samedi 10 août 2019

A Quick Look On 2006 Hybrid Cars

A Quick Look On 2006 Hybrid Cars


Demand for hybrid cars has sharply grown over the past three years, as pump prices continue to surge and eating a considerable part of the household budget.

Hybrid cars may not be the complete solution to rising oil prices but they are very economical, as they rely more on electricity instead of gas for power. For 2006, business conditions have remained turbulent. The current crisis in Israel and Lebanon will likely have an adverse effect on oil markets given that they are very near the world’s top oil producers.

Other issues that will keep gas prices high include China’s demand, terrorist attacks on refineries and volatility in stock markets. Is 2006 finally the right time to jump on the bandwagon for hybrid cars? For 2006, the top Japanese car makers Honda and Toyota have released an impressive line of hybrid cars that have been updated to conform with the demands of the daily driver.

The hybrid cars for 2006 promises more power behind the steering wheel but gas consumption will be comparable to a child guzzling a bad-tasting cough syrup.

Honda 2006 Accord Hybrid


The new Accord Hybrid from Honda is 4-door sedan ideal for families with 2-3 kids. This car comes in two trims and 5-speed automatic transmission. Overdrive option is standard equipment. For those that enjoy long and leisurely rides, Honda is offering a Accord Hybrid equipped with a Navigation system.

Both trims are powered by a standard V6, 3.0-liter, 253-horsepower engine. The Accord Hybrid is capable of 25-mpg in city driving and 34-mpg in highway driving.

The Honda Accord Hybrid is well suited for the highways and boasts of excellent responsiveness and outstanding acceleration.

Initial impressions


The 2006 Honda Accord Hybrid has been criticized for its disappointing fuel economy but lauded for its outstanding performance especially in fast-driving. The car battery used in the car is relatively low in power and supposed does not effectively maximize the hybrid technology unlike rival models.

Some users have also been critical over the “rough” automatic transmission shifting between gears and poor flawed synchronization between engine and battery.

Honda 2006 Civic Hybrid

The new Honda Civic Hybrid is a 4-door sedan ideal for small families. The vehicle comes in two trims namely the the CVT AT-PZEV w/ Navigation System and the CVT AT-PZEV

A standard I4 1.3-liter 110-horsepower hybrid engine powers the 2006 Civic Hybrid car. This model has the capability to run 49-mpg in city driving and 51-mpg in highway drives.

Initial impressions


The 2006 Civic Hybrid car is a top-notch performer especially for who are looking for the perfect driving experience. The interior has been lauded for its attractive lay-out and design.  Gas consumption is exceptional, as delivers near or slightly above its specifications.

However, the 2006 Civic Hybrid has been criticized more on its ambitious despite. The digital speedometer is a nice new touch but can be distracting especially during night drives. The Civic Hybrid only comes with rear drum brakes, which is disappointing considering that the Civic has been named car of the year.

The hand brake is also placed on odd location and will be discomforting for those with large thighs. The 2006 Civic Hybrid is a “driver’s car” and will perform best when used in the highways.

2006 Toyota Prius


Updated for 2006, the new Toyota Prius is a 4-door sedan, ideal for small families. This hybrid car only comes in one trim has a 4-Door Liftback.

The 2006 Toyota Prius is powered with by a standard I4, 1.5-liter, hybrid engine running 110-horsepower. In city driving, the Prius can achieve 60-mpg and 51-mpg in highway driving.

Initial impressions


The Prius features a spacious interior that can easily fit small families. Ideal for pedestrian drivers but those conscious with performance should stay away, as acceleration is slow. In addition, consumers have also been disappointed over the inability of the car to reach its advertised consumption and high price. For those tht want to save the world the Prius is great but look the other way if you want to save money.



vendredi 9 août 2019

Caught in the Middle: How the Internet Can Improve and Destroy Lives

Caught in the Middle: How the Internet Can Improve and Destroy Lives


Our access to information has never been as convenient. In ancient times, only young men were allowed to go to school and learn about philosophers and literature. When the ultra-conservative Middle Ages came along, knowledge was left in the hands of the religious, and wouldn't see a renewal until the Renaissance. As the centuries passed, people were granted greater access to information, until our modern day scholars decided to make things easier for everyone.

