Since the birth of social networks such as Facebook and Twitter, on-line culture has undergone a rapid change. However, there appears to be many security threats that users of these networks should be aware of.
Social networking involves sharing of information. Although there is nothing wrong with this, individuals sharing information on-line can be the target of hackers (people trying to steal information of others).
Some tips to remember:
Consider who has access to your information. Most networks allow anyone to browse through profiles of members. So controls have to be set. Check privacy settings and strength of passwords.
When making comments, extra care has to be taken as someone can be offended. One’s relatives, teachers or the boss may be in the same network already.
In Facebook, there are many apps that provide members entertainment by way of games and quizzes. To use these apps, it is necessary to allow them to access information in a user’s account. But it is not really necessary for the apps to have all the information in the account.
This little piece of writing is for the benefit of all those who are using social networking sites.
The term e-waste is used by environmentalists as well as journalists who write on the subject of disposal of used electronic items. These may include calculators, hand-held devices like mobile phones, palm-tops, laptops, monitors and even CPUs (Central Processing Unit).
By simply following three rules, everybody can contribute to reduce e-waste which could cause harm to the environment as well as humans.
REDUCE: waste by using appliances (ex. computers) longer by upgrading them rather than replacing. Buying products trusted to be durable would also help.
RECYCLE: waste by sending the items which are no longer used for recycling to the manufacturer or companies engaged in recycling business. Donating items to Technical Schools (for example hardware engineering training institutes) may also help.
If recycling is done in an improper way, it is possible that air, water and soil will get polluted by harmful chemical elements used in making circuit boards and other components in electronic equipment.
This project started in 1971. In those days, books were re-typed into computers. Optical Character Recognition (OCR) software helped to automatically recognise printed text. This method caused errors and correcting them was a difficult task. Distributed Proofreaders [PGDP] – http://www.pgdp.net/ – is an official part of PG. It trains volunteers online and gets the book proofread by many persons till it is finished. This way another book is added to the online public domain, free to anyone. PG now has as many as 33,000 proofread books online. It is an open access archive of digital eBooks and no different to a Free Public Library.
CREDIT: Dr. Kavan Ratnatunga [http://books.lakdiva.org]
http://sundaytimes.lk [19 December 2010]
Deep history of coconuts decoded
The coconut (the fruit of the palm Cocos nucifera) is the Swiss Army knife of the plant kingdom; in one neat package it provides a high-calorie food, potable water, fiber that can be spun into rope, and a hard shell that can be turned into charcoal. What’s more, until it is needed for some other purpose it serves as a handy flotation device.
a garden update!. Well looked after home garden with fruit trees and vines. Some nice photos.