Monday, February 1, 2010

The Most Important Thing in the World

If I had only a few minutes of life left and I had the opportunity of sharing with you - this is what I would like to say. The most important thing in life is to know what will happen when you die. Somebody has said that the two most certain things in life are...death and taxes! Well, we know what happens after tax...more tax! But what happens when we draw that last breath - well that's something else again.

The only person who ever spoke with absolute authority about death and what we can expect to follow, was Jesus Christ. His words have fascinated thinkers and philosophers throughout the ages. For example, he called himself by this startling title, "I am the resurrection and the life". He said that at the tomb of a man called Lazarus who, in a few moments, he was to raise from the dead after he had laid in the tomb for four days! You can read the story in the Bible. You will find it in John's gospel chapter eleven.

Then, some time later, he demonstrated this authority over death and life when he rose from the dead after having been in the tomb himself for three days.

Faced with the claims and sayings of Jesus Christ one must decide whether he was who he said he was, and whether he spoke the truth. Somebody has put it this way, Jesus Christ was either a liar, a lunatic, or who he claimed to be, the Son of God.

For me, he is who he said he was, the Son of the Living God. Therefore, I accept his words as being truthful and trustworthy. I believe him. As many of his hearers said of him, "No man has ever spoken like this man". (John 7: 46)

Here are some more of his sayings.

"He that believeth in me, though he were dead, yet shall he live: And whosoever lives and believeth in me shall never die." John 11: 25 - 26

"I am come that they might have life and have it more abundantly." John 10: 10

"I go to prepare a place for you, and if I go and prepare a place for you, I will come again, and receive you unto myself; that where I am there you may be also." John 14: 3-4

I am the way, the truth, and the life: no man cometh unto the Father but by me.” John 14: 6.

There are many more of these wonderful statements. All of them give hope, encouragement, courage and faith. You can "bet your life" upon them. They are totally true and utterly trustworthy.

As you read on you will find out, in five clear steps, more about God and what kind of person he truly is and some of the good things he has planned for your life. Along the way you will discover why many people never come to enjoy these for themselves. You will then find, explained as simply and clearly as I can, how you can be sure of The Most Important Thing In The World - Eternal Life. Finally, there are some keys to living abundantly in the now of your life.

Please click to continue... Steps to be sure of eternal life...

Saturday, December 26, 2009

Battleplan: PC Invasion

Or, How all that Nastyware Invades Your Computer

Here 'tis –the shocking truth! Explained in a few simple steps:

In almost ALL cases –YOU are responsible!

  • You, knowingly or unknowingly, installed something you shouldn't have from an untrustworthy source. This can include screensavers, toolbars or torrents (downloaded music, video, etc). You failed to check the format (that little extension after the period or dot in the name of the item) before you downloaded. Or you also failed to scan for viruses after it was downloaded and before you opened and/or ran it on your machine. Note: the second you click the executable file, Pandora is out of the box and the trouble starts. Sometimes you may not notice it immediately, it may have a delayed action, but sooner or later, you will notice that things are not as they ought to be.
  • You failed to proceed cautiously when installing an otherwise very likely reputable application that bundles optional rubbish-ware along with the programme or application you want to install. (See 5 below for more on this one.)
  • As in 1 above it can be software you installed sometime in the past and has either already been infecting your machine, or it starts its malicious action after the lapse of a certain amount of time. Further, it may arrive with other programmes that install themselves alongside an existing piece of software and, like a time bomb, explodes its previously hidden payload of malware without notice.
  • You are not running an effective and legitimate Anti-Virus or Anti-Spyware application and, you are not taking time to allow it to run periodic full and in-depth scans of your machine to allow it to do its full job of detection and prevention. Sadly, there are more fake and extremely malicious anti spy and antivirus ware programmes out there trying to con you into giving them access to your machine than you can shake the proverbial stick at! Typically they promise the world as far as their ability to clean and protect your machine, but always along with multiple and dire warnings of how badly your machine is infected. Then, when you respond by clicking what appears to be the, 'button of deliverance', your troubles increase until any activity on your machine is pretty much impossible. Removing them can be a challenge even to experienced technicians, and can necessitate a full reinstall of the Operating System and all your other important applications.
  • Otherwise Legitimate and Useful Software Manufactures 'Sell Out' to the Bad Guys: It seems hardly credible, but those who make good and useful software can be enticed into including these optional and often quite unwanted apps and making them difficult to notice and thereby easy to install along with their own. There is, of course, some sort of incentive. Remember, the price of liberty (freedom from infestation) is constant vigilance!
  • Pop Ups etc: These are particularly effective at trapping PC users. You slavishly and obediently, like a sheep to the slaughter, clicked on the one of the many enticing and attractive pop-ups that followed a previous infection and exacerbated an already compromised position.