From libraries stocking books in order, we moved to databases that stored information in a way that it could be stored, searched through, and retrieved. These databases and the way they were managed were brought online, where they came to the Information Superhighway. The Internet has since revolutionized the way that knowledge is accessed, and has given people from all over the world a chance to learn more and do more.

People are also now, more than ever, eager to share their expertise on specialized subjects, and help out those in need through the ease of online communication. What are some of the advantages offered by the Internet?

Some sites offer knowledge and information for free or a minimal fee. The online free encyclopedia Wikipedia, for instance, has allowed users to post their knowledge on certain topics, and has given users the chance to access this knowledge as they would a real encyclopedia. There are also many other sites that offer information for free, such as science sites offering modules that science teachers can use when performing experiments, or clothing sites offering online courses in fashion design.

Not all libraries carry the books that we need, so online merchants such as Amazon and Barnes and Noble sell books, allowing more people all over the world to buy them. With the advent of the electronic book, or e-book, people can now read books on their computers without having to pick a real heavy book up.

Knowledge is offered in different media, depending on the learning abilities of those who need information. If a person is more visual, he or she can choose to watch a video or read an online book or pamphlet on the information he or she needs. If a person learns better through listening, however, he or she can choose to listen to audio files. This flexibility and versatility of the Internet has allowed more people to learn in the format that they want and are most comfortable with.

The beneficiaries of this technology are undoubtedly our children. They will have an easier time doing their research for school, since information is easy to retrieve online. They can buy the books they need if their local libraries don't have them. They can learn through all means possible.

These benefits, however, come with their own risks, and we as parents are caught in the middle of a war between free speech and censorship. While there are thousands of students who benefit from the knowledge offered by the Internet, there are also thousands more who become victims of predators, such as credit card thieves or worse, pedophiles. While there are thousands of students in developing countries who find their minds opened constantly by their exposure to new mindsets and cultures, there are thousands more who find themselves duped by once trustworthy people online.

If you have a child who uses the Internet constantly, then you may want to take note of these disadvantages to better monitor your child’s Internet use.

While information is easier to retrieve online, it can also encourage your child to simply cut and paste information, with little or no effort devoted to analysis. This can make your child lazy, and may even lead to your child being accused of plagiarism by perceptive teachers. 

Not all information online is true, and not all information online is edited. This has led to many schools banning the use of online sources and Wikipedia as references in important reports and assignments.

Many online help forums are actually a venue for child predators to stalk new victims. Because children and teenagers often seek affirmation and help from people outside their family circle, they are more susceptible to such attacks. 

Pornography is rife online, and some multimedia sites may actually contain pornographic or disturbing images or footage. While your child learns from useful multimedia files, he or she may also be traumatized or wrongly indoctrinated if he or she accesses the wrong ones.

The Internet has its advantages and disadvantages, and we as parents have the right to be alarmed and vigilant. The wealth of information online has also allowed wrongdoing to proliferate, and we can often find ourselves caught in the middle. All that we can do is protect our children, and make sure that they have access to real books and research materials, so that they don't have to rely completely on online sources for their work.

Actual Case Studies of Kids on the Internet

Actual Case Studies of Kids on the Internet



As people are quickly becoming more and more dependent on technology for their everyday needs and desires, particularly the use of computers, business developers in the software industry have constantly tried to look for ways to take advantage of the trend, for their own profits and for the growth of the information technology industry as a whole. Some of these include sites and software that are geared towards the younger generations, like public chat rooms and social networking sites. With the number of hits these receive daily, it is no question that these are things that children and adolescents of the present look for.

While social networking sites and chat rooms promote socializing with one another (even if it is mostly text), there are dangers that are associated with such. Some of these include exploitation, extortion, pornography, sexual advances, etc., just to name a few. Perpetrators are aware most of the time that they are dealing with children and young adults, which is why they have more confidence to do the things they do – children are far easier to trick than adults.

