering credit card details on Web pages that use SSL (secure sockets layer) security.
To make sure you're on a secure page, check to see that the URL for the page begins with "https://" and not "http://." That "s" lets you know the site is secure. Most browsers will also show a lock icon in the lower right corner of the browser window to let you know you're on a secure site.

 

Pay With Credit Cards Only

Another good tip from the BBB cautions you to only pay for online purchases with a credit card as opposed to a wire transfer or other non-plastic payment method. Federal laws let you dispute an item on your credit card bill if you don't receive your purchase, according to the BBB. Many credit card providers also have "zero liability" policies meaning you're off the hook if a bad guy gets your credit card and starts using it, the BBB says.

Tune Up Your Software

As with any guide to online security, make sure that you're operating system and antivirus software are up to date with the latest security patches and other updates. That way if you do end up on a malicious site you have the best protection possible against any attempts to download or execute code on your machine.
You should also use a modern web browser such as the latest versions of Google Chrome, Internet Explorer, Mozilla Firefox, and Safari. These browsers will also offer protection against malicious activity and steer you away from sites known to exhibit nasty behavior.
Expectations for a busy Monday are reason enough to take these tips to heart.
Cyber Monday is the National Retail Federation's official kickoff to the online holiday shopping season, when bargain hunters across the U.S. will be looking for one-time deals, deep discounts, and free shipping.
Cyber Monday 2011 is expected to be almost as popular with shoppers as Black Friday, according to a recent survey of more than 2000 online shoppers by price comparison site PriceGrabber.com. About 39 percent of those surveyed said they planned on shopping online Monday, while 40 percent said they planned on deal hunting November 25.

The bottom line: Cyber Monday is a great time to take advantage of deals. Just remember to rely on your own common sense and these tips to stay safe and secure.

Saturday, 14 January 2012

Passwords Choosing and Protecting. )


Why do you need a password?

 

Think about the number of personal identification numbers (PINs), passwords, or passphrases you use every day: getting money from the ATM or using your debit card in a store, logging on to your computer or email, signing in to an online bank account or shopping cart...the list seems to just keep getting longer. Keeping track of all of the number, letter, and word combinations may be frustrating at times, and maybe you've wondered if all of the fuss is worth it. After all, what attacker cares about your personal email account, right? Or why would someone bother with your practically empty bank account when there are others with much more money? Often, an attack is not specifically about your account but about using the access to your information to launch a larger attack. And while having someone gain access to your personal email might not seem like much more than an inconvenience and threat to your privacy, think of the implications of an attacker gaining access to your social security number or your medical records. One of the best ways to protect information or physical property is to ensure that only authorized people have access to it. Verifying that someone is the person they claim to be is the next step, and this authentication process is even more important, and more difficult, in the cyber world. Passwords are the most common means of authentication, but if you don't choose good passwords or keep them confidential, they're almost as ineffective as not having any password at all. Many systems and services have been successfully broken into due to the use of insecure and inadequate passwords, and some viruses and worms have exploited systems by guessing weak passwords. 


How do you choose a good password?

 

Most people use passwords that are based on personal information and are easy to remember. However, that also makes it easier for an attacker to guess or "crack" them. Consider a four-digit PIN number. Is yours a combination of the month, day, or year of your birthday? Or the last four digits of your social security number? Or your address or phone number? Think about how easily it is to find this information out about somebody. What about your email password—is it a word that can be found in the dictionary? If so, it may be susceptible to "dictionary" attacks, which attempt to guess passwords based on words in the dictionary.
Although intentionally misspelling a word ("daytt" instead of "date") may offer some protection against dictionary attacks, an even better method is to rely on a series of words and use memory techniques, or mnemonics, to help you remember how to decode it. For example, instead of the password "hoops," use "IlTpbb" for "[I] [l]ike [T]o [p]lay [b]asket[b]all." Using both lowercase and capital letters adds another layer of obscurity. Your best defense, though, is to use a combination of numbers, special characters, and both lowercase and capital letters. Change the same example we used above to "Il!2pBb." and see how much more complicated it has become just by adding numbers and special characters.
Longer passwords are more secure than shorter ones because there are more characters to guess, so consider using passphrases when you can. For example, "This passwd is 4 my email!" would be a strong password because it has many characters and includes lowercase and capital letters, numbers, and special characters. You may need to try different variations of a passphrase—many applications limit the length of passwords, and some do not accept spaces. Avoid common phrases, famous quotations, and song lyrics.
Don't assume that now that you've developed a strong password you should use it for every system or program you log into. If an attacker does guess it, he would have access to all of your accounts. You should use these techniques to develop unique passwords for each of your accounts.
Here is a review of tactics to use when choosing a password:

