Saturday, December 28, 2013
Do you know these facts?
1. Coca-Cola was originally green.
2. The most common name in the world is Mohammed.
3. The name of all the continents ends with the same letter that they start with.
4. The strongest muscle in the body is the tongue.
5. There are two credit cards for every person in the United States.
6. TYPEWRITER is the longest word that can be made using the letters only on one row of the keyboard.
7. Women blink nearly twice as much as men.
8. You can't kill yourself by holding your breath.
9. It is impossible to lick your elbow.
10. People say "Bless you" when you sneeze because when you sneeze, your heart stops for a millisecond.
11. It is physically impossible for pigs to look up into the sky.
12. The "sixth sick sheik's sixth sheep's sick" is said to be the toughest tongue twister in the English language.
13. If you sneeze too hard, you can fracture a rib. If you try to suppress a sneeze, you can rupture a blood vessel in your head or neck and die.
14. Each king in a deck of playing cards represents great king from history. Spades - King David Clubs - Alexander the Great, Hearts - Charlemagne Diamonds - Julius Caesar.
15. 111,111,111 x 111,111,111 = 12,345,678,987,654,321
16. If a statue of a person in the park on a horse has both front legs in the air, the person died in battle.
17. If the horse has one front leg in the air, the person died as a result of wounds received in battle.
18. If the horse has all four legs on the ground, the person died of natural causes.
19. What do bullet proof vests, fire escapes, windshield wipers and laser printers all have in common? They are all invented by women.
20. This is the only food that doesn't spoil. What is this? It is Honey.
21. A crocodile cannot stick its tongue out.
22. A snail can sleep for three years.
23. All polar bears are left handed.
24. American Airlines saved $40,000 in 1987 by eliminating one olive from each salad served in first-class.
25. Butterflies taste with their feet.
26. Elephants are the only animals that can't jump.
27. In the last 4000 years, no new animals have been domesticated.
28. On average, people fear spiders more than they do death.
29. Shakespeare invented the word 'assassination' and 'bump'.
30. Stewardesses are the longest word typed with only the left hand.
31. The ant always falls over on its right side when intoxicated.
32. The electric chair was invented by a dentist.
33. The human heart creates enough pressure when it pumps out to the body to squirt blood 30 feet.
34. Rats multiply so quickly that in 18 months, two rats could have over million descendants.
35. Wearing headphones for just an hour will increase the bacteria in your ear by 700 times.
36. The cigarette lighter was invented before the match.
37. Most lipstick contains fish scales.
38. Like fingerprints, everyone's tongue print is different
39. There is a Butterfly in Brazil which has the color of chocolates and also smells like chocolate.
40. Giraffee can clean there ears with their tongue.
41. Both Humans and Giraffee have the same number of bones in the neck.
42. And finally 99% of people who read this would try to lick their elbow now..
How to Get Rid of Spam
Spam
has become ubiquitous - one of the facts of life, like taxes. Until
strong anti-spam laws are passed and actually enforced, spam
proliferation will continue because it's proven to reach a mass
audience. If it didn't work, spammers wouldn't waste their time.
Most people, however, see spam as the scourge of e-mail and look for ways to stop it from infecting their e-mail boxes.
There are several ways to block spam from your e-mail inbox. They say prevention is the best medicine, so avoid giving out your e-mail address to unfamiliar or unknown recipients. This has become very difficult to do, however. Spammers can use software programs that troll the Internet looking for e-mail addresses, much like throwing a net in the ocean and seeing what gets caught in it. Nowadays it's almost impossible to shop online without providing a valid e-mail address. Offline stores are even asking for e-mail addresses in exchange for discounts or free merchandise. Realize that what they are doing is potentially opening the door for a flood of unsolicited e-mails. These organizations will most likely turn around and sell their list to someone else looking for valid e-mails. In these cases, it might be wise to have more than one e-mail address, one for friends, family and colleagues and another for unfamiliar sources. There are many free e-mail services in cyberspace to choose from.
However, also know that even trustworthy sources may be unwittingly shelling out your e-mail address. Ever receive an e-mail greeting card? The sender has given your e-mail to an organization that may very well be compiling e-mail lists to sell to spammers.
A second way to stop spam is to use your e-mail application's filtering features. Most e-mail applications allow you to block specific messages. When an offending e-mail comes in, set the filter to block further incoming mails from that sender.
