When Lord Krishna explained about the emails to Arjuna !!!


The Karma of Forwarding Emails


(Note : This work is fictitious & not true. )

Arjuna: Hey Vasudev, how can I do the most heinous and unpardonable act of forwarding email that I receive, to my friends, relatives and revered elders?

Krishna: Paarth, at this moment, none of them is your friend or foe, relative or in-law, young or old and good or evil. You have no escape from following your Net-Dharma. Make haste to log on and send off the email to one and all. That is the only Karma expected of you and Dharma you must follow.

Arjuna: Hey Murari! Do not implore me to do something that pricks my conscience and stirs my soul.

Krishna: O Kunti-Putra, you are caught in the vicious circle of Maya. In this material world, you are committed to no one except to yourself, your Dharma and your mouse. emails have existed for the last 25 years and will remain long after you are gone. Rise above the Maya and perform your bounden duty.

Arjuna: Lord Krishna, pray and enlighten me on how email is related to Maya.

Krishna: Vatsa, email is the sixth element in the universe — Aap, Vaayu, Jal, Agni, Aakaash and email. It is at the same time animate and inanimate, living and dead beat. It overloads the system and fills up the hard disk. But it serves one great purpose. It leads people to believe that they are filling their time in an intellectual pursuit by reading and re-forwarding mail. It gives them a sense of achievement without investing their intellect and efforts. Like the Atman that leaves one’s physical body and moves on to another, the email moves from system to system and never gets deleted or dies.

Arjuna: Great Giridhaari, kindly tell me what the true attributes of email are.

Krishna: Neither fire can burn it, nor air can evaporate it. Neither can it be conquered nor can it be defeated. Email is omnipresent and immortal like your noble and eternal soul. Unlike an arrow shot from your bow, many a time the email forwarded by you, will even return to you safely after some months or even years, allowing you to re-re-forward it to the same people.

Arjuna: Great Saarathi, my salutations to you. You have opened my eyes to the cult of email. I was lost in the Maya and have been reading all the email that I keep receiving and doing no other Karma. Now on, I will just press the “Forward” button without reading any of it and send it to all and sundry, friends and foes, relatives and in-laws, young and old. That will surely bring them to their knees in this epochal battle of Good against Evil, in the Kurukshetra.

Krishna: Arjuna, victory or defeat is not in your hands. Do not ponder over the fruits of your labour. Just keep forwarding email and make one and all go bananas reading it and you will have done your supreme duty. Tathastu.

Thus Spoke Lord Krishna

———————————————————————————————————————————————————–

My message for the above said is –

Dont let the technology/Internet be ur master and lets just remain humans …

we are losing our social skills.. we have started to depend more and more on the net to give us company, solutions, and entertainment!

In this context we find that convectional human societies are rapidly changing. Its first impression is that of de-socialisation

Internet:  absolute communication, absolute isolation.  ~

 While our culture heralds the Internet as a technological wonder, there are suggestions that Internet use has a negative influence on individuals and their social skills. A recent study conducted by Carnegie Mellon University concludes that Internet use leads to small but statistically significant increases in misery and loneliness and a decline in overall psychological well-being (American Psychological Association, 1998). The appropriately named HomeNetproject studied a sample of 169 people in Pittsburg during their first year or two online. Data showed that as people in this sample used the Internet more, they reported keeping up with fewer friends. They also reported spending less time talking with their families, experiencing more daily stress, and feeling more lonely and depressed. These results occurred even though interpersonal communication was their most important reason for using the Internet.

Lack of Family Bonds
Low Self-Esteem
Inability to Express Opinions and Questions
Inability to Socialize

Michael A. Weinstein, professor of Political Science at Purdue University. In a somewhat Archie Bunkerian way of expression, he believes Internet users will “lose the savvy and skills and patience to conduct social relations in the corporeal world,” and that the Internet will intensify the negative effect .

Internet ‘infantilising’ the human mind

Greenfield warns social networking sites like facebook are changing children’s brains, resulting in selfish and attention deficient young people

Break Free From The Web – Don’t Let The Computer Master You

Read more – http://gu.com/p/25h7h

Thanks and Regards Hemant (Happy) Khurana

Beware – This is how mordern technology/Internet impacting human behaviour and our lives !


Click on the link below –

iim-student-commits-suicide-amid-facebook-messages-26683760.html

IIM student commits suicide amid Facebook messages

Break Free From The Web – Don’t et The Computer Master You


The world’s cheapest car tranformed overnight to the world’s most expensive !!


The world’s cheapest car tranformed overnight to the world’s most expensive.

Tata Nano launched by Tata motors in March 2009 which is priced at $2500 Tata Nano, Its know as the peoples car and is also known as worlds cheapest car

and

Now check this out .

This Nano is priced – $5,135,940 or Euro – 3,758,520

The one-off version will tour Tata-owned Goldplus jewellery stores across India and is said to celebrate 5000 glorious years of jewellery making in India.

The Goldplus Nano Car is billed as the world’s first ever gold jewellery car and celebrates the 5,000 years of jewellery making industry in India.

The car’s body is made with 80 kg 22 carat solid gold, 15 kg silver, precious stones – including diamonds, rubies – and other expensive gemstones, the official said.

“As many as 14 techniques of jewellery making have gone behind the effort — from the intricate filigree work to the delicate and colourful meenakari work, the stunning kundan to the traditional naqashi…marking the convergence of diverse and culturally distinct jewellery making techniques from around India,” the official told IANS.

Titan Industries managing director Bhaskar Bhat said that since eternity, jewellery made with gold and precious stones has been an integral part of the Indian woman’s life.

“Indian jewellery has been an epitome of innovation and creativity, and carved a niche worldwide for itself for the intricacy of the designs crafted out of the precious metals and stones,” said C.K. Venkataraman, COO, jewellery division.

After its glittering launch in Mumbai Monday evening, the Goldplus Nano Car will travel to all the Goldplus showrooms at 29 locations around the country.

The car incorporates beautiful designs, made with the precious stones of different colours, set on the gold and silver body of the car.

Do you listen to your Heart or your Brains ?


Basically,
brain sees life as threatening, separate, competitive, and non-supportive. Heart is very
different. Heart is always wholistic. Heart sees life as welcoming, connected, cocreative,
and supportive. Both heart and brain communicate with each other, and with
other people’s hearts and brains. Because brain sees the world as separate, it continually
asks questions, attempting to put the separate parts together. Whereas it may be very
successful with putting machines and computers together,

it is unable to make sense of life. Truth defeats it.

Heart, however, sees life in its ‘wholeness,’ so there are no
questions from heart. It is connected with all life. Heart ‘knows’ Truth. – a part – without also having the answer – the whole.

 Life lived through the brain is a VERY different experience from life lived through the heart.  Let your heart explode. Let yourself love FEARLESSLY. Let yourself love FULL OUT.

Let yourself love for NO REASON.
Let yourself love without expecting anything in return.

Love to Love.
Live to Love.
Love to Live.

How can you stand to live otherwise?
Are you really living if you are not?
Your heart will not break it will only expand.
Allow your heart to expand.
Allow their hearts to expand.

This is your life.
If you walk around with a armor of protection, how will you ever get to experience it
You can not be afraid of pain.
You can not be afraid of not being loved back.
You can not be afraid of not being accepted.
Step into who you are.
Step into the love that you are.
You are love.

You love fearlessly.
You love endlessly.
Your love knows no boundaries.
Your love sees no difference in the reflection it sees in the mirror to the new faces you pass on the street, to those you have known since birth.
Your love is so blind that is sees all.

 

Thankyou :)


Dear Visitor,

Thankyou for visiting my webpage.

If the information I provide here has helped you in any way, then I have accomplished some good.  

To those of you who have provided feedback, requests or suggestions, thank you for taking the time to help me improve this site.

It is such an amazing feeling to know that someone appreciates my work .

That is the greatest gift.

It’s Visitors like you that encouraged me to create this web blog !

Knowing that you liked my work has given me extra confidence in everything I do.

You probably didn’t realize you had such powers, but please know that you truly make a difference in my life.

I treasure the things you say and the loving acceptance I feel from your feedbacks, comments, messages and suggestions.

Thank you, Mr Vinton Cerf  and Mr Bob Kahn, for gifting us with this amazing technology of Internet ,
and
Thank you – All my Webpage visitors, for the times you visit my webpage !

Return back soon.

I am appreciative of your patronage.

Lots of Love, Health Wealth and Happiness to you all

Greetings and Regards
Hemant Happy Khurana

 

HASTA LAVISTA BABY

Gallery

(7-September-2011) Bomb Blast in Delhi today ! :(

This gallery contains 1 photo.


(7-September-2011) Bomb Blast in Delhi today  : A Place nearby my house ! Terror blast at Delhi High Court; 11 killed, over 80 injured ~ We all have to be concerned about terrorism, but you will never end terrorism by … Continue reading

The Magnificence of MOTHER….!!!


Mother


cid:57D98619E6154F8EAA5EF82E2FCC5860@home4x2pmzmmv4


MOTHER

This is a truly BEAUTIFUL piece.

Please read this at a slow pace,

digesting every word and in leisure….

Do not hurry…..this is a treasure…

For those lucky to still be blessed with your Mom,


this is beautiful.

For those of us who aren’t,

this is even more beautiful.

For those who are moms,

you’ll love this.


cid:4C505EFCA87644BC9A6EE82107C54FEB@home4x2pmzmmv4


The young mother set her foot

on the path of life.

‘Is this the long way?’ she asked.

And the guide said: ‘Yes,

and the way is hard

And you will be old before

you reach the end of it..

But the end will be better

than the beginning.’

But the young mother was happy,


and she would not believe

that anything could be better

than these years.

So she played with her children,

and gathered flowers for them along the way,

and bathed them in the clear streams;

and the sun shone on them,
and the young Mother cried,

‘Nothing will ever be lovelier than this.’


cid:C10E67B3D76F4DB5A203CAB!


Then the night came,

and the storm, and the path was dark,

and the children shook with fear and cold,


and the mother drew them close

and covered them with her mantle,

and the children said,

‘Mother, we are not afraid,

for you are near, and no harm can come.’


cid:8B984464961149FE9D34642796B1AF76@home4x2pmzmmv4


And the morning came,


and there was a hill ahead,

and the children climbed and grew weary,

and the mother was weary.

But at all times she said to the children,

‘A little patience and we are there.’

So the children climbed,

and when they reached the top they said,

‘Mother, we would not have done it without you.’

And the mother, when she lay down at night


looked up at the stars and said,

‘This is a better day than the last,

for my children have learned fortitude

in the face of hardness.

Yesterday I gave them courage.

Today, I’ve given them strength.’


cid:C3617437BA4B41129054D53384F7D51F@home4x2pmzmmv4


And the next day came strange clouds

which darkened the earth,

clouds of war and hate and evil,

and the children groped and stumbled,

and the mother said:
 ‘Look up. Lift your eyes to the light.’
And the children looked and saw

above the clouds an everlasting glory,

and it guided them beyond the darkness.

And that night the Mother said,

‘This is the best day of all,

for I have shown my children God.’


cid:5B4BFB563FC44C95A68833537374F771@home4x2pmzmmv4


And the days went on,

and the weeks and the months and the years,

and the mother grew old

and she was little and bent.

B
ut her children were tall and strong,
and walked with courage.
And when the way was rough,
they lifted her, for she was as light as a feather;
and at last they came to a hill,
and beyond they could see a shining road
and golden gates flung wide.
And mother said,
‘I have reached the end of my journey..
And now I know the end
is better than the beginning,
for my children can walk alone,
and their children after them.’


cid:DA8DDE6DE93F48A09295142C8D940162@home4x2pmzmmv4


And the children said,
‘You will always walk with us, Mother,
even when you have gone through the gates.’
And they stood and watched her
as she went on alone,
and the gates closed after her.
And they said:
‘We cannot see her but she is with us still.
A Mother like ours is more than a memory.
She is a living presence…….’


cid:E3D35F0B9C51488E9BC9DB2A92C3D5A2@


Your Mother is always with you….
She’s the whisper of the leaves
as you walk down the street;
she’s the smell of bleach
in your freshly laundered socks;
she’s the cool hand on your brow
when you’re not well.
Your Mother lives inside your laughter.
And she’s crystallized in every tear drop.
She’s the place you came from,
your first home;
and she’s the map you follow
with every step you take.
She’s your first love and your first heartbreak,
and nothing on earth can separate you.

Not time, not space… not even death!

Love you Mumma, I miss you mumma !

Happy misses you a lot !

A NEW VIRUS ALERT !


Anyone-using Internet mail such as Yahoo, Hotmail, AOL and so on. This information arrived this morning, Direct from both Microsoft and Norton. Please send it to everybody you know who has Access to the Internet. You may receive an apparently harmless e-mail titled �Here you have it� If you open the file, a message will appear on your screen saying: ‘It is too late now, your life is no longer beautiful, f*** you and die….’

Subsequently you will LOSE EVERYTHING IN YOUR PC. And the person who sent it to you will gain access to your Name, e-mail and password, etc. This is a new virus which started to circulate on Saturday afternoon. AOL has already confirmed the severity, and the antivirus software’s are not capable of destroying it.

The virus has been created by a hacker who calls himself ‘life owner’.


THIS HAS BEEN CONFIRMED BY SNOPES.

Read for more info –
http://www.snopes.com/computer/virus/hereyouhave.asp 

‘Are you God’s wife?’


An eye witness account from New York
City , on a cold day in December,
some years ago: A little boy, about 10-years-old,

was standing before a shoe store on the
roadway, barefooted, peering through the window, and shivering
With cold.

A lady approached the young boy and said,
‘My, but you’re in such deep thought staring in that window!’

‘I was asking God to give me a pair of
shoes,’was the boy’s reply.

The lady took him by the hand, went into
the store, and asked the clerk to get half a dozen pairs of socks
for the boy. She then asked if he could give her a basin of water
and a towel. He quickly brought them to her.

She took the little fellow to the back
part of the store and, removing her gloves, knelt down, washed
his little feet, and dried them with the towel.

By this time, the clerk had returned with
the socks.. Placing a pair upon the boy’s feet, she purchased him
a pair of shoes.

She tied up the remaining pairs of socks
and gave them to him. She patted him on the head and said, ‘No
doubt, you will be more comfortable now.’

As she turned to go, the astonished kid caught her

 by the hand,

and looking up into her face, with tears
in his eyes, asked her.

‘Are you God’s wife?’

*********************************************

You Taught Me


You Taught Me

I wanted a mansion once… that is until I met you,
Now the only place I want to live is inside your heart
I once desired diamonds… until I met you,
Now the only sparkle I need comes from within
I used to crave the finest clothing… until I met you,
Now I want not a single thread to separate our bodies
I once coveted a fancy car… until I met you,
Now I want nothing that would put miles between us
I once prayed for money… until I met you,
Now I want none of the things money can buy
I once yearned for a sense of security… until I met you,
Now my only security comes is knowing you are near
I once dreamt of a prestigious job… until I met you,
Now I find my success in knowing that you are happy
I once asked for the world on a silver platter… until I met you,
Now you are my world and I want for nothing but your touch
Loving you has been my teacher; you taught me not to want
Being with you has been my discovery; you are all that I need
Finding you has been my salvation, I now understand grateful
But perhaps of most importantly…
Your love in return has been my everything

Do not let people or situations or even you, condition you to lose in life.


Don’t Be Conditioned To Lose

An eagle’s egg was placed in the nest of a prairie chicken.

The egg hatched and the little eagle grew up thinking it was a prairie chicken.