  • Don't use passwords that are based on personal information that can be easily accessed or guessed.
  • Don't use words that can be found in any dictionary of any language.
  • Develop a mnemonic for remembering complex passwords.
  • Use both lowercase and capital letters.
  • Use a combination of letters, numbers, and special characters.
  • Use passphrases when you can.
  • Use different passwords on different systems.

 

How can you protect your password?

 

Now that you've chosen a password that's difficult to guess, you have to make sure not to leave it someplace for people to find. Writing it down and leaving it in your desk, next to your computer, or, worse, taped to your computer, is just making it easy for someone who has physical access to your office. Don't tell anyone your passwords, and watch for attackers trying to trick you through phone calls or email messages requesting that you reveal your passwords (see Avoiding Social Engineering and Phishing Attacks for more information).
If your internet service provider (ISP) offers choices of authentication systems, look for ones that use Kerberos, challenge/response, or public key encryption rather than simple passwords (see Understanding ISPs and Supplementing Passwords for more information). Consider challenging service providers that only use passwords to adopt more secure methods.
Also, many programs offer the option of "remembering" your password, but these programs have varying degrees of security protecting that information. Some programs, such as email clients, store the information in clear text in a file on your computer. This means that anyone with access to your computer can discover all of your passwords and can gain access to your information. For this reason, always remember to log out when you are using a public computer (at the library, an internet cafe, or even a shared computer at your office). Other programs, such as Apple's Keychain and Palm's Secure Desktop, use strong encryption to protect the information. These types of programs may be viable options for managing your passwords if you find you have too many to remember.
There's no guarantee that these techniques will prevent an attacker from learning your password, but they will make it more difficult.

Wednesday, 11 January 2012

Keeping Blog Content Fresh Foods


One of the hardest things about blogging can arise when the blogger runs out of things to say. As words are what keep your blog going, if your mind goes blank, so will your blog page. While this is a common occurrence, it does not have to be a fatal one. There are some ways to dig yourself out of this problematic hole without losing your blog.

A great way to get fresh content is to invite guest bloggers to your blog. Invite one or as many guest bloggers as you need. Even though you may blog about the same things, everyone thinks differently and has different opinions whether the issues are the same or not. Don’t worry that you will lose your readers to the guest blog as loyal readers will always be interested in what you have to say!

If you are having problems coming up with new things to say about your chosen topic, try a contest of sorts. Come up with a topic relevant prize for the person who invites the most new visitors to the blog, or who is responsible for the most comments on a post. Use your imagination and come up with something that will make the blog exciting to visit. In fact, you can even make that a contest. Invite your readers to come up with a contest idea. They love to be involved.

A lot of times you just need to research your topic. While you may know many things about your chosen topic, there are always new things to find out when you look. So, when you run low on material that comes from your brain, try looking around at other material. A very high percentage of the time you will find a spark of an idea in this new information and you will be off and blogging again.

Whatever path you take to find new and fresh material for your blog, remember that it’s much better to choose an alternative method of blogging rather than just not doing anything for any length of time. When your readers visit your blog too often only to find nothing new written there, chances are you will lose them. Therefore, when you run into a block, try something to keep things going until you have regained your voice.