A more aggressive approach to ridding unwanted e-mail is to report the e-mailer to the spammer's ISP. This is not always an easy task. First you must determine the spam's origins. Many of the bigger and more commercial ISPs forbid spammers from using their services and, once discovered, will actively ban the offending parties from using their services. But there are plenty of smaller ones that do not. To find the spam's origins, instruct your e-mail program to display all of the e-mail's header information. View the "Received" lines, and working from top to bottom you can often pinpoint the origin of spam. Spammers don't typically just send e-mails from their ISP to yours; that'd be too easy and apparent. Instead, they channel the e-mails through one or more ISPs in order to obfuscate the origin, but each computer that handles the e-mail will attach a "Received" line to the header. There are numerous Internet resources available for help in tracking down the source of spam.
Don't be fooled by phrases such as "to be removed from this list, click here." Spammers use these types of catch phrases to entice users to respond to the e-mails. The spammers may or may not remove your e-mail from their list. Either way you have told the spammer that your e-mail address is valid and reaches a real person. They know this because you responded and asked them to remove you from the list. This can actually be more valuable to the spammers because they can now sell your address to another spammer with the assurance that the e-mail address is legitimate. So you may have been removed from one list, but there's a good chance that you will end up on another.
Yet another way to deal with spam is to
Most people, however, see spam as the scourge of e-mail and look for ways to stop it from infecting their e-mail boxes.
There are several ways to block spam from your e-mail inbox. They say prevention is the best medicine, so avoid giving out your e-mail address to unfamiliar or unknown recipients. This has become very difficult to do, however. Spammers can use software programs that troll the Internet looking for e-mail addresses, much like throwing a net in the ocean and seeing what gets caught in it. Nowadays it's almost impossible to shop online without providing a valid e-mail address. Offline stores are even asking for e-mail addresses in exchange for discounts or free merchandise. Realize that what they are doing is potentially opening the door for a flood of unsolicited e-mails. These organizations will most likely turn around and sell their list to someone else looking for valid e-mails. In these cases, it might be wise to have more than one e-mail address, one for friends, family and colleagues and another for unfamiliar sources. There are many free e-mail services in cyberspace to choose from.
However, also know that even trustworthy sources may be unwittingly shelling out your e-mail address. Ever receive an e-mail greeting card? The sender has given your e-mail to an organization that may very well be compiling e-mail lists to sell to spammers.
A second way to stop spam is to use your e-mail application's filtering features. Most e-mail applications allow you to block specific messages. When an offending e-mail comes in, set the filter to block further incoming mails from that sender.
A more aggressive approach to ridding unwanted e-mail is to report the e-mailer to the spammer's ISP. This is not always an easy task. First you must determine the spam's origins. Many of the bigger and more commercial ISPs forbid spammers from using their services and, once discovered, will actively ban the offending parties from using their services. But there are plenty of smaller ones that do not. To find the spam's origins, instruct your e-mail program to display all of the e-mail's header information. View the "Received" lines, and working from top to bottom you can often pinpoint the origin of spam. Spammers don't typically just send e-mails from their ISP to yours; that'd be too easy and apparent. Instead, they channel the e-mails through one or more ISPs in order to obfuscate the origin, but each computer that handles the e-mail will attach a "Received" line to the header. There are numerous Internet resources available for help in tracking down the source of spam.
Don't be fooled by phrases such as "to be removed from this list, click here." Spammers use these types of catch phrases to entice users to respond to the e-mails. The spammers may or may not remove your e-mail from their list. Either way you have told the spammer that your e-mail address is valid and reaches a real person. They know this because you responded and asked them to remove you from the list. This can actually be more valuable to the spammers because they can now sell your address to another spammer with the assurance that the e-mail address is legitimate. So you may have been removed from one list, but there's a good chance that you will end up on another.
Yet another way to deal with spam is to
How Do Web Search Engines Work
Search engines are the key to finding specific information on the vast expanse of the World Wide Web.
Without sophisticated search engines, it would be virtually impossible
to locate anything on the Web without knowing a specific URL. But do you know how search engines work? And do you know what makes some search engines more effective than others?
When people use the term search engine in relation to the Web, they are usually referring to the actual search forms that searches through databases of HTML documents, initially gathered by a robot.
There are basically three types of search engines: Those that are powered by robots (called crawlers; ants or spiders) and those that are powered by human submissions; and those that are a hybrid of the two.
