Friday 19 November 2010

Dream Your Life

Impossible is Just a Word
Everyone, at some point of his or her life, has dreamed of being somebody special, somebody big. Who hasn't fantasized about being the one who hits the game-winning homer? Who hasn't dreamed of being the homecoming queen? And how many times have we dreamed of being rich, or successful, or happy with our relationships?

Often, we dream big dreams and have great aspirations. Unfortunately, our dreams remain just that – dreams. And our aspirations easily collect dust in our attic.

This is a sad turn of events in our life. Instead of experiencing exciting adventures in self actualization, we get caught up in the humdrum of living from day-to-day just barely existing.

But you know what? Life could be so much better, if only we learned to aim higher.
The most common problem to setting goals is the word impossible. Most people get hung up thinking I can't do this. It's too hard. It's too impossible. No one can do this.

However, if everyone thought that, there would be no inventions, no innovations, and no breakthroughs in human accomplishment.

Remember that scientists were baffled when they took a look at the humble bumblebee. Theoretically, they said, it was impossible for the bumblebee to fly. Unfortunately for the bumble, bee no one has told it so. So fly it does.

On the other hand, some people suffer from dreaming totally outrageous dreams and not acting on them. The result? Broken dreams, and tattered aspirations.

If you limit yourself with self-doubt, and self-limiting assumptions, you will never be able to break past what you deem impossible. If you reach too far out into the sky without working towards your goal, you will find yourself clinging on to the impossible dream.
Try this exercise. Take a piece of paper and write down some goals in your life. Under one header, list down things ‘you know you can do’. Under another header, write the things ‘you might be able to do.’ And under one more, list the things that that are ‘impossible for you to do.’

Now look at all the headers strive every day to accomplish the goals that are under things ‘you know you can do’. Check them when you are able to accomplish them. As you slowly are able to check all of your goals under that heading, try accomplishing the goals under the other header-the one that reads ‘you might be able to do.’

As of the items you wrote under things I could do are accomplished, you can move the goals that are under things that are ‘impossible for you to do’ to the list of things ‘you might be able to do.’

As you iterate through this process, you will find out that the goals you thought were impossible become easier to accomplish. And the impossible begin to seem possible after all.

Monday 15 November 2010

Life Mapping - A Vision to Success

A map has a starting point. Your origin is who you are right now. Most people when asked to introduce themselves would say, “Hi, I’m Jean and I am a 17-year old, senior highschool student.” It does not tell you about who Jean is; it only tells you her present preoccupation. To gain insights about yourself, you need to look closely at your beliefs, values, and principles aside from your economic, professional, cultural, and civil status. Moreover, you can also reflect on your experiences to give you insights on your good and not-so-good traits, skills, knowledge, strengths, and weaknesses. Upon introspection, Jean realized that she was highly motivated, generous, service-oriented, but impatient. Her inclination was in the biological-medical field. Furthermore, she believed that life must serve a purpose, and that wars were destructive to human dignity.

Destination: A vision of who you want to be
“Who do want to be?” this is your vision. Now it is important that you know yourself so that you would have a clearer idea of who you want to be; and the things you want to change whether they are attitudes, habits, or points of view. If you hardly know yourself, then your vision and targets for the future would also be unclear. Your destination should cover all the aspects of your being: the physical, emotional, intellectual, and spiritual. Continuing Jean’s story, after she defined her beliefs, values, and principles in life, she decided that she wanted to have a life dedicated in serving her fellowmen.

Vehicle: Your Mission
A vehicle is the means by which you can reach your destination. It can be analogized to your mission or vocation in life. To a great extent, your mission would depend on what you know about yourself. Bases on Jean’s self-assessment, she decided that she was suited to become a doctor, and that she wanted to become one. Her chosen vocation was a medical doctor. Describing her vision-mission fully: it was to live a life dedicated to serving her fellowmen as a doctor in conflict-areas.
Travel Bag: Your knowledge, skills, and attitude
Food, drinks, medicines, and other travelling necessities are contained in a bag. Applying this concept to your life map, you also bring with you certain knowledge, skills, and attitudes. These determine your competence and help you in attaining your vision. Given such, there is a need for you to assess what knowledge, skills, and attitudes you have at present and what you need to gain along the way. This two-fold assessment will give you insights on your landmarks or measures of success. Jean realized that she needed to gain professional knowledge and skills on medicine so that she could become a doctor. She knew that she was a bit impatient with people so she realized that this was something she wanted to change.