Actual cases of these have happened, many of them in the United States. Just recently, a female teenager in Texas sued the site MySpace, a social networking site wherein a person can meet anyone from anywhere in the world. A MySpace page can be filled with pictures, videos, and other multimedia. A fake profile of a person can be made up easily, thanks to the power of computers and technology.

The lawsuit stemmed from the fact that this female teenager was sexually assaulted by an older teenager whom she met on MySpace. This man apparently put up a fake profile in MySpace, complete with fake pictures and fake data. Through this MySpace profile, they met through the Internet; he got a hold of her phone number, met each other personally and from there, the assault took place.

Incidentally, the girl’s lawsuit didn't win. In order to prevent such incidents from occurring, one should exercise extreme caution, especially in chat rooms and social networking sites such as MySpace. The case study proves that the danger on the Internet is ever present. However, that shouldn't deter children and adults from using the Internet freely – it is just important to exercise caution when doing so, something that this young girl apparently failed to do.

In addition, the girl herself lied about her age as well, claiming that she was an 18 year old when at that time, she was actually just 13. MySpace provides the privilege of using their site only for those 14 and above. Clearly, these actions show that the young girl didn't exercise caution and was exposing herself to danger by lying about her age and flirting with other male members older than her.

Other cases also involved instant messaging chat rooms and social networking sites, such as those when perpetrators tried to steal passwords and other valuable account information from MySpace users by sending them a fake HTML code (MySpace users can insert their own HTML code into their own profiles, for the matter of customization). However, since some users are children, they are unknowingly exposing their accounts which could possibly expose their location, phone numbers, and other valuable information that should be kept private. Most of the children don’t understand HTML code and they don’t know if the effect can be positive or negative.

There are many more cases in wherein children are taken advantage of through the Internet via chat rooms or social sites. As parents, it is your duty to protect and preserve your privacy from strangers, who could use your children to get what they want. Protecting them can sometimes mean restricting their Internet time, no matter how unpopular or how unconventional that seems nowadays.

With the case of the young girl, it can be seen that parents didn't exercise much caution as well because of the fact that she was able to get by pretending to be someone she was not. The chances of the act happening the way it did could have been lessened had the parents been more careful, as well as the girl herself.



Free Firewalls and Children Protection Programs

Free Firewalls and Children Protection Programs


The internet is an established part of our world, and modern education has included it in the education of our children. Unlike past generations, where the internet was as much a source of games and amusement as a tool for adults, these days our children are immersed in it. Given that it is a part of their daily lives at school, it naturally follows that we can't keep them from their computers at home so they can do research and homework on it. With that in mind, we have to keep a close watch on the things our kids do online so that they don't unwittingly become security risks in this day and age of computer-related crimes.

There are two types of programs that will help our home security over the internet immensely; the first is firewalls, which keep out viruses and spyware that our kids may accidentally touch on in the course of conducting their research. The second is child safety software, which are programs especially geared towards helping parents monitor and control their children's online time. Here are the top three free picks for firewalls and child safety programs you can download.

Firewalls


1) Comodo Firewall - one of the top picks among both free and purchaseable firewalls, comodo scans all incoming internet traffic before actually allowing it to touch any other part of your PC. It's main feature is a program behavior analyzer that detects if programs have any unusual activity that may signal a virus or worm in the program. For inert viruses it also has a trojan protocol detector that is constantly updated online.

2) Kiero Personal Firewall - this is a software that has been reported by users to offer them minimal headache in operation and use. While it's protections aren't as sturdy as some other firewall programs, it offers reasonable defense nontheless. It's main strength is it's ease of use, so that you can teach your children to operate it, giving them the benefits of learning internet security early in life.

3) Zone Alarm - this is rated as a cross between comodo and kiero. It offers more security options than Kiero and is easier to use than comodo. The most balanced choice between ease of use and security. Depending on your preferences, it can also be taught to your children, but it's advanced settings may actually cause them to mess up your firewall, so it might be a good idea to keep the operation of this software to yourself.