Crawler-based search engines are those that use automated software agents (called crawlers) that visit a Web site, read the information on the actual site, read the site's meta tags and also follow the links that the site connects to performing indexing on all linked Web sites as well. The crawler returns all that information back to a central depository, where the data is indexed. The crawler will periodically return to the sites to check for any information that has changed. The frequency with which this happens is determined by the administrators of the search engine.
Human-powered search engines rely on humans to submit information that is subsequently indexed and catalogued. Only information that is submitted is put into the index.
In both cases, when you query a search engine to locate information, you're actually searching through the index that the search engine has created —you are not actually searching the Web. These indices are giant databases of information that is collected and stored and subsequently searched. This explains why sometimes a search on a commercial search engine, such as Yahoo! or Google, will return results that are, in fact, dead links. Since the search results are based on the index, if the index hasn't been updated since a Web page became invalid the search engine treats the page as still an active link even though it no longer is. It will remain that way until the index is updated.
So why will the same search on different search engines produce different results? Part of the answer to that question is because not all indices are going to be exactly the same. It depends on what the spiders find or what the humans submitted. But more important, not every search engine uses the same algorithm to search through the indices. The algorithm is what the search engines use to determine the relevance of the information in the index to what the user is searching for.
One of the elements that a search engine algorithm scans for is the frequency and location of keywords on a Web page. Those with higher frequency are typically considered more relevant. But search engine technology is becoming sophisticated in its attempt to discourage what is known as keyword stuffing, or spamdexing.
Another common element that algorithms analyze is the way that pages link to other pages in the Web. By analyzing how pages link to each other, an engine can both determine what a page is about (if the keywords of the linked pages are similar to the keywords on the original page) and whether that page is considered "important" and deserving of a boost in ranking. Just as the technology is becoming increasingly sophisticated to ignore keyword stuffing, it is also becoming more savvy to Web masters who build artificial links into their sites in order to build an artificial ranking.
When people use the term search engine in relation to the Web, they are usually referring to the actual search forms that searches through databases of HTML documents, initially gathered by a robot.
There are basically three types of search engines: Those that are powered by robots (called crawlers; ants or spiders) and those that are powered by human submissions; and those that are a hybrid of the two.
Crawler-based search engines are those that use automated software agents (called crawlers) that visit a Web site, read the information on the actual site, read the site's meta tags and also follow the links that the site connects to performing indexing on all linked Web sites as well. The crawler returns all that information back to a central depository, where the data is indexed. The crawler will periodically return to the sites to check for any information that has changed. The frequency with which this happens is determined by the administrators of the search engine.
Human-powered search engines rely on humans to submit information that is subsequently indexed and catalogued. Only information that is submitted is put into the index.
In both cases, when you query a search engine to locate information, you're actually searching through the index that the search engine has created —you are not actually searching the Web. These indices are giant databases of information that is collected and stored and subsequently searched. This explains why sometimes a search on a commercial search engine, such as Yahoo! or Google, will return results that are, in fact, dead links. Since the search results are based on the index, if the index hasn't been updated since a Web page became invalid the search engine treats the page as still an active link even though it no longer is. It will remain that way until the index is updated.
So why will the same search on different search engines produce different results? Part of the answer to that question is because not all indices are going to be exactly the same. It depends on what the spiders find or what the humans submitted. But more important, not every search engine uses the same algorithm to search through the indices. The algorithm is what the search engines use to determine the relevance of the information in the index to what the user is searching for.
One of the elements that a search engine algorithm scans for is the frequency and location of keywords on a Web page. Those with higher frequency are typically considered more relevant. But search engine technology is becoming sophisticated in its attempt to discourage what is known as keyword stuffing, or spamdexing.
Another common element that algorithms analyze is the way that pages link to other pages in the Web. By analyzing how pages link to each other, an engine can both determine what a page is about (if the keywords of the linked pages are similar to the keywords on the original page) and whether that page is considered "important" and deserving of a boost in ranking. Just as the technology is becoming increasingly sophisticated to ignore keyword stuffing, it is also becoming more savvy to Web masters who build artificial links into their sites in order to build an artificial ranking.
10 Tips for Creating Secure Passwords
Most people have multiple passwords
for e-mail accounts, online banking, discussion forums, site
memberships, eBay, PayPal and so on. With so many passwords to remember,
it can be difficult to remember them, and people may think it is easier
to simply use the same password on different sites, or to use passwords
that are easy to remember such their date-of-birth or a child's name.
Unfortunately, these types of passwords can easily be hacked.