Landmarks and Route: S.M.A.R.T. objectives
Landmarks confirm if you are on the right track while the route determines the travel time. Thus, in planning out your life, you also need to have landmarks and a route. These landmarks are your measures of success. These measures must be specific, measurable, attainable, realistic, and time bound. Thus you cannot set two major landmarks such as earning a master’s degree and a doctorate degree within a period of three years, since the minimum number of years to complete a master’s degree is two years. Going back to Jean as an example, she identified the following landmarks in her life map: completing a bachelor’s degree in biology by the age of 21; completing medicine by the age of 27; earning her specialization in infectious diseases by the age of 30; getting deployed in local public hospitals of their town by the age of 32; and serving as doctor in war-torn areas by the age of 35.

Anticipate Turns, Detours, and Potholes
The purpose of your life map is to minimize hasty and spur-of-the-moment decisions that can make you lose your way. But oftentimes our plans are modified along the way due to some inconveniences, delays, and other situations beyond our control. Like in any path, there are turns, detours, and potholes thus; we must anticipate them and adjust accordingly.

Friday 12 November 2010

Don't Steal My Information

It’s important to take the precautions to protect you and your products from information theft these days, because it’s getting easier and easier for people to share digital products.  Information theft is a type of computer security risk and it’s defined as stealing an individual’s personal or confidential information.  When this is stolen this can cause as much damage, or possibly more then hardware or software theft.  Business or home users are both at risk of information theft. One example is a malicious individual stealing credit cards so they can make unauthorized purchases on another person’s account. If information is transmitted over a network then it has a very high chance for malicious users to intercept the information. Every computer in the path of your data can see what you send, and they can also see what you send.  A lot of companies try to stop information from being stolen by applying some user identification and authentication controls. These constraints are best for protecting computers along a company’s premise. However, to protect information on the Internet and on networks, companies use a handful of encryption methods.

Encryption refers to the process of converting data into an unreadable form. One type of encryption software is Obfuscated code which is a programming language that is extremely hard to read. Encrypted data is like any other data because you can send it through a lot of options, but to read it you must decrypt or decipher it into a more readable form. Throughout the encryption process, the unencrypted data or input is known as plaintext and the encrypted data, or output is known as ciphertext.  To encrypt information, the programmer converts the plaintext into ciphertext using some type of encryption key. An encryption key is the programmed formula that the person who receives the data uses to decrypt the ciphertext. There are a variety of encryption or algorithm methods. However, with an encryption key formula, you will be using more then one of these techniques.  Some business use available software, while others develop their own. When an individual send information online such as through an email for example, they will never know who might intercept it, or to whom it could possibly be forwarded to.  That’s why it’s not such a good idea to send confidential information online. However, an individual can help protect themselves by encrypting the information, or signing it digitally. Some very popular email encryption software is known as Pretty Good Piracy (PGP) andCenturion Soft Secure Protection.  Pretty Good Piracy is known as freeware, which means that individuals can use it for their personal needs but not for commercial purposes. You can download this for no cost. A digital signature is a type of encrypted code that a individual, website, or company pastes to an electronic document to make sure that the individual is who they claim to be.  The code will most likely consist of the user name and a hash of usually part of the message. A hash is a type of mathematical formula that generates content from a specific message, so it is different from a message. The recipient will have to generate a new hash from the received message and compares it from the one with the digital signature to make sure that they match appropriately. The main purpose behind using digital signatures is to make sure that it’s not a deceiver participating in the transaction. So, digital signatures help narrow down e-mail scams. A digital signature can also make sure that contents of a message have not been changed. A lot of web browsers use encryption that is regarded as 40 bit encryption, and this is a very low level. A variety of browsers also offer 128 bit encryption which has a higher level of protection because the encryption key is longer.  Some important places that require extremely hire security like banks, and online retailers needs at least 128-bit encryption. A website that successfully uses encryption methods to secure information is known as a secure site.  A secure site uses digital certificate with security protocol.  The two most popular security protocols are secure sockets layer, and secure HTTP.