Monday, 9 January 2012

11-12 Cyber Tips


The first step in reducing risks online is talking. Talking to your children about what they should and should not do when they are online. Find out the activities they are currently doing online and talk about them. Children love to show off their talents, and when you are interested in what they are doing online, nine times out of ten they will be more than happy to show you what they know. Let them teach you some of the different chat programs they use, what sites they visit and music download software they use.
The next step is to let them know the rules in the house to online use. An Internet use contract can be downloaded and printed; you and your children can read it and sign it so there are no misunderstandings of appropriate use in your home. A list of rules can be found under the documents section of this website or click here for rules to post by your home computer.
I will now cover the rules of online safety so you have a good understanding of how to keep your children safe in a wired world.

1. Make sure your child does not spend all of his/her time on the computer. People, not computers, should be their best friends and companions.

This is a rule that has recently had to be enforced at our house. I use RAZZUL software at home and it is great for children, but because of all the games that can be accessed online for kids, it seems my girls are getting a little addicted to it. I have talked with them about this and things are getting much better, and I have also activated the time limit feature in the software to only allow a certain amount of time online on weekends and weekdays. There is no time allowed on the Internet until all homework is completed and chores done as well. This rule is important especially in this day and age when childhood obesity is on the increase due to lack of exercise. I would much rather see my children having fun outside with their friends, than inside watching TV or in front of a computer.
Too many parents use the Internet as a babysitter, much like the TV. When we have things to do it is nice to have our children occupied, but let’s make sure they are not spending all of their time glued to the computer screen.

2. Keep the computer in an area where it can be monitored, like the family room, kitchen or living room, not in your child’s bedroom.

I am always surprised during my lectures at how many parents have a computer in their child’s bedroom connected to the Internet. Computers hooked to the Internet should always be in an area where it can be monitored by adults. My wife and I built a home 3 years ago and when designing it we made sure there was a desk area between the kitchen and the family room for a computer to sit. This is where my children can access the Internet and it is always in view of us whether we are in the kitchen or family room. We had the luxury or designing our house to accommodate this but no matter how your home is set up it is always possible to put the computer area in a place where it can be monitored, especially in this day of wireless networks in our homes.
Other homes have the computer in the basement, but I have to ask - is that a place where parents frequent? Usually not, and it is not a great place to have the computer hooked to the Internet either. We have to be able to see what our children are doing online. We have to monitor activity to make sure they are staying safe.

3. Learn enough about computers so you can enjoy them together with your kids.

You have read this book so now you are learning! Again I suggest you sit down with your children and let them teach you more. You will be surprised at how eager they will be to show you their abilities. We all like to brag a bit and children are no different.
If you have to search for something for work or find an interest or hobby on the Internet, ask your kids to help. Have them show you the best way to search for things and locate them. Spend some quality time with them, and let them teach you.

4. Teach them never to meet an online friend offline unless you are with them.

Although this sounds like common sense, so many children have met with people in person that they met online as a stranger. I explained how easy it is to build rapport with children, but unfortunately children don’t really understand this concept. Children are very trusting and don’t think there are people in this world who will harm them. It is up to you to let them know they do exist. There are too many children who have gone missing because of these types of meetings. We see them in the news every week. If there is one rule in this whole book you remember, remember this one; children should never, I repeat NEVER meet with someone in person they have met online unless accompanied by a parent, not another older friend, A PARENT!

5. Watch your children when they’re online and see where they go.

Now that your computer is out in the open (Rule Number 2) keep an eye on what sites they like to visit, or what chat programs they like to use. Knowing what your children are doing online will help you determine how much time they should be spending online as well as give you an idea of why they use the Internet. You may see them going to sites that are not really appropriate for them and when you see this you can now discuss this with them, and advise them why it is not appropriate. You can also see how many people are on their chat list, or what chat rooms they are going into and what the topic of that room is. Remember, POS means “Parents over shoulder!”