The Good News is, you have read this article and you are now armed with knowledge. You are forewarned and forearmed. You, from now on, will view with great skepticism:

  1. The steps you are led through as you seek to download that enticing piece of software, music, move, file etc from the web. You will ponder the file and seek to find out a little bit more about its bona fides, its format, its origin and more.
  2. The process of installing downloaded programmes and applications from the web. You will not simply click, 'OK', 'Next', 'Yes' etc without reading what you are saying 'Yes' and 'OK' to!
  3. You will NOT click on Pop-ups at all, ever again, unless you know exactly what they are, what they will do, and where they may lead you. You will disable pop-ups so that your browser must ask you before allowing them to appear and distract you from what you are doing.
  4. You will resolve to be less impulsive in your web activities and more reflective on where you point your browser and what sites you visit and say to yourself, "Do I really want some destructive nutter to have access to my expensive and so very useful computer that is so much fun in so many ways?" Do I want to have to pay my friendly computer tech all that money to fix what my own momentary lapse in concentration caused? (The answer to this is, of course, 'Yes', I do. I am only too glad to contribute to their retirement fund!' That being the case please ignore all you've just read and carry on regardless. My contact details are on my web site: www.jbc.gen.nz/pccare. Thank you very much.

Sunday, November 15, 2009

Text Etiquette –Obey why don’t you!

Sourced from a fellow blogger... and shamelessly pillaged and plagiarized! (Seriously, the source link is provided below J)

  1. Put your phone on vibrate or silent mode when texting back and forth with someone. Everyone doesn't need to hear your favorite ringtone every time you get a text.
  2. Check the recipient's number one last time BEFORE you hit "send." A slip of the finger could easily send a wrong person that intimate message intended for your significant other.
  3. Take precautions to protect private or personal text messages since you never know who might be snooping. While a high percentage of people lower their voices when they talk on their cell phones in public, a few actually shield their cell phone when sending or receiving text messages.
  4. Beware of texting when out with friends. It's disrespectful and can give the impression that you aren't paying attention to the conversation.
  5. If you are expecting a text message let the people you're with know.
  6. Don't get into the habit of marathon texting. if you need to use more than 150 characters to go back and forth more than two or three times send and email or call.
  7. Avoid using text-message speak, abbreviations or emoticons since not everyone may know what you mean. Especially when texting work colleagues, use correct capitalization (And remember ALL CAPS EQUAL YELLING), punctuation, salutations and closings, and proofread for both spelling and grammar.


 

I'm sure there are a few more that others might have. So, please feel free to add more to this if you want.

Source: Dmitri

Heaven_and_Hell


Heaven_and_Hell
Originally uploaded by oracle_from_beyond
Thank you, beyond.

Wednesday, November 11, 2009

Mysteries of WiFi Resolved!

Here we go! Read on as we delve into the mysteries of WiFi, that wonderful set of wireless standards that lets us do so much online, both locally via LAN and widely via the Internet.

The full set of WiFi Wireless Standards is: 802.11b, 802.11a, 802.11g and 802.11n.