digital certificate is a notice that verifies that a user or a website is for real or not a scam. A lot of ecommerce websites will usually have digital certificates. A certificate authority (CA) is an authorized company or individual for that matter that has the ability to issue and verify digital certificates.  There are several of websites that offer a digital certificate. Some popular ones are Verisign http://www.verisign.com/, Godaddywww.godaddy.com, Digicert http://www.digicert.com/, and Thawtehttp://www.thawte.com/.The digital certificate will usually contain information such as the username and the serial number of the certificate. By the way, the information in the digital certificate is also encrypted. Next, the Secure Sockets Layer (SSL) provides encryption of every detail that passes between a server and a client.  SSL also requires the client to have a digital certificate, so the web browser can communicate securely with the client.  The web pages that use SSL will usually begin with https as opposed to http. SSL is available in 40 and 128-bit encryption. Secured HTTP (S-HTTP) allows individuals to choose encryption for data that pass through a client and a server.  When using S-HTTP, the client and the server must have a digital certificate.  This makes S-HTTP more difficult to use then SSL, but on the other hand, it is more secured. Companies that have to use verify a client such as online banking companies use S-HTTP. Also, mobile users can also access computer networks through a virtual private network. When mobile users successfully logon to a main office using some type of standard Internet connection, a virtual private network (VPN) allows the mobile user to secure the connection.  VPNs encrypt data as it passes from a notebook computer or any other mobile device so it won’t be intercepted.  Regardless of your security method, I will highly recommend using the most powerfulness safeguard which is a backup. It prevents data loss from several of sources such as system failure for one.  A backup is simply a backup of a file, program, or desk that can be used in place of the original if its loss, destroyed, or corrupted.  If the files are destroyed, then you can replace them by restoring it, which copies the backed up files into their original position in the computer.

Thursday 11 November 2010

The 11th Hour, of the 11th Day of the 11th Month - Lest We Forget

Why are they selling poppies Mummy, selling poppies in town today?

The poppies, child, are flowers of love, for the men who marched away.

But why have they chosen a poppy, Mummy? Why not a beautiful rose?

Because my child, men fought and died in the fields where poppies grow.

But why are the poppies so red Mummy? Why are the poppies so red?

Red is the colour of blood my child. The blood that our soldiers shed.

The heart of the poppy is black, Mummy. Why does it have to be black?

Black, my child is the symbol of grief, for the men who never came back.

But why, Mummy are you crying so? Your tears are giving you pain.

My tears are my fears for you my child, for the world is forgetting again.

 

Author unknown.

Friday 5 November 2010

The Difference Between Adware, Spyware and Anti-Virus

With the festive season getting ready to loom large again, I thought it would be a good time to go over the basics of Adware, Spyware and Anti-Virus protection.
Adware, spyware and computer virus share some similarities, one of which is that all three are major nuisances for computer users. Let's differentiate the three.

Spyware is software that does not intentionally harm your computer. What they do is that they create pathways wherein someone else aside from the computer owner can communicate with the computer. Normally spywares record the various types of web sites you visit which are later used by web advertisers to allow them to send you unwanted emails and pop-ups.

This is why spyware are usually frowned upon and greatly avoided. They are more intrusive than adware. Spyware have their own separate executable programs which allow them to record your keystrokes, scan files on your hard disks and look at other applications that you use including but not limited to chat programs, cookies and Web browser settings.