The problem is that while you might be able to remember these passwords, which is why so many people use basic passwords and phrases, they are not at all secure and hackers will be able to easily crack them to obtain your account information.
The following tips will help you to create strong, secure and hacker-proof passwords and phrases.
For example "My son Ryan is 12 years old" as a password could be msRi12yo. You can make this more secure my replacing some characters with uppercase letters and adding numbers and punctuation, like this: msRi12Y0!. These types of passwords are often easier to remember.
The problem is that while you might be able to remember these passwords, which is why so many people use basic passwords and phrases, they are not at all secure and hackers will be able to easily crack them to obtain your account information.
The following tips will help you to create strong, secure and hacker-proof passwords and phrases.
Tips for Creating a Strong Password
-
Use a strong password.
A strong password contains a combination of six or more uppercase and
lowercase letters, plus punctuation and numbers. Using all four types
of characters works the best. For example instead of using welcome use W3Lc0mE^9.
-
Passwords should be eight or more characters in length. The longer the password, the harder it is to crack.
-
Never use the same password twice. If, for example, your eBay account
were hacked and your password obtained, the hacker would have instant
access to your PayPal account if you use the same password.
-
Do not use common information in your password, such as birthdates,
your phone number, or other information directly related to you.
-
Passwords comprised of characters rather than proper words are more secure.
-
Refrain from writing passwords down and do not login to accounts via a
public computer (e.g., at the library or Internet cafe) and save the
password details in the browser.
-
Never click an e-mail link and log into a secure site from an e-mail.
Even if the e-mail looks legitimate, always type the URL into a browser
yourself, then log in to your account. This will help you avoid phishing attacks.
-
Do not allow applications to store your passwords online, and
remember to clear your browser cache, history and clear passwords
frequently.
-
Remember to change your passwords frequently. The more important the
account, the more frequently the password should be changed.
-
Never communicate a password to anyone, especially via e-mail or instant messenger. Passwords should always be kept private.
Create a Strong Password from a Pass Phrase
Some systems will allow you to use a pass phrase, that is a phrase with spaces. These are the most secure types of log-ins. If the system does not support phrases, then you can create a secure password from a phrase.For example "My son Ryan is 12 years old" as a password could be msRi12yo. You can make this more secure my replacing some characters with uppercase letters and adding numbers and punctuation, like this: msRi12Y0!. These types of passwords are often easier to remember.
Check Your Password Strength
There are many online services that can help you determine how secure your password really is. Microsoft's Password Checker lets you enter in a password and the service will help you to gauge the strength of your password. Microsoft also recommends that a strong password should be 14 characters or longer, (eight characters or longer at a minimum), and it should include a combination of uppercase and lowercase letters, numbers, and symbols.World’s first Android phone
Phones have come a long way since Innocenzo
Manzetti played around with the idea of a ”speaking telegraph” in 1844.
Development of the landline telephone came in leaps and bounds but it is
the mobile phone that truly captured a global audience.
The first mobile phones were produced by Bell System for use in cars only, introduced in 1946 on their Mobile Telephone Service in St. Louis, Missouri. The first call on a handheld mobile phone was made on April, 3 1973 by Motorola’s Martin Cooper to his rival, Joel S. Engel of Bell Labs. Nicknamed “the brick” the first mobile phones weighed 2 lb (0,9kg) and cost $3,995.
As with most inventions, it takes a while (and a lot of teething problems) before a product reaches an acceptable cost factor for both the producer and the consumer. Early mobile networks were patchy and phones were expensive, bulky and less than attractive.
When the 1G network launched in 1983, the phones were still too big for comfort and suffered from short battery life. By the time 2G was introduced, in 1991, the phones were better and the first smartphones were introduced. But it was only after 2001, when 3G cellular technology was launched, that the mobile phone market really took off. Networks were faster and phones were smaller and more affordable. The entry-level Nokia 1100, launched in 2003, was snapped up 1 million times a week to eventually become the world’s most popular cell phone with over 200 million units sold. By 2011, Apple had sold more than 100 million iPhone smartphones.
Introducing Android – a smart move
Android, Inc. was founded in October 2003 by Andy Rubin, Rich Miner, Nick Sears and Chris White. Google bought it in 2005 and the Linux-based Android operating system was unveiled in 2007. The rest – as the Google history itself – is a remarkable piece of history. People loved Android.
By 2012, Android enjoyed 1.5 million activations per day. . There are almost a billion Android apps available. Some 25 billion apps have been downloaded from the Android app site, Google Play.