 

The Wonderful Wireless LAN (Local Area Network)

The WiFi enabled LAN has revolutionized the home and business network. In order to thread your way through the minefield it will help to realize that the accepted series of standards that have evolved over the years since Vic Hayes, and others, gave birth to WiFi in the early 90s the evolution was fast and furious. We now have four and with time we will undoubtedly see yet further enhancement. For greater and more in-depth discussion visit the Wiki article which I have read and is excellent. The generally accepted list of conforming WiFi technologies are the four listed above. There are other related forms of wireless such as Bluetooth which is an alternative wireless network technology that followed a different development path than the 802.11 family. Bluetooth supports a very short range (approximately 10 meters) and relatively low bandwidth (1-3 Mbps in practice). It is designed for low-power network devices like handhelds. The low manufacturing cost of Bluetooth hardware also appeals to industry vendors. You can usually find Bluetooth in the networking of PDAs or cell phones with PCs, but it is rarely used for general-purpose WLAN networking due to the range and speed considerations. Another alternative is WiMax, developed separately from Wi-Fi, WiMax is used for long-range networking (spanning miles or kilometers) as opposed to local area wireless networking.


 

802.11 –Where it started

In 1997, the Institute of Electrical and Electronics Engineers (IEEE) created the first WLAN standard. They called it 802.11 after the name of the group formed to oversee its development. Unfortunately, 802.11 only supported a maximum network bandwidth of 2 Mbps - too slow for most applications. For this reason, ordinary 802.11 wireless products are no longer manufactured.


 

802.11b –WiFi becomes Useful

IEEE expanded on the original 802.11 standard in July 1999, creating the 802.11b specification. 802.11b supports bandwidth up to 11 Mbps, comparable to traditional Ethernet.

802.11b uses the same unregulated radio signaling frequency (2.4 GHz) as the original 802.11 standard. Vendors often prefer using these frequencies to lower their production costs. Being unregulated, 802.11b gear can incur interference from microwave ovens, cordless phones, and other appliances using the same 2.4 GHz range. However, by installing 802.11b gear a reasonable distance from other appliances, interference can easily be avoided.

In Summary:

  1. Pro 802.11b - lowest cost; signal range is good and not easily obstructed
  2. Con 802.11b - slowest maximum speed; home appliances may interfere on the unregulated frequency band


 

802.11a – The Confusing Standard

While 802.11b was in development, IEEE created a second extension to the original 802.11 standard called 802.11a. Because 802.11b gained in popularity much faster than did 802.11a, some folks believe that 802.11a was created after 802.11b. In fact, 802.11a was created at the same time. Due to its higher cost, 802.11a is usually found on business networks whereas 802.11b better serves the home market.

802.11a supports bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz. This higher frequency compared to 802.11b shortens the range of 802.11a networks. The higher frequency also means 802.11a signals have more difficulty penetrating walls and other obstructions.

Together But No Unity: You've heard the truism,
'Two cats tied by their tails are together, but definitely NOT in unity!' Because 802.11a and 802.11b utilize different frequencies, the two technologies are incompatible with each other. Some vendors offer hybrid 802.11a/b network gear, but these products merely implement the two standards side by side (each connected devices must use one or the other).

In Summary:

  1. Pro of 802.11a - fast maximum speed; regulated frequencies prevent signal interference from other devices
  2. Con of 802.11a - highest cost; shorter range signal that is more easily obstructed


 

802.11g – We're getting somewhere now

In 2002 and 2003, WLAN products supporting a newer standard called 802.11g emerged on the market. 802.11g attempts to combine the best of both 802.11a and 802.11b. 802.11g supports bandwidth up to 54 Mbps, and it uses the 2.4 Ghz frequency for greater range. 802.11g is backwards compatible with 802.11b, meaning that 802.11g access points will work with 802.11b wireless network adapters and vice versa.

In Summary:

  1. Pro of 802.11g - fast maximum speed; signal range is good and not easily obstructed
  2. Con of 802.11g - costs more than 802.11b; appliances may interfere on the unregulated signal frequency


 

802.11n – In Search of Perfection

The newest IEEE standard in the Wi-Fi category is 802.11n. It was designed to improve on 802.11g in the amount of bandwidth supported by utilizing multiple wireless signals and antennas (called MIMO technology) instead of one.