The eagle did what the prairie chickens did.

It scratched in the dirt for seeds. It clucked and cackled.

It never flew more than a few feet because that is what the prairie chickens did.

One day he saw an eagle flying gracefully and majestically

in the open sky. He asked the prairie chickens:

“What is that beautiful bird?” The chickens replied,

“That is an eagle.

He is an outstanding bird, but you cannot fly like him because you are just a prairie chicken.”

So the eagle never gave it a second thought, believing that to be the truth. He lived the life of and died a prairie chicken, depriving himself of his heritage because of his lack of vision.

What a waste! He was born to win, but was conditioned to lose.

Do not let people or situations or even you, condition you to lose in life.

Unbelievable – Truly Amazing – Watch this Wowwwwwwww :) !


Unbelievable – let there be peace on earth!!

Love is God & God is Love 🙂

regards

Hemant (happy) Khurana

Your power lies in the power of the Subconsious mind .


The power of a person lies in the power of the SUBCONSIOUS MIND

Some how when we say something to our spouse they are not able to accept us. Everything goes on smoothly but somewhere we see something is missing. What is it?

For example, when we say I will be at home at 7:00 p.m. and for some genuine reason we are not able to make it at 7:00 p.m. but we make it 8:00 p.m we loose respect for our words.  He or she is able to accept it but we end up in a fight. 

Same applies to our kids. For example, kids say when dad tells he will take us to this zoo this Sunday, for sure it is not going to be this Sunday but eventually it will happen by Monday or Tuesday. We end up giving false promises by not able to stand to our commitment.

This applies , in our organizations as well. We are not able to keep up our words. World is not able to accept what we say. 

The reason being it has been registered in the sub conscious mind that the words that was said wont be committed. We are not worthy of our words. As a result person loose his credibility. 

How do we start developing and become man of credibility?

First start developing within Do not give false promises to ourself. 

For example, We have our alarm at 5:00 in the morning to go for our morning exercises. As soon as the alarm goes on we tend to snooze the alarm and sleep for few more minutes. Start from there. As soon as the alarm rings get up and start your work.

Our mind is primarily made up of our sub conscious mind. 7/8 of our mind is sub conscious mind and 1/8th is the conscious mind. There are 8 capable soldiers for us who would definitely work for us provided we give them the energy.  

POWER OF THE MEN                               LIES IN THE                  POWER OF HIS MIND

POWER OF HIS MIND                               LIES IN THE                  POWER OF THE SUBCONSIOUS MIND

 

POWER OF THE SUBCONSIOUS MIND   LIES IN THE                  POWER OF SUBCONSIOUS BELIEFS

POWER OF SUBCONSCIOUS BELIEFS   LIES IN THE                  POWER OF THE HONARY COMMITMENT.

At last do not make a commitment unless you mean it. If you are going to be late tell your spouse that I will call you this evening and let you know when I will be coming home.

Start developing the credibility to yourself first, then to the people around you and to the world. LIFE will show the abundance.

The power of a person lies in the power of the SUBCONSIOUS MIND

Invaluable and Inspirational Words :)


With Love and Regards

Hemant Khurana( Happy)

The Making of a Dream Car !!! (Watch this) :)


 

OYE BALLE BALLE PUNJABI’s :-) Lakk 28 Kudi Da 47 Weight Kudi Da !


I Am So Lonely Broken Angel !!!!!!


I love to be alone. I never found the companion that was so companionable as solitude.

I’m so lonely broken angel
I’m so lonely listen to my heart

I’m so lonely broken angel
I’m so lonely listen to my heart
On n’ lonley, broken angel
Come n’ save me before i fall apart

I Want to Tell You, but I Hurt so Much.

I want to tell you how special you are, to put down in words my love for you, my desire to care for you.
I want to say how much you mean to me, that you are the centre of my universe and that your smile lights up my life,
But right now I hurt so much I want to cry.

I want to tell you that when I see you unhappy I want to hold you but that sometimes I don’t know how.
I want to tell you that I feel so much for you that it hurts but to feel your love slip away hurts so much more,
But right now I hurt so much I want to die.

I want to tell you that sometimes you look so god damn wonderful I want time to stand still to capture your beauty.
I want to tell you that so many wonderful moments with you are seared into my memory ,
But right now I hurt so much I want to forget.

I want to tell you that I am lost in the depth of your eyes, the curved lift of your smile, you lovely naughty laugh,
I want to tell you that the gentle warmth of your embrace has given me more joy than I ever thought possible,
But right now I hurt so much I feel only regret

I want to tell you that I am sorry for the hurtful things I may have said and done.
I want to tell you that that sometimes, deep down inside I have wanted to hold you and cry my heart out,
But right now I hurt so much I want no more pain.

I want to tell you that you hold my very soul in your hand,
I want to tell you how much I need you but have seen you draw away,
But right now I hurt so much I fear you don’t feel the same.

I want to tell you that in loving me you have given me the best gift I have ever had.
I want to tell you that I treasure your trust as my one true soul mate,
But right now I hurt so much to know these feeling are untrue.

I wanted to put my special feeling for you in this poem, with roses and a card,
I wanted to win you back again, make you love me, melt your heart,
But right now I hurt so much to think that we may end up part.

Never Give up on Ur Dreams : My dream is to fly over the rainbow so high :)



My dream is to fly

Over the rainbow so high

My dream is to fly
Over the rainbow so high

My dream is to fly
Over the rainbow so high

eh.. eh.. eh..
over the rainbow so high.

My dream is to fly
Over the rainbow so high (x4)

Rise Up
don’t falling down again

Rise Up
long time I broke the chains.

I try to fly a while so high
direction’s sky

I try to fly a while so high
direction’s sky

My dream is to fly

Never Lose Hope!

I’L NEVER GIVE UP ON LOVE, I WILL NEVER QUIT !!!!

To choose you as the one I love is the move I had to make….

and the choice that I have made was the chance I had to take….

an indication that this path selected me before it was to late….

so I advanced towards my counterpart to begin this lovers fate….

Through this sun filled journey of an everlasting treasured devotion….

which began with just an intelligent talk which put this love into motion….

We cherished each other creating our own infatuating lovers potion….

Our hearts were one, two minds alike our souls drifted with the ocean….

But this lovers, lover with thought in mind, choose one day not to care….

and my heart became enraged with sadness, a pain I could not bear….

she had ripped my soul right under me with no tendency to tear….

Yet this lovers love kept flowing strong although she was not there….

This once created bliss was extingushed, began to settle into to smoke….

Not one single ounce of air inside me as though my heart was being choked….

and as much as I needed her this lovers love could not be provoked….

but a dream that this ‘lover had gave him hope’ was the answer when he awoke….

an aspiration in which this mans true love would one day comeback to thee….

and a day in which I ask for her hand for life to which she would agree….

I rise from my knees to embrace my love and whispered “this is how its suppose to be”….

she replied “no, Im sorry, and I’m just glad you never stopped loving me”….

So with these thoughts in mind I set out to find my lovers heart again….

with no more hurt inside my soul and no excuse to remember pain….

and if I fail this time there is only one person that I can blame….

and I will search this world to find my love in hopes that she’ll bear her lovers name….

====================================================================================================

Be True to Your Heart

And Your Dreams Will Come True

Stay true to all your beliefs and goals.
Stand tall.
Through all life’s setbacks and disappointments,
your dreams will come true.

When no one else is with you,
and no one seems to care,
just whisper to yourself,
“I am the controller of my destiny.
It’s up to me what comes to pass,
and if I keep my thoughts positive and strong,
my dreams will come true.”

When what seem to be impossible obstacles
stand in your way, just think of all the times
you got through yesterday.
There is a place for you in this world.
Stay on your chosen path.
All the power is within you;
be true to what is in your heart.
Be honest within yourself;
if you are, then you cannot fail.

Your dreams will come true.

==================================================================================================

Never Let Go Of Hope

One day you will see that it all has finally come together.

What you have always wished for has finally come to be.

You will look back and laugh at what has passed and you will ask yourself,
“How did I get through all of that?”

Just never let go of hope.

Just never quit dreaming.

And never let love depart from your life.

FREE GIFTS TO GIVE !


Gifts that Do Not Cost A penny!

1. THE GIFT OF LISTENING…

But you must REALLY listen.
No interrupting, no daydreaming,
No planning your response.
Just listening.

2. THE GIFT OF AFFECTION…

Be generous with appropriate hugs,
Kisses, pats on the back, and handholds.
Let these small actions demonstrate the
Love you have for family and friends.

3. THE GIFT OF LAUGHTER…

Clip cartoons.
Share articles and funny stories.
Your gift will say, “I love to laugh with you.”

4. THE GIFT OF A WRITTEN NOTE…

It can be a simple
“Thanks for the help” note or a full sonnet.
A brief,handwritten notemay be remembered
For a lifetime, and may even change a life.

5. THE GIFT OF A COMPLIMENT.. .

A simple and sincere,
“You look great in red,”
“You did a super job,”
Or “That was a wonderful meal”
Can make some one’s day.

6. THE GIFT OF A FAVOR…

Every day, go out of your way
To do something kind.

7. THE GIFT OF SOLITUDE…

There are times when we want nothing better
Than to be left alone.
Be sensitive to those times and give
The gift of solitude to others.

8. THE GIFT OF A CHEERFUL DISPOSITION. ..

The easiest way to feel good is
To extend a kind word to someone.
Really, it’s not that hard to say,
Hello or Thank You.


Gr8 Quotes !


Life’s lessons are many — and they accompany the lows as well

as the highs. Be grateful for both. 

Choose to live in the present. Gentle reminders are often necessary, however.

Go ahead – step into your life, today. Make it a daily habit, one

you will never want to break.

I sometimes wonder just why a door seemed to have closed? It is true that our paths

are confounded only when your steps have gone astray. Doors do not close unless

a new direction is called for. Learn to trust that no obstacle is without

its purpose, however baffling it may seem.

We do fear the unknown at times. It causes us anxiety and catches up with us on

occasion. But it needn’t. Have faith, practice it daily, as faith diminishes all fear.

It is said that fear cannot exist where there is faith.

They say – when you touch someone else,

God touches you in return.

My_Music_ Playlist_Different Moods by Happy



MusicPlaylist
Music Playlist at MixPod.com

This play list will take you on a roller coaster ride of emotions, it includes all colors of our life, which includes joy, happiness, sorrow, pain, sufferings, its a joy ride so just put on your ear pieces and forget the rest !!!
Enjoy  ! God bless ya !

With lots and lots of Love, Health, Wealth & Happiness

Hemant Khurana (Happy)

Never Mess with a Woman ( AN INDIAN WOMAN) :) :) !


Never Mess with a Woman ( AN INDIAN WOMAN) 🙂 🙂 !

100 Kisses

A Punjabi lawyer working in UK wrote to his wife in India …


Dear Sunita Darling,
I can’t send you my salary this month because the global market crisis has
 affected my Company’s performance, so I am sending 100 kisses. You are my sweetheart, please adjust.

Your loving husband,
JITA SINGH


His wife replied…


TINKU KE PAPPA ,

Thanks for the 100 kisses, Below is the list of expenses I paid with the Kisses…:


1. The Milk man agreed on 2 kisses for one month’s milk.

2. The electricity man agreed not to disconnect only after 7 kisses.

3. Your landlord Balkar Singh comes every day to take 2 or 3 kisses instead of the monthly rent.

4. Supermarket owner Jaswant Singh did not accept kisses only, so I gave him other items, I hope you understand..

5. Miscellaneous expenses 40 kisses.

Please don’t worry about me, I still have a balance of 35 kisses and I hope I can survive the month using this balance…

Shall I plan the same for the next month?

Your Sweet Heart,
Kichi

 

Morol of story: 

NEVER MESS WITH WOMEN !!!Ha! Ha!

Remember always to share


A holy man was having a conversation with God one day and said, ‘ God , I would like to know what Heaven and Hell are like.’

God led the holy man to two doors.

He opened one of the doors and the holy man looked in.

In the middle of the room was a large round table. In the middle of the table was a large pot of stew, which smelled delicious and made the holy man’s mouth water.

The people sitting around the table were thin and sickly. They appeared to be famished.

They were holding spoons with very long handles, that were strapped to their arms and each found it

possible to reach into the pot of stew and take a spoonful.

But because the handle was longer than their arms, they could not get the spoons back into their mouths.

The holy man shuddered at the sight of their misery and suffering.


God said, ‘You have seen Hell.’

They went to the next room and opened the door. It was exactly the same as the first one.

There was the large round table with the large pot of stew which made the holy man’s mouth water.

The people were equipped with the same long-handled spoons, but here

the people were well nourished and plump, laughing and talking. The holy man said, ‘I don’t understand.’

It is simple,’ said God . ‘It requires but one skill.


You see they have learned to feed each other,
while the greedy think only of themselves.’
Remember always to share


Ways to find happiness and contentment in Life : How to nourish your mind body and Soul .


Ways to find happiness and contentment in Life :

How to nourish your mind body and Soul .

There is no better journey than living your best life. It is something we can all accomplish with a little patience, time, effort, and self-support. There is no such thing as ultimate perfection, but it possible to gain what is perfect for you to find happiness and contentment. Your life belongs solely to you in regards to loving yourself. Love for oneself gets stronger with practice and attentive action. Self-worth is the key which allows us to do, live, and believe all that we can perceive. Your mind, body, and soul can be fully enjoyed if you are willing to be bold. Here are thirty ways to allow the benefits to unfold and gain self-control.

1. Think and believe that there is nothing you desire which can’t be achieved.

2. Never forget to love yourself first and appreciate your worth.

3. Accept your beauty, faults, flaws and all as part of your goodness.

4. Every now and again focus solely on your needs and happiness.

5. Remove all things, people, and places that don’t support your best interests.

6. Experience things independently and openly as your own best friend.

7. Gift yourself as much as you are willing to gift anyone else.

8. Don’t ignore your intuition, intellect, pride, emotions, desires, or wisdom.

9. Set aside time for learning and experiencing new things.

10. Surround yourself in physical, material and emotional comfort.

11. Stand up for yourself even when you don’t have the agreement of anyone else.

12. Value your own opinion about what is good for you.

13. Do not allow family or friendships to define your will, purpose, or happiness.

14. Be kind to yourself when you make a mistake while allowing yourself to give and take.

15. Discover the spiritual connection that makes sense and works for you.

16. Place high value on your personal truths and practices.

17. Accept relationships which compliment your life and ignore the ones that don’t.

18. Decide for yourself whom you want to be or become.

19. Show attentive care to meet your physical, mental, and emotional needs.

20. Live just as you are pleased and let your mind be eased.

21. Always have a contingency plan when things don’t work out or a means to adjust.

22. Walk away from harmful peeps, places, or things.

23. Don’t trouble yourself to justify the things you want, believe, or need.

24. Give and allow yourself all the things you want from someone else.

25. Don’t relinquish your personal power and authority over your own life.

26. Remember that life itself is a gift and nourish it.

27. Reach for joy and happiness until it becomes your reality.

28. Give yourself constant emotional, physical, mental relief from all forms of grief.

29. Chase ill-feelings away before allowing them to get in your way.

30. Protect and believe in yourself even if it means abandoning something or someone else.

It is hard to get living wrong as long as you are able, mindful, and willing to be strong. Your spirit is boundless and unlimited Don’t waste or give your time focusing on regret as something better usually comes next. Your mind, body, and soul deserve gratitude and understanding. Once you fully and completely love yourself, it becomes easily seen, respected and admired by someone else.

With Love

Hemant Khurana (Happy)

India – FACTS & FIGURES !!!