6. Make sure that your children feel comfortable coming to you with questions and don’t over react if things go wrong.

Communication is the key and your children have to know that they can come to you with any problems and not get the third degree. I explained a past investigation in this book where the young girl did not want to get into trouble for having a virus on the computer so she complied with a boy’s request to take naked pictures of herself. This is a perfect example of being afraid of going to your parents with a problem, and I don’t have to tell you how much worse that outcome was. Sit down with your children and let them know they can come to you with any problem that arises from not only their Internet use, but any problems they encounter in life.


7. Keep kids out of chatrooms or IRC channels unless they are monitored.

This sounds like a definite rule and to a certain extent it is. I am not a big fan of chatrooms because of all the nonsense that occurs within them. I have entered teen chatrooms during investigations to find that children can use foul language and they use these arenas to spout off (flame) and bully others. I don’t feel they are a healthy place for children to hang out, but if your child feels they just have to be in them, then they should be monitored at all times. Links to inappropriate sites are posted in these rooms and in the IRC (Internet Relay Chat) channels, files are traded to occupants that are not only inappropriate but illegal as well. There are certain websites that have monitored chatrooms for children but again these should be approved by the parents. Instant messaging with friends is common for most youth, but the need for chatrooms where many unknown individuals hang out is not a necessity.


8. Encourage discussions between you and your child about what they enjoy online.

Again keeping that line of communication open with your children about their likes and dislikes on the net enhances online activity for the child, and gives you some peace of mind as the parent.


9. Teach them what information they can share with others online and what they can’t (like telephone numbers, address, their full name and school)

No information about your child should be given out over the Internet no matter what. I know that as children get older they will want to do things like having a blog site where they can do a daily journal but for the very young, absolutely no information should be given out whatsoever. Giving out this information is just giving ammunition to predators. Just a name could be enough to gather information about your child, not to mention what school they go to, phone number and address. Let your children know that this is one rule that must be abided by no matter what.

10. Get to know their “online friends” just as you get to know all of their other friends.

Just like we like to know who our children are hanging out with at school, we should know who they are chatting with online. Have your child explain who these friends are, where they met them and why they like talking with them. Signs that they may be speaking to people they should not would be a sudden shutdown of the computer when you walk by, or switching screens on the computer. You might also note if your children are getting phone calls from people you don’t know or they are getting gifts from people you do not know in the mail. This is a very common occurrence with predators over the Internet.

11. Warn them that people may not be what they seem to be and that people they chat with are not their friends, they are just people they chat with.

Even though the majority of children on the net have pretended to be someone else, someone older or even a different sex, they seem to think everyone else tells the truth online. As a parent you have to drill into them that a lot of people pretend and are not who they say they are online, even if they know the lingo, or have sent a picture of themselves.
I recently received a call from an adult who had sent money overseas to have his girlfriend fly here to Canada to visit. She never arrived and had a story that she needed more money because they would not let her on the plane for a bunch of different reasons. My first response was, “sorry to say it but you have been taken”. He said “but she sent me pictures of herself and everything.” That was all it took; a picture to say “this is me” and he believed it. Now he is out a bunch of money all because someone pretended to be someone else. I found in most of my investigations, the majority of people you speak with online are not really who they say they are, especially in the younger chatrooms.


12. Discuss these rules, get your children to agree to adhere to them, and post them near the computer as a reminder.

One thing I have learned as a motivational speaker is that posting things around my office helps me not only remember but to adhere to them. When I see affirmations every day, it keeps me on track and the same goes for rules. If they are discussed and posted, chances are your children will abide by them. Included in the CD in the back of this book is also the list of rules from this chapter. You can print them out and post them at your computer so everyone in your house knows the rules.
 

Saturday, 7 January 2012

Sql Injection Attacks

SQL injection attacks are a form of input validation attacks where an attacker uses specially crafted 
 SQL queries or commands to carry out malicious activities on the target system. This vulnerability exist due to lack of validation of input when a database query is made through the internet. the best part of the sql injection attack..is it can be executed like other validation attacks with the help of a browser. once a vulnerable website is found many kind of attacks using sql injection can be exploited to display illegitimate records, bypass security features or even malicious command on the remote target system.