The spyware then will send the information that it had gathered to the spyware author. The agent will then use this information for advertising and marketing purposes. They even sell the information to advertisers and other parties.
Adware, on the other hand, are more legitimate form of freeware. Similar to spyware, adwares are advertising materials which are packaged into a software or program and are installed automatically once that particular program or software is added into the computer system. Some forms of adware, on the other hand, download advertising contents as a particular application is being utilized. It is quite unfortunate that most of the adware programs take the form of spywares that is they track and report user information to program authors.

Some signs of spyware infections include pop-up ads that seem to be not related to the site you are viewing. More often than not, spyware pop-ups are advertisements about adult contents. Also if you notice your computer slowing down, there's a big chance that spywares and its other components have found their way in your operating system. When the Windows desktop also takes a longer time to load, its best to scan your computer for possible spyware infections.

Meanwhile, viruses are destructive form of software. They were purely designed and created for one purpose alone: to wreck havoc to your computer. They destroy whatever they come in contact to and will initiate self replication and infect as many components of the computer's operating system or network as possible.

Nowadays, a lot of anti-virus software also provides spyware and adware scanning and removal utilities. Some programs, however, are focused on located and deleting or destroying spyware and adware programs. Whether is an anti-virus software or a anti-spyware dedicated scanner, they both search your computer and identify any spyware and virus installed on your system.

They then remove it as well as their components located in the system registry among other places in your computer. It is therefore, good to regularly update your virus or spyware scanner to ensure that your computer is protected from the thousands of spyware and viruses in the internet. Never be fooled from ads that claim that their products only contain adware.

These adware maybe spyware in disguised and are just waiting to be deployed for them to gather your information. Learn to setup firewall systems and always block pop-up blockers to minimize computer infection and ensure the security of all your computer files.

Adware, spyware and computer virus share some similarities, one of which is that all three are major nuisances for computer users. Let's differentiate the three.
Spyware is software that does not intentionally harm your computer. What they do is that they create pathways wherein someone else aside from the computer owner can communicate with the computer. Normally spywares record the various types of web sites you visit which are later used by web advertisers to allow them to send you unwanted emails and pop-ups.

This is why spyware are usually frowned upon and greatly avoided. They are more intrusive than adware. Spyware have their own separate executable programs which allow them to record your keystrokes, scan files on your hard disks and look at other applications that you use including but not limited to chat programs, cookies and Web browser settings.

The spyware then will send the information that it had gathered to the spyware author. The agent will then use this information for advertising and marketing purposes. They even sell the information to advertisers and other parties.

Adware, on the other hand, are more legitimate form of freeware. Similar to spyware, adwares are advertising materials which are packaged into a software or program and are installed automatically once that particular program or software is added into the computer system. Some forms of adware, on the other hand, download advertising contents as a particular application is being utilized. It is quite unfortunate that most of the adware programs take the form of spywares that is they track and report user information to program authors.

Some signs of spyware infections include pop-up ads that seem to be not related to the site you are viewing. More often than not, spyware pop-ups are advertisements about adult contents. Also if you notice your computer slowing down, there's a big chance that spywares and its other components have found their way in your operating system. When the Windows desktop also takes a longer time to load, its best to scan your computer for possible spyware infections.

Meanwhile, viruses are destructive form of software. They were purely designed and created for one purpose alone: to wreck havoc to your computer. They destroy whatever they come in contact to and will initiate self replication and infect as many components of the computer's operating system or network as possible.

Nowadays, a lot of anti-virus software also provides spyware and adware scanning and removal utilities. Some programs, however, are focused on located and deleting or destroying spyware and adware programs. Whether is an anti-virus software or a anti-spyware dedicated scanner, they both search your computer and identify any spyware and virus installed on your system.

They then remove it as well as their components located in the system registry among other places in your computer. It is therefore, good to regularly update your virus or spyware scanner to ensure that your computer is protected from the thousands of spyware and viruses in the internet. Never be fooled from ads that claim that their products only contain adware.

These adware maybe spyware in disguised and are just waiting to be deployed for them to gather your information. Learn to setup firewall systems and always block pop-up blockers to minimize computer infection and ensure the security of all your computer files.