I LOVE MY INDIA !

I M WHAT I AM !


Thank God for my shoes – they fit.

 

I woke up one day and I realised

that there were many things about my life I was not satisfied with

or better still, there were challenges that were threatening my soul.

 

I then asked myself:

“Why should anyone envy me and want to be in my shoes?”

 

They don’t know how far I’ve come,

know what lies ahead of me,

or how dissatisfied I get with myself from time to time.

 

People don’t know the troubles that you’ve had;

or the price you had to pay to get to where you are.

 

All they want to know is that they wish they were like you.

But why should you wish

you were in anybody else’s shoes

when you hardly know how they fit?

 

When you’ve worn your shoes for a while,

they take the shape of your feet

and align to the way you walk.

 

If you were to wear my shoes,

you will not be comfortable in them.

 

So I stopped wishing that I was in someone else shoes

because they might not fit.

Instead, I thank God for my shoes,

because they fit!

 

I have learnt to be the best in whatever I do,

and I know that no-one can replace me

anywhere or in any sphere.

I am an original!

 

And I know for a fact that

my God is not in the cloning business,

He makes originals!

 

So, make the most of today;

Do your best in whatever you do;

And most of all,

Be the best you can be.

 

Besides, you have this beautiful life to live ONLY ONCE!

So, LIVE IT TO THE FULLEST!!!

 

LATEST INTERNET SCAMS and FRAUDS !


Internet scammers generally want one thing: your money. To get it, they’ll try to scare you into divulging account information, trick you into opening a harmful attachment, or dupe you into sending personal information. In short, scammers trade on the hope that you’re gullible enough to fall victim to their deceptions, which are constantly changing.

 

Here’s a rundown of some of the latest types of internet fraud schemes and advice on how to protect yourself.

 

Deactivation messages

 

From the ‘scare you to act’ department come email messages that threaten to deactivate your account if you do not click an embedded link to verify account details. Often, these messages claim that some kind of suspicious activity has occurred with your account, and the only way that you have to keep your account from being shut down is to click the embedded link immediately or within a certain amount of time.

 

Facebook users have recently been hit with such a scam. A message purporting to be from the ‘Facebook Security Team’ tells recipients that their accounts have been compromised and they have 12 hours to follow a link or they risk de-activation. Bottom line: Never click links in messages that claim that your account will be de-activated if you don’t. If your account with a reputable organisation is ever actually compromised, the company will be smart enough to provide information about the situation in a way that does not require you to click any link, either to confirm any information or to re-activate your account.

 

Requested attachment messages

 

Email attachments, especially in messages from people you don’t know, are common carriers of malware, spyware, or viruses. Scammers know that, by now, most people either do not open attachments sent by strangers or set up spam filters to remove such messages from their inbox automatically.

 

But senders of harmful attachments have become smarter, targeting users who may be expecting to receive attachments by email or who can be tricked into thinking they may have requested an email attachment. The US Federal Bureau of Investigation recently uncovered a scheme in which cyber criminals sent email attachments disguised as resumes to businesses who had posted jobs online. The attachments, once opened, unleashed malicious software that allowed the scammers to gain access to online banking credentials and ultimately to initiate wire transfers of money.

 

Bottom line: Always be suspicious of attachments, and be sure you use security software that scans email attachments before you open them.

 

‘Facebook team’ messages

 

It’s no surprise that with over half a billion users, Facebook garners its own category of scam alert. Messages claiming to be from the ‘Facebook team’ are on the rise, and most of these prompt recipients to divulge account logon credentials.

 

One prevalent scam, for example, instructs recipients that Facebook is implementing a new login system that offers increased account security. To use the new system, the message says you must click a link to update your account. If you do, your login information will be stolen once you enter it.

 

Bottom line: Never ‘update your account’ via a link provided in a message. If you suspect that such a message is valid, visit your account by opening a web browser yourself and accessing it the usual way.

 

Prize collection messages

 

Who wouldn’t like to wake up one day to find that they had won a prize, a sweepstakes, or some money that they weren’t expecting? Fraudsters know that the answer is ‘almost no one,’ which is why email messages claiming that ‘you won’ continue to flow. The latest twist on this tactic, however, is for the email scammer to claim that in order to receive the prize or monetary award, you must first provide a host of information by email.

 

A ‘2011 Rugby World Cup Lotto Promotion’ email message is just the latest example of this type of fraud. The message, which purports to be from the ‘International Rugby Board (IRB),’ claims that the recipient has won one million dollars by having one of the lucky email addresses drawn in a lottery that allegedly involved ‘all the email addresses of people that are active online.’

 

Scammers know that people are suspicious of embedded links these days, however, so instead of having the recipients click a link, this scam asks the recipient to send a great deal of personal information to the email address of a ‘claims administrator.’ While no account information is solicited, enough personal information to facilitate identity theft is.

 

Bottom line: Never send personal information — including name, address, age, and date of birth – to any stranger or supposed organisation by email.

 

Regards

Hemant Khurana ( Happy)

MOST COMMON INTERNET SCAMS !


Popular products

Fraudsters seem to prefer small and valuable products, such as: watches, jewelry, laptops, ink cartridges, digital cameras, and camcorders. These items are usually commodities that are easily sellable and have a broad range of appeal. However, fraud in hosted marketplaces such as Ebay covers a broad range of products from cellular phones to desktop computers. The craft has continually evolved in sophistication. In some instances, a picture of the product is sent in place of the actual product. Other times, products are outright never sent after the bill is charged to credit card accounts. Victims are left to deal with credit card companies for chargebacks.

Some Fraudsters market intangibles such as software downloads or documentation. Pricing on such items is low in order to encourage a purchase perceived by the consumer as low risk (in accordance with low cost.) Software download scams are frequently targeted at high-population buying communities such as online gaming worlds. Wow stat hack is an example of one such scam.

Identity theft schemes

Stolen credit cards
Most Internet fraud is done through the use of stolen credit card information which is obtained in many ways, the simplest being copying information from retailers, either online or offline. There have been many cases of crackers obtaining huge quantities of credit card information from companies’ databases. There have been cases of employees of companies that deal with millions of customers in which they were selling the credit card information to criminals.

Despite the claims of the credit card industry and various merchants, using credit cards for online purchases can be insecure and carry a certain risk. Even so called “secure transactions” are not fully secure, since the information needs to be decrypted to plain text in order to process it. This is one of the points where credit card information is typically stolen.

Get wire transfer info

Some fraudsters approach merchants asking them for large quotes. After they quickly accept the merchant’s quote, they ask for wire transfer information to send payment. Immediately, they use online check issuing systems as Qchex that require nothing but a working email, to produce checks that they use to pay other merchants or simply send associates to cash them.

Purchase scams

Direct solicitations
The most straightforward type of purchase scam is a buyer in another country approaching many merchants through spamming them and directly asking them if they can ship to them using credit cards to pay.

An example of such email is as follows:

From: XXXXXX XXXXXX [XXXXXXX@hotmail.com] Sent: Saturday, October 01, 2005 11:35 AM Subject: International order enquiry

Goodday Sales, This is XXXXXX XXXXXXX and I will like to place an order for some products in your store, But before I proceed with listing my requirements, I will like to know if you accept credit card and can ship internationally to Lagos, Nigeria. Could you get back to me with your website so as to forward you the list of my requirements as soon as possible. Regards, XXXXXX XXXXXX, XXXXXXXX Inc. 9999 XXXXX street, Mushin, Lagos 23401, Nigeria Telephone: 234-1-99999999, Fax: 234-1-9999999, Email: XXXXXXXXX@hotmail.com

Most likely, a few weeks or months after the merchant ships and charges the Nigerian credit card, he/she will be hit with a chargeback from the credit card processor and lose all the money.

 

 

Counterfeit Postal Money Orders

According to the FBI and postal inspectors, there has been a significant surge in the use of Counterfeit Postal Money Orders since October 2004. More than 3,700 counterfeit postal money orders (CPMOs) were intercepted by authorities from October to December of 2004, and according to the USPS, the “quality” of the counterfeits is so good that ordinary consumers can easily be fooled.

On March 9, 2005, the FDIC issued an alert [1] stating that it had learned that counterfeit U.S. Postal Money Orders had been presented for payment at financial institutions.

On April 26, 2005, Tom Zeller Jr. wrote an article in The New York Times[2] regarding a surge in the quantity and quality of the forging of U.S. Postal Money Orders, and its use to commit online fraud. The article shows a picture of a man that had been corresponding with a woman in Nigeria through a dating site, and received several fake postal money orders after the woman asked him to buy a computer and mail it to her.

Who has received Counterfeit Postal Money Orders (CPMOs):

Small Internet retailers.
Classified advertisers.
Individuals that have been contacted through email or chat rooms by fraudsters posing as prospective social interests or business partners, and convinced to help the fraudsters unknowingly.
Geographical origin:

Mostly from Nigeria
Ghana
Eastern Europe
The penalty for making or using counterfeit postal money orders is up to ten years in jail and a US$25,000 fine.

Online automotive fraud

There are two basic schemes in online automotive fraud:

A fraudster posts a vehicle for sale on an online site, generally for luxury or sports cars advertised for thousands less than market value. The details of the vehicle, including photos and description, are typically lifted from sites such as eBay Motors and re-posted elsewhere. An interested buyer, hopeful for a bargain, emails the seller, who responds saying the car is still available but is located overseas. He then instructs the buyer to send a deposit via wire transfer to initiate the “shipping” process. The unwitting buyer wires the funds, and doesn’t discover until days or weeks later that they were scammed.
A fraudster feigns interest in an actual vehicle for sale on the Internet. The “buyer” explains that a client of his is interested in the car, but due to an earlier sale that fell through has a certified check for thousands more than the asking price and requests the seller to send the balance via wire transfer. If the seller agrees to the transaction, the buyer sends the certified check via express courier (typically from Nigeria). The seller takes the check to their bank, which makes the funds available immediately. Thinking the bank has cleared the check, the seller follows through on the transaction by wiring the balance to the buyer. Days later, the check bounces and the seller realizes they have been scammed. But the money has long since been picked up and is not recoverable.
In another type of fraud, a fraudster contacts the seller of an automobile, asking for the vehicle identification number, putatively to check the accident record of the vehicle. However, the supposed buyer actually uses the VIN to make fake papers for a stolen car that is then sold.

Cash the check system

In some cases, fraudsters approach merchants and ask for large orders: $50,000 to $200,000, and agree to pay via wire transfer in advance. After brief negotiation, the buyers gives an excuse about the impossibility of sending a bank wire transfer. The buyer then offers to send a check, stating that the merchant can wait for the check to clear before shipping any goods. The check received, however, is a counterfeit of a check from a medium to large U.S. company. If asked, the buyer will claim that the check is money owed from the large company. The merchant deposits the check and it clears, so the goods are sent. Only later, when the larger company notices the check, will the merchant’s account be debited.

In some cases, the fraudsters agree to the wire but ask the merchant for their bank’s address. The fraudsters send the counterfeited check directly to the merchant’s bank with a note asking to deposit it to the merchant’s account. Unsuspecting bank officers deposit the check, and then the fraudster contacts the merchant stating that they made a direct deposit into the merchant’s account.

Re-shippers

Re-shipping scams trick individuals or small businesses into shipping goods to countries with weak legal systems. The goods are generally paid for with stolen or fake credit cards.

Nigerian version

In the Nigerian version, the fraudsters have armies of people actively recruiting single women from western countries through chat & matchmaking sites. At some point, the criminal promises to marry the lady and come to their home country in the near future. Using some excuse the criminal asks permission of his “future wife” to ship some goods he is going to buy before he comes. As soon as the woman accepts the fraudster uses several credit cards to buy at different Internet sites simultaneously. In many cases the correct billing address of the cardholder is used, but the shipping address is the home of the unsuspecting “future wife”. Around the time when the packages arrive, the criminal invents an excuse for not coming and tells his “bride” that he urgently needs to pick up most or all the packages. Since the woman has not spent any money, she sees nothing wrong and agrees. Soon after, she receives a package delivery company package with pre-printed labels that she has agreed to apply to the boxes that she already has at home. The next day, all boxes are picked up by the package delivery company and shipped to the criminal’s real address (in Nigeria or elsewhere). After that day the unsuspecting victim stops receiving communications from the “future husband” because her usefulness is over. To make matters worse, in most cases the criminals were able to create accounts with the package deliverer, based on the woman’s name and address. So, a week or two later, the woman receives a huge freight bill from the shipping company which she is supposed to pay because the goods were shipped from her home. Unwittingly, the woman became the criminal re-shipper and helped him with his criminal actions.

East European version

This is a variant of the Nigerian Version, in which criminals recruit people through classified advertising. The criminals present themselves as a growing European company trying to establish a presence in the U.S. and agree to pay whatever the job applicant is looking to make, and more. The fraudsters explain to the unsuspecting victim that they will buy certain goods in the U.S. which need to be re-shipped to a final destination in Europe. When everything is agreed they start shipping goods to the re-shipper’s house. The rest is similar to the Nigerian Version. Sometimes, when the criminals send the labels to be applied to the boxes, they also include a fake cheque, as payment for the re-shipper’s services. By the time the cheque bounces unpaid, the boxes have been picked up already and all communication between fraudster and re-shipper has stopped.

Chinese version

This is a variant of the East European Version, in which criminals recruit people through spam. The criminals present themselves as a growing Chinese company trying to establish a presence in the U.S. or Europe and agree to pay an agent whatever the unsuspecting victim is looking to make, and more. Here is an example of a recruiting email:

Dear Sir/Madam, I am Mr. XXX XXX, managing XXXXXXXXXXX Corp. We are a company who deal on mechanical equipment, hardware and minerals, electrical products, Medical & Chemicals, light industrial products and office equipment, and export into the Canada/America and Europe. We are searching for representatives who can help us establish a medium of getting to our costumers in the Canada/America and Europe as well as making payments through you to us. Please if you are interested in transacting business with us we will be glad. Please contact us for more information. Subject to your satisfaction you will be given the opportunity to negotiate your mode of which we will pay for your services as our representative in Canada/America and Europe. Please if you are interested forward to us your phone number/fax and your full contact addresses. Thanks in advance. Mr. XXX XXX. Managing Director”

Call tag scam

The Merchant Risk Council reported that the “call tag” scam re-emerged over the 2005 holidays and several large merchants suffered losses. Under the scheme, criminals use stolen credit card information to purchase goods online for shipment to the legitimate cardholder. When the item is shipped and the criminal receives tracking information via email, he/she calls the cardholder and falsely identifies himself as the merchant that shipped the goods, saying that the product was mistakenly shipped and asking permission to pick it up upon receipt. The criminal then arranges the pickup issuing a “call tag” with a shipping company different from the one the original merchant used. The cardholder normally doesn’t notice that there is a second shipping company picking up the product, which in turn has no knowledge it is participating in a fraud scheme. The cardholder then notices a charge in his card and generates a chargeback to the unsuspecting merchant.

Business opportunity/”Work-at-Home” schemes

Fraudulent schemes often use the Internet to advertise purported business opportunities that will allow individuals to earn thousands of dollars a month in “work-at-home” ventures. These schemes typically require the individuals to pay anywhere from $35 to several hundred dollars or more, but fail to deliver the materials or information that would be needed to make the work-at-home opportunity a potentially viable business.

Often, after paying a registration fee, the applicant will be sent advice on how to place ads similar to the one that recruited him in order to recruit others, which is effectively a pyramid scheme.