Cyber Tricks online

 To see the coding of windows explorer, just go to run--> type cmd enter--> then type cd\ enter---> then type cd windows enter----> then type 'edit/70 explorer.exe' (remove the quotes while typing) enter. U will see the codes behind creating explorer.exe with some symbols.... But don't delete or edit any space or text unless u know...It can damage an windows explorer installed on ur pc.

Tuesday, 3 January 2012

Fantastic New FREE eBook 100 Investments in YOU


Set yourself up for success
There is always another Monday, another month or another season to start living more healthily, to eat better, to reduce stress, to be more physically active, more positive and fulfilled. Perhaps you have told yourself it is better to get a certain project out of the way, or the birthday party you have planned, that holiday or that house move and then, yes then you can get on with it. “If this is done, then that can get under way” we tend to reason logically. But that “If....then” scenario rarely delivers a firm starting point for your new leash of life. Unsurprisingly, the obstacles that stop you from living a healthy and balanced life will always keep coming. Before you know it weeks, months, or sometimes years have evaporated and you have lived through them doing more of the same, thereby achieving more of the same. Whilst time slips through your fingers like soft sand, you live with the toleration of frustration, failure and un-fulfilment, waiting for that right time to make some changes.
But
You are so much better.
You deserve so much better. No doubt there is so much more in you that you can give in your life and show to the world. And it is all within your grasp. If you want more energy, look healthier, be fitter, feel younger and achieve more, then let’s start today. Not in a kind of opening ceremony style with fireworks and neon lights highlighting “Monday the third” THE day. From then on everything will change and you will address sleeping patterns, your diet and exercise habits, your negative way of thinking and all your future goals. That is like setting yourself up for failure and why do you want to do that? No, just start, right this second, making small investments into your wellbeing. By doing lots of small things and having lots of small successes you are gradually changing your world from the inside out. If you drink more water, you will feel better, you can concentrate better and you help your body’s processes. Guaranteed success for little effort. If you press the pause button from time to time, get away from your desk more often, take time out to think, set your goals once a week and increase variety in your diet....all those actions if multiplied will have a huge snowball effect. And all those positive results will positively impact the way you work, the way you think, the way you look.

Have fun with it. Each day pick one or two actions from the list of “100 Investments in YOU” and set yourself up for success.
100 Investments in YOU is avaialable for download for FREE at Doodle Lounge
Related Posts Plugin for WordPress, Blogger...

Followers

keyward

,maryland+mesothelioma+lawyer, Mesothelioma+Law+Firm, donate+car, donate+my+car, Sell+Annuity+Payment, structured+settlement+company, selling+structured+settlements, Asbestos+Lawyers, asbestos+attorney, asbestos+cancer+attorney, mesothelioma+attorney, mesothelioma+lawyer, Annuity+Settlements, structured+settlement, dallas+data+recovery, Donate+a+Car+in+Maryland, online+colleges, online+universities, Online+Motor+Insurance+Quotes, car+insurance+online+quote, donate+cars, donate+auto, donate+vehicle, Donate+your+Car+for+Money, Cheap+Car+Insurance+for+Ladies, Car+Donate, Virtual+Data+Rooms, online+data+room, virtual+deal+rooms, Online+College+Course, online+degree+programs, Automobile+Accident+Attorney, auto+accident+attorney, Car+Accident+Lawyers, Data+Recovery+Raid, raid+recovery, Criminal+lawyer+Miami, miami+dui+lawyer, Motor+Insurance+Quotes, Personal+Injury+Lawyers, auto+accident+attorney, Car+Insurance+Quotes, asbestos+attorney, asbestos+lung+cancer, mesothelioma+law+firm, mesothelioma+lawyer, asbestos+lawyers, mesothelioma+lawsuit, Injury+Lawyers, injury+attorney, injury+attorneys, Personal+Injury+Law+Firm, Online+Criminal+Justice+Degree, Car+Insurance+Companies, Business+VOIP+Solutions, Online+Stock+Trading, Forex+Trading+Platform,