World’s first Android phone
By 2013, mobile phones have replaced watches and cameras as the primary time tellers and for taking photographs and videos.
Many users have more than one phone or mobile device, resulting in more than 6 billion mobile subscriptions worldwide, almost half of these being smartphone subscriptions. Android is found on 75% of those smartphones in use.
But do you remember first phone to run on Android?
The world’s first Android phone was the HTC Dream – it came to the market in October 2008 as the T-Mobile G1 in the USA and, when signing a two-year service agreement, sold for $179.
The first mobile phones were produced by Bell System for use in cars only, introduced in 1946 on their Mobile Telephone Service in St. Louis, Missouri. The first call on a handheld mobile phone was made on April, 3 1973 by Motorola’s Martin Cooper to his rival, Joel S. Engel of Bell Labs. Nicknamed “the brick” the first mobile phones weighed 2 lb (0,9kg) and cost $3,995.
As with most inventions, it takes a while (and a lot of teething problems) before a product reaches an acceptable cost factor for both the producer and the consumer. Early mobile networks were patchy and phones were expensive, bulky and less than attractive.
When the 1G network launched in 1983, the phones were still too big for comfort and suffered from short battery life. By the time 2G was introduced, in 1991, the phones were better and the first smartphones were introduced. But it was only after 2001, when 3G cellular technology was launched, that the mobile phone market really took off. Networks were faster and phones were smaller and more affordable. The entry-level Nokia 1100, launched in 2003, was snapped up 1 million times a week to eventually become the world’s most popular cell phone with over 200 million units sold. By 2011, Apple had sold more than 100 million iPhone smartphones.
Introducing Android – a smart move
Android, Inc. was founded in October 2003 by Andy Rubin, Rich Miner, Nick Sears and Chris White. Google bought it in 2005 and the Linux-based Android operating system was unveiled in 2007. The rest – as the Google history itself – is a remarkable piece of history. People loved Android.
By 2012, Android enjoyed 1.5 million activations per day. . There are almost a billion Android apps available. Some 25 billion apps have been downloaded from the Android app site, Google Play.
World’s first Android phone
Many users have more than one phone or mobile device, resulting in more than 6 billion mobile subscriptions worldwide, almost half of these being smartphone subscriptions. Android is found on 75% of those smartphones in use.
But do you remember first phone to run on Android?
The world’s first Android phone was the HTC Dream – it came to the market in October 2008 as the T-Mobile G1 in the USA and, when signing a two-year service agreement, sold for $179.
Who drinks the most wine?

Nearly all wine is made from cultivars of only one species of grape, the Vitis vinifera grape. From this species about 4,000 varieties of grape have been developed but only a few are used for vinification (winemaking).
Vitis vinifera is used because of its high sugar content which allows, after fermentation, an alcohol content of 10% or slightly higher. Less alcohol makes the wine unstable and prone to bacterial spoilage.
Vinifera is New Latin from the Latin vinifer, wine-producing, which is from the Latin word for wine, vinum. In plain English, vitis vinifera means “common grape vine.”
Three quarters of all commercial grape production is used for wine; about a quarter is used for table (or dessert) grapes and a small percentage is used to make non-alcoholic grape juice and raisins.
Who drinks the most wine?
China produces the most grapes in the world but Spain, France and Italy produce the most wine. According to the International Organisation of Vine and Wine global wine consumption in 2012 was 6.4 billion gallons (243 million hectolitres), with the top ten consumer countries being -
France: 30.2 Mhl
USA: 29 Mhl
Italy: 22.6 Mhl
Germany: 20 Mhl
China: 17.8 Mhl
United Kingdom: 12.5 Mhl
Russia: 10.4 Mhl
Argentina: 10 Mhl
Spain: 9.3 Mhl
Australia: 5.4 Mhl
The most ardent wine drinkers hail from Luxembourg, at 13.2 gallons (50 litres) per capita per year. The French consume 12.7 gallons (48 litres) and the Portuguese 11.4 gallons (43 litres) per year while United States citizens seem to prefer beer, drinking 20.6 gallons (78 litres) of beer and only 2.37 gallons (9 litres) of wine per capita per year. In comparison, the French drink nearly four times more wine than beer, as do the Italians. The Portuguese drink twice as much wine as beer. (Of course, considering the size of the population, the total volume of wine sales in United States equals that of France.)
Subscribe to:
Posts (Atom)