Other types of work at home scams include home assembly kits. The applicant pays a fee for the kit, but after assembling and returning the item, it’s rejected as sub-standard, meaning the applicant is out of pocket for the materials. Similar scams include home-working directories, medical billing, data entry (data entry scam) at home or reading books for money.

Website scams

Click fraud

The latest scam to hit the headlines is the multi-million dollar Clickfraud which occurs when advertising network affiliates force paid views or clicks to ads on their own websites via spyware, the affiliate is then paid a commission on the cost-per-click that was artificially generated. Affiliate programs such as Google’s Adsense capability pay high commissions that drive the generation of bogus clicks. With paid clicks costing as much as US$100[verification needed] and an online advertising industry worth more than US$10 billion, this form of Internet fraud is on the increase.

International modem dialing

Many consumers connect to the Internet using a modem calling a local telephone number. Some web sites, normally containing adult content, use international dialing to trick consumers into paying to view content on their web site. Often these sites purport to be free and advertise that no credit card is needed. They then prompt the user to download a “viewer” or “dialer” to allow them to view the content. Once the program is downloaded it disconnects the computer from the Internet and proceeds to dial an international long distance or premium rate number, charging anything up to US$7-8 per minute. An international block is recommended to prevent this, but in the U.S. and Canada, calls to the Caribbean (except Haiti) can be dialed with a “1” and a three-digit area code, so such numbers, as well as “10-10 dial-round” phone company prefixes, can circumvent an international block.

Another type of Click Fraud

This type of fraud involves a supposed internet marketing specialist presenting a prospective client with detailed graphs and charts that indicate that his web site receives (x) thousands of hits per month, emphasizing that if you pay for his services you will succeed in getting a number clicks converted to customers or clients.

When you receive no request for more information and no clients, the fraudster responds that it must be something you web site is not doing right.

Phishing

Main article: Phishing
“Phishing” is the act of attempting to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business with a real need for such information in a seemingly official electronic notification or message (most often an email, or an instant message). It is a form of social engineering attack.

The term was coined in the mid 1990s by crackers attempting to steal AOL accounts. An attacker would pose as an AOL staff member and send an instant message to a potential victim. The message would ask the victim to reveal his or her password, for instance to “verify your account” or to “confirm billing information”. Once the victim gave over the password, the attacker could access the victim’s account and use it for criminal purposes, such as spamming.

Phishing has been widely used by fraudsters using spam messages masquerading as large banks (Citibank, Bank of America) or PayPal. These fraudsters can copy the code and graphics from legitimate websites and use them on their own sites to create a legitimate-looking scam web pages. They can also link to the graphics on the legitimate sites to use on their own scam site. These pages are so well done that most people cannot tell that they have navigated to a scam site. Fraudsters will also put the text of a link to a legitimate site in an e-mail but use the source code to links to own fake site. This can be revealed by using the “view source” feature in the e-mail application to look at the destination of the link or putting the cursor over the link and looking at the code in the status bar of the browser. Although many people don’t fall for it, the small percentage of people that do fall for it, multiplied by the sheer numbers of spam messages sent, presents the fraudster with a substantial incentive to keep doing it.

Anti-phishing technologies are now available.

Pharming

Pharming is the exploitation of a vulnerability in the DNS server software that allows a hacker to acquire the domain name for a site, and to redirect that website’s traffic to another web site. DNS servers are the machines responsible for resolving internet names into their real addresses – the “signposts” of the internet.

If the web site receiving the traffic is a fake web site, such as a copy of a bank’s website, it can be used to “phish” or steal a computer user’s passwords, PIN or account number. Note that this is only possible when the original site was not SSL protected, or when the user is ignoring warnings about invalid server certificates.

For example, in January 2005, the domain name for a large New York ISP, Panix, was hijacked to a site in Australia. In 2004 a German teenager hijacked the eBay.de domain name.

Secure e-mail provider Hushmail was also caught by this attack on 24th of April 2005 when the attacker rang up the domain registrar and gained enough information to redirect users to a defaced webpage.

Geographic origin

In some cases Internet Fraud schemes originate in the US and European countries, but a significant proportion seems to come from Africa, particularly Nigeria and Ghana, and sometimes from Egypt. Some originate in Eastern Europe,  China. For some reason, many fraudulent orders seem to originate from Belgium, from Amsterdam in the Netherlands, from Norway, and from Malmö in Sweden.

INTERNET SCAMS – SIGN’S THAT WILL LET YOU KNOW THE EMAIL IS A SCAM OR A HOAX !


Top Five Signs That an E-mail is a Hoax

The next time that you receive an alarming e-mail calling you to action, look for one or more of these five telltale characteristics before even thinking about sending it along to anybody else.

URGENT

The e-mail will have a great sense of urgency! You’ll usually see a lot of exclamation points and capitalization. The subject line will typically be something like:

URGENT!!!!!!
WARNING!!!!!!
IMPORTANT!!!!!!
VIRUS ALERT!!!!!!
THIS IS NOT A JOKE!!!!!!

TELL ALL YOUR FRIENDS

There will always be a request that you share this “important information” by forwarding the message to everybody in your e-mail address book or to as many people as you possibly can. This is a surefire sign that the message is a hoax.

THIS ISN’T A HOAX

The body of the e-mail may contain some form of corroboration, such as a pseudoquote from an executive of a major corporation or government official. The message may include a sincere-sounding premise, such as this, for example: My neighbor, who works for Microsoft, just received this warning so I know it’s true. He asked me to pass this along to as many people as I can.

Sometimes the message will contain a link to Snopes to further confuse people. The references to Snopes are just red herrings, though, meant only to give a sense of legitimacy to the hoax. The author knows that lots of folks will believe it because they see it in print and won’t bother to really check it for themselves. Anyone actually bothering to check the story with Snopes would, of course, discover that it was not true. Hoax writers count on folks being too lazy to verify those stories before they hit the forward button.

It’s all a bunch of baloney. Don’t believe it for a second.

Watch for e-mails containing a subtle form of self-corroboration. Statements such as “This is serious!” or “This is not a hoax!” can be deceiving. Just because somebody says it’s not a hoax doesn’t make it so.

DIRE CONSEQUENCES

The e-mail text will predict dire consequences if you don’t act immediately. You are led to believe that a missing child will never be found unless the e-mail is forwarded immediately. It may infer that someone won’t die happy unless they receive a bazillion business cards. Or it may state that a virus will destroy your hard drive and cause green fuzzy things to grow in your refrigerator.

HISTORY

Look for a lot of >>>> marks in the left margin. These marks indicate that people suckered by the hoax have forwarded the message countless times before it has reached you.

In her book, Cyberliteracy, Laura Gurak identified three things that are common to all hoax and urban legend e-mail chain letters. They are the hook, the threat, and the request. To hook you in, a hoax will play on your sympathy, your greed, or your fears. It will threaten you with bad luck, play on your guilt, or label you a fool for not participating. And, of course, it will request that you forward the e-mail to all of your friends and family.

The hook catches your interest to make you read the whole e-mail. The hook may be a sad story about a missing or sick child, or about the latest computer virus. Once you’re hooked, the threat warns you about the terrible things that will happen if you don’t keep the chain going. The threat may be that someone will die if you don’t respond, or that your computer will suffer a melt-down from the latest virus. Last is the request. It will implore you to send the message to as many others as possible. It may even promise a small donation to a group with a legitimate-sounding name because they are able to track every forwarded e-mail (also a hoax).


Spot the Hoax  


The following are actual hoax e-mails. Millions of people have forwarded the “Budweiser Frogs,” “Penny Brown” and “Virtual Card for You” hoaxes to millions of Internet users, keeping them in circulation for years. See how many of the five hoax signs you can spot! Look for the hook, threat and request.

>>>
>>>Subject: READ IMMEDIATELY AND PASS ON!
>>>
>>>Someone is sending out a very cute screensaver of the Budweiser
>>>Frogs. If you download it, you will lose everything! Your hard drive
>>>will crash and someone from the Internet will get your screen name
>>>and password!
>>>
>>>DO NOT DOWNLOAD IT UNDER ANY CIRCUMSTANCES!
>>>
>>>It just went into circulation yesterday. Please distribute this
>>>message. This is a new, very malicious virus and not many people
>>>know about it.
>>>
>>>This information was announced yesterday morning from Microsoft.
>>>Please share it with everyone that might access the Internet.
>>>
>>>Once again, pass this along to EVERYONE in your address book
>>>so that this may be stopped. AOL has said that this is a very
>>>dangerous virus and that there is NO remedy for it at this time.
>>>

*****************************************************

>>>
>>>Subject: MISSING CHILD PICTURE
>>>
>>>I am asking you all, begging you to please, forward this email
>>>onto anyone and everyone you know, PLEASE. My 9 year old girl,
>>>Penny Brown, is missing.
>>>
>>>She has been missing for now two weeks.
>>>
>>>It is still not too late.
>>>
>>>Please help us.
>>>
>>>If anyone anywhere knows anything, sees anything, please contact
>>>me at zicozicozico@hotmail.com I am including a picture of her.
>>>
>>>All prayers are appreciated!! It only takes 2 seconds to forward
>>>this on, if it was your child, you would want all the help you
>>>could get.
>>>
>>>Please. thank you for your kindness, hopefully you can help us.
>>>

*****************************************************

>>>
>>>VIRUS WARNING TO ALL INTERNET USERS:
>>>
>>>A new virus has just been discovered that has been classified by
>>>Microsoft as the most destructive ever. This virus was discovered
>>>yesterday afternoon by McAfee. This virus simply destroys Sector
>>>Zero from the hard disk where vital information for its
>>>functioning are stored.
>>>
>>>This virus acts in the following manner: It sends itself
>>>automatically to all contacts on your list with the title: “A
>>>Card for You”.
>>>
>>>As soon as the supposed virtual card is opened the computer
>>>freezes so that the user has to reboot. When the ctrl+alt+del
>>>keys or the reset button are pressed, the virus destroys Sector
>>>Zero, thus permanently destroying the hard disk. Yesterday in
>>>just a few hours this virus caused panic in New York, according
>>>to news broadcast by CNN.
>>>
>>>This alert was received by an employee of Microsoft itself. So
>>>don’t open any mails with subject: “A Virtual Card for You.” As
>>>soon as you get the mail, delete it, even if you know the sender.
>>>
>>>Please forward this to everyone in your address book. I’m sure
>>>most people, like myself, would rather receive this notice 25
>>>times than not at all.
>>>

NOTE: It is possible that you may receive a virus hoax e-mail with an attached file.

Such file attachments should be treated with caution.

Thanks and Regards

Hemant Khurana(Happy)

Prepare For Hurricane Irene : Ways to Stay Informed


Prepare For Hurricane Irene

Hurricane Irene Looks ‘Terrifying’ From Space, Astronaut Says

Irene could be big threat to Northeast

Hurricane Irene “Looking Bad” for U.S.—Moon May Make It Worse


  • Go to the grocery store TODAY. Local supplies dwindle quickly leaving the shelves of most stores empty within a couple of days before the arrival of a storm. Stock up and store these items:
  1. Water. You should have on hand at least one gallon of water per person, per day for at least three days, but preferably two weeks.
  2. Non-perishable ready-to-eat foods that do not require refrigeration or cooking and little or no water. Examples: ready-to-eat canned meats and fruits; canned juices; milk; high energy foods including peanut butter, jelly, crackers, granola bars, trail mix; comfort foods including cookies, hard candy, instant coffee, tea, etc.
  • Special dietary foods.
  • Prescription medication. You should have at least a two-week supply of your medications.
  • Make a PLAN and a LIST. Find out if your are in an evacuation zone. If you are, decide where you will go if you need to evacuate — a relative’s house, a friend’s house or perhaps a hotel. Make a list of articles you will need to take along if you have to evacuate (this includes your disaster supplies kit). If you plan on staying in your home, make a list of what supplies you will need for your disaster supplies kit.
  • Store valuables and documents in waterproof containers. This includes birth certificates and these important documents.
  • Prepare and secure your home. Keep trees and shrubs trimmed loose branches picked up. Buy, cut and prepare plywood for installation to protect windows and glass doors, and wood to brace double-entry garage doors at the top and bottom. If a storm should threaten, clear your yard of lawn furniture, potted plants, bicycles, trash cans, etc. Leave swimming pools filled and super-chlorinated.
  • Pets. Red cross disaster shelters cannot accept pets because of the states’ health and safety regulations and other considerations. Service animals who assist people with disabilities are the only animals allowed in Red Cross shelters. It may be difficult, if not impossible, to find shelter for your animals in the midst of a disaster, so it is best to plan ahead.
  • Make sure all dogs and cats are wearing collars and securely fastened, up-to-date identification. Attach the phone number and address of a friend or relative outside the disaster area to your pet’s ID tag.
  • Make sure your pet’s vaccinations are up to date.
  • Keep a current photo of your pet with you.
  • Do not leave your pet unattended during a hurricane. A secure room, a few days supply of food and water does not mean your pet will be safe.
  • Call ahead to confirm temporary housing arrangements for your pets. Temporary shelters DO NOT allow pets. Some hotels/motels do allow pets, but an additional fee and/or security deposit is necessary and these accommodations fill up
  • Check your disaster supplies kit. Your disaster supplies kit should contain the following:
  1. Flashlights and several sets of batteries for each member of the family.
  2. Portable radio and batteries.
  3. Drinking Water. A supply of one gallon per person, per day for a minimum of three days.
  4. Non-perishable Food. A two-week supply is best.
  5. Special dietary foods.
  6. Non-electric can opener.
  7. Prescription medications. Always keep a two-week supply on hand.
  8. Infant supplies that include sterile water, diapers, ready formula, bottles, etc.
  9. Mosquito repellent.
  10. First aid kit including a first aid book, bandages, antiseptic, tape, compresses, aspirin and nonaspirin pain reliever, antidiarrhea medication and antacid.
  11. Distress flag and/or whistle.
  12. Toilet paper, paper towels and pre-moistened towelettes.
  13. Camera and film.
  14. Coolers. One to keep food and another to transport ice.
  15. Plastic tarp, roofing paper, nails, tools, etc.
  16. Plastic trash bags.
  17. Clean-up supplies including a mop, buckets, towels, disinfectant, etc.
  18. Water purification kit. Tablets, plain chlorine and iodine.
  • If you evacuate take the supplies above and also take:
  1. Personal hygiene items such as toothbrush, toothpaste, deodorant, etc.
  2. Extra clothing, shoes, eyeglasses, etc.
  3. Pillows, blankets, sleeping bags, cots or air mattresses, folding chairs or lawn chairs.
  4. Turn off electricity, water and gas.
  5. Lock windows and doors.
  6. Let relatives know where you are going.

Ways to Stay Informed

NOAA Weather Radio All Hazards

The National Weather Service (NWS) continuously broadcasts warning, watches, forecasts and non-weather related hazard information on NOAA Weather Radio All Hazards (NWR). The average range of the

1000+ NWR transmitters is 40 miles, depending on topography. For the best performing NWR receivers, NWS suggests you look at devices certified to

Public Alert™ standards.

These radios meet specific technical standards and come with many features such as Specific Area Message Encoding (SAME), a battery backup, both audio and visual alarms, selective programming for the types of hazards you want to be warned for, and the ability to activate external alarm devices for people with disabilities. Similar to a smoke detector, an NWR can wake you up in the middle of the night to alert you of a dangerous situation.