Child Security


1) EZ off - this program is essentially a time management software for your computer. It will automatically turn the PC on and off at scheduled intervals, allowing you to control how much time your children spend on the net. This is best used to keep your kids from playing video games past their bedtime. The timer also features a calendar and scheduler, so that you can even keep the PC running for set intervals when you're not at home.

2) Windows Supervisor - this is an office program that can also be used at home. It's main purpose is to monitor all logs made on the computer, so that you will be able to tell not only WHEN your children access the internet, you'll be able to tell what activity was running when they were there, including what sites they visited, files they up or downloaded, programs executed, and even keyboard typing done.

3) StopGame - for those who want to let their children enjoy the internet from time to time, a less-strict version of EZ off is similar to a firewall in that it lets certain, specified programs and web sites be accessed at certain times of day by the computer. If your kids are, for example, doing homework from 6pm to 8pm and you let them have game time from 8pm to 10pm, you can set this program to allow them access to certain games (that you specify) from the 8 to 10 slot. Also, taking a cue from Windows Supervisor, it will be able to monitor past activity as far as the allowed game programs listed are concerned, as well as attempts made by your kids to access other sites.

All About Online Abduction

All About Online Abduction


The fact that the Internet is rapidly expanding backs the notion that more people are regularly using the online medium. Thus, everyday, there are tons of reports over cyber-crimes committed by online predators worldwide.

Because the Internet is an open medium for people from all walks of life, you can't always prevent your kids from getting there. When logged on the Internet, your child can be exposed to a lot of dangers. There are many predators out there that are ready to feed on innocent children within the Internet.

The Internet is a place to meet people and expand a person's social circle. However, be reminded, and also remind your kids, that not all people you may meet online are 'friend material'. Like in actual life applications, you should never easily provide trust to anybody.

Online abduction is among the most popular cyber-crimes committed by scrupulous individuals over the Internet. It isn't surprising that there have already been reports of kids getting kidnapped by people they meet over the Internet. Abductors can't abduct your child online, but there are tactics that could help them do the dirty intentions.

Because kids are just starting out in life, they have to learn things and lessons in life the hard way. It is during the childhood and puberty years of kids that you should be able to extend your protection and guidance to your kids.

Some worst case scenarios of online abduction


To learn more about how online abductions are widely committed, it would be helpful if you would be informed about how the predators do their thing. Take note that online abduction strategies are alike in many ways, so by learning the usual worst case scenarios, you can understand the process better and prepare to prevent them from occurring.

Worst case scenario 1


Your child is logged online. Because almost all his friends are raving about friendster.com, MySpace.com and several other social networking sites, it is natural that he keeps his own account. Through the site, your child can interact with his friends through the in-site interactive features like private chats, emails, bulletins and posts.

Because social networking sites are social function systems, there are features that allow people to surf the entire system to meet new people. This is where the danger sets in. There might be individuals who would befriend your child. The individual may disguise themselves as another kid the same age as your child.

The process doesn't happen over night. Cyber criminals are so patient that they are willing to spend days, weeks, months or even years establishing the friendship with your child. When your child is at ease with the person, that is when the cyber criminal attacks.

The cyber criminal can ask your kid for an eyeball, wherein they would be meeting each other personally. Most online abduction cases ever reported are committed this way. When the kid is out to take an eyeball with his friend, it turns out the meeting is a set up and the disguising friend will then abduct the kid.

Worst case scenario 2


In chat rooms and interactive channels, your kid might meet people who are out there to socialize so they could victimize innocent people. The cyber criminals might lure your kid into doing something that could compromise his safety, as well as your safety and the safety of all on your household.

The cyber criminal can ask your kid about addresses, credit card numbers and personal identification numbers on bank accounts. Since your kid is unsuspecting and is treating his online friend with so much trust, he would be willing to disclose the information asked by his friend.