When this standard is finalized, 802.11n connections should support data rates of over 100 Mbps. 802.11n also offers somewhat better range over earlier Wi-Fi standards due to its increased signal intensity. 802.11n equipment will be backward compatible with 802.11g gear.

In Summary:

  1. Pro of 802.11n - fastest maximum speed and best signal range; more resistant to signal interference from outside sources
  2. Con of 802.11n - standard is not yet finalized; costs more than 802.11g; the use of multiple signals may greatly interfere with nearby 802.11b/g based networks.


 

There are other IEEE 802.11 standards such as 802.11h and 802.11j. These are extensions or offshoots of Wi-Fi technology that serve specific purposes not generally used in normal work-a-day wireless networking situations.

For a full list of WiFi Standards and to read more click this link.

Sunday, November 1, 2009

Sailing Christopher Cross (Tall Sailing Ships)

Isn't the Internet wonderful? Here is something truly beautiful for all to enjoy. Thank you Christopher Cross.

Thursday, July 23, 2009

A Big Tick for Microsoft

I'm talking hybrid computing here. Definition of Hybrid Computing: Apps and utilities that work locally AND in the Cloud.

Quoting from one of my fav columnists, "Microsoft currently is the only company that gets this right while everybody else fails miserably at it." I agree.


He cites a case in point: 'You want to use a service that provides reliable email, instant messaging, contact, file and calendar management. You want it all to work no matter what computer you're on. You want something that is accessible on the web, as a local client and on your mobile device.'


'And', as he says so correctly 'you want it all for free'. Too right.


So, where do you go? The answer: to Microsoft and their Windows Live service. It does it all, and it does if for free. More, it works, it works and it works fantastically well. Here they are. These are the apps, utilities and service you get all in a package, or standalone.

  • Hotmail: for email
  • Windows Live Messenger: for instant messaging.
  • Hotmail again: for contact management.
  • Skydrive: for files (25 GIGS WORTH!)
  • Calendar management: with, you guessed it, Hotmail again.

All of the above work on the web, sync seamlessly with the Windows Live Mail client and, if you prefer to stay with Outlook, syncs smoothly with Outlook's Calendar via Outlook Connector. And wait, there's more! All this PLUS 100% accessible via your smartphone/Windows Mobile equipped PDA/Phone as well (I use Palm's Treo 700wx and have full access with Windows Mobile Pocket MSN.


As my columnist asks, in words to the same effect, 'who else does it with anything like the same smooth efficiency?'
  • Google? Not even close.
    With Google you must stay in the browser completely –Gmail is browser based. You can download and send email via Outlook Connector (Microsoft to the rescue please note!), bu NOT your contacts. Further, there is no way to make use of Gmail "labels" using any other client. I must add, I am a fan of many things Google, not least of which is Blogger, on which this is being published (!), yet even more so, I, as a consumer, love competition even more. This blog will hopefully serve to stimulate the folks at the big 'G' to turn up the heat yet again for you and me. After all, in the end, in a democratically and enterprise based society (the Net), we vote with our feet! (or is fingers as we type?)

  • Apple? Nah. You have to pay. MobileMe cost ya. How much? US$99 yearly just to have it.
  • Yahoo? No again. Yahoo offers no local client access and POP cost again. Microsoft wins again because Hotmail's POP access is now free since March 2009. Can't beat that FREE! Then again, just like Google you must stay in the browser to achieve full functionality.

So, as Dave states, 'In the end, Microsoft's Windows Live is the only sensible choice for true hybrid computing. You've got your local and your cloud within easy reach.' And, he adds, 'it's also stupidly easy to backup your mail and contacts using freely available software.

So, let's hear it for Microsoft, so often the recipient of boos and brickbats, on this occasion they definitely earn the laurel wreath of victory in this age when the aerial battle for web dominance is being fought way up in cloud-sphere.

More bad news for the other combatants: Microsoft Office will be integrated into Windows Live in 2010. Wow!

Is that laughter in Redmond I hear?

Ref: Dave Risley, PCMec.com