Current Storm Information Mobile NHC and NWS Information
National Weather Service: Mobile NHC website in basic HTML:
 www.weather.gov  www.nhc.noaa.gov/mobile
National Hurricane Center: Mobile NHC website in WAP format:
 www.nhc.noaa.gov  www.nhc.noaa.gov/index.wml
Central Pacific  Hurricane  Center: Mobile NWS website in basic HTML:
 www.prh.noaa.gov/cphc  mobile.weather.gov
Mobile NWS website in WAP format:
Historical Storm Information  cell.weather.gov
National Climatic Data Center: Other Information
 www.ncdc.noaa.gov
NOAA Coastal Services Center: NHC advisory emails:
 www.csc.noaa.gov  www.nhc.noaa.gov/signup.shtml
CPHC advisory emails:
Emergency/Preparedness Information  www.prh.noaa.gov/cphc/pages/signup.php
Audio Podcasts:
American Red Cross:  www.nhc.noaa.gov/audio/index.shtml
 www.redcross.org Geographic Information System Data:
 www.nhc.noaa.gov/gis/
FEMA:
 www.fema.gov NOAA Weather Radio All Hazards:
 www.weather.gov/nwr
Hurricane Tracking Charts:
 www.weather.gov/os/hurricane/

 

 Family Emergency Plan

Everyone needs to be prepared for the unexpected. You, as well as your family and friends, will most likely not be together when disaster strikes. How will you find each other? Will you know if your children or parents are safe? You may have to evacuate or be confined to your home. What will you do if water, gas, electricity or phone services are shut off?

Steps to Take

I Gather information about hazards. Contact your local National Weather Service office, emergency management office and American Red Cross chapter. Find out what type of emergencies could occur and how you should respond. Learn your community’s warning signals and evacuation plans. Assess your

risks and identify ways to make your home and property more secure.

II Meet with your family to create an emergency plan. Pick two places to meet: a spot outside your home for an emergency, such as fire, and a place away from your neighborhood in case you can’t return home. Choose an out of state friend as your family’s point of contact for everyone to call if the family gets separated. Discuss what you would do if advised to evacuate.

III Implement your plan.

  1. Post emergency telephone numbers by the phone.
  1. Install safety features in your house, such as smoke alarms and fire extinguishers.
  1. Inspect your home for items that can move, fall, break or catch fire and correct them.
  1. Have your family learn basic safety measures, such as CPR and first aid, how to use a fire extinguisher, and how and when to turn off water, gas and electricity in your home.
  2. Teach children how and when to call 911 or your local emergency number.
  1. Keep enough supplies in your home for at least 3 days. Assemble an emergency supplies kit. Store

these supplies in sturdy, easy-to-carry containers, such as backpacks or duffle bags. Keep important documents in a waterproof container. Keep a smaller emergency supplies kit in the trunk of your car.

An Emergency Supplies Kit Should Include:

99

At least a 3-day supply of water

99

One blanket or sleeping

99

Extra set of car keys
(one gallon per person, bag per person

99

Credit card and cash
per day)

99

First-aid kit

99

Special items for infant, elderly or

99

At least a 3-day supply of

99

Battery-powered NWR disabled family members
non-perishable food and a portable radio

99

Prescription and non-prescription

99

At least, one change of clothing

99

Emergency tools medicines
and shoes per person

99

Flashlight, extra batteries

IV Practice and maintain your plan. Ensure your family knows meeting places, phone numbers and safety rules. Conduct drills. Test your smoke detectors and NWR monthly and change the batteries at least once each year. Test and recharge your fire extinguisher(s) according to manufacturer’s instructions. Replace stored water and food every 6 months.

Safety and preparedness material is online at:

Federal Emergency Management Agency:  www.ready.gov

American Red Cross:  www.redcross.org

NOAA National Weather Service:  www.weather.gov/safety.php


Deep in my heart you will always remain !


This sadness in me right now,
Is giving me pain in a way that I don’t know how.
It’s just that I’m alone with nobody else,
My life sure is colorless.

I don’t know what or who I need.
I just want my heart stop the bleed.
It hurts all over me again and again,
I hope somebody could lend me a helping hand.

An injury I have in my heart.
I wish somebody could repair its parts.
But nobody sure is with me right now,
I just want to see you somehow.

These tears I cry for you,
Are not lies but they are true.
Alone I cry because of loneliness,
Right now, I am lifeless.

I need you especially now that I’m alone,
Can’t even talk to you on the phone.
Hope that someday, you’ll be here,
Here with me to wipe off my tear.

I need you as the deserts need the rain,
Deep in my heart you will always remain !

I need you like a baby needs its mother,
In my heart, except you, there is no one other !

I need you like the grass needs water,
When you are with me, I have nothing to bother !

I need you like a light in utter darkness,
You are really an epitome of kindness !

I need you as a hungry-one needs to eat,
Tell me, when are we going to meet !

I need you as life needs air,
In your judgement you are always fair !

I need you as a blind-one needs sight,
I think of you every day and night !

I need you as a deaf-one needs to hear,
Your absense, in my eyes brings many a tear !

 

 

With Love

Hemant khurana Happy

 

A MIRROR THAT DISPLAYS YOUR HEART RATE !!!!!!!!!


OK, so it may not be enough to provoke revenge plots against Snow White, but that doesn’t mean the Cardiocam mirror isn’t useful in its own way. The reflective device, which debuted here at the SIGGRAPH interactive technology conference, measures and displays the heart rate of whoever gazes into its shiny surface, allowing users to review some of their health metrics during their regular morning hygiene routine.

The Cardiocam mirror, designed by students at the MIT Media Lab, uses a webcam to record the minute changes in skin tone that occur as facial capillaries fill and empty with the beating of a heart. A computer analyzes the facial color change, and then displays the user’s heart rate on the mirror. Over time, the mirror establishes a baseline resting heart rate, allowing the user to monitor changes in their cardiac health over time.

“It motivates people when they see their heart rate,” said Ming-Zher Poh, a Ph.D. candidate at MIT and the lead designer on the project. “It links in with the gamification of health, and lowers the adoption barrier for exercise.”

For the most part, people don’t know their own resting heart rate. 60 to 80 beats per minute is considered healthy. Athletes’ enhanced ability to process oxygen often leads to heart rates lower than 60 (this author registered 47 beats per minute), and anything above 100 puts one at risk for a heart attack.

But more important than the absolute number is the change. A rising heart rate indicates stress or a creeping lack of health, while a diving heart rate could indicate success at exercise. Both are important, Poh told InnovationNewsDaily, as constantly looking at a lowering heart rate encourages people to continue exercising, while noticing their heart rate steadily increasing could alert users to physical or mental health problems.

Right now, the mirror can only read heart rate, and does not measure any other health indicators. But in the future, the bathroom mirror could easily become the centerpiece of the at home health management system, displaying cholesterol levels while you floss and BMI while you brush your teeth.

 

Technology A Bane or A Boon ? Now they can Hack in your Brain’s !!!!


Technology A Bane or A Boon ?

Now they can Hack in your Brain’s


https://i0.wp.com/cache.gawkerassets.com/assets/images/17/2011/02/medium_0900-how-to-hack-your-braind-title.jpg

Reading People and Their Minds

Technologies have also been developed to assist soldiers and others. In one project, pilots undergo brain scans to evaluate fatigue, which can be compensated for by greater automation of their planes. Machineries can measure fatigue in other ways — and are useful in many types of vehicles. A driver’s eye movements can be photographed (blinking is significant). Hand pressure on the steering wheel and a person’s heat can be measured, the latter by a specially lined seat. These close the gap between living thing and machine, and make use of the fact that people’s bodies are, as Dennis puts it, the “most capable data-processing subject.”

But measuring so closely has its downside. Dennis worries about a hypothetical future in which people will be scanned for “dangerous intentions.” Travelers will have to keep their thoughts safe as well as their bodies.

FoxNews.com, on September 23, 2008, presented Allison Barrie’s article “Homeland Security Detects Terrorist Threats by Reading Your Mind.” The truckbed-sized MALINTENT is revealed as the new system to worry those who value their privacy. It was developed at the Science and Technology directorate of Homeland Security. MALINTENT uses imagers and sensors to note a subject’s respiration, heart rate and temperature in a search for the subtle signs dangerous people show before they attack.

A field test was run in Maryland, with most of its participants unaware of their participation. It was set up under the cover of a bogus “technology expo.” As part of the trick, 144 of those tested were under the illusion that they were just going through an entrance, when they were actually traveling through screening sensors. The other 23 knew they were in a special project, and were told to carry a “disruptive device” when passing through the portal. When the people passed through, sensors first picked out if something was “off” or unexpected, and analysts (who did not know the identities of the “dangerous” 23) decided who needed to be noted for questioning. Scanning of small muscle movements was then done to get further information as to probable intention.

The device used in that test is called FAST (for “Future Attribute Screening Technology”) and it is supposedly effective enough to be able to tell harassed and nervous travelers from those who are dangerous.

There are ethical issues regarding privacy and storage, since the scan is like an unasked-for doctor’s examination. But, at this point at least, it does not keep data permanently. If the system is okayed for airports, it may take the place of some of the current security procedures.

Kingsley Dennis shows in the First Monday article that the world of Steven Spielberg’s movie Minority Report — where a person’s mere intent is subject to discovery and prosecution — may not be so far away after all.

Dennis reminds us that information flows around us in formats like cell phone broadcasts and television transmissions. Once we can decode many sorts of broadcasts and then transmit them from our re-wired bodies (where remote access technologies are plugged into our nervous systems), the world and civilization will alter in uncountable ways. What physicist Stuart Wolf calls “network-enabled telepathy” will be a reality, and wearable devices will be commonplace — and the new social order about which Dennis worries will become a reality. This is a world one in which the mind can be bedeviled by government surveillance, terrorists and programming experts.

David Hambling’s March 21, 2008 article “US Army toyed with telepathic ray gun” on New Scientist Tech summarizes much of “Bioeffects of Selected Nonlethal Weapons.” He wrote about how some of the devices were in concept stage, while others had undergone tests or actual use. Since the writing of the report, Hambling notes, the Long Range Acoustic Device has actually been used, mostly notably when dealing with pirates off Somalia.

 

 

“Hacking” Into the Brain — for Images

Celeste Biever, in a December 12, 2008 story for New Scientist Tech, wrote about how software can now recreate what a subject sees by making use of nothing but brain scans.

After some success at the University of California, Berkeley, where Jack Gallant and his associates demonstrated that they could identify which images their test subjects were observing by looking at brain scans, further steps have been taken. The ATR Computational Neuroscience Laboratories in Kyoto, Japan, have been the site of the newer MRI work. Yukiyasu Kamitani’s team made use of a brain-activity scanner image to recreate the image originally observed. Dr. Kamitani said. “By analyzing the brain signals when someone is seeking an image, we can reconstruct that image.” For example, the word “neuron” is recognizable from its software reconstruction.

The eventual commercial usages will be fraught with privacy issues. Its medical uses will be less controversial most of the time. Patients unable to move will be able to reach out with their thoughts, and — through possible related “reverse” developments — blind people may be able to see. (What they could be made to see would be another matter.)

An article in the U.S.-based scientific journal Neuron shows how it will also be possible through brain scans to interpret hallucinations and identify mental disorders.

The next topic of study will be how dreams and experiences are realized in the brain. Privacy will be an issue when accuracy improves, since hidden images would be extracted when subjects are asleep. When one can peer into a person’s subconscious without his or her knowledge, the potentials of abuse are endless.

Intrusions on privacy have taken place in the past. There is surviving evidence of nasty government doings, particularly by the CIA, at the expense of members of the general public.

Playing God

Of course, what Dr. Delgado had done with animals could be tried on humans. And subliminal persuasion — where signals only the subconscious mind can process are hidden within other media — could be part of the mix. Igor Smirnov, a researcher of the Russian Academy of Sciences, is a specialist in subliminals. He was consulted by staff from the FBI’s Counter-Terrorism Center when they wanted to influence David Koresh of the Branch Davidian sect during the ill-fated FBI negotiations with the cult leader. Smirnov’s idea was to plant subliminal audio messages in phone communications. One idea was for Charlton Heston to play the voice of God. The hidden “Holy” messages intoned by Heston would have been obscured under normal ones and heard subconsciously.

Smirnov has spoken of vanquishing terrorism using acoustic influences. In 1991, he had shown to observers from the United States that transmission of infrasound — at a frequency beneath the threshold of normal hearing — could send sound messages conducted through bone.

Kingsley Dennis notes that: “Military thinking in this area is beginning to shift towards a systemic viewpoint which considers the human as an open system rather than as a closed, bounded system.” As Dennis and others have emphasized: the “mind has no firewall.”

Let There Be Light — and Sound

Light is readily useable, and “Bioeffects…” covers the three main damages achievable with lasers — the “chemical, thermal, and mechanical or acoustic-mechanical” hazards. Tissues irradiated by lasers suffer photochemical damage. The skin and the eyes are most sensitive to this. Lasers can blind (permanently or temporarily) or dazzle with glare, or cause flash-blinding night-blindness. Any of these — or other eye damages — can badly effect the performance of a mission and mar a life.

“Bioeffects of Selected Non-Lethal Weapons” was finally regraded as unclassified on December 6, 2006. Moral issues are not its direct subject though the issues are implicit. Others would take those topics on.

Physorg.com was one of the many websites to mention this 1998 Pentagon report and its low-key aftermath (where no public uses of the technologies were much noted) in the February 18, 2008 article by Lisa Zyga entitled “Pentagon report investigated lasers that put voices in your head.” Responses to the article’s web appearance were typical. One “cmi” (a.k.a. “Christine”) posted on February 20 and commented that she has schizophrenia, and that: “I feel better knowing that my beliefs were true.” “Beth” posted on February 25, 2008, and noted the seriousness of taking over someone’s central nervous system. She wrote about the recent technologies for so-called “crowd control” and stresses that: “Perhaps the correct nomenclature should be ‘social control’.”

Getting Inside Heads

Getting sounds to individuals is not always so violent. Andrew Hampp, a reporter for Aftermath News, reported in a December 14, 2007 piece about the newly intrusive methods of advertising. He went to SoHo, New York, to check out an upsetting technology.

Hampp wrote about Alison Wilson, who ventured down Prince Street in December 2007 and heard “Who’s there? Who’s there?” followed by “It’s not your imagination.” The seeming audio hallucination turned out to be connected with a billboard using an “audio spotlight” sent from atop a roof. It used Holosonics® to advertise the A&E Network television show Paranormal State.

The Holosonics technology — which makes a narrow sound beam from a diminutive source — broadcasts sound that can be heard by one person but not people nearby. Joe Pompei, who founded Holosonics, says that ultrasound technology was originally designed to cut down on noise pollution by reducing the number of people who hear a noise. It does to sound what a flashlight does to light: directs it in a narrow fashion. Nevertheless it creates the illusion of the disembodied voices familiar to schizophrenics. It is showmanship, but it portends more troubling machines.

Even more amazing are developments in the transmission and reception of mental data. Steve Connor, Science Editor for The Independent, related — in an article published on March 13, 2009 — that scientists were coming closer to reading people’s minds through decoding the electrical activity in their brains.

It is now possible to learn where a person imagines himself to be physically — for example, his or her position in a visualized maze — without inquiring verbally. This is done using Magnetic Resonance Imaging (MRI) machines studying the activity patterns in the hippocampus area of the brain. Utilizing MRI, male taxi drivers in London — who have memorized the streets of their city — have been shown to possess an area behind the hippocampus that is larger than normal.

Dr. Demis Hassabis, of University College London, comments that the technology is a decade away from reading a person’s thoughts without the subject’s cooperation during a brief session. The present work, according to Dr. Hassabis will help scientists learn how the hippocampus processes information, and how memories are diminished by such diseases as Alzheimer’s.

