Some hints for social networking

Since the birth of social networks such as Facebook and Twitter, on-line culture has undergone a rapid change. However, there appears to be many security threats that users of these networks should be aware of.

Social networking involves sharing of information. Although there is nothing wrong with this, individuals sharing information on-line can be the target of hackers (people trying to steal information of others).

Some tips to remember:

Consider who has access to your information. Most networks allow anyone to browse through profiles of members. So controls have to be set. Check privacy settings and strength of passwords.

When making comments, extra care has to be taken as someone can be offended. One’s relatives, teachers or the boss may be in the same network already.

In Facebook, there are many apps that provide members entertainment by way of games and quizzes. To use these apps, it is necessary to allow them to access information in a user’s account. But it is not really necessary for the apps to have all the information in the account.

This little piece of writing is for the benefit of all those who are using social networking sites.

Posted in Uncategorized | Leave a comment

What is e-waste and how to reduce it

The term e-waste is used by environmentalists as well as journalists who write on the subject of disposal of used electronic items. These may include calculators, hand-held devices like mobile phones, palm-tops, laptops, monitors and even CPUs (Central Processing Unit).

By simply following three rules, everybody can contribute to reduce e-waste which could cause harm to the environment as well as humans.

REDUCE: waste by using appliances (ex. computers) longer by upgrading them rather than replacing. Buying products trusted to be durable would also help.

RECYCLE: waste by sending the items which are no longer used for recycling to the manufacturer or companies engaged in recycling business. Donating items to Technical Schools (for example hardware engineering training institutes) may also help.

If recycling is done in an improper way, it is possible that air, water and soil will get polluted by harmful chemical elements used in making circuit boards and other components in electronic equipment.

Posted in Uncategorized | Leave a comment

Project Gutenberg (PG)

This project started in 1971. In those days, books were re-typed into computers. Optical Character Recognition (OCR) software helped to automatically recognise printed text. This method caused errors and correcting them was a difficult task. Distributed Proofreaders [PGDP] – – is an official part of PG. It trains volunteers online and gets the book proofread by many persons till it is finished. This way another book is added to the online public domain, free to anyone. PG now has as many as 33,000 proofread books online. It is an open access archive of digital eBooks and no different to a Free Public Library.

CREDIT: Dr. Kavan Ratnatunga [] [19 December 2010]

Posted in Uncategorized | 1 Comment

Know the coconuts

Deep history of coconuts decoded

The coconut (the fruit of the palm Cocos nucifera) is the Swiss Army knife of the plant kingdom; in one neat package it provides a high-calorie food, potable water, fiber that can be spun into rope, and a hard shell that can be turned into charcoal. What’s more, until it is needed for some other purpose it serves as a handy flotation device.

Posted in Uncategorized | Leave a comment

BBC News – Sega says hackers stole data of 1.29 million users

BBC News – Sega says hackers stole data of 1.29 million users.

Posted in Internet Security | Tagged , , | Leave a comment

a garden update!

a garden update!. Well looked after home garden with fruit trees and vines. Some nice photos.

Posted in Uncategorized | Leave a comment

Personalize Your Blog with the New Custom Design Upgrade

Personalize Your Blog with the New Custom Design Upgrade.

Posted in Uncategorized | Leave a comment