When your kid divulges your address, the cyber criminal then will be able to track and monitor your kid and abduct him when there is a chance. The abductor might kidnap your kid when nobody's home except your child, or during the middle of the night when everybody is asleep.

What to do when your kid is abducted


The best thing to do when your child has been victimized by online abduction is to report the matter to the authorities. The police will extend their help in helping you find your missing child. Also retrieve the information on the Internet about your child's friends, who can be suspected of committing the cyber crime.

Keep your cool and do not panic. Experts are advising you not to give in to the demands of the abductor. If you do, you might be contributing to the continuity of such crimes. If you don't, give your full cooperation to the authorities.

Online abduction can be prevented if you educate your child about the dangers of meeting strangers on line. Do your thing now.


History of Computer Viruses since 1989-1999

History of Computer Viruses since 1989-1999


Robert Morris’s Internet Worm of 1988 was the biggest news in virus history for several years.  Until 1992, most virus news was much quieter.

In 1989, for example, Ghostball was released.  This was the first virus able to attack different kinds of targets.  Before Ghostball, viruses were classified by their attack, like “file infector” or “boot sector virus.”  Ghostball was the first Multipartite virus, because it could follow several attack patterns.

In 1990, a programmer named Mark Washburn demonstrated a Polymorphic virus.called 1260.  This virus could actually change the structure of it’s own code—meaning, every time it infected a new system, it looked different while doing the same thing.  In effect, this kind of virus “hides” from anti-virus software by wearing disguises.

Michelangelo was the first virus to achieve stardom.  It was discovered in 1991, and was predicted to cause incredible amounts of damage when it reached it’s trigger date, March 6th, 1992 (March 6th is Michelangelo’s birthday).  If an infected system is booted on March 6th, the virus will erase the hard drive.  Despite doomsday warnings made by the press and the antivirus industry of “at least five million infected systems at risk,” only about 10,000-20,000 computers worldwide were hit by the virus.

The Concept virus was discovered in 1995.  Concept is short for “Proof of Concept,” and it was designed to show how viruses could be written in the macro language programmed into Microsoft Word.  By 2004, roughly 75% of all viruses are macro viruses.

The CIH virus, later renamed “Chernobyl,” appeared in 1998.  This was a very damaging virus that was not only programmed to erase hard drives but also tried to erase BIOS chips.  For the first time in history, a virus had managed to actually damage the hardware it was running on.  Fortunately, CIH wasn’t very good at it, and only damaged a handful of systems.


Firewalls and Firewalls and Proxies

Firewalls and Proxies


In building construction, a firewall is a structure designed to contain building fires.  For example, an attic crawlspace that covers the entire length of the building would allow a fire to roar from one end of the building to the other.  Breaking up the crawlspace with non-flammable walls helps to slow the spread of a fire.

Network firewalls have a similar function.  A firewall is a network security system, either a program or an actual device, that breaks up a network to contain viruses and hackers.

Imagine two large fish tanks side by side, separated by a wall.  We want to allow the blue fish to mingle, but we need to keep the carnivorous fish on the left away from the baby fish on the right.  If we opened a computer-controlled door in the wall, programmed to only allow blue fish to pass but no one else, that would be a fishtank firewall.

Network firewalls “segment” the network.  Local traffic—the information that moves between the computers in that segment—doesn’t go through the firewall to the larger network outside.  And information that doesn’t need to reach anyone inside the firewall is blocked out, just like the carnivorous fish  in our example.

A Proxy is another network security tool.  Proxies are replacements for Internet servers.  When a computer requests a website from the internet, a main hub provides the IP address.  A firewall can interfere with this, and declare that no one inside the firewall can surf the Internet.  The Proxy is then the “official” way past the firewall.

A proxy server has a list of “authorized” websites.  When the user’s computer requests the address from the Internet, the proxy checks it against the list, and if the website is approved, it authorizes the firewall to let the traffic through.  If the website is not approved, then the firewall sends a message saying “you are not authorized to visit this website.”