Current Biology has published the results of the study, headed by Professor Eleanor Maguire of University College London, in which volunteers navigated through a computer’s virtual maze while being brain-scanned via MRI.

Mind privacy is less an issue to those who have too much privacy. One much-publicized research project aims to help stroke patients and brain-injured soldiers by reaching into their disabled minds and extracting information needed to help them. A less-mentioned aspect of this technology is that it could be used to interrogate enemy combatants (or anybody else). The overall mission of the research is to find ways to read brain signals in order to decipher a person’s thoughts.

The Army has granted $4 million to scientists at the University of Maryland, Carnegie Mellon University and the University of California at Irvine, who are all collaborating on the project. Michael D’Zmura, Professor and Chair of the Department of Cognitive Sciences at the University of California at Irvine, is working with a team including Gregory Hickok, Ramesh Srinivasan, and Kourosh Saberi, all cognitive science professors at UCI. The grant comes under the Multidisciplinary University Research Initiative program of the U.S. Department of Defense.

Some of the tools being utilized in this “synthetic telepathy” are familiar. One of these technologies is electroencephalography (EEG) which is used to detect electrical activity in the brain via scalp electrodes. A test subject in these EEG experiments wears a cap equipped with electrodes and is asked to think of a chosen word. The brain activity is then analyzed.

Over time, this analysis can be improved, and in the future will be assisted by thought-recognition software. A 128-sensor array will eventually be positioned within a helmet.

D’Zmura notes that the research is “years away” from the type of mental telepathy in which a person can think freely with others knowing what is thought. This is because the “sender” will need to be trained to formulate a thought in a format that can be read via EEG. This rules out aggressively spying on people’s private thoughts. Cooperation will be needed. As long as this remains the case, the worst-case Big Brother-type scenarios cannot play out.

But soldiers will be able to communicate without making a noise, and relay orders and other information. They will have to think loudly, but that is easier than talking quietly on other communications devices.

D’Zmura envisions a future in which students communicate by thought rather than by texting. He also mentions EEG-based game devices that are not as bulky as those marketed at present, and which could be worn as a hat or a hood.

Organized Stalking and Electronic Harassment

Organized stalking, as defined by those who feel they have been the victims of it, is the coordinated, continual long term harassment by a networked group of people who could be strangers to the target, acquaintances of the target, government agents or all of these. This stalking tends to take the form of vague incidents that may seem harmless in themselves but when taken collectively produce extreme discomfort, fear and paranoia in the victim. These can include such things as repeated hang up phone calls, strangers gesturing from a passing car, minor acts of vandalism on the target’s home or property, or any of a number of other repeated annoying behaviors directed at an individual by numerous others.

The Organized Stalking and Electronic Harassment website is a center of TI communication, and there are other such sites in many countries. Its main pages, at http://www.raven1.net and http://www.raven1.net/restofsite.shtml, cover many aspects of “Organized Stalking and Electronic Harassment” (OS/EH). Supervised by Eleanor White, the site uses the term OS/EH in preference of the more limited “mind control” and refers to it as the “near perfect crime.”

Statistics are provided on-site for many kinds of stalking and harassment. The varieties of stalkers are enumerated. The website’s answer to why organized stalking and electronic harassment are not recorded in the official crime statistics is that: “They consistently used the ‘you are mentally ill’ method, with its implied threat of being forced into the mental health system, as their main blocking tactic.” They claim that if a person is actually targeted the usual channels for help are not available.

Organized stalking, as described here (as a systematic destruction of every social and private aspect of a target’s life), is informed by the historical examples of MKULTRA and COINTELPRO, and is said to be done in the “community watch” style of the present day — a sort of neighborhood watch gone bad.

Particularly feared on the OS/EH website are the uses of microwaves, including microwave ovens (altered to project through walls) and “voice to skull” technologies. Their worries are understandable enough but an outsider to the subculture would find some of it strange. One worry is “how well your possessions will work and how long they will work without breakdowns.” Common human aggravations like illnesses, and woes like the death of a pet, are taken as signs of persecution. Lists are presented of targeted people and the harms they experienced.

Eleanor White bases her group’s case on the histories of MKULTRA, COINTELPRO, and the commercial and unclassified technologies. To her mind, the known facts prove her group’s claims, and she calls upon fellow Christians to pray, among other things, “that Satan’s grip on the perpetrators might be shaken loose.”

The website includes a review for the 1979 book Search for the Manchurian Candidate by John Marks, which sources 16,000 pages of CIA documents obtained through the FOIA — with many details on MKULTRA. The review summarizes that “This book shows clearly that morally bankrupt people in positions of authority are not particularly rare, and the moral bankruptcy extends even to torturing fellow citizens.”

Targeted Individuals and the Bigger Picture

Sharon Weinberger provided a wider look at the subculture of people who think that the government is putting voices into their heads in an article entitled “Mind Games” in the Washington Post of January 14, 2007. She followed it up on January 16 with a Live Discussion on the Washington Post website in which interested parties (including many TIs) participated.

In “Mind Games,” Weinberger describes the lingo used in a Saturday evening conference call involving TIs within the subculture, in which terms like “gang stalking” and “V2K” (short for “voice to skull”) were bandied about. “Gang stalking” describes what the group feels is happening to them — that they are being shadowed and harassed by strangers, by neighbors, or even by co-workers, who are government agents. The forum had, at that time during 2007, 143 members. One caller described her heavy use of aluminum foil in her clothes — even her hat. Derrick Robinson, the moderator of the call, described his gang stalking as beginning in the 1980s when he was working at the National Security Agency (NSA).

One Californian Targeted Individual, after conducting interviews of some 50 fellow TIs, reported widespread symptoms of ear-ringing, voices, body part manipulation, skin sensations, sexual attacks and sinus problems. Assaults to sexual organs were described by TIs of both genders. One described how it felt “electronic.” This is so similar to “alien abduction experiences” as to be startling, and it was noticed by Susan Clancy, the Harvard psychologist who wrote the book Abducted. Of the seemingly abducted, she says: “It’s not just an explanation for your problems; it’s a source of meaning for your life.”

And there have been well-known people who have had a TI or TI-like experience. Evelyn Waugh, the 20th century novelist, in a 1957 semi-autobiographical fiction entitled The Ordeal of Gilbert Pinfold, told of a man hearing voices which seemed to be broadcast into his head. (Waugh found that his own TI experience was due to some drugs.)

TIs are confronted by basic questions. Did what happened to them actually happen? If it happens to many people, why is its importance minimized? Why are there so many things that would seem to be evidence that what happened was real? Weinberger sums up a major problem: “The very ‘realness’ of the voices is the issue — how do you disbelieve something you perceive as real?”

In the follow-up, she sums up that, while many TIs are probably mentally ill, that “…not everyone who believes in strange things is mentally ill.” Hearing voices is not as uncommon as thought.

There are a number of mysteries about the reality of the TIs’ situation. One is the wherewithal of the alleged persecutors. It would take a lot of money and time to set up the claimed mechanisms of torment. If research is the motive, what would be the uses of the information gleaned from politically insignificant people as compared to the costs of the research? In secretive prisons such as Guantanamo, techniques that slowly break down personality are put into use on people termed enemy combatants. How much of this was learned from the mind studies over the years?

Cheryl Welsh, who responded positively to Weinberger’s Post article, heads Mind Justice, a “human rights group working for the rights and protections of mental integrity and freedom from new technologies and weapons which target the mind and nervous system.” The group’s website, at http://mindjustice.org/, has much information on mind-afflicting technologies and their history. One 2008 article in particular, written by Welsh, “In Contravention of Conventional Wisdom: CIA ‘no touch’ torture makes sense out of mind control allegations,” compares the mind-eroding effects of modern interrogation with the experiences of the TIs and likens the almost theatrical setups which unnerve the recipients of the “no touch” torture to the “street theater” described in the testimonies of alleged mind control victims. Welsh wonders who controls neuroscience weapons research and how advanced it is. She stresses the continued “lack of public input” to the policy of its use.

The biggest mystery is what constitutes the present state of the art. The publicized technologies are fairly crude and most have a short range while the symptoms felt by TIs hint at more advanced machines that can work at great distances and without some of the limitations of known technology. Is the most sophisticated tech still Top Secret? Why is it that — after all these decades of research — no neurologically-based weapons have been publicly used?

This leaves things at a strange nexus — where “crazy” beliefs and technological capabilities meet. The connection is unsettling, and is generally downplayed. Rep. Dennis Kucinich (D-Ohio) proposed in 2001 — as part of a larger bill — to ban psychotronic weapons but met mockery from columnists and others.

The scariest element of all is the biological/mechanical — or man/machine — interface. There could be a person who could see, hear, and mind-read too much — and to whom little would be private. What would such a presence do to human interaction and sanity?

Are the problems feared by TIs and some of the rest of us actually a forerunner of things to come?

Gaming with the Mind

In Eric Bland’s article “Army developing ‘synthetic telepathy’,” published on MSNBC.com on October 13, 2008, Paul Sajda, an Associate Professor of Biomedical Engineering at Columbia University, shares his ideas on thought-based gaming. At present, virtual objects can be manipulated using EEG headsets, which can pick up signals within one or two centimeters in the brain, notes Sajda. It will take much more detail to deal with “auditory” thoughts that translate into words. More work must be done to find out which phrases and words line up with which sections of the brain.

A notable new device is the Neural Impulse Actuator from OCZ, which monitors both forehead muscles and brain activities. Algorithms are used to translate the brain and muscle signals into commands for game activities. Some who have tried the device feel that the furrowing of the user’s brows is what is doing most of the heavy lifting. Use of the Actuator improves over time as the device’s computer programs get to know one’s muscle/brain idiosyncrasies.

Another gaming device is a brainwave headset, designed for computer games. Emotiv Systems’ headset is attuned to the brain. Its function is entirely motivated by the 16 sensors that scan brain electrical activity. Norman Chan of the magazine PC Gamer put the device on and within four seconds “levitated a mountain” (on a computer screen on one axis of virtual movement). The product was not then publicly released, but he wanted one for his very own.

Sony, a giant in the gaming field, has gotten a patent on a device for, as Kingsley Dennis cites it, “transmitting sensory data directly into the human brain.” It works by sending ultrasound pulses to specified portions of the brain, which results in “sensory experiences.” Transcranial magnetic stimulation is its basis, and it affects the nerves using changes in magnetic fields. It it hoped that Sony’s patent will enable the deaf to hear and the blind to see.

Add, to efforts like these, competitor Microsoft’s efforts to turn the entire body — especially skin — into computing devices and you have the world conceived by Bill Gates in which computers disappear into the environment. Technology is becoming less a matter of external hardware such as peripherals. Instead the need for computer hardware is declining as designers find ways to connect with the body’s own computational powers.

Hacking may end up a problem, though. Hadley Leggett, in a news article posted online July 9, 2009 on Wired Science, writes of the possibility of hacking of the brain. While hackers often get into others’ computers, it would be more serious if the computers they cracked were inside people, controlling such devices as prosthetic limbs, artificial hearts, and brain stimulators. In 2007 and 2008 malign programmers installed harmful flashing animations into epilepsy websites, so it is only a matter of time before they try the same with neurological machines.

WOULD YA ALLOW ALL THIS TO HAPPEN ???

 

https://i0.wp.com/ecx.images-amazon.com/images/I/512ywwyUznL._SL210_.jpg

 

Regards

Hemant Khurana ( Happy)

Dos and Don’ts of Disaster Management- Precautions and measures


 Dos and Don’ts of Disaster Management

Dos

You and Your Family


F     Educate your children wife and other family member in respect of natural and manmade disasters and other crises. In case of your being unaware, take help of Civil Defence and Home Guard organisation and other NGOs. Develop habit in you and your children to spare 1% of you busy time to think about Individual security and security interests.

F     Keep the phone numbers of the local police station, police control rooms, fire stations, and schools, colleges, TV station, All India Radio, ambulance services and Chemists for emergency use.

F     Guide children to remain at schools in emergency.

F     Prepare an emergency kit of items and essentials in the house including essential documents and valuables.

F     Store food and water for survival in case you had a pre-warning.

F     Any suspicious incidents observed be reported to police on 103. Callers do not have to give their identity on the phone. Information of immediate use be conveyed to control rooms to help early relief.

F     Carry your identity card, residential telephone number or address or personal card with you. Have your blood group and any medical allergies recorded with you.

F     Check information in case of disasters and crises from ward, civil Defence/Home Guard, and BMC, TV and All India Radio Control room.

F     Learn to fight such emergencies untidily.

F     Support authorities and NGOs.

F     Identify scooters, cars, vehicles parked in society and identify vehicles which are unknown and parked for long.

F     Organize societies and muhalla committees to educate people.

Donts


F     Do not encourage rumors.

F     Do not blame any community for any crises.

F     Do not encourage communal hatred in such situations.


Dos
Your Place of Work

F     Your mode of travel by car, bus, train and taxi be known to your people.

F     High rises buildings must check their electric and water supplies and organise periodic mockup drills for fire fighting and escape routes.

F     Drills for bomb blast, threats be organised and practiced.

F     Air/Helicopter evacuation be examined and organised from selected rooftops of high rises.

F     Fire fighting equipment be kept serviceable and periodic check is effected.

F     Office societies be organised and prepared to coordinate such emergencies of fire brigade, medical help and other assistance. Such people be nominated and they should guide relief.

F     Everyone must know use of fire extinguisher in emergency.

F     Security guards are trained to coordinate in such crises.

Dos

In Transit

F     Be concerned and develop habit of surveillance when out of our house. Check your seat in cinema hall, train, bus and air. Have you observed a bird, she jumped around and looks in all directions before selecting a spot on a tree for her security. Do we learn anything from this bird instinct?

F     Look for the objects, baggage, at bus stand, railway stations, compartments, airport, which is unclaimed.

F     Unknown vehicles parked at airports, Railway Stations and bus stands have to be kept under surveillance by common citizens, and this alertness may help authorities.

F     Bus, trains and airlines passengers who notice any suspicious behavior of co-passengers, be brought to the notice of officials,

F     Every passenger should identify a friend or relations residence in case of requirement of staying away in emergency. The family should know about such a plan.

Don’t

F     Do not touch any suspicious object. Report to concerned people.

F     Do not crowd the object.

F     Passengers should not accept parcels from unknown persons in hurry while boarding train or bus.

DURING AN EARTHQUAKE

When you feel an earthquake, duck under a desk or sturdy table. Stay away from windows, bookcases, file cabinets, heavy mirrors, hanging plants, and other heavy objects that could fall. Watch out for falling plaster and ceiling tiles. Stay undercover until the shaking stops, and hold onto your cover. If it moves, move with it. Below are some additional tips for specific locations:

If you are in a HIGH-RISE BUILDING, and not near a desk or table, move against an interior wall and protect your head with your arms. Do not use the elevators. Do not be surprised if the alarm or sprinkler systems come on. Stay indoors. Glass windows can dislodge during the quake and sail for hundreds of feet.
If you’re OUTDOORS, move to a clear area away from trees, signs, buildings, electrical wires, and poles.
If you’re on a SIDEWALK NEAR BUILDINGS, duck into a doorway to protect yourself from falling bricks, glass, plaster, and other debris.
If you’re DRIVING, pull over to the side of the road and stop. Avoid overpasses, power lines, and other hazards. Stay inside the vehicle until the shaking is over.
If you’re in a CROWDED STORE OR OTHER PUBLIC PLACE, do not rush for exits. Move away from display shelves containing objects that could fall.
If you’re in a WHEELCHAIR, stay in it. Move to cover, if possible, lock your wheels, and protect your head with your arms.
If you’re in the KITCHEN, move away from the refrigerator, stove, and overhead cupboards. (Take time NOW to anchor appliances, and install security latches on cupboard doors to reduce hazards.)
If you’re in a STADIUM OR THEATER, stay in your seat and protect your head with your arms. Do not try to leave until the shaking is over, then leave in a calm, orderly manner. Avoid rushing toward exits.

AFTER THE EARTHQUAKE CHECK LIST

Be prepared for aftershocks, and plan where you will take cover when they occur.
Check for injuries. Give first aid, as necessary.
Remain calm and reassure others.
Avoid broken glass.

Check for fire. Take appropriate actions and precautions.
Check gas, water, and electric lines. If damaged, shut off service. If gas is leaking, don’t use matches, flashlights, appliances, or electric switches. Open windows, leave building, and report to gas company.
Replace all telephone receivers, and use for emergency calls only.
Tune to the emergency broadcast station on radio or television. Listen for emergency bulletins.
Stay out of damaged buildings.

INDIVIDUAL AND FAMILY READINESS

Create a Family Earthquake Plan

Know the safe spot in each room, (under sturdy tables, desks, or against inside walls).
Know the danger spots, (windows, mirrors, hanging objects, fireplaces and tall furniture).
Conduct practice drills. Physically place yourself and your children in safe locations.
Learn first aid and CPR (cardiopulmonary resuscitation) from your local Red Cross or other community organization.
Decide where your family will reunite, if separated.
Keep a list of emergency phone numbers.
Choose an out-of-state friend or relative whom family members can call after the quake to report your condition. Carry emergency contact cards with out of state contact phone numbers.

HOME PREPAREDNESS

Learn how to shut off gas, water, and electricity in case the lines are damaged.
Check chimneys, roofs, and wall foundations for stability. Note: If your home was built before 1935, make sure your house is bolted to its foundation. If your home is on a raised foundation, make sure the cripple walls have been made into shear walls. Call a licensed contractor if you have any questions.
Secure Heavy Furnishings
Secure water heater and appliances that could move enough to rupture utility lines.
Keep breakable and heavy objects on lower shelves. Put latches on cabinet doors to keep them closed during shaking.
Keep flammable or hazardous liquids such as paints, pest sprays, or cleaning products in cabinets or secured on lower shelves.
Maintain emergency food, water, medicine, first aid kit, tools, and clothing.

HOME AND OFFICE FIRST AID KITS

First aid kits are vital following any emergency. They can also come in very handy on a day to day basis when someone is injured. To be useful, a first aid kit must be accessible and ready. Store the kit in a location that will be accessible following the turmoil of an earthquake.
Do not forget your cars! You also need a well-stocked first aid kit for each vehicle.
Supplies need to be rotated and kept fresh, especially in vehicles where heat can shorten the life of your first aid supplies. We recommend checking and updating all of your first aid supplies twice a year. A good time is when you change your clocks for daylight savings time. (This is also the time to check your smoke detector batteries).

MEDICATIONS

Antibiotic Ointment
Medications For All Family Members
Aspirin and/or Pain Relief Medication
Diarrhea Medication
Eye Drops
Cold/Cough Medicine
Benadryl
Insect Spray
Ear and Nose Drops
Hydrogen Peroxide
Skin Disinfectant Spray
Extra Prescription Medication
Old Pair Of Prescription Eyeglasses For Spare

MEDICAL MATERIALS

Band-aids
Medical Latex Gloves
Surgical Mask
Instant Cold Packs
Instant Hot Packs
Ace Bandages
Butterfly Bandages
Gauze Pads
Cotton Swabs
Adhesive Tape
2″ & 4″ Wide Sterile Bandage Rolls
Triangular Bandage For Sling, Etc. (37″ x 37″ x 52″)
Tongue Depressors (Pop-sickle Sticks)
Splint Material
Spray Bottle With 10% Bleach Solution For Disinfecting Objects.

FAMILY EARTHQUAKE PLAN

KNOW YOUR ENVIRONMENT

During an earthquake, stay away from heavy furniture, appliances, large panes of glass, shelves holding heavy objects, and
masonry veneer (such as the fireplace). These items tend to fall or break and can injure you. Usually, a hallway is one of the safest places if it is not crowded with objects. Kitchens and garages tend to be the most dangerous. Also, know the safest place in each room. It will be difficult to move from one place to another during a severe earthquake.
EXITS AND ALTERNATIVE EXITS: Always know all the possible ways to exit your house and workplace in emergency situations. Try to discover exits that would only be available to you in an emergency.
LOCATION OF SHUT-OFF VALVES: Know the location of the shutoff valves for water, gas, and electricity. If you are not sure, contact your utility company

MAKE SPECIAL PROVISIONS

 

 

ELDERLY, DISABLED, OR PERSONS UNDER MEDICATION: These people may have difficulty moving around after an earthquake. Plan to have someone help them to evacuate if necessary. Also, they may need special foods or medication. Be sure to store several days’ supply of these special provisions.
PERSONS WHO DON’T SPEAK ENGLISH: People who cannot speak English often rely on their family or friends for information. If they are separated during an earthquake, they may need help. Prepare emergency information cards, written in English, indicating identification, address, and special needs.
PETS: After an earthquake, you should be concerned with your own safety before taking care of your pets. Storing extra food and water for pets is always a good idea. Keep them in a secure place at home after an earthquake. If you are evacuated, they will not be allowed at the emergency shelter.

During the Earthquake  

Preparations for an earthquake include knowing what to do while it is happening.  By learning and practicing what you should try to do, you will be more able to remain calm enough to protect yourself and help others.  Know what to do, wherever you are.  In summary, you should take cover and stay there.

  • If you’re inside your home, stay there.  Get out of the kitchen safer places are inside hall, in corners, in archways.  Take cover under a heavy table, desk or any solid furniture that you can get under and hold onto.  Protect your head and face.  Doors may slam on you figures if you are in a doorway.  Avoid areas near windows.
  • If you are in a yard outside your home, stay there and get clear of buildings and wires that could fall on you.
  • Don’t go outside where you may be hit by falling debris – pavements next to tall buildings are particularly dangerous.
  • Avoid lifts – if you are in a lift when an earthquake happens, press all floors buttons and get out when you can.  High – rise residents will hear fire alarms go off and electricity may fail.
  • If you are in a vehicle, pull over to the sight (leave the road clear) away from bridges, over bridges and buildings.  Stay in your vehicle.
  • If you are in a crowed public place, take cover and watch that you don’t get trampled.  In shopping centers, take cover in the nearest store and keep away form windows, neon signs and display shelves of heavy objects.
  • Remain in protected place until the shacking stops.  Anticipate after shocks – they may occur after the first quake.
  • Try to remain calm and help others.

  After the earthquake

Preparation of an earthquake also include knowing what to do and not do, after the shaking stops-when there is a danger from aftershocks, fire, falling building materials, debris, etc. Remain calm. You may have to take charge of others. Take care of life threatening situations first. Remember, you may be on your own for 72 hours or more.

  • Check your home for structural damage and other hazards.
  • Check yourself and others nearby for injuries-administer first aid quickly and carefully.
  • If you are evacuating, locate and take your pack of emergency supplies with you.
  • Use a torch to check utilities and not shut them off unless damaged. Leaking gas will smell. Don’t light matches or turn on light switches-until you are sure there are no gas leaks or flammable liquids.
  • Wear sturdy shoes, if there’s debris, particularly broken glass.
  • Check your neighbor’s after looking your own family. Your first help after and earthquake usually will come from family and friends.
  • Confine frightened pets.
  • Don’t flush toilets if you suspects nearby sewer lines are broken.
  • Carefully cleanup any spilled hazardous material.
  • Secure your home against intruders.
  • Turn on your battery-power radio (or car radio) and listen for broadcast emergency instructions.
  • Don’t use your telephone, expect it an extreme emergency.
  • Don’t use your vehicle, expect in an extreme emergency.
  • Stay at least ten meters from downed power lines.

Ø      Avoid sea line because of the threat of large waves.

Important Links

http://www.iris.edu/seismon
http://www.lafd.org
http://www.eeri.org
http://www.anss.org
http://en.wikipedia.org/wiki/2004_Indian_Ocean_earthquake

Gallery

Happy Birthday 2 U Krishna – From Happy – Today is Shri Krishna Janamashtmi !!

This gallery contains 12 photos.


  Legend of Janmashtami Janmashtami Janmashtami, one of the most popular festivals of Hindus celebrates the birth of their beloved God, Sri Krishna. Detailed story of Janmashtami or Lord Krishna’s birth has been narrated in Puranas. Please read on to … Continue reading

Download and Watch 1 of my Favourite Bollywood Movie based on Love True Love !


Maine Pyar Kiya (Hindi: मैने प्यार किया, Urdu: میں نے پیار کیا), English: I Fell in Love) is an Indian Bollywood film

Although Karan and Kishan have been friends for years, they have grown apart and have little in common. The widower Karan is a poor mechanic who lives in a humble house in the country. Kishan is a rich man with a vast business empire with little time for old friends. However, when Karan prepares to work abroad and earn more money, he turns to Kishan to solve a problem. Will Kishan let Karan’s daughter Suman (Bhagyashree) stay at his house? Kishan cannot turn down his old friend’s request and Suman comes to live with Kishan’s family.

At first country girl Suman is ill at ease in the huge mansion. She is befriended by Kishan’s son Prem (Salman Khan), who assures her that he has no romantic interest in her and that a boy and a girl can be platonic friends. The pair share outings and confidences and all seems to be going well.

Then Prem takes Suman to a party put on by some of his rich friends. They humiliate Suman and accuse her of scheming to marry Prem. Suman leaves in tears and distances herself from Prem. At that point, Prem suddenly realizes that he has fallen in love with her. With aid of his mother (who likes the unassuming Suman) and his comic friend Manohar, Prem sets out to win Suman’s heart.

He succeeds, but their romance is balked by Prem’s father Kishan, who does not want his son to marry a poor nobody. He prepares to send Suman home in disgrace. At this unpropitious moment, Karan returns from overseas. Kishan accuses him of plotting to match Prem and Suman. Karan and Kishan quarrel; Karan and Suman then return to their village humiliated.

Prem refuses to accept the separation. He defies his father and is disinherited. He goes to Suman’s village and begs to be allowed to marry her. Karan, angered by Kishan’s accusations, says that he will allow the marriage on one condition: Prem must prove that he can support a wife by his own efforts.

Karan, meanwhile, takes back Suman home and the daughter sulks till Prem acts as a rescuer. But since Prem is now disinherited, Karan puts forward the condition that Prem should earn two thousand rupees within a month to prove that he can take care of Suman. Prem then works as a truck driver and laborer. At the end of the month, while Prem is ready with the required money and comes to win the heart of his lady’s father, This melts Karan’s heart, and he agrees to letting Suman marry Prem. By the end of the movie, the estrangement between Karan and Kishan ends too.

Prem and Suman live happily ever after.

———————————–

https://hemantkhurana81.wordpress.com/wp-content/uploads/2011/08/bhagyashree-mainepyarkiya.jpg?w=300

Infatuation

    Sees the other person as perfect
    Wants to get own needs met; selfish
    Spends all time with the other person
     Quickly “falls” for the other person
     Other relationships and friendships deteriorate
     Dependence on the other person causes
     Jealousy frequently
    Lasts for a short period of time
    Distance strains and often puts an end to the relationship
    Quarrels are serious and common
   Quarrels can seriously damage the relationship

Love

    Sees the other person’s flaws and still loves them
     Wants to serve the other person; selfless
   Still spends time with others
    Takes time to build the relationship
    relationships  grows stronger
     Trust and understanding results in less severe and less frequent jealousy
    Encompasses a long-term commitment
     Survives and sometimes is strengthened because of distance
     Quarrels are less serious and less often
     Quarrels can strengthen the relationship

Love isn’t blind or deaf or dumb – in fact it sees far more than it will ever tell. It is going beyond yourself and stretching who you are for someone else. Being in love entails seeing someone as you wish they were: to love them is to see who they really are and still care for them. Love isn’t bitter, but you can’t have love without pain: sacrifice is the hallmark of love , the coin of love.

Being in love usually is used in a romantic sense when you meet your significant other transforming a normal relationship into a deeper one without further interest in others.
Love means that you trust the person, would do anything for the person, know that person is with you through thick and thin, isn’t afraid to be seen with you. make sure they treat you right.

If People Cheat : Internet Usually a Factor


Technology is a useful tool when used in a responsible and common sense way……but for those with little or no self control it can be used in a very irresponsible way by Bullying, Stalking, Lying & Cheating and hurt many people in the process.

https://i0.wp.com/www.nurseweek.com/photos/97-8/titlea.gif

According to a recent study, the rate of infidelity within relationships stands at 20%, which hasn’t changed particularly much over the last few decades—however, what we’re seeing now is the prevalence of the Internet and other new technologies (like disposable cell phones) in cheating scenarios. Modern conveniences like these allow people to covertly arrange hook-ups outside the bounds of their committed relationships; and can help in either concealing them or end up in them getting caught that much easier (depending on how good they are with their chat logs, browser histories and cell phone call records).

https://i0.wp.com/www.blogcdn.com/www.switched.com/media/2009/03/bed-laptop-20090303_180x129.jpg

The DAILY COMET REPORTS

In a recent study, Bradford Wilcox, director of the National Marriage Project at the University of Virginia, reported that the rate of infidelity has held steady at about 20 percent.

What has changed radically in the past 20 years, however, is technology.

Whether a person is likely to have an affair largely depends on two factors, says marriage counselor and therapist Kim Ploussard: opportunity and convenience.

Thanks to the Internet and the availability of disposable cellphones, people now have the opportunity to meet and connect with many potential partners discreetly and from the comfort of home.

What do you think—how has the Internet changed the modern landscape? Has it helped bring people closer together (as in the case of Internet dating, meet-ups and Facebook connections) or has it ended up shortening people’s relationship attention spans and led them to constantly seek new stimulation elsewhere?

The article relates a few even more stunning figures:

— 20 percent of divorces today involve Facebook.

— The Internet is involved in the initiation of a relationship 70 percent of the time.

— About half the people online lie.

How can we overcome both our new addiction to technology and also the endless jealousy that can result from spying on our partners’ electronic records and public social media accounts to see who they might be talking to?

https://i0.wp.com/www.noobpreneur.com/wp-content/uploads/2010/06/internet-addiction-disorder.jpg

https://i0.wp.com/www.maximumpc.com/files/u69/Facebook_Addict.jpg

INTRODUCTION INTERNET ADDICTION DISORDER

The growing body of research in the area of addiction suggests that Internet Addiction Disorder, a psychophysiological disorder involving tolerance; withdrawal symptoms; affective disturbances; and interruption of social relationships, is a presenting problem that is becoming more common in society as on-line usage increases by the day. With the growing importance of the Internet in everyday life, more and more people are accessing various on-line resources each day. The World Wide Web is informative, convenient, resourceful, and fun. For some people though–the addicted–these benefits are becoming detriments. There are varying opinions on the subject, especially among those who utilize the Internet. Some say that the Internet can be addicting, to the point that it disturbs one’s life and the lives of those around him. Others say that there is no such thing as Internet Addiction Disorder– getting pleasure out of a computer is not the same as getting pleasure from cocaine or any other drug. Whether there is or is not a bona fide disorder, the Internet is disrupting many people’s lives. Who is to blame for this disorder? Is it the WWW companies or is it the individual? Whichever (if either), the solution is not to outlaw the Internet, as with psychoactive drugs. Simple methods of prevention do exist that can reduce the negative effects of Internet use.

DEFINING INTERNET ADDICTION DISORDER

To be diagnosed as having Internet Addiction Disorder, a person must meet certain criteria as prescribed by the American Psychiatric Association. Three or more of these criteria must be present at any time during a twelve month period: 1. Tolerance: This refers to the need for increasing amounts of time on the Internet to achieve satisfaction and/or significantly diminished effect with continued use of the same amount of time on the Internet. 2. Two or more withdrawal symptoms developing within days to one month after reduction of Internet use or cessation of Internet use (i.e., quitting cold turkey) , and these must cause distress or impair social, personal or occupational functioning. These include: psychomotor agitation, i.e. trembling, tremors; anxiety; obsessive thinking about what is happening on the Internet; fantasies or dreams about the Internet; voluntary or involuntary typing movements of the fingers. 3. Use of the Internet is engaged in to relieve or avoid withdrawal symptoms. 4. The Internet is often accessed more often, or for longer periods of time than was intended. 5. A significant amount of time is spent in activities related to Internet use ( e.g., Internet books, trying out new World Wide Web browsers, researching Internet vendors, etc.). 6. Important social, occupational, or recreational activities are given up or reduced because of Internet use. 7. The individual risks the loss of a significant relationship, job, educational or career opportunity because of excessive use of the Internet. In recent research, other characteristics have been identified. The first is feelings of restlessness or irritability when attempting to cut down or stop Internet use. The second is that the Internet is used as a way of escaping problems or relieving feelings of helplessness, guilt, anxiety or depression. The third characteristic is that the user lies to family members or friends to conceal the extent of involvement with the Internet. And, finally, the user returns repeatedly despite excessive fees (Egger & Rauterberg, 1996).

“ADDICTION” AND INTERNET ADDICTION DISORDER

Bratter and Forest (1985; in Freeman, 1992) define addiction as “a behavior pattern of compulsive drug use characterized by overwhelming involvement…with the use of a drug and the securing of the supply, as well as the tendency to relapse after completion of withdrawal.” Like all other addictions, Internet addiction is a psychophysiological disorder involving tolerance (the same amount of usage elicits less response; increased amounts become necessary to evoke the same amount of pleasure), withdrawal symptoms (especially, tremors, anxiety, and moodiness), affective disturbances (depression, irritability), and interruption of social relationships (a decline or loss, either in quality or quantity). Due to the nature of Internet Addiction Disorder (failed impulse control without involving an intoxicant), of all other addictions, IAD is said to be closest to pathological gambling. However, the effects that the addiction can have on every aspect of the person’s life are just as devastating as those of alcoholism. Kimberly S. Young, Psy.D., conducted a study involving nearly 500 heavy Internet users. Their behavior was compared to the clinical criteria used to classify pathological gambling as defined by the Diagnostic and Statistical Manual of Mental Disorders-IV, published by the American Psychiatric Association. Using this criteria, eighty percent of the participants in the Young’s study were classified as dependent Internet users. They “exhibited significant addictive behavior patterns.” She concludes that, “the use of the internet can definitely disrupt one’s academic, social, financial, and occupational life the same way other well-documented addictions like pathological gambling, eating disorders, and alcoholism can” (Young, 1996). There have been many attempts by medical doctors and psychologists to explain addiction disorders. These theories include psychodynamic and personality explanations, sociocultural explanations, behavioral explanations, and biomedical explanations. Not all explain any addiction perfectly, and some are better than others at explaining Internet addiction.

Psychodynamics and Personality

Psychodynamic and personality views account for addiction through early childhood traumas, correlations with other certain personality traits or other disorders, and inherited psychological dispositions (Sue, 1994). A dispositional model or diathesis-stress model of addiction might help in understanding IAD. Certain people, due to a variety of factors, may be predisposed (diathesis) to developing an addiction to something, be it alcohol, heroin, gambling, sex, shopping, or on-line computer services. They could go through their entire lives never developing any kind of addiction. On the other hand, if the right stressor, or combination of stressors, affects the person at a critical time, the person may be more inclined to develop an addiction. If the person begins drinking alcohol even occasionally, but continues to increase consumption, he may develop a dependency on alcohol. The same premise holds for Internet addiction. If it is the right combination of time, person, and event, then addiction may take place. The idea is that it is not the activity or subject that is important. It is the person that is most crucial to the equation.

Sociocultutral explanations

Addictions vary according to sex, age, socioeconomic status, ethnicity, religion, and country. Some addictions are more common among persons of different categories. For example, alcoholism is most common in the middle socioeconomic classes, in Native and Irish Americans, and in Catholics. Whites are more likely to use PCP and hallucinogens, but less likely than Blacks or Latinos to use heroin(Sue, 1994). Not enough data is available yet about those persons addicted to the Internet to determine if a particular class is most predominant. In addition, at this point there is not enough diversity among Internet users to make any definitive statements. As the diversity among users increases, and as the amount of research on the problem increases, hopefully we will know more about this interesting aspect of addiction with regard to the Internet.

Behavioral explanations

These explanations are based on B.F. Skinner’s studies on operant conditioning (Sue, 1994). The person performs a behavior and gets either rewarded or punished for the behavior. To illustrate, there might be a child who is painfully shy and fears meeting new people. Whenever it is time for recess, he goes off on his own, and does not play with the other children. Thus, he avoids having to talk to anyone new, and consequently avoids the anxiety associated with new encounters. This avoidance of anxiety is rewarding and reinforces his behavior. This means that he is likely to engage in this behavior (escaping from the problem) the next recess, or the next time he must meet new people. This relates to addiction, and specifically Internet addiction in the following way: Drugs, alcohol, sex, gambling, the Internet, and shopping offer many rewards. They offer love, excitement, physical, emotional, and material comfort, and the means to escape from reality. These can all be rewards. If an individual wants these rewards and learns that the Internet will allow him to escape, or receive love, or have a lot of fun, he will probably turn to the Internet the next time he feels these needs. This becomes reinforcing, and the cycle continues.

——————————————————————————————————————————————————————————————

Does Bad Behavior On the Internet Count as Infidelity?

The Internet is a portal into many different cultures, people, and experiences. The excitement and intrigue in meeting someone online whom you might otherwise never have met has led to many different types of dating sites. While these may have initially been created for single people, sometimes committed partners stray to these sites in search of entertainment. Presenting yourself as available, emotionally or physically, while in a committed relationship is false advertising. If you take the online interaction to the next level, such as cybersex, the question arises: Are you actually cheating?

A Few Good Rules of Thumb

Generally speaking, there are a few codes of conduct in a relationship that may clarify some morally questionable behavior, such as what constitutes cheating. It’s always best to avoid deliberately doing something behind your mate’s back. In general, if you’re feeling guilty about whatever it was that you did or are thinking of doing, it is probably a bad choice.

Is It the Act or the Intention?

This has been a common question connected to many of the discussions and philosophies on the subject of cheating. If someone thinks about being with someone else, is that technically cheating? Many people say no. But what if the person is engaging in sexual communication with another? Would phone sex, or cybersex, be crossing the line? There are many who say yes. Whether it’s through words or physical action, you are choosing to engage in a sexual act with another person outside of your relationship, and probably without your partner’s knowledge.

It’s Up to the Other Partner to Decide

In the end, it may come down to whether or not the other partner feels cheated on. Every relationship is unique, and only the two people involved can ultimately decide what does and doesn’t work in their partnership. Be honest with each other. If there’s any question as to whether or not one partner may be disrespecting the other, it’s up to the other partner to decide.

In our tech-friendly age, it has become increasingly easier to blur the lines of “appropriate communication” with others while maintaining a committed relationship. Texting and the Internet offer a buffer between the physical world and the ether world of technology, allowing some to rationalize away these behaviors with so much potential for infidelity. As a general rule, when looking to others outside of your relationship to fulfill a need, you should always take some time to evaluate your partnership before doing so. Perhaps there is someone out there better suited to you and your needs. If you choose to indulge in cybersex while in a committed relationship, you must respect your partner enough to give them a head’s up, and their say in the matter—even if it’s an ultimatum.

PREVENTION

Psychiatrist Ivan Goldberg, MD is the doctor who coined the term Internet Addiction Disorder. Goldberg and Young offer some ways people who believe they are addicted, or may be heading toward addiction, can help themselves. First, Goldberg says, people must recognize patterns of overuse. An awareness of the basic symptoms is important. A key signal to this would be time spent at the computer, but also time spent thinking about the Internet or in activities related to the Internet. The next step, according to Young, is to identify underlying problems. Similar to other kinds of addicts, Internet addicts should ask themselves what is causing them to want to escape from everyday life? The third step is to devise and act out a plan to work through the problem, rather than escape it. Escaping from the problem through the Internet, and effectively ignoring it, does not make the problem go away. It usually only intensifies the problem. Finally, the addict needs to take steps to resolve the addiction itself. Young advises a gradually decline in use, until finally a “sensible” amount of time is reached (Murray, 1996).

CONCLUSION

The Internet is not the enemy just because people become dependent on it. It has many important and necessary benefits. It is fast, ecologically sound, convenient, and informative. In many ways it makes our lives much simpler. In many ways it makes our lives more complex. The Internet provides an escape from reality and everyday problems just like alcohol or drugs. Some argue that the interaction with other people on the Internet fills a social void. People can assume new identities; others interact with that identity and the person may assume these on-line relationships are the same as the real thing. It becomes a problem when people become so engrossed and enmeshed in on-line activities, and their “other” lives to the point of neglecting their health, relationships, jobs, and other responsibilities. As with many of life’s pleasures, moderation is the key.

Regards

Hemant Khurana ( Happy)

NEW FUTURE CONCEPT PHONES !


conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

conceptphones

Visit Us @ www.MumbaiHangOut.Org

Life is Dukkha : Life Is Suffering ? Why ? What does it means ?


Life Is Suffering? What Does That Mean?

Why did Lord Buddha said this –

Life is Dukkha : Life Is Suffering ? Why ? What does it means ?

Dukkha: A Little Word With a Lot of Meaning

The word dukkha is significant in Buddhism because of its association with the First Noble Truth — that life is dukkha. To understand what the Buddha meant, it’s important to understand what dukkha means.

The word usually is translated into English as “suffering.” But it also means temporary, limited and imperfect. In the Buddhist sense, it refers to anything that is conditioned. Something that is conditioned is not absolute or independent of other things.

Thus, something beautiful and pleasant is dukkha, because it will end. For example, a new sports car is dukkha, because eventually it will be a rustbucket.

Anything formed of the Five Skandhas is dukkha. When the Buddha said that “life is dukkha,” he didn’t mean that life contains dukkha. He meant exactly that life is dukkha. Life is conditioned. Life is temporary and imperfect.

The Buddha didn’t speak English. This should be obvious, since the historical Buddha lived in India almost 26 centuries ago. Yet it’s a point lost on many people who get stuck on the definitions of English words used in translations.

For example, people want to argue with the first of the Four Noble Truths,

often translated as “life is suffering.” That sounds so negative.

But, remember, the Buddha didn’t speak English, so he didn’t use the English word, “suffering.” What he said, according to the earliest scriptures, is that life is dukkha.


“Dukkha” is Pali, a variation of Sanskrit, and it means a lot of things. For example, anything temporary is dukkha, including happiness. But some people can’t get past that English word “suffering” and want to disagree with the Buddha because of it.

I’ve noticed that some translators are chucking out “suffering” and replacing it with “dissatisfaction” or “stress.” I’m a bit dissatisfied with that approach, however. Sometimes translators bump into words that have no corresponding words meaning exactly the same thing in the other language. I believe “dukkha” is one of those words.

Understanding dukkha, however, is critical to understanding the Four Noble Truths. And the Four Noble Truths are the foundation of Buddhism.

Filling in the Blank

Because there is no single English word that neatly and tidily contains the same range of meaning and connotation as “dukkha,” I think it’s better not to translate it. Otherwise, you’ll waste time spinning your wheels over a word that doesn’t mean what the Buddha meant.

So, throw out “suffering,” “stress,” “dissatisfaction,” or whatever other English word is standing in for it, and go back to “dukkha.” Do this even if — especially if — you don’t understand what “dukkha” means. Think of it as an algebraic “X,” or a value you’re trying to discover.

Defining Dukkha

The Buddha taught there are three main categories of dukkha. These are:

  1. Suffering or pain (dukkha-dukkha)
  2. Impermanence or change (viparinama-dukkha)
  3. Conditioned states (samkhara-dukkha)

Let’s take these one at a time.

Suffering or Pain (Dukkha-dukkha). Ordinary suffering, as defined by the English word, is one form of dukkha. This includes physical, emotional and mental pain.

Impermanence or Change (Viparinama-dukkha). Anything that is not permanent, that is subject to change, is dukkha. Thus, happiness is dukkha, because it is not permanent. Great success, which fades with the passing of time, is dukkha. Even the purest state of bliss experienced in spiritual practice is dukkha.

This doesn’t mean that happiness, success and bliss are bad, or that it’s wrong to enjoy them. If you feel happy, then enjoy feeling happy. Just don’t cling to it.

Conditioned States (Samkhara-dukkha). To be conditioned is to be dependent on or affected by something else. According to the teaching of dependent origination, all phenomena are conditioned. Everything affects everything else. This is the most difficult part of the teachings on dukkha to understand, but it is critical to understanding Buddhism.

What Is the Self?

This takes us to the Buddha’s teachings on the self. According to the doctrine of anatman (or anatta) there is no “self” in the sense of a permanent, integral, autonomous being within an individual existence. What we think of as our self, our personality and ego, are temporary creations of the skandhas.

The skandhas, or “five aggregates,” or “five heaps,” are a combination of five properties or energies that make what we think of as an individual being. Theravada scholar Walpola Rahula said,

“What we call a ‘being’, or an ‘individual’, or ‘I’, is only a convenient name or a label given to the combination of these five groups. They are all impermanent, all constantly changing. ‘Whatever is impermanent is dukkha’ (Yad aniccam tam dukkham). This is the true meaning of the Buddha’s words: ‘In brief the Five Aggregates of Attachment are dukkha.’ They are not the same for two consecutive moments. Here A is not equal to A. They are in a flux of momentary arising and disappearing.”


Life Is Dukkha

Understanding the First Noble Truth is not easy. For most of us, it takes years of dedicated practice, especially to go beyond a conceptual understanding to a realization of the teaching. Yet people often glibly dismiss Buddhism as soon as they hear that word “suffering.”

That’s why I think it is useful to toss out English words like “suffering” and “stressful” and go back to “dukkha.” Let the meaning of dukkha unfold for you, without other words getting in the way.

The historical Buddha once summarized his own teachings this way: “Both formerly and now, it is only dukkha that I describe, and the cessation of dukkha.” Buddhism will be a muddle for anyone who doesn’t grasp the deeper meaning of dukkha.

Regards

Hemant Khurana ( Happy)

 

A real relationship has !!!



A real relationship,
Has fights.
Has trust.
Has faith.
Has tears.
……Has hurt.
Has sweet smiles.
Has genuine laughter.
Has snorts because of the laughter.
Has weird, stupid, unnecessary arguments.
Has patience.
Has communication.
Has secrets.
Has jealousy.
Nd most importantly it has
♥ Love ♥

 

When SomeoNe broke ur trust whom you Love unconditionally
& Wana hide it from EveryOne
Selfish TearX tell the whole Story. .

It Is Sad
When You Realize
You Are Not As Important
To Someone
As They Are To You! ?